Sample records for group communication protocols

  1. Reliable communication in the presence of failures

    NASA Technical Reports Server (NTRS)

    Birman, Kenneth P.; Joseph, Thomas A.

    1987-01-01

    The design and correctness of a communication facility for a distributed computer system are reported on. The facility provides support for fault-tolerant process groups in the form of a family of reliable multicast protocols that can be used in both local- and wide-area networks. These protocols attain high levels of concurrency, while respecting application-specific delivery ordering constraints, and have varying cost and performance that depend on the degree of ordering desired. In particular, a protocol that enforces causal delivery orderings is introduced and shown to be a valuable alternative to conventional asynchronous communication protocols. The facility also ensures that the processes belonging to a fault-tolerant process group will observe consistant orderings of events affecting the group as a whole, including process failures, recoveries, migration, and dynamic changes to group properties like member rankings. A review of several uses for the protocols is the ISIS system, which supports fault-tolerant resilient objects and bulletin boards, illustrates the significant simplification of higher level algorithms made possible by our approach.

  2. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOEpatents

    Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

    2013-07-09

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  3. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOEpatents

    Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen

    2015-01-06

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  4. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD aremore » extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.« less

  5. Experimental Evaluation of Unicast and Multicast CoAP Group Communication

    PubMed Central

    Ishaq, Isam; Hoebeke, Jeroen; Moerman, Ingrid; Demeester, Piet

    2016-01-01

    The Internet of Things (IoT) is expanding rapidly to new domains in which embedded devices play a key role and gradually outnumber traditionally-connected devices. These devices are often constrained in their resources and are thus unable to run standard Internet protocols. The Constrained Application Protocol (CoAP) is a new alternative standard protocol that implements the same principals as the Hypertext Transfer Protocol (HTTP), but is tailored towards constrained devices. In many IoT application domains, devices need to be addressed in groups in addition to being addressable individually. Two main approaches are currently being proposed in the IoT community for CoAP-based group communication. The main difference between the two approaches lies in the underlying communication type: multicast versus unicast. In this article, we experimentally evaluate those two approaches using two wireless sensor testbeds and under different test conditions. We highlight the pros and cons of each of them and propose combining these approaches in a hybrid solution to better suit certain use case requirements. Additionally, we provide a solution for multicast-based group membership management using CoAP. PMID:27455262

  6. Design of a Software Configuration for Real-Time Multimedia Group Communication; HNUMTP

    NASA Astrophysics Data System (ADS)

    Park, Gil-Cheol

    This paper designs transport protocol of multi-session/channel method for real time multimedia group telecommunication and realizes it. The special features of the designed and realized protocol are first, that it solved the sync problem which is the specific character of multimedia telecommunication by using multi-channel method protocol. Usual multimedia telecommunication is assigned one channel by each media data. This paper shortened the phenomenon that waits data for sync of receiving part by assigning more than one channel for the channel that has a lot of data per hour as video data. The problem of intermedia synchronization that happens then could be solved by sending temporal/spacial related data among data assigning extra control channel. Second, that it does integrated management for sessions. Each session is one group telecommunication unit which supports mutual working environment that is independent. Each session communicates the participants in the group independently, the session manager manages all the communication among groups and lets media sources connected with all network be operated efficiently.

  7. Physician communication in the operating room.

    PubMed

    Kirschbaum, Kristin A; Rask, John P; Fortner, Sally A; Kulesher, Robert; Nelson, Michael T; Yen, Tony; Brennan, Matthew

    2015-01-01

    In this study, communication research was conducted with multidisciplinary groups of operating-room physicians. Theoretical frameworks from intercultural communication and rhetoric were used to (a) measure latent cultural communication variables and (b) conduct communication training with the physicians. A six-step protocol guided the research with teams of physicians from different surgical specialties: anesthesiologists, general surgeons, and obstetrician-gynecologists (n = 85). Latent cultural communication variables were measured by surveys administered to physicians before and after completion of the protocol. The centerpiece of the 2-hour research protocol was an instructional session that informed the surgical physicians about rhetorical choices that support participatory communication. Post-training results demonstrated scores increased on communication variables that contribute to collaborative communication and teamwork among the physicians. This study expands health communication research through application of combined intercultural and rhetorical frameworks, and establishes new ways communication theory can contribute to medical education.

  8. Scalable Multicast Protocols for Overlapped Groups in Broker-Based Sensor Networks

    NASA Astrophysics Data System (ADS)

    Kim, Chayoung; Ahn, Jinho

    In sensor networks, there are lots of overlapped multicast groups because of many subscribers, associated with their potentially varying specific interests, querying every event to sensors/publishers. And gossip based communication protocols are promising as one of potential solutions providing scalability in P(Publish)/ S(Subscribe) paradigm in sensor networks. Moreover, despite the importance of both guaranteeing message delivery order and supporting overlapped multicast groups in sensor or P2P networks, there exist little research works on development of gossip-based protocols to satisfy all these requirements. In this paper, we present two versions of causally ordered delivery guaranteeing protocols for overlapped multicast groups. The one is based on sensor-broker as delegates and the other is based on local views and delegates representing subscriber subgroups. In the sensor-broker based protocol, sensor-broker might lead to make overlapped multicast networks organized by subscriber's interests. The message delivery order has been guaranteed consistently and all multicast messages are delivered to overlapped subscribers using gossip based protocols by sensor-broker. Therefore, these features of the sensor-broker based protocol might be significantly scalable rather than those of the protocols by hierarchical membership list of dedicated groups like traditional committee protocols. And the subscriber-delegate based protocol is much stronger rather than fully decentralized protocols guaranteeing causally ordered delivery based on only local views because the message delivery order has been guaranteed consistently by all corresponding members of the groups including delegates. Therefore, this feature of the subscriber-delegate protocol is a hybrid approach improving the inherent scalability of multicast nature by gossip-based technique in all communications.

  9. Right hemisphere damage: Communication processing in adults evaluated by the Brazilian Protocole MEC - Bateria MAC.

    PubMed

    Fonseca, Rochele Paz; Fachel, Jandyra Maria Guimarães; Chaves, Márcia Lorena Fagundes; Liedtke, Francéia Veiga; Parente, Maria Alice de Mattos Pimenta

    2007-01-01

    Right-brain-damaged individuals may present discursive, pragmatic, lexical-semantic and/or prosodic disorders. To verify the effect of right hemisphere damage on communication processing evaluated by the Brazilian version of the Protocole Montréal d'Évaluation de la Communication (Montreal Communication Evaluation Battery) - Bateria Montreal de Avaliação da Comunicação, Bateria MAC, in Portuguese. A clinical group of 29 right-brain-damaged participants and a control group of 58 non-brain-damaged adults formed the sample. A questionnaire on sociocultural and health aspects, together with the Brazilian MAC Battery was administered. Significant differences between the clinical and control groups were observed in the following MAC Battery tasks: conversational discourse, unconstrained, semantic and orthographic verbal fluency, linguistic prosody repetition, emotional prosody comprehension, repetition and production. Moreover, the clinical group was less homogeneous than the control group. A right-brain-damage effect was identified directly, on three communication processes: discursive, lexical-semantic and prosodic processes, and indirectly, on pragmatic process.

  10. Wireless Communications in Space

    NASA Technical Reports Server (NTRS)

    2004-01-01

    In 1992, NASA and the U.S. Department of Defense jointly commissioned the research and development of a technology solution to address the challenges and requirements of communicating with their spacecraft. The project yielded an international consortium composed of representatives from the space science community, industry, and academia. This group of experts developed a broad suite of protocols specifically designed for space-based communications, known today as Space Communications Protocol Standards (SCPS). Having been internationally standardized by the Consultative Committee on Space Data Systems and the International Standards Organization, SCPS is distributed as open source technology by NASA s Jet Propulsion Laboratory (JPL). The protocols are used for every national space mission that takes place today.

  11. Right hemisphere damage: Communication processing in adults evaluated by the Brazilian Protocole MEC – Bateria MAC

    PubMed Central

    Fonseca, Rochele Paz; Fachel, Jandyra Maria Guimarães; Chaves, Márcia Lorena Fagundes; Liedtke, Francéia Veiga; Parente, Maria Alice de Mattos Pimenta

    2007-01-01

    Right-brain-damaged individuals may present discursive, pragmatic, lexical-semantic and/or prosodic disorders. Objective To verify the effect of right hemisphere damage on communication processing evaluated by the Brazilian version of the Protocole Montréal d’Évaluation de la Communication (Montreal Communication Evaluation Battery) – Bateria Montreal de Avaliação da Comunicação, Bateria MAC, in Portuguese. Methods A clinical group of 29 right-brain-damaged participants and a control group of 58 non-brain-damaged adults formed the sample. A questionnaire on sociocultural and health aspects, together with the Brazilian MAC Battery was administered. Results Significant differences between the clinical and control groups were observed in the following MAC Battery tasks: conversational discourse, unconstrained, semantic and orthographic verbal fluency, linguistic prosody repetition, emotional prosody comprehension, repetition and production. Moreover, the clinical group was less homogeneous than the control group. Conclusions A right-brain-damage effect was identified directly, on three communication processes: discursive, lexical-semantic and prosodic processes, and indirectly, on pragmatic process. PMID:29213400

  12. Brazilian version of the Protocole Montréal d'Evaluation de la Communication (Protocole MEC): normative and reliability data.

    PubMed

    Fonseca, Rochele Paz; Joanette, Yves; Côté, Hélène; Ska, Bernadette; Giroux, Francine; Fachel, Jandyra Maria Guimarães; Damasceno Ferreira, Gabriela; Parente, Maria Alice de Mattos Pimenta

    2008-11-01

    The lack of standardized instruments to evaluate communication disorders related to the right hemisphere was verified. A new evaluation tool was developed: Protocole Montréal d'Evaluation de la Communication--Protocole MEC, adapted to Brazilian Portuguese--Bateria Montreal de Avaliação da Comunicação--Bateria MAC (Montreal Evaluation of Communication Battery). The purpose was to present stratified normative data by age and educational level, and to verify the reliability parameters of the MEC Battery. 300 individuals, between the ages of 19 and 75 years, and levels of formal education between 2 and 35 years, participated in this study. They were divided equally into six normative groups, according to three age categories (young adults, intermediary age, and seniors) and two educational levels (low and high). Two procedures were used to check reliability: Cronbach alpha and reliability between evaluators, Results were established at the 10th percentile, and an alert point per task for each normative group. Cronbach's alpha was, in general, between .70 and .90 and the average rate of agreement between evaluators varied from .62 to .94. Standards of age and education were established. The reliability of this instrument was verified. The psychometric legitimization of the MEC Battery will contribute to the diagnostic process for communicative disorders.

  13. Lightweight and scalable secure communication in VANET

    NASA Astrophysics Data System (ADS)

    Zhu, Xiaoling; Lu, Yang; Zhu, Xiaojuan; Qiu, Shuwei

    2015-05-01

    To avoid a message to be tempered and forged in vehicular ad hoc network (VANET), the digital signature method is adopted by IEEE1609.2. However, the costs of the method are excessively high for large-scale networks. The paper efficiently copes with the issue with a secure communication framework by introducing some lightweight cryptography primitives. In our framework, point-to-point and broadcast communications for vehicle-to-infrastructure (V2I) and vehicle-to-vehicle (V2V) are studied, mainly based on symmetric cryptography. A new issue incurred is symmetric key management. Thus, we develop key distribution and agreement protocols for two-party key and group key under different environments, whether a road side unit (RSU) is deployed or not. The analysis shows that our protocols provide confidentiality, authentication, perfect forward secrecy, forward secrecy and backward secrecy. The proposed group key agreement protocol especially solves the key leak problem caused by members joining or leaving in existing key agreement protocols. Due to aggregated signature and substitution of XOR for point addition, the average computation and communication costs do not significantly increase with the increase in the number of vehicles; hence, our framework provides good scalability.

  14. Quantum Secure Group Communication.

    PubMed

    Li, Zheng-Hong; Zubairy, M Suhail; Al-Amri, M

    2018-03-01

    We propose a quantum secure group communication protocol for the purpose of sharing the same message among multiple authorized users. Our protocol can remove the need for key management that is needed for the quantum network built on quantum key distribution. Comparing with the secure quantum network based on BB84, we show our protocol is more efficient and securer. Particularly, in the security analysis, we introduce a new way of attack, i.e., the counterfactual quantum attack, which can steal information by "invisible" photons. This invisible photon can reveal a single-photon detector in the photon path without triggering the detector. Moreover, the photon can identify phase operations applied to itself, thereby stealing information. To defeat this counterfactual quantum attack, we propose a quantum multi-user authorization system. It allows us to precisely control the communication time so that the attack can not be completed in time.

  15. Group consensus control for networked multi-agent systems with communication delays.

    PubMed

    An, Bao-Ran; Liu, Guo-Ping; Tan, Chong

    2018-05-01

    This paper investigates group consensus problems in networked multi-agent systems (NMAS) with communication delays. Based on the sed state prediction scheme, the group consensus control protocol is designed to compensate the communication delay actively. In light of algebraic graph theories and matrix theories, necessary and(or) sufficient conditions of group consensus with respect to a given admissible control set are obtained for the NMAS with communication delays under mild assumptions. Finally, simulations are performed to demonstrate the effectiveness of the theoretical results. Copyright © 2018 ISA. All rights reserved.

  16. MTP: An atomic multicast transport protocol

    NASA Technical Reports Server (NTRS)

    Freier, Alan O.; Marzullo, Keith

    1990-01-01

    Multicast transport protocol (MTP); a reliable transport protocol that utilizes the multicast strategy of applicable lower layer network architectures is described. In addition to transporting data reliably and efficiently, MTP provides the client synchronization necessary for agreement on the receipt of data and the joining of the group of communicants.

  17. Initial Characterization of Optical Communications with Disruption-Tolerant Network Protocols

    NASA Technical Reports Server (NTRS)

    Schoolcraft, Joshua; Wilson, Keith

    2011-01-01

    Disruption-tolerant networks (DTNs) are groups of network assets connected with a suite of communication protocol technologies designed to mitigate the effects of link delay and disruption. Application of DTN protocols to diverse groups of network resources in multiple sub-networks results in an overlay network-of-networks with autonomous data routing capability. In space environments where delay or disruption is expected, performance of this type of architecture (such as an interplanetary internet) can increase with the inclusion of new communications mediums and techniques. Space-based optical communication links are therefore an excellent building block of space DTN architectures. When compared to traditional radio frequency (RF) communications, optical systems can provide extremely power-efficient and high bandwidth links bridging sub-networks. Because optical links are more susceptible to link disruption and experience the same light-speed delays as RF, optical-enabled DTN architectures can lessen potential drawbacks and maintain the benefits of autonomous optical communications over deep space distances. These environment-driven expectations - link delay and interruption, along with asymmetric data rates - are the purpose of the proof-of-concept experiment outlined herein. In recognizing the potential of these two technologies, we report an initial experiment and characterization of the performance of a DTN-enabled space optical link. The experiment design employs a point-to-point free-space optical link configured to have asymmetric bandwidth. This link connects two networked systems running a DTN protocol implementation designed and written at JPL for use on spacecraft, and further configured for higher bandwidth performance. Comparing baseline data transmission metrics with and without periodic optical link interruptions, the experiment confirmed the DTN protocols' ability to handle real-world unexpected link outages while maintaining capability of reliably delivering data at relatively high rates. Finally, performance characterizations from this data suggest performance optimizations to configuration and protocols for future optical-specific DTN space link scenarios.

  18. Photonics and other approaches to high speed communications

    NASA Technical Reports Server (NTRS)

    Maly, Kurt

    1992-01-01

    Our research group of 4 faculty and about 10-15 graduate students was actively involved (as a group) in the development of computer communication networks for the last five years. Many of its individuals have been involved in related research for a much longer period. The overall research goal is to extend network performance to higher data rates, to improve protocol performance at most ISO layers and to improve network operational performance. We briefly state our research goals, then discuss the research accomplishments and direct your attention to attached and/or published papers which cover the following topics: scalable parallel communications; high performance interconnection between high data rate networks; and a simple, effective media access protocol system for integrated, high data rate networks.

  19. Framework for Flexible Security in Group Communications

    NASA Technical Reports Server (NTRS)

    McDaniel, Patrick; Prakash, Atul

    2006-01-01

    The Antigone software system defines a framework for the flexible definition and implementation of security policies in group communication systems. Antigone does not dictate the available security policies, but provides high-level mechanisms for implementing them. A central element of the Antigone architecture is a suite of such mechanisms comprising micro-protocols that provide the basic services needed by secure groups.

  20. Delay and Disruption Tolerant Networking MACHETE Model

    NASA Technical Reports Server (NTRS)

    Segui, John S.; Jennings, Esther H.; Gao, Jay L.

    2011-01-01

    To verify satisfaction of communication requirements imposed by unique missions, as early as 2000, the Communications Networking Group at the Jet Propulsion Laboratory (JPL) saw the need for an environment to support interplanetary communication protocol design, validation, and characterization. JPL's Multi-mission Advanced Communications Hybrid Environment for Test and Evaluation (MACHETE), described in Simulator of Space Communication Networks (NPO-41373) NASA Tech Briefs, Vol. 29, No. 8 (August 2005), p. 44, combines various commercial, non-commercial, and in-house custom tools for simulation and performance analysis of space networks. The MACHETE environment supports orbital analysis, link budget analysis, communications network simulations, and hardware-in-the-loop testing. As NASA is expanding its Space Communications and Navigation (SCaN) capabilities to support planned and future missions, building infrastructure to maintain services and developing enabling technologies, an important and broader role is seen for MACHETE in design-phase evaluation of future SCaN architectures. To support evaluation of the developing Delay Tolerant Networking (DTN) field and its applicability for space networks, JPL developed MACHETE models for DTN Bundle Protocol (BP) and Licklider/Long-haul Transmission Protocol (LTP). DTN is an Internet Research Task Force (IRTF) architecture providing communication in and/or through highly stressed networking environments such as space exploration and battlefield networks. Stressed networking environments include those with intermittent (predictable and unknown) connectivity, large and/or variable delays, and high bit error rates. To provide its services over existing domain specific protocols, the DTN protocols reside at the application layer of the TCP/IP stack, forming a store-and-forward overlay network. The key capabilities of the Bundle Protocol include custody-based reliability, the ability to cope with intermittent connectivity, the ability to take advantage of scheduled and opportunistic connectivity, and late binding of names to addresses.

  1. Issues in providing a reliable multicast facility

    NASA Technical Reports Server (NTRS)

    Dempsey, Bert J.; Strayer, W. Timothy; Weaver, Alfred C.

    1990-01-01

    Issues involved in point-to-multipoint communication are presented and the literature for proposed solutions and approaches surveyed. Particular attention is focused on the ideas and implementations that align with the requirements of the environment of interest. The attributes of multicast receiver groups that might lead to useful classifications, what the functionality of a management scheme should be, and how the group management module can be implemented are examined. The services that multicasting facilities can offer are presented, followed by mechanisms within the communications protocol that implements these services. The metrics of interest when evaluating a reliable multicast facility are identified and applied to four transport layer protocols that incorporate reliable multicast.

  2. Progress Toward Standards for the Seamless Interoperability of Broadband Satellite Communication Networks

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Glover, Daniel R.; vonDeak, Thomas C.; Bhasin, Kul B.

    1998-01-01

    The realization of the full potential of the National Information Infrastructure (NH) and Global Information Infrastructure (GII) requires seamless interoperability of emerging satellite networks with terrestrial networks. This requires a cooperative effort between industry, academia and government agencies to develop and advocate new, satellite-friendly communication protocols and modifications to existing communication protocol standards. These groups have recently come together to actively participating in a number of standards making bodies including: the Internet Engineering Task Force (IETF), the Asynchronous Transfer Mode (ATM) Forum, the International Telecommunication Union (ITU) and the Telecommunication Industry Association MA) to ensure that issues regarding efficient use of these protocols over satellite links are not overlooked. This paper will summarize the progress made toward standards development to achieve seamless integration and accelerate the deployment of multimedia applications.

  3. Protocol for Communication Networking for Formation Flying

    NASA Technical Reports Server (NTRS)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in diverse local-area networks, this protocol offers both (1) a random- access mode needed for the early PFF deployment phase and (2) a time-bounded-services mode needed during PFF-maintenance operations. Switching between these two modes could be controlled by upper-layer entities using standard link-management mechanisms. Because the early deployment phase of a PFF mission can be expected to involve multihop relaying to achieve network connectivity (see figure), the proposed protocol includes the open shortest path first (OSPF) network protocol that is commonly used in the Internet. Each spacecraft in a PFF network would be in one of seven distinct states as the mission evolved from initial deployment, through coarse formation, and into precise formation. Reconfiguration of the formation to perform different scientific observations would also cause state changes among the network nodes. The application protocol provides for recognition and tracking of the seven states for each node and for protocol changes under specified conditions to adapt the network and satisfy communication requirements associated with the current PFF mission phase. Except during early deployment, when peer-to-peer random access discovery methods would be used, the application protocol provides for operation in a centralized manner.

  4. Prototype development and implementation of picture archiving and communications systems based on ISO-OSI standard

    NASA Astrophysics Data System (ADS)

    Martinez, Ralph; Nam, Jiseung

    1992-07-01

    Picture Archiving and Communication Systems (PACS) is an integration of digital image formation in a hospital, which encompasses various imaging equipment, image viewing workstations, image databases, and a high speed network. The integration requires a standardization of communication protocols to connect devices from different vendors. The American College of Radiology and the National Electrical Manufacturers Association (ACR- NEMA) standard Version 2.0 provides a point-to-point hardware interface, a set of software commands, and a consistent set of data formats for PACS. But, it is inadequate for PACS networking environments, because of its point-to-point nature and its inflexibility to allow other services and protocols in the future. Based on previous experience of PACS developments in The University of Arizona, a new communication protocol for PACS networks and an approach were proposed to ACR-NEMA Working Group VI. The defined PACS protocol is intended to facilitate the development of PACS''s capable of interfacing with other hospital information systems. Also, it is intended to allow the creation of diagnostic information data bases which can be interrogated by a variety of distributed devices. A particularly important goal is to support communications in a multivendor environment. The new protocol specifications are defined primarily as a combination of the International Organization for Standardization/Open Systems Interconnection (ISO/OSI), TCP/IP protocols, and the data format portion of ACR-NEMA standard. This paper addresses the specification and implementation of the ISO-based protocol into a PACS prototype. The protocol specification, which covers Presentation, Session, Transport, and Network layers, is summarized briefly. The protocol implementation is discussed based on our implementation efforts in the UNIX Operating System Environment. At the same time, results of performance comparison between the ISO and TCP/IP implementations are presented to demonstrate the implementation of defined protocol. The testing of performance analysis is done by prototyping PACS on available platforms, which are Micro VAX II, DECstation and SUN Workstation.

  5. Firewall Traversal for CORBA Applications Using an Implementation of Bidirectional IIOP in MICO

    NASA Technical Reports Server (NTRS)

    Griffin, Robert I.; Lopez, Isaac (Technical Monitor)

    2002-01-01

    The Object Management Group (OMG) has added specifications to the General Inter-ORB Protocol (GIOP 1.2), specifically the Internet Inter-ORB Protocol (IIOP 1.2), that allow servers and clients on opposing sides of a firewall to reverse roles and still communicate freely. This addition to the GIOP specifications is referred to as Bidirectional GIOP. The implementation of these specifications as applied to communication over TCP/IP connections is referred to as 'Bidirectional Internet Inter-ORB Protocol' or BiDirIIOP. This paper details the implementation and testing of the BiDirIIOP Specification in an open source ORB, MICO, that did not previously support Bidirectional GIOP. It also provides simple contextual information and a description of the OMG GIOP/IIOP messaging protocols.

  6. Travel Survey Manual

    DOT National Transportation Integrated Search

    2012-11-01

    Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...

  7. Eye Examination Testability in Children with Autism and in Typical Peers

    PubMed Central

    Coulter, Rachel Anastasia; Bade, Annette; Tea, Yin; Fecho, Gregory; Amster, Deborah; Jenewein, Erin; Rodena, Jacqueline; Lyons, Kara Kelley; Mitchell, G. Lynn; Quint, Nicole; Dunbar, Sandra; Ricamato, Michele; Trocchio, Jennie; Kabat, Bonnie; Garcia, Chantel; Radik, Irina

    2015-01-01

    ABSTRACT Purpose To compare testability of vision and eye tests in an examination protocol of 9- to 17-year-old patients with autism spectrum disorder (ASD) to typically developing (TD) peers. Methods In a prospective pilot study, 61 children and adolescents (34 with ASD and 27 who were TD) aged 9 to 17 years completed an eye examination protocol including tests of visual acuity, refraction, convergence (eye teaming), stereoacuity (depth perception), ocular motility, and ocular health. Patients who required new refractive correction were retested after wearing their updated spectacle prescription for 1 month. The specialized protocol incorporated visual, sensory, and communication supports. A psychologist determined group status/eligibility using DSM-IV-TR (Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition, Text Revision) criteria by review of previous evaluations and parent responses on the Social Communication Questionnaire. Before the examination, parents provided information regarding patients’ sex, race, ethnicity, and, for ASD patients, verbal communication level (nonverbal, uses short words, verbal). Parents indicated whether the patient wore a refractive correction, whether the patient had ever had an eye examination, and the age at the last examination. Chi-square tests compared testability results for TD and ASD groups. Results Typically developing and ASD groups did not differ by age (p = 0.54), sex (p = 0.53), or ethnicity (p = 0.22). Testability was high on most tests (TD, 100%; ASD, 88 to 100%), except for intraocular pressure (IOP), which was reduced for both the ASD (71%) and the TD (89%) patients. Among ASD patients, IOP testability varied greatly with verbal communication level (p < 0.001). Although IOP measurements were completed on all verbal patients, only 37.5% of nonverbal and 44.4% of ASD patients who used short words were successful. Conclusions Patients with ASD can complete most vision and eye tests within an examination protocol. Testability of IOPs is reduced, particularly for nonverbal patients and patients who use short words to communicate. PMID:25415280

  8. Traffic volume trends 1998

    DOT National Transportation Integrated Search

    2012-11-01

    Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...

  9. Transportation users' views of quality

    DOT National Transportation Integrated Search

    2012-11-01

    Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...

  10. Translating evidence-based protocol of wound drain management for total joint arthroplasty into practice: A quasi-experimental study.

    PubMed

    Tsang, Lap Fung; Cheng, Hang Cheong; Ho, Hon Shuen; Hsu, Yung Chak; Chow, Chiu Man; Law, Heung Wah; Fong, Lup Chau; Leung, Lok Ming; Kong, Ivy Ching Yan; Chan, Chi Wai; Sham, Alice So Yuen

    2016-05-01

    Although various drains have long been used in total joint replacement, evidence suggests inconsistent practice exists in the use of drainage systems including intermittently applying suction or free of drainage suction, and variations in the optimal timing for wound drain removal. A comprehensive systematic review of available evidence up to 2013 was conducted in a previous study and a protocol was adapted for clinical application according to the summary of the retrieved information (Tsang, 2015). To determine if the protocol could reduce blood loss and blood transfusion after operation and to develop a record form so as to enhance communication of drainage record amongst surgeons and nurses. A quasi-experimental time-series design was undertaken. In the conventional group, surgeons ordered free drainage if the drain output was more than 300 ml. The time of removal of the drain was based on their professional judgement. In the protocol group the method of drainage was dependant of the drainage output as was the timing of the removal of the drain. A standardized record form was developed to guide operating room and orthopaedic ward nurses to manage the drainage system. The drain was removed significantly earlier in the protocol group. Blood loss rate at the first hour of post-operation was extremely low in the protocol group due to clamping effect. Blood loss in volume during the first three hours in the protocol group was significantly lower than that in the conventional group. Only in 11.1% and 4% of cases was it necessary to clamp at the three and four hour post-operative hours. No clamping was required at the two and eight hour postoperative period. There was no significant difference in blood loss during the removal of the drain and during blood transfusion, which was required for patients upon removal of the drain in the two groups. This is the first clinical study to develop an evidence-based protocol to manage wound drain effectively in Hong Kong. Total blood loss and blood transfusions were not significantly different between the conventional and protocol groups. A standard documentation document is beneficial to enhance communication between doctors and nurses as well as to monitor and observe drainage effectively. Copyright © 2016 Elsevier Ltd. All rights reserved.

  11. Protocols for distributive scheduling

    NASA Technical Reports Server (NTRS)

    Richards, Stephen F.; Fox, Barry

    1993-01-01

    The increasing complexity of space operations and the inclusion of interorganizational and international groups in the planning and control of space missions lead to requirements for greater communication, coordination, and cooperation among mission schedulers. These schedulers must jointly allocate scarce shared resources among the various operational and mission oriented activities while adhering to all constraints. This scheduling environment is complicated by such factors as the presence of varying perspectives and conflicting objectives among the schedulers, the need for different schedulers to work in parallel, and limited communication among schedulers. Smooth interaction among schedulers requires the use of protocols that govern such issues as resource sharing, authority to update the schedule, and communication of updates. This paper addresses the development and characteristics of such protocols and their use in a distributed scheduling environment that incorporates computer-aided scheduling tools. An example problem is drawn from the domain of space shuttle mission planning.

  12. Distributed project scheduling at NASA: Requirements for manual protocols and computer-based support

    NASA Technical Reports Server (NTRS)

    Richards, Stephen F.

    1992-01-01

    The increasing complexity of space operations and the inclusion of interorganizational and international groups in the planning and control of space missions lead to requirements for greater communication, coordination, and cooperation among mission schedulers. These schedulers must jointly allocate scarce shared resources among the various operational and mission oriented activities while adhering to all constraints. This scheduling environment is complicated by such factors as the presence of varying perspectives and conflicting objectives among the schedulers, the need for different schedulers to work in parallel, and limited communication among schedulers. Smooth interaction among schedulers requires the use of protocols that govern such issues as resource sharing, authority to update the schedule, and communication of updates. This paper addresses the development and characteristics of such protocols and their use in a distributed scheduling environment that incorporates computer-aided scheduling tools. An example problem is drawn from the domain of Space Shuttle mission planning.

  13. Is the "sterile cockpit" concept applicable to cardiovascular surgery critical intervals or critical events? The impact of protocol-driven communication during cardiopulmonary bypass.

    PubMed

    Wadhera, Rishi K; Parker, Sarah Henrickson; Burkhart, Harold M; Greason, Kevin L; Neal, James R; Levenick, Katherine M; Wiegmann, Douglas A; Sundt, Thoralf M

    2010-02-01

    There is general enthusiasm for applying strategies from aviation directly to medical care; the application of the "sterile cockpit" rule to surgery has accordingly been suggested. An implicit prerequisite to the evidence-based transfer of such a concept to the clinical domain, however, is definition of periods of high mental workload analogous to takeoff and landing. We measured cognitive demands among operating room staff, mapped critical events, and evaluated protocol-driven communication. With the National Aeronautics and Space Administration Task Load Index and semistructured focus groups, we identified common critical stages of cardiac surgical cases. Intraoperative communication was assessed before (n = 18) and after (n = 16) introduction of a structured communication protocol. Cognitive workload measures demonstrated high temporal diversity among caregivers in various roles. Eight critical events during cardiopulmonary bypass were then defined. A structured, unambiguous verbal communication protocol for these events was then implemented. Observations of 18 cases before implementation including 29.6 hours of cardiopulmonary bypass with 632 total communication exchanges (average 35.1 exchanges/case) were compared with observations of 16 cases after implementation including 23.9 hours of cardiopulmonary bypass with 748 exchanges (average 46.8 exchanges/case, P = .06). Frequency of communication breakdowns per case decreased significantly after implementation (11.5 vs 7.3 breakdowns/case, P = .008). Because of wide variations is cognitive workload among caregivers, effective communication can be structured around critical events rather than defined intervals analogous to the sterile cockpit, with reduction in communication breakdowns. 2010 The American Association for Thoracic Surgery. Published by Mosby, Inc. All rights reserved.

  14. Our Nation's Travel: 1995 NPTS Early Results Report

    DOT National Transportation Integrated Search

    2012-11-01

    Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...

  15. Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups

    NASA Astrophysics Data System (ADS)

    Desmedt, Yvo; Lange, Tanja; Burmester, Mike

    Task-specific groups are often formed in an ad-hoc manner within large corporate structures, such as companies. Take the following typical scenario: A director decides to set up a task force group for some specific project. An order is passed down the hierarchy where it finally reaches a manager who selects some employees to form the group. The members should communicate in a secure way and for efficiency, a symmetric encryption system is chosen. To establish a joint secret key for the group, a group key exchange (GKE) protocol is used. We show how to use an existing Public Key Infrastructure (PKI) to achieve authenticated GKE by modifying the protocol and particularly by including signatures.

  16. Review of the transportation planning process in the Denver metropolitan area

    DOT National Transportation Integrated Search

    2012-11-01

    Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...

  17. Review of the transportation planning process in the Pittsburgh metropolitan area

    DOT National Transportation Integrated Search

    2012-11-12

    Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...

  18. Advanced communications technology satellite high burst rate link evaluation terminal communication protocol software user's guide, version 1.0

    NASA Technical Reports Server (NTRS)

    Reinhart, Richard C.

    1993-01-01

    The Communication Protocol Software was developed at the NASA Lewis Research Center to support the Advanced Communications Technology Satellite High Burst Rate Link Evaluation Terminal (ACTS HBR-LET). The HBR-LET is an experimenters terminal to communicate with the ACTS for various experiments by government, university, and industry agencies. The Communication Protocol Software is one segment of the Control and Performance Monitor (C&PM) Software system of the HBR-LET. The Communication Protocol Software allows users to control and configure the Intermediate Frequency Switch Matrix (IFSM) on board the ACTS to yield a desired path through the spacecraft payload. Besides IFSM control, the C&PM Software System is also responsible for instrument control during HBR-LET experiments, uplink power control of the HBR-LET to demonstrate power augmentation during signal fade events, and data display. The Communication Protocol Software User's Guide, Version 1.0 (NASA CR-189162) outlines the commands and procedures to install and operate the Communication Protocol Software. Configuration files used to control the IFSM, operator commands, and error recovery procedures are discussed. The Communication Protocol Software Maintenance Manual, Version 1.0 (NASA CR-189163, to be published) is a programmer's guide to the Communication Protocol Software. This manual details the current implementation of the software from a technical perspective. Included is an overview of the Communication Protocol Software, computer algorithms, format representations, and computer hardware configuration. The Communication Protocol Software Test Plan (NASA CR-189164, to be published) provides a step-by-step procedure to verify the operation of the software. Included in the Test Plan is command transmission, telemetry reception, error detection, and error recovery procedures.

  19. A software defined RTU multi-protocol automatic adaptation data transmission method

    NASA Astrophysics Data System (ADS)

    Jin, Huiying; Xu, Xingwu; Wang, Zhanfeng; Ma, Weijun; Li, Sheng; Su, Yong; Pan, Yunpeng

    2018-02-01

    Remote terminal unit (RTU) is the core device of the monitor system in hydrology and water resources. Different devices often have different communication protocols in the application layer, which results in the difficulty in information analysis and communication networking. Therefore, we introduced the idea of software defined hardware, and abstracted the common feature of mainstream communication protocols of RTU application layer, and proposed a uniformed common protocol model. Then, various communication protocol algorithms of application layer are modularized according to the model. The executable codes of these algorithms are labeled by the virtual functions and stored in the flash chips of embedded CPU to form the protocol stack. According to the configuration commands to initialize the RTU communication systems, it is able to achieve dynamic assembling and loading of various application layer communication protocols of RTU and complete the efficient transport of sensor data from RTU to central station when the data acquisition protocol of sensors and various external communication terminals remain unchanged.

  20. Review of the transportation planning process in the Portland, Orgeon, metropolitan area

    DOT National Transportation Integrated Search

    2012-11-01

    Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...

  1. Review of the transportation planning process in the southern California metropolitan area

    DOT National Transportation Integrated Search

    2012-11-01

    Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...

  2. Review of the transportation planning process in the Minneapolis-St. Paul metropolitan area

    DOT National Transportation Integrated Search

    2012-11-01

    Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...

  3. Wireless Network Communications Overview for Space Mission Operations

    NASA Technical Reports Server (NTRS)

    Fink, Patrick W.

    2009-01-01

    The mission of the On-Board Wireless Working Group (WWG) is to serve as a general CCSDS focus group for intra-vehicle wireless technologies. The WWG investigates and makes recommendations pursuant to standardization of applicable wireless network protocols, ensuring the interoperability of independently developed wireless communication assets. This document presents technical background information concerning uses and applicability of wireless networking technologies for space missions. Agency-relevant driving scenarios, for which wireless network communications will provide a significant return-on-investment benefiting the participating international agencies, are used to focus the scope of the enclosed technical information.

  4. Communication-Gateway Software For NETEX, DECnet, And TCP/IP

    NASA Technical Reports Server (NTRS)

    Keith, B.; Ferry, D.; Fendler, E.

    1990-01-01

    Communications gateway software, GATEWAY, provides process-to-process communication between remote applications programs in different protocol domains. Communicating peer processes may be resident on any paired combination of NETEX, DECnet, or TCP/IP hosts. Provides necessary mapping from one protocol to another and facilitates practical intermachine communications in cost-effective manner by eliminating need to standardize on single protocol or to implement multiple protocols in host computers. Written in Ada.

  5. A Unified Fault-Tolerance Protocol

    NASA Technical Reports Server (NTRS)

    Miner, Paul; Gedser, Alfons; Pike, Lee; Maddalon, Jeffrey

    2004-01-01

    Davies and Wakerly show that Byzantine fault tolerance can be achieved by a cascade of broadcasts and middle value select functions. We present an extension of the Davies and Wakerly protocol, the unified protocol, and its proof of correctness. We prove that it satisfies validity and agreement properties for communication of exact values. We then introduce bounded communication error into the model. Inexact communication is inherent for clock synchronization protocols. We prove that validity and agreement properties hold for inexact communication, and that exact communication is a special case. As a running example, we illustrate the unified protocol using the SPIDER family of fault-tolerant architectures. In particular we demonstrate that the SPIDER interactive consistency, distributed diagnosis, and clock synchronization protocols are instances of the unified protocol.

  6. No information flow using statistical fluctuations and quantum cryptography

    NASA Astrophysics Data System (ADS)

    Larsson, Jan-Åke

    2004-04-01

    The communication protocol of Home and Whitaker [

    Phys. Rev. A 67, 022306 (2003)
    ] is examined in some detail, and found to work equally well using a separable state. The protocol is in fact completely classical, based on postselection of suitable experimental runs. The quantum-cryptography protocol proposed in the same publication is also examined, and this protocol uses entanglement, a strictly quantum property of the system. An individual eavesdropping attack on each qubit pair would be detected by the security test proposed in the mentioned paper. However, the key is provided by groups of qubits, and there exists a coherent attack, internal to these groups, that will go unnoticed in that security test. A modified test is proposed here that will ensure security, even against such a coherent attack.

  7. Taking the Politics Out of Satellite and Space-Based Communications Protocols

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    2006-01-01

    After many years of studies, experimentation, and deployment, large amounts of misinformation and misconceptions remain regarding applicability of various communications protocols for use in satellite and space-based networks. This paper attempts to remove much of the politics, misconceptions, and misinformation that have plagued spacebased communications protocol development and deployment. This paper provides a common vocabulary for communications; a general discussion of the requirements for various communication environments; an evaluation of tradeoffs between circuit and packet-switching technologies, and the pros and cons of various link, network, transport, application, and security protocols. Included is the applicability of protocol enhancing proxies to NASA, Department of Defense (DOD), and commercial space communication systems.

  8. Simple group password-based authenticated key agreements for the integrated EPR information system.

    PubMed

    Lee, Tian-Fu; Chang, I-Pin; Wang, Ching-Cheng

    2013-04-01

    The security and privacy are important issues for electronic patient records (EPRs). The goal of EPRs is sharing the patients' medical histories such as the diagnosis records, reports and diagnosis image files among hospitals by the Internet. So the security issue for the integrated EPR information system is essential. That is, to ensure the information during transmission through by the Internet is secure and private. The group password-based authenticated key agreement (GPAKE) allows a group of users like doctors, nurses and patients to establish a common session key by using password authentication. Then the group of users can securely communicate by using this session key. Many approaches about GAPKE employ the public key infrastructure (PKI) in order to have higher security. However, it not only increases users' overheads and requires keeping an extra equipment for storing long-term secret keys, but also requires maintaining the public key system. This investigation presents a simple group password-based authenticated key agreement (SGPAKE) protocol for the integrated EPR information system. The proposed SGPAKE protocol does not require using the server or users' public keys. Each user only remembers his weak password shared with a trusted server, and then can obtain a common session key. Then all users can securely communicate by using this session key. The proposed SGPAKE protocol not only provides users with convince, but also has higher security.

  9. Differential associations between sensory response patterns and language, social, and communication measures in children with autism or other developmental disabilities.

    PubMed

    Watson, Linda R; Patten, Elena; Baranek, Grace T; Poe, Michele; Boyd, Brian A; Freuler, Ashley; Lorenzi, Jill

    2011-12-01

    To examine patterns of sensory responsiveness (i.e., hyperresponsiveness, hyporesponsiveness, and sensory seeking) as factors that may account for variability in social-communicative symptoms of autism and variability in language, social, and communication skill development in children with autism or other developmental disabilities (DDs). Children with autistic disorder (AD; n = 72, mean age = 52.3 months) and other DDs (n = 44, mean age = 48.1 months) participated in a protocol measuring sensory response patterns; social-communicative symptoms of autism; and language, social, and communication skills. Hyporesponsiveness was positively associated with social-communicative symptom severity, with no significant group difference in the association. Hyperresponsiveness was not significantly associated with social-communicative symptom severity. A group difference emerged for sensory seeking and social-communicative symptom severity, with a positive association for the AD group only. For the 2 groups of children combined, hyporesponsiveness was negatively associated with language skills and social adaptive skills. Sensory seeking also was negatively associated with language skills. These associations did not differ between the 2 groups. Aberrant sensory processing may play an important role in the pathogenesis of autism and other DDs as well as in the rate of acquisition of language, social, and communication skills.

  10. Differential Associations between Sensory Response Patterns and Language, Social, and Communication Measures in Children with Autism or Other Developmental Disabilities

    PubMed Central

    Watson, Linda R.; Patten, Elena; Baranek, Grace T.; Poe, Michele; Boyd, Brian A.; Freuler, Ashley; Lorenzi, Jill

    2012-01-01

    Purpose Examine patterns of sensory responsiveness (i.e., hyperresponsiveness, hyporesponsiveness, and sensory seeking) as factors that may account for variability in social-communicative symptoms of autism and variability in language, social, and communication skill development in children with autism or other developmental disabilities. Method Children with autistic disorder (AD; n = 72, mean age = 52.3 months) and other developmental disabilities (DD; n = 44, mean age = 48.1 months) participated in a protocol measuring sensory response patterns, social-communicative symptoms of autism, and language, social, and communication skills. Results Hyporesponsiveness was positively associated with social-communicative symptom severity, with no significant group difference in the association. Hyperresponsiveness was not significantly associated with social-communicative symptom severity. A group difference emerged for sensory seeking and social-communicative symptom severity, with a positive association for the AD group only. For the two groups of children combined, hyporesponsiveness was negatively associated with language skills and social adaptive skills. Sensory seeking also was negatively associated with language skills. These associations did not differ between the two groups. Conclusions Aberrant sensory processing may play an important role in the pathogenesis of autism and other developmental disabilities, as well as in the rate of acquisition of language, social, and communication skills. PMID:21862675

  11. Network-Friendly Gossiping

    NASA Astrophysics Data System (ADS)

    Serbu, Sabina; Rivière, Étienne; Felber, Pascal

    The emergence of large-scale distributed applications based on many-to-many communication models, e.g., broadcast and decentralized group communication, has an important impact on the underlying layers, notably the Internet routing infrastructure. To make an effective use of network resources, protocols should both limit the stress (amount of messages) on each infrastructure entity like routers and links, and balance as much as possible the load in the network. Most protocols use application-level metrics such as delays to improve efficiency of content dissemination or routing, but the extend to which such application-centric optimizations help reduce and balance the load imposed to the infrastructure is unclear. In this paper, we elaborate on the design of such network-friendly protocols and associated metrics. More specifically, we investigate random-based gossip dissemination. We propose and evaluate different ways of making this representative protocol network-friendly while keeping its desirable properties (robustness and low delays). Simulations of the proposed methods using synthetic and real network topologies convey and compare their abilities to reduce and balance the load while keeping good performance.

  12. Multi-Party Privacy-Preserving Set Intersection with Quasi-Linear Complexity

    NASA Astrophysics Data System (ADS)

    Cheon, Jung Hee; Jarecki, Stanislaw; Seo, Jae Hong

    Secure computation of the set intersection functionality allows n parties to find the intersection between their datasets without revealing anything else about them. An efficient protocol for such a task could have multiple potential applications in commerce, health care, and security. However, all currently known secure set intersection protocols for n>2 parties have computational costs that are quadratic in the (maximum) number of entries in the dataset contributed by each party, making secure computation of the set intersection only practical for small datasets. In this paper, we describe the first multi-party protocol for securely computing the set intersection functionality with both the communication and the computation costs that are quasi-linear in the size of the datasets. For a fixed security parameter, our protocols require O(n2k) bits of communication and Õ(n2k) group multiplications per player in the malicious adversary setting, where k is the size of each dataset. Our protocol follows the basic idea of the protocol proposed by Kissner and Song, but we gain efficiency by using different representations of the polynomials associated with users' datasets and careful employment of algorithms that interpolate or evaluate polynomials on multiple points more efficiently. Moreover, the proposed protocol is robust. This means that the protocol outputs the desired result even if some corrupted players leave during the execution of the protocol.

  13. A kind of universal quantum secret sharing protocol

    NASA Astrophysics Data System (ADS)

    Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian

    2017-01-01

    Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix.

  14. A kind of universal quantum secret sharing protocol.

    PubMed

    Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian

    2017-01-12

    Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix.

  15. A kind of universal quantum secret sharing protocol

    PubMed Central

    Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian

    2017-01-01

    Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix. PMID:28079109

  16. No information flow using statistical fluctuations and quantum cryptography

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Larsson, Jan-Aake

    2004-04-01

    The communication protocol of Home and Whitaker [Phys. Rev. A 67, 022306 (2003)] is examined in some detail, and found to work equally well using a separable state. The protocol is in fact completely classical, based on postselection of suitable experimental runs. The quantum-cryptography protocol proposed in the same publication is also examined, and this protocol uses entanglement, a strictly quantum property of the system. An individual eavesdropping attack on each qubit pair would be detected by the security test proposed in the mentioned paper. However, the key is provided by groups of qubits, and there exists a coherent attack,more » internal to these groups, that will go unnoticed in that security test. A modified test is proposed here that will ensure security, even against such a coherent attack.« less

  17. Satellite Communications Using Commercial Protocols

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  18. Analysis on Multicast Routing Protocols for Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Xiang, Ma

    As the Mobile Ad Hoc Networks technologies face a series of challenges like dynamic changes of topological structure, existence of unidirectional channel, limited wireless transmission bandwidth, the capability limitations of mobile termination and etc, therefore, the research to mobile Ad Hoc network routings inevitablely undertake a more important task than those to other networks. Multicast is a mode of communication transmission oriented to group computing, which sends the data to a group of host computers by using single source address. In a typical mobile Ad Hoc Network environment, multicast has a significant meaning. On the one hand, the users of mobile Ad Hoc Network usually need to form collaborative working groups; on the other hand, this is also an important means of fully using the broadcast performances of wireless communication and effectively using the limited wireless channel resources. This paper summarizes and comparatively analyzes the routing mechanisms of various existing multicast routing protocols according to the characteristics of mobile Ad Hoc network.

  19. Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue

    NASA Astrophysics Data System (ADS)

    Shukla, Chitra; Thapliyal, Kishore; Pathak, Anirban

    2017-12-01

    Semi-quantum protocols that allow some of the users to remain classical are proposed for a large class of problems associated with secure communication and secure multiparty computation. Specifically, first-time semi-quantum protocols are proposed for key agreement, controlled deterministic secure communication and dialogue, and it is shown that the semi-quantum protocols for controlled deterministic secure communication and dialogue can be reduced to semi-quantum protocols for e-commerce and private comparison (socialist millionaire problem), respectively. Complementing with the earlier proposed semi-quantum schemes for key distribution, secret sharing and deterministic secure communication, set of schemes proposed here and subsequent discussions have established that almost every secure communication and computation tasks that can be performed using fully quantum protocols can also be performed in semi-quantum manner. Some of the proposed schemes are completely orthogonal-state-based, and thus, fundamentally different from the existing semi-quantum schemes that are conjugate coding-based. Security, efficiency and applicability of the proposed schemes have been discussed with appropriate importance.

  20. Brain-computer interface (BCI) evaluation in people with amyotrophic lateral sclerosis.

    PubMed

    McCane, Lynn M; Sellers, Eric W; McFarland, Dennis J; Mak, Joseph N; Carmack, C Steve; Zeitlin, Debra; Wolpaw, Jonathan R; Vaughan, Theresa M

    2014-06-01

    Brain-computer interfaces (BCIs) might restore communication to people severely disabled by amyotrophic lateral sclerosis (ALS) or other disorders. We sought to: 1) define a protocol for determining whether a person with ALS can use a visual P300-based BCI; 2) determine what proportion of this population can use the BCI; and 3) identify factors affecting BCI performance. Twenty-five individuals with ALS completed an evaluation protocol using a standard 6 × 6 matrix and parameters selected by stepwise linear discrimination. With an 8-channel EEG montage, the subjects fell into two groups in BCI accuracy (chance accuracy 3%). Seventeen averaged 92 (± 3)% (range 71-100%), which is adequate for communication (G70 group). Eight averaged 12 (± 6)% (range 0-36%), inadequate for communication (L40 subject group). Performance did not correlate with disability: 11/17 (65%) of G70 subjects were severely disabled (i.e. ALSFRS-R < 5). All L40 subjects had visual impairments (e.g. nystagmus, diplopia, ptosis). P300 was larger and more anterior in G70 subjects. A 16-channel montage did not significantly improve accuracy. In conclusion, most people severely disabled by ALS could use a visual P300-based BCI for communication. In those who could not, visual impairment was the principal obstacle. For these individuals, auditory P300-based BCIs might be effective.

  1. Peer-to-Peer Science Data Environment

    NASA Astrophysics Data System (ADS)

    Byrnes, J. B.; Holland, M. P.

    2004-12-01

    The goal of P2PSDE is to provide a convenient and extensible Peer-to-Peer (P2P) network architecture that allows: distributed science-data services-seamlessly incorporating collaborative value-added services with search-oriented access to remote science data. P2PSDE features the real-time discovery of data-serving peers (plus peer-groups and peer-group services), in addition to the searching for and transferring of science data. These features are implemented using "Project JXTA", the first and only standardized set of open, generalized P2P protocols that allow arbitrary network devices to communicate and collaborate as peers. The JXTA protocols standardize the manner in which peers discover each other, self-organize into peer groups, advertise and discover network services, and securely communicate with and monitor each other-even across network firewalls. The key benefits include: Potential for dramatic improvements in science-data dissemination; Real-time-discoverable, potentially redundant (reliable), science-data services; Openness/Extensibility; Decentralized use of small, inexpensive, readily-available desktop machines; and Inherently secure-with ability to create variable levels of security by group.

  2. ABS-SmartComAgri: An Agent-Based Simulator of Smart Communication Protocols in Wireless Sensor Networks for Debugging in Precision Agriculture.

    PubMed

    García-Magariño, Iván; Lacuesta, Raquel; Lloret, Jaime

    2018-03-27

    Smart communication protocols are becoming a key mechanism for improving communication performance in networks such as wireless sensor networks. However, the literature lacks mechanisms for simulating smart communication protocols in precision agriculture for decreasing production costs. In this context, the current work presents an agent-based simulator of smart communication protocols for efficiently managing pesticides. The simulator considers the needs of electric power, crop health, percentage of alive bugs and pesticide consumption. The current approach is illustrated with three different communication protocols respectively called (a) broadcast, (b) neighbor and (c) low-cost neighbor. The low-cost neighbor protocol obtained a statistically-significant reduction in the need of electric power over the neighbor protocol, with a very large difference according to the common interpretations about the Cohen's d effect size. The presented simulator is called ABS-SmartComAgri and is freely distributed as open-source from a public research data repository. It ensures the reproducibility of experiments and allows other researchers to extend the current approach.

  3. ABS-SmartComAgri: An Agent-Based Simulator of Smart Communication Protocols in Wireless Sensor Networks for Debugging in Precision Agriculture

    PubMed Central

    2018-01-01

    Smart communication protocols are becoming a key mechanism for improving communication performance in networks such as wireless sensor networks. However, the literature lacks mechanisms for simulating smart communication protocols in precision agriculture for decreasing production costs. In this context, the current work presents an agent-based simulator of smart communication protocols for efficiently managing pesticides. The simulator considers the needs of electric power, crop health, percentage of alive bugs and pesticide consumption. The current approach is illustrated with three different communication protocols respectively called (a) broadcast, (b) neighbor and (c) low-cost neighbor. The low-cost neighbor protocol obtained a statistically-significant reduction in the need of electric power over the neighbor protocol, with a very large difference according to the common interpretations about the Cohen’s d effect size. The presented simulator is called ABS-SmartComAgri and is freely distributed as open-source from a public research data repository. It ensures the reproducibility of experiments and allows other researchers to extend the current approach. PMID:29584703

  4. The Emergency Public Relations Protocol: How to Work Effectively on Controversial Projects in an Academic Health Setting

    PubMed Central

    Rosser, B. R. Simon; Kilian, Gunna; West, William G.

    2012-01-01

    Certain research topics - including studies of sexual behavior, substance use, and HIV risk -- are more likely to be scrutinized by the media and groups opposed to this area of research. When studying topics that others might deem controversial, it is critical that researchers anticipate potential negative media events prior to their occurrence. By developing an Emergency Public Relations Protocol at the genesis of a study, researchers can identify and plan for events that might result in higher scrutiny. For each identified risk, a good protocol details procedures to enact before, during and after a media event. This manuscript offers recommendations for developing a protocol based on both Situational Crisis Communication Theory and our experience as an HIV prevention research group who recently experienced such an event. The need to have procedures in place to monitor and address social media is highlighted. PMID:23565067

  5. The Emergency Public Relations Protocol: How to Work Effectively on Controversial Projects in an Academic Health Setting.

    PubMed

    Rosser, B R Simon; Kilian, Gunna; West, William G

    2013-03-01

    Certain research topics - including studies of sexual behavior, substance use, and HIV risk -- are more likely to be scrutinized by the media and groups opposed to this area of research. When studying topics that others might deem controversial, it is critical that researchers anticipate potential negative media events prior to their occurrence. By developing an Emergency Public Relations Protocol at the genesis of a study, researchers can identify and plan for events that might result in higher scrutiny. For each identified risk, a good protocol details procedures to enact before, during and after a media event. This manuscript offers recommendations for developing a protocol based on both Situational Crisis Communication Theory and our experience as an HIV prevention research group who recently experienced such an event. The need to have procedures in place to monitor and address social media is highlighted.

  6. Communications among elements of a space construction ensemble

    NASA Technical Reports Server (NTRS)

    Davis, Randal L.; Grasso, Christopher A.

    1989-01-01

    Space construction projects will require careful coordination between managers, designers, manufacturers, operators, astronauts, and robots with large volumes of information of varying resolution, timeliness, and accuracy flowing between the distributed participants over computer communications networks. Within the CSC Operations Branch, we are researching the requirements and options for such communications. Based on our work to date, we feel that communications standards being developed by the International Standards Organization, the CCITT, and other groups can be applied to space construction. We are currently studying in depth how such standards can be used to communicate with robots and automated construction equipment used in a space project. Specifically, we are looking at how the Manufacturing Automation Protocol (MAP) and the Manufacturing Message Specification (MMS), which tie together computers and machines in automated factories, might be applied to space construction projects. Together with our CSC industrial partner Computer Technology Associates, we are developing a MAP/MMS companion standard for space construction and we will produce software to allow the MAP/MMS protocol to be used in our CSC operations testbed.

  7. Three-step semiquantum secure direct communication protocol

    NASA Astrophysics Data System (ADS)

    Zou, XiangFu; Qiu, DaoWen

    2014-09-01

    Quantum secure direct communication is the direct communication of secret messages without need for establishing a shared secret key first. In the existing schemes, quantum secure direct communication is possible only when both parties are quantum. In this paper, we construct a three-step semiquantum secure direct communication (SQSDC) protocol based on single photon sources in which the sender Alice is classical. In a semiquantum protocol, a person is termed classical if he (she) can measure, prepare and send quantum states only with the fixed orthogonal quantum basis {|0>, |1>}. The security of the proposed SQSDC protocol is guaranteed by the complete robustness of semiquantum key distribution protocols and the unconditional security of classical one-time pad encryption. Therefore, the proposed SQSDC protocol is also completely robust. Complete robustness indicates that nonzero information acquired by an eavesdropper Eve on the secret message implies the nonzero probability that the legitimate participants can find errors on the bits tested by this protocol. In the proposed protocol, we suggest a method to check Eves disturbing in the doves returning phase such that Alice does not need to announce publicly any position or their coded bits value after the photons transmission is completed. Moreover, the proposed SQSDC protocol can be implemented with the existing techniques. Compared with many quantum secure direct communication protocols, the proposed SQSDC protocol has two merits: firstly the sender only needs classical capabilities; secondly to check Eves disturbing after the transmission of quantum states, no additional classical information is needed.

  8. Fuzz Testing of Industrial Network Protocols in Programmable Logic Controllers

    DTIC Science & Technology

    2017-12-01

    PLCs) are vital components in these cyber-physical systems. The industrial network protocols used to communicate between nodes in a control network...AB/RA) MicroLogix 1100 PLC through its implementation of EtherNet/IP, Common Industrial Protocol (CIP), and Programmable Controller Communication ...Commands (PCCC) communication protocols. This research also examines whether cross-generational vulnerabilities exist in the more advanced AB/RA

  9. Extending Tactical Fleet Communications Through VoIP

    DTIC Science & Technology

    2014-09-01

    corporate world , the military is leveraging VoIP communication solutions as well. Shore commands like Tactical Training Group Pacific use VoIP for...VoIP fuzzing (e.g., Asteroid , PROTOS, Sip-Proxy)  VoIP signaling manipulation (e.g., IAXAuthJack, IAXHangup, SIP-Kill)  VoIP media...as well, but instead of just matching the information to rules, it compares synchronization information between the protocols to determine if the

  10. Architectural Analysis of Complex Evolving Systems of Systems

    NASA Technical Reports Server (NTRS)

    Lindvall, Mikael; Stratton, William C.; Sibol, Deane E.; Ray, Arnab; Ackemann, Chris; Yonkwa, Lyly; Ganesan, Dharma

    2009-01-01

    The goal of this collaborative project between FC-MD, APL, and GSFC and supported by NASA IV&V Software Assurance Research Program (SARP), was to develop a tool, Dynamic SAVE, or Dyn-SAVE for short, for analyzing architectures of systems of systems. The project team was comprised of the principal investigator (PI) from FC-MD and four other FC-MD scientists (part time) and several FC-MD students (full time), as well as, two APL software architects (part time), and one NASA POC (part time). The PI and FC-MD scientists together with APL architects were responsible for requirements analysis, and for applying and evaluating the Dyn-SAVE tool and method. The PI and a group of FC-MD scientists were responsible for improving the method and conducting outreach activities, while another group of FC-MD scientists were responsible for development and improvement of the tool. Oversight and reporting was conducted by the PI and NASA POC. The project team produced many results including several prototypes of the Dyn-SAVE tool and method, several case studies documenting how the tool and method was applied to APL s software systems, and several published papers in highly respected conferences and journals. Dyn-SAVE as developed and enhanced throughout this research period, is a software tool intended for software developers and architects, software integration testers, and persons who need to analyze software systems from the point of view of how it communicates with other systems. Using the tool, the user specifies the planned communication behavior of the system modeled as a sequence diagram. The user then captures and imports the actual communication behavior of the system, which is then converted and visualized as a sequence diagram by Dyn-SAVE. After mapping the planned to the actual and specifying parameter and timing constraints, Dyn-SAVE detects and highlights deviations between the planned and the actual behavior. Requirements based on the need to analyze two inter-system communication protocols that are representative of protocols used in the Aerospace industry have been specified. The protocols are related: APL s Common Ground System (CGS) as used in the MErcury Surface, Space ENvironment, GEochemistry, and Ranging (MESSENGER) and the Radiation Belt Space Probes (RBSP) missions. The analyzed communications were implementations of the Telemetry protocol and the CCSDS File Delivery Protocol (CFDP) protocol. Based on these requirements, three prototypes of Dyn-SAVE were developed and applied to these protocols. The application of Dyn-SAVE to these protocols resulted in the detection of several issues. Dyn-SAVE was also applied to several Testbeds that have previously been used for experimentation earlier on this project, as well as, to other protocols and logs for testing its broader applicability. For example, Dyn-SAVE was used to analyze 1) the communication pattern between a web browser and a web server, 2) the system log of a computer in order to detect offnominal computer shut-down behavior, and 3) the actual test cases of NASA Goddard s Core Flight System (CFS) and automatically generated test cases in order to determine the overlap between the two sets of test cases. In all cases, Dyn-SAVE assisted in providing insightful conclusions about each of the cases identified above.

  11. Clean Quantum and Classical Communication Protocols.

    PubMed

    Buhrman, Harry; Christandl, Matthias; Perry, Christopher; Zuiddam, Jeroen

    2016-12-02

    By how much must the communication complexity of a function increase if we demand that the parties not only correctly compute the function but also return all registers (other than the one containing the answer) to their initial states at the end of the communication protocol? Protocols that achieve this are referred to as clean and the associated cost as the clean communication complexity. Here we present clean protocols for calculating the inner product of two n-bit strings, showing that (in the absence of preshared entanglement) at most n+3 qubits or n+O(sqrt[n]) bits of communication are required. The quantum protocol provides inspiration for obtaining the optimal method to implement distributed cnot gates in parallel while minimizing the amount of quantum communication. For more general functions, we show that nearly all Boolean functions require close to 2n bits of classical communication to compute and close to n qubits if the parties have access to preshared entanglement. Both of these values are maximal for their respective paradigms.

  12. Dual sensory loss: development of a dual sensory loss protocol and design of a randomized controlled trial

    PubMed Central

    2013-01-01

    Background Dual sensory loss (DSL) has a negative impact on health and wellbeing and its prevalence is expected to increase due to demographic aging. However, specialized care or rehabilitation programs for DSL are scarce. Until now, low vision rehabilitation does not sufficiently target concurrent impairments in vision and hearing. This study aims to 1) develop a DSL protocol (for occupational therapists working in low vision rehabilitation) which focuses on optimal use of the senses and teaches DSL patients and their communication partners to use effective communication strategies, and 2) describe the multicenter parallel randomized controlled trial (RCT) designed to test the effectiveness and cost-effectiveness of the DSL protocol. Methods/design To develop a DSL protocol, literature was reviewed and content was discussed with professionals in eye/ear care (interviews/focus groups) and DSL patients (interviews). A pilot study was conducted to test and confirm the DSL protocol. In addition, a two-armed international multi-center RCT will evaluate the effectiveness and cost-effectiveness of the DSL protocol compared to waiting list controls, in 124 patients in low vision rehabilitation centers in the Netherlands and Belgium. Discussion This study provides a treatment protocol for rehabilitation of DSL within low vision rehabilitation, which aims to be a valuable addition to the general low vision rehabilitation care. Trial registration Netherlands Trial Register (NTR) identifier: NTR2843 PMID:23941667

  13. Sampled-data-based consensus and containment control of multiple harmonic oscillators: A motion-planning approach

    NASA Astrophysics Data System (ADS)

    Liu, Yongfang; Zhao, Yu; Chen, Guanrong

    2016-11-01

    This paper studies the distributed consensus and containment problems for a group of harmonic oscillators with a directed communication topology. First, for consensus without a leader, a class of distributed consensus protocols is designed by using motion planning and Pontryagin's principle. The proposed protocol only requires relative information measurements at the sampling instants, without requiring information exchange over the sampled interval. By using stability theory and the properties of stochastic matrices, it is proved that the distributed consensus problem can be solved in the motion planning framework. Second, for the case with multiple leaders, a class of distributed containment protocols is developed for followers such that their positions and velocities can ultimately converge to the convex hull formed by those of the leaders. Compared with the existing consensus algorithms, a remarkable advantage of the proposed sampled-data-based protocols is that the sampling periods, communication topologies and control gains are all decoupled and can be separately designed, which relaxes many restrictions in controllers design. Finally, some numerical examples are given to illustrate the effectiveness of the analytical results.

  14. Lightweight causal and atomic group multicast

    NASA Technical Reports Server (NTRS)

    Birman, Kenneth P.; Schiper, Andre; Stephenson, Pat

    1991-01-01

    The ISIS toolkit is a distributed programming environment based on support for virtually synchronous process groups and group communication. A suite of protocols is presented to support this model. The approach revolves around a multicast primitive, called CBCAST, which implements a fault-tolerant, causally ordered message delivery. This primitive can be used directly or extended into a totally ordered multicast primitive, called ABCAST. It normally delivers messages immediately upon reception, and imposes a space overhead proportional to the size of the groups to which the sender belongs, usually a small number. It is concluded that process groups and group communication can achieve performance and scaling comparable to that of a raw message transport layer. This finding contradicts the widespread concern that this style of distributed computing may be unacceptably costly.

  15. Unified Compact ECC-AES Co-Processor with Group-Key Support for IoT Devices in Wireless Sensor Networks

    PubMed Central

    Castillo, Encarnación; López-Ramos, Juan A.; Morales, Diego P.

    2018-01-01

    Security is a critical challenge for the effective expansion of all new emerging applications in the Internet of Things paradigm. Therefore, it is necessary to define and implement different mechanisms for guaranteeing security and privacy of data interchanged within the multiple wireless sensor networks being part of the Internet of Things. However, in this context, low power and low area are required, limiting the resources available for security and thus hindering the implementation of adequate security protocols. Group keys can save resources and communications bandwidth, but should be combined with public key cryptography to be really secure. In this paper, a compact and unified co-processor for enabling Elliptic Curve Cryptography along to Advanced Encryption Standard with low area requirements and Group-Key support is presented. The designed co-processor allows securing wireless sensor networks with independence of the communications protocols used. With an area occupancy of only 2101 LUTs over Spartan 6 devices from Xilinx, it requires 15% less area while achieving near 490% better performance when compared to cryptoprocessors with similar features in the literature. PMID:29337921

  16. Unified Compact ECC-AES Co-Processor with Group-Key Support for IoT Devices in Wireless Sensor Networks.

    PubMed

    Parrilla, Luis; Castillo, Encarnación; López-Ramos, Juan A; Álvarez-Bermejo, José A; García, Antonio; Morales, Diego P

    2018-01-16

    Security is a critical challenge for the effective expansion of all new emerging applications in the Internet of Things paradigm. Therefore, it is necessary to define and implement different mechanisms for guaranteeing security and privacy of data interchanged within the multiple wireless sensor networks being part of the Internet of Things. However, in this context, low power and low area are required, limiting the resources available for security and thus hindering the implementation of adequate security protocols. Group keys can save resources and communications bandwidth, but should be combined with public key cryptography to be really secure. In this paper, a compact and unified co-processor for enabling Elliptic Curve Cryptography along to Advanced Encryption Standard with low area requirements and Group-Key support is presented. The designed co-processor allows securing wireless sensor networks with independence of the communications protocols used. With an area occupancy of only 2101 LUTs over Spartan 6 devices from Xilinx, it requires 15% less area while achieving near 490% better performance when compared to cryptoprocessors with similar features in the literature.

  17. Design of the Protocol Processor for the ROBUS-2 Communication System

    NASA Technical Reports Server (NTRS)

    Torres-Pomales, Wilfredo; Malekpour, Mahyar R.; Miner, Paul S.

    2005-01-01

    The ROBUS-2 Protocol Processor (RPP) is a custom-designed hardware component implementing the functionality of the ROBUS-2 fault-tolerant communication system. The Reliable Optical Bus (ROBUS) is the core communication system of the Scalable Processor-Independent Design for Enhanced Reliability (SPIDER), a general-purpose fault tolerant integrated modular architecture currently under development at NASA Langley Research Center. ROBUS is a time-division multiple access (TDMA) broadcast communication system with medium access control by means of time-indexed communication schedule. ROBUS-2 is a developmental version of the ROBUS providing guaranteed fault-tolerant services to the attached processing elements (PEs), in the presence of a bounded number of faults. These services include message broadcast (Byzantine Agreement), dynamic communication schedule update, time reference (clock synchronization), and distributed diagnosis (group membership). ROBUS also features fault-tolerant startup and restart capabilities. ROBUS-2 tolerates internal as well as PE faults, and incorporates a dynamic self-reconfiguration capability driven by the internal diagnostic system. ROBUS consists of RPPs connected to each other by a lower-level physical communication network. The RPP has a pipelined architecture and the design is parameterized in the behavioral and structural domains. The design of the RPP enables the bus to achieve a PE-message throughput that approaches the available bandwidth at the physical layer.

  18. Efficient decentralized consensus protocols

    NASA Technical Reports Server (NTRS)

    Lakshman, T. V.; Agrawala, A. K.

    1986-01-01

    Decentralized consensus protocols are characterized by successive rounds of message interchanges. Protocols which achieve a consensus in one round of message interchange require O(N-squared) messages, where N is the number of participants. In this paper, a communication scheme, based on finite projective planes, which requires only O(N sq rt N) messages for each round is presented. Using this communication scheme, decentralized consensus protocols which achieve a consensus within two rounds of message interchange are developed. The protocols are symmetric, and the communication scheme does not impose any hierarchical structure. The scheme is illustrated using blocking and nonblocking commit protocols, decentralized extrema finding, and computation of the sum function.

  19. Architectural Methodology Report

    NASA Technical Reports Server (NTRS)

    Dhas, Chris

    2000-01-01

    The establishment of conventions between two communicating entities in the end systems is essential for communications. Examples of the kind of decisions that need to be made in establishing a protocol convention include the nature of the data representation, the for-mat and the speed of the date representation over the communications path, and the sequence of control messages (if any) which are sent. One of the main functions of a protocol is to establish a standard path between the communicating entities. This is necessary to create a virtual communications medium with certain desirable characteristics. In essence, it is the function of the protocol to transform the characteristics of the physical communications environment into a more useful virtual communications model. The final function of a protocol is to establish standard data elements for communications over the path; that is, the protocol serves to create a virtual data element for exchange. Other systems may be constructed in which the transferred element is a program or a job. Finally, there are special purpose applications in which the element to be transferred may be a complex structure such as all or part of a graphic display. NASA's Glenn Research Center (GRC) defines and develops advanced technology for high priority national needs in communications technologies for application to aeronautics and space. GRC tasked Computer Networks and Software Inc. (CNS) to describe the methodologies used in developing a protocol architecture for an in-space Internet node. The node would support NASA:s four mission areas: Earth Science; Space Science; Human Exploration and Development of Space (HEDS); Aerospace Technology. This report presents the methodology for developing the protocol architecture. The methodology addresses the architecture for a computer communications environment. It does not address an analog voice architecture.

  20. FD/DAMA Scheme For Mobile/Satellite Communications

    NASA Technical Reports Server (NTRS)

    Yan, Tsun-Yee; Wang, Charles C.; Cheng, Unjeng; Rafferty, William; Dessouky, Khaled I.

    1992-01-01

    Integrated-Adaptive Mobile Access Protocol (I-AMAP) proposed to allocate communication channels to subscribers in first-generation MSAT-X mobile/satellite communication network. Based on concept of frequency-division/demand-assigned multiple access (FD/DAMA) where partition of available spectrum adapted to subscribers' demands for service. Requests processed, and competing requests resolved according to channel-access protocol, or free-access tree algorithm described in "Connection Protocol for Mobile/Satellite Communications" (NPO-17735). Assigned spectrum utilized efficiently.

  1. An Evaluation of Protocol Enhancing Proxies and File Transport Protocols for Satellite Communication

    NASA Technical Reports Server (NTRS)

    Finch, Patrick Eugene; Sullivan, Donald; Ivancic, William D.

    2012-01-01

    NASA is utilizing Global Hawk aircraft in high-altitude, long-duration Earth science missions. Communications with the onboard research equipment and sensors (the science payload) is via Ku-Band radio utilizing satellites in geostationary orbits. All payload communications use standard Internet Protocols and routing, and much of the data to be transferred is comprised of very large files. The science community is interested in fully utilizing these communication links to retrieve data as quickly and reliably as possible. A test bed was developed at NASA Ames to evaluate modern transport protocols as well as Protocol Enhancing Proxies (PEPs) to determine what tools best fit the needs of the science community. This paper describes the test bed used, the protocols, the PEPs that were evaluated, the particular tests performed and the results and conclusions.

  2. The Interplanetary Internet: A Communications Infrastructure for Mars Exploration

    NASA Astrophysics Data System (ADS)

    Burleigh, S.; Cerf, V.; Durst, R.; Fall, K.; Hooke, A.; Scott, K.; Weiss, H.

    2002-01-01

    A successful program of Mars Exploration will depend heavily on a robust and dependable space communications infrastructure that is well integrated with the terrestrial Internet. In the same way that the underpinnings of the Internet are the standardized "TCP/IP" suite of protocols, an "Interplanetary Internet" will need a similar set of capabilities that can support reliable communications across vast distances and highly stressed communications environments. For the past twenty years, the Consultative Committee for Space Data Systems (CCSDS) has been developing standardized long- haul space link communications techniques that are now in use by over two hundred missions within the international space community. New CCSDS developments, shortly to be infused into Mars missions, include a proximity link standard and a store-and- forward file transfer protocol. As part of its `Next Generation Internet' initiative, the U.S. Defense Advanced Projects Agency (DARPA) recently supported an architectural study of a future "InterPlaNetary Internet" (IPN). The IPN architecture assumes that in short-delay environments - such as on and around Mars - standard Internet technologies will be adapted to the locally harsh environment and deployed within surface vehicles and orbiting relays. A long-haul interplanetary backbone network that includes Deep Space Network (DSN) gateways into the terrestrial Internet will interconnect these distributed internets that are scattered across the Solar System. Just as TCP/IP unites the Earth's "network of networks" to become the Internet, a new suite of protocols known as "Bundling" will enable the IPN to become a "network of internets" to support true interplanetary dialog. An InterPlaNetary Internet Research Group has been established within the Internet community to coordinate this research and NASA has begun to support the further development of the IPN architecture and the Bundling protocols. A strategy is being developed whereby the current set of standard CCSDS data communications protocols can be incrementally evolved so that true InterPlaNetary Internet operations are feasible by the end of the decade. The strategy - which is already in progress via the deployment of Mars relay links - needs individual missions to each contribute increments of capability so that a standard communications infrastructure can rapidly accrete. This paper will describe the IPN architectural concepts, discuss the current set of standard data communications capabilities that exist to support Mars exploration and review the proposed new developments. We will also postulate that the concept is scalable and can grow to support future scenarios where human intelligence is widely distributed across the Solar System and day-to-day communications dialog among planets is routine. 1 2 3 4 5

  3. Australian Academic Use of the Internet.

    ERIC Educational Resources Information Center

    Applebee, Andrelyn C.; Clayton, Peter; Pascoe, Celina

    1997-01-01

    A study of academic staff at the University of Canberra (Australia) in 1995 determined use of electronic mail, Telnet, file transfer protocol (FTP) software, World Wide Web, library and document delivery services, discussion groups, and student communication. Examined demographic characteristics of faculty (discipline, employment status, gender,…

  4. Wireless access to a pharmaceutical database: a demonstrator for data driven Wireless Application Protocol (WAP) applications in medical information processing.

    PubMed

    Schacht Hansen, M; Dørup, J

    2001-01-01

    The Wireless Application Protocol technology implemented in newer mobile phones has built-in facilities for handling much of the information processing needed in clinical work. To test a practical approach we ported a relational database of the Danish pharmaceutical catalogue to Wireless Application Protocol using open source freeware at all steps. We used Apache 1.3 web software on a Linux server. Data containing the Danish pharmaceutical catalogue were imported from an ASCII file into a MySQL 3.22.32 database using a Practical Extraction and Report Language script for easy update of the database. Data were distributed in 35 interrelated tables. Each pharmaceutical brand name was given its own card with links to general information about the drug, active substances, contraindications etc. Access was available through 1) browsing therapeutic groups and 2) searching for a brand name. The database interface was programmed in the server-side scripting language PHP3. A free, open source Wireless Application Protocol gateway to a pharmaceutical catalogue was established to allow dial-in access independent of commercial Wireless Application Protocol service providers. The application was tested on the Nokia 7110 and Ericsson R320s cellular phones. We have demonstrated that Wireless Application Protocol-based access to a dynamic clinical database can be established using open source freeware. The project opens perspectives for a further integration of Wireless Application Protocol phone functions in clinical information processing: Global System for Mobile communication telephony for bilateral communication, asynchronous unilateral communication via e-mail and Short Message Service, built-in calculator, calendar, personal organizer, phone number catalogue and Dictaphone function via answering machine technology. An independent Wireless Application Protocol gateway may be placed within hospital firewalls, which may be an advantage with respect to security. However, if Wireless Application Protocol phones are to become effective tools for physicians, special attention must be paid to the limitations of the devices. Input tools of Wireless Application Protocol phones should be improved, for instance by increased use of speech control.

  5. Wireless access to a pharmaceutical database: A demonstrator for data driven Wireless Application Protocol applications in medical information processing

    PubMed Central

    Hansen, Michael Schacht

    2001-01-01

    Background The Wireless Application Protocol technology implemented in newer mobile phones has built-in facilities for handling much of the information processing needed in clinical work. Objectives To test a practical approach we ported a relational database of the Danish pharmaceutical catalogue to Wireless Application Protocol using open source freeware at all steps. Methods We used Apache 1.3 web software on a Linux server. Data containing the Danish pharmaceutical catalogue were imported from an ASCII file into a MySQL 3.22.32 database using a Practical Extraction and Report Language script for easy update of the database. Data were distributed in 35 interrelated tables. Each pharmaceutical brand name was given its own card with links to general information about the drug, active substances, contraindications etc. Access was available through 1) browsing therapeutic groups and 2) searching for a brand name. The database interface was programmed in the server-side scripting language PHP3. Results A free, open source Wireless Application Protocol gateway to a pharmaceutical catalogue was established to allow dial-in access independent of commercial Wireless Application Protocol service providers. The application was tested on the Nokia 7110 and Ericsson R320s cellular phones. Conclusions We have demonstrated that Wireless Application Protocol-based access to a dynamic clinical database can be established using open source freeware. The project opens perspectives for a further integration of Wireless Application Protocol phone functions in clinical information processing: Global System for Mobile communication telephony for bilateral communication, asynchronous unilateral communication via e-mail and Short Message Service, built-in calculator, calendar, personal organizer, phone number catalogue and Dictaphone function via answering machine technology. An independent Wireless Application Protocol gateway may be placed within hospital firewalls, which may be an advantage with respect to security. However, if Wireless Application Protocol phones are to become effective tools for physicians, special attention must be paid to the limitations of the devices. Input tools of Wireless Application Protocol phones should be improved, for instance by increased use of speech control. PMID:11720946

  6. Cognitive Communications Protocols for SATCOM

    DTIC Science & Technology

    2017-10-20

    both inadvertent Radio Frequency Interference (RFI) and deliberate jammers. Cognitive satellite and space communications strategies based on the... communications protocols for satellite and space communications with possible broad applications in defense, homeland-security as well as consumer...proposed WACR as the basis for future space communication systems that will offer significant benefits to national war‐fighting and peacekeeping

  7. Promoting communication with older adults: protocols for resolving interpersonal conflicts and for enhancing interactions with doctors.

    PubMed

    Weitzman, Patricia Flynn; Weitzman, Eben A

    2003-07-01

    In this paper, we review the importance of effective communication in older adulthood, and ideas for promoting it. We focus on theoretical and applied work in two communicative encounters that have particular relevance for older adult health, i.e., interpersonal conflict and visits with a healthcare provider. Little applied work has aimed to adapt training protocols for older adults in these two areas. We will present training protocols we have developed in constructive conflict resolution for older adults, and on enhancing doctor-patient communication. We present these protocols to stimulate ideas on the part of the reader on how to further develop and refine training efforts for older adults in effective communication.

  8. A New On-Line Diagnosis Protocol for the SPIDER Family of Byzantine Fault Tolerant Architectures

    NASA Technical Reports Server (NTRS)

    Geser, Alfons; Miner, Paul S.

    2004-01-01

    This paper presents the formal verification of a new protocol for online distributed diagnosis for the SPIDER family of architectures. An instance of the Scalable Processor-Independent Design for Electromagnetic Resilience (SPIDER) architecture consists of a collection of processing elements communicating over a Reliable Optical Bus (ROBUS). The ROBUS is a specialized fault-tolerant device that guarantees Interactive Consistency, Distributed Diagnosis (Group Membership), and Synchronization in the presence of a bounded number of physical faults. Formal verification of the original SPIDER diagnosis protocol provided a detailed understanding that led to the discovery of a significantly more efficient protocol. The original protocol was adapted from the formally verified protocol used in the MAFT architecture. It required O(N) message exchanges per defendant to correctly diagnose failures in a system with N nodes. The new protocol achieves the same diagnostic fidelity, but only requires O(1) exchanges per defendant. This paper presents this new diagnosis protocol and a formal proof of its correctness using PVS.

  9. A communication protocol for mobile satellite systems affected by rain attenuation

    NASA Technical Reports Server (NTRS)

    Lay, Norman; Dessouky, Khaled

    1992-01-01

    A communication protocol is described that has been developed as part of a K/Ka-band mobile terminal breadboard system to be demonstrated through NASA's Advanced Communications Technology Satellite (ACTS) in 1993. The protocol is aimed at providing the means for enhancing link availability and continuity by supporting real-time data rate selection and changes during rain events. Particular attention is given to the system architecture; types of links, connections, and packets; the protocol procedures; and design rationales.

  10. Design and Implementation of a MAC Protocol for Timely and Reliable Delivery of Command and Data in Dynamic Wireless Sensor Networks

    PubMed Central

    Oh, Hoon; Van Vinh, Phan

    2013-01-01

    This paper proposes and implements a new TDMA-based MAC protocol for providing timely and reliable delivery of data and command for monitoring and control networks. In this kind of network, sensor nodes are required to sense data from the monitoring environment periodically and then send the data to a sink. The sink determines whether the environment is safe or not by analyzing the acquired data. Sometimes, a command or control message is sent from the sink to a particular node or a group of nodes to execute the services or request further interested data. The proposed MAC protocol enables bidirectional communication, controls active and sleep modes of a sensor node to conserve energy, and addresses the problem of load unbalancing between the nodes near a sink and the other nodes. It can improve reliability of communication significantly while extending network lifetime. These claims are supported by the experimental results. PMID:24084116

  11. Design and implementation of a MAC protocol for timely and reliable delivery of command and data in dynamic wireless sensor networks.

    PubMed

    Oh, Hoon; Van Vinh, Phan

    2013-09-30

    This paper proposes and implements a new TDMA-based MAC protocol for providing timely and reliable delivery of data and command for monitoring and control networks. In this kind of network, sensor nodes are required to sense data from the monitoring environment periodically and then send the data to a sink. The sink determines whether the environment is safe or not by analyzing the acquired data. Sometimes, a command or control message is sent from the sink to a particular node or a group of nodes to execute the services or request further interested data. The proposed MAC protocol enables bidirectional communication, controls active and sleep modes of a sensor node to conserve energy, and addresses the problem of load unbalancing between the nodes near a sink and the other nodes. It can improve reliability of communication significantly while extending network lifetime. These claims are supported by the experimental results.

  12. Flexible Unicast-Based Group Communication for CoAP-Enabled Devices †

    PubMed Central

    Ishaq, Isam; Hoebeke, Jeroen; Van den Abeele, Floris; Rossey, Jen; Moerman, Ingrid; Demeester, Piet

    2014-01-01

    Smart embedded objects will become an important part of what is called the Internet of Things. Applications often require concurrent interactions with several of these objects and their resources. Existing solutions have several limitations in terms of reliability, flexibility and manageability of such groups of objects. To overcome these limitations we propose an intermediately level of intelligence to easily manipulate a group of resources across multiple smart objects, building upon the Constrained Application Protocol (CoAP). We describe the design of our solution to create and manipulate a group of CoAP resources using a single client request. Furthermore we introduce the concept of profiles for the created groups. The use of profiles allows the client to specify in more detail how the group should behave. We have implemented our solution and demonstrate that it covers the complete group life-cycle, i.e., creation, validation, flexible usage and deletion. Finally, we quantitatively analyze the performance of our solution and compare it against multicast-based CoAP group communication. The results show that our solution improves reliability and flexibility with a trade-off in increased communication overhead. PMID:24901978

  13. Design and Verification of a Distributed Communication Protocol

    NASA Technical Reports Server (NTRS)

    Munoz, Cesar A.; Goodloe, Alwyn E.

    2009-01-01

    The safety of remotely operated vehicles depends on the correctness of the distributed protocol that facilitates the communication between the vehicle and the operator. A failure in this communication can result in catastrophic loss of the vehicle. To complicate matters, the communication system may be required to satisfy several, possibly conflicting, requirements. The design of protocols is typically an informal process based on successive iterations of a prototype implementation. Yet distributed protocols are notoriously difficult to get correct using such informal techniques. We present a formal specification of the design of a distributed protocol intended for use in a remotely operated vehicle, which is built from the composition of several simpler protocols. We demonstrate proof strategies that allow us to prove properties of each component protocol individually while ensuring that the property is preserved in the composition forming the entire system. Given that designs are likely to evolve as additional requirements emerge, we show how we have automated most of the repetitive proof steps to enable verification of rapidly changing designs.

  14. Cryptanalysis and improvement of a quantum communication-based online shopping mechanism

    NASA Astrophysics Data System (ADS)

    Huang, Wei; Yang, Ying-Hui; Jia, Heng-Yue

    2015-06-01

    Recently, Chou et al. (Electron Commer Res 14:349-367, 2014) presented a novel controlled quantum secure direct communication protocol which can be used for online shopping. The authors claimed that their protocol was immune to the attacks from both external eavesdropper and internal betrayer. However, we find that this protocol is vulnerable to the attack from internal betrayer. In this paper, we analyze the security of this protocol to show that the controller in this protocol is able to eavesdrop the secret information of the sender (i.e., the customer's shopping information), which indicates that it cannot be used for secure online shopping as the authors expected. Accordingly, an improvement of this protocol, which could resist the controller's attack, is proposed. In addition, we present another protocol which is more appropriate for online shopping. Finally, a discussion about the difference in detail of the quantum secure direct communication process between regular quantum communications and online shopping is given.

  15. The Quantum Steganography Protocol via Quantum Noisy Channels

    NASA Astrophysics Data System (ADS)

    Wei, Zhan-Hong; Chen, Xiu-Bo; Niu, Xin-Xin; Yang, Yi-Xian

    2015-08-01

    As a promising branch of quantum information hiding, Quantum steganography aims to transmit secret messages covertly in public quantum channels. But due to environment noise and decoherence, quantum states easily decay and change. Therefore, it is very meaningful to make a quantum information hiding protocol apply to quantum noisy channels. In this paper, we make the further research on a quantum steganography protocol for quantum noisy channels. The paper proved that the protocol can apply to transmit secret message covertly in quantum noisy channels, and explicity showed quantum steganography protocol. In the protocol, without publishing the cover data, legal receivers can extract the secret message with a certain probability, which make the protocol have a good secrecy. Moreover, our protocol owns the independent security, and can be used in general quantum communications. The communication, which happen in our protocol, do not need entangled states, so our protocol can be used without the limitation of entanglement resource. More importantly, the protocol apply to quantum noisy channels, and can be used widely in the future quantum communication.

  16. 78 FR 45096 - Standards for Business Practices and Communication Protocols for Public Utilities

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-26

    ... processing software should be filed in native applications or print-to-PDF format and not in a scanned format... relevant part sub nom. Transmission Access Policy Study Group v. FERC, 225 F.3d 667 (D.C. Cir. 2002), aff'd...

  17. Communications protocol

    NASA Technical Reports Server (NTRS)

    Zhou, Xiaoming (Inventor); Baras, John S. (Inventor)

    2010-01-01

    The present invention relates to an improved communications protocol which increases the efficiency of transmission in return channels on a multi-channel slotted Alohas system by incorporating advanced error correction algorithms, selective retransmission protocols and the use of reserved channels to satisfy the retransmission requests.

  18. Using concurrent think-aloud and protocol analysis to explore student nurses' social learning information communication technology knowledge and skill development.

    PubMed

    Todhunter, Fern

    2015-06-01

    Observations obtained through concurrent think-aloud and protocol analysis offer new understanding about the influence of social learning on student nurses' acquisition of Information and Communication Technology (ICT) knowledge and skills. The software used provides a permanent record of the underpinning study method, events and analyses. The emerging themes reflect the dimensions of social engagement, and the characteristics of positive and negative reactions to ICT. The evidence shows that given the right conditions, stronger learners will support and guide their peers. To explore the use of concurrent think-aloud and protocol analysis as a method to examine how student nurses approach ICT. To identify the benefits and challenges of using observational technology to capture learning behaviours. To show the influence of small group arrangement and student interactions on their ICT knowledge and skills development. Previous studies examining social interaction between students show how they work together and respond to interactive problem solving. Social interaction has been shown to enhance skills in both ICT and collaborative decision making. Structured observational analysis using concurrent think-aloud and protocol analysis. Students displayed varying degrees of pastoral support and emotional need, leadership, reflection, suggestion and experimentation skills. Encouraging student nurses to work in small mixed ability groups can be conducive for social and ICT skill and knowledge development. Observational software gives a permanent record of the proceedings. Copyright © 2015 Elsevier Ltd. All rights reserved.

  19. Spacelab system analysis: The modified free access protocol: An access protocol for communication systems with periodic and Poisson traffic

    NASA Technical Reports Server (NTRS)

    Ingels, Frank; Owens, John; Daniel, Steven

    1989-01-01

    The protocol definition and terminal hardware for the modified free access protocol, a communications protocol similar to Ethernet, are developed. A MFA protocol simulator and a CSMA/CD math model are also developed. The protocol is tailored to communication systems where the total traffic may be divided into scheduled traffic and Poisson traffic. The scheduled traffic should occur on a periodic basis but may occur after a given event such as a request for data from a large number of stations. The Poisson traffic will include alarms and other random traffic. The purpose of the protocol is to guarantee that scheduled packets will be delivered without collision. This is required in many control and data collection systems. The protocol uses standard Ethernet hardware and software requiring minimum modifications to an existing system. The modification to the protocol only affects the Ethernet transmission privileges and does not effect the Ethernet receiver.

  20. Space flight operations communications phraseology and techniques

    NASA Technical Reports Server (NTRS)

    Noneman, S. R.

    1986-01-01

    Communications are a critical link in space flight operations. Specific communications phraseology and techniques have been developed to allow rapid and clear transfer of information. Communications will be clear and brief through the use of procedural words and phrases. Communications protocols standardize the required information transferred. The voicing of letters and numbers is discussed. The protocols used in air-to-ground communications are given. A glossary of communications terminology is presented in the appendix.

  1. Storage quality-of-service in cloud-based scientific environments: a standardization approach

    NASA Astrophysics Data System (ADS)

    Millar, Paul; Fuhrmann, Patrick; Hardt, Marcus; Ertl, Benjamin; Brzezniak, Maciej

    2017-10-01

    When preparing the Data Management Plan for larger scientific endeavors, PIs have to balance between the most appropriate qualities of storage space along the line of the planned data life-cycle, its price and the available funding. Storage properties can be the media type, implicitly determining access latency and durability of stored data, the number and locality of replicas, as well as available access protocols or authentication mechanisms. Negotiations between the scientific community and the responsible infrastructures generally happen upfront, where the amount of storage space, media types, like: disk, tape and SSD and the foreseeable data life-cycles are negotiated. With the introduction of cloud management platforms, both in computing and storage, resources can be brokered to achieve the best price per unit of a given quality. However, in order to allow the platform orchestrator to programmatically negotiate the most appropriate resources, a standard vocabulary for different properties of resources and a commonly agreed protocol to communicate those, has to be available. In order to agree on a basic vocabulary for storage space properties, the storage infrastructure group in INDIGO-DataCloud together with INDIGO-associated and external scientific groups, created a working group under the umbrella of the Research Data Alliance (RDA). As communication protocol, to query and negotiate storage qualities, the Cloud Data Management Interface (CDMI) has been selected. Necessary extensions to CDMI are defined in regular meetings between INDIGO and the Storage Network Industry Association (SNIA). Furthermore, INDIGO is contributing to the SNIA CDMI reference implementation as the basis for interfacing the various storage systems in INDIGO to the agreed protocol and to provide an official Open-Source skeleton for systems not being maintained by INDIGO partners.

  2. Quantum CSMA/CD Synchronous Communication Protocol with Entanglement

    NASA Astrophysics Data System (ADS)

    Zhou, Nanrun; Zeng, Binyang; Gong, Lihua

    By utilizing the characteristics of quantum entanglement, a quantum synchronous communication protocol for Carrier Sense Multiple Access with Collision Detection (CSMA/CD) is presented. The proposed protocol divides the link into the busy time and leisure one, where the data frames are sent via classical channels and the distribution of quantum entanglement is supposed to be completed at leisure time and the quantum acknowledge frames are sent via quantum entanglement channels. The time span between two successfully delivered messages can be significantly reduced in this proposed protocol. It is shown that the performance of the CSMA/CD protocol can be improved significantly since the collision can be reduced to a certain extent. The proposed protocol has great significance in quantum communication.

  3. Localized radio frequency communication using asynchronous transfer mode protocol

    DOEpatents

    Witzke, Edward L [Edgewood, NM; Robertson, Perry J [Albuquerque, NM; Pierson, Lyndon G [Albuquerque, NM

    2007-08-14

    A localized wireless communication system for communication between a plurality of circuit boards, and between electronic components on the circuit boards. Transceivers are located on each circuit board and electronic component. The transceivers communicate with one another over spread spectrum radio frequencies. An asynchronous transfer mode protocol controls communication flow with asynchronous transfer mode switches located on the circuit boards.

  4. Alternative parallel ring protocols

    NASA Technical Reports Server (NTRS)

    Mukkamala, R.; Foudriat, E. C.; Maly, Kurt J.; Kale, V.

    1990-01-01

    Communication protocols are know to influence the utilization and performance of communication network. The effect of two token ring protocols on a gigabit network with multiple ring structure is investigated. In the first protocol, a mode sends at most one message on receiving a token. In the second protocol, a mode sends all the waiting messages when a token is received. The behavior of these protocols is shown to be highly dependent on the number of rings as well as the load in the network.

  5. Secure quantum communication using classical correlated channel

    NASA Astrophysics Data System (ADS)

    Costa, D.; de Almeida, N. G.; Villas-Boas, C. J.

    2016-10-01

    We propose a secure protocol to send quantum information from one part to another without a quantum channel. In our protocol, which resembles quantum teleportation, a sender (Alice) and a receiver (Bob) share classical correlated states instead of EPR ones, with Alice performing measurements in two different bases and then communicating her results to Bob through a classical channel. Our secure quantum communication protocol requires the same amount of classical bits as the standard quantum teleportation protocol. In our scheme, as in the usual quantum teleportation protocol, once the classical channel is established in a secure way, a spy (Eve) will never be able to recover the information of the unknown quantum state, even if she is aware of Alice's measurement results. Security, advantages, and limitations of our protocol are discussed and compared with the standard quantum teleportation protocol.

  6. Secret-key-assisted private classical communication capacity over quantum channels

    NASA Astrophysics Data System (ADS)

    Hsieh, Min-Hsiu; Luo, Zhicheng; Brun, Todd

    2008-10-01

    We prove a regularized formula for the secret-key-assisted capacity region of a quantum channel for transmitting private classical information. This result parallels the work of Devetak (e-print arXiv:quant-ph/0512015) on entanglement-assisted quantum communication capacity . This formula provides a family protocol, the private father protocol, under the resource inequality framework that includes private classical communication without secret-key assistance as a child protocol.

  7. Language ability of children with and without a history of stuttering: a longitudinal cohort study.

    PubMed

    Watts, Amy; Eadie, Patricia; Block, Susan; Mensah, Fiona; Reilly, Sheena

    2015-02-01

    This study aims to determine whether the communication and language skills of children who have a history of stuttering are different from children who do not have a history of stuttering at ages 2-5 years. This study utilizes data from the Early Language in Victoria Study (ELVS), a longitudinal study with a community sample of 1910 children recruited in Melbourne, Australia, as well as a concurrent study examining the onset and progression of stuttering. Participants with a history of stuttering (n = 181) and a control group without a history of stuttering (n = 1438) were identified according to the established protocol of these two existing studies. The stuttering group scored higher than the non-stuttering group on all of the communication and language outcomes measured. The group differences were statistically significant on four of the seven measures and these findings were maintained when potentially confounding factors were controlled for. Importantly, the children with a history of stuttering, as a group, and the control group without a history of stuttering demonstrated developmentally-appropriate early communication and language skills.

  8. Protocol Processing for 100 Gbit/s and Beyond - A Soft Real-Time Approach in Hardware and Software

    NASA Astrophysics Data System (ADS)

    Büchner, Steffen; Lopacinski, Lukasz; Kraemer, Rolf; Nolte, Jörg

    2017-09-01

    100 Gbit/s wireless communication protocol processing stresses all parts of a communication system until the outermost. The efficient use of upcoming 100 Gbit/s and beyond transmission technology requires the rethinking of the way protocols are processed by the communication endpoints. This paper summarizes the achievements of the project End2End100. We will present a comprehensive soft real-time stream processing approach that allows the protocol designer to develop, analyze, and plan scalable protocols for ultra high data rates of 100 Gbit/s and beyond. Furthermore, we will present an ultra-low power, adaptable, and massively parallelized FEC (Forward Error Correction) scheme that detects and corrects bit errors at line rate with an energy consumption between 1 pJ/bit and 13 pJ/bit. The evaluation results discussed in this publication show that our comprehensive approach allows end-to-end communication with a very low protocol processing overhead.

  9. IoT real time data acquisition using MQTT protocol

    NASA Astrophysics Data System (ADS)

    Atmoko, R. A.; Riantini, R.; Hasin, M. K.

    2017-05-01

    The Internet of Things (IoT) provides ease to monitor and to gain sensor data through the Internet [1]. The need of high quality data is increasing to the extent that data monitoring and acquisition system in real time is required, such as smart city or telediagnostic in medical areas [2]. Therefore, an appropriate communication protocol is required to resolve these problems. Lately, researchers have developed a lot of communication protocols for IoT, of which each has advantages and disadvantages. This study proposes the utilization of MQTT as a communication protocol, which is one of data communication protocols for IoT. This study used temperature and humidity sensors because the physical parameters are often needed as parameters of environment condition [3]. Data acquisition was done in real-time and stored in MySQL database. This study is also completed by interface web-based and mobile for online monitoring. This result of this study is the enhancement of data quality and reliability using MQTT protocol.

  10. The role of digital imaging and communications in medicine in an evolving healthcare computing environment: the model is the message.

    PubMed

    Bidgood, W D; alSafadi, Y; Tucker, M; Prior, F; Hagan, G; Mattison, J E

    1998-02-01

    The decision to use Digital Imaging and Communications in Medicine (DICOM), Health Level 7 (HL7), a common object broker such as the Common Object Request Brokering Architecture (CORBA) or ActiveX (Microsoft Corp, Redmond, WA) or any other protocol for the transfer of DICOM data depends on the requirements of a particular implementation. The selection of protocol is independent of the information model. Our goal as message standards developers is to design a data interchange infrastructure that will faithfully convey the computer-based patient record and make it available to authorized health care providers when and where it is needed for patient care. DICOM accurately and expressively represents the clinically significant properties of images and the semantics of image-related information. The DICOM data model is small and well-defined. The model can be expressed in Standard Generalized Markup Language (SGML) or Object Management Group Interface Definition Language or other common syntax-and can be implemented using any reliable communications protocol. Therefore our opinion is that the DICOM semantic data model should serve as the basis for a logically equivalent set of specifications in HL7, CORBA, ActiveX, and SGML for the interchange of biomedical images and image-related information.

  11. A critical ethnography of communication processes involving the management of oral chemotherapeutic agents by patients with a primary diagnosis of colorectal cancer: study protocol.

    PubMed

    Mitchell, Gary; Porter, Sam; Manias, Elizabeth

    2015-04-01

    To describe the protocol used to examine the processes of communication between health professionals, patients and informal carers during the management of oral chemotherapeutic medicines to identify factors that promote or inhibit medicine concordance. Ideally communication practices about oral medicines should incorporate shared decision-making, two-way dialogue and an equality of role between practitioner and patient. While there is evidence that healthcare professionals are adopting these concordant elements in general practice there are still some patients who have a passive role during consultations. Considering oral chemotherapeutic medications, there is a paucity of research about communication practices which is surprising given the high risk of toxicity associated with chemotherapy. A critical ethnographic design will be used, incorporating non-participant observations, individual semi-structured and focus-group interviews as several collecting methods. Observations will be carried out on the interactions between healthcare professionals (physicians, nurses and pharmacists) and patients in the outpatient departments where prescriptions are explained and supplied and on follow-up consultations where treatment regimens are monitored. Interviews will be conducted with patients and their informal carers. Focus-groups will be carried out with healthcare professionals at the conclusion of the study. These several will be analysed using thematic analysis. This research is funded by the Department for Employment and Learning in Northern Ireland (Awarded February 2012). Dissemination of these findings will contribute to the understanding of issues involved when communicating with people about oral chemotherapy. It is anticipated that findings will inform education, practice and policy. © 2014 John Wiley & Sons Ltd.

  12. A comparative study on the effectiveness of one-way printed communication versus videophone interactive interviews on health promotion.

    PubMed

    Homma, Satoki; Imamura, Haruhiko; Nakamura, Toru; Fujimura, Kaori; Ito, Yoshihiro; Maeda, Yuji; Kaneko, Ikuyo

    2016-01-01

    We performed a comparative study of a health education programme that was delivered either through one-way communication with printed media, or through interactive videophone interviews. We aimed to ascertain which mode of counselling, when used in combination with telemonitoring, is more effective at lifestyle modification intended to improve health status. Participants, who were residents of Kurihara city in Miyagi prefecture, Japan, were randomized into two groups: one group received individualized monthly documented reports (n = 33; 22 females; average age: 67.2 years), and the other received interactive videophone communication (n = 35; 22 females; average age: 65.1 years) for three months. Telemonitoring was conducted on both groups, using a pedometer, weighing scale and a sphygmomanometer. Pre- and post-intervention, anthropometric measurements and blood tests were performed; the participants also completed self-administered questionnaires. The two groups showed similar degrees of health status improvement and satisfaction levels. However, the participants in the videophone group were more aware of improvements in their lifestyles than were the participants in the document group. The individualized printed communication programme was less time-consuming compared to videophone communication. Further studies are needed to formulate a balanced protocol for a counselling-cum-telemonitoring programme that provides optimal health improvement and cost performance with the available human resources. © The Author(s) 2015.

  13. The Space Communications Protocol Standards Program

    NASA Technical Reports Server (NTRS)

    Jeffries, Alan; Hooke, Adrian J.

    1994-01-01

    In the fall of 1992 NASA and the Department of Defense chartered a technical team to explore the possibility of developing a common set of space data communications standards for potential dual-use across the U.S. national space mission support infrastructure. The team focused on the data communications needs of those activities associated with on-lined control of civil and military aircraft. A two-pronged approach was adopted: a top-down survey of representative civil and military space data communications requirements was conducted; and a bottom-up analysis of available standard data communications protocols was performed. A striking intersection of civil and military space mission requirements emerged, and an equally striking consensus on the approach towards joint civil and military space protocol development was reached. The team concluded that wide segments of the U.S. civil and military space communities have common needs for: (1) an efficient file transfer protocol; (2) various flavors of underlying data transport service; (3) an optional data protection mechanism to assure end-to-end security of message exchange; and (4) an efficient internetworking protocol. These recommendations led to initiating a program to develop a suite of protocols based on these findings. This paper describes the current status of this program.

  14. The impact of the Family Communication Coordinator (FCC) Protocol on the role stress of hospital chaplains.

    PubMed

    Dodd-McCue, Diane; Tartaglia, Alexander

    2005-01-01

    The Family Communication Coordinator (FCC) Protocol was implemented to provide early family intervention and to facilitate effective communications during potential organ donation cases. Previous studies found the Protocol associated with improved donor outcome measures and with reduced role stress for ICU nurses caring for potential donors. The present study examines the impact of the Protocol on the perceived role stress of hospital chaplains serving as FCCs. All hospital chaplains serving as FCCs at an academic teaching hospital were surveyed. Their perceptions of job dimensions, role stress, job satisfaction, and commitment were measured; interviews and secondary data supplemented the surveys. The findings demonstrate that the FCC Protocol is associated with improved role stress, specifically role ambiguity and role conflict, among hospital chaplains serving as FCCs. Additionally, the findings suggest that satisfaction with the Protocol may be associated with experience with the Protocol.

  15. Protocol for a Delay-Tolerant Data-Communication Network

    NASA Technical Reports Server (NTRS)

    Torgerson, Jordan; Hooke, Adrian; Burleigh, Scott; Fall, Kevin

    2004-01-01

    As its name partly indicates, the Delay-Tolerant Networking (DTN) Bundle Protocol is a protocol for delay-tolerant transmission of data via communication networks. This protocol was conceived as a result of studies of how to adapt Internet protocols so that Internet-like services could be provided across interplanetary distances in support of deep-space exploration. The protocol, and software to implement the protocol, is being developed in collaboration among experts at NASA's Jet Propulsion Laboratory and other institutions. No current Internet protocols can accommodate long transmission delay times or intermittent link connectivity. The DTN Bundle Protocol represents a departure from the standard Internet assumption that a continuous path is available from a host computer to a client computer: It provides for routing of data through networks that may be disjointed and may be characterized by long transmission delays. In addition to networks that include deepspace communication links, examples of such networks include terrestrial ones within which branches are temporarily disconnected. The protocol is based partly on the definition of a message-based overlay above the transport layers of the networks on which it is hosted.

  16. Effects of communication training with the MAAS-Global-D instrument on the antibiotic prescribing for respiratory infections in primary care: study protocol of a randomised controlled trial.

    PubMed

    Hammersen, Friederike; Goetz, Katja; Soennichsen, Andreas; Emcke, Timo; Steinhaeuser, Jost

    2016-04-02

    Primary care physicians account for the majority of antibiotic prescribing in ambulatory care in Germany. Respiratory diseases are, regardless of effectiveness, often treated with antibiotics. Research has found this use without indication to be caused largely by communication problems (e.g. expectations on the patient's part or false assumptions about them by the physician). The present randomised controlled trial (RCT) study evaluates whether communication training for primary care physicians can reduce the antibiotic prescribing rate for respiratory tract infections. The study consists of three groups: group A will receive communication training; group B will be given the same, plus additional, access to an evidence-based point-of-care tool; and group C will function as the control group. The primary endpoint is the difference between intervention and control groups regarding the antibiotic prescribing rate before and after the intervention assessed through routine data. The communication skills are captured with the help of the communication instrument MAAS-Global-D, as well as individual videos of physician-patient consultations recorded by the primary care physicians. These skills will also be regarded with respect to the antibiotic prescribing rate. A process evaluation using qualitative as well as quantitative methods should provide information about barriers and enablers to implementing the communication training. The trial contributes to an insight into the effectiveness of the different components to reduce antibiotic prescribing, which will also be supported by an extensive evaluation. Communication training could be an effective method of reducing antibiotic prescribing in primary care. DRKS00009566 DATE REGISTRATION: 5 November 2015.

  17. Communication protocol in chassis detecting wireless transmission system based on WiFi

    USDA-ARS?s Scientific Manuscript database

    In chassis detecting wireless transmission system, the wireless network communication protocol plays a key role in the information exchange and synchronization between the host and chassis PDA. This paper presents a wireless network transmission protocol based on TCP/IP which makes the rules of info...

  18. Advanced information processing system: Authentication protocols for network communication

    NASA Technical Reports Server (NTRS)

    Harper, Richard E.; Adams, Stuart J.; Babikyan, Carol A.; Butler, Bryan P.; Clark, Anne L.; Lala, Jaynarayan H.

    1994-01-01

    In safety critical I/O and intercomputer communication networks, reliable message transmission is an important concern. Difficulties of communication and fault identification in networks arise primarily because the sender of a transmission cannot be identified with certainty, an intermediate node can corrupt a message without certainty of detection, and a babbling node cannot be identified and silenced without lengthy diagnosis and reconfiguration . Authentication protocols use digital signature techniques to verify the authenticity of messages with high probability. Such protocols appear to provide an efficient solution to many of these problems. The objective of this program is to develop, demonstrate, and evaluate intercomputer communication architectures which employ authentication. As a context for the evaluation, the authentication protocol-based communication concept was demonstrated under this program by hosting a real-time flight critical guidance, navigation and control algorithm on a distributed, heterogeneous, mixed redundancy system of workstations and embedded fault-tolerant computers.

  19. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Goldsmith, Steven Y.; Spires, Shannon V.

    There are currently two proposed standards for agent communication languages, namely, KQML (Finin, Lobrou, and Mayfield 1994) and the FIPA ACL. Neither standard has yet achieved primacy, and neither has been evaluated extensively in an open environment such as the Internet. It seems prudent therefore to design a general-purpose agent communications facility for new agent architectures that is flexible yet provides an architecture that accepts many different specializations. In this paper we exhibit the salient features of an agent communications architecture based on distributed metaobjects. This architecture captures design commitments at a metaobject level, leaving the base-level design and implementationmore » up to the agent developer. The scope of the metamodel is broad enough to accommodate many different communication protocols, interaction protocols, and knowledge sharing regimes through extensions to the metaobject framework. We conclude that with a powerful distributed object substrate that supports metaobject communications, a general framework can be developed that will effectively enable different approaches to agent communications in the same agent system. We have implemented a KQML-based communications protocol and have several special-purpose interaction protocols under development.« less

  20. A preliminary architecture for building communication software from traffic captures

    NASA Astrophysics Data System (ADS)

    Acosta, Jaime C.; Estrada, Pedro

    2017-05-01

    Security analysts are tasked with identifying and mitigating network service vulnerabilities. A common problem associated with in-depth testing of network protocols is the availability of software that communicates across disparate protocols. Many times, the software required to communicate with these services is not publicly available. Developing this software is a time-consuming undertaking that requires expertise and understanding of the protocol specification. The work described in this paper aims at developing a software package that is capable of automatically creating communication clients by using packet capture (pcap) and TShark dissectors. Currently, our focus is on simple protocols with fixed fields. The methodologies developed as part of this work will extend to other complex protocols such as the Gateway Load Balancing Protocol (GLBP), Port Aggregation Protocol (PAgP), and Open Shortest Path First (OSPF). Thus far, we have architected a modular pipeline for an automatic traffic-based software generator. We start the transformation of captured network traffic by employing TShark to convert packets into a Packet Details Markup Language (PDML) file. The PDML file contains a parsed, textual, representation of the packet data. Then, we extract field data, types, along with inter and intra-packet dependencies. This information is then utilized to construct an XML file that encompasses the protocol state machine and field vocabulary. Finally, this XML is converted into executable code. Using our methodology, and as a starting point, we have succeeded in automatically generating software that communicates with other hosts using an automatically generated Internet Control Message Protocol (ICMP) client program.

  1. Object Management Group object transaction service based on an X/Open and International Organization for Standardization open systems interconnection transaction processing kernel

    NASA Astrophysics Data System (ADS)

    Liang, J.; Sédillot, S.; Traverson, B.

    1997-09-01

    This paper addresses federation of a transactional object standard - Object Management Group (OMG) object transaction service (OTS) - with the X/Open distributed transaction processing (DTP) model and International Organization for Standardization (ISO) open systems interconnection (OSI) transaction processing (TP) communication protocol. The two-phase commit propagation rules within a distributed transaction tree are similar in the X/Open, ISO and OMG models. Building an OTS on an OSI TP protocol machine is possible because the two specifications are somewhat complementary. OTS defines a set of external interfaces without specific internal protocol machine, while OSI TP specifies an internal protocol machine without any application programming interface. Given these observations, and having already implemented an X/Open two-phase commit transaction toolkit based on an OSI TP protocol machine, we analyse the feasibility of using this implementation as a transaction service provider for OMG interfaces. Based on the favourable result of this feasibility study, we are implementing an OTS compliant system, which, by initiating the extensibility and openness strengths of OSI TP, is able to provide interoperability between X/Open DTP and OMG OTS models.

  2. Protocol for communications in potentially noisy environments

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Boyd, Gerlad M.; Farrow, Jeffrey

    2016-02-09

    A communications protocol that is designed for transmission of data in networks that are subjected to harsh conditions is described herein. A network includes a plurality of devices, where the devices comprise respective nodes. The nodes are in communication with one another by way of a central network hub. The protocol causes the nodes to transmit data over a network bus at different data rates depending upon whether the nodes are operating normally or an arbitration procedure has been invoked.

  3. Revisiting Deng et al.'s Multiparty Quantum Secret Sharing Protocol

    NASA Astrophysics Data System (ADS)

    Hwang, Tzonelih; Hwang, Cheng-Chieh; Yang, Chun-Wei; Li, Chuan-Ming

    2011-09-01

    The multiparty quantum secret sharing protocol [Deng et al. in Chin. Phys. Lett. 23: 1084-1087, 2006] is revisited in this study. It is found that the performance of Deng et al.'s protocol can be much improved by using the techniques of block-transmission and decoy single photons. As a result, the qubit efficiency is improved 2.4 times and only one classical communication, a public discussion, and two quantum communications between each agent and the secret holder are needed rather than n classical communications, n public discussions, and 3n/2 quantum communications required in the original scheme.

  4. A new communication protocol family for a distributed spacecraft control system

    NASA Technical Reports Server (NTRS)

    Baldi, Andrea; Pace, Marco

    1994-01-01

    In this paper we describe the concepts behind and architecture of a communication protocol family, which was designed to fulfill the communication requirements of ESOC's new distributed spacecraft control system SCOS 2. A distributed spacecraft control system needs a data delivery subsystem to be used for telemetry (TLM) distribution, telecommand (TLC) dispatch and inter-application communication, characterized by the following properties: reliability, so that any operational workstation is guaranteed to receive the data it needs to accomplish its role; efficiency, so that the telemetry distribution, even for missions with high telemetry rates, does not cause a degradation of the overall control system performance; scalability, so that the network is not the bottleneck both in terms of bandwidth and reconfiguration; flexibility, so that it can be efficiently used in many different situations. The new protocol family which satisfies the above requirements is built on top of widely used communication protocols (UDP and TCP), provides reliable point-to-point and broadcast communication (UDP+) and is implemented in C++. Reliability is achieved using a retransmission mechanism based on a sequence numbering scheme. Such a scheme allows to have cost-effective performances compared to the traditional protocols, because retransmission is only triggered by applications which explicitly need reliability. This flexibility enables applications with different profiles to take advantage of the available protocols, so that the best rate between sped and reliability can be achieved case by case.

  5. Analysis and Improvement of Large Payload Bidirectional Quantum Secure Direct Communication Without Information Leakage

    NASA Astrophysics Data System (ADS)

    Liu, Zhi-Hao; Chen, Han-Wu

    2018-02-01

    As we know, the information leakage problem should be avoided in a secure quantum communication protocol. Unfortunately, it is found that this problem does exist in the large payload bidirectional quantum secure direct communication (BQSDC) protocol (Ye Int. J. Quantum. Inf. 11(5), 1350051 2013) which is based on entanglement swapping between any two Greenberger-Horne-Zeilinger (GHZ) states. To be specific, one half of the information interchanged in this protocol is leaked out unconsciously without any active attack from an eavesdropper. Afterward, this BQSDC protocol is revised to the one without information leakage. It is shown that the improved BQSDC protocol is secure against the general individual attack and has some obvious features compared with the original one.

  6. A Standardized Shift Handover Protocol: Improving Nurses’ Safe Practice in Intensive Care Units

    PubMed Central

    Malekzadeh, Javad; Mazluom, Seyed Reza; Etezadi, Toktam; Tasseri, Alireza

    2013-01-01

    Introduction: For maintaining the continuity of care and improving the quality of care, effective inter-shift information communication is necessary. Any handover error can endanger patient safety. Despite the importance of shift handover, there is no standard handover protocol in our healthcare settings. Methods: In this one-group pretest-posttest quasi-experimental study conducted in spring and summer of 2011, we recruited a convenience sample of 56 ICU nurses. The Nurses’ Safe Practice Evaluation Checklist was used for data collection. The Content Validity Index and the inter-rater correlation coefficient of the checklist was 0.92 and 89, respectively. We employed the SPSS 11.5 software and the Mc Nemar and paired-samples t test for data analysis. Results: Study findings revealed that nurses’ mean score on the Safe Practice Evaluation Checklist increased significantly from 11.6 (2.7) to 17.0 (1.8) (P < 0.001). Conclusion: using a standard handover protocol for communicating patient’s needs and information improves nurses’ safe practice in the area of basic nursing care. PMID:25276725

  7. Simulating Autonomous Telecommunication Networks for Space Exploration

    NASA Technical Reports Server (NTRS)

    Segui, John S.; Jennings, Esther H.

    2008-01-01

    Currently, most interplanetary telecommunication systems require human intervention for command and control. However, considering the range from near Earth to deep space missions, combined with the increase in the number of nodes and advancements in processing capabilities, the benefits from communication autonomy will be immense. Likewise, greater mission science autonomy brings the need for unscheduled, unpredictable communication and network routing. While the terrestrial Internet protocols are highly developed their suitability for space exploration has been questioned. JPL has developed the Multi-mission Advanced Communications Hybrid Environment for Test and Evaluation (MACHETE) tool to help characterize network designs and protocols. The results will allow future mission planners to better understand the trade offs of communication protocols. This paper discusses various issues with interplanetary network and simulation results of interplanetary networking protocols.

  8. TRIGA: Telecommunications Protocol Processing Subsystem Using Reconfigurable Interoperable Gate Arrays

    NASA Technical Reports Server (NTRS)

    Pang, Jackson; Pingree, Paula J.; Torgerson, J. Leigh

    2006-01-01

    We present the Telecommunications protocol processing subsystem using Reconfigurable Interoperable Gate Arrays (TRIGA), a novel approach that unifies fault tolerance, error correction coding and interplanetary communication protocol off-loading to implement CCSDS File Delivery Protocol and Datalink layers. The new reconfigurable architecture offers more than one order of magnitude throughput increase while reducing footprint requirements in memory, command and data handling processor utilization, communication system interconnects and power consumption.

  9. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Boucher, Laurel A.

    Successful collaboration requires effective communication and collective problem solving. Regardless of the subject area --- environmental remediation, waste management, program planning and budgeting --- those involved must focus their efforts in an orderly and cooperative manner. A thinking tool is a technique used to get individuals to focus on specific components of the task at the same time and to eliminate the 'noise' that accompanies communications among individuals with different objectives and different styles of communicating. For example, one of these thinking tools is a technique which enables a working group to delineate its roles, responsibilities and communication protocols somore » that it can deliver the right information to the right people at the right time. Another enables a group to objectively and collectively evaluate and improve a policy, plan, or program. A third technique enables a group to clarify its purpose and direction while generating interest and buy-in. A fourth technique makes it possible for a group with polarized opinions to acknowledge their differences as well as what they have in common. A fifth technique enables a group to consider a subject of importance from all perspectives so as to produce a more comprehensive and sustainable solution. These thinking tools make effective communication and collective problem solving possible in radioactive waste management and remediation. They can be used by a wide spectrum of professionals including policy specialists, program administrators, program and project managers, and technical specialists. (author)« less

  10. The Unusual Suspects: Myths and Misconceptions Associated with PECS

    ERIC Educational Resources Information Center

    Bondy, Andy

    2012-01-01

    The Picture Exchange Communication System (PECS) is an alternative/augmentative communication protocol designed to help children and adults with autism and related disabilities to engage in functional communication. The protocol was developed over a number of years and was based on Skinner's analysis of verbal behavior. Publications about the…

  11. 78 FR 54612 - Closed Captioning of Internet Protocol-Delivered Video Programming: Implementation of the Twenty...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-05

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 79 [MB Docket No. 11-154; DA 13-1785] Closed Captioning of Internet Protocol-Delivered Video Programming: Implementation of the Twenty-First Century Communications and Video Accessibility Act of 2010 AGENCY: Federal Communications Commission. ACTION: Proposed...

  12. SCPS-TP: A Satellite-Enhanced TCP

    NASA Technical Reports Server (NTRS)

    Scott, Keith; Torgerson, Leigh

    2004-01-01

    This viewgraph presentation reviews the Space Communications Protocol Standard Transport Protocol (SCPS-TP) which is a satellite enhanced Transport Control Protocol (TCP). The contents include: 1) Purpose; 2) Background; 3) Stressed Communication Environments; 4) SCPS-TP Features; 5) SCPS-TP Performance; 6) Performance Enhancing Proxies (PEPs); and 7) Ongoing and Future SCPS-TP Work.

  13. High-capacity quantum secure direct communication with two-photon six-qubit hyperentangled states

    NASA Astrophysics Data System (ADS)

    Wu, FangZhou; Yang, GuoJian; Wang, HaiBo; Xiong, Jun; Alzahrani, Faris; Hobiny, Aatef; Deng, FuGuo

    2017-12-01

    This study proposes the first high-capacity quantum secure direct communication (QSDC) with two-photon six-qubit hyper-entangled Bell states in two longitudinal momentum and polarization degrees of freedom (DOFs) of photon pairs, which can be generated using two 0.5 mm-thick type-I β barium borate crystal slabs aligned one behind the other and an eight-hole screen. The secret message can be independently encoded on the photon pairs with 64 unitary operations in all three DOFs. This protocol has a higher capacity than previous QSDC protocols because each photon pair can carry 6 bits of information, not just 2 or 4 bits. Our QSDC protocol decreases the influence of decoherence from environment noise by exploiting the decoy photons to check the security of the transmission of the first photon sequence. Compared with two-way QSDC protocols, our QSDC protocol is immune to an attack by an eavesdropper using Trojan horse attack strategies because it is a one-way quantum communication. The QSDC protocol has good applications in the future quantum communication because of all these features.

  14. Quantum private query with perfect user privacy against a joint-measurement attack

    NASA Astrophysics Data System (ADS)

    Yang, Yu-Guang; Liu, Zhi-Chao; Li, Jian; Chen, Xiu-Bo; Zuo, Hui-Juan; Zhou, Yi-Hua; Shi, Wei-Min

    2016-12-01

    The joint-measurement (JM) attack is the most powerful threat to the database security for existing quantum-key-distribution (QKD)-based quantum private query (QPQ) protocols. Wei et al. (2016) [28] proposed a novel QPQ protocol against the JM attack. However, their protocol relies on two-way quantum communication thereby affecting its real implementation and communication efficiency. Moreover, it cannot ensure perfect user privacy. In this paper, we present a new one-way QPQ protocol in which the special way of classical post-processing of oblivious key ensures the security against the JM attack. Furthermore, it realizes perfect user privacy and lower complexity of communication.

  15. SPP: A data base processor data communications protocol

    NASA Technical Reports Server (NTRS)

    Fishwick, P. A.

    1983-01-01

    The design and implementation of a data communications protocol for the Intel Data Base Processor (DBP) is defined. The protocol is termed SPP (Service Port Protocol) since it enables data transfer between the host computer and the DBP service port. The protocol implementation is extensible in that it is explicitly layered and the protocol functionality is hierarchically organized. Extensive trace and performance capabilities have been supplied with the protocol software to permit optional efficient monitoring of the data transfer between the host and the Intel data base processor. Machine independence was considered to be an important attribute during the design and implementation of SPP. The protocol source is fully commented and is included in Appendix A of this report.

  16. Two-party quantum key agreement protocols under collective noise channel

    NASA Astrophysics Data System (ADS)

    Gao, Hao; Chen, Xiao-Guang; Qian, Song-Rong

    2018-06-01

    Recently, quantum communication has become a very popular research field. The quantum key agreement (QKA) plays an important role in the field of quantum communication, based on its unconditional security in terms of theory. Among all kinds of QKA protocols, QKA protocols resisting collective noise are widely being studied. In this paper, we propose improved two-party QKA protocols resisting collective noise and present a feasible plan for information reconciliation. Our protocols' qubit efficiency has achieved 26.67%, which is the best among all the two-party QKA protocols against collective noise, thus showing that our protocol can improve the transmission efficiency of quantum key agreement.

  17. Point-to-Point Multicast Communications Protocol

    NASA Technical Reports Server (NTRS)

    Byrd, Gregory T.; Nakano, Russell; Delagi, Bruce A.

    1987-01-01

    This paper describes a protocol to support point-to-point interprocessor communications with multicast. Dynamic, cut-through routing with local flow control is used to provide a high-throughput, low-latency communications path between processors. In addition multicast transmissions are available, in which copies of a packet are sent to multiple destinations using common resources as much as possible. Special packet terminators and selective buffering are introduced to avoid a deadlock during multicasts. A simulated implementation of the protocol is also described.

  18. Positive communication paradigm decreases early recurrence in clubfoot treatment.

    PubMed

    Morin, Matthew L; Hoopes, Daniel M; Szalay, Elizabeth A

    2014-03-01

    The Ponseti method has become the treatment standard for idiopathic clubfoot. Deformity recurrence is most commonly attributed to premature abandonment of the requisite abduction orthosis. A study in 2009 from our center revealed a high rate of deformity recurrence in our patient population. It was surmised that the importance of bracing to maintain correction had not been adequately communicated to some families, especially Native Americans. As a result, the principal investigator developed a different communication protocol for parents of infants. All children treated for clubfoot at the University of New Mexico Carrie Tingley Hospital, Albuquerque, NM, from 2008 to 2010 were reviewed. They were compared with a historical control group from this institution, the subjects of the 2009 study, and were analyzed for the rate of recurrence and Pirani score improvement. Our study cohort comprised 69 infants (104 clubfeet), all of whom were treated with the new communication style. The recurrence rate for the new communication paradigm was 2.88% compared with 18.2% in the control group (P<0.001). The Pirani score improvement was 4.0 in the treatment group compared with 3.5 in the control group (P=0.001). Native American recurrence was zero in the treatment group and 41% in the control group (P=0.011). A positive, rather than a negative communication style, emphasis on the brace as the most important aspect of treatment, and a more culturally sensitive family education paradigm, resulted in a lower rate of deformity recurrence when treating children with clubfeet using the Ponseti method. Level III.

  19. Advances Made in the Next Generation of Satellite Networks

    NASA Technical Reports Server (NTRS)

    Bhasin, Kul B.

    1999-01-01

    Because of the unique networking characteristics of communications satellites, global satellite networks are moving to the forefront in enhancing national and global information infrastructures. Simultaneously, broadband data services, which are emerging as the major market driver for future satellite and terrestrial networks, are being widely acknowledged as the foundation for an efficient global information infrastructure. In the past 2 years, various task forces and working groups around the globe have identified pivotal topics and key issues to address if we are to realize such networks in a timely fashion. In response, industry, government, and academia undertook efforts to address these topics and issues. A workshop was organized to provide a forum to assess the current state-of-the-art, identify key issues, and highlight the emerging trends in the next-generation architectures, data protocol development, communication interoperability, and applications. The Satellite Networks: Architectures, Applications, and Technologies Workshop was hosted by the Space Communication Program at the NASA Lewis Research Center in Cleveland, Ohio. Nearly 300 executives and technical experts from academia, industry, and government, representing the United States and eight other countries, attended the event (June 2 to 4, 1998). The program included seven panels and invited sessions and nine breakout sessions in which 42 speakers presented on technical topics. The proceedings covers a wide range of topics: access technology and protocols, architectures and network simulations, asynchronous transfer mode (ATM) over satellite networks, Internet over satellite networks, interoperability experiments and applications, multicasting, NASA interoperability experiment programs, NASA mission applications, and Transmission Control Protocol/Internet Protocol (TCP/IP) over satellite: issues, relevance, and experience.

  20. Internet Voice Distribution System (IVoDS) Utilization in Remote Payload Operations

    NASA Technical Reports Server (NTRS)

    Best, Susan; Bradford, Bob; Chamberlain, Jim; Nichols, Kelvin; Bailey, Darrell (Technical Monitor)

    2002-01-01

    Due to limited crew availability to support science and the large number of experiments to be operated simultaneously, telescience is key to a successful International Space Station (ISS) science program. Crew, operations personnel at NASA centers, and researchers at universities and companies around the world must work closely together to perform scientific experiments on-board ISS. NASA has initiated use of Voice over Internet Protocol (VoIP) to supplement the existing HVoDS mission voice communications system used by researchers. The Internet Voice Distribution System (IVoDS) connects researchers to mission support "loops" or conferences via Internet Protocol networks such as the high-speed Internet 2. Researchers use IVoDS software on personal computers to talk with operations personnel at NASA centers. IVoDS also has the capability, if authorized, to allow researchers to communicate with the ISS crew during experiment operations. NODS was developed by Marshall Space Flight Center with contractors A2 Technology, Inc. FVC, Lockheed- Martin, and VoIP Group. IVoDS is currently undergoing field-testing with full deployment for up to 50 simultaneous users expected in 2002. Research is currently being performed to take full advantage of the digital world - the Personal Computer and Internet Protocol networks - to qualitatively enhance communications among ISS operations personnel. In addition to the current voice capability, video and data-sharing capabilities are being investigated. Major obstacles being addressed include network bandwidth capacity and strict security requirements. Techniques being investigated to reduce and overcome these obstacles include emerging audio-video protocols and network technology including multicast and quality-of-service.

  1. An operational open-end file transfer protocol for mobile satellite communications

    NASA Technical Reports Server (NTRS)

    Wang, Charles; Cheng, Unjeng; Yan, Tsun-Yee

    1988-01-01

    This paper describes an operational open-end file transfer protocol which includes the connecting procedure, data transfer, and relinquishment procedure for mobile satellite communications. The protocol makes use of the frame level and packet level formats of the X.25 standard for the data link layer and network layer, respectively. The structure of a testbed for experimental simulation of this protocol over a mobile fading channel is also introduced.

  2. Recreational music-making: a cost-effective group interdisciplinary strategy for reducing burnout and improving mood states in long-term care workers.

    PubMed

    Bittman, Barry; Bruhn, Karl T; Stevens, Christine; Westengard, James; Umbach, Paul O

    2003-01-01

    This controlled, prospective, randomized study examined the clinical and potential economic impact of a 6-session Recreational Music-making (RMM) protocol on burnout and mood dimensions, as well as on Total Mood Disturbance (TMD) in an interdisciplinary group of long-term care workers. A total of 112 employees participated in a 6-session RMM protocol focusing on building support, communication, and interdisciplinary respect utilizing group drumming and keyboard accompaniment. Changes in burnout and mood dimensions were assessed with the Maslach Burnout Inventory and the Profile of Mood States respectively. Cost savings were projected by an independent consulting firm, which developed an economic impact model. Statistically-significant reductions of multiple burnout and mood dimensions, as well as TMD scores, were noted. Economic-impact analysis projected cost savings of $89,100 for a single typical 100-bed facility, with total annual potential savings to the long-term care industry of $1.46 billion. A cost-effective, 6-session RMM protocol reduces burnout and mood dimensions, as well as TMD, in long-term care workers.

  3. The Carnegie Mellon University Insert Project

    DTIC Science & Technology

    1997-02-01

    Real - Time Systems (INSERT) project under the DARPA Evolutionary Design for Complex Software (EDCS) Program. The INSERT team has completed an initial API definition and ported the existing real-time publication subscription group communication software to LynxOS 2.4, a POSIX.1b compliant OS. The distributed real-time publisher/subscriber communication model is now supported by a processor membership protocol which allows a node in the system to fail, or to rejoin the system later. When a node fails, all the publishers and subscribers on that node have to be

  4. Services, architectures, and protocols for space data systems

    NASA Technical Reports Server (NTRS)

    Helgert, Hermann J.

    1991-01-01

    The author presents a comprehensive discussion of three major aspects of the work of the Consultative Committee for Space Data Systems (CCSDS), a worldwide cooperative effort of national space agencies. The author examines the CCSDS space data communications network concept on which the data communications facilities of future advanced orbiting systems will be based. He derives the specifications of an open communications architecture as a reference model for the development of services and protocols that support the transfer of information over space data communications networks. Detailed specifications of the communication services and information transfer protocols that have reached a high degree of maturity and stability are offered. The author also includes a complete list of currently available CCSDS standards and supporting documentation.

  5. Probabilistic direct counterfactual quantum communication

    NASA Astrophysics Data System (ADS)

    Zhang, Sheng

    2017-02-01

    It is striking that the quantum Zeno effect can be used to launch a direct counterfactual communication between two spatially separated parties, Alice and Bob. So far, existing protocols of this type only provide a deterministic counterfactual communication service. However, this counterfactuality should be payed at a price. Firstly, the transmission time is much longer than a classical transmission costs. Secondly, the chained-cycle structure makes them more sensitive to channel noises. Here, we extend the idea of counterfactual communication, and present a probabilistic-counterfactual quantum communication protocol, which is proved to have advantages over the deterministic ones. Moreover, the presented protocol could evolve to a deterministic one solely by adjusting the parameters of the beam splitters. Project supported by the National Natural Science Foundation of China (Grant No. 61300203).

  6. A group communication approach for mobile computing mobile channel: An ISIS tool for mobile services

    NASA Astrophysics Data System (ADS)

    Cho, Kenjiro; Birman, Kenneth P.

    1994-05-01

    This paper examines group communication as an infrastructure to support mobility of users, and presents a simple scheme to support user mobility by means of switching a control point between replicated servers. We describe the design and implementation of a set of tools, called Mobile Channel, for use with the ISIS system. Mobile Channel is based on a combination of the two replication schemes: the primary-backup approach and the state machine approach. Mobile Channel implements a reliable one-to-many FIFO channel, in which a mobile client sees a single reliable server; servers, acting as a state machine, see multicast messages from clients. Migrations of mobile clients are handled as an intentional primary switch, and hand-offs or server failures are completely masked to mobile clients. To achieve high performance, servers are replicated at a sliding-window level. Our scheme provides a simple abstraction of migration, eliminates complicated hand-off protocols, provides fault-tolerance and is implemented within the existing group communication mechanism.

  7. Secure satellite communication using multi-photon tolerant quantum communication protocol

    NASA Astrophysics Data System (ADS)

    Darunkar, Bhagyashri; Punekar, Nikhil; Verma, Pramode K.

    2015-09-01

    This paper proposes and analyzes the potential of a multi-photon tolerant quantum communication protocol to secure satellite communication. For securing satellite communication, quantum cryptography is the only known unconditionally secure method. A number of recent experiments have shown feasibility of satellite-aided global quantum key distribution (QKD) using different methods such as: Use of entangled photon pairs, decoy state methods, and entanglement swapping. The use of single photon in these methods restricts the distance and speed over which quantum cryptography can be applied. Contemporary quantum cryptography protocols like the BB84 and its variants suffer from the limitation of reaching the distances of only Low Earth Orbit (LEO) at the data rates of few kilobits per second. This makes it impossible to develop a general satellite-based secure global communication network using the existing protocols. The method proposed in this paper allows secure communication at the heights of the Medium Earth Orbit (MEO) and Geosynchronous Earth Orbit (GEO) satellites. The benefits of the proposed method are two-fold: First it enables the realization of a secure global communication network based on satellites and second it provides unconditional security for satellite networks at GEO heights. The multi-photon approach discussed in this paper ameliorates the distance and speed issues associated with quantum cryptography through the use of contemporary laser communication (lasercom) devices. This approach can be seen as a step ahead towards global quantum communication.

  8. Aerospace physiology.

    DOT National Transportation Integrated Search

    2004-01-01

    This document defines the protocol standards for the Internet Protocol Suite (IPS), which is commonly referred to as Transmission Control Protocol/Internet Protocol (TCP/IP) protocols used for data communications within the National Airspace System (...

  9. Protocols for Handling Messages Between Simulation Computers

    NASA Technical Reports Server (NTRS)

    Balcerowski, John P.; Dunnam, Milton

    2006-01-01

    Practical Simulator Network (PSimNet) is a set of data-communication protocols designed especially for use in handling messages between computers that are engaging cooperatively in real-time or nearly-real-time training simulations. In a typical application, computers that provide individualized training at widely dispersed locations would communicate, by use of PSimNet, with a central host computer that would provide a common computational- simulation environment and common data. Originally intended for use in supporting interfaces between training computers and computers that simulate the responses of spacecraft scientific payloads, PSimNet could be especially well suited for a variety of other applications -- for example, group automobile-driver training in a classroom. Another potential application might lie in networking of automobile-diagnostic computers at repair facilities to a central computer that would compile the expertise of numerous technicians and engineers and act as an expert consulting technician.

  10. A Brief Survey of Media Access Control, Data Link Layer, and Protocol Technologies for Lunar Surface Communications

    NASA Technical Reports Server (NTRS)

    Wallett, Thomas M.

    2009-01-01

    This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.

  11. Quantum Dialogue with Authentication Based on Bell States

    NASA Astrophysics Data System (ADS)

    Shen, Dongsu; Ma, Wenping; Yin, Xunru; Li, Xiaoping

    2013-06-01

    We propose an authenticated quantum dialogue protocol, which is based on a shared private quantum entangled channel. In this protocol, the EPR pairs are randomly prepared in one of the four Bell states for communication. By performing four Pauli operations on the shared EPR pairs to encode their shared authentication key and secret message, two legitimate users can implement mutual identity authentication and quantum dialogue without the help from the third party authenticator. Furthermore, due to the EPR pairs which are used for secure communication are utilized to implement authentication and the whole authentication process is included in the direct secure communication process, it does not require additional particles to realize authentication in this protocol. The updated authentication key provides the counterparts with a new authentication key for the next authentication and direct communication. Compared with other secure communication with authentication protocols, this one is more secure and efficient owing to the combination of authentication and direct communication. Security analysis shows that it is secure against the eavesdropping attack, the impersonation attack and the man-in-the-middle (MITM) attack.

  12. “Counterfactual” quantum protocols

    NASA Astrophysics Data System (ADS)

    Vaidman, L.

    2016-05-01

    The counterfactuality of recently proposed protocols is analyzed. A definition of “counterfactuality” is offered and it is argued that an interaction-free measurement (IFM) of the presence of an opaque object can be named “counterfactual”, while proposed “counterfactual” measurements of the absence of such objects are not counterfactual. The quantum key distribution protocols which rely only on measurements of the presence of the object are counterfactual, but quantum direct communication protocols are not. Therefore, the name “counterfactual” is not appropriate for recent “counterfactual” protocols which transfer quantum states by quantum direct communication.

  13. Method of Performance-Aware Security of Unicast Communication in Hybrid Satellite Networks

    NASA Technical Reports Server (NTRS)

    Baras, John S. (Inventor); Roy-Chowdhury, Ayan (Inventor)

    2014-01-01

    A method and apparatus utilizes Layered IPSEC (LES) protocol as an alternative to IPSEC for network-layer security including a modification to the Internet Key Exchange protocol. For application-level security of web browsing with acceptable end-to-end delay, the Dual-mode SSL protocol (DSSL) is used instead of SSL. The LES and DSSL protocols achieve desired end-to-end communication security while allowing the TCP and HTTP proxy servers to function correctly.

  14. An Evaluation of Protocols for UAV Science Applications

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Stewart, David E.; Sullivan, Donald V.; Finch, Patrick E.

    2012-01-01

    This paper identifies data transport needs for current and future science payloads deployed on the NASA Global Hawk Unmanned Aeronautical Vehicle (UAV). The NASA Global Hawk communication system and operational constrains are presented. The Genesis and Rapid Intensification Processes (GRIP) mission is used to provide the baseline communication requirements as a variety of payloads were utilized in this mission. User needs and desires are addressed. Protocols are matched to the payload needs and an evaluation of various techniques and tradeoffs are presented. Such techniques include utilization rate-base selective negative acknowledgement protocols and possible use of protocol enhancing proxies. Tradeoffs of communication architectures that address ease-of-use and security considerations are also presented.

  15. Renormalization group theory for percolation in time-varying networks.

    PubMed

    Karschau, Jens; Zimmerling, Marco; Friedrich, Benjamin M

    2018-05-22

    Motivated by multi-hop communication in unreliable wireless networks, we present a percolation theory for time-varying networks. We develop a renormalization group theory for a prototypical network on a regular grid, where individual links switch stochastically between active and inactive states. The question whether a given source node can communicate with a destination node along paths of active links is equivalent to a percolation problem. Our theory maps the temporal existence of multi-hop paths on an effective two-state Markov process. We show analytically how this Markov process converges towards a memoryless Bernoulli process as the hop distance between source and destination node increases. Our work extends classical percolation theory to the dynamic case and elucidates temporal correlations of message losses. Quantification of temporal correlations has implications for the design of wireless communication and control protocols, e.g. in cyber-physical systems such as self-organized swarms of drones or smart traffic networks.

  16. Network Upgrade for the SLC: Control System Modifications

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Crane, M.; Mackenzie, R.; Sass, R.

    2011-09-09

    Current communications between the SLAC Linear Collider control system central host and the SLCmicros is built upon the SLAC developed SLCNET communication hardware and protocols. We will describe how the Internet Suite of protocols (TCP/IP) are used to replace the SLCNET protocol interface. The major communication pathways and their individual requirements are described. A proxy server is used to reduce the number of total system TCP/IP connections. The SLCmicros were upgraded to use Ethernet and TCP/IP as well as SLCNET. Design choices and implementation experiences are addressed.

  17. Participatory design of a collaborative clinical trial protocol writing system.

    PubMed

    Weng, Chunhua; McDonald, David W; Sparks, Dana; McCoy, Jason; Gennari, John H

    2007-06-01

    To explore concrete approaches to socio-technical design of collaborative healthcare information systems and to design a groupware technology for collaborative clinical trial protocol writing. We conducted "quick and dirty ethnography" through semi-structured interviews, observational studies, and work artifacts analysis to understand the group work for protocol development. We used participatory design through evolutionary prototyping to explore the feature space of a collaborative writing system. Our design strategies include role-based user advocacy, formative evaluation, and change management. Quick and dirty ethnography helped us efficiently understand relevant work practice, and participatory design helped us engage users into design and bring out their tacit work knowledge. Our approach that intertwined both techniques helped achieve a "work-informed and user-oriented" design. This research leads to a collaborative writing system that supports in situ communication, group awareness, and effective work progress tracking. The usability evaluation results have been satisfactory. The system design is being transferred to an organizational tool for daily use.

  18. A Simple XML Producer-Consumer Protocol

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy

    2000-01-01

    This document describes a simple XML-based protocol that can be used for producers of events to communicate with consumers of events. The protocol described here is not meant to be the most efficient protocol, the most logical protocol, or the best protocol in any way. This protocol was defined quickly and it's intent is to give us a reasonable protocol that we can implement relatively easily and then use to gain experience in distributed event services. This experience will help us evaluate proposals for event representations, XML-based encoding of information, and communication protocols. The next section of this document describes how we represent events in this protocol and then defines the two events that we choose to use for our initial experiments. These definitions are made by example so that they are informal and easy to understand. The following section then proceeds to define the producer-consumer protocol we have agreed upon for our initial experiments.

  19. Research on TCP/IP network communication based on Node.js

    NASA Astrophysics Data System (ADS)

    Huang, Jing; Cai, Lixiong

    2018-04-01

    In the face of big data, long connection and high synchronization, TCP/IP network communication will cause performance bottlenecks due to its blocking multi-threading service model. This paper presents a method of TCP/IP network communication protocol based on Node.js. On the basis of analyzing the characteristics of Node.js architecture and asynchronous non-blocking I/O model, the principle of its efficiency is discussed, and then compare and analyze the network communication model of TCP/IP protocol to expound the reasons why TCP/IP protocol stack is widely used in network communication. Finally, according to the large data and high concurrency in the large-scale grape growing environment monitoring process, a TCP server design based on Node.js is completed. The results show that the example runs stably and efficiently.

  20. GLOBECOM '86 - Global Telecommunications Conference, Houston, TX, Dec. 1-4, 1986, Conference Record. Volumes 1, 2, & 3

    NASA Astrophysics Data System (ADS)

    Papers are presented on local area networks; formal methods for communication protocols; computer simulation of communication systems; spread spectrum and coded communications; tropical radio propagation; VLSI for communications; strategies for increasing software productivity; multiple access communications; advanced communication satellite technologies; and spread spectrum systems. Topics discussed include Space Station communication and tracking development and design; transmission networks; modulation; data communications; computer network protocols and performance; and coding and synchronization. Consideration is given to free space optical communications systems; VSAT communication networks; network topology design; advances in adaptive filtering echo cancellation and adaptive equalization; advanced signal processing for satellite communications; the elements, design, and analysis of fiber-optic networks; and advances in digital microwave systems.

  1. National Airspace System (NAS) open system architecture and protocols

    DOT National Transportation Integrated Search

    2003-08-14

    This standard establishes the open systems data communications architecture and authorized protocol standards for the National Airspace System (NAS). The NAS will consist of various types of processors and communications networks procured from a vari...

  2. The Intersystem - Internetworking for space systems

    NASA Astrophysics Data System (ADS)

    Landauer, C.

    This paper is a description of the Intersystem, which is a mechanism for internetworking among existing and planned military satellite communication systems. The communication systems interconnected with this mechanism are called member systems, and the interconnected set of communication systems is called the Intersystem. The Intersystem is implemented with higher layer protocols that impose a common organization on the different signaling conventions, so that end users of different systems can communicate with each other. The Intersystem provides its coordination of member system access and resource requests with Intersystem Resource Controllers (IRCs), which are processors that implement the Intersystem protocols and have interfaces to the member systems' own access and resource control mechanisms. The IRCs are connected to each other to form the IRC Subnetwork. Terminals request services from the IRC Subnetwork using the Intersystem Access Control Protocols, and the IRC Subnetwork responses to the requests are coordinated using the RCRC (Resource Controller to Resource Controller) Protocols.

  3. Design of MPPT Controller Monitoring Software Based on QT Framework

    NASA Astrophysics Data System (ADS)

    Meng, X. Z.; Lu, P. G.

    2017-10-01

    The MPPT controller was a hardware device for tracking the maximum power point of solar photovoltaic array. Multiple controllers could be working as networking mode by specific communicating protocol. In this article, based on C++ GUI programming with Qt frame, we designed one sort of desktop application for monitoring and analyzing operational parameter of MPPT controller. The type of communicating protocol for building network was Modbus protocol which using Remote Terminal Unit mode and The desktop application of host computer was connected with all the controllers in the network through RS485 communication or ZigBee wireless communication. Using this application, user could monitor the parameter of controller wherever they were by internet.

  4. Implementation of a Publish-Subscribe Protocol in Microgrid Islanding and Resynchronization with Self-Discovery

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Starke, M.; Herron, A.; King, D.

    Communications systems and protocols are becoming second nature to utilities operating distribution systems. Traditionally, centralized communication approaches are often used, while recently in microgrid applications, distributed communication and control schema emerge offering several advantages such as improved system reliability, plug-and-play operation and distributed intelligence. Still, operation and control of microgrids including distributed communication schema have been less of a discussion in the literature. To address the challenge of multiple-inverter microgrid synchronization, a publish-subscribe protocol based, Data Distribution Service (DDS), communication schema for microgrids is proposed in this paper. The communication schema is discussed in details for individual devices such asmore » generators, photovoltaic systems, energy storage systems, microgrid point of common coupling switch, and supporting applications. In conclusion, islanding and resynchronization of a microgrid are demonstrated on a test-bed utilizing this schema.« less

  5. Secret-key expansion from covert communication

    NASA Astrophysics Data System (ADS)

    Arrazola, Juan Miguel; Amiri, Ryan

    2018-02-01

    Covert communication allows the transmission of messages in such a way that it is not possible for adversaries to detect that the communication is occurring. This provides protection in situations where knowledge that two parties are talking to each other may be incriminating to them. In this work, we study how covert communication can be used for a different purpose: secret key expansion. First, we show that any message transmitted in a secure covert protocol is also secret and therefore unknown to an adversary. We then propose a covert communication protocol where the amount of key consumed in the protocol is smaller than the transmitted key, thus leading to secure secret key expansion. We derive precise conditions for secret key expansion to occur, showing that it is possible when there are sufficiently low levels of noise for a given security level. We conclude by examining how secret key expansion from covert communication can be performed in a computational security model.

  6. Implementation of a Publish-Subscribe Protocol in Microgrid Islanding and Resynchronization with Self-Discovery

    DOE PAGES

    Starke, M.; Herron, A.; King, D.; ...

    2017-08-24

    Communications systems and protocols are becoming second nature to utilities operating distribution systems. Traditionally, centralized communication approaches are often used, while recently in microgrid applications, distributed communication and control schema emerge offering several advantages such as improved system reliability, plug-and-play operation and distributed intelligence. Still, operation and control of microgrids including distributed communication schema have been less of a discussion in the literature. To address the challenge of multiple-inverter microgrid synchronization, a publish-subscribe protocol based, Data Distribution Service (DDS), communication schema for microgrids is proposed in this paper. The communication schema is discussed in details for individual devices such asmore » generators, photovoltaic systems, energy storage systems, microgrid point of common coupling switch, and supporting applications. In conclusion, islanding and resynchronization of a microgrid are demonstrated on a test-bed utilizing this schema.« less

  7. A Scenario-Based Protocol Checker for Public-Key Authentication Scheme

    NASA Astrophysics Data System (ADS)

    Saito, Takamichi

    Security protocol provides communication security for the internet. One of the important features of it is authentication with key exchange. Its correctness is a requirement of the whole of the communication security. In this paper, we introduce three attack models realized as their attack scenarios, and provide an authentication-protocol checker for applying three attack-scenarios based on the models. We also utilize it to check two popular security protocols: Secure SHell (SSH) and Secure Socket Layer/Transport Layer Security (SSL/TLS).

  8. Simulation Modeling and Performance Evaluation of Space Networks

    NASA Technical Reports Server (NTRS)

    Jennings, Esther H.; Segui, John

    2006-01-01

    In space exploration missions, the coordinated use of spacecraft as communication relays increases the efficiency of the endeavors. To conduct trade-off studies of the performance and resource usage of different communication protocols and network designs, JPL designed a comprehensive extendable tool, the Multi-mission Advanced Communications Hybrid Environment for Test and Evaluation (MACHETE). The design and development of MACHETE began in 2000 and is constantly evolving. Currently, MACHETE contains Consultative Committee for Space Data Systems (CCSDS) protocol standards such as Proximity-1, Advanced Orbiting Systems (AOS), Packet Telemetry/Telecommand, Space Communications Protocol Specification (SCPS), and the CCSDS File Delivery Protocol (CFDP). MACHETE uses the Aerospace Corporation s Satellite Orbital Analysis Program (SOAP) to generate the orbital geometry information and contact opportunities. Matlab scripts provide the link characteristics. At the core of MACHETE is a discrete event simulator, QualNet. Delay Tolerant Networking (DTN) is an end-to-end architecture providing communication in and/or through highly stressed networking environments. Stressed networking environments include those with intermittent connectivity, large and/or variable delays, and high bit error rates. To provide its services, the DTN protocols reside at the application layer of the constituent internets, forming a store-and-forward overlay network. The key capabilities of the bundling protocols include custody-based reliability, ability to cope with intermittent connectivity, ability to take advantage of scheduled and opportunistic connectivity, and late binding of names to addresses. In this presentation, we report on the addition of MACHETE models needed to support DTN, namely: the Bundle Protocol (BP) model. To illustrate the use of MACHETE with the additional DTN model, we provide an example simulation to benchmark its performance. We demonstrate the use of the DTN protocol and discuss statistics gathered concerning the total time needed to simulate numerous bundle transmissions

  9. GATEWAY - COMMUNICATIONS GATEWAY SOFTWARE FOR NETEX, DECNET, AND TCP/IP

    NASA Technical Reports Server (NTRS)

    Keith, B.

    1994-01-01

    The Communications Gateway Software, GATEWAY, provides process-to-process communication between remote applications programs in different protocol domains. Communicating peer processes may be resident on any paired combination of NETEX, DECnet, or TCP/IP hosts. The gateway provides the necessary mapping from one protocol to another and will facilitate practical intermachine communications in a cost effective manner by eliminating the need to standardize on a single protocol or the need to implement multiple protocols in the host computers. The purpose of the gateway is to support data transfers between application programs on different host computers using different protocols. The gateway computer must be physically connected to both host computers and must contain the system software needed to use the communication protocols of both host computers. The communication process between application partners can be divided into three phases: session establishment, data transfer, and session termination. The communication protocols supported by GATEWAY (DECnet, NETEX, and TCP/IP) have addressing mechanisms that allow an application to identify itself and distinguish among other applications on the network. The exact form of the address varies depending on whether an application is passively offering (awaiting the receipt of a network connection from another network application) or actively connecting to another network. When the gateway is started, GATEWAY reads a file of address pairs. One of the address pairs is used by GATEWAY for passively offering on one network while the other address in the pair is used for actively connecting on the other network establishing the session. Now the two application partners can send and receive data in a manner appropriate to their home networks. GATEWAY accommodates full duplex transmissions. Thus, if the application partners are sophisticated enough, they can send and receive simultaneously. GATEWAY also keeps track of the number of bytes contained in each ransferred data packet. If GATEWAY detects an error during the data transfer, the sessions on both networks are terminated and the passive offer on the appropriate network is reissued. After performing the desired data transfer, one of the remote applications will send a network disconnect to the gateway to close its communication link. Upon detecting this network disconnect, GATEWAY replies with its own disconnect to ensure that the network connection has been fully terminated. Then, GATEWAY terminates its session with the other application by closing the communication link. GATEWAY has been implemented on a DEC VAX under VMS 4.7. It is written in ADA and has a central memory requirement of approximately 406K bytes. The communications protocols supported by GATEWAY are Network Systems Corporation's Network Executive (NETEX), Excelan's TCP/IP, and DECnet. GATEWAY was developed in 1988.

  10. TinyONet: A Cache-Based Sensor Network Bridge Enabling Sensing Data Reusability and Customized Wireless Sensor Network Services

    PubMed Central

    Jung, Eui-Hyun; Park, Yong-Jin

    2008-01-01

    In recent years, a few protocol bridge research projects have been announced to enable a seamless integration of Wireless Sensor Networks (WSNs) with the TCP/IP network. These studies have ensured the transparent end-to-end communication between two network sides in the node-centric manner. Researchers expect this integration will trigger the development of various application domains. However, prior research projects have not fully explored some essential features for WSNs, especially the reusability of sensing data and the data-centric communication. To resolve these issues, we suggested a new protocol bridge system named TinyONet. In TinyONet, virtual sensors play roles as virtual counterparts of physical sensors and they dynamically group to make a functional entity, Slice. Instead of direct interaction with individual physical sensors, each sensor application uses its own WSN service provided by Slices. If a new kind of service is required in TinyONet, the corresponding function can be dynamically added at runtime. Beside the data-centric communication, it also supports the node-centric communication and the synchronous access. In order to show the effectiveness of the system, we implemented TinyONet on an embedded Linux machine and evaluated it with several experimental scenarios. PMID:27873968

  11. Design alternatives for process group membership and multicast

    NASA Technical Reports Server (NTRS)

    Birman, Kenneth P.; Cooper, Robert; Gleeson, Barry

    1991-01-01

    Process groups are a natural tool for distributed programming, and are increasingly important in distributed computing environments. However, there is little agreement on the most appropriate semantics for process group membership and group communication. These issues are of special importance in the Isis system, a toolkit for distributed programming. Isis supports several styles of process group, and a collection of group communication protocols spanning a range of atomicity and ordering properties. This flexibility makes Isis adaptable to a variety of applications, but is also a source of complexity that limits performance. This paper reports on a new architecture that arose from an effort to simplify Isis process group semantics. Our findings include a refined notion of how the clients of a group should be treated, what the properties of a multicast primitive should be when systems contain large numbers of overlapping groups, and a new construct called the casuality domain. As an illustration, we apply the architecture to the problem of converting processes into fault-tolerant process groups in a manner that is 'transparent' to other processes in the system.

  12. Optimal approach to quantum communication using dynamic programming.

    PubMed

    Jiang, Liang; Taylor, Jacob M; Khaneja, Navin; Lukin, Mikhail D

    2007-10-30

    Reliable preparation of entanglement between distant systems is an outstanding problem in quantum information science and quantum communication. In practice, this has to be accomplished by noisy channels (such as optical fibers) that generally result in exponential attenuation of quantum signals at large distances. A special class of quantum error correction protocols, quantum repeater protocols, can be used to overcome such losses. In this work, we introduce a method for systematically optimizing existing protocols and developing more efficient protocols. Our approach makes use of a dynamic programming-based searching algorithm, the complexity of which scales only polynomially with the communication distance, letting us efficiently determine near-optimal solutions. We find significant improvements in both the speed and the final-state fidelity for preparing long-distance entangled states.

  13. A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks.

    PubMed

    Baig, Ahmed Fraz; Hassan, Khwaja Mansoor Ul; Ghani, Anwar; Chaudhry, Shehzad Ashraf; Khan, Imran; Ashraf, Muhammad Usman

    2018-01-01

    Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.'s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols.

  14. A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks

    PubMed Central

    2018-01-01

    Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.’s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols. PMID:29702675

  15. A formal model of asynchronous communication and its use in mechanically verifying a biphase mark protocol

    NASA Technical Reports Server (NTRS)

    Moore, J. Strother

    1992-01-01

    In this paper we present a formal model of asynchronous communication as a function in the Boyer-Moore logic. The function transforms the signal stream generated by one processor into the signal stream consumed by an independently clocked processor. This transformation 'blurs' edges and 'dilates' time due to differences in the phases and rates of the two clocks and the communications delay. The model can be used quantitatively to derive concrete performance bounds on asynchronous communications at ISO protocol level 1 (physical level). We develop part of the reusable formal theory that permits the convenient application of the model. We use the theory to show that a biphase mark protocol can be used to send messages of arbitrary length between two asynchronous processors. We study two versions of the protocol, a conventional one which uses cells of size 32 cycles and an unconventional one which uses cells of size 18. We conjecture that the protocol can be proved to work under our model for smaller cell sizes and more divergent clock rates but the proofs would be harder.

  16. Detecting Hidden Communications Protocols

    DTIC Science & Technology

    2013-02-11

    Protocols FA9550-09-1-0173 Richard R Brooks Clemson University PO Box 340915 Clemson, SC 29634-0915 Air Force Office of Scientific Research/RSL 875...two botnet detection methods: centralized botnet traffic detection using HMMs and probabilistic context-free grammars (PCFGs) for centralized and...final report for the Detecting Hidden Communications Protocols AFOSR grant with R. R. Brooks form Clemson University as PI. The work funded by the

  17. Patient-centered communication and health assessment with youth.

    PubMed

    Martyn, Kristy K; Munro, Michelle L; Darling-Fisher, Cynthia S; Ronis, David L; Villarruel, Antonia M; Pardee, Michelle; Faleer, Hannah E; Fava, Nicole M

    2013-01-01

    Patient-centered communication is fundamental to individualizing healthcare, but there has been limited evaluation of provider communication with youth. The aim was to compare communication outcomes after use of an event history calendar (EHC) and Guidelines for Adolescent Preventive Services (GAPS) to structure interactions during a clinic visit. Patient and provider descriptions of EHC and GAPS communication experiences were also obtained. This is a secondary analysis of data obtained during a randomized controlled trial. A sequential explanatory mixed-methods approach was used. A split-plot design with one between factor (EHC, GAPS) and one within factor (pretest, posttest) was used for the quantitative portion. Qualitative data were collected from open-ended questions, audiotaped visits, and exit interviews. Providers (n = 9) at three clinics were assigned at random and trained to implement either the EHC or GAPS protocol. Male and female youth (n = 186) were randomly assigned to the EHC or GAPS intervention. Before their clinic visit, youth completed assessments of past communication experiences with healthcare providers (pretest); communication during the current visit was assessed immediately after the visit (posttest). Communication outcomes from pretest to posttest improved for youth in both the EHC and GAPS groups. Post hoc subgroup analysis suggested that men and Arab Americans derived more benefit from the EHC intervention in some aspects of communication. Qualitatively, the EHC group identified improved outcomes in validating patient perspective, being viewed in context, reaching a shared understanding of needs and preferences, and being helped to share power in the healthcare interaction. EHC and GAPS provided effective frameworks for structuring communication during a clinic visit. Compared with GAPS, the integrated time-linked assessment captured by the EHC enhanced patient-centered communication in select groups.

  18. Collaborative writing: Tools and tips.

    PubMed

    Eapen, Bell Raj

    2007-01-01

    Majority of technical writing is done by groups of experts and various web based applications have made this collaboration easy. Email exchange of word processor documents with tracked changes used to be the standard technique for collaborative writing. However web based tools like Google docs and Spreadsheets have made the process fast and efficient. Various versioning tools and synchronous editors are available for those who need additional functionality. Having a group leader who decides the scheduling, communication and conflict resolving protocols is important for successful collaboration.

  19. Preparedness and response to bioterrorism.

    PubMed

    Spencer, R C; Lightfoot, N F

    2001-08-01

    As we enter the 21st century the threats of biological warfare and bioterrorism (so called asymmetric threats) appear to be more real than ever before. Historical evidence suggests that biological weapons have been used, with varying degrees of success, for many centuries. Despite the international agreements to ban such weapons, namely the 1925 Geneva Protocol and the 1975 Biological and Toxin Weapons Convention, there is no effective international mechanism for challenging either the development of biological weapons or their use. Advances in technology and the rise of fundamentalist terror groups combine to present a significant threat to western democracies. A timely and definitive response to this threat will require co-operation between governments on a scale never seen before. There is a need for proper planning, good communication between various health, home office, defence and intelligence agencies and sufficient financial support for a realistic state of preparedness. The Department of Health has produced guidelines for responding to real or suspected incidents and the Public Health Laboratory Service (PHLS) has produced detailed protocols to inform the actions required by microbiologists and consultants in communicable disease control. These protocols will be published on the Department of Health and PHLS web sites. Copyright 2001 The British Infection Society.

  20. Excessive distribution of quantum entanglement

    NASA Astrophysics Data System (ADS)

    Zuppardo, Margherita; Krisnanda, Tanjung; Paterek, Tomasz; Bandyopadhyay, Somshubhro; Banerjee, Anindita; Deb, Prasenjit; Halder, Saronath; Modi, Kavan; Paternostro, Mauro

    2016-01-01

    We classify entanglement distribution protocols based on whether or not entanglement gain is observed with respect to communicated and initial entanglement. We call a protocol nonexcessive if the gain of entanglement is bounded by the communicated entanglement and excessive if it violates this bound. We present examples of excessive protocols that achieve significant gain, independently of the presence of the initial and (or) communicated entanglement. We show that, for certain entanglement measures, excessive entanglement distribution is possible even with pure states, which sheds light on the possibility of formulating a unifying approach to quantifiers of quantum correlations. We point out a "catalytic" effect, where a protocol is turned into an excessive one by sending an intermediate particle (which does not change the initial entanglement) in advance of the designated carrier. Finally, we analyze the protocols in noisy scenarios and show that, under suitable conditions, excessive distribution may be the only way to achieve entanglement gain.

  1. Distributed reservation control protocols for random access broadcasting channels

    NASA Technical Reports Server (NTRS)

    Greene, E. P.; Ephremides, A.

    1981-01-01

    Attention is given to a communication network consisting of an arbitrary number of nodes which can communicate with each other via a time-division multiple access (TDMA) broadcast channel. The reported investigation is concerned with the development of efficient distributed multiple access protocols for traffic consisting primarily of single packet messages in a datagram mode of operation. The motivation for the design of the protocols came from the consideration of efficient multiple access utilization of moderate to high bandwidth (4-40 Mbit/s capacity) communication satellite channels used for the transmission of short (1000-10,000 bits) fixed length packets. Under these circumstances, the ratio of roundtrip propagation time to packet transmission time is between 100 to 10,000. It is shown how a TDMA channel can be adaptively shared by datagram traffic and constant bandwidth users such as in digital voice applications. The distributed reservation control protocols described are a hybrid between contention and reservation protocols.

  2. Protocol to Exploit Waiting Resources for UASNs.

    PubMed

    Hung, Li-Ling; Luo, Yung-Jeng

    2016-03-08

    The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN) is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  3. A Performance Evaluation of NACK-Oriented Protocols as the Foundation of Reliable Delay- Tolerant Networking Convergence Layers

    NASA Technical Reports Server (NTRS)

    Iannicca, Dennis; Hylton, Alan; Ishac, Joseph

    2012-01-01

    Delay-Tolerant Networking (DTN) is an active area of research in the space communications community. DTN uses a standard layered approach with the Bundle Protocol operating on top of transport layer protocols known as convergence layers that actually transmit the data between nodes. Several different common transport layer protocols have been implemented as convergence layers in DTN implementations including User Datagram Protocol (UDP), Transmission Control Protocol (TCP), and Licklider Transmission Protocol (LTP). The purpose of this paper is to evaluate several stand-alone implementations of negative-acknowledgment based transport layer protocols to determine how they perform in a variety of different link conditions. The transport protocols chosen for this evaluation include Consultative Committee for Space Data Systems (CCSDS) File Delivery Protocol (CFDP), Licklider Transmission Protocol (LTP), NACK-Oriented Reliable Multicast (NORM), and Saratoga. The test parameters that the protocols were subjected to are characteristic of common communications links ranging from terrestrial to cis-lunar and apply different levels of delay, line rate, and error.

  4. Clinical handover as an interactive event: informational and interactional communication strategies in effective shift-change handovers.

    PubMed

    Eggins, Suzanne; Slade, Diana

    2012-01-01

    Clinical handover -- the transfer between clinicians of responsibility and accountability for patients and their care (AMA 2006) -- is a pivotal and high-risk communicative event in hospital practice. Studies focusing on critical incidents, mortality, risk and patient harm in hospitals have highlighted ineffective communication -- including incomplete and unstructured clinical handovers -- as a major contributing factor (NSW Health 2005; ACSQHC 2010). In Australia, as internationally, Health Departments and hospital management have responded by introducing standardised handover communication protocols. This paper problematises one such protocol - the ISBAR tool - and argues that the narrow understanding of communication on which such protocols are based may seriously constrain their ability to shape effective handovers. Based on analysis of audio-recorded shift-change clinical handovers between medical staff we argue that handover communication must be conceptualised as inherently interactive and that attempts to describe, model and teach handover practice must recognise both informational and interactive communication strategies. By comparing the communicative performance of participants in authentic handover events we identify communication strategies that are more and less likely to lead to an effective handover and demonstrate the importance of focusing close up on communication to improve the quality and safety of healthcare interactions.

  5. Policy-Based Negotiation Engine for Cross-Domain Interoperability

    NASA Technical Reports Server (NTRS)

    Vatan, Farrokh; Chow, Edward T.

    2012-01-01

    A successful policy negotiation scheme for Policy-Based Management (PBM) has been implemented. Policy negotiation is the process of determining the "best" communication policy that all of the parties involved can agree on. Specifically, the problem is how to reconcile the various (and possibly conflicting) communication protocols used by different divisions. The solution must use protocols available to all parties involved, and should attempt to do so in the best way possible. Which protocols are commonly available, and what the definition of "best" is will be dependent on the parties involved and their individual communications priorities.

  6. Analysis of dental students' written peer feedback from a prospective peer assessment protocol.

    PubMed

    Tricio, J; Woolford, M; Escudier, M

    2016-11-01

    Peer assessment and feedback is encouraged to enhance students' learning. The aim of this study was to quantitatively and qualitatively analyse pre-clinical and clinical dental students' written peer feedback provided as part of a continuous, formative and structured peer assessment protocol. A total of 309 Year-2 and Year-5 dental students were invited to participate in a peer assessment and peer feedback protocol. Consenting volunteer students were trained to observe each other whilst working in the skills laboratory (Year-2) and in the dental clinic (Year-5). Subsequently, they followed a structured protocol of peer assessment and peer feedback using specially designed work-based forms during a complete academic year. The content of their written feedback was coded according to the UK General Dental Council domain, sign (positive or negative), specificity (task specific or general), and grouped into themes. A total of 108 participants (40 Year-2 and 68 Year-5) completed 1169 peer assessment work-based forms (516 pre-clinical and 653 clinical); 94% contained written feedback. The large majority (82%) of Year-2 feedback represented the clinical domain, 89% were positive, 77% were task specific, and they were grouped into 14 themes. Year-5 feedback was related mostly to Management and Leadership (37%) and Communication (32%), 64% were positive, 75% task specific, and they were clustered into 24 themes. The content of the feedback showed notable differences between Year-2 and Year-5 students. Senior students focused more on Communication and Management and Leadership skills, whilst juniors were more concerned with clinical skills. Year-5 students provided 13% negative feedback compared to only 2% from Year-2. Regulatory focus theory is discussed to explain these differences. Both groups provided peer feedback on a wide and different range of themes. However, four themes emerged in both groups: efficiency, infection control, time management and working speed. A structured peer assessment framework can be used to guide pre-clinical and clinical students to provide peer feedback focused on different domains, and on contrasting signs and specificities. It can also present an opportunity to complement tutors' feedback. © 2016 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  7. Mars Communication Protocols

    NASA Technical Reports Server (NTRS)

    Kazz, G. J.; Greenberg, E.

    2000-01-01

    Over the next decade, international plans and commitments are underway to develop an infrastructure at Mars to support future exploration of the red planet. The purpose of this infrastructure is to provide reliable global communication and navigation coverage for on-approach, landed, roving, and in-flight assets at Mars. The claim is that this infrastructure will: 1) eliminate the need of these assets to carry Direct to Earth (DTE) communications equipment, 2) significantly increase data return and connectivity, 3) enable small mission exploration of Mars without DTE equipment, 4) provide precision navigation i.e., 10 to 100m position resolution, 5) supply timing reference accurate to 10ms. This paper in particular focuses on two CCSDS recommendations for that infrastructure: CCSDS Proximity-1 Space Link Protocol and CCSDS File Delivery Protocol (CFDP). A key aspect of Mars exploration will be the ability of future missions to interoperate. These protocols establish a framework for interoperability by providing standard communication, navigation, and timing services. In addition, these services include strategies to recover gracefully from communication interruptions and interference while ensuring backward compatibility with previous missions from previous phases of exploration.

  8. Impersonation attack on a quantum secure direct communication and authentication protocol with improvement

    NASA Astrophysics Data System (ADS)

    Amerimehr, Ali; Hadain Dehkordi, Massoud

    2018-03-01

    We analyze the security of a quantum secure direct communication and authentication protocol based on single photons. We first give an impersonation attack on the protocol. The cryptanalysis shows that there is a gap in the authentication procedure of the protocol so that an opponent can reveal the secret information by an undetectable attempt. We then propose an improvement for the protocol and show it closes the gap by applying a mutual authentication procedure. In the improved protocol single photons are transmitted once in a session, so it is easy to implement as the primary protocol. Furthermore, we use a novel technique for secret order rearrangement of photons by which not only quantum storage is eliminated also a secret key can be reused securely. So the new protocol is applicable in practical approaches like embedded system devices.

  9. The Seamless Transfer-of-Care Protocol: a randomized controlled trial assessing the efficacy of an electronic transfer-of-care communication tool.

    PubMed

    Okoniewska, Barbara M; Santana, Maria J; Holroyd-Leduc, Jayna; Flemons, Ward; O'Beirne, Maeve; White, Deborah; Clement, Fiona; Forster, Alan; Ghali, William A

    2012-11-21

    The transition between acute care and community care represents a vulnerable period in health care delivery. The vulnerability of this period has been attributed to changes to patients' medication regimens during hospitalization, failure to reconcile discrepancies between admission and discharge and the burdening of patients/families to take over care responsibilities at discharge and to relay important information to the primary care physician. Electronic communication platforms can provide an immediate link between acute care and community care physicians (and other community providers), designed to ensure consistent information transfer. This study examines whether a transfer-of-care (TOC) communication tool is efficacious and cost-effective for reducing hospital readmission, adverse events and adverse drug events as well as reducing death. A randomized controlled trial conducted on the Medical Teaching Unit of a Canadian tertiary care centre will evaluate the efficacy and cost-effectiveness of a TOC communication tool. Medical in-patients admitted to the unit will be considered for this study. Data will be collected upon admission, and a total of 1400 patients will be randomized. The control group's acute care stay will be summarized using a traditional dictated summary, while the intervention group will have a summary generated using the TOC communication tool. The primary outcome will be a composite, at 3 months, of death or readmission to any Alberta acute-care hospital. Secondary outcomes will be the occurrence of post-discharge adverse events and adverse drug events at 1 month post discharge. Patients with adverse outcomes will have their cases reviewed by two Royal College certified internists or College-certified family physicians, blinded to patients' group assignments, to determine the type, severity, preventability and ameliorability of all detected adverse outcomes. An accompanying economic evaluation will assess the cost per life saved, cost per readmission avoided and cost per QALY gained with the TOC communication tool compared to traditional dictation summaries. This paper outlines the study protocol for a randomized controlled trial evaluating an electronic transfer-of-care communication tool, with sufficient statistical power to assess the impact of the tool on the significant outcomes of post-discharge death or readmission. The study findings will inform health systems around the world on the potential benefits of such tools, and the value for money associated with their widespread implementation. ClinicalTrials.gov NCT01402609.

  10. Focus on Quantum Memory

    NASA Astrophysics Data System (ADS)

    Brennen, Gavin; Giacobino, Elisabeth; Simon, Christoph

    2015-05-01

    Quantum memories are essential for quantum information processing and long-distance quantum communication. The field has recently seen a lot of progress, and the present focus issue offers a glimpse of these developments, showing both experimental and theoretical results from many of the leading groups around the world. On the experimental side, it shows work on cold gases, warm vapors, rare-earth ion doped crystals and single atoms. On the theoretical side there are in-depth studies of existing memory protocols, proposals for new protocols including approaches based on quantum error correction, and proposals for new applications of quantum storage. Looking forward, we anticipate many more exciting results in this area.

  11. Bidirectional Controlled Quantum Communication by Using a Seven-Qubit Entangled State

    NASA Astrophysics Data System (ADS)

    Sang, Ming-huang; Li, Cong

    2018-03-01

    We propose a protocol for bidirectional controlled quantum communication by using a seven-qubit entangled state. In our protocol, Alice can teleport an arbitrary unknown two-qubit state to Bob, at the same time Bob can help Alice remotely prepares an arbitrary known single-qubit state. It is shown that, with the help of the controller Charlie, the total success probability of our protocol can reach 100%.

  12. Operating systems and network protocols for wireless sensor networks.

    PubMed

    Dutta, Prabal; Dunkels, Adam

    2012-01-13

    Sensor network protocols exist to satisfy the communication needs of diverse applications, including data collection, event detection, target tracking and control. Network protocols to enable these services are constrained by the extreme resource scarcity of sensor nodes-including energy, computing, communications and storage-which must be carefully managed and multiplexed by the operating system. These challenges have led to new protocols and operating systems that are efficient in their energy consumption, careful in their computational needs and miserly in their memory footprints, all while discovering neighbours, forming networks, delivering data and correcting failures.

  13. TCP Performance Enhancement Over Iridium

    NASA Technical Reports Server (NTRS)

    Torgerson, Leigh; Hutcherson, Joseph; McKelvey, James

    2007-01-01

    In support of iNET maturation, NASA-JPL has collaborated with NASA-Dryden to develop, test and demonstrate an over-the-horizon vehicle-to-ground networking capability, using Iridium as the vehicle-to-ground communications link for relaying critical vehicle telemetry. To ensure reliability concerns are met, the Space Communications Protocol Standards (SCPS) transport protocol was investigated for its performance characteristics in this environment. In particular, the SCPS-TP software performance was compared to that of the standard Transmission Control Protocol (TCP) over the Internet Protocol (IP). This paper will report on the results of this work.

  14. Gaussian error correction of quantum states in a correlated noisy channel.

    PubMed

    Lassen, Mikael; Berni, Adriano; Madsen, Lars S; Filip, Radim; Andersen, Ulrik L

    2013-11-01

    Noise is the main obstacle for the realization of fault-tolerant quantum information processing and secure communication over long distances. In this work, we propose a communication protocol relying on simple linear optics that optimally protects quantum states from non-Markovian or correlated noise. We implement the protocol experimentally and demonstrate the near-ideal protection of coherent and entangled states in an extremely noisy channel. Since all real-life channels are exhibiting pronounced non-Markovian behavior, the proposed protocol will have immediate implications in improving the performance of various quantum information protocols.

  15. Counterfactuality of ‘counterfactual’ communication

    NASA Astrophysics Data System (ADS)

    Vaidman, L.

    2015-11-01

    The counterfactuality of the recently proposed protocols for direct quantum communication is analyzed. It is argued that the protocols can be counterfactual only for one value of the transmitted bit. The protocols achieve a reduced probability of detection of the particle in the transmission channel by increasing the number of paths in the channel. However, this probability is not lower than the probability of detecting a particle actually passing through such a multi-path channel, which was found to be surprisingly small. The relation between security and counterfactuality of the protocols is discussed. An analysis of counterfactuality of the protocols in the framework of the Bohmian interpretation is performed.

  16. Utilization of Internet Protocol-Based Voice Systems in Remote Payload Operations

    NASA Technical Reports Server (NTRS)

    Chamberlain, jim; Bradford, Bob; Best, Susan; Nichols, Kelvin

    2002-01-01

    Due to limited crew availability to support science and the large number of experiments to be operated simultaneously, telescience is key to a successful International Space Station (ISS) science program. Crew, operations personnel at NASA centers, and researchers at universities and companies around the world must work closely together to per orm scientific experiments on-board ISS. The deployment of reliable high-speed Internet Protocol (IP)-based networks promises to greatly enhance telescience capabilities. These networks are now being used to cost-effectively extend the reach of remote mission support systems. They reduce the need for dedicated leased lines and travel while improving distributed workgroup collaboration capabilities. NASA has initiated use of Voice over Internet Protocol (VoIP) to supplement the existing mission voice communications system used by researchers at their remote sites. The Internet Voice Distribution System (IVoDS) connects remote researchers to mission support "loopsll or conferences via NASA networks and Internet 2. Researchers use NODS software on personal computers to talk with operations personnel at NASA centers. IVoDS also has the ;capability, if authorized, to allow researchers to communicate with the ISS crew during experiment operations. NODS was developed by Marshall Space Flight Center with contractors & Technology, First Virtual Communications, Lockheed-Martin, and VoIP Group. NODS is currently undergoing field-testing with full deployment for up to 50 simultaneous users expected in 2002. Research is being performed in parallel with IVoDS deployment for a next-generation system to qualitatively enhance communications among ISS operations personnel. In addition to the current voice capability, video and data/application-sharing capabilities are being investigated. IVoDS technology is also being considered for mission support systems for programs such as Space Launch Initiative and Homeland Defense.

  17. Towards Reliable and Energy-Efficient Incremental Cooperative Communication for Wireless Body Area Networks.

    PubMed

    Yousaf, Sidrah; Javaid, Nadeem; Qasim, Umar; Alrajeh, Nabil; Khan, Zahoor Ali; Ahmed, Mansoor

    2016-02-24

    In this study, we analyse incremental cooperative communication for wireless body area networks (WBANs) with different numbers of relays. Energy efficiency (EE) and the packet error rate (PER) are investigated for different schemes. We propose a new cooperative communication scheme with three-stage relaying and compare it to existing schemes. Our proposed scheme provides reliable communication with less PER at the cost of surplus energy consumption. Analytical expressions for the EE of the proposed three-stage cooperative communication scheme are also derived, taking into account the effect of PER. Later on, the proposed three-stage incremental cooperation is implemented in a network layer protocol; enhanced incremental cooperative critical data transmission in emergencies for static WBANs (EInCo-CEStat). Extensive simulations are conducted to validate the proposed scheme. Results of incremental relay-based cooperative communication protocols are compared to two existing cooperative routing protocols: cooperative critical data transmission in emergencies for static WBANs (Co-CEStat) and InCo-CEStat. It is observed from the simulation results that incremental relay-based cooperation is more energy efficient than the existing conventional cooperation protocol, Co-CEStat. The results also reveal that EInCo-CEStat proves to be more reliable with less PER and higher throughput than both of the counterpart protocols. However, InCo-CEStat has less throughput with a greater stability period and network lifetime. Due to the availability of more redundant links, EInCo-CEStat achieves a reduced packet drop rate at the cost of increased energy consumption.

  18. Towards Reliable and Energy-Efficient Incremental Cooperative Communication for Wireless Body Area Networks

    PubMed Central

    Yousaf, Sidrah; Javaid, Nadeem; Qasim, Umar; Alrajeh, Nabil; Khan, Zahoor Ali; Ahmed, Mansoor

    2016-01-01

    In this study, we analyse incremental cooperative communication for wireless body area networks (WBANs) with different numbers of relays. Energy efficiency (EE) and the packet error rate (PER) are investigated for different schemes. We propose a new cooperative communication scheme with three-stage relaying and compare it to existing schemes. Our proposed scheme provides reliable communication with less PER at the cost of surplus energy consumption. Analytical expressions for the EE of the proposed three-stage cooperative communication scheme are also derived, taking into account the effect of PER. Later on, the proposed three-stage incremental cooperation is implemented in a network layer protocol; enhanced incremental cooperative critical data transmission in emergencies for static WBANs (EInCo-CEStat). Extensive simulations are conducted to validate the proposed scheme. Results of incremental relay-based cooperative communication protocols are compared to two existing cooperative routing protocols: cooperative critical data transmission in emergencies for static WBANs (Co-CEStat) and InCo-CEStat. It is observed from the simulation results that incremental relay-based cooperation is more energy efficient than the existing conventional cooperation protocol, Co-CEStat. The results also reveal that EInCo-CEStat proves to be more reliable with less PER and higher throughput than both of the counterpart protocols. However, InCo-CEStat has less throughput with a greater stability period and network lifetime. Due to the availability of more redundant links, EInCo-CEStat achieves a reduced packet drop rate at the cost of increased energy consumption. PMID:26927104

  19. Exploring the predictive ability of two new complementary instruments for assessing effective therapeutic communication skills of dental and dental hygiene students.

    PubMed

    Schönwetter, Dieter J; Emmons Wener, Mickey; Mazurat, Nita; Yakiwchuk, Ben

    2012-10-01

    Research on the development of effective therapeutic communication skills for oral health providers is slowly evolving. One of the initial steps in this research is to identify and address gaps in the work of previous researchers. Ultimately, the educational goal of competence in communications skills development is to provide improved patient care including improved patient satisfaction. This article is the third in a series describing the development of and findings from the new complementary Patient Communication Assessment Instrument (PCAI) and Student Communication Assessment Instrument (SCAI). The aim of the study reported here was to look at the relationship between communication skills and patient and student clinician gender interactions, sociodemographic factors (e.g., age, income), and changes in these interactions with length of treatment. A total of 410 patient assessments (PCAI) and 410 matching student self-assessments (SCAI) were used for further data analysis. Patients of female student clinicians, female patients, patients of a higher and the lowest income range, and older patients reported statistically significant higher student communication scores. The PCAI identified that certain groups of patients consistently report higher scores than other groups, whereas the SCAI identified differences between male and female student clinicians. The results have implications for educational protocols, communication strategies, and the need for continued research regarding sociodemographic factors and their relationship to patient satisfaction.

  20. SPECS: Secure and Privacy Enhancing Communications Schemes for VANETs

    NASA Astrophysics Data System (ADS)

    Chim, T. W.; Yiu, S. M.; Hui, L. C. K.; Jiang, Zoe L.; Li, Victor O. K.

    Vehicular ad hoc network (VANET) is an emerging type of networks which facilitates vehicles on roads to communicate for driving safety. The basic idea is to allow arbitrary vehicles to broadcast ad hoc messages (e.g. traffic accidents) to other vehicles. However, this raises the concern of security and privacy. Messages should be signed and verified before they are trusted while the real identity of vehicles should not be revealed, but traceable by authorized party. Existing solutions either rely heavily on a tamper-proof hardware device, or cannot satisfy the privacy requirement and do not have an effective message verification scheme. In this paper, we provide a software-based solution which makes use of only two shared secrets to satisfy the privacy requirement and gives lower message overhead and at least 45% higher successful rate than previous solutions in the message verification phase using the bloom filter and the binary search techniques. We also provide the first group communication protocol to allow vehicles to authenticate and securely communicate with others in a group of known vehicles.

  1. Comment on 'Quantum direct communication with authentication'

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhang, Zhan-jun; Key Laboratory of Optoelectronic Information Acquisition and Manipulation of Ministry of Education of China, School of Physics and Material Science, Anhui University, Hefei 230039; Liu, Jun

    2007-02-15

    Two protocols of quantum direct communication with authentication [Phys. Rev. A 73, 042305 (2006)] were recently proposed by Lee, Lim, and Yang. In this paper we will show that in the two protocols the authenticator Trent should be prevented from knowing the secret message. The first protocol can be eavesdropped on by Trent using the intercept-measure-resend attack, while the second protocol can be eavesdropped on by Trent using a simple single-qubit measurement. To fix these leaks, we revise the original versions of the protocols by using the Pauli Z operation {sigma}{sub z} instead of the original bit-flip operation X. Asmore » a consequence, the attacks we present can be prevented and accordingly the protocol securities are improved.« less

  2. New approach to enhance and evaluate the performance of vehicle-infrastructure integration and its communication systems, final report.

    DOT National Transportation Integrated Search

    2010-09-01

    Initial research studied the use of wireless local area networks (WLAN) protocols in Inter-Vehicle Communications : (IVC) environments. The protocols performance was evaluated in terms of measuring throughput, jitter time and : delay time. This re...

  3. Performance evaluation of secured DICOM image communication with next generation internet protocol IPv6

    NASA Astrophysics Data System (ADS)

    Yu, Fenghai; Zhang, Jianguo; Chen, Xiaomeng; Huang, H. K.

    2005-04-01

    Next Generation Internet (NGI) technology with new communication protocol IPv6 emerges as a potential solution for low-cost and high-speed networks for image data transmission. IPv6 is designed to solve many of the problems of the current version of IP (known as IPv4) with regard to address depletion, security, autoconfiguration, extensibility, and more. We choose CTN (Central Test Node) DICOM software developed by The Mallinckrodt Institute of Radiology to implement IPv6/IPv4 enabled DICOM communication software on different operating systems (Windows/Linux), and used this DICOM software to evaluate the performance of the IPv6/IPv4 enabled DICOM image communication with different security setting and environments. We compared the security communications of IPsec with SSL/TLS on different TCP/IP protocols (IPv6/IPv4), and find that there are some trade-offs to choose security solution between IPsec and SSL/TLS in the security implementation of IPv6/IPv4 communication networks.

  4. User Experience, Actual Use, and Effectiveness of an Information Communication Technology-Supported Home Exercise Program for Pre-Frail Older Adults.

    PubMed

    Dekker-van Weering, Marit; Jansen-Kosterink, Stephanie; Frazer, Sanne; Vollenbroek-Hutten, Miriam

    2017-01-01

    The main objective of this study was to investigate the use and user experience of an Information Communication Technology-supported home exercise program when offered for independent use to pre-frail older adults. Our secondary aim was to explore whether the program improved quality of life and health status compared to a control group. A cohort multiple randomized controlled trail is being performed. Physically pre-frail older adults (65-75 years) living independently at home were included and randomly assigned to a control group or an intervention group. The intervention group received a home exercise program (strength, balance, and flexibility exercises) for a minimal duration of 12 weeks. The control group received usual care. Primary outcomes were: use of the intervention (frequency and duration), adherence to a 3-day exercise protocol and user experience [System Usability Scale (SUS); rating 1-10]. Secondary outcomes were quality of life measured with the SF12 (Physical Component Scale and Mental Component Scale) and health status (EQ-5D), assessed before the study starts and after 12 weeks of exercising. Thirty-seven independently living older adults participated in the study. Sixteen participants were allocated to the intervention group and 21 to the control group. The average score on the SUS was 84.2 (±13.3), almost reaching an excellent score. Participants rated the intervention with an 8.5. Eighty percent of the participants finished the 12 week exercise protocol. The adherence to the 3-day exercise protocol was 68%. Participants in the intervention group trained on average 2.2 times (±1.3) each week. The mean duration of login for each exercise session was 24 min. The Mental Component Scale of the SF12 was significantly higher in the intervention group compared to the control group. A trend was seen in the change over time in the health status between groups. This study provides evidence that a home-based exercise program is easy to use and has potential in improving quality of life and health status of pre-frail older adults who live at home. However, further refinement of the program is required to improve adherence and maximize the benefits and potential of exercising in the home environment. Unique Identifier: NTR5304. URL: http://www.trialregister.nl/trialreg/admin/rctview.asp?TC=5304.

  5. Design exploration and verification platform, based on high-level modeling and FPGA prototyping, for fast and flexible digital communication in physics experiments

    NASA Astrophysics Data System (ADS)

    Magazzù, G.; Borgese, G.; Costantino, N.; Fanucci, L.; Incandela, J.; Saponara, S.

    2013-02-01

    In many research fields as high energy physics (HEP), astrophysics, nuclear medicine or space engineering with harsh operating conditions, the use of fast and flexible digital communication protocols is becoming more and more important. The possibility to have a smart and tested top-down design flow for the design of a new protocol for control/readout of front-end electronics is very useful. To this aim, and to reduce development time, costs and risks, this paper describes an innovative design/verification flow applied as example case study to a new communication protocol called FF-LYNX. After the description of the main FF-LYNX features, the paper presents: the definition of a parametric SystemC-based Integrated Simulation Environment (ISE) for high-level protocol definition and validation; the set up of figure of merits to drive the design space exploration; the use of ISE for early analysis of the achievable performances when adopting the new communication protocol and its interfaces for a new (or upgraded) physics experiment; the design of VHDL IP cores for the TX and RX protocol interfaces; their implementation on a FPGA-based emulator for functional verification and finally the modification of the FPGA-based emulator for testing the ASIC chipset which implements the rad-tolerant protocol interfaces. For every step, significant results will be shown to underline the usefulness of this design and verification approach that can be applied to any new digital protocol development for smart detectors in physics experiments.

  6. Evaluation of the appropriate use of a CIWA-Ar alcohol withdrawal protocol in the general hospital setting.

    PubMed

    Eloma, Amanda S; Tucciarone, Jason M; Hayes, Edmund M; Bronson, Brian D

    2018-01-01

    The Clinical Institute Withdrawal Assessment-Alcohol, Revised (CIWA-Ar) is an assessment tool used to quantify alcohol withdrawal syndrome (AWS) severity and inform benzodiazepine treatment for alcohol withdrawal. To evaluate the prescribing patterns and appropriate use of the CIWA-Ar protocol in a general hospital setting, as determined by the presence or absence of documented AWS risk factors, patients' ability to communicate, and provider awareness of the CIWA-Ar order. This retrospective chart review included 118 encounters of hospitalized patients placed on a CIWA-Ar protocol during one year. The following data were collected for each encounter: patient demographics, admitting diagnosis, ability to communicate, and admission blood alcohol level; and medical specialty of the clinician ordering CIWA-Ar, documentation of the presence or absence of established AWS risk factors, specific parameters of the protocol ordered, service admitted to, provider documentation of awareness of the active protocol within 48 h of initial order, total benzodiazepine dose equivalents administered and associated adverse events. 57% of patients who started on a CIWA-Ar protocol had either zero or one documented risk factor for AWS (19% and 38% respectively). 20% had no documentation of recent alcohol use. 14% were unable to communicate. 19% of medical records lacked documentation of provider awareness of the ordered protocol. Benzodiazepine associated adverse events were documented in 15% of encounters. The judicious use of CIWA-Ar protocols in general hospitals requires mechanisms to ensure assessment of validated alcohol withdrawal risk factors, exclusion of patients who cannot communicate, and continuity of care during transitions.

  7. A cross-sectional study on person-centred communication in the care of older people: the COMHOME study protocol.

    PubMed

    Hafskjold, Linda; Sundler, Annelie J; Holmström, Inger K; Sundling, Vibeke; van Dulmen, Sandra; Eide, Hilde

    2015-04-15

    This paper presents an international cross-sectional study on person-centred communication with older people receiving healthcare (COMHOME). Person-centred care relies on effective communication, but few studies have explored this with a specific focus on older people. The main aim of the COMHOME study is to generate knowledge on person-centred communication with older people (>65 years) in home healthcare services, radiographic and optometric practice. This study will explore the communication between care providers and older persons in home care services. Home healthcare visits will be audiorecorded (n=500) in Norway, the Netherlands and Sweden. Analyses will be performed with the Verona Coding Definitions for Emotional Sequences (VR-CoDES), the Roter Interaction Analysis System (RIAS) and qualitative methods. The content of the communication, communicative challenging situations as well as empathy, power distance, decision-making, preservation of dignity and respect will be explored. In Norway, an additional 100 encounters, 50 in optometric practice (video recorded) and 50 in radiographic practice (audiorecorded), will be analysed. Furthermore, healthcare providers' self-reported communication skills, empathy, mindfulness and emotional intelligence in relation to observed person-centred communication skills will be assessed using well-established standardised instruments. Depending on national legislation, approval of either the central ethical committees (eg, nation or university), the national data protection officials or the local ethical committees (eg, units of home healthcare) was obtained. Study findings will be disseminated widely through peer-reviewed publications and conference presentations. The research findings will add knowledge to improve services provided to this vulnerable group of patients. Additionally, the findings will underpin a training programme for healthcare students and care providers focusing on communication with older people. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  8. Robust Routing Protocol For Digital Messages

    NASA Technical Reports Server (NTRS)

    Marvit, Maclen

    1994-01-01

    Refinement of ditigal-message-routing protocol increases fault tolerance of polled networks. AbNET-3 is latest of generic AbNET protocols for transmission of messages among computing nodes. AbNET concept described in "Multiple-Ring Digital Communication Network" (NPO-18133). Specifically aimed at increasing fault tolerance of network in broadcast mode, in which one node broadcasts message to and receives responses from all other nodes. Communication in network of computers maintained even when links fail.

  9. A Polynomial Subset-Based Efficient Multi-Party Key Management System for Lightweight Device Networks.

    PubMed

    Mahmood, Zahid; Ning, Huansheng; Ghafoor, AtaUllah

    2017-03-24

    Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure.

  10. A Polynomial Subset-Based Efficient Multi-Party Key Management System for Lightweight Device Networks

    PubMed Central

    Mahmood, Zahid; Ning, Huansheng; Ghafoor, AtaUllah

    2017-01-01

    Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure. PMID:28338632

  11. Infrastructure for Integration of Legacy Electrical Equipment into a Smart-Grid Using Wireless Sensor Networks.

    PubMed

    de Araújo, Paulo Régis C; Filho, Raimir Holanda; Rodrigues, Joel J P C; Oliveira, João P C M; Braga, Stephanie A

    2018-04-24

    At present, the standardisation of electrical equipment communications is on the rise. In particular, manufacturers are releasing equipment for the smart grid endowed with communication protocols such as DNP3, IEC 61850, and MODBUS. However, there are legacy equipment operating in the electricity distribution network that cannot communicate using any of these protocols. Thus, we propose an infrastructure to allow the integration of legacy electrical equipment to smart grids by using wireless sensor networks (WSNs). In this infrastructure, each legacy electrical device is connected to a sensor node, and the sink node runs a middleware that enables the integration of this device into a smart grid based on suitable communication protocols. This middleware performs tasks such as the translation of messages between the power substation control centre (PSCC) and electrical equipment in the smart grid. Moreover, the infrastructure satisfies certain requirements for communication between the electrical equipment and the PSCC, such as enhanced security, short response time, and automatic configuration. The paper’s contributions include a solution that enables electrical companies to integrate their legacy equipment into smart-grid networks relying on any of the above mentioned communication protocols. This integration will reduce the costs related to the modernisation of power substations.

  12. Infrastructure for Integration of Legacy Electrical Equipment into a Smart-Grid Using Wireless Sensor Networks

    PubMed Central

    de Araújo, Paulo Régis C.; Filho, Raimir Holanda; Oliveira, João P. C. M.; Braga, Stephanie A.

    2018-01-01

    At present, the standardisation of electrical equipment communications is on the rise. In particular, manufacturers are releasing equipment for the smart grid endowed with communication protocols such as DNP3, IEC 61850, and MODBUS. However, there are legacy equipment operating in the electricity distribution network that cannot communicate using any of these protocols. Thus, we propose an infrastructure to allow the integration of legacy electrical equipment to smart grids by using wireless sensor networks (WSNs). In this infrastructure, each legacy electrical device is connected to a sensor node, and the sink node runs a middleware that enables the integration of this device into a smart grid based on suitable communication protocols. This middleware performs tasks such as the translation of messages between the power substation control centre (PSCC) and electrical equipment in the smart grid. Moreover, the infrastructure satisfies certain requirements for communication between the electrical equipment and the PSCC, such as enhanced security, short response time, and automatic configuration. The paper’s contributions include a solution that enables electrical companies to integrate their legacy equipment into smart-grid networks relying on any of the above mentioned communication protocols. This integration will reduce the costs related to the modernisation of power substations. PMID:29695099

  13. Compositional Verification of a Communication Protocol for a Remotely Operated Vehicle

    NASA Technical Reports Server (NTRS)

    Goodloe, Alwyn E.; Munoz, Cesar A.

    2009-01-01

    This paper presents the specification and verification in the Prototype Verification System (PVS) of a protocol intended to facilitate communication in an experimental remotely operated vehicle used by NASA researchers. The protocol is defined as a stack-layered com- position of simpler protocols. It can be seen as the vertical composition of protocol layers, where each layer performs input and output message processing, and the horizontal composition of different processes concurrently inhabiting the same layer, where each process satisfies a distinct requirement. It is formally proven that the protocol components satisfy certain delivery guarantees. Compositional techniques are used to prove these guarantees also hold in the composed system. Although the protocol itself is not novel, the methodology employed in its verification extends existing techniques by automating the tedious and usually cumbersome part of the proof, thereby making the iterative design process of protocols feasible.

  14. Design Technology of Advanced Composites.

    DTIC Science & Technology

    1982-11-01

    Communications A.146 Figure 2.-- Conceptual Structure of the Fundamental Protocol Building Block A.147 Figure 3.--External Interactions Associated with a...compatibility between 1544 and 2048 kbit/s system. Annex 5 contains a description of the proposed framwork for distribution to other Study Groups. Some of...are conceptual configurations useful in identifying various possible arrangements to an ISDN. Two concepts are used in defining reference configurations

  15. Discrete Address Beacon System (DABS) Baseline Test and Evaluation.

    DTIC Science & Technology

    1980-04-01

    Organization ReportNo 7. ~/ - 9. PorTorming Organisation Name and Address 10. Work Unit No. (TRALS) Federal Aviation Administration National Aviation...version of the Common International Civil Aviation Organization (ICAO) Data Interchange Network (CIDIN) protocol used in the DABS engineering model. 8. All...grouped into two subsets, one for surveillance data communications and one for Common International Civil Aviation Organization (ICAO) Data Interchange

  16. Wireless Communications in Reverberant Environments

    DTIC Science & Technology

    2015-01-01

    Secure Wireless Agent Testbed (SWAT), the Protocol Engineering Advanced Networking (PROTEAN) Research Group, the Data Fusion Laboratory (DFL), and the...constraints of their application. 81 Bibliography [1] V. Gungor and G. Hancke, “Industrial wireless sensor networks : Challenges, design principles, and...Bhattacharya, “Path loss estimation for a wireless sensor network for application in ship,” Int. J. of Comput. Sci. and Mobile Computing, vol. 2, no. 6, pp

  17. The effects of assertiveness training in patients with schizophrenia: a randomized, single-blind, controlled study.

    PubMed

    Lee, Tso-Ying; Chang, Shih-Chin; Chu, Hsin; Yang, Chyn-Yng; Ou, Keng-Liang; Chung, Min-Huey; Chou, Kuei-Ru

    2013-11-01

    In this study, we investigated the effects of group assertiveness training on assertiveness, social anxiety and satisfaction with interpersonal communication among patients with chronic schizophrenia. Only limited studies highlighted the effectiveness of group assertiveness training among inpatients with schizophrenia. Given the lack of group assertiveness training among patients with schizophrenia, further development of programmes focusing on facilitating assertiveness, self-confidence and social skills among inpatients with chronic schizophrenia is needed. This study used a prospective, randomized, single-blinded, parallel-group design. This study employed a prospective, randomized, parallel-group design. Seventy-four patients were randomly assigned to experimental group receiving 12 sessions of assertiveness training, or a supportive control group. Data collection took place for the period of June 2009-July 2010. Among patients with chronic schizophrenia, assertiveness, levels of social anxiety and satisfaction with interpersonal communication significantly improved immediately after the intervention and at the 3-month follow-up in the intervention group. The results of a generalized estimating equation (GEE) indicated that: (1) assertiveness significantly improved from pre- to postintervention and was maintained until the follow-up; (2) anxiety regarding social interactions significantly decreased after assertiveness training; and (3) satisfaction with interpersonal communication slightly improved after the 12-session intervention and at the 3-month follow-up. Assertivenss training is a non-invasive and inexpensive therapy that appears to improve assertiveness, social anxiety and interpersonal communication among inpatients with chronic schizophrenia. These findings may provide a reference guide to clinical nurses for developing assertiveness-training protocols. © 2013 Blackwell Publishing Ltd.

  18. Routine failures in the process for blood testing and the communication of results to patients in primary care in the UK: a qualitative exploration of patient and provider perspectives.

    PubMed

    Litchfield, Ian; Bentham, Louise; Hill, Ann; McManus, Richard J; Lilford, Richard; Greenfield, Sheila

    2015-11-01

    The testing and result communication process in primary care is complex. Its successful completion relies on the coordinated efforts of a range of staff in primary care and external settings working together with patients. Despite the importance of diagnostic testing in provision of care, this complexity renders the process vulnerable in the face of increasing demand, stretched resources and a lack of supporting guidance. We conducted a series of focus groups with patients and staff across four primary care practices using process-improvement strategies to identify and understand areas where either unnecessary delay is introduced, or the process may fail entirely. We then worked with both patients and staff to arrive at practical strategies to improve the current system. A total of six areas across the process were identified where improvements could be introduced. These were: (1) delay in phlebotomy, (2) lack of a fail-safe to ensure blood tests are returned to practices and patients, (3) difficulties in accessing results by telephone, (4) role of non-clinical staff in communicating results, (5) routine communication of normal results and (6) lack of a protocol for result communication. A number of potential failures in testing and communicating results to patients were identified, and some specific ideas for improving existing systems emerged. These included same-day phlebotomy sessions, use of modern technology methods to proactively communicate routine results and targeted training for receptionists handling sensitive data. There remains an urgent need for further work to test these and other potential solutions. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  19. Development and evaluation of a mobile AAC: a virtual therapist and speech assistant for people with communication disabilities.

    PubMed

    Wang, Erh-Hsuan; Zhou, Leming; Chen, Szu-Han Kay; Hill, Katya; Parmanto, Bambang

    2017-09-26

    The currently existing Augmentative and Alternative Communication (AAC) technologies have limitations to produce the best communication rehabilitation outcomes and therefore a better solution is needed. In this work, a mobile AAC app was developed based on results from research studies. Sophisticated AAC language programming, embedded training materials, and real-time communication performance reporting were integrated into the app. Two groups of study participants were recruited to participate a usability study and a preliminary feasibility study for the purpose of evaluating this mobile AAC app, respectively. A tablet-based AAC app was developed to support communication rehabilitation. User studies of the app were conducted and included able-bodied individuals and people with verbal communication disabilities. All study participants agreed that the app establishes a usable alternative treatment protocol for communication rehabilitation. The app's integrated features have great potential to maximize users' communication effectiveness, enhance language skills, and ultimately improve users' quality of life. Implications for rehabilitation We have developed and evaluated an integrated mobile AAC language-based app. This tablet-based app integrated AAC with embedded trainings and real-time performance report.

  20. Full-Scale Wind-Tunnel Investigation of Wing-Cooling Ducts Effects of Propeller Slipstream, Special Report

    NASA Technical Reports Server (NTRS)

    Nickle, F. R.; Freeman, Arthur B.

    1939-01-01

    The safety of remotely operated vehicles depends on the correctness of the distributed protocol that facilitates the communication between the vehicle and the operator. A failure in this communication can result in catastrophic loss of the vehicle. To complicate matters, the communication system may be required to satisfy several, possibly conflicting, requirements. The design of protocols is typically an informal process based on successive iterations of a prototype implementation. Yet distributed protocols are notoriously difficult to get correct using such informal techniques. We present a formal specification of the design of a distributed protocol intended for use in a remotely operated vehicle, which is built from the composition of several simpler protocols. We demonstrate proof strategies that allow us to prove properties of each component protocol individually while ensuring that the property is preserved in the composition forming the entire system. Given that designs are likely to evolve as additional requirements emerge, we show how we have automated most of the repetitive proof steps to enable verification of rapidly changing designs.

  1. Performance evaluation of reactive and proactive routing protocol in IEEE 802.11 ad hoc network

    NASA Astrophysics Data System (ADS)

    Hamma, Salima; Cizeron, Eddy; Issaka, Hafiz; Guédon, Jean-Pierre

    2006-10-01

    Wireless technology based on the IEEE 802.11 standard is widely deployed. This technology is used to support multiple types of communication services (data, voice, image) with different QoS requirements. MANET (Mobile Adhoc NETwork) does not require a fixed infrastructure. Mobile nodes communicate through multihop paths. The wireless communication medium has variable and unpredictable characteristics. Furthermore, node mobility creates a continuously changing communication topology in which paths break and new one form dynamically. The routing table of each router in an adhoc network must be kept up-to-date. MANET uses Distance Vector or Link State algorithms which insure that the route to every host is always known. However, this approach must take into account the adhoc networks specific characteristics: dynamic topologies, limited bandwidth, energy constraints, limited physical security, ... Two main routing protocols categories are studied in this paper: proactive protocols (e.g. Optimised Link State Routing - OLSR) and reactive protocols (e.g. Ad hoc On Demand Distance Vector - AODV, Dynamic Source Routing - DSR). The proactive protocols are based on periodic exchanges that update the routing tables to all possible destinations, even if no traffic goes through. The reactive protocols are based on on-demand route discoveries that update routing tables only for the destination that has traffic going through. The present paper focuses on study and performance evaluation of these categories using NS2 simulations. We have considered qualitative and quantitative criteria. The first one concerns distributed operation, loop-freedom, security, sleep period operation. The second are used to assess performance of different routing protocols presented in this paper. We can list end-to-end data delay, jitter, packet delivery ratio, routing load, activity distribution. Comparative study will be presented with number of networking context consideration and the results show the appropriate routing protocol for two kinds of communication services (data and voice).

  2. In-Space Networking on NASA's SCAN Testbed

    NASA Technical Reports Server (NTRS)

    Brooks, David E.; Eddy, Wesley M.; Clark, Gilbert J.; Johnson, Sandra K.

    2016-01-01

    The NASA Space Communications and Navigation (SCaN) Testbed, an external payload onboard the International Space Station, is equipped with three software defined radios and a flight computer for supporting in-space communication research. New technologies being studied using the SCaN Testbed include advanced networking, coding, and modulation protocols designed to support the transition of NASAs mission systems from primarily point to point data links and preplanned routes towards adaptive, autonomous internetworked operations needed to meet future mission objectives. Networking protocols implemented on the SCaN Testbed include the Advanced Orbiting Systems (AOS) link-layer protocol, Consultative Committee for Space Data Systems (CCSDS) Encapsulation Packets, Internet Protocol (IP), Space Link Extension (SLE), CCSDS File Delivery Protocol (CFDP), and Delay-Tolerant Networking (DTN) protocols including the Bundle Protocol (BP) and Licklider Transmission Protocol (LTP). The SCaN Testbed end-to-end system provides three S-band data links and one Ka-band data link to exchange space and ground data through NASAs Tracking Data Relay Satellite System or a direct-to-ground link to ground stations. The multiple data links and nodes provide several upgradable elements on both the space and ground systems. This paper will provide a general description of the testbeds system design and capabilities, discuss in detail the design and lessons learned in the implementation of the network protocols, and describe future plans for continuing research to meet the communication needs for evolving global space systems.

  3. Issues in designing transport layer multicast facilities

    NASA Technical Reports Server (NTRS)

    Dempsey, Bert J.; Weaver, Alfred C.

    1990-01-01

    Multicasting denotes a facility in a communications system for providing efficient delivery from a message's source to some well-defined set of locations using a single logical address. While modem network hardware supports multidestination delivery, first generation Transport Layer protocols (e.g., the DoD Transmission Control Protocol (TCP) (15) and ISO TP-4 (41)) did not anticipate the changes over the past decade in underlying network hardware, transmission speeds, and communication patterns that have enabled and driven the interest in reliable multicast. Much recent research has focused on integrating the underlying hardware multicast capability with the reliable services of Transport Layer protocols. Here, we explore the communication issues surrounding the design of such a reliable multicast mechanism. Approaches and solutions from the literature are discussed, and four experimental Transport Layer protocols that incorporate reliable multicast are examined.

  4. ECS: efficient communication scheduling for underwater sensor networks.

    PubMed

    Hong, Lu; Hong, Feng; Guo, Zhongwen; Li, Zhengbao

    2011-01-01

    TDMA protocols have attracted a lot of attention for underwater acoustic sensor networks (UWSNs), because of the unique characteristics of acoustic signal propagation such as great energy consumption in transmission, long propagation delay and long communication range. Previous TDMA protocols all allocated transmission time to nodes based on discrete time slots. This paper proposes an efficient continuous time scheduling TDMA protocol (ECS) for UWSNs, including the continuous time based and sender oriented conflict analysis model, the transmission moment allocation algorithm and the distributed topology maintenance algorithm. Simulation results confirm that ECS improves network throughput by 20% on average, compared to existing MAC protocols.

  5. Quantum counterfactual communication without a weak trace

    NASA Astrophysics Data System (ADS)

    Arvidsson-Shukur, D. R. M.; Barnes, C. H. W.

    2016-12-01

    The classical theories of communication rely on the assumption that there has to be a flow of particles from Bob to Alice in order for him to send a message to her. We develop a quantum protocol that allows Alice to perceive Bob's message "counterfactually"; that is, without Alice receiving any particles that have interacted with Bob. By utilizing a setup built on results from interaction-free measurements, we outline a communication protocol whereby the information travels in the opposite direction of the emitted particles. In comparison to previous attempts on such protocols, this one is such that a weak measurement at the message source would not leave a weak trace that could be detected by Alice's receiver. While some interaction-free schemes require a large number of carefully aligned beam splitters, our protocol is realizable with two or more beam splitters. We demonstrate this protocol by numerically solving the time-dependent Schrödinger equation for a Hamiltonian that implements this quantum counterfactual phenomenon.

  6. Network security system for health and medical information using smart IC card

    NASA Astrophysics Data System (ADS)

    Kanai, Yoichi; Yachida, Masuyoshi; Yoshikawa, Hiroharu; Yamaguchi, Masahiro; Ohyama, Nagaaki

    1998-07-01

    A new network security protocol that uses smart IC cards has been designed to assure the integrity and privacy of medical information in communication over a non-secure network. Secure communication software has been implemented as a library based on this protocol, which is called the Integrated Secure Communication Layer (ISCL), and has been incorporated into information systems of the National Cancer Center Hospitals and the Health Service Center of the Tokyo Institute of Technology. Both systems have succeeded in communicating digital medical information securely.

  7. Pilot-aided feedforward data recovery in optical coherent communications

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Qi, Bing

    2017-09-19

    A method and a system for pilot-aided feedforward data recovery are provided. The method and system include a receiver including a strong local oscillator operating in a free running mode independent of a signal light source. The phase relation between the signal light source and the local oscillator source is determined based on quadrature measurements on pilot pulses from the signal light source. Using the above phase relation, information encoded in an incoming signal can be recovered, optionally for use in communication with classical coherent communication protocols and quantum communication protocols.

  8. Test result communication in primary care: clinical and office staff perspectives.

    PubMed

    Litchfield, Ian J; Bentham, Louise M; Lilford, Richard J; Greenfield, Sheila M

    2014-10-01

    To understand how the results of laboratory tests are communicated to patients in primary care and perceptions on how the process may be improved. Qualitative study employing staff focus groups. Four UK primary care practices. Staff involved in the communication of test results. Five main themes emerged from the data: (i) the default method for communicating results differed between practices; (ii) clinical impact of results and patient characteristics such as anxiety level or health literacy influenced methods by which patients received their test result; (iii) which staff member had responsibility for the task was frequently unclear; (iv) barriers to communicating results existed, including there being no system or failsafe in place to determine whether results were returned to a practice or patient; (v) staff envisaged problems with a variety of test result communication methods discussed, including use of modern technologies, such as SMS messaging or online access. Communication of test results is a complex yet core primary care activity necessitating flexibility by both patients and staff. Dealing with the results from increasing numbers of tests is resource intensive and pressure on practice staff can be eased by greater utilization of electronic communication. Current systems appear vulnerable with no routine method of tracing delayed or missing results. Instead, practices only become aware of missing results following queries from patients. The creation of a test communication protocol for dissemination among patients and staff would help ensure both groups are aware of their roles and responsibilities. © The Author 2014. Published by Oxford University Press.

  9. Evaluation and modeling of HIV based on communication theory in biological systems.

    PubMed

    Dong, Miaowu; Li, Wenrong; Xu, Xi

    2016-12-01

    Some forms of communication are used in biological systems such as HIV transmission in human beings. In this paper, we plan to get a unique insight into biological communication systems generally through the analogy between HIV infection and electrical communication system. The model established in this paper can be used to test and simulate various communication systems since it provides researchers with an opportunity. We interpret biological communication systems by using telecommunications exemplification from a layered communication protocol developed before and use the model to indicate HIV spreading. We also implement a simulation of HIV infection based on the layered communication protocol to predict the development of this disease and the results prove the validity of the model. Copyright © 2016 Elsevier B.V. All rights reserved.

  10. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography.

    PubMed

    Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen

    2011-01-01

    User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das' protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs.

  11. A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

    PubMed Central

    Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen

    2011-01-01

    User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das’ protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs. PMID:22163874

  12. Effectiveness of music therapy as an aid to neurorestoration of children with severe neurological disorders.

    PubMed

    Bringas, Maria L; Zaldivar, Marilyn; Rojas, Pedro A; Martinez-Montes, Karelia; Chongo, Dora M; Ortega, Maria A; Galvizu, Reynaldo; Perez, Alba E; Morales, Lilia M; Maragoto, Carlos; Vera, Hector; Galan, Lidice; Besson, Mireille; Valdes-Sosa, Pedro A

    2015-01-01

    This study was a two-armed parallel group design aimed at testing real world effectiveness of a music therapy (MT) intervention for children with severe neurological disorders. The control group received only the standard neurorestoration program and the experimental group received an additional MT "Auditory Attention plus Communication protocol" just before the usual occupational and speech therapy. Multivariate Item Response Theory (MIRT) identified a neuropsychological status-latent variable manifested in all children and which exhibited highly significant changes only in the experimental group. Changes in brain plasticity also occurred in the experimental group, as evidenced using a Mismatch Event Related paradigm which revealed significant post intervention positive responses in the latency range between 308 and 400 ms in frontal regions. LORETA EEG source analysis identified prefrontal and midcingulate regions as differentially activated by the MT in the experimental group. Taken together, our results showing improved attention and communication as well as changes in brain plasticity in children with severe neurological impairments, confirm the importance of MT for the rehabilitation of patients across a wide range of dysfunctions.

  13. A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem.

    PubMed

    Zhao, Zhenguo

    2014-05-01

    With the fast advancement of the wireless communication technology and the widespread use of medical systems, the radio frequency identification (RFID) technology has been widely used in healthcare environments. As the first important protocol for ensuring secure communication in healthcare environment, the RFID authentication protocols derive more and more attentions. Most of RFID authentication protocols are based on hash function or symmetric cryptography. To get more security properties, elliptic curve cryptosystem (ECC) has been used in the design of RFID authentication protocol. Recently, Liao and Hsiao proposed a new RFID authentication protocol using ECC and claimed their protocol could withstand various attacks. In this paper, we will show that their protocol suffers from the key compromise problem, i.e. an adversary could get the private key stored in the tag. To enhance the security, we propose a new RFID authentication protocol using ECC. Detailed analysis shows the proposed protocol not only could overcome weaknesses in Liao and Hsiao's protocol but also has the same performance. Therefore, it is more suitable for healthcare environments.

  14. Jail-to-community treatment continuum for adults with co-occurring substance use and mental disorders: study protocol for a pilot randomized controlled trial.

    PubMed

    Van Dorn, Richard A; Desmarais, Sarah L; Rade, Candalyn B; Burris, Elizabeth N; Cuddeback, Gary S; Johnson, Kiersten L; Tueller, Stephen J; Comfort, Megan L; Mueser, Kim T

    2017-08-04

    Adults with co-occurring mental and substance use disorders (CODs) are overrepresented in jails. In-custody barriers to treatment, including a lack of evidence-based treatment options and the often short periods of incarceration, and limited communication between jails and community-based treatment agencies that can hinder immediate enrollment into community care once released have contributed to a cycle of limited treatment engagement, unaddressed criminogenic risks, and (re)arrest among this vulnerable and high-risk population. This paper describes a study that will develop research and communication protocols and adapt two evidence-based treatments, dual-diagnosis motivational interviewing (DDMI) and integrated group therapy (IGT), for delivery to adults with CODs across a jail-to-community treatment continuum. Adaptations to DDMI and IGT were guided by the Risk-Need-Responsivity model and the National Institute of Corrections' implementation competencies; the development of the implementation framework and communication protocols were guided by the Evidence-Based Interagency Implementation Model for community corrections and the Inter-organizational Relationship model, respectively. Implementation and evaluation of the protocols and adapted interventions will occur via an open trial and a pilot randomized trial. The clinical intervention consists of two in-jail DDMI sessions and 12 in-community IGT sessions. Twelve adults with CODs and four clinicians will participate in the open trial to evaluate the acceptability and feasibility of, and fidelity to, the interventions and research and communication protocols. The pilot controlled trial will be conducted with 60 inmates who will be randomized to either DDMI-IGT or treatment as usual. A baseline assessment will be conducted in jail, and four community-based assessments will be conducted during a 6-month follow-up period. Implementation, clinical, public health, and treatment preference outcomes will be evaluated. Findings have the potential to improve both jail- and community-based treatment services for adults with CODs as well as inform methods for conducting rigorous pilot implementation and evaluation research in correctional settings and as inmates re-enter the community. Findings will contribute to a growing area of work focused on interrupting the cycle of limited treatment engagement, unaddressed criminogenic risks, and (re)arrest among adults with CODs. ClinicalTrials.gov, NCT02214667 . Registered on 10 August 2014.

  15. Personal digital assistant-based, internet-enabled remote communication system for a wearable pneumatic biventricular assist device.

    PubMed

    Nam, Kyoung Won; Lee, Jung Joo; Hwang, Chang Mo; Choi, Seong Wook; Son, Ho Sung; Sun, Kyung

    2007-11-01

    Currently, personal mobile communication devices have become quite common, and the applications of such devices have expanded quickly. Remote communication systems might be employed for the telemonitoring of patients or the operating status of their medical devices. In this article, we describe the development of a mobile-based artificial heart telemanagement system for use in a wearable extracorporeal pneumatic biventricular assist device, which is capable of telemonitoring and telecontrolling the operating status of the ventricular assist device from any site. The system developed herein utilized small mobile phones for the client device and adopted a standard transmission control protocol/Internet protocol communication protocol for the purposes of telecommunication. The results of in vitro and animal experiments showed that the telemanagement system developed herein operated in accordance with the desired parameters.

  16. Stochastic Characterization of Communication Network Latency for Wide Area Grid Control Applications.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ameme, Dan Selorm Kwami; Guttromson, Ross

    This report characterizes communications network latency under various network topologies and qualities of service (QoS). The characterizations are probabilistic in nature, allowing deeper analysis of stability for Internet Protocol (IP) based feedback control systems used in grid applications. The work involves the use of Raspberry Pi computers as a proxy for a controlled resource, and an ns-3 network simulator on a Linux server to create an experimental platform (testbed) that can be used to model wide-area grid control network communications in smart grid. Modbus protocol is used for information transport, and Routing Information Protocol is used for dynamic route selectionmore » within the simulated network.« less

  17. Some Protocols For Optical-Fiber Digital Communications

    NASA Technical Reports Server (NTRS)

    Yeh, Cavour; Gerla, Mario

    1989-01-01

    One works best in heavy traffic, another, in light traffic. Three protocols proposed for digital communications among stations connected by passive taps to pair of uni-directional optical-fiber buses. Mediate round-robin, bounded-delay access to buses by all stations and particularly suited to fast transmission. Partly because transmission medium passive (no relay stations) and partly because protocols distribute control of network among all stations with provision for addition and deletion of stations (no control stations), communication network able to resist and recover from failures. Implicit token propagates in one direction on one bus and in opposite direction on other bus, minimizing interval of silence between end of one round and beginning of next.

  18. Establishing rational networking using the DL04 quantum secure direct communication protocol

    NASA Astrophysics Data System (ADS)

    Qin, Huawang; Tang, Wallace K. S.; Tso, Raylin

    2018-06-01

    The first rational quantum secure direct communication scheme is proposed, in which we use the game theory with incomplete information to model the rational behavior of the participant, and give the strategy space and utility function. The rational participant can get his maximal utility when he performs the protocol faithfully, and then the Nash equilibrium of the protocol can be achieved. Compared to the traditional schemes, our scheme will be more practical in the presence of rational participant.

  19. Data Management Working Group report

    NASA Technical Reports Server (NTRS)

    Filardo, Edward J.; Smith, David B.

    1986-01-01

    The current flight qualification program lags technology insertion by 6 to 10 years. The objective is to develop an integrated software engineering and development environment assisted by an expert system technology. An operating system needs to be developed which is portable to the on-board computers of the year 2000. The use of ADA verses a High-Order Language; fault tolerance; fiber optics networks; communication protocols; and security are also examined and outlined.

  20. Creating COMFORT: A Communication-Based Model for Breaking Bad News

    ERIC Educational Resources Information Center

    Villagran, Melinda; Goldsmith, Joy; Wittenberg-Lyles, Elaine; Baldwin, Paula

    2010-01-01

    This study builds upon existing protocols for breaking bad news (BBN), and offers an interaction-based approach to communicating comfort to patients and their families. The goal was to analyze medical students' (N = 21) videotaped standardized patient BBN interactions after completing an instructional unit on a commonly used BBN protocol, commonly…

  1. Considerations on communications network protocols in deep space

    NASA Technical Reports Server (NTRS)

    Clare, L. P.; Agre, J. R.; Yan, T.

    2001-01-01

    Communications supporting deep space missions impose numerous unique constraints that impact the architectural choices made for cost-effectiveness. We are entering the era where networks that exist in deep space are needed to support planetary exploration. Cost-effective performance will require a balanced integration of applicable widely used standard protocols with new and innovative designs.

  2. Corporations' Resistance to Innovation: The Adoption of the Internet Protocol Version 6

    ERIC Educational Resources Information Center

    Pazdrowski, Tomasz

    2013-01-01

    Computer networks that brought unprecedented growth in global communication have been using Internet Protocol version 4 (IPv4) as a standard for routing. The exponential increase in the use of the networks caused an acute shortage of available identification numbers (IP addresses). The shortage and other network communication issues are…

  3. Automatic Coding of Dialogue Acts in Collaboration Protocols

    ERIC Educational Resources Information Center

    Erkens, Gijsbert; Janssen, Jeroen

    2008-01-01

    Although protocol analysis can be an important tool for researchers to investigate the process of collaboration and communication, the use of this method of analysis can be time consuming. Hence, an automatic coding procedure for coding dialogue acts was developed. This procedure helps to determine the communicative function of messages in online…

  4. Protocol Architecture Model Report

    NASA Technical Reports Server (NTRS)

    Dhas, Chris

    2000-01-01

    NASA's Glenn Research Center (GRC) defines and develops advanced technology for high priority national needs in communications technologies for application to aeronautics and space. GRC tasked Computer Networks and Software Inc. (CNS) to examine protocols and architectures for an In-Space Internet Node. CNS has developed a methodology for network reference models to support NASA's four mission areas: Earth Science, Space Science, Human Exploration and Development of Space (REDS), Aerospace Technology. This report applies the methodology to three space Internet-based communications scenarios for future missions. CNS has conceptualized, designed, and developed space Internet-based communications protocols and architectures for each of the independent scenarios. The scenarios are: Scenario 1: Unicast communications between a Low-Earth-Orbit (LEO) spacecraft inspace Internet node and a ground terminal Internet node via a Tracking and Data Rela Satellite (TDRS) transfer; Scenario 2: Unicast communications between a Low-Earth-Orbit (LEO) International Space Station and a ground terminal Internet node via a TDRS transfer; Scenario 3: Multicast Communications (or "Multicasting"), 1 Spacecraft to N Ground Receivers, N Ground Transmitters to 1 Ground Receiver via a Spacecraft.

  5. Streetlight Control System Based on Wireless Communication over DALI Protocol

    PubMed Central

    Bellido-Outeiriño, Francisco José; Quiles-Latorre, Francisco Javier; Moreno-Moreno, Carlos Diego; Flores-Arias, José María; Moreno-García, Isabel; Ortiz-López, Manuel

    2016-01-01

    Public lighting represents a large part of the energy consumption of towns and cities. Efficient management of public lighting can entail significant energy savings. This work presents a smart system for managing public lighting networks based on wireless communication and the DALI protocol. Wireless communication entails significant economic savings, as there is no need to install new wiring and visual impacts and damage to the facades of historical buildings in city centers are avoided. The DALI protocol uses bidirectional communication with the ballast, which allows its status to be controlled and monitored at all times. The novelty of this work is that it tackles all aspects related to the management of public lighting: a standard protocol, DALI, was selected to control the ballast, a wireless node based on the IEEE 802.15.4 standard with a DALI interface was designed, a network layer that considers the topology of the lighting network has been developed, and lastly, some user-friendly applications for the control and maintenance of the system by the technical crews of the different towns and cities have been developed. PMID:27128923

  6. Deterministic secure quantum communication using a single d-level system.

    PubMed

    Jiang, Dong; Chen, Yuanyuan; Gu, Xuemei; Xie, Ling; Chen, Lijun

    2017-03-22

    Deterministic secure quantum communication (DSQC) can transmit secret messages between two parties without first generating a shared secret key. Compared with quantum key distribution (QKD), DSQC avoids the waste of qubits arising from basis reconciliation and thus reaches higher efficiency. In this paper, based on data block transmission and order rearrangement technologies, we propose a DSQC protocol. It utilizes a set of single d-level systems as message carriers, which are used to directly encode the secret message in one communication process. Theoretical analysis shows that these employed technologies guarantee the security, and the use of a higher dimensional quantum system makes our protocol achieve higher security and efficiency. Since only quantum memory is required for implementation, our protocol is feasible with current technologies. Furthermore, Trojan horse attack (THA) is taken into account in our protocol. We give a THA model and show that THA significantly increases the multi-photon rate and can thus be detected.

  7. Developing a Standard Method for Link-Layer Security of CCSDS Space Communications

    NASA Technical Reports Server (NTRS)

    Biggerstaff, Craig

    2009-01-01

    Communications security for space systems has been a specialized field generally far removed from considerations of mission interoperability and cross-support in fact, these considerations often have been viewed as intrinsically opposed to security objectives. The space communications protocols defined by the Consultative Committee for Space Data Systems (CCSDS) have a twenty-five year history of successful use in over 400 missions. While the CCSDS Telemetry, Telecommand, and Advancing Orbiting Systems protocols for use at OSI Layer 2 are operationally mature, there has been no direct support within these protocols for communications security techniques. Link-layer communications security has been successfully implemented in the past using mission-unique methods, but never before with an objective of facilitating cross-support and interoperability. This paper discusses the design of a standard method for cryptographic authentication, encryption, and replay protection at the data link layer that can be integrated into existing CCSDS protocols without disruption to legacy communications services. Integrating cryptographic operations into existing data structures and processing sequences requires a careful assessment of the potential impediments within spacecraft, ground stations, and operations centers. The objective of this work is to provide a sound method for cryptographic encapsulation of frame data that also facilitates Layer 2 virtual channel switching, such that a mission may procure data transport services as needed without involving third parties in the cryptographic processing, or split independent data streams for separate cryptographic processing.

  8. CAPTIONALS: A computer aided testing environment for the verification and validation of communication protocols

    NASA Technical Reports Server (NTRS)

    Feng, C.; Sun, X.; Shen, Y. N.; Lombardi, Fabrizio

    1992-01-01

    This paper covers the verification and protocol validation for distributed computer and communication systems using a computer aided testing approach. Validation and verification make up the so-called process of conformance testing. Protocol applications which pass conformance testing are then checked to see whether they can operate together. This is referred to as interoperability testing. A new comprehensive approach to protocol testing is presented which address: (1) modeling for inter-layer representation for compatibility between conformance and interoperability testing; (2) computational improvement to current testing methods by using the proposed model inclusive of formulation of new qualitative and quantitative measures and time-dependent behavior; (3) analysis and evaluation of protocol behavior for interactive testing without extensive simulation.

  9. Low-earth-orbit Satellite Internet Protocol Communications Concept and Design

    NASA Technical Reports Server (NTRS)

    Slywezak, Richard A.

    2004-01-01

    This report presents a design concept for a low-Earth-orbit end-to-end Internet-Protocol- (IP-) based mission. The goal is to maintain an up-to-date communications infrastructure that makes communications seamless with the protocols used in terrestrial computing. It is based on the premise that the use of IPs will permit greater interoperability while also reducing costs and providing users the ability to retrieve data directly from the satellite. However, implementing an IP-based solution also has a number of challenges, since wireless communications have different characteristics than wired communications. This report outlines the design of a low-Earth-orbit end-to-end IP-based mission; the ideas and concepts of Space Internet architectures and networks are beyond the scope of this document. The findings of this report show that an IP-based mission is plausible and would provide benefits to the user community, but the outstanding issues must be resolved before a design can be implemented.

  10. Comment on "Particle path through a nested Mach-Zehnder interferometer"

    NASA Astrophysics Data System (ADS)

    Salih, Hatim

    2018-02-01

    In a recent paper [Phys. Rev. A 94, 032115 (2016), 10.1103/PhysRevA.94.032115], Griffiths questioned—based on an interesting consistent-histories (CH) argument—the counterfactuality, for one of the bit choices, of the protocol of Salih et al. for communicating without sending physical particles [Phys. Rev. Lett. 110, 170502 (2013), 10.1103/PhysRevLett.110.170502]. Here, we first show that for the Mach-Zehnder version used to explain our protocol, contrary to Griffiths's claim, no family of consistent histories exists where any history has the photon traveling through the communication channel, thus rendering the question of whether the photon was in the communication channel meaningless from a CH viewpoint. We then show that for the actual Michelson-type protocol, there is a consistent-histories family for each cycle that includes histories where the photon travels through the communication channel. We show that the probability of finding the photon in the communication channel at any time is zero—proving complete counterfactuality.

  11. Evaluation of Patient Handoff Methods on an Inpatient Teaching Service

    PubMed Central

    Craig, Steven R.; Smith, Hayden L.; Downen, A. Matthew; Yost, W. John

    2012-01-01

    Background The patient handoff process can be a highly variable and unstructured period at risk for communication errors. The morning sign-in process used by resident physicians at teaching hospitals typically involves less rigorous handoff protocols than the resident evening sign-out process. Little research has been conducted on best practices for handoffs during morning sign-in exchanges between resident physicians. Research must evaluate optimal protocols for the resident morning sign-in process. Methods Three morning handoff protocols consisting of written, electronic, and face-to-face methods were implemented over 3 study phases during an academic year. Study participants included all interns covering the internal medicine inpatient teaching service at a tertiary hospital. Study measures entailed intern survey-based interviews analyzed for failures in handoff protocols with or without missed pertinent information. Descriptive and comparative analyses examined study phase differences. Results A scheduled face-to-face handoff process had the fewest protocol deviations and demonstrated best communication of essential patient care information between cross-covering teams compared to written and electronic sign-in protocols. Conclusion Intern patient handoffs were more reliable when the sign-in protocol included scheduled face-to-face meetings. This method provided the best communication of patient care information and allowed for open exchanges of information. PMID:23267259

  12. Strategies and challenges for communicating the diagnosis of cancer in cross-cultural clinical settings-Perspectives from South African healthcare professionals.

    PubMed

    Brown, Ottilia; Goliath, Veonna; van Rooyen, Dalena R M; Aldous, Colleen; Marais, Leonard Charles

    2017-01-01

    Communicating the diagnosis of cancer in cross-cultural clinical settings is a complex task. This qualitative research article describes the content and process of informing Zulu patients in South Africa of the diagnosis of cancer, using osteosarcoma as the index diagnosis. We used a descriptive research design with census sampling and focus group interviews. We used an iterative thematic data analysis process and Guba's model of trustworthiness to ensure scientific rigor. Our results reinforced the use of well-accepted strategies for communicating the diagnosis of cancer. In addition, new strategies emerged which may be useful in other cross-cultural settings. These strategies included using the stages of cancer to explain the disease and its progression and instilling hope using a multidisciplinary team care model. We identified several patients, professionals, and organizational factors that complicate cross-cultural communication. We conclude by recommending the development of protocols for communication in these cross-cultural clinical settings.

  13. Experimental Quantum Coin Tossing

    NASA Astrophysics Data System (ADS)

    Molina-Terriza, G.; Vaziri, A.; Ursin, R.; Zeilinger, A.

    2005-01-01

    In this Letter we present the first implementation of a quantum coin-tossing protocol. This protocol belongs to a class of “two-party” cryptographic problems, where the communication partners distrust each other. As with a number of such two-party protocols, the best implementation of the quantum coin tossing requires qutrits, resulting in a higher security than using qubits. In this way, we have also performed the first complete quantum communication protocol with qutrits. In our experiment the two partners succeeded to remotely toss a row of coins using photons entangled in the orbital angular momentum. We also show the experimental bounds of a possible cheater and the ways of detecting him.

  14. ECS: Efficient Communication Scheduling for Underwater Sensor Networks

    PubMed Central

    Hong, Lu; Hong, Feng; Guo, Zhongwen; Li, Zhengbao

    2011-01-01

    TDMA protocols have attracted a lot of attention for underwater acoustic sensor networks (UWSNs), because of the unique characteristics of acoustic signal propagation such as great energy consumption in transmission, long propagation delay and long communication range. Previous TDMA protocols all allocated transmission time to nodes based on discrete time slots. This paper proposes an efficient continuous time scheduling TDMA protocol (ECS) for UWSNs, including the continuous time based and sender oriented conflict analysis model, the transmission moment allocation algorithm and the distributed topology maintenance algorithm. Simulation results confirm that ECS improves network throughput by 20% on average, compared to existing MAC protocols. PMID:22163775

  15. The Integrated Safety-Critical Advanced Avionics Communication and Control (ISAACC) System Concept: Infrastructure for ISHM

    NASA Technical Reports Server (NTRS)

    Gwaltney, David A.; Briscoe, Jeri M.

    2005-01-01

    Integrated System Health Management (ISHM) architectures for spacecraft will include hard real-time, critical subsystems and soft real-time monitoring subsystems. Interaction between these subsystems will be necessary and an architecture supporting multiple criticality levels will be required. Demonstration hardware for the Integrated Safety-Critical Advanced Avionics Communication & Control (ISAACC) system has been developed at NASA Marshall Space Flight Center. It is a modular system using a commercially available time-triggered protocol, ?Tp/C, that supports hard real-time distributed control systems independent of the data transmission medium. The protocol is implemented in hardware and provides guaranteed low-latency messaging with inherent fault-tolerance and fault-containment. Interoperability between modules and systems of modules using the TTP/C is guaranteed through definition of messages and the precise message schedule implemented by the master-less Time Division Multiple Access (TDMA) communications protocol. "Plug-and-play" capability for sensors and actuators provides automatically configurable modules supporting sensor recalibration and control algorithm re-tuning without software modification. Modular components of controlled physical system(s) critical to control algorithm tuning, such as pumps or valve components in an engine, can be replaced or upgraded as "plug and play" components without modification to the ISAACC module hardware or software. ISAACC modules can communicate with other vehicle subsystems through time-triggered protocols or other communications protocols implemented over Ethernet, MIL-STD- 1553 and RS-485/422. Other communication bus physical layers and protocols can be included as required. In this way, the ISAACC modules can be part of a system-of-systems in a vehicle with multi-tier subsystems of varying criticality. The goal of the ISAACC architecture development is control and monitoring of safety critical systems of a manned spacecraft. These systems include spacecraft navigation and attitude control, propulsion, automated docking, vehicle health management and life support. ISAACC can integrate local critical subsystem health management with subsystems performing long term health monitoring. The ISAACC system and its relationship to ISHM will be presented.

  16. Managing barriers to empathy in the clinical encounter: a qualitative interview study with GPs.

    PubMed

    Derksen, Frans Awm; Olde Hartman, Tim C; Bensing, Jozien M; Lagro-Janssen, Antoine Lm

    2016-12-01

    Current daily general practice has become increasingly technical and somatically oriented (where attention to patients' feelings is decreased) due to an increase in protocol-based guidelines. Priorities in GP-patient communication have shifted from a focus on listening and empathy to task-oriented communication. To explore what barriers GPs experience when applying empathy in daily practice, and how these barriers are managed. Thirty Dutch GPs with sufficient heterogeneity in sex, age, type of practice, and rural or urban setting were interviewed. The consolidated criteria for reporting qualitative research (COREQ) were applied. The verbatim transcripts were then analysed. According to participating GPs, the current emphasis on protocol-driven care can be a significant barrier to genuineness in communication. Other potential barriers mentioned were time pressures and constraints, and dealing with patients displaying 'unruly behaviour' or those with personality disorders. GPs indicated that it can be difficult to balance emotional involvement and professional distance. Longer consulting times, smaller practice populations, and efficient practice organisation were described as practical solutions. In order to focus on a patient-as-person approach, GPs strongly suggested that deviating from guidelines should be possible when necessary as an element of good-quality care. Joining intercollegiate counselling groups was also discussed. In addition to practical solutions for barriers to behaving empathically, GPs indicated that they needed more freedom to balance working with protocols and guidelines, as well as a patient-as-person and patient-as-partner approach. This balance is necessary to remain connected with patients and to deliver care that is truly personal. © British Journal of General Practice 2016.

  17. ICC '86; Proceedings of the International Conference on Communications, Toronto, Canada, June 22-25, 1986, Conference Record. Volumes 1, 2, & 3

    NASA Astrophysics Data System (ADS)

    Papers are presented on ISDN, mobile radio systems and techniques for digital connectivity, centralized and distributed algorithms in computer networks, communications networks, quality assurance and impact on cost, adaptive filters in communications, the spread spectrum, signal processing, video communication techniques, and digital satellite services. Topics discussed include performance evaluation issues for integrated protocols, packet network operations, the computer network theory and multiple-access, microwave single sideband systems, switching architectures, fiber optic systems, wireless local communications, modulation, coding, and synchronization, remote switching, software quality, transmission, and expert systems in network operations. Consideration is given to wide area networks, image and speech processing, office communications application protocols, multimedia systems, customer-controlled network operations, digital radio systems, channel modeling and signal processing in digital communications, earth station/on-board modems, computer communications system performance evaluation, source encoding, compression, and quantization, and adaptive communications systems.

  18. FLTSATCOM interoperability applications

    NASA Astrophysics Data System (ADS)

    Woolford, Lynn

    A mobile Fleet Satellite Communications (FLTSATCOM) system called the Mobile Operational Control Center (MOCC) was developed which has demonstrated the ability to be interoperable with many of the current FLTSATCOM command and control channels. This low-cost system is secure in all its communications, is lightweight, and provides a gateway for other communications formats. The major elements of this system are made up of a personal computer, a protocol microprocessor, and off-the-shelf mobile communication components. It is concluded that with both FLTSATCOM channel protocol and data format interoperability, the MOCC has the ability provide vital information in or near real time, which significantly improves mission effectiveness.

  19. Building a gateway with open source software for secure-DICOM communication over insecure networks

    NASA Astrophysics Data System (ADS)

    Emmel, Dirk; Ricke, Jens; Stohlmann, Lutz; Haderer, Alexander; Felix, Roland

    2002-05-01

    For Teleradiology the exchange of DICOM-images is needed for several purposes. Existing solutions often don't consider about the needs for data security and data privacy. Communication is done without any encryption over insecure networks or with encryption using proprietary solutions, which reduces the data communication possibilities to partners with the same equipment. Our goal was to build a gateway, which offers a transparent solution for secure DICOM-communication in a heterogeneous environment We developed a PC-based gateway system with DICOM-communication to the in-house network and secure DICOM communication for the communication over the insecure network. One gateway installed at each location is responsible for encryption/decryption. The sender just transfers the image data over the DICOM protocol to the local gateway. The gateway forwards the data to the gateway on the destination site using the secure DICOM protocol, which is part of the DICOM standard. The receiving gateway forwards the image data to the final destination again using the DICOM-Protocol. The gateway is based on Open Source software and runs under several operating systems. Our experience shows a reliable solution, which solves security issues for DICOM communication of image data and integrates seamless into a heterogeneous DICOM environment.

  20. Implementation and Analysis of Real-Time Streaming Protocols.

    PubMed

    Santos-González, Iván; Rivero-García, Alexandra; Molina-Gil, Jezabel; Caballero-Gil, Pino

    2017-04-12

    Communication media have become the primary way of interaction thanks to the discovery and innovation of many new technologies. One of the most widely used communication systems today is video streaming, which is constantly evolving. Such communications are a good alternative to face-to-face meetings, and are therefore very useful for coping with many problems caused by distance. However, they suffer from different issues such as bandwidth limitation, network congestion, energy efficiency, cost, reliability and connectivity. Hence, the quality of service and the quality of experience are considered the two most important issues for this type of communication. This work presents a complete comparative study of two of the most used protocols of video streaming, Real Time Streaming Protocol (RTSP) and the Web Real-Time Communication (WebRTC). In addition, this paper proposes two new mobile applications that implement those protocols in Android whose objective is to know how they are influenced by the aspects that most affect the streaming quality of service, which are the connection establishment time and the stream reception time. The new video streaming applications are also compared with the most popular video streaming applications for Android, and the experimental results of the analysis show that the developed WebRTC implementation improves the performance of the most popular video streaming applications with respect to the stream packet delay.

  1. Interoperative fundus image and report sharing in compliance with integrating the healthcare enterprise conformance and web access to digital imaging and communication in medicine persistent object protocol.

    PubMed

    Wu, Hui-Qun; Lv, Zheng-Min; Geng, Xing-Yun; Jiang, Kui; Tang, Le-Min; Zhou, Guo-Min; Dong, Jian-Cheng

    2013-01-01

    To address issues in interoperability between different fundus image systems, we proposed a web eye-picture archiving and communication system (PACS) framework in conformance with digital imaging and communication in medicine (DICOM) and health level 7 (HL7) protocol to realize fundus images and reports sharing and communication through internet. Firstly, a telemedicine-based eye care work flow was established based on integrating the healthcare enterprise (IHE) Eye Care technical framework. Then, a browser/server architecture eye-PACS system was established in conformance with the web access to DICOM persistent object (WADO) protocol, which contains three tiers. In any client system installed with web browser, clinicians could log in the eye-PACS to observe fundus images and reports. Multipurpose internet mail extensions (MIME) type of a structured report is saved as pdf/html with reference link to relevant fundus image using the WADO syntax could provide enough information for clinicians. Some functions provided by open-source Oviyam could be used to query, zoom, move, measure, view DICOM fundus images. Such web eye-PACS in compliance to WADO protocol could be used to store and communicate fundus images and reports, therefore is of great significance for teleophthalmology.

  2. Experimental plug and play quantum coin flipping.

    PubMed

    Pappa, Anna; Jouguet, Paul; Lawson, Thomas; Chailloux, André; Legré, Matthieu; Trinkler, Patrick; Kerenidis, Iordanis; Diamanti, Eleni

    2014-04-24

    Performing complex cryptographic tasks will be an essential element in future quantum communication networks. These tasks are based on a handful of fundamental primitives, such as coin flipping, where two distrustful parties wish to agree on a randomly generated bit. Although it is known that quantum versions of these primitives can offer information-theoretic security advantages with respect to classical protocols, a demonstration of such an advantage in a practical communication scenario has remained elusive. Here we experimentally implement a quantum coin flipping protocol that performs strictly better than classically possible over a distance suitable for communication over metropolitan area optical networks. The implementation is based on a practical plug and play system, developed by significantly enhancing a commercial quantum key distribution device. Moreover, we provide combined quantum coin flipping protocols that are almost perfectly secure against bounded adversaries. Our results offer a useful toolbox for future secure quantum communications.

  3. Data Relay Board with Protocol for High-Speed, Free-Space Optical Communications

    NASA Technical Reports Server (NTRS)

    Wright, Malcolm; Clare, Loren; Gould, Gary; Pedyash, Maxim

    2004-01-01

    In a free-space optical communication system, the mitigation of transient outages through the incorporation of error-control methods is of particular concern, the outages being caused by scintillation fades and obscurants. The focus of this innovative technology is the development of a data relay system for a reliable high-data-rate free-spacebased optical-transport network. The data relay boards will establish the link, maintain synchronous connection, group the data into frames, and provide for automatic retransmission (ARQ) of lost or erred frames. A certain Quality of Service (QoS) can then be ensured, compatible with the required data rate. The protocol to be used by the data relay system is based on the draft CCSDS standard data-link protocol Proximity-1, selected by orbiters to multiple lander assets in the Mars network, for example. In addition to providing data-link protocol capabilities for the free-space optical link and buffering the data, the data relay system will interface directly with user applications over Gigabit Ethernet and/or with highspeed storage resources via Fibre Channel. The hardware implementation is built on a network-processor-based architecture. This technology combines the power of a hardware switch capable of data switching and packet routing at Gbps rates, with the flexibility of a software- driven processor that can host highly adaptive and reconfigurable protocols used, for example, in wireless local-area networks (LANs). The system will be implemented in a modular multi-board fashion. The main hardware elements of the data relay system are the new data relay board developed by Rockwell Scientific, a COTS Gigabit Ethernet board for user interface, and a COTS Fibre Channel board that connects to local storage. The boards reside in a cPCI back plane, and can be housed in a VME-type enclosure.

  4. TMS communications software. Volume 2: Bus interface unit

    NASA Technical Reports Server (NTRS)

    Gregor, P. J.

    1979-01-01

    A data bus communication system to support the space shuttle's Trend Monitoring System (TMS) and to provide a basis for evaluation of the bus concept is described. Installation of the system included developing both hardware and software interfaces between the bus and the specific TMS computers and terminals. The software written for the microprocessor-based bus interface units is described. The software implements both the general bus communications protocol and also the specific interface protocols for the TMS computers and terminals.

  5. Quantifying the nonlocality of Greenberger-Horne-Zeilinger quantum correlations by a bounded communication simulation protocol.

    PubMed

    Branciard, Cyril; Gisin, Nicolas

    2011-07-08

    The simulation of quantum correlations with finite nonlocal resources, such as classical communication, gives a natural way to quantify their nonlocality. While multipartite nonlocal correlations appear to be useful resources, very little is known on how to simulate multipartite quantum correlations. We present a protocol that reproduces tripartite Greenberger-Horne-Zeilinger correlations with bounded communication: 3 bits in total turn out to be sufficient to simulate all equatorial Von Neumann measurements on the tripartite Greenberger-Horne-Zeilinger state.

  6. Remote direct memory access over datagrams

    DOEpatents

    Grant, Ryan Eric; Rashti, Mohammad Javad; Balaji, Pavan; Afsahi, Ahmad

    2014-12-02

    A communication stack for providing remote direct memory access (RDMA) over a datagram network is disclosed. The communication stack has a user level interface configured to accept datagram related input and communicate with an RDMA enabled network interface card (NIC) via an NIC driver. The communication stack also has an RDMA protocol layer configured to supply one or more data transfer primitives for the datagram related input of the user level. The communication stack further has a direct data placement (DDP) layer configured to transfer the datagram related input from a user storage to a transport layer based on the one or more data transfer primitives by way of a lower layer protocol (LLP) over the datagram network.

  7. Quantum communication complexity of establishing a shared reference frame.

    PubMed

    Rudolph, Terry; Grover, Lov

    2003-11-21

    We discuss the aligning of spatial reference frames from a quantum communication complexity perspective. This enables us to analyze multiple rounds of communication and give several simple examples demonstrating tradeoffs between the number of rounds and the type of communication. Using a distributed variant of a quantum computational algorithm, we give an explicit protocol for aligning spatial axes via the exchange of spin-1/2 particles which makes no use of either exchanged entangled states, or of joint measurements. This protocol achieves a worst-case fidelity for the problem of "direction finding" that is asymptotically equivalent to the optimal average case fidelity achievable via a single forward communication of entangled states.

  8. Energy star compliant voice over internet protocol (VoIP) telecommunications network including energy star compliant VoIP devices

    DOEpatents

    Kouchri, Farrokh Mohammadzadeh

    2012-11-06

    A Voice over Internet Protocol (VoIP) communications system, a method of managing a communications network in such a system and a program product therefore. The system/network includes an ENERGY STAR (E-star) aware softswitch and E-star compliant communications devices at system endpoints. The E-star aware softswitch allows E-star compliant communications devices to enter and remain in power saving mode. The E-star aware softswitch spools messages and forwards only selected messages (e.g., calls) to the devices in power saving mode. When the E-star compliant communications devices exit power saving mode, the E-star aware softswitch forwards spooled messages.

  9. Space Link Extension (SLE) Emulation for High-Throughput Network Communication

    NASA Technical Reports Server (NTRS)

    Murawski, Robert W.; Tchorowski, Nicole; Golden, Bert

    2014-01-01

    As the data rate requirements for space communications increases, significant stress is placed not only on the wireless satellite communication links, but also on the ground networks which forward data from end-users to remote ground stations. These wide area network (WAN) connections add delay and jitter to the end-to-end satellite communication link, effects which can have significant impacts on the wireless communication link. It is imperative that any ground communication protocol can react to these effects such that the ground network does not become a bottleneck in the communication path to the satellite. In this paper, we present our SCENIC Emulation Lab testbed which was developed to test the CCSDS SLE protocol implementations proposed for use on future NASA communication networks. Our results show that in the presence of realistic levels of network delay, high-throughput SLE communication links can experience significant data rate throttling. Based on our observations, we present some insight into why this data throttling happens, and trace the probable issue back to non-optimal blocking communication which is sup-ported by the CCSDS SLE API recommended practices. These issues were presented as well to the SLE implementation developers which, based on our reports, developed a new release for SLE which we show fixes the SLE blocking issue and greatly improves the protocol throughput. In this paper, we also discuss future developments for our end-to-end emulation lab and how these improvements can be used to develop and test future space communication technologies.

  10. Privacy-Assured Aggregation Protocol for Smart Metering: A Proactive Fault-Tolerant Approach [Proactive Fault-Tolerant Aggregation Protocol for Privacy-Assured Smart Metering

    DOE PAGES

    Won, Jongho; Ma, Chris Y. T.; Yau, David K. Y.; ...

    2016-06-01

    Smart meters are integral to demand response in emerging smart grids, by reporting the electricity consumption of users to serve application needs. But reporting real-time usage information for individual households raises privacy concerns. Existing techniques to guarantee differential privacy (DP) of smart meter users either are not fault tolerant or achieve (possibly partial) fault tolerance at high communication overheads. In this paper, we propose a fault-tolerant protocol for smart metering that can handle general communication failures while ensuring DP with significantly improved efficiency and lower errors compared with the state of the art. Our protocol handles fail-stop faults proactively bymore » using a novel design of future ciphertexts, and distributes trust among the smart meters by sharing secret keys among them. We prove the DP properties of our protocol and analyze its advantages in fault tolerance, accuracy, and communication efficiency relative to competing techniques. We illustrate our analysis by simulations driven by real-world traces of electricity consumption.« less

  11. Privacy-Assured Aggregation Protocol for Smart Metering: A Proactive Fault-Tolerant Approach [Proactive Fault-Tolerant Aggregation Protocol for Privacy-Assured Smart Metering

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Won, Jongho; Ma, Chris Y. T.; Yau, David K. Y.

    Smart meters are integral to demand response in emerging smart grids, by reporting the electricity consumption of users to serve application needs. But reporting real-time usage information for individual households raises privacy concerns. Existing techniques to guarantee differential privacy (DP) of smart meter users either are not fault tolerant or achieve (possibly partial) fault tolerance at high communication overheads. In this paper, we propose a fault-tolerant protocol for smart metering that can handle general communication failures while ensuring DP with significantly improved efficiency and lower errors compared with the state of the art. Our protocol handles fail-stop faults proactively bymore » using a novel design of future ciphertexts, and distributes trust among the smart meters by sharing secret keys among them. We prove the DP properties of our protocol and analyze its advantages in fault tolerance, accuracy, and communication efficiency relative to competing techniques. We illustrate our analysis by simulations driven by real-world traces of electricity consumption.« less

  12. An upper bound on the second order asymptotic expansion for the quantum communication cost of state redistribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Datta, Nilanjana, E-mail: n.datta@statslab.cam.ac.uk; Hsieh, Min-Hsiu, E-mail: Min-Hsiu.Hsieh@uts.edu.au; Oppenheim, Jonathan, E-mail: j.oppenheim@ucl.ac.uk

    State redistribution is the protocol in which given an arbitrary tripartite quantum state, with two of the subsystems initially being with Alice and one being with Bob, the goal is for Alice to send one of her subsystems to Bob, possibly with the help of prior shared entanglement. We derive an upper bound on the second order asymptotic expansion for the quantum communication cost of achieving state redistribution with a given finite accuracy. In proving our result, we also obtain an upper bound on the quantum communication cost of this protocol in the one-shot setting, by using the protocol ofmore » coherent state merging as a primitive.« less

  13. A hybrid MAC protocol design for energy-efficient very-high-throughput millimeter wave, wireless sensor communication networks

    NASA Astrophysics Data System (ADS)

    Jian, Wei; Estevez, Claudio; Chowdhury, Arshad; Jia, Zhensheng; Wang, Jianxin; Yu, Jianguo; Chang, Gee-Kung

    2010-12-01

    This paper presents an energy-efficient Medium Access Control (MAC) protocol for very-high-throughput millimeter-wave (mm-wave) wireless sensor communication networks (VHT-MSCNs) based on hybrid multiple access techniques of frequency division multiplexing access (FDMA) and time division multiplexing access (TDMA). An energy-efficient Superframe for wireless sensor communication network employing directional mm-wave wireless access technologies is proposed for systems that require very high throughput, such as high definition video signals, for sensing, processing, transmitting, and actuating functions. Energy consumption modeling for each network element and comparisons among various multi-access technologies in term of power and MAC layer operations are investigated for evaluating the energy-efficient improvement of proposed MAC protocol.

  14. TeleHealth networks: Instant messaging and point-to-point communication over the internet

    NASA Astrophysics Data System (ADS)

    Sachpazidis, Ilias; Ohl, Roland; Kontaxakis, George; Sakas, Georgios

    2006-12-01

    This paper explores the advantages and disadvantages of a medical network based on point-to-point communication and a medical network based on Jabber instant messaging protocol. Instant messaging might be, for many people, a convenient way of chatting over the Internet. We will attempt to illustrate how an instant messaging protocol could serve in the best way medical services and provide great flexibility to the involved parts. Additionally, the directory services and presence status offered by the Jabber protocol make it very attractive to medical applications that need to have real time and store and forward communication. Furthermore, doctors connected to Internet via high-speed networks could benefit by saving time due to the data transmission acceleration over Jabber.

  15. Oral hygiene compliance in orthodontic patients: a randomized controlled study on the effects of a post-treatment communication.

    PubMed

    Cozzani, Mauro; Ragazzini, Giulia; Delucchi, Alessia; Mutinelli, Sabrina; Barreca, Carlo; Rinchuse, Daniel J; Servetto, Roberto; Piras, Vincenzo

    2016-12-01

    Several studies have recently demonstrated that a post-treatment communication to explain the importance of an oral hygiene can improve the orthodontic patients' compliance over a period of 66 days. The main goal of this study is to evaluate the effects of a structured follow-up communication after orthodontic appliance application on oral hygiene compliance after 30-40 days. Eighty-four orthodontic participants enrolled from patients who were beginning fixed orthodontic treatment at the Orthodontic Department, Gaslini Hospital, Genova, between July and October 2014 were randomly assigned to one of three trial arms. Before the bonding, all patients underwent a session of oral hygiene aimed at obtaining an plaque index of "zero." At the following orthodontic appointment, the plaque index was calculated for each patient in order to assess oral hygiene compliance. The first group served as control and did not receive any post-procedure communication, the second group received a structured text message giving reassurance, and the third group received a structured telephone call. Participants were blinded to group assignment and were not made aware that the text message or the telephone call was part of the study. (The research protocol was approved by the Italian Comitato Etico Regionale della Liguria-sezione 3^ c/o IRCCS-Istituto G. Gaslini 845/2014, and it is not registered in the trial's register.) RESULTS: Thirty patients were randomly assigned to the control group, 28 participants to the text message group, and 26 to the telephone group. Participants who received a post-treatment communication reported higher level of oral hygiene compliance than participants in the control group. The plaque index was 0.3 (interquartile range (Iqr), 0.60) and 0.75 (Iqr, 1.30), respectively, with a significant difference (P = 0.0205). A follow-up procedure after orthodontic treatment may be an effective tool to increase oral hygiene compliance also over a short period.

  16. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy.

    PubMed

    Qiu, Shuming; Xu, Guoai; Ahmad, Haseeb; Guo, Yanhui

    2018-01-01

    The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash's scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash's protocol. We point out that Farash's protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.'s scheme. We prove that the proposed protocol not only overcomes the issues in Farash's scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure.

  17. Stability of formation control using a consensus protocol under directed communications with two time delays and delay scheduling

    NASA Astrophysics Data System (ADS)

    Cepeda-Gomez, Rudy; Olgac, Nejat

    2016-01-01

    We consider a linear algorithm to achieve formation control in a group of agents which are driven by second-order dynamics and affected by two rationally independent delays. One of the delays is in the position and the other in the velocity information channels. These delays are taken as constant and uniform throughout the system. The communication topology is assumed to be directed and fixed. The formation is attained by adding a supplementary control term to the stabilising consensus protocol. In preparation for the formation control logic, we first study the stability of the consensus, using the recent cluster treatment of characteristic roots (CTCR) paradigm. This effort results in a unique depiction of the non-conservative stability boundaries in the domain of the delays. However, CTCR requires the knowledge of the potential stability switching loci exhaustively within this domain. The creation of these loci is done in a new surrogate coordinate system, called the 'spectral delay space (SDS)'. The relative stability is also investigated, which has to do with the speed of reaching consensus. This step leads to a paradoxical control design concept, called the 'delay scheduling', which highlights the fact that the group behaviour may be enhanced by increasing the delays. These steps lead to a control strategy to establish a desired group formation that guarantees spacing among the agents. Example case studies are presented to validate the underlying analytical derivations.

  18. The evaluation of complex clinical trial protocols: resources available to research ethics committees and the use of clinical trial registries--a case study.

    PubMed

    Homedes, Núria; Ugalde, Antonio

    2015-06-01

    To assess the potential role of clinical trial (CT) registries and other resources available to research ethics committees (RECs) in the evaluation of complex CT protocols in low-income and middle-income countries. Using a case study approach, the authors examined the decision-making process of a REC in Argentina and its efforts to use available resources to decide on a complex protocol. We also analysed the information in the USA and other CT registries and consulted 24 CT experts in seven countries. Information requested by the Argentinean REC from other national RECs and ethics' experts was not useful to verify the adequacy of the REC's decision whether or not to approve the CT. The responses from the national regulatory agency and the sponsor were not helpful either. The identification of international resources that could assist was beyond the REC's capability. The information in the USA and other CT registries is limited, and at times misleading; and its accuracy is not verified by register keepers. RECs have limited access to experts and institutions that could assist them in their deliberations. Sponsors do not always answer RECs' request for information to properly conduct the ethical and methodological assessment of CT protocols. The usefulness of the CT registries is curtailed by the lack of appropriate codes and by data errors. Information about reasons for rejection, withdrawal or suspension of the trial should be included in the registries. Establishing formal channels of communication among national and foreign RECs and with independent international reference centres could strengthen the ethical review of CT protocols. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  19. GLOBECOM '85 - Global Telecommunications Conference, New Orleans, LA, December 2-5, 1985, Conference Record. Volumes 1, 2, & 3

    NASA Astrophysics Data System (ADS)

    Various papers on global telecommunications are presented. The general topics addressed include: multiservice integration with optical fibers, multicompany owned telecommunication networks, softworks quality and reliability, advanced on-board processing, impact of new services and systems on operations and maintenance, analytical studies of protocols for data communication networks, topics in packet radio networking, CCITT No. 7 to support new services, document processing and communication, antenna technology and system aspects in satellite communications. Also considered are: communication systems modelling methodology, experimental integrated local area voice/data nets, spread spectrum communications, motion video at the DS-0 rate, optical and data communications, intelligent work stations, switch performance analysis, novel radio communication systems, wireless local networks, ISDN services, LAN communication protocols, user-system interface, radio propagation and performance, mobile satellite system, software for computer networks, VLSI for ISDN terminals, quality management, man-machine interfaces in switching, and local area network performance.

  20. Reliable broadcast protocols

    NASA Technical Reports Server (NTRS)

    Joseph, T. A.; Birman, Kenneth P.

    1989-01-01

    A number of broadcast protocols that are reliable subject to a variety of ordering and delivery guarantees are considered. Developing applications that are distributed over a number of sites and/or must tolerate the failures of some of them becomes a considerably simpler task when such protocols are available for communication. Without such protocols the kinds of distributed applications that can reasonably be built will have a very limited scope. As the trend towards distribution and decentralization continues, it will not be surprising if reliable broadcast protocols have the same role in distributed operating systems of the future that message passing mechanisms have in the operating systems of today. On the other hand, the problems of engineering such a system remain large. For example, deciding which protocol is the most appropriate to use in a certain situation or how to balance the latency-communication-storage costs is not an easy question.

  1. A Novel Re-keying Function Protocol (NRFP) For Wireless Sensor Network Security

    PubMed Central

    Abdullah, Maan Younis; Hua, Gui Wei; Alsharabi, Naif

    2008-01-01

    This paper describes a novel re-keying function protocol (NRFP) for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs), covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding innetwork processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks. PMID:27873963

  2. A Novel Re-keying Function Protocol (NRFP) For Wireless Sensor Network Security.

    PubMed

    Abdullah, Maan Younis; Hua, Gui Wei; Alsharabi, Naif

    2008-12-04

    This paper describes a novel re-keying function protocol (NRFP) for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs), covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding in-network processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks.

  3. Medium Access Control in Ad Hoc Networks With Omni-Directional and Directional Antennas

    DTIC Science & Technology

    2004-06-01

    Carvalho, Marc, Hong, Long, Yong, Zhenjiang, Lei, Ravi, Saro, Hari, Ramesh, Brad, Renato and Radhika) in the Computer Communication Research Group (CCRG...which we call directional collision avoidance protocols. Ko et al. [35] propose two schemes. One scheme consists of nodes using directional RTS...different from the model assumed by Ko et al. [35] where antennas are always active for re- ceiving and thus transmissions to different antennas

  4. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lee, Juhui; School of Computatioal Sciences, Korea Institute for Advanced Study, Seoul 130-722; Lee, Soojoon

    Extending the eavesdropping strategy devised by Zhang, Li, and Guo [Zhang, Li, and Guo, Phys. Rev. A 63, 036301 (2001)], we show that the multiparty quantum communication protocol based on entanglement swapping, which was proposed by Cabello (e-print quant-ph/0009025), is not secure. We modify the protocol so that entanglement swapping can secure multiparty quantum communication, such as multiparty quantum key distribution and quantum secret sharing of classical information, and show that the modified protocol is secure against the Zhang-Li-Guo strategy for eavesdropping as well as the basic intercept-resend attack.0.

  5. Developing and Evaluating Communication Strategies to Support Informed Decisions and Practice Based on Evidence (DECIDE): protocol and preliminary results.

    PubMed

    Treweek, Shaun; Oxman, Andrew D; Alderson, Philip; Bossuyt, Patrick M; Brandt, Linn; Brożek, Jan; Davoli, Marina; Flottorp, Signe; Harbour, Robin; Hill, Suzanne; Liberati, Alessandro; Liira, Helena; Schünemann, Holger J; Rosenbaum, Sarah; Thornton, Judith; Vandvik, Per Olav; Alonso-Coello, Pablo

    2013-01-09

    Healthcare decision makers face challenges when using guidelines, including understanding the quality of the evidence or the values and preferences upon which recommendations are made, which are often not clear. GRADE is a systematic approach towards assessing the quality of evidence and the strength of recommendations in healthcare. GRADE also gives advice on how to go from evidence to decisions. It has been developed to address the weaknesses of other grading systems and is now widely used internationally. The Developing and Evaluating Communication Strategies to Support Informed Decisions and Practice Based on Evidence (DECIDE) consortium (http://www.decide-collaboration.eu/), which includes members of the GRADE Working Group and other partners, will explore methods to ensure effective communication of evidence-based recommendations targeted at key stakeholders: healthcare professionals, policymakers, and managers, as well as patients and the general public. Surveys and interviews with guideline producers and other stakeholders will explore how presentation of the evidence could be improved to better meet their information needs. We will collect further stakeholder input from advisory groups, via consultations and user testing; this will be done across a wide range of healthcare systems in Europe, North America, and other countries. Targeted communication strategies will be developed, evaluated in randomized trials, refined, and assessed during the development of real guidelines. Results of the DECIDE project will improve the communication of evidence-based healthcare recommendations. Building on the work of the GRADE Working Group, DECIDE will develop and evaluate methods that address communication needs of guideline users. The project will produce strategies for communicating recommendations that have been rigorously evaluated in diverse settings, and it will support the transfer of research into practice in healthcare systems globally.

  6. Project Hermes 'Use of Smartphones for Receiving Telemetry and Commanding a Satellite'

    NASA Technical Reports Server (NTRS)

    Maharaja, Rishabh (Principal Investigator)

    2016-01-01

    TCPIP protocols can be applied for satellite command, control, and data transfer. Project Hermes was an experiment set-up to test the use of the TCPIP protocol for communicating with a space bound payload. The idea was successfully demonstrated on high altitude balloon flights and on a sub-orbital sounding rocket launched from NASAs Wallops Flight Facility. TCPIP protocols can be applied for satellite command, control, and data transfer. Project Hermes was an experiment set-up to test the use of the TCPIP protocol for communicating with a space bound payload. The idea was successfully demonstrated on high altitude balloon flights and on a sub-orbital sounding rocket launched from NASAs Wallops Flight Facility.

  7. Ship to Shore Data Communication and Prioritization

    DTIC Science & Technology

    2011-12-01

    First Out FTP File Transfer Protocol GCCS-M Global Command and Control System Maritime HAIPE High Assurance Internet Protocol Encryptor HTTP Hypertext...Transfer Protocol (world wide web protocol ) IBS Integrated Bar Code System IDEF0 Integration Definition IER Information Exchange Requirements...INTEL Intelligence IP Internet Protocol IPT Integrated Product Team ISEA In-Service Engineering Agent ISNS Integrated Shipboard Network System IT

  8. UAV telemetry communications using ZigBee protocol

    NASA Astrophysics Data System (ADS)

    Nasution, T. H.; Siregar, I.; Yasir, M.

    2017-10-01

    Wireless communication has been widely used in various fields or disciplines such as agriculture, health, engineering, military, and aerospace so as to support the work in that field. The communication technology is typically used for controlling devices and data monitoring. One development of wireless communication is the widely used telemetry system used to reach areas that cannot be reached by humans using UAV (Unmanned Aerial Vehicle) or unmanned aircraft. In this paper we discuss the design of telemetry system in UAV using ZigBee protocol. From the test obtained the system can work well with visualization displays without pause is 20 data per second with a maximum data length of 120 characters.

  9. Development of Information Assurance Protocol for Low Bandwidth Nanosatellite Communications

    DTIC Science & Technology

    2017-09-01

    INFORMATION ASSURANCE PROTOCOL FOR LOW BANDWIDTH NANOSATELLITE COMMUNICATIONS by Cervando A. Banuelos II September 2017 Thesis Advisor...reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction...searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information . Send comments

  10. Effects of Iconicity on Requesting with the Picture Exchange Communication System in Children with Autism Spectrum Disorder

    ERIC Educational Resources Information Center

    Angermeier, Katie; Schlosser, Ralf W.; Luiselli, James K.; Harrington, Caroline; Carter, Beth

    2008-01-01

    Research on graphic symbol learning suggests that symbols with a greater visual resemblance to their referents (greater iconicity) are more easily learned. The iconicity hypothesis has not yet been explored within the intervention protocol of the Picture Exchange Communication System (PECS). Within the PECS protocol, participants do not point to a…

  11. Creating a Community of Inquiry in Large-Enrollment Online Courses: An Exploratory Study on the Effect of Protocols within Online Discussions

    ERIC Educational Resources Information Center

    Chen, Baiyun; deNoyelles, Aimee; Patton, Kerry; Zydney, Janet

    2017-01-01

    It can be difficult to foster focused and effective communication in online discussions within large classes. Implementing protocols is a strategy that may help students communicate more effectively, facilitate their learning process, and improve the quality of their work within online discussions. In this exploratory research study, a protocol…

  12. DDN (Defense Data Network) Protocol Handbook. Volume 1. DoD Military Standard Protocols

    DTIC Science & Technology

    1985-12-01

    official Military Standard communication protocols in use on the DDN are included, as are several ARPANET (Advanced Research Projects Agency Network... research protocols which are currently in use, and some protocols currently undergoing review. Tutorial information and auxiliary documents are also...compatible with DoD needs, by researchers wishing to improve the protocols, and by impleroentors of local area networks (LANs) wishing their

  13. FPGA implementation cost and performance evaluation of IEEE 802.11 protocol encryption security schemes

    NASA Astrophysics Data System (ADS)

    Sklavos, N.; Selimis, G.; Koufopavlou, O.

    2005-01-01

    The explosive growth of internet and consumer demand for mobility has fuelled the exponential growth of wireless communications and networks. Mobile users want access to services and information, from both internet and personal devices, from a range of locations without the use of a cable medium. IEEE 802.11 is one of the most widely used wireless standards of our days. The amount of access and mobility into wireless networks requires a security infrastructure that protects communication within that network. The security of this protocol is based on the wired equivalent privacy (WEP) scheme. Currently, all the IEEE 802.11 market products support WEP. But recently, the 802.11i working group introduced the advanced encryption standard (AES), as the security scheme for the future IEEE 802.11 applications. In this paper, the hardware integrations of WEP and AES are studied. A field programmable gate array (FPGA) device has been used as the hardware implementation platform, for a fair comparison between the two security schemes. Measurements for the FPGA implementation cost, operating frequency, power consumption and performance are given.

  14. Simulator of Space Communication Networks

    NASA Technical Reports Server (NTRS)

    Clare, Loren; Jennings, Esther; Gao, Jay; Segui, John; Kwong, Winston

    2005-01-01

    Multimission Advanced Communications Hybrid Environment for Test and Evaluation (MACHETE) is a suite of software tools that simulates the behaviors of communication networks to be used in space exploration, and predict the performance of established and emerging space communication protocols and services. MACHETE consists of four general software systems: (1) a system for kinematic modeling of planetary and spacecraft motions; (2) a system for characterizing the engineering impact on the bandwidth and reliability of deep-space and in-situ communication links; (3) a system for generating traffic loads and modeling of protocol behaviors and state machines; and (4) a system of user-interface for performance metric visualizations. The kinematic-modeling system makes it possible to characterize space link connectivity effects, including occultations and signal losses arising from dynamic slant-range changes and antenna radiation patterns. The link-engineering system also accounts for antenna radiation patterns and other phenomena, including modulations, data rates, coding, noise, and multipath fading. The protocol system utilizes information from the kinematic-modeling and link-engineering systems to simulate operational scenarios of space missions and evaluate overall network performance. In addition, a Communications Effect Server (CES) interface for MACHETE has been developed to facilitate hybrid simulation of space communication networks with actual flight/ground software/hardware embedded in the overall system.

  15. Performance evaluation of complete data transfer of physical layer according to IEEE 802.15.4 standard

    NASA Astrophysics Data System (ADS)

    Raju, Kota Solomon; Merugu, Naresh Babu; Neetu, Babu, E. Ram

    2016-03-01

    ZigBee is well-accepted industrial standard for wireless sensor networks based on IEEE 802.15.4 standard. Wireless Sensor Networks is the major concern of communication these days. These Wireless Sensor Networks investigate the properties of networks of small battery-powered sensors with wireless communication. The communication between any two wireless nodes of wireless sensor networks is carried out through a protocol stack. This protocol stack has been designed by different vendors in various ways. Every custom vendor possesses his own protocol stack and algorithms especially at the MAC layer. But, many applications require modifications in their algorithms at various layers as per their requirements, especially energy efficient protocols at MAC layer that are simulated in Wireless sensor Network Simulators which are not being tested in real time systems because vendors do not allow the programmability of each layer in their protocol stack. This problem can be quoted as Vendor-Interoperability. The solution is to develop the programmable protocol stack where we can design our own application as required. As a part of the task first we tried implementing physical layer and transmission of data using physical layer. This paper describes about the transmission of the total number of bytes of Frame according to the IEEE 802.15.4 standard using Physical Layer.

  16. Evaluation of counterfactuality in counterfactual communication protocols

    NASA Astrophysics Data System (ADS)

    Arvidsson-Shukur, D. R. M.; Barnes, C. H. W.; Gottfries, A. N. O.

    2017-12-01

    We provide an in-depth investigation of parameter estimation in nested Mach-Zehnder interferometers (NMZIs) using two information measures: the Fisher information and the Shannon mutual information. Protocols for counterfactual communication have, so far, been based on two different definitions of counterfactuality. In particular, some schemes have been based on NMZI devices, and have recently been subject to criticism. We provide a methodology for evaluating the counterfactuality of these protocols, based on an information-theoretical framework. More specifically, we make the assumption that any realistic quantum channel in MZI structures will have some weak uncontrolled interaction. We then use the Fisher information of this interaction to measure counterfactual violations. The measure is used to evaluate the suggested counterfactual communication protocol of H. Salih et al. [Phys. Rev. Lett. 110, 170502 (2013), 10.1103/PhysRevLett.110.170502]. The protocol of D. R. M. Arvidsson-Shukur and C. H. W. Barnes [Phys. Rev. A 94, 062303 (2016), 10.1103/PhysRevA.94.062303], based on a different definition, is evaluated with a probability measure. Our results show that the definition of Arvidsson-Shukur and Barnes is satisfied by their scheme, while that of Salih et al. is only satisfied by perfect quantum channels. For realistic devices the latter protocol does not achieve its objective.

  17. Security analysis of standards-driven communication protocols for healthcare scenarios.

    PubMed

    Masi, Massimiliano; Pugliese, Rosario; Tiezzi, Francesco

    2012-12-01

    The importance of the Electronic Health Record (EHR), that stores all healthcare-related data belonging to a patient, has been recognised in recent years by governments, institutions and industry. Initiatives like the Integrating the Healthcare Enterprise (IHE) have been developed for the definition of standard methodologies for secure and interoperable EHR exchanges among clinics and hospitals. Using the requisites specified by these initiatives, many large scale projects have been set up for enabling healthcare professionals to handle patients' EHRs. The success of applications developed in these contexts crucially depends on ensuring such security properties as confidentiality, authentication, and authorization. In this paper, we first propose a communication protocol, based on the IHE specifications, for authenticating healthcare professionals and assuring patients' safety. By means of a formal analysis carried out by using the specification language COWS and the model checker CMC, we reveal a security flaw in the protocol thus demonstrating that to simply adopt the international standards does not guarantee the absence of such type of flaws. We then propose how to emend the IHE specifications and modify the protocol accordingly. Finally, we show how to tailor our protocol for application to more critical scenarios with no assumptions on the communication channels. To demonstrate feasibility and effectiveness of our protocols we have fully implemented them.

  18. Adaptive and reliably acknowledged FSO communications

    NASA Astrophysics Data System (ADS)

    Fitz, Michael P.; Halford, Thomas R.; Kose, Cenk; Cromwell, Jonathan; Gordon, Steven

    2015-05-01

    Atmospheric turbulence causes the receive signal intensity on free space optical (FSO) communication links to vary over time. Scintillation fades can stymie connectivity for milliseconds at a time. To approach the information-theoretic limits of communication in such time-varying channels, it necessary to either code across extremely long blocks of data - thereby inducing unacceptable delays - or to vary the code rate according to the instantaneous channel conditions. We describe the design, laboratory testing, and over-the-air testing of an FSO modem that employs a protocol with adaptive coded modulation (ACM) and hybrid automatic repeat request. For links with fixed throughput, this protocol provides a 10dB reduction in the required received signal-to-noise ratio (SNR); for links with fixed range, this protocol provides the greater than a 3x increase in throughput. Independent U.S. Government tests demonstrate that our protocol effectively adapts the code rate to match the instantaneous channel conditions. The modem is able to provide throughputs in excess of 850 Mbps on links with ranges greater than 15 kilometers.

  19. Deterministic secure quantum communication using a single d-level system

    PubMed Central

    Jiang, Dong; Chen, Yuanyuan; Gu, Xuemei; Xie, Ling; Chen, Lijun

    2017-01-01

    Deterministic secure quantum communication (DSQC) can transmit secret messages between two parties without first generating a shared secret key. Compared with quantum key distribution (QKD), DSQC avoids the waste of qubits arising from basis reconciliation and thus reaches higher efficiency. In this paper, based on data block transmission and order rearrangement technologies, we propose a DSQC protocol. It utilizes a set of single d-level systems as message carriers, which are used to directly encode the secret message in one communication process. Theoretical analysis shows that these employed technologies guarantee the security, and the use of a higher dimensional quantum system makes our protocol achieve higher security and efficiency. Since only quantum memory is required for implementation, our protocol is feasible with current technologies. Furthermore, Trojan horse attack (THA) is taken into account in our protocol. We give a THA model and show that THA significantly increases the multi-photon rate and can thus be detected. PMID:28327557

  20. Analysis of Pervasive Mobile Ad Hoc Routing Protocols

    NASA Astrophysics Data System (ADS)

    Qadri, Nadia N.; Liotta, Antonio

    Mobile ad hoc networks (MANETs) are a fundamental element of pervasive networks and therefore, of pervasive systems that truly support pervasive computing, where user can communicate anywhere, anytime and on-the-fly. In fact, future advances in pervasive computing rely on advancements in mobile communication, which includes both infrastructure-based wireless networks and non-infrastructure-based MANETs. MANETs introduce a new communication paradigm, which does not require a fixed infrastructure - they rely on wireless terminals for routing and transport services. Due to highly dynamic topology, absence of established infrastructure for centralized administration, bandwidth constrained wireless links, and limited resources in MANETs, it is challenging to design an efficient and reliable routing protocol. This chapter reviews the key studies carried out so far on the performance of mobile ad hoc routing protocols. We discuss performance issues and metrics required for the evaluation of ad hoc routing protocols. This leads to a survey of existing work, which captures the performance of ad hoc routing algorithms and their behaviour from different perspectives and highlights avenues for future research.

  1. Research of Ad Hoc Networks Access Algorithm

    NASA Astrophysics Data System (ADS)

    Xiang, Ma

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. When the ad hoc network is the access network of the internet, the gateway discovery protocol is very important to choose the most appropriate gateway to guarantee the connectivity between ad hoc network and IP based fixed networks. The paper proposes a QoS gateway discovery protocol which uses the time delay and stable route to the gateway selection conditions. And according to the gateway discovery protocol, it also proposes a fast handover scheme which can decrease the handover time and improve the handover efficiency.

  2. A Survey on the Taxonomy of Cluster-Based Routing Protocols for Homogeneous Wireless Sensor Networks

    PubMed Central

    Naeimi, Soroush; Ghafghazi, Hamidreza; Chow, Chee-Onn; Ishii, Hiroshi

    2012-01-01

    The past few years have witnessed increased interest among researchers in cluster-based protocols for homogeneous networks because of their better scalability and higher energy efficiency than other routing protocols. Given the limited capabilities of sensor nodes in terms of energy resources, processing and communication range, the cluster-based protocols should be compatible with these constraints in either the setup state or steady data transmission state. With focus on these constraints, we classify routing protocols according to their objectives and methods towards addressing the shortcomings of clustering process on each stage of cluster head selection, cluster formation, data aggregation and data communication. We summarize the techniques and methods used in these categories, while the weakness and strength of each protocol is pointed out in details. Furthermore, taxonomy of the protocols in each phase is given to provide a deeper understanding of current clustering approaches. Ultimately based on the existing research, a summary of the issues and solutions of the attributes and characteristics of clustering approaches and some open research areas in cluster-based routing protocols that can be further pursued are provided. PMID:22969350

  3. A survey on the taxonomy of cluster-based routing protocols for homogeneous wireless sensor networks.

    PubMed

    Naeimi, Soroush; Ghafghazi, Hamidreza; Chow, Chee-Onn; Ishii, Hiroshi

    2012-01-01

    The past few years have witnessed increased interest among researchers in cluster-based protocols for homogeneous networks because of their better scalability and higher energy efficiency than other routing protocols. Given the limited capabilities of sensor nodes in terms of energy resources, processing and communication range, the cluster-based protocols should be compatible with these constraints in either the setup state or steady data transmission state. With focus on these constraints, we classify routing protocols according to their objectives and methods towards addressing the shortcomings of clustering process on each stage of cluster head selection, cluster formation, data aggregation and data communication. We summarize the techniques and methods used in these categories, while the weakness and strength of each protocol is pointed out in details. Furthermore, taxonomy of the protocols in each phase is given to provide a deeper understanding of current clustering approaches. Ultimately based on the existing research, a summary of the issues and solutions of the attributes and characteristics of clustering approaches and some open research areas in cluster-based routing protocols that can be further pursued are provided.

  4. SU-F-P-04: Implementation of Dose Monitoring Software: Successes and Pitfalls

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Och, J

    2016-06-15

    Purpose: to successfully install a dose monitoring software (DMS) application to assist in CT protocol and dose management. Methods: Upon selecting the DMS, we began our implementation of the application. A working group composed of Medical Physics, Radiology Administration, Information Technology, and CT technologists was formed. On-site training in the application was supplied by the vendor. The decision was made to apply the process for all the CT protocols on all platforms at all facilities. Protocols were painstakingly mapped to the correct masters, and the system went ‘live’. Results: We are routinely using DMS as a tool in our Clinicalmore » Performance CT QA program. It is useful in determining the effectiveness of revisions to existing protocols, and establishing performance baselines for new units. However, the implementation was not without difficulty. We identified several pitfalls and obstacles which frustrated progress. Including: Training deficiencies, Nomenclature problems, Communication, DICOM variability. Conclusion: Dose monitoring software can be a potent tool for QA. However, implementation of the program can be problematic and requires planning, organization and commitment.« less

  5. Security Analysis of DTN Architecture and Bundle Protocol Specification for Space-Based Networks

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    2009-01-01

    A Delay-Tolerant Network (DTN) Architecture (Request for Comment, RFC-4838) and Bundle Protocol Specification, RFC-5050, have been proposed for space and terrestrial networks. Additional security specifications have been provided via the Bundle Security Specification (currently a work in progress as an Internet Research Task Force internet-draft) and, for link-layer protocols applicable to Space networks, the Licklider Transport Protocol Security Extensions. This document provides a security analysis of the current DTN RFCs and proposed security related internet drafts with a focus on space-based communication networks, which is a rather restricted subset of DTN networks. Note, the original focus and motivation of DTN work was for the Interplanetary Internet . This document does not address general store-and-forward network overlays, just the current work being done by the Internet Research Task Force (IRTF) and the Consultative Committee for Space Data Systems (CCSDS) Space Internetworking Services Area (SIS) - DTN working group under the DTN and Bundle umbrellas. However, much of the analysis is relevant to general store-and-forward overlays.

  6. A School Passport as Part of a Protocol to Assist Educational Reintegration After Medulloblastoma Treatment in Childhood.

    PubMed

    Tresman, Rachel; Brown, Morven; Fraser, Faye; Skinner, Roderick; Bailey, Simon

    2016-09-01

    Medulloblastoma is the most common malignant brain tumour in children and is treated with a combination of surgery, radiotherapy and chemotherapy. These children frequently experience long-term cognitive, social and physical sequelae, which significantly affect school reintegration. This study aimed to explore school-return experiences to create a more structured school reintegration protocol for children postmedulloblastoma. A cohort of nine patients who had completed treatment and for whom full neuropsychometric data were available was included in the study (median time since diagnosis 8 years). Data were collected using qualitative parental questionnaires, semistructured interviews with teachers (n = 12) and healthcare professionals (HCPs) (n = 6) involved in their school reintegration. Thematic analysis was employed. A focus group with five HCPs was then used for data validation. This study uncovered the following four main subjects: (1) Information sharing; (2) education and empowerment (of educational professionals (EP) and parents); (3) communication between parents, HCPs and EPs; and (4) long-term difficulties. Implementation of a standardised protocol delivered within the structure of a school passport document would aid uniform follow-up. The proposed multistage protocol includes early communication and reintegration planning followed by meetings at school re-entry. Follow-up meetings are suggested to reduce information loss and reassess the child's needs. Hospital support at school transitions, inclusion of school data in long-term clinical follow-up and long-term rehabilitation are also recommended. Each stage would be supported by school passport documentation and would facilitate school and parental empowerment, paramount to the long-term sustainability of successful schooling. © 2016 Wiley Periodicals, Inc.

  7. How to Stop Disagreeing and Start Cooperatingin the Presence of Asymmetric Packet Loss.

    PubMed

    Morales-Ponce, Oscar; Schiller, Elad M; Falcone, Paolo

    2018-04-22

    We consider the design of a disagreement correction protocol in multi-vehicle systems. Vehicles broadcast in real-time vital information such as position, direction, speed, acceleration, intention, etc. This information is then used to identify the risks and adapt their trajectory to maintain the highest performance without compromising the safety. To minimize the risk due to the use of inconsistent information, all cooperating vehicles must agree whether to use the exchanged information to operate in a cooperative mode or use the only local information to operate in an autonomous mode. However, since wireless communications are prone to failures, it is impossible to deterministically reach an agreement. Therefore, any protocol will exhibit necessary disagreement periods. In this paper, we investigate whether vehicles can still cooperate despite communication failures even in the scenario where communication is suddenly not available. We present a deterministic protocol that allows all participants to either operate a cooperative mode when vehicles can exchange all the information in a timely manner or operate in autonomous mode when messages are lost. We show formally that the disagreement time is bounded by the time that the communication channel requires to deliver messages and validate our protocol using NS-3 simulations. We explain how the proposed solution can be used in vehicular platooning to attain high performance and still guarantee high safety standards despite communication failures.

  8. Implementation and Analysis of Real-Time Streaming Protocols

    PubMed Central

    Santos-González, Iván; Rivero-García, Alexandra; Molina-Gil, Jezabel; Caballero-Gil, Pino

    2017-01-01

    Communication media have become the primary way of interaction thanks to the discovery and innovation of many new technologies. One of the most widely used communication systems today is video streaming, which is constantly evolving. Such communications are a good alternative to face-to-face meetings, and are therefore very useful for coping with many problems caused by distance. However, they suffer from different issues such as bandwidth limitation, network congestion, energy efficiency, cost, reliability and connectivity. Hence, the quality of service and the quality of experience are considered the two most important issues for this type of communication. This work presents a complete comparative study of two of the most used protocols of video streaming, Real Time Streaming Protocol (RTSP) and the Web Real-Time Communication (WebRTC). In addition, this paper proposes two new mobile applications that implement those protocols in Android whose objective is to know how they are influenced by the aspects that most affect the streaming quality of service, which are the connection establishment time and the stream reception time. The new video streaming applications are also compared with the most popular video streaming applications for Android, and the experimental results of the analysis show that the developed WebRTC implementation improves the performance of the most popular video streaming applications with respect to the stream packet delay. PMID:28417949

  9. How to Stop Disagreeing and Start Cooperatingin the Presence of Asymmetric Packet Loss

    PubMed Central

    2018-01-01

    We consider the design of a disagreement correction protocol in multi-vehicle systems. Vehicles broadcast in real-time vital information such as position, direction, speed, acceleration, intention, etc. This information is then used to identify the risks and adapt their trajectory to maintain the highest performance without compromising the safety. To minimize the risk due to the use of inconsistent information, all cooperating vehicles must agree whether to use the exchanged information to operate in a cooperative mode or use the only local information to operate in an autonomous mode. However, since wireless communications are prone to failures, it is impossible to deterministically reach an agreement. Therefore, any protocol will exhibit necessary disagreement periods. In this paper, we investigate whether vehicles can still cooperate despite communication failures even in the scenario where communication is suddenly not available. We present a deterministic protocol that allows all participants to either operate a cooperative mode when vehicles can exchange all the information in a timely manner or operate in autonomous mode when messages are lost. We show formally that the disagreement time is bounded by the time that the communication channel requires to deliver messages and validate our protocol using NS-3 simulations. We explain how the proposed solution can be used in vehicular platooning to attain high performance and still guarantee high safety standards despite communication failures. PMID:29690572

  10. 47 CFR 9.3 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.3... VoIP service. An interconnected Voice over Internet protocol (VoIP) service is a service that: (1... location; (3) Requires Internet protocol-compatible customer premises equipment (CPE); and (4) Permits...

  11. 47 CFR 9.3 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.3... VoIP service. An interconnected Voice over Internet protocol (VoIP) service is a service that: (1... location; (3) Requires Internet protocol-compatible customer premises equipment (CPE); and (4) Permits...

  12. 47 CFR 9.3 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.3... VoIP service. An interconnected Voice over Internet protocol (VoIP) service is a service that: (1... location; (3) Requires Internet protocol-compatible customer premises equipment (CPE); and (4) Permits...

  13. Quantum direct communication protocol strengthening against Pavičić’s attack

    NASA Astrophysics Data System (ADS)

    Zhang, Bo; Shi, Wei-Xu; Wang, Jian; Tang, Chao-Jing

    2015-12-01

    A quantum circuit providing an undetectable eavesdropping of information in message mode, which compromises all two-state ψ-ϕ quantum direct communication (QDC) protocols, has been recently proposed by Pavičić [Phys. Rev. A 87 (2013) 042326]. A modification of the protocol’s control mode is proposed, which improves users’ 25% detection probability of Eve to 50% at best, as that in ping-pong protocol. The modification also improves the detection probability of Wójcik’s attack [Phys. Rev. Lett 90 (2003) 157901] to 75% at best. The resistance against man-in-the-middle (MITM) attack as well as the discussion of security for four Bell state protocols is presented. As a result, the protocol security is strengthened both theoretically and practically, and quantum advantage of superdense coding is restored.

  14. The Behavior of TCP and Its Extensions in Space

    NASA Technical Reports Server (NTRS)

    Wang, Ruhai; Horan, Stephen

    2001-01-01

    The performance of Transmission Control Protocol (TCP) in space has been examined from the observations of simulation and experimental tests for several years at National Aeronautics and Space Administration (NASA), Department of Defense (DoD) and universities. At New Mexico State University (NMSU), we have been concentrating on studying the performance of two protocol suites: the file transfer protocol (ftp) running over Transmission Control Protocol/Internet Protocol (TCP/IP) stack and the file protocol (fp) running over the Space Communications Protocol Standards (SCPS)-Transport Protocol (TP) developed under the Consultative Committee for Space Data Systems (CCSDS) standards process. SCPS-TP is considered to be TCP's extensions for space communications. This dissertation experimentally studies the behavior of TCP and SCPS-TP by running the protocol suites over both the Space-to-Ground Link Simulator (SGLS) test-bed and realistic satellite link. The study concentrates on comparing protocol behavior by plotting the averaged file transfer times for different experimental configurations and analyzing them using Statistical Analysis System (SAS) based procedures. The effects of different link delays and various Bit-Error-Rates (BERS) on each protocol performance are also studied and linear regression models are built for experiments over SGLS test-bed to reflect the relationships between the file transfer time and various transmission conditions.

  15. Cryptographically supported NFC tags in medication for better inpatient safety.

    PubMed

    Özcanhan, Mehmet Hilal; Dalkılıç, Gökhan; Utku, Semih

    2014-08-01

    Reliable sources report that errors in drug administration are increasing the number of harmed or killed inpatients, during healthcare. This development is in contradiction to patient safety norms. A correctly designed hospital-wide ubiquitous system, using advanced inpatient identification and matching techniques, should provide correct medicine and dosage at the right time. Researchers are still making grouping proof protocol proposals based on the EPC Global Class 1 Generation 2 ver. 1.2 standard tags, for drug administration. Analyses show that such protocols make medication unsecure and hence fail to guarantee inpatient safety. Thus, the original goal of patient safety still remains. In this paper, a very recent proposal (EKATE) upgraded by a cryptographic function is shown to fall short of expectations. Then, an alternative proposal IMS-NFC which uses a more suitable and newer technology; namely Near Field Communication (NFC), is described. The proposed protocol has the additional support of stronger security primitives and it is compliant to ISO communication and security standards. Unlike previous works, the proposal is a complete ubiquitous system that guarantees full patient safety; and it is based on off-the-shelf, new technology products available in every corner of the world. To prove the claims the performance, cost, security and scope of IMS-NFC are compared with previous proposals. Evaluation shows that the proposed system has stronger security, increased patient safety and equal efficiency, at little extra cost.

  16. Space Link Extension (SLE) Emulation for High-Throughput Network Communication

    NASA Technical Reports Server (NTRS)

    Murawski, Robert; Tchorowski, Nicole; Golden, Bert

    2014-01-01

    As the data rate requirements for space communications increases, signicant stressis placed not only on the wireless satellite communication links, but also on the groundnetworks which forward data from end-users to remote ground stations. These wide areanetwork (WAN) connections add delay and jitter to the end-to-end satellite communicationlink, eects which can have signicant impacts on the wireless communication link. It isimperative that any ground communication protocol can react to these eects such that theground network does not become a bottleneck in the communication path to the satellite.In this paper, we present our SCENIC Emulation Lab testbed which was developed to testthe CCSDS SLE protocol implementations proposed for use on future NASA communica-tion networks. Our results show that in the presence of realistic levels of network delay,high-throughput SLE communication links can experience signicant data rate throttling.Based on our observations, we present some insight into why this data throttling happens,and trace the probable issue back to non-optimal blocking communication which is sup-ported by the CCSDS SLE API recommended practices. These issues were presented aswell to the SLE implementation developers which, based on our reports, developed a newrelease for SLE which we show xes the SLE blocking issue and greatly improves the pro-tocol throughput. In this paper, we also discuss future developments for our end-to-endemulation lab and how these improvements can be used to develop and test future spacecommunication technologies.

  17. Managing barriers to empathy in the clinical encounter: a qualitative interview study with GPs

    PubMed Central

    Derksen, Frans AWM; Hartman, Tim C olde; Bensing, Jozien M; Lagro-Janssen, Antoine LM

    2016-01-01

    Background Current daily general practice has become increasingly technical and somatically oriented (where attention to patients’ feelings is decreased) due to an increase in protocol-based guidelines. Priorities in GP–patient communication have shifted from a focus on listening and empathy to task-oriented communication. Aim To explore what barriers GPs experience when applying empathy in daily practice, and how these barriers are managed. Design and setting Thirty Dutch GPs with sufficient heterogeneity in sex, age, type of practice, and rural or urban setting were interviewed. Method The consolidated criteria for reporting qualitative research (COREQ) were applied. The verbatim transcripts were then analysed. Results According to participating GPs, the current emphasis on protocol-driven care can be a significant barrier to genuineness in communication. Other potential barriers mentioned were time pressures and constraints, and dealing with patients displaying ‘unruly behaviour’ or those with personality disorders. GPs indicated that it can be difficult to balance emotional involvement and professional distance. Longer consulting times, smaller practice populations, and efficient practice organisation were described as practical solutions. In order to focus on a patient-as-person approach, GPs strongly suggested that deviating from guidelines should be possible when necessary as an element of good-quality care. Joining intercollegiate counselling groups was also discussed. Conclusion In addition to practical solutions for barriers to behaving empathically, GPs indicated that they needed more freedom to balance working with protocols and guidelines, as well as a patient-as-person and patient-as-partner approach. This balance is necessary to remain connected with patients and to deliver care that is truly personal. PMID:27884917

  18. Twenty Seven Years of Quantum Cryptography!

    NASA Astrophysics Data System (ADS)

    Hughes, Richard

    2011-03-01

    One of the fundamental goals of cryptographic research is to minimize the assumptions underlying the protocols that enable secure communications between pairs or groups of users. In 1984, building on earlier research by Stephen Wiesner, Charles Bennett and Gilles Brassard showed how quantum physics could be harnessed to provide information-theoretic security for protocols such as the distribution of cryptographic keys, which enables two parties to secure their conventional communications. Bennett and Brassard and colleagues performed a proof-of-principle quantum key distribution (QKD) experiment with single-photon quantum state transmission over a 32-cm air path in 1991. This seminal experiment led other researchers to explore QKD in optical fibers and over line-of-sight outdoor atmospheric paths (``free-space''), resulting in dramatic increases in range, bit rate and security. These advances have been enabled by improvements in sources and single-photon detectors. Also in 1991 Artur Ekert showed how the security of QKD could be related to quantum entanglement. This insight led to a deeper understanding and proof of QKD security with practical sources and detectors in the presence of transmission loss and channel noise. Today, QKD has been implemented over ranges much greater than 100km in both fiber and free-space, multi-node network testbeds have been demonstrated, and satellite-based QKD is under study in several countries. ``Quantum hacking'' researchers have shown the importance of extending security considerations to the classical devices that produce and detect the photon quantum states. New quantum cryptographic protocols such as secure identification have been proposed, and others such as quantum secret splitting have been demonstrated. It is now possible to envision quantum cryptography providing a more secure alternative to present-day cryptographic methods for many secure communications functions. My talk will survey these remarkable developments.

  19. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy

    PubMed Central

    2018-01-01

    The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash’s scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash’s protocol. We point out that Farash’s protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.’s scheme. We prove that the proposed protocol not only overcomes the issues in Farash’s scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure. PMID:29547619

  20. Effects of communication media choice on the quality and efficacy of emergency calls assisted by a mobile nursing protocol tool.

    PubMed

    Castro, Luis A; Favela, Jesus; Garcia-Peña, Carmen

    2014-11-01

    The transition from paper to electronic-based records in the healthcare industry has posed several challenges to conventional medical practices. The introduction of technology in day-to-day medical and nursing practices deserves careful consideration. In this work, we report the results of a controlled experiment to compare nurses' consultation in emergency calls in six different conditions. We studied the effect that the type of communication media (face-to-face, telephone, videoconference) and type of nursing protocol media (paper-based, electronic-based) can have on consultation time, mistakes made, pauses during consultation, eye contact, and efficacy of the consultation. We found that the type of communication media has an effect on consultation time; on average, fewer mistakes were made during telephone-based consultations; for eye contact, there were significantly fewer eye contacts during face-to-face than during videoconference consultations; finally, the type of communication media or protocol media did not have any effect in the efficacy of the consultation.

  1. Space-based Networking Technology Developments in the Interplanetary Network Directorate Information Technology Program

    NASA Technical Reports Server (NTRS)

    Clare, Loren; Clement, B.; Gao, J.; Hutcherson, J.; Jennings, E.

    2006-01-01

    Described recent development of communications protocols, services, and associated tools targeted to reduce risk, reduce cost and increase efficiency of IND infrastructure and supported mission operations. Space-based networking technologies developed were: a) Provide differentiated quality of service (QoS) that will give precedence to traffic that users have selected as having the greatest importance and/or time-criticality; b) Improve the total value of information to users through the use of QoS prioritization techniques; c) Increase operational flexibility and improve command-response turnaround; d) Enable new class of networked and collaborative science missions; e) Simplify applications interfaces to communications services; and f) Reduce risk and cost from a common object model and automated scheduling and communications protocols. Technologies are described in three general areas: communications scheduling, middleware, and protocols. Additionally developed simulation environment, which provides comprehensive, quantitative understanding of the technologies performance within overall, evolving architecture, as well as ability to refine & optimize specific components.

  2. DoD Electronic Data Interchange (EDI) Convention: ASC X12 Transaction Set 832 Price Sales Catalog (Version 003030)

    DTIC Science & Technology

    1992-12-01

    DATA DES . ELEMENT NAME ATlNPUTES Conditional TD401 152 Special Handling Code C ID 2/3 Code specifying special transportation handling instructions. HAN...Executhre Age"t for Eketronic Conmnerce/Electmnlc Dots lnterchange/Protection of Logistica Undaasslfled/Serssltlve Systerr Executive Agent for EC/EDI...PRICEISALES CATALOG ANSI ASC X12 VERSIONIRELEASE 003030DOD_ 7 Communications Transport Protocol ISA /_Interchange Control Header GS/ Functional Group Header

  3. Scada Malware, a Proof of Concept

    NASA Astrophysics Data System (ADS)

    Carcano, Andrea; Fovino, Igor Nai; Masera, Marcelo; Trombetta, Alberto

    Critical Infrastructures are nowadays exposed to new kind of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of ICT and Network technologies into such complex critical systems. Of particular interest are the set of vulnerabilities related to the class of communication protocols normally known as “SCADA” protocols, under which fall all the communication protocols used to remotely control the RTU devices of an industrial system. In this paper we present a proof of concept of the potential effects of a set of computer malware specifically designed and created in order to impact, by taking advantage of some vulnerabilities of the ModBUS protocol, on a typical Supervisory Control and Data Acquisition system.

  4. Space Wire Upper Layer Protocols

    NASA Technical Reports Server (NTRS)

    Rakow, Glenn; Schnurr, Richard; Gilley, Daniel; Parkes, Steve

    2004-01-01

    This viewgraph presentation addresses efforts to provide a streamlined approach for developing SpaceWire Upper layer protocols which allows industry to drive standardized communication solutions for real projects. The presentation proposes a simple packet header that will allow flexibility in implementing a diverse range of protocols.

  5. Performance and analysis of MAC protocols based on application

    NASA Astrophysics Data System (ADS)

    Yadav, Ravi; Daniel, A. K.

    2018-04-01

    Wireless Sensor Network is one of the rapid emerging technology in recent decades. It covers large application area as civilian and military. Wireless Sensor Network primary consists of sensor nodes having low-power, low cost and multifunctional activities to collaborates and communicates via wireless medium. The deployment of sensor nodes are adhoc in nature, so sensor nodes are auto organize themselves in such a way to communicate with each other. The characteristics make more challenging areas on WSNs. This paper gives overview about characteristics of WSNs, Architecture and Contention Based MAC protocol. The paper present analysis of various protocol based on performance.

  6. Private quantum computation: an introduction to blind quantum computing and related protocols

    NASA Astrophysics Data System (ADS)

    Fitzsimons, Joseph F.

    2017-06-01

    Quantum technologies hold the promise of not only faster algorithmic processing of data, via quantum computation, but also of more secure communications, in the form of quantum cryptography. In recent years, a number of protocols have emerged which seek to marry these concepts for the purpose of securing computation rather than communication. These protocols address the task of securely delegating quantum computation to an untrusted device while maintaining the privacy, and in some instances the integrity, of the computation. We present a review of the progress to date in this emerging area.

  7. User Needs and Advances in Space Wireless Sensing and Communications

    NASA Technical Reports Server (NTRS)

    Kegege, Obadiah

    2017-01-01

    Decades of space exploration and technology trends for future missions show the need for new approaches in space/planetary sensor networks, observatories, internetworking, and communications/data delivery to Earth. The User Needs to be discussed in this talk includes interviews with several scientists and reviews of mission concepts for the next generation of sensors, observatories, and planetary surface missions. These observatories, sensors are envisioned to operate in extreme environments, with advanced autonomy, whereby sometimes communication to Earth is intermittent and delayed. These sensor nodes require software defined networking capabilities in order to learn and adapt to the environment, collect science data, internetwork, and communicate. Also, some user cases require the level of intelligence to manage network functions (either as a host), mobility, security, and interface data to the physical radio/optical layer. For instance, on a planetary surface, autonomous sensor nodes would create their own ad-hoc network, with some nodes handling communication capabilities between the wireless sensor networks and orbiting relay satellites. A section of this talk will cover the advances in space communication and internetworking to support future space missions. NASA's Space Communications and Navigation (SCaN) program continues to evolve with the development of optical communication, a new vision of the integrated network architecture with more capabilities, and the adoption of CCSDS space internetworking protocols. Advances in wireless communications hardware and electronics have enabled software defined networking (DVB-S2, VCM, ACM, DTN, Ad hoc, etc.) protocols for improved wireless communication and network management. Developing technologies to fulfil these user needs for wireless communications and adoption of standardized communication/internetworking protocols will be a huge benefit to future planetary missions, space observatories, and manned missions to other planets.

  8. Triage sepsis alert and sepsis protocol lower times to fluids and antibiotics in the ED.

    PubMed

    Hayden, Geoffrey E; Tuuri, Rachel E; Scott, Rachel; Losek, Joseph D; Blackshaw, Aaron M; Schoenling, Andrew J; Nietert, Paul J; Hall, Greg A

    2016-01-01

    Early identification of sepsis in the emergency department (ED), followed by adequate fluid hydration and appropriate antibiotics, improves patient outcomes. We sought to measure the impact of a sepsis workup and treatment protocol (SWAT) that included an electronic health record (EHR)-based triage sepsis alert, direct communication, mobilization of resources, and standardized order sets. We conducted a retrospective, quasiexperimental study of adult ED patients admitted with suspected sepsis, severe sepsis, or septic shock. We defined a preimplementation (pre-SWAT) group and a postimplementation (post-SWAT) group and further broke these down into SWAT A (septic shock) and SWAT B (sepsis with normal systolic blood pressure). We performed extensive data comparisons in the pre-SWAT and post-SWAT groups, including demographics, systemic inflammatory response syndrome criteria, time to intravenous fluids bolus, time to antibiotics, length-of-stay times, and mortality rates. There were 108 patients in the pre-SWAT group and 130 patients in the post-SWAT group. The mean time to bolus was 31 minutes less in the postimplementation group, 51 vs 82 minutes (95% confidence interval, 15-46; P value < .01). The mean time to antibiotics was 59 minutes less in the postimplementation group, 81 vs 139 minutes (95% confidence interval, 44-74; P value < .01). Segmented regression modeling did not identify secular trends in these outcomes. There was no significant difference in mortality rates. An EHR-based triage sepsis alert and SWAT protocol led to a significant reduction in the time to intravenous fluids and time to antibiotics in ED patients admitted with suspected sepsis, severe sepsis, and septic shock. Copyright © 2015 Elsevier Inc. All rights reserved.

  9. A Simple XML Producer-Consumer Protocol

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of performance data. These standard protocols and representations must support tasks such as profiling parallel applications, monitoring the status of computers and networks, and monitoring the performance of services provided by a computational grid. This paper describes a proposed protocol and data representation for the exchange of events in a distributed system. The protocol exchanges messages formatted in XML and it can be layered atop any low-level communication protocol such as TCP or UDP Further, we describe Java and C++ implementations of this protocol and discuss their performance. The next section will provide some further background information. Section 3 describes the main communication patterns of our protocol. Section 4 describes how we represent events and related information using XML. Section 5 describes our protocol and Section 6 discusses the performance of two implementations of the protocol. Finally, an appendix provides the XML Schema definition of our protocol and event information.

  10. DNET: A communications facility for distributed heterogeneous computing

    NASA Technical Reports Server (NTRS)

    Tole, John; Nagappan, S.; Clayton, J.; Ruotolo, P.; Williamson, C.; Solow, H.

    1989-01-01

    This document describes DNET, a heterogeneous data communications networking facility. DNET allows programs operating on hosts on dissimilar networks to communicate with one another without concern for computer hardware, network protocol, or operating system differences. The overall DNET network is defined as the collection of host machines/networks on which the DNET software is operating. Each underlying network is considered a DNET 'domain'. Data communications service is provided between any two processes on any two hosts on any of the networks (domains) that may be reached via DNET. DNET provides protocol transparent, reliable, streaming data transmission between hosts (restricted, initially to DECnet and TCP/IP networks). DNET also provides variable length datagram service with optional return receipts.

  11. Method and apparatus for communicating computer data from one point to another over a communications medium

    DOEpatents

    Arneson, Michael R [Chippewa Falls, WI; Bowman, Terrance L [Sumner, WA; Cornett, Frank N [Chippewa Falls, WI; DeRyckere, John F [Eau Claire, WI; Hillert, Brian T [Chippewa Falls, WI; Jenkins, Philip N [Eau Claire, WI; Ma, Nan [Chippewa Falls, WI; Placek, Joseph M [Chippewa Falls, WI; Ruesch, Rodney [Eau Claire, WI; Thorson, Gregory M [Altoona, WI

    2007-07-24

    The present invention is directed toward a communications channel comprising a link level protocol, a driver, a receiver, and a canceller/equalizer. The link level protocol provides logic for DC-free signal encoding and recovery as well as supporting many features including CRC error detection and message resend to accommodate infrequent bit errors across the medium. The canceller/equalizer provides equalization for destabilized data signals and also provides simultaneous bi-directional data transfer. The receiver provides bit deskewing by removing synchronization error, or skewing, between data signals. The driver provides impedance controlling by monitoring the characteristics of the communications medium, like voltage or temperature, and providing a matching output impedance in the signal driver so that fewer distortions occur while the data travels across the communications medium.

  12. Network-Centric Quantum Communications

    NASA Astrophysics Data System (ADS)

    Hughes, Richard

    2014-03-01

    Single-photon quantum communications (QC) offers ``future-proof'' cryptographic security rooted in the laws of physics. Today's quantum-secured communications cannot be compromised by unanticipated future technological advances. But to date, QC has only existed in point-to-point instantiations that have limited ability to address the cyber security challenges of our increasingly networked world. In my talk I will describe a fundamentally new paradigm of network-centric quantum communications (NQC) that leverages the network to bring scalable, QC-based security to user groups that may have no direct user-to-user QC connectivity. With QC links only between each of N users and a trusted network node, NQC brings quantum security to N2 user pairs, and to multi-user groups. I will describe a novel integrated photonics quantum smartcard (``QKarD'') and its operation in a multi-node NQC test bed. The QKarDs are used to implement the quantum cryptographic protocols of quantum identification, quantum key distribution and quantum secret splitting. I will explain how these cryptographic primitives are used to provide key management for encryption, authentication, and non-repudiation for user-to-user communications. My talk will conclude with a description of a recent demonstration that QC can meet both the security and quality-of-service (latency) requirements for electric grid control commands and data. These requirements cannot be met simultaneously with present-day cryptography.

  13. QoS and energy aware cooperative routing protocol for wildfire monitoring wireless sensor networks.

    PubMed

    Maalej, Mohamed; Cherif, Sofiane; Besbes, Hichem

    2013-01-01

    Wireless sensor networks (WSN) are presented as proper solution for wildfire monitoring. However, this application requires a design of WSN taking into account the network lifetime and the shadowing effect generated by the trees in the forest environment. Cooperative communication is a promising solution for WSN which uses, at each hop, the resources of multiple nodes to transmit its data. Thus, by sharing resources between nodes, the transmission quality is enhanced. In this paper, we use the technique of reinforcement learning by opponent modeling, optimizing a cooperative communication protocol based on RSSI and node energy consumption in a competitive context (RSSI/energy-CC), that is, an energy and quality-of-service aware-based cooperative communication routing protocol. Simulation results show that the proposed algorithm performs well in terms of network lifetime, packet delay, and energy consumption.

  14. Design and Development of Layered Security: Future Enhancements and Directions in Transmission

    PubMed Central

    Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang

    2016-01-01

    Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack. PMID:26751443

  15. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks.

    PubMed

    Rajeswari, S Raja; Seenivasagam, V

    2016-01-01

    Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated.

  16. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks

    PubMed Central

    Rajeswari, S. Raja; Seenivasagam, V.

    2016-01-01

    Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated. PMID:26881272

  17. Controlled quantum secure communication protocol with single photons in both polarization and spatial-mode degrees of freedom

    NASA Astrophysics Data System (ADS)

    Wang, Lili; Ma, Wenping

    2016-02-01

    In this paper, we propose a new controlled quantum secure direct communication (CQSDC) protocol with single photons in both polarization and spatial-mode degrees of freedom. Based on the defined local collective unitary operations, the sender’s secret messages can be transmitted directly to the receiver through encoding secret messages on the particles. Only with the help of the third side, the receiver can reconstruct the secret messages. Each single photon in two degrees of freedom can carry two bits of information, so the cost of our protocol is less than others using entangled qubits. Moreover, the security of our QSDC network protocol is discussed comprehensively. It is shown that our new CQSDC protocol cannot only defend the outsider eavesdroppers’ several sorts of attacks but also the inside attacks. Besides, our protocol is feasible since the preparation and the measurement of single photon quantum states in both the polarization and the spatial-mode degrees of freedom are available with current quantum techniques.

  18. Design and Development of Layered Security: Future Enhancements and Directions in Transmission.

    PubMed

    Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang

    2016-01-06

    Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack.

  19. 78 FR 8090 - Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-05

    ... communicate in a manner that is functionally equivalent to communication by conventional voice telephone users... actually need the service to communicate in a manner that is functionally equivalent to communication by... equivalent to communication by conventional voice telephone users. In fact, the unobtrusive nature of IP CTS...

  20. Compact Modbus TCP/IP protocol for data acquisition systems based on limited hardware resources

    NASA Astrophysics Data System (ADS)

    Bai, Q.; Jin, B.; Wang, D.; Wang, Y.; Liu, X.

    2018-04-01

    The Modbus TCP/IP has been a standard industry communication protocol and widely utilized for establishing sensor-cloud platforms on the Internet. However, numerous existing data acquisition systems built on traditional single-chip microcontrollers without sufficient resources cannot support it, because the complete Modbus TCP/IP protocol always works dependent on a full operating system which occupies abundant hardware resources. Hence, a compact Modbus TCP/IP protocol is proposed in this work to make it run efficiently and stably even on a resource-limited hardware platform. Firstly, the Modbus TCP/IP protocol stack is analyzed and the refined protocol suite is rebuilt by streamlining the typical TCP/IP suite. Then, specific implementation of every hierarchical layer is respectively presented in detail according to the protocol structure. Besides, the compact protocol is implemented in a traditional microprocessor to validate the feasibility of the scheme. Finally, the performance of the proposed scenario is assessed. The experimental results demonstrate that message packets match the frame format of Modbus TCP/IP protocol and the average bandwidth reaches to 1.15 Mbps. The compact protocol operates stably even based on a traditional microcontroller with only 4-kB RAM and 12-MHz system clock, and no communication congestion or frequent packet loss occurs.

  1. Improving communication during volcanic crises on small, vulnerable islands

    NASA Astrophysics Data System (ADS)

    McGuire, W. J.; Solana, M. C.; Kilburn, C. R. J.; Sanderson, D.

    2009-05-01

    Increased exposure to volcanic hazard, particularly at vulnerable small islands, is driving an urgent and growing need for improved communication between monitoring scientists, emergency managers and the media, in advance of and during volcanic crises. Information gathering exercises undertaken on volcanic islands (Guadeloupe, St. Vincent and Montserrat) in the Lesser Antilles (eastern Caribbean), which have recently experienced - or are currently experiencing - volcanic action, have provided the basis for the compilation and publication of a handbook on Communication During Volcanic Emergencies, aimed at the principal stakeholder groups. The findings of the on-island surveys point up the critical importance of (1) bringing together monitoring scientists, emergency managers, and representatives of the media, well in advance of a volcanic crisis, and (2), ensuring that procedures and protocols are in place that will allow, as far as possible, effective and seamless cooperation and coordination when and if a crisis situation develops. Communication During Volcanic Emergencies is designed to promote and encourage both of these priorities through providing the first source-book addressing working relationships and inter-linkages between the stakeholder groups, and providing examples of good and bad practice. While targeting the volcanic islands of the eastern Caribbean, the source-book and its content are largely generic, and the advice and guidelines contained therein have equal validity in respect of improving communication before and during crises at any volcano, and have application to the communication issue in respect of a range of other geophysical hazards.

  2. An Improved Protocol for Controlled Deterministic Secure Quantum Communication Using Five-Qubit Entangled State

    NASA Astrophysics Data System (ADS)

    Kao, Shih-Hung; Lin, Jason; Tsai, Chia-Wei; Hwang, Tzonelih

    2018-03-01

    In early 2009, Xiu et al. (Opt. Commun. 282(2) 333-337 2009) presented a controlled deterministic secure quantum communication (CDSQC) protocol via a newly constructed five-qubit entangled quantum state. Later, Qin et al. (Opt. Commun. 282(13), 2656-2658 2009) pointed out two security loopholes in Xiu et al.'s protocol: (1) A correlation-elicitation (CE) attack can reveal the entire secret message; (2) A leakage of partial information for the receiver is noticed. Then, Xiu et al. (Opt. Commun. 283(2), 344-347 2010) presented a revised CDSQC protocol to remedy the CE attack problem. However, the information leakage problem still remains open. This work proposes a new CDSQC protocol using the same five-qubit entangled state which can work without the above mentioned security problems. Moreover, the Trojan Horse attacks can be automatically avoided without using detecting devices in the new CDSQC.

  3. An Improved Protocol for Controlled Deterministic Secure Quantum Communication Using Five-Qubit Entangled State

    NASA Astrophysics Data System (ADS)

    Kao, Shih-Hung; Lin, Jason; Tsai, Chia-Wei; Hwang, Tzonelih

    2018-06-01

    In early 2009, Xiu et al. (Opt. Commun. 282(2) 333-337 2009) presented a controlled deterministic secure quantum communication (CDSQC) protocol via a newly constructed five-qubit entangled quantum state. Later, Qin et al. (Opt. Commun. 282(13), 2656-2658 2009) pointed out two security loopholes in Xiu et al.'s protocol: (1) A correlation-elicitation (CE) attack can reveal the entire secret message; (2) A leakage of partial information for the receiver is noticed. Then, Xiu et al. (Opt. Commun. 283(2), 344-347 2010) presented a revised CDSQC protocol to remedy the CE attack problem. However, the information leakage problem still remains open. This work proposes a new CDSQC protocol using the same five-qubit entangled state which can work without the above mentioned security problems. Moreover, the Trojan Horse attacks can be automatically avoided without using detecting devices in the new CDSQC.

  4. Managing incidental findings in human subjects research: analysis and recommendations.

    PubMed

    Wolf, Susan M; Lawrenz, Frances P; Nelson, Charles A; Kahn, Jeffrey P; Cho, Mildred K; Clayton, Ellen Wright; Fletcher, Joel G; Georgieff, Michael K; Hammerschmidt, Dale; Hudson, Kathy; Illes, Judy; Kapur, Vivek; Keane, Moira A; Koenig, Barbara A; Leroy, Bonnie S; McFarland, Elizabeth G; Paradise, Jordan; Parker, Lisa S; Terry, Sharon F; Van Ness, Brian; Wilfond, Benjamin S

    2008-01-01

    No consensus yet exists on how to handle incidental findings (IFs) in human subjects research. Yet empirical studies document IFs in a wide range of research studies, where IFs are findings beyond the aims of the study that are of potential health or reproductive importance to the individual research participant. This paper reports recommendations of a two-year project group funded by NIH to study how to manage IFs in genetic and genomic research, as well as imaging research. We conclude that researchers have an obligation to address the possibility of discovering IFs in their protocol and communications with the IRB, and in their consent forms and communications with research participants. Researchers should establish a pathway for handling IFs and communicate that to the IRB and research participants. We recommend a pathway and categorize IFs into those that must be disclosed to research participants, those that may be disclosed, and those that should not be disclosed.

  5. Performance Analysis of TCP Enhancements in Satellite Data Networks

    NASA Technical Reports Server (NTRS)

    Broyles, Ren H.

    1999-01-01

    This research examines two proposed enhancements to the well-known Transport Control Protocol (TCP) in the presence of noisy communication links. The Multiple Pipes protocol is an application-level adaptation of the standard TCP protocol, where several TCP links cooperate to transfer data. The Space Communication Protocol Standard - Transport Protocol (SCPS-TP) modifies TCP to optimize performance in a satellite environment. While SCPS-TP has inherent advantages that allow it to deliver data more rapidly than Multiple Pipes, the protocol, when optimized for operation in a high-error environment, is not compatible with legacy TCP systems, and requires changes to the TCP specification. This investigation determines the level of improvement offered by SCPS-TP's Corruption Mode, which will help determine if migration to the protocol is appropriate in different environments. As the percentage of corrupted packets approaches 5 %, Multiple Pipes can take over five times longer than SCPS-TP to deliver data. At high error rates, SCPS-TP's advantage is primarily caused by Multiple Pipes' use of congestion control algorithms. The lack of congestion control, however, limits the systems in which SCPS-TP can be effectively used.

  6. Controlled Secure Direct Communication with Seven-Qubit Entangled States

    NASA Astrophysics Data System (ADS)

    Wang, Shu-Kai; Zha, Xin-Wei; Wu, Hao

    2018-01-01

    In this paper, a new controlled secure direct communication protocol based on a maximally seven-qubit entangled state is proposed. the outcomes of measurement is performed by the sender and the controller, the receiver can obtain different secret messages in a deterministic way with unit successful probability.In this scheme,by using entanglement swapping, no qubits carrying secret messages are transmitted.Therefore, the protocol is completely secure.

  7. A Communication Protocol for CyAMS and the Cyber Fighter Associate Interface

    DTIC Science & Technology

    2015-05-01

    by David Harman , Scott Brown, Brian Henz, and Lisa M Marvel Approved for public release; distribution unlimited...Laboratory A Communication Protocol for CyAMS and the Cyber Fighter Associate Interface by David Harman College Qualified Leaders Student...CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) David Harman , Scott Brown, Brian Henz, and Lisa M Marvel 5d. PROJECT

  8. A Hierarchical Modulation Coherent Communication Scheme for Simultaneous Four-State Continuous-Variable Quantum Key Distribution and Classical Communication

    NASA Astrophysics Data System (ADS)

    Yang, Can; Ma, Cheng; Hu, Linxi; He, Guangqiang

    2018-06-01

    We present a hierarchical modulation coherent communication protocol, which simultaneously achieves classical optical communication and continuous-variable quantum key distribution. Our hierarchical modulation scheme consists of a quadrature phase-shifting keying modulation for classical communication and a four-state discrete modulation for continuous-variable quantum key distribution. The simulation results based on practical parameters show that it is feasible to transmit both quantum information and classical information on a single carrier. We obtained a secure key rate of 10^{-3} bits/pulse to 10^{-1} bits/pulse within 40 kilometers, and in the meantime the maximum bit error rate for classical information is about 10^{-7}. Because continuous-variable quantum key distribution protocol is compatible with standard telecommunication technology, we think our hierarchical modulation scheme can be used to upgrade the digital communication systems to extend system function in the future.

  9. An investigation of the evolutionary origin of reciprocal communication using simulated autonomous agents.

    PubMed

    Tuci, Elio

    2009-09-01

    How does communication originates in a population of originally non-communicating individuals? Providing an answer to this question from a neo-Darwinian epistemological perspective is not a trivial task. The reason is that, for non-communicating agents, the capabilities of emitting signals and responding to them are both adaptively neutral traits if they are not simultaneously present. Research studies based on rather general and theoretically oriented evolutionary simulation models have, so far, demonstrated that at least two different processes can account for the origin of communication. On the one hand, communicative behaviour may first evolve in a non-communicative context and only subsequently acquire its adaptive function.On the other hand, communication may originate thanks to cognitive constraints; that is, communication may originate thanks to the existence of neural substrates that are common to the signalling and categorising capabilities. This article provides a proof-of-concept demonstration of the origin of communication in a novel-simulated scenario in which groups of two homogeneous (i.e. genetically identical) agents exploit reciprocal communication to develop common perceptual categories nd to perform a collective task. In particular, in circumstances in which communication is evolutionarily advantageous, simulated agents evolve from scratch social behaviour through acoustic interactions.We look into the phylogeny of successful communication protocol, and we describe the evolutionary phenomena that, in early evolutionary stages, paved the way for the subsequent development of reciprocal communication, categorisation capabilities and successful cooperative strategies.

  10. A Round-Efficient Authenticated Key Agreement Scheme Based on Extended Chaotic Maps for Group Cloud Meeting.

    PubMed

    Lin, Tsung-Hung; Tsung, Chen-Kun; Lee, Tian-Fu; Wang, Zeng-Bo

    2017-12-03

    The security is a critical issue for business purposes. For example, the cloud meeting must consider strong security to maintain the communication privacy. Considering the scenario with cloud meeting, we apply extended chaotic map to present passwordless group authentication key agreement, termed as Passwordless Group Authentication Key Agreement (PL-GAKA). PL-GAKA improves the computation efficiency for the simple group password-based authenticated key agreement (SGPAKE) proposed by Lee et al. in terms of computing the session key. Since the extended chaotic map has equivalent security level to the Diffie-Hellman key exchange scheme applied by SGPAKE, the security of PL-GAKA is not sacrificed when improving the computation efficiency. Moreover, PL-GAKA is a passwordless scheme, so the password maintenance is not necessary. Short-term authentication is considered, hence the communication security is stronger than other protocols by dynamically generating session key in each cloud meeting. In our analysis, we first prove that each meeting member can get the correct information during the meeting. We analyze common security issues for the proposed PL-GAKA in terms of session key security, mutual authentication, perfect forward security, and data integrity. Moreover, we also demonstrate that communicating in PL-GAKA is secure when suffering replay attacks, impersonation attacks, privileged insider attacks, and stolen-verifier attacks. Eventually, an overall comparison is given to show the performance between PL-GAKA, SGPAKE and related solutions.

  11. A Randomized Controlled Trial of the Effectiveness of Traditional and Mobile Public Health Communications With Health Care Providers.

    PubMed

    Baseman, Janet; Revere, Debra; Painter, Ian; Oberle, Mark; Duchin, Jeffrey; Thiede, Hanne; Nett, Randall; MacEachern, Dorothy; Stergachis, Andy

    2016-02-01

    Health care providers play an essential role in public health emergency preparedness and response. We conducted a 4-year randomized controlled trial to systematically compare the effectiveness of traditional and mobile communication strategies for sending time-sensitive public health messages to providers. Subjects (N=848) included providers who might be leveraged to assist with emergency preparedness and response activities, such as physicians, pharmacists, nurse practitioners, physician's assistants, and veterinarians. Providers were randomly assigned to a group that received time-sensitive quarterly messages via e-mail, fax, or cell phone text messaging (SMS) or to a no-message control group. Follow-up phone interviews elicited information about message receipt, topic recall, and perceived credibility and trustworthiness of message and source. Our main outcome measures were awareness and recall of message content, which was compared across delivery methods. Per-protocol analysis revealed that e-mail messages were recalled at a higher rate than were messaged delivered by fax or SMS, whereas the as-treated analysis found that e-mail and fax groups had similar recall rates and both had higher recall rates than the SMS group. This is the first study to systematically evaluate the relative effectiveness of public health message delivery systems. Our findings provide guidance to improve public health agency communications with providers before, during, and after a public health emergency.

  12. Entanglement-Assisted Communication System for NASA's Deep-Space Missions

    NASA Technical Reports Server (NTRS)

    Kwiat, Paul; Bernstein, Herb; Javadi, Hamid

    2016-01-01

    For this project we have studied various forms of quantum communication, and quantum-enhanced classical communication. In particular, we have performed the first realization of a novel quantum protocol, superdense teleportation. We have also showed that in some cases, the advantages of superdense coding (which enhances classical channel capacity by up to a factor of two) can be realized without the use of entanglement. Finally, we considered some more advanced protocols, with the goal to realize 'superactivation' - two entangled channels have capabilities beyond the sum of the individual channels-and conclude that more study is needed in this area.

  13. Application Level Protocol Development for Library and Information Science Applications. Volume 1: Service Definition. Volume 2: Protocol Specification. Report No. TG.1.5; TG.50.

    ERIC Educational Resources Information Center

    Aagaard, James S.; And Others

    This two-volume document specifies a protocol that was developed using the Reference Model for Open Systems Interconnection (OSI), which provides a framework for communications within a heterogeneous network environment. The protocol implements the features necessary for bibliographic searching, record maintenance, and mail transfer between…

  14. Relativistic quantum cryptography

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Molotkov, S. N., E-mail: molotkov@issp.ac.ru

    2011-03-15

    A new protocol of quantum key distribution is proposed to transmit keys through free space. Along with quantum-mechanical restrictions on the discernibility of nonorthogonal quantum states, the protocol uses additional restrictions imposed by special relativity theory. Unlike all existing quantum key distribution protocols, this protocol ensures key secrecy for a not strictly one-photon source of quantum states and an arbitrary length of a quantum communication channel.

  15. Quantum secret sharing using orthogonal multiqudit entangled states

    NASA Astrophysics Data System (ADS)

    Bai, Chen-Ming; Li, Zhi-Hui; Liu, Cheng-Ji; Li, Yong-Ming

    2017-12-01

    In this work, we investigate the distinguishability of orthogonal multiqudit entangled states under restricted local operations and classical communication. According to these properties, we propose a quantum secret sharing scheme to realize three types of access structures, i.e., the ( n, n)-threshold, the restricted (3, n)-threshold and restricted (4, n)-threshold schemes (called LOCC-QSS scheme). All cooperating players in the restricted threshold schemes are from two disjoint groups. In the proposed protocol, the participants use the computational basis measurement and classical communication to distinguish between those orthogonal states and reconstruct the original secret. Furthermore, we also analyze the security of our scheme in four primary quantum attacks and give a simple encoding method in order to better prevent the participant conspiracy attack.

  16. IMHRP: Improved Multi-Hop Routing Protocol for Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Huang, Jianhua; Ruan, Danwei; Hong, Yadong; Zhao, Ziming; Zheng, Hong

    2017-10-01

    Wireless sensor network (WSN) is a self-organizing system formed by a large number of low-cost sensor nodes through wireless communication. Sensor nodes collect environmental information and transmit it to the base station (BS). Sensor nodes usually have very limited battery energy. The batteries cannot be charged or replaced. Therefore, it is necessary to design an energy efficient routing protocol to maximize the network lifetime. This paper presents an improved multi-hop routing protocol (IMHRP) for homogeneous networks. In the IMHRP protocol, based on the distances to the BS, the CH nodes are divided into internal CH nodes and external CH nodes. The set-up phase of the protocol is based on the LEACH protocol and the minimum distance between CH nodes are limited to a special constant distance, so a more uniform distribution of CH nodes is achieved. In the steady-state phase, the routes of different CH nodes are created on the basis of the distances between the CH nodes. The energy efficiency of communication can be maximized. The simulation results show that the proposed algorithm can more effectively reduce the energy consumption of each round and prolong the network lifetime compared with LEACH protocol and MHT protocol.

  17. Enhancing user privacy in SARG04-based private database query protocols

    NASA Astrophysics Data System (ADS)

    Yu, Fang; Qiu, Daowen; Situ, Haozhen; Wang, Xiaoming; Long, Shun

    2015-11-01

    The well-known SARG04 protocol can be used in a private query application to generate an oblivious key. By usage of the key, the user can retrieve one out of N items from a database without revealing which one he/she is interested in. However, the existing SARG04-based private query protocols are vulnerable to the attacks of faked data from the database since in its canonical form, the SARG04 protocol lacks means for one party to defend attacks from the other. While such attacks can cause significant loss of user privacy, a variant of the SARG04 protocol is proposed in this paper with new mechanisms designed to help the user protect its privacy in private query applications. In the protocol, it is the user who starts the session with the database, trying to learn from it bits of a raw key in an oblivious way. An honesty test is used to detect a cheating database who had transmitted faked data. The whole private query protocol has O( N) communication complexity for conveying at least N encrypted items. Compared with the existing SARG04-based protocols, it is efficient in communication for per-bit learning.

  18. Evolution of Signaling in a Multi-Robot System: Categorization and Communication

    NASA Astrophysics Data System (ADS)

    Ampatzis, Christos; Tuci, Elio; Trianni, Vito; Dorigo, Marco

    We use Evolutionary Robotics to design robot controllers in which decision-making mechanisms to switch from solitary to social behavior are integrated with the mechanisms that underpin the sensory-motor repertoire of the robots. In particular, we study the evolution of behavioral and communicative skills in a categorization task. The individual decision-making structures are based on the integration over time of sensory information. The mechanisms for switching from solitary to social behavior and the ways in which the robots can affect each other's behavior are not predetermined by the experimenter, but are aspects of our model designed by artificial evolution. Our results show that evolved robots manage to cooperate and collectively discriminate between different environments by developing a simple communication protocol based on sound signaling. Communication emerges in the absence of explicit selective pressure coded in the fitness function. The evolution of communication is neither trivial nor obvious; for a meaningful signaling system to evolve, evolution must produce both appropriate signals and appropriate reactions to signals. The use of communication proves to be adaptive for the group, even if, in principle, non-cooperating robots can be equally successful with cooperating robots.

  19. Deterministic Secure Quantum Communication and Authentication Protocol based on Extended GHZ-W State and Quantum One-time Pad

    NASA Astrophysics Data System (ADS)

    Li, Na; Li, Jian; Li, Lei-Lei; Wang, Zheng; Wang, Tao

    2016-08-01

    A deterministic secure quantum communication and authentication protocol based on extended GHZ-W state and quantum one-time pad is proposed. In the protocol, state | φ -> is used as the carrier. One photon of | φ -> state is sent to Alice, and Alice obtains a random key by measuring photons with bases determined by ID. The information of bases is secret to others except Alice and Bob. Extended GHZ-W states are used as decoy photons, the positions of which in information sequence are encoded with identity string ID of the legal user, and the eavesdropping detection rate reaches 81%. The eavesdropping detection based on extended GHZ-W state combines with authentication and the secret ID ensures the security of the protocol.

  20. 7 CFR 400.202 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... and software, data communications hardware and software, and printers utilized with the system. (e...), International Business Systems (IBM)-defined, byte controlled communications protocol, using control characters...

  1. 7 CFR 400.202 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... and software, data communications hardware and software, and printers utilized with the system. (e...), International Business Systems (IBM)-defined, byte controlled communications protocol, using control characters...

  2. Robust general N user authentication scheme in a centralized quantum communication network via generalized GHZ states

    NASA Astrophysics Data System (ADS)

    Farouk, Ahmed; Batle, J.; Elhoseny, M.; Naseri, Mosayeb; Lone, Muzaffar; Fedorov, Alex; Alkhambashi, Majid; Ahmed, Syed Hassan; Abdel-Aty, M.

    2018-04-01

    Quantum communication provides an enormous advantage over its classical counterpart: security of communications based on the very principles of quantum mechanics. Researchers have proposed several approaches for user identity authentication via entanglement. Unfortunately, these protocols fail because an attacker can capture some of the particles in a transmitted sequence and send what is left to the receiver through a quantum channel. Subsequently, the attacker can restore some of the confidential messages, giving rise to the possibility of information leakage. Here we present a new robust General N user authentication protocol based on N-particle Greenberger-Horne-Zeilinger (GHZ) states, which makes eavesdropping detection more effective and secure, as compared to some current authentication protocols. The security analysis of our protocol for various kinds of attacks verifies that it is unconditionally secure, and that an attacker will not obtain any information about the transmitted key. Moreover, as the number of transferred key bits N becomes larger, while the number of users for transmitting the information is increased, the probability of effectively obtaining the transmitted authentication keys is reduced to zero.

  3. OpenFlow arbitrated programmable network channels for managing quantum metadata

    DOE PAGES

    Dasari, Venkat R.; Humble, Travis S.

    2016-10-10

    Quantum networks must classically exchange complex metadata between devices in order to carry out information for protocols such as teleportation, super-dense coding, and quantum key distribution. Demonstrating the integration of these new communication methods with existing network protocols, channels, and data forwarding mechanisms remains an open challenge. Software-defined networking (SDN) offers robust and flexible strategies for managing diverse network devices and uses. We adapt the principles of SDN to the deployment of quantum networks, which are composed from unique devices that operate according to the laws of quantum mechanics. We show how quantum metadata can be managed within a software-definedmore » network using the OpenFlow protocol, and we describe how OpenFlow management of classical optical channels is compatible with emerging quantum communication protocols. We next give an example specification of the metadata needed to manage and control quantum physical layer (QPHY) behavior and we extend the OpenFlow interface to accommodate this quantum metadata. Here, we conclude by discussing near-term experimental efforts that can realize SDN’s principles for quantum communication.« less

  4. OpenFlow arbitrated programmable network channels for managing quantum metadata

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dasari, Venkat R.; Humble, Travis S.

    Quantum networks must classically exchange complex metadata between devices in order to carry out information for protocols such as teleportation, super-dense coding, and quantum key distribution. Demonstrating the integration of these new communication methods with existing network protocols, channels, and data forwarding mechanisms remains an open challenge. Software-defined networking (SDN) offers robust and flexible strategies for managing diverse network devices and uses. We adapt the principles of SDN to the deployment of quantum networks, which are composed from unique devices that operate according to the laws of quantum mechanics. We show how quantum metadata can be managed within a software-definedmore » network using the OpenFlow protocol, and we describe how OpenFlow management of classical optical channels is compatible with emerging quantum communication protocols. We next give an example specification of the metadata needed to manage and control quantum physical layer (QPHY) behavior and we extend the OpenFlow interface to accommodate this quantum metadata. Here, we conclude by discussing near-term experimental efforts that can realize SDN’s principles for quantum communication.« less

  5. Air Force Research Initiation Program 1986 Technical Report Volume 1

    DTIC Science & Technology

    1988-04-01

    inaccuracy of meteoroligical measurements. For the convenience of this study, the first two oi these will be further grouped together as ’ modelO ...communication protocol is a set of rules governing the exchange of data between entities forming the network, and is the focus of this research. 1.2.1 The OSI ...This model, termed Open Systems Interconnection ( OSI ), presents standards for the exchange of information among systems that are "open" to one 25-5

  6. 76 FR 66889 - Closed Captioning of Internet Protocol-Delivered Video Programming: Implementation of the Twenty...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-28

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Parts 15 and 79 [MB Docket No. 11-154; DA 11-1766] Closed... Communications and Video Accessibility Act of 2010 AGENCY: Federal Communications Commission. ACTION: Proposed... . Follow the instructions for submitting comments. Federal Communications Commission's Electronic Comment...

  7. 14 CFR 431.41 - Communications plan.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... direct access to real-time, safety-critical information required for making decisions and issuing... communications during launch and reentry; (3) A protocol is established for utilizing defined radio... that accurately reflects communications made on individual channels, synchronized time coding, and...

  8. 14 CFR 431.41 - Communications plan.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... direct access to real-time, safety-critical information required for making decisions and issuing... communications during launch and reentry; (3) A protocol is established for utilizing defined radio... that accurately reflects communications made on individual channels, synchronized time coding, and...

  9. 14 CFR 431.41 - Communications plan.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... direct access to real-time, safety-critical information required for making decisions and issuing... communications during launch and reentry; (3) A protocol is established for utilizing defined radio... that accurately reflects communications made on individual channels, synchronized time coding, and...

  10. 14 CFR 431.41 - Communications plan.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... direct access to real-time, safety-critical information required for making decisions and issuing... communications during launch and reentry; (3) A protocol is established for utilizing defined radio... that accurately reflects communications made on individual channels, synchronized time coding, and...

  11. Performance analysis of the ALOHA protocol with replication in a fading channel for the Mobile Satellite Experiment

    NASA Technical Reports Server (NTRS)

    Clare, L. P.; Yan, T.-Y.

    1985-01-01

    The analysis of the ALOHA random access protocol for communications channels with fading is presented. The protocol is modified to send multiple contiguous copies of a message at each transmission attempt. Both pure and slotted ALOHA channels are considered. A general two state model is used for the channel error process to account for the channel fading memory. It is shown that greater throughput and smaller delay may be achieved using repetitions. The model is applied to the analysis of the delay-throughput performance in a fading mobile communications environment. Numerical results are given for NASA's Mobile Satellite Experiment.

  12. Three-party quantum secure direct communication against collective noise

    NASA Astrophysics Data System (ADS)

    He, Ye-Feng; Ma, Wen-Ping

    2017-10-01

    Based on logical quantum states, two three-party quantum secure direct communication protocols are proposed, which can realize the exchange of the secret messages between three parties with the help of the measurement correlation property of six-particle entangled states. These two protocols can be immune to the collective-dephasing noise and the collective-rotation noise, respectively; neither of them has information leakage problem. The one-way transmission mode ensures that they can congenitally resist against the Trojan horse attacks and the teleportation attack. Furthermore, these two protocols are secure against other active attacks because of the use of the decoy state technology.

  13. Influence of the Distribution of Tag IDs on RFID Memoryless Anti-Collision Protocols.

    PubMed

    Cmiljanic, Nikola; Landaluce, Hugo; Perallos, Asier; Arjona, Laura

    2017-08-17

    In recent years, Radio Frequency Identification (RFID) has become very popular. The main feature of this technology is that RFID tags do not require close handling and no line of sight is required between the reader and the tags. RFID is a technology that uses radio frequencies in order to identify tags, which do not need to be positioned accurately relative to the reader. Tags share the communication channel, increasing the likelihood of causing a problem, viz., a message collision. Tree based protocols can resolve these collisions, but require a uniform tag ID distribution. This means they are very dependent of the distribution of the IDs of the tags. Tag IDs are written in the tag and contain a predefined bit string of data. A study of the influence of the tag ID distribution on the protocols' behaviour is proposed here. A new protocol, called the Flexible Query window Tree (FQwT) is presented to estimate the tag ID distribution, taking into consideration the type of distribution. The aim is to create a flexible anti-collision protocol in order to identify a set of tags that constitute an ID distribution. As a result, the reader classifies tags into groups determined by using a distribution estimator. Simulations show that the FQwT protocol contributes to significant reductions in identification time and energy consumption regardless of the type of ID distribution.

  14. 40 CFR 721.4472 - Phenyl, alkyl, hydroxyalkyl substituted imidazole (generic).

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... percent), and (c). (ii) Hazard communication program. Requirements as specified in § 721.72 (a), (b), (c... protocol. (3) TSCA Good Laboratory Practice Standards at 40 CFR part 792. (4) Using methodologies generally..., the person must obtain approval of test protocols from EPA by submitting written protocols. EPA will...

  15. Role of memory errors in quantum repeaters

    NASA Astrophysics Data System (ADS)

    Hartmann, L.; Kraus, B.; Briegel, H.-J.; Dür, W.

    2007-03-01

    We investigate the influence of memory errors in the quantum repeater scheme for long-range quantum communication. We show that the communication distance is limited in standard operation mode due to memory errors resulting from unavoidable waiting times for classical signals. We show how to overcome these limitations by (i) improving local memory and (ii) introducing two operational modes of the quantum repeater. In both operational modes, the repeater is run blindly, i.e., without waiting for classical signals to arrive. In the first scheme, entanglement purification protocols based on one-way classical communication are used allowing to communicate over arbitrary distances. However, the error thresholds for noise in local control operations are very stringent. The second scheme makes use of entanglement purification protocols with two-way classical communication and inherits the favorable error thresholds of the repeater run in standard mode. One can increase the possible communication distance by an order of magnitude with reasonable overhead in physical resources. We outline the architecture of a quantum repeater that can possibly ensure intercontinental quantum communication.

  16. Experimental quantum fingerprinting with weak coherent pulses

    PubMed Central

    Xu, Feihu; Arrazola, Juan Miguel; Wei, Kejin; Wang, Wenyuan; Palacios-Avila, Pablo; Feng, Chen; Sajeed, Shihan; Lütkenhaus, Norbert; Lo, Hoi-Kwong

    2015-01-01

    Quantum communication holds the promise of creating disruptive technologies that will play an essential role in future communication networks. For example, the study of quantum communication complexity has shown that quantum communication allows exponential reductions in the information that must be transmitted to solve distributed computational tasks. Recently, protocols that realize this advantage using optical implementations have been proposed. Here we report a proof-of-concept experimental demonstration of a quantum fingerprinting system that is capable of transmitting less information than the best-known classical protocol. Our implementation is based on a modified version of a commercial quantum key distribution system using off-the-shelf optical components over telecom wavelengths, and is practical for messages as large as 100 Mbits, even in the presence of experimental imperfections. Our results provide a first step in the development of experimental quantum communication complexity. PMID:26515586

  17. Experimental quantum fingerprinting with weak coherent pulses.

    PubMed

    Xu, Feihu; Arrazola, Juan Miguel; Wei, Kejin; Wang, Wenyuan; Palacios-Avila, Pablo; Feng, Chen; Sajeed, Shihan; Lütkenhaus, Norbert; Lo, Hoi-Kwong

    2015-10-30

    Quantum communication holds the promise of creating disruptive technologies that will play an essential role in future communication networks. For example, the study of quantum communication complexity has shown that quantum communication allows exponential reductions in the information that must be transmitted to solve distributed computational tasks. Recently, protocols that realize this advantage using optical implementations have been proposed. Here we report a proof-of-concept experimental demonstration of a quantum fingerprinting system that is capable of transmitting less information than the best-known classical protocol. Our implementation is based on a modified version of a commercial quantum key distribution system using off-the-shelf optical components over telecom wavelengths, and is practical for messages as large as 100 Mbits, even in the presence of experimental imperfections. Our results provide a first step in the development of experimental quantum communication complexity.

  18. Experimental quantum fingerprinting with weak coherent pulses

    NASA Astrophysics Data System (ADS)

    Xu, Feihu; Arrazola, Juan Miguel; Wei, Kejin; Wang, Wenyuan; Palacios-Avila, Pablo; Feng, Chen; Sajeed, Shihan; Lütkenhaus, Norbert; Lo, Hoi-Kwong

    2015-10-01

    Quantum communication holds the promise of creating disruptive technologies that will play an essential role in future communication networks. For example, the study of quantum communication complexity has shown that quantum communication allows exponential reductions in the information that must be transmitted to solve distributed computational tasks. Recently, protocols that realize this advantage using optical implementations have been proposed. Here we report a proof-of-concept experimental demonstration of a quantum fingerprinting system that is capable of transmitting less information than the best-known classical protocol. Our implementation is based on a modified version of a commercial quantum key distribution system using off-the-shelf optical components over telecom wavelengths, and is practical for messages as large as 100 Mbits, even in the presence of experimental imperfections. Our results provide a first step in the development of experimental quantum communication complexity.

  19. The Experimental Demonstration of High Efficiency Interaction-free Measurement for Quantum Counterfactual-like Communication.

    PubMed

    Liu, Chao; Liu, Jinhong; Zhang, Junxiang; Zhu, Shiyao

    2017-09-07

    We present an interaction-free measurement with quantum Zeno effect and a high efficiency η = 74.6% ± 0.15%. As a proof-of-principle demonstration, this measurement can be used to implement a quantum counterfactual-like communication protocol. Instead of a single photon state, we use a coherent light as the input source and show that the output agrees with the proposed quantum counterfactual communication protocol according to Salih et al. Although the counterfactuality is not achieved due to the presence of a few photons in the public channel, we show that the signal light is nearly absent in the public channel, which exhibits a proof-of-principle quantum counterfactual-like property of communication.

  20. Continuous-Variable Measurement-Device-Independent Multipartite Quantum Communication Using Coherent States

    NASA Astrophysics Data System (ADS)

    Zhou, Jian; Guo, Ying

    2017-02-01

    A continuous-variable measurement-device-independent (CV-MDI) multipartite quantum communication protocol is designed to realize multipartite communication based on the GHZ state analysis using Gaussian coherent states. It can remove detector side attack as the multi-mode measurement is blindly done in a suitable Black Box. The entanglement-based CV-MDI multipartite communication scheme and the equivalent prepare-and-measurement scheme are proposed to analyze the security and guide experiment, respectively. The general eavesdropping and coherent attack are considered for the security analysis. Subsequently, all the attacks are ascribed to coherent attack against imperfect links. The asymptotic key rate of the asymmetric configuration is also derived with the numeric simulations illustrating the performance of the proposed protocol.

  1. Cost Computations for Cyber Fighter Associate

    DTIC Science & Technology

    2015-05-01

    associate. Aberdeen Proving Ground (MD): Army Research Laboratory (US); in press. 2 Harman D, Brown S, Henz B, Marvel LM. A communication protocol... Harman , et al.2 A specific class called ListenThread was created for multithreaded listeners. When ListenThread is instantiated, it is passed a given...2. Harman D, Brown S, Henz B, Marvel LM. A communication protocol for CyAMS and the cyber associate interface. Aberdeen Proving Ground (MD): US Army

  2. Shared Activity Coordination

    NASA Technical Reports Server (NTRS)

    Clement, Bradley J.; Barrett, Anthony C.

    2003-01-01

    Interacting agents that interleave planning and execution must reach consensus on their commitments to each other. In domains where agents have varying degrees of interaction and different constraints on communication and computation, agents will require different coordination protocols in order to efficiently reach consensus in real time. We briefly describe a largely unexplored class of real-time, distributed planning problems (inspired by interacting spacecraft missions), new challenges they pose, and a general approach to solving the problems. These problems involve self-interested agents that have infrequent communication but collaborate on joint activities. We describe a Shared Activity Coordination (SHAC) framework that provides a decentralized algorithm for negotiating the scheduling of shared activities in a dynamic environment, a soft, real-time approach to reaching consensus during execution with limited communication, and a foundation for customizing protocols for negotiating planner interactions. We apply SHAC to a realistic simulation of interacting Mars missions and illustrate the simplicity of protocol development.

  3. Continual coordination through shared activities

    NASA Technical Reports Server (NTRS)

    Clement, Bradley J.; Barrett, Anthony C.

    2003-01-01

    Interacting agents that interleave planning and execution must reach consensus on their commitments to each other. In domains where agents have varying degrees of interaction and different constraints on communication and computation, agents will require different coordination protocols in order to efficiently reach consensus in real time. We briefly describe a largely unexplored class of realtime, distributed planning problems (inspired by interacting spacecraft missions), new challenges they pose, and a general approach to solving the problems. These problems involve self-interested agents that have infrequent communication but collaborate on joint activities. We describe a Shared Activity Coordination (SHAC) framework that provides a decentralized algorithm for negotiating the scheduling of shared activities over the lifetimes of separate missions, a soft, real-time approach to reaching consensus during execution with limited communication, and a foundation for customizing protocols for negotiating planner interactions. We apply SHAC to a realistic simulation of interacting Mars missions and illustrate the simplicity of protocol development.

  4. Entanglement distillation for quantum communication network with atomic-ensemble memories.

    PubMed

    Li, Tao; Yang, Guo-Jian; Deng, Fu-Guo

    2014-10-06

    Atomic ensembles are effective memory nodes for quantum communication network due to the long coherence time and the collective enhancement effect for the nonlinear interaction between an ensemble and a photon. Here we investigate the possibility of achieving the entanglement distillation for nonlocal atomic ensembles by the input-output process of a single photon as a result of cavity quantum electrodynamics. We give an optimal entanglement concentration protocol (ECP) for two-atomic-ensemble systems in a partially entangled pure state with known parameters and an efficient ECP for the systems in an unknown partially entangled pure state with a nondestructive parity-check detector (PCD). For the systems in a mixed entangled state, we introduce an entanglement purification protocol with PCDs. These entanglement distillation protocols have high fidelity and efficiency with current experimental techniques, and they are useful for quantum communication network with atomic-ensemble memories.

  5. Moving Triadic Gaze Intervention Into Practice: Measuring Clinician Attitude and Implementation Fidelity

    PubMed Central

    Olswang, Lesley B.; Greenslade, Kathryn; Pinder, Gay Lloyd; Dowden, Patricia; Madden, Jodi

    2017-01-01

    Purpose This research investigated a first step in implementing the dynamic assessment (DA) component of Triadic Gaze Intervention (Olswang, Feuerstein, Pinder, & Dowden, 2013; Olswang et al., 2014), an evidence-based protocol for teaching early signals of communication to young children with physical disabilities. Clinician attitudes about adopting external evidence into practice and implementation fidelity in DA protocol delivery were examined following training. Method Seven early intervention clinicians from multiple disciplines were trained to deliver the four essential elements of the DA protocol: (a) provide communication opportunity, (b) recognize child's potentially communicative signal, (c) shape child's signal toward triadic gaze, and (d) reinforce with play. Clinician attitude regarding adopting evidence into practice was measured at baseline and follow-up, with the Evidence-Based Practice Attitude Scale (Aarons, 2004). Implementation fidelity in delivering the protocol was measured for adherence (accuracy) and competence (quality) during trial implementation. Results Clinicians' attitudes about trying new evidence that at first was perceived as incongruent with their practice improved over the course of the research. Clinicians demonstrated strong adherence to the DA protocol; however, competence varied across clinicians and appeared related to child performance. Conclusions The results provided insight into moving Triadic Gaze Intervention into practice and yielded valuable information regarding the implementation process, with implications for future research. PMID:28525577

  6. Space Link Extension Protocol Emulation for High-Throughput, High-Latency Network Connections

    NASA Technical Reports Server (NTRS)

    Tchorowski, Nicole; Murawski, Robert

    2014-01-01

    New space missions require higher data rates and new protocols to meet these requirements. These high data rate space communication links push the limitations of not only the space communication links, but of the ground communication networks and protocols which forward user data to remote ground stations (GS) for transmission. The Consultative Committee for Space Data Systems, (CCSDS) Space Link Extension (SLE) standard protocol is one protocol that has been proposed for use by the NASA Space Network (SN) Ground Segment Sustainment (SGSS) program. New protocol implementations must be carefully tested to ensure that they provide the required functionality, especially because of the remote nature of spacecraft. The SLE protocol standard has been tested in the NASA Glenn Research Center's SCENIC Emulation Lab in order to observe its operation under realistic network delay conditions. More specifically, the delay between then NASA Integrated Services Network (NISN) and spacecraft has been emulated. The round trip time (RTT) delay for the continental NISN network has been shown to be up to 120ms; as such the SLE protocol was tested with network delays ranging from 0ms to 200ms. Both a base network condition and an SLE connection were tested with these RTT delays, and the reaction of both network tests to the delay conditions were recorded. Throughput for both of these links was set at 1.2Gbps. The results will show that, in the presence of realistic network delay, the SLE link throughput is significantly reduced while the base network throughput however remained at the 1.2Gbps specification. The decrease in SLE throughput has been attributed to the implementation's use of blocking calls. The decrease in throughput is not acceptable for high data rate links, as the link requires constant data a flow in order for spacecraft and ground radios to stay synchronized, unless significant data is queued a the ground station. In cases where queuing the data is not an option, such as during real time transmissions, the SLE implementation cannot support high data rate communication.

  7. EDI and the Technical Communicator.

    ERIC Educational Resources Information Center

    Eiler, Mary Ann

    1994-01-01

    Assesses the role of technical communicators in electronic data interchange (EDI). Argues that, as experts in information design, human factors, instructional theory, and professional writing, technical communicators should be advocates of standard documentation protocols and should rethink the traditional concepts of "document" to…

  8. Repeated Transmissions In Mobile/Satellite Communications

    NASA Technical Reports Server (NTRS)

    Yan, Tsun-Yee; Clare, Loren P.

    1988-01-01

    Repetition increases throughput and decreases delay. Paper discusses theoretical performance of communication system for land-mobile stations with satellite relay using ALOHA random-access protocol modified for repeated transimssions. Methods and conclusions contribute to general understanding of packet communications in fading channels.

  9. OSI-compatible protocols for mobile-satellite communications: The AMSS experience

    NASA Technical Reports Server (NTRS)

    Moher, Michael

    1990-01-01

    The protocol structure of the international aeronautical mobile satellite service (AMSS) is reviewed with emphasis on those aspects of protocol performance, validation, and conformance which are peculiar to mobile services. This is in part an analysis of what can be learned from the AMSS experience with protocols which is relevant to the design of other mobile satellite data networks, e.g., land mobile.

  10. An Enhanced LoRaWAN Security Protocol for Privacy Preservation in IoT with a Case Study on a Smart Factory-Enabled Parking System.

    PubMed

    You, Ilsun; Kwon, Soonhyun; Choudhary, Gaurav; Sharma, Vishal; Seo, Jung Taek

    2018-06-08

    The Internet of Things (IoT) utilizes algorithms to facilitate intelligent applications across cities in the form of smart-urban projects. As the majority of devices in IoT are battery operated, their applications should be facilitated with a low-power communication setup. Such facility is possible through the Low-Power Wide-Area Network (LPWAN), but at a constrained bit rate. For long-range communication over LPWAN, several approaches and protocols are adopted. One such protocol is the Long-Range Wide Area Network (LoRaWAN), which is a media access layer protocol for long-range communication between the devices and the application servers via LPWAN gateways. However, LoRaWAN comes with fewer security features as a much-secured protocol consumes more battery because of the exorbitant computational overheads. The standard protocol fails to support end-to-end security and perfect forward secrecy while being vulnerable to the replay attack that makes LoRaWAN limited in supporting applications where security (especially end-to-end security) is important. Motivated by this, an enhanced LoRaWAN security protocol is proposed, which not only provides the basic functions of connectivity between the application server and the end device, but additionally averts these listed security issues. The proposed protocol is developed with two options, the Default Option (DO) and the Security-Enhanced Option (SEO). The protocol is validated through Burrows⁻Abadi⁻Needham (BAN) logic and the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The proposed protocol is also analyzed for overheads through system-based and low-power device-based evaluations. Further, a case study on a smart factory-enabled parking system is considered for its practical application. The results, in terms of network latency with reliability fitting and signaling overheads, show paramount improvements and better performance for the proposed protocol compared with the two handshake options, Pre-Shared Key (PSK) and Elliptic Curve Cryptography (ECC), of Datagram Transport Layer Security (DTLS).

  11. Meta-analysis of PECS with individuals with ASD: investigation of targeted versus non-targeted outcomes, participant characteristics, and implementation phase.

    PubMed

    Ganz, Jennifer B; Davis, John L; Lund, Emily M; Goodwyn, Fara D; Simpson, Richard L

    2012-01-01

    The Picture Exchange Communication System (PECS) is a widely used picture/icon aided augmentative communication system designed for learners with autism and other developmental disorders. This meta-analysis analyzes the extant empirical literature for PECS relative to targeted (functional communication) and non-targeted concomitant outcomes (behavior, social skills, and speech) for learners with autism, learners with autism and intellectual disabilities and those with autism and multiple disabilities. Effect size analyses were done using the Improvement Rate Difference method, an advanced metric. Effect sizes were independently analyzed for targeted and non-targeted outcomes, student age, learner disability, and number of phases in the PECS protocol acquired by learners. Results supported the judgment that PECS is a promising intervention method. Analysis also revealed that functional communication outcomes associated with the PECS protocol were most impacted, that preschool children and those with autism generally showed the strongest training effects, and that in general students who advanced through the most PECS protocol phases had the best outcomes. Copyright © 2011 Elsevier Ltd. All rights reserved.

  12. Towards secure quantum key distribution protocol for wireless LANs: a hybrid approach

    NASA Astrophysics Data System (ADS)

    Naik, R. Lalu; Reddy, P. Chenna

    2015-12-01

    The primary goals of security such as authentication, confidentiality, integrity and non-repudiation in communication networks can be achieved with secure key distribution. Quantum mechanisms are highly secure means of distributing secret keys as they are unconditionally secure. Quantum key distribution protocols can effectively prevent various attacks in the quantum channel, while classical cryptography is efficient in authentication and verification of secret keys. By combining both quantum cryptography and classical cryptography, security of communications over networks can be leveraged. Hwang, Lee and Li exploited the merits of both cryptographic paradigms for provably secure communications to prevent replay, man-in-the-middle, and passive attacks. In this paper, we propose a new scheme with the combination of quantum cryptography and classical cryptography for 802.11i wireless LANs. Since quantum cryptography is premature in wireless networks, our work is a significant step forward toward securing communications in wireless networks. Our scheme is known as hybrid quantum key distribution protocol. Our analytical results revealed that the proposed scheme is provably secure for wireless networks.

  13. Trade-Off Analysis Report

    NASA Technical Reports Server (NTRS)

    Dhas, Chris

    2000-01-01

    NASAs Glenn Research Center (GRC) defines and develops advanced technology for high priority national needs in communications technologies for application to aeronautics and space. GRC tasked Computer Networks and Software Inc. (CNS) to examine protocols and architectures for an In-Space Internet Node. CNS has developed a methodology for network reference models to support NASAs four mission areas: Earth Science, Space Science, Human Exploration and Development of Space (REDS), Aerospace Technology. CNS previously developed a report which applied the methodology, to three space Internet-based communications scenarios for future missions. CNS conceptualized, designed, and developed space Internet-based communications protocols and architectures for each of the independent scenarios. GRC selected for further analysis the scenario that involved unicast communications between a Low-Earth-Orbit (LEO) International Space Station (ISS) and a ground terminal Internet node via a Tracking and Data Relay Satellite (TDRS) transfer. This report contains a tradeoff analysis on the selected scenario. The analysis examines the performance characteristics of the various protocols and architectures. The tradeoff analysis incorporates the results of a CNS developed analytical model that examined performance parameters.

  14. Addressing the gaps in preparation for quarantine.

    PubMed

    Nathawad, Rita; Roblin, Patricia M; Pruitt, Darrin; Arquilla, Bonnie

    2013-04-01

    In the event of an outbreak of a communicable respiratory illness, quarantine may become necessary. The New York Institute for All Hazard Preparedness (NYIAHP) of the State University of New York (SUNY) Downstate Medical Center, in cooperation with the New York City Department of Health and Mental Hygiene's Healthcare Emergency Preparedness Program, (NYC DOHMH-HEPP) quarantine working group, has developed a series of clinical protocols to help health care facilities respond to such an event. Two full-scale exercises (FSEs) were designed and conducted a year apart in the quarantine unit at Kings County Hospital Center (KCHC) to test the efficacy and feasibility of these quarantine protocols. The goal of these exercises was to identify the gaps in preparedness for quarantine and increase hospital readiness for such an event. Evaluators monitored for efficient management of critical physical plants, personnel and material resources. Players were expected to integrate and practice emergency response plans and protocols specific to quarantine. In developing the exercise objectives, five activities were selected for evaluation: Activation of the Unit, Staffing, Charting/Admission, Symptom Monitoring and Infection Control, and Client Management. The results of the initial FSE found that there were incomplete critical tasks within all five protocols: These deficiencies were detailed in an After Action Report and an Improvement Plan was presented to the KCHC Disaster Preparedness Committee a month after the initial FSE. In the second FSE a year later, all critical tasks for Activation of the unit, Staffing and Charting/Admission were achieved. Completion of critical tasks related to Symptom Monitoring and Infection Control and Client Management was improved in the second FSE, but some tasks were still not performed appropriately. In short, these exercises identified critical needs in disaster preparedness of the KCHC Quarantine Unit. The lessons learned from this logistical exercise enabled the planning group to have a better understanding of leadership needs, communication capabilities, and infection control procedures. Kings County Hospital Center performed well during these exercises. It was clear that performance in the second exercise was improved, and many problems noted in the first exercise were corrected. Staff also felt better prepared the second time. This supports the idea that frequent exercises are vital to maintain disaster readiness.

  15. Toward Synthesis, Analysis, and Certification of Security Protocols

    NASA Technical Reports Server (NTRS)

    Schumann, Johann

    2004-01-01

    Implemented security protocols are basically pieces of software which are used to (a) authenticate the other communication partners, (b) establish a secure communication channel between them (using insecure communication media), and (c) transfer data between the communication partners in such a way that these data only available to the desired receiver, but not to anyone else. Such an implementation usually consists of the following components: the protocol-engine, which controls in which sequence the messages of the protocol are sent over the network, and which controls the assembly/disassembly and processing (e.g., decryption) of the data. the cryptographic routines to actually encrypt or decrypt the data (using given keys), and t,he interface to the operating system and to the application. For a correct working of such a security protocol, all of these components must work flawlessly. Many formal-methods based techniques for the analysis of a security protocols have been developed. They range from using specific logics (e.g.: BAN-logic [4], or higher order logics [12] to model checking [2] approaches. In each approach, the analysis tries to prove that no (or at least not a modeled intruder) can get access to secret data. Otherwise, a scenario illustrating the &tack may be produced. Despite the seeming simplicity of security protocols ("only" a few messages are sent between the protocol partners in order to ensure a secure communication), many flaws have been detected. Unfortunately, even a perfect protocol engine does not guarantee flawless working of a security protocol, as incidents show. Many break-ins and security vulnerabilities are caused by exploiting errors in the implementation of the protocol engine or the underlying operating system. Attacks using buffer-overflows are a very common class of such attacks. Errors in the implementation of exception or error handling can open up additional vulnerabilities. For example, on a website with a log-in screen: multiple tries with invalid passwords caused the expected error message (too many retries). but let the user nevertheless pass. Finally, security can be compromised by silly implementation bugs or design decisions. In a commercial VPN software, all calls to the encryption routines were incidentally replaced by stubs, probably during factory testing. The product worked nicely. and the error (an open VPN) would have gone undetected, if a team member had not inspected the low-level traffic out of curiosity. Also, the use secret proprietary encryption routines can backfire, because such algorithms often exhibit weaknesses which can be exploited easily (see e.g., DVD encoding). Summarizing, there is large number of possibilities to make errors which can compromise the security of a protocol. In today s world with short time-to-market and the use of security protocols in open and hostile networks for safety-critical applications (e.g., power or air-traffic control), such slips could lead to catastrophic situations. Thus, formal methods and automatic reasoning techniques should not be used just for the formal proof of absence of an attack, but they ought to be used to provide an end-to-end tool-supported framework for security software. With such an approach all required artifacts (code, documentation, test cases) , formal analyses, and reliable certification will be generated automatically, given a single, high level specification. By a combination of program synthesis, formal protocol analysis, certification; and proof-carrying code, this goal is within practical reach, since all the important technologies for such an approach actually exist and only need to be assembled in the right way.

  16. Communication architecture system for fiber positioning of DESI spectrograph

    NASA Astrophysics Data System (ADS)

    Kaci, Karim; Glez-de-Rivera, Guillermo; Lopez-Colino, Fernando; Martinez-Garcia, M. Sofia; Masa, Jose L.; Garrido, Javier; Sanchez, Justo; Prada, Francisco

    2016-07-01

    This paper presents a design proposal for controlling the five thousand fiber positioners within the focal plate of the DESI instrument. Each of these positioners is a robot which allows positioning its optic fiber with a resolution within the range of few microns. The high number and density of these robots poses a challenge for handling the communication from a central control device to each of these five thousand. Furthermore, an additional restriction applies as the required time to communicate to every robot of its position must be smaller than a second. Additionally. a low energy consumption profile is also desired. Both wireless and wired communication protocols have been evaluated, proposing single-technology-based architectures and hybrid ones (a combination of them). Among the wireless solutions, ZigBee and CyFi have been considered. Using simulation tools these wireless protocols have been discarded as they do not allow an efficient communication. The studied wired protocols comprise I2C, CAN and Ethernet. The best solution found is a hybrid multilayer architecture combining both Ethernet and I2C. A 100 Mbps Ethernet based network is used to communicate the central control unit with ten management boards. Each of these boards is a low-cost, low-power embedded device that manages a thirty six degrees sector of the sensing plate. Each of these boards receives the positioning data for five hundred robots and communicate with each one through a fast mode plus I2C bus. This proposal allows to communicate the positioning information for all five thousand robots in 350 ms total.

  17. Single-shot secure quantum network coding on butterfly network with free public communication

    NASA Astrophysics Data System (ADS)

    Owari, Masaki; Kato, Go; Hayashi, Masahito

    2018-01-01

    Quantum network coding on the butterfly network has been studied as a typical example of quantum multiple cast network. We propose a secure quantum network code for the butterfly network with free public classical communication in the multiple unicast setting under restricted eavesdropper’s power. This protocol certainly transmits quantum states when there is no attack. We also show the secrecy with shared randomness as additional resource when the eavesdropper wiretaps one of the channels in the butterfly network and also derives the information sending through public classical communication. Our protocol does not require verification process, which ensures single-shot security.

  18. Leo Satellite Communication through a LEO Constellation using TCP/IP Over ATM

    NASA Technical Reports Server (NTRS)

    Foore, Lawrence R.; Konangi, Vijay K.; Wallett, Thomas M.

    1999-01-01

    The simulated performance characteristics for communication between a terrestrial client and a Low Earth Orbit (LEO) satellite server are presented. The client and server nodes consist of a Transmission Control Protocol /Internet Protocol (TCP/IP) over ATM configuration. The ATM cells from the client or the server are transmitted to a gateway, packaged with some header information and transferred to a commercial LEO satellite constellation. These cells are then routed through the constellation to a gateway on the globe that allows the client/server communication to take place. Unspecified Bit Rate (UBR) is specified as the quality of service (QoS). Various data rates are considered.

  19. Distributed Dynamic Host Configuration Protocol (D2HCP)

    PubMed Central

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    Mobile Ad Hoc Networks (MANETs) are multihop wireless networks of mobile nodes without any fixed or preexisting infrastructure. The topology of these networks can change randomly due to the unpredictable mobility of nodes and their propagation characteristics. In most networks, including MANETs, each node needs a unique identifier to communicate. This work presents a distributed protocol for dynamic node IP address assignment in MANETs. Nodes of a MANET synchronize from time to time to maintain a record of IP address assignments in the entire network and detect any IP address leaks. The proposed stateful autoconfiguration scheme uses the OLSR proactive routing protocol for synchronization and guarantees unique IP addresses under a variety of network conditions, including message losses and network partitioning. Simulation results show that the protocol incurs low latency and communication overhead for IP address assignment. PMID:22163856

  20. Faithful teleportation with partially entangled states

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gour, Gilad

    2004-10-01

    We write explicitly a general protocol for faithful teleportation of a d-state particle (qudit) via a partially entangled pair of (pure) n-state particles. The classical communication cost (CCC) of the protocol is log{sub 2}(nd) bits, and it is implemented by a projective measurement performed by Alice, and a unitary operator performed by Bob (after receiving from Alice the measurement result). We prove the optimality of our protocol by a comparison with the concentrate and teleport strategy. We also show that if d>n/2, or if there is no residual entanglement left after the faithful teleportation, the CCC of any protocol ismore » at least log{sub 2}(nd) bits. Furthermore, we find a lower bound on the CCC in the process transforming one bipartite state to another by means of local operation and classical communication.« less

  1. Distributed Dynamic Host Configuration Protocol (D2HCP).

    PubMed

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    Mobile Ad Hoc Networks (MANETs) are multihop wireless networks of mobile nodes without any fixed or preexisting infrastructure. The topology of these networks can change randomly due to the unpredictable mobility of nodes and their propagation characteristics. In most networks, including MANETs, each node needs a unique identifier to communicate. This work presents a distributed protocol for dynamic node IP address assignment in MANETs. Nodes of a MANET synchronize from time to time to maintain a record of IP address assignments in the entire network and detect any IP address leaks. The proposed stateful autoconfiguration scheme uses the OLSR proactive routing protocol for synchronization and guarantees unique IP addresses under a variety of network conditions, including message losses and network partitioning. Simulation results show that the protocol incurs low latency and communication overhead for IP address assignment.

  2. Measurement device-independent quantum dialogue

    NASA Astrophysics Data System (ADS)

    Maitra, Arpita

    2017-12-01

    Very recently, the experimental demonstration of quantum secure direct communication (QSDC) with state-of-the-art atomic quantum memory has been reported (Zhang et al. in Phys Rev Lett 118:220501, 2017). Quantum dialogue (QD) falls under QSDC where the secrete messages are communicated simultaneously between two legitimate parties. The successful experimental demonstration of QSDC opens up the possibilities for practical implementation of QD protocols. Thus, it is necessary to analyze the practical security issues of QD protocols for future implementation. Since the very first proposal for QD by Nguyen (Phys Lett A 328:6-10, 2004), a large number of variants and extensions have been presented till date. However, all of those leak half of the secret bits to the adversary through classical communications of the measurement results. In this direction, motivated by the idea of Lo et al. (Phys Rev Lett 108:130503, 2012), we propose a measurement device-independent quantum dialogue scheme which is resistant to such information leakage as well as side-channel attacks. In the proposed protocol, Alice and Bob, two legitimate parties, are allowed to prepare the states only. The states are measured by an untrusted third party who may himself behave as an adversary. We show that our protocol is secure under this adversarial model. The current protocol does not require any quantum memory, and thus, it is inherently robust against memory attacks. Such robustness might not be guaranteed in the QSDC protocol with quantum memory (Zhang et al. 2017).

  3. Communication and protocol compliance and their relation to the quality of cardiopulmonary resuscitation (CPR): A mixed-methods study of simulated telephone-assisted CPR.

    PubMed

    Nord-Ljungquist, Helena; Brännström, Margareta; Bohm, Katarina

    2015-07-01

    In the event of a cardiac arrest, emergency medical dispatchers (EMDs) play a critical role by providing telephone-assisted cardiopulmonary resuscitation (T-CPR) to laypersons. The aim of our investigation was to describe compliance with the T-CPR protocol, the performance of the laypersons in a simulated T-CPR situation, and the communication between laypersons and EMDs during these actions. We conducted a retrospective observational study by analysing 20 recorded video and audio files. In a simulation, EMDs provided laypersons with instructions following T-CPR protocols. These were then analysed using a mixed method with convergent parallel design. If the EMDs complied with the T-CPR protocol, the laypersons performed the correct procedures in 71% of the actions. The single most challenging instruction of the T-CPR protocol, for both EMDs and laypersons, was airway control. Mean values for compression depth and frequency did not reach established guideline goals for CPR. Proper application of T-CPR protocols by EMDs resulted in better performance by laypersons in CPR. The most problematic task for EMDs as well for laypersons was airway management. The study results did not establish that the quality of communication between EMDs and laypersons performing CPR in a cardiac arrest situation led to statistically different outcomes, as measured by the quality and effectiveness of the CPR delivered. Copyright © 2014 Elsevier Ltd. All rights reserved.

  4. Interdisciplinary development and implementation of communication checklist for postoperative management of pediatric airway patients.

    PubMed

    Kim, Sang W; Maturo, Stephen; Dwyer, Danielle; Monash, Bradley; Yager, Phoebe H; Zanger, Kerstin; Hartnick, Christopher J

    2012-01-01

    The authors describe their multidisciplinary experience in applying the Institute of Health Improvement methodology to develop a protocol and checklist to reduce communication error during transfer of care for postoperative pediatric surgical airway patients. Preliminary outcome data following implementation of the protocol and checklist are also presented. Prospective study from July 1, 2009, to February 1, 2011. Tertiary care center. Subjects. One hundred twenty-six pediatric airway patients who required coordinated care between Massachusetts Eye and Ear Infirmary and Massachusetts General Hospital. Two sentinel events involving airway emergencies demonstrated a critical need for a standardized, comprehensive instrument that would ensure safe transfer of care. After development and implementation of the protocol and checklist, an initial pilot period on the first set of 9 pediatric airway patients was reassessed. Subsequent prospective 11-month follow-up data of 93 pediatric airway patients were collected and analyzed. A multidisciplinary pediatric team developed and implemented a formalized, postoperative checklist and transfer protocol. After implementation of the checklist and transfer protocol, prospective analysis showed no adverse events from miscommunication during transfer of care over the subsequent 11-month period involving 93 pediatric airway patients. There has been very little written in the quality and safety patient literature about coordinating effective transfer of care between the pediatric surgical and medical subspecialty realms. After design and implementation of a simple, electronically based transfer-of-care checklist and protocol, the number of postsurgical pediatric airway information transfer and communication errors decreased significantly.

  5. O How Wondrous Is E-Mail!

    ERIC Educational Resources Information Center

    Buchanan, Larry

    1998-01-01

    Addresses the use of e-mail for communication and collaborative projects in schools. Discusses the effectiveness of an e-mail system based on a UNIX host; problems with POP (post office protocol) client programs; and the new Internet Mail Access Protocol (IMAP) which addresses most of the shortcomings of the POP protocol while keeping advantages…

  6. An Overview and Analysis of Mobile Internet Protocols in Cellular Environments.

    ERIC Educational Resources Information Center

    Chao, Han-Chieh

    2001-01-01

    Notes that cellular is the inevitable future architecture for the personal communication service system. Discusses the current cellular support based on Mobile Internet Protocol version 6 (Ipv6) and points out the shortfalls of using Mobile IP. Highlights protocols especially for mobile management schemes which can optimize a high-speed mobile…

  7. A universal data access and protocol integration mechanism for smart home

    NASA Astrophysics Data System (ADS)

    Shao, Pengfei; Yang, Qi; Zhang, Xuan

    2013-03-01

    With the lack of standardized or completely missing communication interfaces in home electronics, there is no perfect solution to address every aspect in smart homes based on existing protocols and technologies. In addition, the central control unit (CCU) of smart home system working point-to-point between the multiple application interfaces and the underlying hardware interfaces leads to its complicated architecture and unpleasant performance. A flexible data access and protocol integration mechanism is required. The current paper offers a universal, comprehensive data access and protocol integration mechanism for a smart home. The universal mechanism works as a middleware adapter with unified agreements of the communication interfaces and protocols, offers an abstraction of the application level from the hardware specific and decoupling the hardware interface modules from the application level. Further abstraction for the application interfaces and the underlying hardware interfaces are executed based on adaption layer to provide unified interfaces for more flexible user applications and hardware protocol integration. This new universal mechanism fundamentally changes the architecture of the smart home and in some way meets the practical requirement of smart homes more flexible and desirable.

  8. A Simulation System Based on the Actor Paradigm

    DTIC Science & Technology

    1988-02-01

    of the protocol. Shared memory communication requires the programmer to wait and signal semaphores explicitly to synchronize the communicating parties...wide range of possibilities within the same basic protocol. - The simplicity of the primitive operation set affords those creating new operations...more flexibility (Ada has a large and complicated primitive set). -3- II I I I B A I -I I I I I . 0 1 2 3 4 5 Time 0: Both processes A and B are

  9. Configurable Crossbar Switch for Deterministic, Low-latency Inter-blade Communications in a MicroTCA Platform

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Karamooz, Saeed; Breeding, John Eric; Justice, T Alan

    As MicroTCA expands into applications beyond the telecommunications industry from which it originated, it faces new challenges in the area of inter-blade communications. The ability to achieve deterministic, low-latency communications between blades is critical to realizing a scalable architecture. In the past, legacy bus architectures accomplished inter-blade communications using dedicated parallel buses across the backplane. Because of limited fabric resources on its backplane, MicroTCA uses the carrier hub (MCH) for this purpose. Unfortunately, MCH products from commercial vendors are limited to standard bus protocols such as PCI Express, Serial Rapid IO and 10/40GbE. While these protocols have exceptional throughput capability,more » they are neither deterministic nor necessarily low-latency. To overcome this limitation, an MCH has been developed based on the Xilinx Virtex-7 690T FPGA. This MCH provides the system architect/developer complete flexibility in both the interface protocol and routing of information between blades. In this paper, we present the application of this configurable MCH concept to the Machine Protection System under development for the Spallation Neutron Sources's proton accelerator. Specifically, we demonstrate the use of the configurable MCH as a 12x4-lane crossbar switch using the Aurora protocol to achieve a deterministic, low-latency data link. In this configuration, the crossbar has an aggregate bandwidth of 48 GB/s.« less

  10. GLOBECOM '84 - Global Telecommunications Conference, Atlanta, GA, November 26-29, 1984, Conference Record. Volume 3

    NASA Astrophysics Data System (ADS)

    Attention is given to aspects of quality assurance methodologies in development life cycles, optical intercity transmission systems, multiaccess protocols, system and technology aspects in the case of regional/domestic satellites, advances in SSB-AM radio transmission over terrestrial and satellite network, and development environments for telecommunications systems. Other subjects studied are concerned with business communication networks for voice and data, VLSI in local network and communication protocol, product evaluation and support, an update regarding Videotex, topics in communication theory, topics in radio propagation, a status report regarding societal effects of technology in the workplace, digital image processing, and adaptive signal processing for communications. The management of the reliability function in the development process is considered along with Giga-bit technologies for long distance large capacity optical transmission equipment. The application of gallium arsenide analog and digital integrated circuits for high-speed fiber optical communications, and a simple algorithm for image data coding.

  11. AIB-OR: improving onion routing circuit construction using anonymous identity-based cryptosystems.

    PubMed

    Wang, Changji; Shi, Dongyuan; Xu, Xilei

    2015-01-01

    The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. However, existing onion routing protocols usually exhibit poor performance due to repeated encryption operations. In this paper, we first present an improved anonymous multi-receiver identity-based encryption (AMRIBE) scheme, and an improved identity-based one-way anonymous key agreement (IBOWAKE) protocol. We then propose an efficient onion routing protocol named AIB-OR that provides provable security and strong anonymity. Our main approach is to use our improved AMRIBE scheme and improved IBOWAKE protocol in onion routing circuit construction. Compared with other onion routing protocols, AIB-OR provides high efficiency, scalability, strong anonymity and fault tolerance. Performance measurements from a prototype implementation show that our proposed AIB-OR can achieve high bandwidths and low latencies when deployed over the Internet.

  12. In quantum direct communication an undetectable eavesdropper can always tell Ψ from Φ Bell states in the message mode

    NASA Astrophysics Data System (ADS)

    Pavičić, Mladen

    2013-04-01

    We show that in any quantum direct communication protocol that is based on Ψ and Φ Bell states, an eavesdropper can always tell Ψ from Φ states without altering the transmission in any way in the message mode. This renders all protocols that make use of only one Ψ state and one Φ state completely insecure in the message mode. All four-Bell-state protocols require a revision and this might be of importance for new implementations of entanglement-based cryptographic protocols. The detection rate of an eavesdropper is 25% per control transmission, i.e., a half of the rate in the two-state (ping-pong) protocol. An eavesdropper can detect control probes with certainty in the standard control transmission without a photon in the Alice-to-Bob's travel mode and with near certainty in a transmission with a fake photon in the travel mode. Resending of measured control photons via the travel mode would make an eavesdropper completely invisible.

  13. AIB-OR: Improving Onion Routing Circuit Construction Using Anonymous Identity-Based Cryptosystems

    PubMed Central

    Wang, Changji; Shi, Dongyuan; Xu, Xilei

    2015-01-01

    The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. However, existing onion routing protocols usually exhibit poor performance due to repeated encryption operations. In this paper, we first present an improved anonymous multi-receiver identity-based encryption (AMRIBE) scheme, and an improved identity-based one-way anonymous key agreement (IBOWAKE) protocol. We then propose an efficient onion routing protocol named AIB-OR that provides provable security and strong anonymity. Our main approach is to use our improved AMRIBE scheme and improved IBOWAKE protocol in onion routing circuit construction. Compared with other onion routing protocols, AIB-OR provides high efficiency, scalability, strong anonymity and fault tolerance. Performance measurements from a prototype implementation show that our proposed AIB-OR can achieve high bandwidths and low latencies when deployed over the Internet. PMID:25815879

  14. Social-aware data dissemination in opportunistic mobile social networks

    NASA Astrophysics Data System (ADS)

    Yang, Yibo; Zhao, Honglin; Ma, Jinlong; Han, Xiaowei

    Opportunistic Mobile Social Networks (OMSNs), formed by mobile users with social relationships and characteristics, enhance spontaneous communication among users that opportunistically encounter each other. Such networks can be exploited to improve the performance of data forwarding. Discovering optimal relay nodes is one of the important issues for efficient data propagation in OMSNs. Although traditional centrality definitions to identify the nodes features in network, they cannot identify effectively the influential nodes for data dissemination in OMSNs. Existing protocols take advantage of spatial contact frequency and social characteristics to enhance transmission performance. However, existing protocols have not fully exploited the benefits of the relations and the effects between geographical information, social features and user interests. In this paper, we first evaluate these three characteristics of users and design a routing protocol called Geo-Social-Interest (GSI) protocol to select optimal relay nodes. We compare the performance of GSI using real INFOCOM06 data sets. The experiment results demonstrate that GSI overperforms the other protocols with highest data delivery ratio and low communication overhead.

  15. Further developments in generating type-safe messaging

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Neswold, R.; King, C.; /Fermilab

    2011-11-01

    At ICALEPCS 09, we introduced a source code generator that allows processes to communicate safely using data types native to each host language. In this paper, we discuss further development that has occurred since the conference in Kobe, Japan, including the addition of three more client languages, an optimization in network packet size and the addition of a new protocol data type. The protocol compiler is continuing to prove itself as an easy and robust way to get applications written in different languages hosted on different computer architectures to communicate. We have two active Erlang projects that are using themore » protocol compiler to access ACNET data at high data rates. We also used the protocol compiler output to deliver ACNET data to an iPhone/iPad application. Since it takes an average of two weeks to support a new language, we're willing to expand the protocol compiler to support new languages that our community uses.« less

  16. Adaptive Probabilistic Protocols for Advanced Networks/Assuring the Integrity of Highly Decentralized Communications Systems

    DTIC Science & Technology

    2005-03-01

    to obtain a protocol customized to the needs of a specific setting, under control of an automated theorem proving system that can guarantee...new “compositional” method for protocol design and implementation, in which small microprotocols are combined to obtain a protocol customized to the...and Network Centric Enterprise (NCES) visions. This final report documents a wide range of contributions and technology transitions, including: A

  17. An implementation of the SNR high speed network communication protocol (Receiver part)

    NASA Astrophysics Data System (ADS)

    Wan, Wen-Jyh

    1995-03-01

    This thesis work is to implement the receiver pan of the SNR high speed network transport protocol. The approach was to use the Systems of Communicating Machines (SCM) as the formal definition of the protocol. Programs were developed on top of the Unix system using C programming language. The Unix system features that were adopted for this implementation were multitasking, signals, shared memory, semaphores, sockets, timers and process control. The problems encountered, and solved, were signal loss, shared memory conflicts, process synchronization, scheduling, data alignment and errors in the SCM specification itself. The result was a correctly functioning program which implemented the SNR protocol. The system was tested using different connection modes, lost packets, duplicate packets and large data transfers. The contributions of this thesis are: (1) implementation of the receiver part of the SNR high speed transport protocol; (2) testing and integration with the transmitter part of the SNR transport protocol on an FDDI data link layered network; (3) demonstration of the functions of the SNR transport protocol such as connection management, sequenced delivery, flow control and error recovery using selective repeat methods of retransmission; and (4) modifications to the SNR transport protocol specification such as corrections for incorrect predicate conditions, defining of additional packet types formats, solutions for signal lost and processes contention problems etc.

  18. Vibrons in finite size molecular lattices: a route for high-fidelity quantum state transfer at room temperature.

    PubMed

    Pouthier, Vincent

    2012-11-07

    A communication protocol is proposed in which vibron-mediated quantum state transfer takes place in a molecular lattice. We consider two distant molecular groups grafted on each side of the lattice. These groups form two quantum computers where vibrational qubits are implemented and received. The lattice defines the communication channel along which a vibron delocalizes and interacts with a phonon bath. Using quasi-degenerate perturbation theory, vibron-phonon entanglement is taken into account through the effective Hamiltonian concept. A vibron is thus dressed by a virtual phonon cloud whereas a phonon is clothed by virtual vibronic transitions. It is shown that three quasi-degenerate dressed states define the relevant paths followed by a vibron to tunnel between the computers. When the coupling between the computers and the lattice is judiciously chosen, constructive interference takes place between these paths. Phonon-induced decoherence is minimized and a high-fidelity quantum state transfer occurs over a broad temperature range.

  19. Quantum error correction assisted by two-way noisy communication

    PubMed Central

    Wang, Zhuo; Yu, Sixia; Fan, Heng; Oh, C. H.

    2014-01-01

    Pre-shared non-local entanglement dramatically simplifies and improves the performance of quantum error correction via entanglement-assisted quantum error-correcting codes (EAQECCs). However, even considering the noise in quantum communication only, the non-local sharing of a perfectly entangled pair is technically impossible unless additional resources are consumed, such as entanglement distillation, which actually compromises the efficiency of the codes. Here we propose an error-correcting protocol assisted by two-way noisy communication that is more easily realisable: all quantum communication is subjected to general noise and all entanglement is created locally without additional resources consumed. In our protocol the pre-shared noisy entangled pairs are purified simultaneously by the decoding process. For demonstration, we first present an easier implementation of the well-known EAQECC [[4, 1, 3; 1

  20. Quantum error correction assisted by two-way noisy communication.

    PubMed

    Wang, Zhuo; Yu, Sixia; Fan, Heng; Oh, C H

    2014-11-26

    Pre-shared non-local entanglement dramatically simplifies and improves the performance of quantum error correction via entanglement-assisted quantum error-correcting codes (EAQECCs). However, even considering the noise in quantum communication only, the non-local sharing of a perfectly entangled pair is technically impossible unless additional resources are consumed, such as entanglement distillation, which actually compromises the efficiency of the codes. Here we propose an error-correcting protocol assisted by two-way noisy communication that is more easily realisable: all quantum communication is subjected to general noise and all entanglement is created locally without additional resources consumed. In our protocol the pre-shared noisy entangled pairs are purified simultaneously by the decoding process. For demonstration, we first present an easier implementation of the well-known EAQECC [[4, 1, 3; 1

  1. Quantum Private Queries

    NASA Astrophysics Data System (ADS)

    Giovannetti, Vittorio; Lloyd, Seth; Maccone, Lorenzo

    2008-06-01

    We propose a cheat sensitive quantum protocol to perform a private search on a classical database which is efficient in terms of communication complexity. It allows a user to retrieve an item from the database provider without revealing which item he or she retrieved: if the provider tries to obtain information on the query, the person querying the database can find it out. The protocol ensures also perfect data privacy of the database: the information that the user can retrieve in a single query is bounded and does not depend on the size of the database. With respect to the known (quantum and classical) strategies for private information retrieval, our protocol displays an exponential reduction in communication complexity and in running-time computational complexity.

  2. A Generic Communication Protocol for Remote Laboratories: an Implementation on e-lab

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Henriques, Rafael B.; Fernandes, H.; Duarte, Andre S.

    2015-07-01

    The remote laboratories at IST (Instituto Superior Tecnico), e-lab, serve as a valuable tool for education and training based on remote control technologies. Due to the high number and increase of remotely operated experiments a generic protocol was developed to perform the communication between the software driver and the respective experimental setup in an easier and more unified way. The training in these fields of students and personnel can take advantage of such infrastructure with the purpose of deploying new experiments in a faster way. More than 10 experiments using the generic protocol are available on-line in a 24 xmore » 7 way. (authors)« less

  3. AD HOC Networks for the Autonomous Car

    NASA Astrophysics Data System (ADS)

    Ron, Davidescu; Negrus, Eugen

    2017-10-01

    The future of the vehicle is made of cars, roads and infrastructures connected in a two way automated communication in a holistic system. It is a mandatory to use Encryption to maintain Confidentiality, Integrity and Availability in an ad hoc vehicle network. Vehicle to Vehicle communication, requires multichannel interaction between mobile, moving and changing parties to insure the full benefit from data sharing and real time decision making, a network of such users referred as mobile ad hoc network (MANET), however as ad hoc networks were not implemented in such a scale, it is not clear what is the best method and protocol to apply. Furthermore the visibility of secure preferred asymmetric encrypted ad hoc networks in a real time environment of dense moving autonomous vehicles has to be demonstrated, In order to evaluate the performance of Ad Hoc networks in changing conditions a simulation of multiple protocols was performed on large number of mobile nodes. The following common routing protocols were tested, DSDV is a proactive protocol, every mobile station maintains a routing table with all available destinations, DSR is a reactive routing protocol which allows nodes in the MANET to dynamically discover a source route across multiple network hops, AODV is a reactive routing protocol Instead of being proactive. It minimizes the number of broadcasts by creating routes based on demand, SAODV is a secure version of AODV, requires heavyweight asymmetric cryptographic, ARIANDE is a routing protocol that relies on highly efficient symmetric cryptography the concept is primarily based on DSR. A methodical evolution was performed in a various density of transportation, based on known communication bench mark parameters including, Throughput Vs. time, Routing Load per packets and bytes. Out of the none encrypted protocols, It is clear that in terms of performance of throughput and routing load DSR protocol has a clear advantage the high node number mode. The encrypted protocols show lower performance with ARIANDE being superior to SAODV and SRP. Nevertheless all protocol simulation proved it to match required real time performance.

  4. An Architectural Concept for Intrusion Tolerance in Air Traffic Networks

    NASA Technical Reports Server (NTRS)

    Maddalon, Jeffrey M.; Miner, Paul S.

    2003-01-01

    The goal of an intrusion tolerant network is to continue to provide predictable and reliable communication in the presence of a limited num ber of compromised network components. The behavior of a compromised network component ranges from a node that no longer responds to a nod e that is under the control of a malicious entity that is actively tr ying to cause other nodes to fail. Most current data communication ne tworks do not include support for tolerating unconstrained misbehavio r of components in the network. However, the fault tolerance communit y has developed protocols that provide both predictable and reliable communication in the presence of the worst possible behavior of a limited number of nodes in the system. One may view a malicious entity in a communication network as a node that has failed and is behaving in an arbitrary manner. NASA/Langley Research Center has developed one such fault-tolerant computing platform called SPIDER (Scalable Proces sor-Independent Design for Electromagnetic Resilience). The protocols and interconnection mechanisms of SPIDER may be adapted to large-sca le, distributed communication networks such as would be required for future Air Traffic Management systems. The predictability and reliabi lity guarantees provided by the SPIDER protocols have been formally v erified. This analysis can be readily adapted to similar network stru ctures.

  5. Enhancing Communication to Improve Patient Safety and to Increase Patient Satisfaction.

    PubMed

    Burgener, Audrey M

    With the continuous rise of sentinel and adverse events due to ineffective communication, it is time for health care organizations to start implementing a focus on enhancing effective communication in which will, in turn, improve patient safety and experience, boosting the bottom line. This article identifies and discusses different communication protocols that can be used to enhance the consistency of more efficient and effective communication within a health care organization to overall improve patient care and patient satisfaction. The rising importance of patient satisfaction and Hospital Consumer Assessment of Healthcare Providers and Systems scores required by the Centers for Medicare and Medicaid Services are causing a shift in how hospitals evaluate and manage their health care organizations today. Following the situation-background-assessment-recommendation and acknowledge-introduce-duration-explain-thank protocols, as well as proper and effective training and educational programs, enhances more effective communication in health care organizations which improves patient safety and increases patient satisfaction.

  6. Toward Composable Hardware Agnostic Communications Blocks Lessons Learned

    DTIC Science & Technology

    2016-11-01

    ad9361/products/product.html [12] Google. Protocol Buffers. [Online]. Available: https://developers.google.com/protocol-buffers/ [13] VITA, “ANSI/VITA 49.0 VITA Radio Transport ( VRT ) Standard,” VITA, Tech. Rep., 2015.

  7. A Research Program in Computer Technology. Volume 1

    DTIC Science & Technology

    1981-08-01

    rigidity, sensor networks 10. command and control, digital voice communication, graphic input device for terminal, multimedia communications, portable...satellite channel in the internetwork environment; Distributed Sensor Networks - formulation of algorithms and communication protocols to support the...operation of geographically distributed sensors ; Personal Communicator - work intended to result in a demonstration-level portable terminal to test and

  8. Establishing a basic speech repertoire without using NSOME: means, motive, and opportunity.

    PubMed

    Davis, Barbara; Velleman, Shelley

    2008-11-01

    Children who are performing at a prelinguistic level of vocal communication present unique issues related to successful intervention relative to the general population of children with speech disorders. These children do not consistently use meaning-based vocalizations to communicate with those around them. General goals for this group of children include stimulating more mature vocalization types and connecting these vocalizations to meanings that can be used to communicate consistently with persons in their environment. We propose a means, motive, and opportunity conceptual framework for assessing and intervening with these children. This framework is centered on stimulation of meaningful vocalizations for functional communication. It is based on a broad body of literature describing the nature of early language development. In contrast, nonspeech oral motor exercise (NSOME) protocols require decontextualized practice of repetitive nonspeech movements that are not related to functional communication with respect to means, motive, or opportunity for communicating. Successful intervention with NSOME activities requires adoption of the concept that the child, operating at a prelinguistic communication level, will generalize from repetitive nonspeech movements that are not intended to communicate with anyone to speech-based movements that will be intelligible enough to allow responsiveness to the child's wants and needs from people in the environment. No evidence from the research literature on the course of speech and language acquisition suggests that this conceptualization is valid.

  9. Does Improving Patient-Practitioner Communication Improve Clinical Outcomes in Patients with Cardiovascular Diseases? A Systematic Review of the Evidence

    PubMed Central

    Schoenthaler, Antoinette; Kalet, Adina; Nicholson, Joseph; Lipkin, Mack

    2014-01-01

    Objective To conduct a systematic literature review appraising the effects of interventions to improve patient-practitioner communication on cardiovascular-related clinical outcomes. Methods Databases were searched up to March 27, 2013 to identify eligible studies that included interventions to improve patient and/or practitioner communication skills and assessment of a cardiovascular-related clinical outcome in adults ≥ 18 years of age. Results Fifteen papers were reviewed: The primary focus in seven studies was the patient; seven included a practitioner-focused intervention and one targeted both. Two patient-focused and two practitioner-focused studies demonstrated a beneficial effect of the intervention compared to a control group. Patient-focused studies were designed to improve patients’ information-seeking and question-asking skills with their practitioner. Practitioner-focused studies were designed to either improve practitioner’s general patient-centered communication or risk communication skills. Conclusions Few interventions targeting patient-practitioner communication have assessed the impact on cardiovascular-related clinical outcomes, limiting the ability to determine effectiveness. Additional rigorous research supported by theoretical frameworks and validated measurement is needed to understand the potential of patient-practitioner communication to improve cardiovascular-related clinical outcomes. Practice Implications Investments in communication skills trainings in medical education and practice are needed in order to attain the full potential of patient-centered care on cardiovascular-related clinical outcomes. Systematic Review Protocol Registration CRD42013006302 PMID:24795073

  10. MycoKey Round Table Discussions of Future Directions in Research on Chemical Detection Methods, Genetics and Biodiversity of Mycotoxins.

    PubMed

    Leslie, John F; Lattanzio, Veronica; Audenaert, Kris; Battilani, Paola; Cary, Jeffrey; Chulze, Sofia N; De Saeger, Sarah; Gerardino, Annamaria; Karlovsky, Petr; Liao, Yu-Cai; Maragos, Chris M; Meca, Giuseppe; Medina, Angel; Moretti, Antonio; Munkvold, Gary; Mulè, Giuseppina; Njobeh, Patrick; Pecorelli, Ivan; Perrone, Giancarlo; Pietri, Amedeo; Palazzini, Juan M; Proctor, Robert H; Rahayu, Endang S; Ramírez, Maria L; Samson, Robert; Stroka, Jörg; Sulyok, Michael; Sumarah, Mark; Waalwijk, Cees; Zhang, Qi; Zhang, Hao; Logrieco, Antonio F

    2018-03-01

    MycoKey, an EU-funded Horizon 2020 project, includes a series of "Roundtable Discussions" to gather information on trending research areas in the field of mycotoxicology. This paper includes summaries of the Roundtable Discussions on Chemical Detection and Monitoring of mycotoxins and on the role of genetics and biodiversity in mycotoxin production. Discussions were managed by using the nominal group discussion technique, which generates numerous ideas and provides a ranking for those identified as the most important. Four questions were posed for each research area, as well as two questions that were common to both discussions. Test kits, usually antibody based, were one major focus of the discussions at the Chemical Detection and Monitoring roundtable because of their many favorable features, e.g., cost, speed and ease of use. The second area of focus for this roundtable was multi-mycotoxin detection protocols and the challenges still to be met to enable these protocols to become methods of choice for regulated mycotoxins. For the genetic and biodiversity group, both the depth and the breadth of trending research areas were notable. For some areas, e.g., microbiome studies, the suggested research questions were primarily of a descriptive nature. In other areas, multiple experimental approaches, e.g., transcriptomics, proteomics, RNAi and gene deletions, are needed to understand the regulation of toxin production and mechanisms underlying successful biological controls. Answers to the research questions will provide starting points for developing acceptable prevention and remediation processes. Forging a partnership between scientists and appropriately-placed communications experts was recognized by both groups as an essential step to communicating risks, while retaining overall confidence in the safety of the food supply and the integrity of the food production chain.

  11. MycoKey Round Table Discussions of Future Directions in Research on Chemical Detection Methods, Genetics and Biodiversity of Mycotoxins

    PubMed Central

    Lattanzio, Veronica; Cary, Jeffrey; Chulze, Sofia N.; Gerardino, Annamaria; Liao, Yu-Cai; Maragos, Chris M.; Meca, Giuseppe; Moretti, Antonio; Munkvold, Gary; Mulè, Giuseppina; Njobeh, Patrick; Pecorelli, Ivan; Pietri, Amedeo; Proctor, Robert H.; Rahayu, Endang S.; Ramírez, Maria L.; Samson, Robert; Stroka, Jörg; Sumarah, Mark; Zhang, Qi; Zhang, Hao; Logrieco, Antonio F.

    2018-01-01

    MycoKey, an EU-funded Horizon 2020 project, includes a series of “Roundtable Discussions” to gather information on trending research areas in the field of mycotoxicology. This paper includes summaries of the Roundtable Discussions on Chemical Detection and Monitoring of mycotoxins and on the role of genetics and biodiversity in mycotoxin production. Discussions were managed by using the nominal group discussion technique, which generates numerous ideas and provides a ranking for those identified as the most important. Four questions were posed for each research area, as well as two questions that were common to both discussions. Test kits, usually antibody based, were one major focus of the discussions at the Chemical Detection and Monitoring roundtable because of their many favorable features, e.g., cost, speed and ease of use. The second area of focus for this roundtable was multi-mycotoxin detection protocols and the challenges still to be met to enable these protocols to become methods of choice for regulated mycotoxins. For the genetic and biodiversity group, both the depth and the breadth of trending research areas were notable. For some areas, e.g., microbiome studies, the suggested research questions were primarily of a descriptive nature. In other areas, multiple experimental approaches, e.g., transcriptomics, proteomics, RNAi and gene deletions, are needed to understand the regulation of toxin production and mechanisms underlying successful biological controls. Answers to the research questions will provide starting points for developing acceptable prevention and remediation processes. Forging a partnership between scientists and appropriately-placed communications experts was recognized by both groups as an essential step to communicating risks, while retaining overall confidence in the safety of the food supply and the integrity of the food production chain. PMID:29494529

  12. Controlled Bidirectional Quantum Secure Direct Communication

    PubMed Central

    Chou, Yao-Hsin; Lin, Yu-Ting; Zeng, Guo-Jyun; Lin, Fang-Jhu; Chen, Chi-Yuan

    2014-01-01

    We propose a novel protocol for controlled bidirectional quantum secure communication based on a nonlocal swap gate scheme. Our proposed protocol would be applied to a system in which a controller (supervisor/Charlie) controls the bidirectional communication with quantum information or secret messages between legitimate users (Alice and Bob). In this system, the legitimate users must obtain permission from the controller in order to exchange their respective quantum information or secret messages simultaneously; the controller is unable to obtain any quantum information or secret messages from the decoding process. Moreover, the presence of the controller also avoids the problem of one legitimate user receiving the quantum information or secret message before the other, and then refusing to help the other user decode the quantum information or secret message. Our proposed protocol is aimed at protecting against external and participant attacks on such a system, and the cost of transmitting quantum bits using our protocol is less than that achieved in other studies. Based on the nonlocal swap gate scheme, the legitimate users exchange their quantum information or secret messages without transmission in a public channel, thus protecting against eavesdroppers stealing the secret messages. PMID:25006596

  13. Effects of video-feedback on the communication, clinical competence and motivational interviewing skills of practice nurses: a pre-test posttest control group study.

    PubMed

    Noordman, Janneke; van der Weijden, Trudy; van Dulmen, Sandra

    2014-10-01

    To examine the effects of individual video-feedback on the generic communication skills, clinical competence (i.e. adherence to practice guidelines) and motivational interviewing skills of experienced practice nurses working in primary care. Continuing professional education may be necessary to refresh and reflect on the communication and motivational interviewing skills of experienced primary care practice nurses. A video-feedback method was designed to improve these skills. Pre-test/posttest control group design. Seventeen Dutch practice nurses and 325 patients participated between June 2010-June 2011. Nurse-patient consultations were videotaped at two moments (T0 and T1), with an interval of 3-6 months. The videotaped consultations were rated using two protocols: the Maastrichtse Anamnese en Advies Scorelijst met globale items (MAAS-global) and the Behaviour Change Counselling Index. Before the recordings, nurses were allocated to a control or video-feedback group. Nurses allocated to the video-feedback group received video-feedback between T0 and T1. Data were analysed using multilevel linear or logistic regression. Nurses who received video-feedback appeared to pay significantly more attention to patients' request for help, their physical examination and gave significantly more understandable information. With respect to motivational interviewing, nurses who received video-feedback appeared to pay more attention to 'agenda setting and permission seeking' during their consultations. Video-feedback is a potentially effective method to improve practice nurses' generic communication skills. Although a single video-feedback session does not seem sufficient to increase all motivational interviewing skills, significant improvement in some specific skills was found. Nurses' clinical competences were not altered after feedback due to already high standards. © 2014 John Wiley & Sons Ltd.

  14. GAPR2: A DTN Routing Protocol for Communications in Challenged, Degraded, and Denied Environments

    DTIC Science & Technology

    2015-09-01

    Transmission Speed Vs. Latency Figure 4.7: Helsinki Simulation Set 2, High Network Load and Small Buffers Analysis of Delivery Ratio in Helsinki Simulation...ipnsig.org/. [17] MANET routing, class notes for CS4554: Network modeling and analysis . 119 [18] S. Basagni et al. Mobile ad hoc networking . John...Wiley & Sons, 2004. [19] E. Royer et al. A review of current routing protocols for ad hoc mobile wireless networks . Personal Communications, IEEE, 6(2

  15. Generation of distributed W-states over long distances

    NASA Astrophysics Data System (ADS)

    Li, Yi

    2017-08-01

    Ultra-secure quantum communication between distant locations requires distributed entangled states between nodes. Various methodologies have been proposed to tackle this technological challenge, of which the so-called DLCZ protocol is the most promising and widely adopted scheme. This paper aims to extend this well-known protocol to a multi-node setting where the entangled W-state is generated between nodes over long distances. The generation of multipartite W-states is the foundation of quantum networks, paving the way for quantum communication and distributed quantum computation.

  16. Fiber-Optic Terahertz Data-Communication Networks

    NASA Technical Reports Server (NTRS)

    Chua, Peter L.; Lambert, James L.; Morookian, John M.; Bergman, Larry A.

    1994-01-01

    Network protocols implemented in optical domain. Fiber-optic data-communication networks utilize fully available bandwidth of single-mode optical fibers. Two key features of method: use of subpicosecond laser pulses as carrier signals and spectral phase modulation of pulses for optical implementation of code-division multiple access as multiplexing network protocol. Local-area network designed according to concept offers full crossbar functionality, security of data in transit through network, and capacity about 100 times that of typical fiber-optic local-area network in current use.

  17. Double C-NOT attack and counterattack on `Three-step semi-quantum secure direct communication protocol'

    NASA Astrophysics Data System (ADS)

    Gu, Jun; Lin, Po-hua; Hwang, Tzonelih

    2018-07-01

    Recently, Zou and Qiu (Sci China Phys Mech Astron 57:1696-1702, 2014) proposed a three-step semi-quantum secure direct communication protocol allowing a classical participant who does not have a quantum register to securely send his/her secret message to a quantum participant. However, this study points out that an eavesdropper can use the double C-NOT attack to obtain the secret message. To solve this problem, a modification is proposed.

  18. Recommended Methodology for Inter-Service/Agency Automated Message Processing Exchange (I-S/A AMPE). Cost and Schedule Analysis of Security Alternatives.

    DTIC Science & Technology

    1982-02-23

    segregate the computer and storage from the outside world 2. Administrative security to control access to secure computer facilities 3. Network security to...Classification Alternative A- 8 NETWORK KG GENSER DSSCS AMPE TERMINALS TP No. 022-4668-A Figure A-2. Dedicated Switching Architecture Alternative A- 9...communications protocol with the network and GENSER message transmission to the - I-S/A AMPE processor. 7. DSSCS TPU - Handles communications protocol with

  19. Context factors in general practitioner-patient encounters and their impact on assessing communication skills--an exploratory study.

    PubMed

    Essers, Geurt; Kramer, Anneke; Andriesse, Boukje; van Weel, Chris; van der Vleuten, Cees; van Dulmen, Sandra

    2013-05-22

    Assessment of medical communication performance usually focuses on rating generically applicable, well-defined communication skills. However, in daily practice, communication is determined by (specific) context factors, such as acquaintance with the patient, or the presented problem. Merely valuing the presence of generic skills may not do justice to the doctor's proficiency.Our aim was to perform an exploratory study on how assessment of general practitioner (GP) communication performance changes if context factors are explicitly taken into account. We used a mixed method design to explore how ratings would change. A random sample of 40 everyday GP consultations was used to see if previously identified context factors could be observed again. The sample was rated twice using a widely used assessment instrument (the MAAS-Global), first in the standard way and secondly after context factors were explicitly taken into account, by using a context-specific rating protocol to assess communication performance in the workplace. In between first and second rating, the presence of context factors was established. Item score differences were calculated using paired sample t-tests. In 38 out of 40 consultations, context factors prompted application of the context-specific rating protocol. Mean overall score on the 7-point MAAS-Global scale increased from 2.98 in standard to 3.66 in the context-specific rating (p<0.00); the effect size for the total mean score was 0.84. In earlier research the minimum standard score for adequate communication was set at 3.17. Applying the protocol, the mean overall score rose above the level set in an earlier study for the MAAS-Global scores to represent 'adequate GP communication behaviour'. Our findings indicate that incorporating context factors in communication assessment thus makes a meaningful difference and shows that context factors should be considered as 'signal' instead of 'noise' in GP communication assessment. Explicating context factors leads to a more deliberate and transparent rating of GP communication performance.

  20. Electronic-To-Optical-To-Electronic Packet-Data Conversion

    NASA Technical Reports Server (NTRS)

    Monacos, Steve

    1996-01-01

    Space-time multiplexer (STM) cell-based communication system designed to take advantage of both high throughput attainable in optical transmission links and flexibility and functionality of electronic processing, storage, and switching. Long packets segmented and transmitted optically by wavelength-division multiplexing. Performs optoelectronic and protocol conversion between electronic "store-and-forward" protocols and optical "hot-potato" protocols.

  1. Enhanced International Space Station Ku-Band Telemetry Service

    NASA Technical Reports Server (NTRS)

    Cecil, Andrew; Pitts, Lee; Welch, Steven; Bryan, Jason

    2014-01-01

    (1) The ISS is diligently working to increase utilization of the resources this unique laboratory provides; (2) Recent upgrades enabled the use of Internet Protocol communication using the CCSDS IP Encapsulation protocol; and (3) The Huntsville Operations Support Center has extended the onboard LAN to payload teams enabling the use of standard IP protocols for payload operations.

  2. Improved Wireless Security through Physical Layer Protocol Manipulation and Radio Frequency Fingerprinting

    DTIC Science & Technology

    2014-09-18

    radios in a cognitive radio network using a radio frequency fingerprinting based method. In IEEE International Conference on Communications (ICC...IMPROVEDWIRELESS SECURITY THROUGH PHYSICAL LAYER PROTOCOL MANIPULATION AND RADIO FREQUENCY FINGERPRINTING DISSERTATION Benjamin W. Ramsey, Captain...PHYSICAL LAYER PROTOCOL MANIPULATION AND RADIO FREQUENCY FINGERPRINTING DISSERTATION Presented to the Faculty Graduate School of Engineering and

  3. A Round-Efficient Authenticated Key Agreement Scheme Based on Extended Chaotic Maps for Group Cloud Meeting

    PubMed Central

    Lee, Tian-Fu; Wang, Zeng-Bo

    2017-01-01

    The security is a critical issue for business purposes. For example, the cloud meeting must consider strong security to maintain the communication privacy. Considering the scenario with cloud meeting, we apply extended chaotic map to present passwordless group authentication key agreement, termed as Passwordless Group Authentication Key Agreement (PL-GAKA). PL-GAKA improves the computation efficiency for the simple group password-based authenticated key agreement (SGPAKE) proposed by Lee et al. in terms of computing the session key. Since the extended chaotic map has equivalent security level to the Diffie–Hellman key exchange scheme applied by SGPAKE, the security of PL-GAKA is not sacrificed when improving the computation efficiency. Moreover, PL-GAKA is a passwordless scheme, so the password maintenance is not necessary. Short-term authentication is considered, hence the communication security is stronger than other protocols by dynamically generating session key in each cloud meeting. In our analysis, we first prove that each meeting member can get the correct information during the meeting. We analyze common security issues for the proposed PL-GAKA in terms of session key security, mutual authentication, perfect forward security, and data integrity. Moreover, we also demonstrate that communicating in PL-GAKA is secure when suffering replay attacks, impersonation attacks, privileged insider attacks, and stolen-verifier attacks. Eventually, an overall comparison is given to show the performance between PL-GAKA, SGPAKE and related solutions. PMID:29207509

  4. Open solutions to distributed control in ground tracking stations

    NASA Technical Reports Server (NTRS)

    Heuser, William Randy

    1994-01-01

    The advent of high speed local area networks has made it possible to interconnect small, powerful computers to function together as a single large computer. Today, distributed computer systems are the new paradigm for large scale computing systems. However, the communications provided by the local area network is only one part of the solution. The services and protocols used by the application programs to communicate across the network are as indispensable as the local area network. And the selection of services and protocols that do not match the system requirements will limit the capabilities, performance, and expansion of the system. Proprietary solutions are available but are usually limited to a select set of equipment. However, there are two solutions based on 'open' standards. The question that must be answered is 'which one is the best one for my job?' This paper examines a model for tracking stations and their requirements for interprocessor communications in the next century. The model and requirements are matched with the model and services provided by the five different software architectures and supporting protocol solutions. Several key services are examined in detail to determine which services and protocols most closely match the requirements for the tracking station environment. The study reveals that the protocols are tailored to the problem domains for which they were originally designed. Further, the study reveals that the process control model is the closest match to the tracking station model.

  5. An ultra-low power wireless sensor network for bicycle torque performance measurements.

    PubMed

    Gharghan, Sadik K; Nordin, Rosdiadee; Ismail, Mahamod

    2015-05-21

    In this paper, we propose an energy-efficient transmission technique known as the sleep/wake algorithm for a bicycle torque sensor node. This paper aims to highlight the trade-off between energy efficiency and the communication range between the cyclist and coach. Two experiments were conducted. The first experiment utilised the Zigbee protocol (XBee S2), and the second experiment used the Advanced and Adaptive Network Technology (ANT) protocol based on the Nordic nRF24L01 radio transceiver chip. The current consumption of ANT was measured, simulated and compared with a torque sensor node that uses the XBee S2 protocol. In addition, an analytical model was derived to correlate the sensor node average current consumption with a crank arm cadence. The sensor node achieved 98% power savings for ANT relative to ZigBee when they were compared alone, and the power savings amounted to 30% when all components of the sensor node are considered. The achievable communication range was 65 and 50 m for ZigBee and ANT, respectively, during measurement on an outdoor cycling track (i.e., velodrome). The conclusions indicate that the ANT protocol is more suitable for use in a torque sensor node when power consumption is a crucial demand, whereas the ZigBee protocol is more convenient in ensuring data communication between cyclist and coach.

  6. An Ultra-Low Power Wireless Sensor Network for Bicycle Torque Performance Measurements

    PubMed Central

    Gharghan, Sadik K.; Nordin, Rosdiadee; Ismail, Mahamod

    2015-01-01

    In this paper, we propose an energy-efficient transmission technique known as the sleep/wake algorithm for a bicycle torque sensor node. This paper aims to highlight the trade-off between energy efficiency and the communication range between the cyclist and coach. Two experiments were conducted. The first experiment utilised the Zigbee protocol (XBee S2), and the second experiment used the Advanced and Adaptive Network Technology (ANT) protocol based on the Nordic nRF24L01 radio transceiver chip. The current consumption of ANT was measured, simulated and compared with a torque sensor node that uses the XBee S2 protocol. In addition, an analytical model was derived to correlate the sensor node average current consumption with a crank arm cadence. The sensor node achieved 98% power savings for ANT relative to ZigBee when they were compared alone, and the power savings amounted to 30% when all components of the sensor node are considered. The achievable communication range was 65 and 50 m for ZigBee and ANT, respectively, during measurement on an outdoor cycling track (i.e., velodrome). The conclusions indicate that the ANT protocol is more suitable for use in a torque sensor node when power consumption is a crucial demand, whereas the ZigBee protocol is more convenient in ensuring data communication between cyclist and coach. PMID:26007728

  7. 75 FR 36313 - Drawbridge Operation Regulation; Arkansas Waterway, Pine Bluff, AR

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-25

    ... remote drawbridge operator then establishes normal verbal radio communications. This protocol is used to isolate and differentiate these radio communications from the railroad communications that the remote... provide a reason for each suggestion or recommendation. You may submit your comments and material online...

  8. Specification and Verification of Communication Protocols in AFFIRM Using State Transition Models.

    DTIC Science & Technology

    1981-03-01

    NewQueueOfftcket; theorem Pendnglnvariant, Remove(Pending(s)) = NewQueueOfPacket; Since the implementation is in keeping with the specification, its salp ...another communication line. The communication lines are unreliable; messages traveling in either direction can be lost, reordered, corrupted, or

  9. Augmenting Instruction in Business Communication Courses with the Internet.

    ERIC Educational Resources Information Center

    Cohen, Lance

    1994-01-01

    Outlines ways in which instructors of business communication can use the Internet more effectively while teaching. Argues that by augmenting business communication courses with e-mail and Internet protocols, instructors can reach larger segments of their classes, stimulate discussions, create simulations, and strengthen their relationships with…

  10. Efficient SCT Protocol for Post Disaster Communication

    NASA Astrophysics Data System (ADS)

    Ramesh, T. K.; Giriraja, C. V.

    2017-08-01

    Natural and catastrophic disasters can cause damage to the communication system, the damage may be complete or it may be partial. In such areas communication and exchange of information plays a very important role and become difficult to happen in such situations. So, the rescue systems should be installed in those areas for the rescue operations and to take important decisions about how to make a connection from there to the outside world. Wireless communication network architecture should be setup in disaster areas for the communication to happen and to gather information. Wireless ad-hoc network architecture is proposed in this paper with access nodes. These access nodes acts as hotspot for certain area in which they are set up such that the Wi-Fi capable devices get connected to them for communication to happen. If the mobile battery is drained in such situations wireless charging using microwave is shown in this paper. Performance analysis of the communication transport layer protocols is shown and Efficient SCTP (ESTP) algorithm is developed which shows better results in terms of cumulative packet loss.

  11. Enhancing school asthma action plans: qualitative results from southeast Minnesota beacon stakeholder groups.

    PubMed

    Egginton, Jason S; Textor, Lauren; Knoebel, Erin; McWilliams, Deborah; Aleman, Marty; Yawn, Barbara

    2013-12-01

    This study explores ways southeast Minnesota schools currently address asthma problems, identifies areas for improvement, and assesses the potential value of asthma action plans (AAPs) in schools. Focus groups were used to query stakeholder groups on asthma care in schools. Groups were held separately for elementary school personnel, parents of elementary school children with asthma, and health professionals (N = 103). Transcripts were analyzed by hand and by using NVivo 9 software. Overall 103 stakeholders participated in focus groups. Major themes were (1) Communication; no uniform way of exchanging information between schools and health professionals. (2) Asthma Control Continuum; students require individualized instructions and information related to their asthma care. (3) Policy/Protocol; school staff roles and rules vary and are unclear. (4) Self-Reliance; older children self-manage their asthma and are unknown until they need emergent support. Solution recommended included AAPs used systematically with a method to communicate back from schools to physicians and parents. The AAP may solve several of the school's concerns regarding their ability to provide asthma support in school. However, the AAP must reach the school, and that is currently not happening. In addition, schools would like tools and systems to assess asthma control and share information back with parents and physicians. © 2013, American School Health Association.

  12. Implementation of Siemens USS protocol into LabVIEW.

    PubMed

    Hosek, P; Diblik, M

    2011-10-01

    This article gives basic overview of the USS protocol as a communication interface to drive Siemens frequency inverters. It presents our implementation of this protocol into LabVIEW, as there was permanent demand from the community of the users to have native LabVIEW implementation of the USS protocol. It also states encountered problems and their solutions. Copyright © 2011 Society for Laboratory Automation and Screening. Published by Elsevier Inc. All rights reserved.

  13. An economic and feasible Quantum Sealed-bid Auction protocol

    NASA Astrophysics Data System (ADS)

    Zhang, Rui; Shi, Run-hua; Qin, Jia-qi; Peng, Zhen-wan

    2018-02-01

    We present an economic and feasible Quantum Sealed-bid Auction protocol using quantum secure direct communication based on single photons in both the polarization and the spatial-mode degrees of freedom, where each single photon can carry two bits of classical information. Compared with previous protocols, our protocol has higher efficiency. In addition, we propose a secure post-confirmation mechanism without quantum entanglement to guarantee the security and the fairness of the auction.

  14. Internet Data Delivery for Future Space Missions

    NASA Technical Reports Server (NTRS)

    Rash, James; Casasanta, Ralph; Hogie, Keith; Hennessy, Joseph F. (Technical Monitor)

    2002-01-01

    Ongoing work at National Aeronautics and Space Administration Goddard Space Flight Center (NASA/GSFC), seeks to apply standard Internet applications and protocols to meet the technology challenge of future satellite missions. Internet protocols and technologies are under study as a future means to provide seamless dynamic communication among heterogeneous instruments, spacecraft, ground stations, constellations of spacecraft, and science investigators. The primary objective is to design and demonstrate in the laboratory the automated end-to-end transport of files in a simulated dynamic space environment using off-the-shelf, low-cost, commodity-level standard applications and protocols. The demonstrated functions and capabilities will become increasingly significant in the years to come as both earth and space science missions fly more sensors and as the need increases for more network-oriented mission operations. Another element of increasing significance will be the increased cost effectiveness of designing, building, integrating, and operating instruments and spacecraft that will come to the fore as more missions take up the approach of using commodity-level standard communications technologies. This paper describes how an IP (Internet Protocol)-based communication architecture can support all existing operations concepts and how it will enable some new and complex communication and science concepts. The authors identify specific end-to-end data flows from the instruments to the control centers and scientists, and then describe how each data flow can be supported using standard Internet protocols and applications. The scenarios include normal data downlink and command uplink as well as recovery scenarios for both onboard and ground failures. The scenarios are based on an Earth orbiting spacecraft with downlink data rates from 300 Kbps to 4 Mbps. Included examples are based on designs currently being investigated for potential use by the Global Precipitation Measurement (GPM) mission.

  15. Network, system, and status software enhancements for the autonomously managed electrical power system breadboard. Volume 2: Protocol specification

    NASA Technical Reports Server (NTRS)

    Mckee, James W.

    1990-01-01

    This volume (2 of 4) contains the specification, structured flow charts, and code listing for the protocol. The purpose of an autonomous power system on a spacecraft is to relieve humans from having to continuously monitor and control the generation, storage, and distribution of power in the craft. This implies that algorithms will have been developed to monitor and control the power system. The power system will contain computers on which the algorithms run. There should be one control computer system that makes the high level decisions and sends commands to and receive data from the other distributed computers. This will require a communications network and an efficient protocol by which the computers will communicate. One of the major requirements on the protocol is that it be real time because of the need to control the power elements.

  16. A New QKD Protocol Based upon Authentication by EPR Entanglement State

    NASA Astrophysics Data System (ADS)

    Abushgra, Abdulbast A.

    Cryptographic world has faced multiple challenges that are included in encoding and decoding transmitting information into a secure communication channel. Quantum cryptography may be another generation of the cryptography world, which is based on the law of physics. After decades of using the classical cryptography, there is an essential need to move a step forward through the most trusted systems, especially enormous amount of data flows through billions of communicating channels (e.g. The internet), and keeping this transmitting information away from eavesdropping is obligatory. Moreover, quantum cryptography has proved its standing against many weaknesses in the classical cryptography. One of these weaknesses is the ability to copy any type of information using a passive attack without an interruption, which is impossible in the quantum system. Theoretically, several quantum observables are utilized to diagnose an action of one particle. These observables are included in measuring mass, movement, speed, etc. The polarization of one photon occurs normally and randomly in the space. Any interruption that happens during sending of a light will cause a deconstruction of the light polarization. Therefore, particles' movement in a three-dimensional space is supported by Non-Cloning theory that makes eavesdroppers unable to interrupt a communication system. In case an eavesdropper tried to interrupt a photon, the photon will be destroyed after passing the photon into a quantum detector or any measurement device. In the last decades, many Quantum Key Distribution (QKD) protocols have been created to initiate a secret key during encoding and decoding transmitted data operations. Some of these protocols were proven un-secure based on the quantum attacks that were released early. Even though the power of physics is still active and the Non-Cloning theory is unbroken, some QKD protocols failed during the security measurements. The main reason of the failure is based on the inability to provide the authentication between the end users during the quantum and classical channels. The proposed QKD protocol was designed to utilize some advantages of quantum physics as well as solid functions that are used in the classical cryptography. The authentication is a requirement during different communication channels, where both legitimate parties must confirm their identities before starting to submit data (plain-text). Moreover, the protocol uses most needed scenarios to finish the communication without leaking important data. These scenarios have been approved in existing QKD protocols either by classical or quantum systems. The matrix techniques also are used as a part of the preparation of the authentication key, where the end users communicate by an EPR (related to Einstein, Podolsky, and Rosen theory in 1935 ) channel. The EPR channel will be supported by an entanglement of particles. If the EPR communication succeeded, transferring the converted plain-text is required. Finally, both end users will have an authenticated secret key, and the submission will be done without any interruption.

  17. Housing conditions and sacrifice protocol affect neural activity and vocal behavior in a songbird species, the zebra finch (Taeniopygia guttata).

    PubMed

    Elie, Julie Estelle; Soula, Hédi Antoine; Trouvé, Colette; Mathevon, Nicolas; Vignal, Clémentine

    2015-12-01

    Individual cages represent a widely used housing condition in laboratories. This isolation represents an impoverished physical and social environment in gregarious animals. It prevents animals from socializing, even when auditory and visual contact is maintained. Zebra finches are colonial songbirds that are widely used as laboratory animals for the study of vocal communication from brain to behavior. In this study, we investigated the effect of single housing on the vocal behavior and the brain activity of male zebra finches (Taeniopygia guttata): male birds housed in individual cages were compared to freely interacting male birds housed as a social group in a communal cage. We focused on the activity of septo-hypothalamic regions of the "social behavior network" (SBN), a set of limbic regions involved in several social behaviors in vertebrates. The activity of four structures of the SBN (BSTm, medial bed nucleus of the stria terminalis; POM, medial preoptic area; lateral septum; ventromedial hypothalamus) and one associated region (paraventricular nucleus of the hypothalamus) was assessed using immunoreactive nuclei density of the immediate early gene Zenk (egr-1). We further assessed the identity of active cell populations by labeling vasotocin (VT). Brain activity was related to behavioral activities of birds like physical and vocal interactions. We showed that individual housing modifies vocal exchanges between birds compared to communal housing. This is of particular importance in the zebra finch, a model species for the study of vocal communication. In addition, a protocol that daily removes one or two birds from the group affects differently male zebra finches depending of their housing conditions: while communally-housed males changed their vocal output, brains of individually housed males show increased Zenk labeling in non-VT cells of the BSTm and enhanced correlation of Zenk-revealed activity between the studied structures. These results show that housing conditions must gain some attention in behavioral neuroscience protocols. Copyright © 2015. Published by Elsevier SAS.

  18. Advanced radiology information system.

    PubMed

    Kolovou, L; Vatousi, M; Lymperopoulos, D; Koukias, M

    2005-01-01

    The innovative features of an advanced Radiology Information System (RIS) are presented in this paper. The interoperability of RIS with the other Intra-hospital Information Systems that interacts with, dealing with the compatibility and open architecture issues, are accomplished by two novel mechanisms [1]. The first one is the particular message handling system that is applied for the exchange of information, according to the Health Level Seven (HL7) protocol's specifications and serves the transfer of medical and administrative data among the RIS applications and data store unit. The same mechanism allows the secure and HL7-compatible interactions with the Hospital Information System (HIS) too. The second one implements the translation of information between the formats that HL7 and Digital Imaging and Communication in Medicine (DICOM) protocols specify, providing the communication between RIS and Picture and Archive Communication System (PACS). The whole structure ensures the automation of the every-day procedures that the ;medical protocol' specifies and provides its services through a friendly and easy to manage graphical user interface.

  19. Generating Models of Infinite-State Communication Protocols Using Regular Inference with Abstraction

    NASA Astrophysics Data System (ADS)

    Aarts, Fides; Jonsson, Bengt; Uijen, Johan

    In order to facilitate model-based verification and validation, effort is underway to develop techniques for generating models of communication system components from observations of their external behavior. Most previous such work has employed regular inference techniques which generate modest-size finite-state models. They typically suppress parameters of messages, although these have a significant impact on control flow in many communication protocols. We present a framework, which adapts regular inference to include data parameters in messages and states for generating components with large or infinite message alphabets. A main idea is to adapt the framework of predicate abstraction, successfully used in formal verification. Since we are in a black-box setting, the abstraction must be supplied externally, using information about how the component manages data parameters. We have implemented our techniques by connecting the LearnLib tool for regular inference with the protocol simulator ns-2, and generated a model of the SIP component as implemented in ns-2.

  20. A Seamless Ubiquitous Telehealthcare Tunnel

    PubMed Central

    Cheng, Po-Hsun; Lin, Bor-Shing; Yu, Chu; Hu, Shun-Hsiang; Chen, Sao-Jie

    2013-01-01

    Mobile handheld devices are rapidly using to implement healthcare services around the World. Fundamentally, these services utilize telemedicine technologies. A disconnection of a mobile telemedicine system usually results in an interruption, which is embarrassing, and reconnection is necessary during the communication session. In this study, the Stream Control Transmission Protocol (SCTP) is adopted to build a stable session tunnel to guarantee seamless switching among heterogeneous wireless communication standards, such as Wi-Fi and 3G. This arrangement means that the telemedicine devices will not be limited by a fixed wireless connection and can switch to a better wireless channel if necessary. The tunnel can transmit plain text, binary data, and video streams. According to the evaluation of the proposed software-based SCTP-Tunnel middleware shown, the performance is lower than anticipated and is slightly slower than a fixed connection. However, the transmission throughput is still acceptable for healthcare professionals in a healthcare enterprise or home care site. It is necessary to build more heterogeneous wireless protocols into the proposed tunnel-switching scheme to support all possible communication protocols. In addition, SCTP is another good choice for promoting communication in telemedicine and healthcare fields. PMID:23917812

  1. Polarization entanglement purification of nonlocal microwave photons based on the cross-Kerr effect in circuit QED

    NASA Astrophysics Data System (ADS)

    Zhang, Hao; Liu, Qian; Xu, Xu-Sheng; Xiong, Jun; Alsaedi, Ahmed; Hayat, Tasawar; Deng, Fu-Guo

    2017-11-01

    Microwave photons have become very important qubits in quantum communication, as the first quantum satellite has been launched successfully. Therefore, it is a necessary and meaningful task for ensuring the high security and efficiency of microwave-based quantum communication in practice. Here, we present an original polarization entanglement purification protocol for nonlocal microwave photons based on the cross-Kerr effect in circuit quantum electrodynamics (QED). Our protocol can solve the problem that the purity of maximally entangled states used for constructing quantum channels will decrease due to decoherence from environment noise. This task is accomplished by means of the polarization parity-check quantum nondemolition (QND) detector, the bit-flipping operation, and the linear microwave elements. The QND detector is composed of several cross-Kerr effect systems which can be realized by coupling two superconducting transmission line resonators to a superconducting molecule with the N -type level structure. We give the applicable experimental parameters of QND measurement system in circuit QED and analyze the fidelities. Our protocol has good applications in long-distance quantum communication assisted by microwave photons in the future, such as satellite quantum communication.

  2. Land-mobile satellite communication system

    NASA Technical Reports Server (NTRS)

    Yan, Tsun-Yee (Inventor); Rafferty, William (Inventor); Dessouky, Khaled I. (Inventor); Wang, Charles C. (Inventor); Cheng, Unjeng (Inventor)

    1993-01-01

    A satellite communications system includes an orbiting communications satellite for relaying communications to and from a plurality of ground stations, and a network management center for making connections via the satellite between the ground stations in response to connection requests received via the satellite from the ground stations, the network management center being configured to provide both open-end service and closed-end service. The network management center of one embodiment is configured to provides both types of service according to a predefined channel access protocol that enables the ground stations to request the type of service desired. The channel access protocol may be configured to adaptively allocate channels to open-end service and closed-end service according to changes in the traffic pattern and include a free-access tree algorithm that coordinates collision resolution among the ground stations.

  3. GLOBECOM '88 - IEEE Global Telecommunications Conference and Exhibition, Hollywood, FL, Nov. 28-Dec. 1, 1988, Conference Record. Volumes 1, 2, & 3

    NASA Astrophysics Data System (ADS)

    Various papers on communications for the information age are presented. Among the general topics considered are: telematic services and terminals, satellite communications, telecommunications mangaement network, control of integrated broadband networks, advances in digital radio systems, the intelligent network, broadband networks and services deployment, future switch architectures, performance analysis of computer networks, advances in spread spectrum, optical high-speed LANs, and broadband switching and networks. Also addressed are: multiple access protocols, video coding techniques, modulation and coding, photonic switching, SONET terminals and applications, standards for video coding, digital switching, progress in MANs, mobile and portable radio, software design for improved maintainability, multipath propagation and advanced countermeasure, data communication, network control and management, fiber in the loop, network algorithm and protocols, and advances in computer communications.

  4. Influence of the Distribution of Tag IDs on RFID Memoryless Anti-Collision Protocols

    PubMed Central

    Cmiljanic, Nikola; Landaluce, Hugo; Perallos, Asier; Arjona, Laura

    2017-01-01

    In recent years, Radio Frequency Identification (RFID) has become very popular. The main feature of this technology is that RFID tags do not require close handling and no line of sight is required between the reader and the tags. RFID is a technology that uses radio frequencies in order to identify tags, which do not need to be positioned accurately relative to the reader. Tags share the communication channel, increasing the likelihood of causing a problem, viz., a message collision. Tree based protocols can resolve these collisions, but require a uniform tag ID distribution. This means they are very dependent of the distribution of the IDs of the tags. Tag IDs are written in the tag and contain a predefined bit string of data. A study of the influence of the tag ID distribution on the protocols’ behaviour is proposed here. A new protocol, called the Flexible Query window Tree (FQwT) is presented to estimate the tag ID distribution, taking into consideration the type of distribution. The aim is to create a flexible anti-collision protocol in order to identify a set of tags that constitute an ID distribution. As a result, the reader classifies tags into groups determined by using a distribution estimator. Simulations show that the FQwT protocol contributes to significant reductions in identification time and energy consumption regardless of the type of ID distribution. PMID:28817070

  5. Towards communication-efficient quantum oblivious key distribution

    NASA Astrophysics Data System (ADS)

    Panduranga Rao, M. V.; Jakobi, M.

    2013-01-01

    Symmetrically private information retrieval, a fundamental problem in the field of secure multiparty computation, is defined as follows: A database D of N bits held by Bob is queried by a user Alice who is interested in the bit Db in such a way that (1) Alice learns Db and only Db and (2) Bob does not learn anything about Alice's choice b. While solutions to this problem in the classical domain rely largely on unproven computational complexity theoretic assumptions, it is also known that perfect solutions that guarantee both database and user privacy are impossible in the quantum domain. Jakobi [Phys. Rev. APLRAAN1050-294710.1103/PhysRevA.83.022301 83, 022301 (2011)] proposed a protocol for oblivious transfer using well-known quantum key device (QKD) techniques to establish an oblivious key to solve this problem. Their solution provided a good degree of database and user privacy (using physical principles like the impossibility of perfectly distinguishing nonorthogonal quantum states and the impossibility of superluminal communication) while being loss-resistant and implementable with commercial QKD devices (due to the use of the Scarani-Acin-Ribordy-Gisin 2004 protocol). However, their quantum oblivious key distribution (QOKD) protocol requires a communication complexity of O(NlogN). Since modern databases can be extremely large, it is important to reduce this communication as much as possible. In this paper, we first suggest a modification of their protocol wherein the number of qubits that need to be exchanged is reduced to O(N). A subsequent generalization reduces the quantum communication complexity even further in such a way that only a few hundred qubits are needed to be transferred even for very large databases.

  6. Protecting single-photon entanglement with practical entanglement source

    NASA Astrophysics Data System (ADS)

    Zhou, Lan; Ou-Yang, Yang; Wang, Lei; Sheng, Yu-Bo

    2017-06-01

    Single-photon entanglement (SPE) is important for quantum communication and quantum information processing. However, SPE is sensitive to photon loss. In this paper, we discuss a linear optical amplification protocol for protecting SPE. Different from the previous protocols, we exploit the practical spontaneous parametric down-conversion (SPDC) source to realize the amplification, for the ideal entanglement source is unavailable in current quantum technology. Moreover, we prove that the amplification using the entanglement generated from SPDC source as auxiliary is better than the amplification assisted with single photons. The reason is that the vacuum state from SPDC source will not affect the amplification, so that it can be eliminated automatically. This protocol may be useful in future long-distance quantum communications.

  7. ComOn Coaching: Study protocol of a randomized controlled trial to assess the effect of a varied number of coaching sessions on transfer into clinical practice following communication skills training.

    PubMed

    Niglio de Figueiredo, Marcelo; Rudolph, Bärbel; Rodolph, Bärbel; Bylund, Carma L; Goelz, Tanja; Heußner, Pia; Sattel, Heribert; Fritzsche, Kurt; Wuensch, Alexander

    2015-07-07

    Communication skills training has proven to be an effective means to enhance communication of health care professionals in oncology. These effects are well studied in standardized settings. The question of transferring these skills into clinical consultations remains open. We build up on a previous developed training concept consisting of a workshop and coaching. This training achieved a medium effect size in two studies with standardized patients. In the current study, we expanded and manualized the coaching concept, and we will evaluate effects of a varied number of coaching sessions on real clinical consultations. Our aim is to determine how much coaching oncologists need to transfer communication skills into clinical practice. Physicians of two German medical centers will participate in a workshop for communication skills and will be randomized to either a group with one coaching session or a group with four coaching sessions following the workshop. The participation is voluntary and the physicians will receive medical education points. Consultations held by the participating physicians with actual patients who gave their informed consent will be filmed at three time points. These consultations will be evaluated by blinded raters using a checklist based on the training content (primary outcome). Secondary outcomes will be the self-evaluated communication competence by physicians and an evaluation of the consultations by both physicians and patients. We will evaluate our communication training concept on three levels - rater, physician and patient - and concentrate on the transfer of communication skills into real life situations. As we emphasize the external validity in this study design, limitations will be expected due to heterogeneity of data. With this study we aim to gain data on how to improve communication skills training that will result in better patient outcomes. German Clinical Trials Register DRKS00004385 .

  8. Secure quantum private information retrieval using phase-encoded queries

    NASA Astrophysics Data System (ADS)

    Olejnik, Lukasz

    2011-08-01

    We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offers substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries [Phys. Rev. Lett.PRLTAO0031-900710.1103/PhysRevLett.100.230502 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that using this technique makes it challenging to obtain the unconditional (in the information-theoretic sense) privacy degree; nevertheless, in addition to being simple, the protocol still offers a privacy level. The oracle used in the protocol is inspired both by the classical computational PIR solutions as well as the Deutsch-Jozsa oracle.

  9. Secure quantum private information retrieval using phase-encoded queries

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Olejnik, Lukasz

    We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offersmore » substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries [Phys. Rev. Lett. 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that using this technique makes it challenging to obtain the unconditional (in the information-theoretic sense) privacy degree; nevertheless, in addition to being simple, the protocol still offers a privacy level. The oracle used in the protocol is inspired both by the classical computational PIR solutions as well as the Deutsch-Jozsa oracle.« less

  10. Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks.

    PubMed

    Chen, Young-Long; Liau, Ren-Hau; Chang, Liang-Yu

    2016-01-01

    People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communication channel. The content of the message number is not considered in a multiple secure authentication protocol. The more excessive transmission of messages would be easier to collect and decode by hackers. In this paper, we propose two schemes which allow the server to validate the user and reduce the number of messages using the XOR operation. Our schemes can improve the security of the authentication protocol. The experimental results show that our proposed authentication protocols are more secure and effective. In regard to applications of second authentication communication channels for a smart access control system, identity identification and E-wallet, our proposed authentication protocols can ensure the safety of person and property, and achieve more effective security management mechanisms.

  11. Quantum fingerprinting with coherent states and a constant mean number of photons

    NASA Astrophysics Data System (ADS)

    Arrazola, Juan Miguel; Lütkenhaus, Norbert

    2014-06-01

    We present a protocol for quantum fingerprinting that is ready to be implemented with current technology and is robust to experimental errors. The basis of our scheme is an implementation of the signal states in terms of a coherent state in a superposition of time-bin modes. Experimentally, this requires only the ability to prepare coherent states of low amplitude and to interfere them in a balanced beam splitter. The states used in the protocol are arbitrarily close in trace distance to states of O (log2n) qubits, thus exhibiting an exponential separation in abstract communication complexity compared to the classical case. The protocol uses a number of optical modes that is proportional to the size n of the input bit strings but a total mean photon number that is constant and independent of n. Given the expended resources, our protocol achieves a task that is provably impossible using classical communication only. In fact, even in the presence of realistic experimental errors and loss, we show that there exist a large range of input sizes for which our quantum protocol transmits an amount of information that can be more than two orders of magnitude smaller than a classical fingerprinting protocol.

  12. Advanced orbiting systems test-bedding and protocol verification

    NASA Technical Reports Server (NTRS)

    Noles, James; De Gree, Melvin

    1989-01-01

    The Consultative Committee for Space Data Systems (CCSDS) has begun the development of a set of protocol recommendations for Advanced Orbiting Systems (SOS). The AOS validation program and formal definition of AOS protocols are reviewed, and the configuration control of the AOS formal specifications is summarized. Independent implementations of the AOS protocols by NASA and ESA are discussed, and cross-support/interoperability tests which will allow the space agencies of various countries to share AOS communication facilities are addressed.

  13. Implementing situation-background-assessment-recommendation in an anaesthetic clinic and subsequent information retention among receivers: A prospective interventional study of postoperative handovers.

    PubMed

    Randmaa, Maria; Swenne, Christine L; Mårtensson, Gunilla; Högberg, Hans; Engström, Maria

    2016-03-01

    Communication errors cause clinical incidents and adverse events in relation to surgery. To ensure proper postoperative patient care, it is essential that personnel remember and recall information given during the handover from the operating theatre to the postanaesthesia care unit. Formalizing the handover may improve communication and aid memory, but research in this area is lacking. The objective of this study was to evaluate whether implementing the communication tool Situation-Background-Assessment-Recommendation (SBAR) affects receivers' information retention after postoperative handover. A prospective intervention study with an intervention group and comparison nonintervention group, with assessments before and after the intervention. The postanaesthesia care units of two hospitals in Sweden during 2011 and 2012. Staff involved in the handover between the operating theatre and the postanaesthesia care units within each hospital. Implementation of the communication tool SBAR in one hospital. The main outcome was the percentage of recalled information sequences among receivers after the handover. Data were collected using both audio-recordings and observations recorded on a study-specific protocol form. Preintervention, 73 handovers were observed (intervention group, n = 40; comparison group, n = 33) involving 72 personnel (intervention group, n = 40; comparison group, n = 32). Postintervention, 91 handovers were observed (intervention group, n = 44; comparison group, n = 47) involving 57 personnel (intervention group, n = 31; comparison group, n = 26). In the intervention group, the percentage of recalled information sequences by the receivers increased from 43.4% preintervention to 52.6% postintervention (P = 0.004) and the SBAR structure improved significantly (P = 0.028). In the comparison group, the corresponding figures were 51.3 and 52.6% (P = 0.725) with no difference in SBAR structure. When a linear regression generalised estimating equation model was used to account for confounding influences, we were unable to show a significant difference in the information recalled between the intervention group and the nonintervention group over time. Compared with the comparison group with no intervention, when SBAR was implemented in an anaesthetic clinic, we were unable to show any improvement in recalled information among receivers following postoperative handover. Current controlled trials http://www.controlled-trials.com Identifier: ISRCTN37251313.

  14. Universal Common Communication Substrate (UCCS) Specification; Universal Common Communication Substrate (UCCS) Implementation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Universal Common Communication Substrate (UCCS) is a low-level communication substrate that exposes high-performance communication primitives, while providing network interoperability. It is intended to support multiple upper layer protocol (ULPs) or programming models including SHMEM,UPC,Titanium,Co-Array Fortran,Global Arrays,MPI,GASNet, and File I/O. it provides various communication operations including one-sided and two-sided point-to-point, collectives, and remote atomic operations. In addition to operations for ULPs, it provides an out-of-band communication channel required typically required to wire-up communication libraries.

  15. A reprogrammable receiver architecture for wireless signal interception

    NASA Astrophysics Data System (ADS)

    Yao, Timothy S.

    2003-09-01

    In this paper, a re-programmable receiver architecture, based on software-defined-radio concept, for wireless signal interception is presented. The radio-frequency (RF) signal that the receiver would like to intercept may come from a terrestrial cellular network or communication satellites, which their carrier frequency are in the range from 800 MHz (civilian mobile) to 15 GHz (Ku band). To intercept signals from such a wide range of frequency in these variant communication systems, the traditional way is to deploy multiple receivers to scan and detect the desired signal. This traditional approach is obviously unattractive due to the cost, efficiency, and accuracy. Instead, we propose a universal receiver, which is software-driven and re-configurable, to intercept signals of interest. The software-defined-radio based receiver first intercepts RF energy of wide spectrum (25MHz) through antenna, performs zero-IF down conversion (homodyne architecture) to baseband, and digital channelizes the baseband signal. The channelization module is a bank of high performance digital filters. The bandwidth of the filter bank is programmable according to the wireless communication protocol under watch. In the baseband processing, high-performance digital signal processors carry out the detection process and microprocessors handle the communication protocols. The baseband processing is also re-configurable for different wireless standards and protocol. The advantages of the software-defined-radio architecture over traditional RF receiver make it a favorable technology for the communication signal interception and surveillance.

  16. Three-input majority function as the unique optimal function for the bias amplification using nonlocal boxes

    NASA Astrophysics Data System (ADS)

    Mori, Ryuhei

    2016-11-01

    Brassard et al. [Phys. Rev. Lett. 96, 250401 (2006), 10.1103/PhysRevLett.96.250401] showed that shared nonlocal boxes with a CHSH (Clauser, Horne, Shimony, and Holt) probability greater than 3/+√{6 } 6 yield trivial communication complexity. There still exists a gap with the maximum CHSH probability 2/+√{2 } 4 achievable by quantum mechanics. It is an interesting open question to determine the exact threshold for the trivial communication complexity. Brassard et al.'s idea is based on recursive bias amplification by the three-input majority function. It was not obvious if another choice of function exhibits stronger bias amplification. We show that the three-input majority function is the unique optimal function, so that one cannot improve the threshold 3/+√{6 } 6 by Brassard et al.'s bias amplification. In this work, protocols for computing the function used for the bias amplification are restricted to be nonadaptive protocols or a particular adaptive protocol inspired by Pawłowski et al.'s protocol for information causality [Nature (London) 461, 1101 (2009), 10.1038/nature08400]. We first show an adaptive protocol inspired by Pawłowski et al.'s protocol, and then show that the adaptive protocol improves upon nonadaptive protocols. Finally, we show that the three-input majority function is the unique optimal function for the bias amplification if we apply the adaptive protocol to each step of the bias amplification.

  17. The impact of a new standard labor protocol on maternal and neonatal outcomes.

    PubMed

    Wang, Dingran; Ye, Shenglong; Tao, Liyuan; Wang, Yongqing

    2017-12-01

    To analyze the clinical outcomes following the implementation of a new standard labor procedure. This was a retrospective analysis that included a study group consisting of patients managed based on a new standard labor protocol and a control group comprising patients managed under an old standard labor protocol. The following maternal and perinatal outcomes were compared in the two groups: the indications for a cesarean section and the incidence of cesarean section, postpartum hemorrhage, fetal distress, neonatal asphyxia and pediatric intervention. We also compared the average number of days spent in the hospital, the incidence of medical disputes and hospitalization expenses. The cesarean section rates for the study and control groups were 19.29% (401/2079) and 33.53% (753/2246), respectively (P < 0.05). The main indications for a cesarean section in the study group were arrest of the active phase of labor, fetal distress and intrapartum fever; the percentages of each indication were significantly different from those of the control group (P < 0.001). The rates of postpartum hemorrhage in the study group and control group were 7.74% (130/1678) and 8.1% (121/1493), respectively (P = 0.710). The incidence rates of severe perineal lacerations were 0.48% (8/1678) for the study group and 0.2% (3/1493) for the control group (P = 0.187). The rates of forceps use were 4.29% (72/1678) in the study group and 2.41% (36/1493) in the control group (P = 0.004). The incidence rate of fetal distress in the study group was 6.24% (169/2709) and 4.67% (105/2246) (P = 0.006) in the control group. No significant difference was observed in the incidence of neonatal asphyxia and pediatric interventions between the two groups (0.74% (20/2709) vs. 8.12% (220/2709) and 17 (0.76%) vs. 161 (7.17%), respectively). The average length of hospital stay was 4.74 ± 1.15 and 2.13 ± 1.23 days (P < 0.01). The incidence of medical disputes was significantly different between the two groups: 1.44% (30/2079) in the study group and 0.53% (12/2246) in the control group (P < 0.01). The hospitalization expenses were 5401.29 ± 296.33 yuan in the study group and 5253.53 ± 3655.79 yuan in the control group (P = 0.06). The implementation of the new labor protocol reduced the cesarean section rate without negatively impacting maternal and neonatal outcomes. In practice, bed turnover and the hospital utilization rate should be better controlled, patient-doctor communication should be strengthened and the quality of obstetrical service should be improved.

  18. 47 CFR 9.1 - Purposes.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 1 2013-10-01 2013-10-01 false Purposes. 9.1 Section 9.1 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.1... applicable to interconnected Voice over Internet Protocol service providers, and to ensure that those...

  19. 47 CFR 9.1 - Purposes.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 1 2014-10-01 2014-10-01 false Purposes. 9.1 Section 9.1 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.1... applicable to interconnected Voice over Internet Protocol service providers, and to ensure that those...

  20. 47 CFR 9.1 - Purposes.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 1 2012-10-01 2012-10-01 false Purposes. 9.1 Section 9.1 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.1... applicable to interconnected Voice over Internet Protocol service providers, and to ensure that those...

  1. 47 CFR 9.1 - Purposes.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 1 2011-10-01 2011-10-01 false Purposes. 9.1 Section 9.1 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.1... applicable to interconnected Voice over Internet Protocol service providers, and to ensure that those...

  2. 47 CFR 9.1 - Purposes.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false Purposes. 9.1 Section 9.1 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.1... applicable to interconnected Voice over Internet Protocol service providers, and to ensure that those...

  3. SpaceWire Protocol ID: What Does It Mean To You?

    NASA Technical Reports Server (NTRS)

    Rakow, Glenn; Schnurr, Richard; Gilley, Daniel; Parks, Steve

    2006-01-01

    Spacewire is becoming a popular solution for satellite high-speed data buses because it is a simple standard that provides great flexibility for a wide range of system requirements. It is simple in packet format and protocol, allowing users to easily tailor their implementation for their specific application. Some of the attractive aspects of Spacewire that make it easy to implement also make it hard for future reuse. Protocol reuse is difficult because Spacewire does not have a defined mechanism to communicate with the higher layers of the protocol stack. This has forced users of Spacewire to define unique packet formats and define how these packets are to be processed. Each mission writes their own Interface Control Document (ICD) and tailors Spacewire for their specific requirements making reuse difficult. Part of the reason for this habit may be because engineers typically optimize designs for their own requirements in the absence of a standard. This is an inefficient use of project resources and costs more to develop missions. A new packet format for Spacewire has been defined as a solution for this problem. This new packet format is a compliment to the Spacewire standard that will support protocol development upon Spacewire. The new packet definition does not replace the current packet structure, i.e., does not make the standard obsolete, but merely extends the standard for those who want to develop protocols over Spacewire. The Spacewire packet is defined with the first part being the Destination Address, which may be one or more bytes. This is followed by the packet cargo, which is user defined. The cargo is truncated with an End-Of-Packet (EOP) marker. This packet structure offers low packet overhead and allows the user to define how the contents are to be formatted. It also provides for many different addressing schemes, which provide flexibility in the system. This packet flexibility is typically an attractive part of the Spacewire. The new extended packet format adds one new field to the packet that greatly enhances the capability of Spacewire. This new field called the Protocol Identifier (ID) is used to identify the packet contents and the associated processing for the packet. This feature along with the restriction in the packet format that uses the Protocol ID, allows a deterministic method of decoding packets that was not before possible. The first part of the packet is still the Destination Address, which still conforms to the original standard but with one restriction. The restriction is that the first byte seen at the destination by the user needs to be a logical address, independent of the addressing scheme used. The second field is defined as the Protocol ID, which is usually one byte in length. The packet cargo (user defined) follows the Protocol ID. After the packet cargo is the EOP, which defines the end of packet. The value of the Protocol ID is assigned by the Spacewire working group and the protocol description published for others to use. The development of Protocols for Spacewire is currently the area of greatest activity by the Spacewire working group. The first protocol definition by the working group has been completed and is now in the process of formal standardization. There are many other protocols in development for missions that have not yet received formal Protocol ID assignment, but even if the protocols are not formally assigned a value, this effort will provide synergism for future developments.

  4. Effective components of exercise and physical activity-related behaviour-change interventions for chronic non-communicable diseases in Africa: protocol for a systematic mixed studies review with meta-analysis.

    PubMed

    Igwesi-Chidobe, Chinonso N; Godfrey, Emma L; Kengne, Andre P

    2015-08-12

    Chronic non-communicable diseases (NCDs) account for a high burden of mortality and morbidity in Africa. Evidence-based clinical guidelines recommend exercise training and promotion of physical activity behaviour changes to control NCDs. Developing such interventions in Africa requires an understanding of the essential components that make them effective in this context. This is a protocol for a systematic mixed studies review that aims to determine the effective components of exercise and physical activity-related behaviour-change interventions for chronic diseases in Africa, by combining quantitative and qualitative research evidence from studies published until July 2015. We will conduct a detailed search to identify all published and unpublished studies that assessed the effects of exercise and physical activity-related interventions or the experiences/perspectives of patients to these interventions for NCDs from bibliographic databases and the grey literature. Bibliographic databases include MEDLINE, EMBASE, CENTRAL (Cochrane Central Register of Controlled Trials), PsycINFO, CINAHL and Web of Science. We will include the following African regional databases: African Index Medicus (AIM) and AFROLIB, which is the WHO's regional office database for Africa. The databases will be searched from inception until 18 July 2015. Appraisal of study quality will be performed after results synthesis. Data synthesis will be performed independently for quantitative and qualitative data using a mixed methods sequential explanatory synthesis for systematic mixed studies reviews. Meta-analysis will be conducted for the quantitative studies, and thematic synthesis for qualitative studies and qualitative results from the non-controlled observational studies. The primary outcome will include exercise adherence and physical activity behaviour changes. This review protocol is reported according to Preferred Reporting Items for Systematic reviews and Meta-Analysis protocols (PRISMA-P) 2015 guidelines. There is no ethical requirement for this study, as it utilises published data. This review is expected to inform the development of exercise and physical activity-related behaviour-change interventions in Africa, and will be presented at conferences, and published in peer reviewed journals and a PhD thesis at King's College London. This study was registered with the International Prospective Register of Systematic Reviews (PROSPERO) on 22 January 2015 (registration number: PROSPERO 2015: CRD42015016084). Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  5. Continuous infusion of low-dose unfractionated heparin after aneurysmal subarachnoid hemorrhage: a preliminary study of cognitive outcomes.

    PubMed

    James, Robert F; Khattar, Nicolas K; Aljuboori, Zaid S; Page, Paul S; Shao, Elaine Y; Carter, Lacey M; Meyer, Kimberly S; Daniels, Michael W; Craycroft, John; Gaughen, John R; Chaudry, M Imran; Rai, Shesh N; Everhart, D Erik; Simard, J Marc

    2018-05-11

    OBJECTIVE Cognitive dysfunction occurs in up to 70% of aneurysmal subarachnoid hemorrhage (aSAH) survivors. Low-dose intravenous heparin (LDIVH) infusion using the Maryland protocol was recently shown to reduce clinical vasospasm and vasospasm-related infarction. In this study, the Montreal Cognitive Assessment (MoCA) was used to evaluate cognitive changes in aSAH patients treated with the Maryland LDIVH protocol compared with controls. METHODS A retrospective analysis of all patients treated for aSAH between July 2009 and April 2014 was conducted. Beginning in 2012, aSAH patients were treated with LDIVH in the postprocedural period. The MoCA was administered to all aSAH survivors prospectively during routine follow-up visits, at least 3 months after aSAH, by trained staff blinded to treatment status. Mean MoCA scores were compared between groups, and regression analyses were performed for relevant factors. RESULTS No significant differences in baseline characteristics were observed between groups. The mean MoCA score for the LDIVH group (n = 25) was 26.4 compared with 22.7 in controls (n = 22) (p = 0.013). Serious cognitive impairment (MoCA ≤ 20) was observed in 32% of controls compared with 0% in the LDIVH group (p = 0.008). Linear regression analysis demonstrated that only LDIVH was associated with a positive influence on MoCA scores (β = 3.68, p =0.019), whereas anterior communicating artery aneurysms and fevers were negatively associated with MoCA scores. Multivariable linear regression analysis resulted in all 3 factors maintaining significance. There were no treatment complications. CONCLUSIONS This preliminary study suggests that the Maryland LDIVH protocol may improve cognitive outcomes in aSAH patients. A randomized controlled trial is needed to determine the safety and potential benefit of unfractionated heparin in aSAH patients.

  6. IJS: An Intelligent Junction Selection Based Routing Protocol for VANET to Support ITS Services.

    PubMed

    Bhoi, Sourav Kumar; Khilar, Pabitra Mohan

    2014-01-01

    Selecting junctions intelligently for data transmission provides better intelligent transportation system (ITS) services. The main problem in vehicular communication is high disturbances of link connectivity due to mobility and less density of vehicles. If link conditions are predicted earlier, then there is a less chance of performance degradation. In this paper, an intelligent junction selection based routing protocol (IJS) is proposed to transmit the data in a quickest path, in which the vehicles are mostly connected and have less link connectivity problem. In this protocol, a helping vehicle is set at every junction to control the communication by predicting link failures or network gaps in a route. Helping vehicle at the junction produces a score for every neighboring junction to forward the data to the destination by considering the current traffic information and selects that junction which has minimum score. IJS protocol is implemented and compared with GyTAR, A-STAR, and GSR routing protocols. Simulation results show that IJS performs better in terms of average end-to-end delay, network gap encounter, and number of hops.

  7. A large-alphabet three-party quantum key distribution protocol based on orbital and spin angular momenta hybrid entanglement

    NASA Astrophysics Data System (ADS)

    Lai, Hong; Luo, Mingxing; Zhang, Jun; Pieprzyk, Josef; Pan, Lei; Orgun, Mehmet A.

    2018-07-01

    The orthogonality of the orbital angular momentum (OAM) eigenstates enables a single photon carry an arbitrary number of bits. Moreover, additional degrees of freedom (DOFs) of OAM can span a high-dimensional Hilbert space, which could greatly increase information capacity and security. Moreover, the use of the spin angular momentum-OAM hybrid entangled state can increase Shannon dimensionality, because photons can be hybrid entangled in multiple DOFs. Based on these observations, we develop a hybrid entanglement quantum key distribution (QKD) protocol to achieve three-party quantum key distribution without classical message exchanges. In our proposed protocol, a communicating party uses a spatial light modulator (SLM) and a specific phase hologram to modulate photons' OAM state. Similarly, the other communicating parties use their SLMs and the fixed different phase holograms to modulate the OAM entangled photon pairs, producing the shared key among the parties Alice, Bob and Charlie without classical message exchanges. More importantly, when the same operation is repeated for every party, our protocol could be extended to a multiple-party QKD protocol.

  8. Emulation Platform for Cyber Analysis of Wireless Communication Network Protocols

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Van Leeuwen, Brian P.; Eldridge, John M.

    Wireless networking and mobile communications is increasing around the world and in all sectors of our lives. With increasing use, the density and complexity of the systems increase with more base stations and advanced protocols to enable higher data throughputs. The security of data transported over wireless networks must also evolve with the advances in technologies enabling more capable wireless networks. However, means for analysis of the effectiveness of security approaches and implementations used on wireless networks are lacking. More specifically a capability to analyze the lower-layer protocols (i.e., Link and Physical layers) is a major challenge. An analysis approachmore » that incorporates protocol implementations without the need for RF emissions is necessary. In this research paper several emulation tools and custom extensions that enable an analysis platform to perform cyber security analysis of lower layer wireless networks is presented. A use case of a published exploit in the 802.11 (i.e., WiFi) protocol family is provided to demonstrate the effectiveness of the described emulation platform.« less

  9. IJS: An Intelligent Junction Selection Based Routing Protocol for VANET to Support ITS Services

    PubMed Central

    Khilar, Pabitra Mohan

    2014-01-01

    Selecting junctions intelligently for data transmission provides better intelligent transportation system (ITS) services. The main problem in vehicular communication is high disturbances of link connectivity due to mobility and less density of vehicles. If link conditions are predicted earlier, then there is a less chance of performance degradation. In this paper, an intelligent junction selection based routing protocol (IJS) is proposed to transmit the data in a quickest path, in which the vehicles are mostly connected and have less link connectivity problem. In this protocol, a helping vehicle is set at every junction to control the communication by predicting link failures or network gaps in a route. Helping vehicle at the junction produces a score for every neighboring junction to forward the data to the destination by considering the current traffic information and selects that junction which has minimum score. IJS protocol is implemented and compared with GyTAR, A-STAR, and GSR routing protocols. Simulation results show that IJS performs better in terms of average end-to-end delay, network gap encounter, and number of hops. PMID:27433485

  10. An Energy Efficient MAC Protocol for Multi-Hop Swallowable Body Sensor Networks

    PubMed Central

    Lin, Lin; Yang, Chengfeng; Wong, Kai Juan; Yan, Hao; Shen, Junwen; Phee, Soo Jay

    2014-01-01

    Swallowable body sensor networks (BSNs) are composed of sensors which are swallowed by patients and send the collected data to the outside coordinator. These sensors are energy constraint and the batteries are difficult to be replaced. The medium access control (MAC) protocol plays an important role in energy management. This paper investigates an energy efficient MAC protocol design for swallowable BSNs. Multi-hop communication is analyzed and proved more energy efficient than single-hop communication within the human body when the circuitry power is low. Based on this result, a centrally controlled time slotting schedule is proposed. The major workload is shifted from the sensors to the coordinator. The coordinator collects the path-loss map and calculates the schedules, including routing, slot assignment and transmission power. Sensor nodes follow the schedules to send data in a multi-hop way. The proposed protocol is compared with the IEEE 802.15.6 protocol in terms of energy consumption. The results show that it is more energy efficient than IEEE 802.15.6 for swallowable BSN scenarios. PMID:25330049

  11. Therapeutic emails

    PubMed Central

    Alemi, Farrokh; Haack, Mary R; Nemes, Susanna; Aughburns, Renita; Sinkule, Jennifer; Neuhauser, Duncan

    2007-01-01

    Background In this paper, we show how counselors and psychologists can use emails for online management of substance abusers, including the anatomy and content of emails that clinicians should send substance abusers. Some investigators have attempted to determine if providing mental health services online is an efficacious delivery of treatment. The question of efficacy is an empirical issue that cannot be settled unless we are explicitly clear about the content and nature of online treatment. We believe that it is not the communications via internet that matters, but the content of these communications. The purpose of this paper is to provide the content of our online counseling services so others can duplicate the work and investigate its efficacy. Results We have managed nearly 300 clients online for recovery from substance abuse. Treatment included individual counseling (motivational interviewing, cognitive-behavior therapy, relapse prevention assignments), participation in an electronic support group and the development of a recovery team. Our findings of success with these interventions are reported elsewhere. Our experience has led to development of a protocol of care that is described more fully in this paper. This protocol is based on stages of change and relapse prevention theories and follows a Motivational Interviewing method of counseling. Conclusion The use of electronic media in providing mental health treatment remains controversial due to concerns about confidentiality, security and legal considerations. More research is needed to validate and generalize the use of online treatment for mental health problems. If researchers have to build on each others work, it is paramount that we share our protocols of care, as we have done in this paper. PMID:17302991

  12. The upgraded HADES trigger and data acquisition system

    NASA Astrophysics Data System (ADS)

    Michel, J.; Böhmer, M.; Kajetanowicz, M.; Korcyl, G.; Maier, L.; Palka, M.; Stroth, J.; Tarantola, A.; Traxler, M.; Ugur, C.; Yurevich, S.

    2011-12-01

    The HADES experiment is a High Acceptance Di-Electron Spectrometer located at GSI in Darmstadt, Germany. Recently, its trigger and data acquisition system was upgraded. The main goal was to substantially increase the event rate capability by a factor of up to 20 to reach 100 kHz in light and 20 kHz in heavy ion reaction systems. The total data rate written to storage is about 400 MByte/s in peak. In this context, the complete read-out system was exchanged to FPGA-based platforms using optical communication. For data transport a general-purpose real-time network protocol was developed to meet the strong requirements of the system. In particular, trigger information has to reach all front-end modules with latencies of less than 5 μs through up to 10 intermediate hubs in a star-like network setup. Monitoring and slow control features as well as readout and trigger distribution were joined in a single network protocol made up by three virtual channels with inherent arbitration by priority and a typical switching time of 100 ns. The full DAQ system includes about 550 FPGAs distributed over the complete detector system. For control and monitoring a virtual address space spanning the whole network is provided. Data are merged by the network hubs into data streams and passed on to a server farm using an Ethernet infrastructure. Due to the electromagnetic noise environment, several transmission error detection and correction features were included. In collaboration with groups from experiments of the FAIR accelerator complex, further developments based on the versatile hardware and communication protocol are being pursued.

  13. WebTag: Web browsing into sensor tags over NFC.

    PubMed

    Echevarria, Juan Jose; Ruiz-de-Garibay, Jonathan; Legarda, Jon; Alvarez, Maite; Ayerbe, Ana; Vazquez, Juan Ignacio

    2012-01-01

    Information and Communication Technologies (ICTs) continue to overcome many of the challenges related to wireless sensor monitoring, such as for example the design of smarter embedded processors, the improvement of the network architectures, the development of efficient communication protocols or the maximization of the life cycle autonomy. This work tries to improve the communication link of the data transmission in wireless sensor monitoring. The upstream communication link is usually based on standard IP technologies, but the downstream side is always masked with the proprietary protocols used for the wireless link (like ZigBee, Bluetooth, RFID, etc.). This work presents a novel solution (WebTag) for a direct IP based access to a sensor tag over the Near Field Communication (NFC) technology for secure applications. WebTag allows a direct web access to the sensor tag by means of a standard web browser, it reads the sensor data, configures the sampling rate and implements IP based security policies. It is, definitely, a new step towards the evolution of the Internet of Things paradigm.

  14. WebTag: Web Browsing into Sensor Tags over NFC

    PubMed Central

    Echevarria, Juan Jose; Ruiz-de-Garibay, Jonathan; Legarda, Jon; Álvarez, Maite; Ayerbe, Ana; Vazquez, Juan Ignacio

    2012-01-01

    Information and Communication Technologies (ICTs) continue to overcome many of the challenges related to wireless sensor monitoring, such as for example the design of smarter embedded processors, the improvement of the network architectures, the development of efficient communication protocols or the maximization of the life cycle autonomy. This work tries to improve the communication link of the data transmission in wireless sensor monitoring. The upstream communication link is usually based on standard IP technologies, but the downstream side is always masked with the proprietary protocols used for the wireless link (like ZigBee, Bluetooth, RFID, etc.). This work presents a novel solution (WebTag) for a direct IP based access to a sensor tag over the Near Field Communication (NFC) technology for secure applications. WebTag allows a direct web access to the sensor tag by means of a standard web browser, it reads the sensor data, configures the sampling rate and implements IP based security policies. It is, definitely, a new step towards the evolution of the Internet of Things paradigm. PMID:23012511

  15. The Building of Multimedia Communications Network based on Session Initiation Protocol

    NASA Astrophysics Data System (ADS)

    Yuexiao, Han; Yanfu, Zhang

    In this paper, we presented a novel design for a distributed multimedia communications network. We introduced the distributed tactic, flow procedure and particular structure. We also analyzed its scalability, stability, robustness, extension, and transmission delay of this architecture. Finally, the result shows our framework is suitable for very large scale communications.

  16. Sampled-data synchronisation of coupled harmonic oscillators with communication and input delays subject to controller failure

    NASA Astrophysics Data System (ADS)

    Zhao, Liyun; Zhou, Jin; Wu, Quanjun

    2016-01-01

    This paper considers the sampled-data synchronisation problems of coupled harmonic oscillators with communication and input delays subject to controller failure. A synchronisation protocol is proposed for such oscillator systems over directed network topology, and then some general algebraic criteria on exponential convergence for the proposed protocol are established. The main features of the present investigation include: (1) both the communication and input delays are simultaneously addressed, and the directed network topology is firstly considered and (2) the effects of time delays on synchronisation performance are theoretically and numerically investigated. It is shown that in the absence of communication delays, coupled harmonic oscillators can achieve synchronisation oscillatory motion. Whereas if communication delays are nonzero at infinite multiple sampled-data instants, its synchronisation (or consensus) state is zero. This conclusion can be used as an effective control strategy to stabilise coupled harmonic oscillators in practical applications. Furthermore, it is interesting to find that increasing either communication or input delays will enhance the synchronisation performance of coupled harmonic oscillators. Subsequently, numerical examples illustrate and visualise theoretical results.

  17. Auto-Generated Semantic Processing Services

    NASA Technical Reports Server (NTRS)

    Davis, Rodney; Hupf, Greg

    2009-01-01

    Auto-Generated Semantic Processing (AGSP) Services is a suite of software tools for automated generation of other computer programs, denoted cross-platform semantic adapters, that support interoperability of computer-based communication systems that utilize a variety of both new and legacy communication software running in a variety of operating- system/computer-hardware combinations. AGSP has numerous potential uses in military, space-exploration, and other government applications as well as in commercial telecommunications. The cross-platform semantic adapters take advantage of common features of computer- based communication systems to enforce semantics, messaging protocols, and standards of processing of streams of binary data to ensure integrity of data and consistency of meaning among interoperating systems. The auto-generation aspect of AGSP Services reduces development time and effort by emphasizing specification and minimizing implementation: In effect, the design, building, and debugging of software for effecting conversions among complex communication protocols, custom device mappings, and unique data-manipulation algorithms is replaced with metadata specifications that map to an abstract platform-independent communications model. AGSP Services is modular and has been shown to be easily integrable into new and legacy NASA flight and ground communication systems.

  18. Performance analysis of replication ALOHA for fading mobile communications channels

    NASA Technical Reports Server (NTRS)

    Yan, Tsun-Yee; Clare, Loren P.

    1986-01-01

    This paper describes an ALOHA random access protocol for fading communications channels. A two-state Markov model is used for the channel error process to account for the channel fading memory. The ALOHA protocol is modified to send multiple contiguous copies of a message at each transmission attempt. Both pure and slotted ALOHA channels are considered. The analysis is applicable to fading environments where the channel memory is short compared to the propagation delay. It is shown that smaller delay may be achieved using replications and, in noisy conditions, can also improve throughput.

  19. Compensating the noise of a communication channel via asymmetric encoding of quantum information.

    PubMed

    Lucamarini, Marco; Kumar, Rupesh; Di Giuseppe, Giovanni; Vitali, David; Tombesi, Paolo

    2010-10-01

    An asymmetric preparation of the quantum states sent through a noisy channel can enable a new way to monitor and actively compensate the channel noise. The paradigm of such an asymmetric treatment of quantum information is the Bennett 1992 protocol, in which the counts in the two separate bases are in direct connection with the channel noise. Using this protocol as a guiding example, we show how to correct the phase drift of a communication channel without using reference pulses, interruptions of the quantum transmission, or public data exchanges.

  20. Evaluation of Protocol Uniformity Concerning Laparoscopic Cholecystectomy in The Netherlands

    PubMed Central

    Goossens, Richard H. M.; van Eijk, Daan J.; Lange, Johan F.

    2008-01-01

    Background Iatrogenic bile duct injury remains a current complication of laparoscopic cholecystectomy. One uniform and standardized protocol, based on the “critical view of safety” concept of Strasberg, should reduce the incidence of this complication. Furthermore, owing to the rapid development of minimally invasive surgery, technicians are becoming more frequently involved. To improve communication between the operating team and technicians, standardized actions should also be defined. The aim of this study was to compare existing protocols for laparoscopic cholecystectomy from various Dutch hospitals. Methods Fifteen Dutch hospitals were contacted for evaluation of their protocols for laparoscopic cholecystectomy. All evaluated protocols were divided into six steps and were compared accordingly. Results In total, 13 hospitals responded—5 academic hospitals, 5 teaching hospitals, 3 community hospitals—of which 10 protocols were usable for comparison. Concerning the trocar positions, only minor differences were found. The concept of “critical view of safety” was represented in just one protocol. Furthermore, the order of clipping and cutting the cystic artery and duct differed. Descriptions of instruments and apparatus were also inconsistent. Conclusions Present protocols differ too much to define a universal procedure among surgeons in The Netherlands. The authors propose one (inter)national standardized protocol, including standardized actions. This uniform standardized protocol has to be officially released and recommended by national scientific associations (e.g., the Dutch Society of Surgery) or international societies (e.g., European Association for Endoscopic Surgery and Society of American Gastrointestinal and Endoscopic Surgeons). The aim is to improve patient safety and professional communication, which are necessary for new developments. PMID:18224485

Top