Sample records for highly efficient protocol

  1. An Efficient Multiparty Quantum Secret Sharing Protocol Based on Bell States in the High Dimension Hilbert Space

    NASA Astrophysics Data System (ADS)

    Gao, Gan; Wang, Li-Ping

    2010-11-01

    We propose a quantum secret sharing protocol, in which Bell states in the high dimension Hilbert space are employed. The biggest advantage of our protocol is the high source capacity. Compared with the previous secret sharing protocol, ours has the higher controlling efficiency. In addition, as decoy states in the high dimension Hilbert space are used, we needn’t destroy quantum entanglement for achieving the goal to check the channel security.

  2. High efficiency endocrine operation protocol: From design to implementation.

    PubMed

    Mascarella, Marco A; Lahrichi, Nadia; Cloutier, Fabienne; Kleiman, Simcha; Payne, Richard J; Rosenberg, Lawrence

    2016-10-01

    We developed a high efficiency endocrine operative protocol based on a mathematical programming approach, process reengineering, and value-stream mapping to increase the number of operations completed per day without increasing operating room time at a tertiary-care, academic center. Using this protocol, a case-control study of 72 patients undergoing endocrine operation during high efficiency days were age, sex, and procedure-matched to 72 patients undergoing operation during standard days. The demographic profile, operative times, and perioperative complications were noted. The average number of cases per 8-hour workday in the high efficiency and standard operating rooms were 7 and 5, respectively. Mean procedure times in both groups were similar. The turnaround time (mean ± standard deviation) in the high efficiency group was 8.5 (±2.7) minutes as compared with 15.4 (±4.9) minutes in the standard group (P < .001). Transient postoperative hypocalcemia was 6.9% (5/72) and 8.3% (6/72) for the high efficiency and standard groups, respectively (P = .99). In this study, patients undergoing high efficiency endocrine operation had similar procedure times and perioperative complications compared with the standard group. The proposed high efficiency protocol seems to better utilize operative time and decrease the backlog of patients waiting for endocrine operation in a country with a universal national health care program. Copyright © 2016 Elsevier Inc. All rights reserved.

  3. A hybrid MAC protocol design for energy-efficient very-high-throughput millimeter wave, wireless sensor communication networks

    NASA Astrophysics Data System (ADS)

    Jian, Wei; Estevez, Claudio; Chowdhury, Arshad; Jia, Zhensheng; Wang, Jianxin; Yu, Jianguo; Chang, Gee-Kung

    2010-12-01

    This paper presents an energy-efficient Medium Access Control (MAC) protocol for very-high-throughput millimeter-wave (mm-wave) wireless sensor communication networks (VHT-MSCNs) based on hybrid multiple access techniques of frequency division multiplexing access (FDMA) and time division multiplexing access (TDMA). An energy-efficient Superframe for wireless sensor communication network employing directional mm-wave wireless access technologies is proposed for systems that require very high throughput, such as high definition video signals, for sensing, processing, transmitting, and actuating functions. Energy consumption modeling for each network element and comparisons among various multi-access technologies in term of power and MAC layer operations are investigated for evaluating the energy-efficient improvement of proposed MAC protocol.

  4. Comparison of the efficiency of rat papillary muscles during afterloaded isotonic contractions and contractions with sinusoidal length changes.

    PubMed

    Mellors, L J; Gibbs, C L; Barclay, C J

    2001-05-01

    The results of previous studies suggest that the maximum mechanical efficiency of rat papillary muscles is lower during a contraction protocol involving sinusoidal length changes than during one involving afterloaded isotonic contractions. The aim of this study was to compare directly the efficiency of isolated rat papillary muscle preparations in isotonic and sinusoidal contraction protocols. Experiments were performed in vitro (27 degrees C) using left ventricular papillary muscles from adult rats. Each preparation performed three contraction protocols: (i) low-frequency afterloaded isotonic contractions (10 twitches at 0.2 Hz), (ii) sinusoidal length change contractions with phasic stimulation (40 twitches at 2 Hz) and (iii) high-frequency afterloaded isotonic contractions (40 twitches at 2 Hz). The first two protocols resembled those used in previous studies and the third combined the characteristics of the first two. The parameters for each protocol were adjusted to those that gave maximum efficiency. For the afterloaded isotonic protocols, the afterload was set to 0.3 of the maximum developed force. The sinusoidal length change protocol incorporated a cycle amplitude of +/-5% resting length and a stimulus phase of -10 degrees. Measurements of force output, muscle length change and muscle temperature change were used to calculate the work and heat produced during and after each protocol. Net mechanical efficiency was defined as the proportion of the energy (enthalpy) liberated by the muscle that appeared as work. The efficiency in the low-frequency, isotonic contraction protocol was 21.1+/-1.4% (mean +/- s.e.m., N=6) and that in the sinusoidal protocol was 13.2+/-0.7%, consistent with previous results. This difference was not due to the higher frequency or greater number of twitches because efficiency in the high-frequency, isotonic protocol was 21.5+/-1.0%. Although these results apparently confirm that efficiency is protocol-dependent, additional experiments designed to measure work output unambiguously indicated that the method used to calculate work output in isotonic contractions overestimated actual work output. When net work output, which excludes work done by parallel elastic elements, rather than total work output was used to determine efficiency in afterloaded isotonic contractions, efficiency was similar to that for sinusoidal contractions. The maximum net mechanical efficiency of rat papillary muscles performing afterloaded isotonic or sinusoidal length change contractions was between 10 and 15%.

  5. A Gossip-based Energy Efficient Protocol for Robust In-network Aggregation in Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Fauji, Shantanu

    We consider the problem of energy efficient and fault tolerant in--network aggregation for wireless sensor networks (WSNs). In-network aggregation is the process of aggregation while collecting data from sensors to the base station. This process should be energy efficient due to the limited energy at the sensors and tolerant to the high failure rates common in sensor networks. Tree based in--network aggregation protocols, although energy efficient, are not robust to network failures. Multipath routing protocols are robust to failures to a certain degree but are not energy efficient due to the overhead in the maintenance of multiple paths. We propose a new protocol for in-network aggregation in WSNs, which is energy efficient, achieves high lifetime, and is robust to the changes in the network topology. Our protocol, gossip--based protocol for in-network aggregation (GPIA) is based on the spreading of information via gossip. GPIA is not only adaptive to failures and changes in the network topology, but is also energy efficient. Energy efficiency of GPIA comes from all the nodes being capable of selective message reception and detecting convergence of the aggregation early. We experimentally show that GPIA provides significant improvement over some other competitors like the Ridesharing, Synopsis Diffusion and the pure version of gossip. GPIA shows ten fold, five fold and two fold improvement over the pure gossip, the synopsis diffusion and Ridesharing protocols in terms of network lifetime, respectively. Further, GPIA retains gossip's robustness to failures and improves upon the accuracy of synopsis diffusion and Ridesharing.

  6. A new high-frequency Agrobacterium-mediated transformation technique for Sesamum indicum L. using de-embryonated cotyledon as explant.

    PubMed

    Chowdhury, Supriyo; Basu, Arpita; Kundu, Surekha

    2014-09-01

    In spite of the economic importance of sesame (Sesamum indicum L.) and the recent availability of its genome sequence, a high-frequency transformation protocol is still not available. The only two existing Agrobacterium-mediated transformation protocols that are available have poor transformation efficiencies of less than 2%. In the present study, we report a high-frequency, simple, and reproducible transformation protocol for sesame. Transformation was done using de-embryonated cotyledons via somatic embryogenic stages. All the critical parameters of transformation, like incubation period of explants in pre-regeneration medium prior to infection by Agrobacterium tumefaciens, cocultivation period, concentrations of acetosyringone in cocultivation medium, kanamycin concentration, and concentration of plant hormones, including 6-benzylaminopurine, have been optimized. This protocol is superior to the two existing protocols in its high regeneration and transformation efficiencies. The transformed sesame lines have been tested by PCR, RT-PCR for neomycin phosphotransferase II gene expression, and β-glucuronidase (GUS) assay. The regeneration frequency and transformation efficiency are 57.33 and 42.66%, respectively. T0 and T1 generation transgenic plants were analyzed, and several T1 plants homozygous for the transgenes were obtained.

  7. Deterministic generation of remote entanglement with active quantum feedback

    DOE PAGES

    Martin, Leigh; Motzoi, Felix; Li, Hanhan; ...

    2015-12-10

    We develop and study protocols for deterministic remote entanglement generation using quantum feedback, without relying on an entangling Hamiltonian. In order to formulate the most effective experimentally feasible protocol, we introduce the notion of average-sense locally optimal feedback protocols, which do not require real-time quantum state estimation, a difficult component of real-time quantum feedback control. We use this notion of optimality to construct two protocols that can deterministically create maximal entanglement: a semiclassical feedback protocol for low-efficiency measurements and a quantum feedback protocol for high-efficiency measurements. The latter reduces to direct feedback in the continuous-time limit, whose dynamics can bemore » modeled by a Wiseman-Milburn feedback master equation, which yields an analytic solution in the limit of unit measurement efficiency. Our formalism can smoothly interpolate between continuous-time and discrete-time descriptions of feedback dynamics and we exploit this feature to derive a superior hybrid protocol for arbitrary nonunit measurement efficiency that switches between quantum and semiclassical protocols. Lastly, we show using simulations incorporating experimental imperfections that deterministic entanglement of remote superconducting qubits may be achieved with current technology using the continuous-time feedback protocol alone.« less

  8. A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System.

    PubMed

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi

    2015-08-01

    Radio Frequency Identification (RFID) based solutions are widely used for providing many healthcare applications include patient monitoring, object traceability, drug administration system and telecare medicine information system (TMIS) etc. In order to reduce malpractices and ensure patient privacy, in 2015, Srivastava et al. proposed a hash based RFID tag authentication protocol in TMIS. Their protocol uses lightweight hash operation and synchronized secret value shared between back-end server and tag, which is more secure and efficient than other related RFID authentication protocols. Unfortunately, in this paper, we demonstrate that Srivastava et al.'s tag authentication protocol has a serious security problem in that an adversary may use the stolen/lost reader to connect to the medical back-end server that store information associated with tagged objects and this privacy damage causing the adversary could reveal medical data obtained from stolen/lost readers in a malicious way. Therefore, we propose a secure and efficient RFID tag authentication protocol to overcome security flaws and improve the system efficiency. Compared with Srivastava et al.'s protocol, the proposed protocol not only inherits the advantages of Srivastava et al.'s authentication protocol for TMIS but also provides better security with high system efficiency.

  9. Improvement of Cell Survival During Human Pluripotent Stem Cell Definitive Endoderm Differentiation

    PubMed Central

    Wang, Han; Luo, Xie; Yao, Li; Lehman, Donna M.

    2015-01-01

    Definitive endoderm (DE) is a vital precursor for internal organs such as liver and pancreas. Efficient protocol to differentiate human embryonic stem cells (hESCs) or induced pluripotent stem cells (iPSCs) to DE is essential for regenerative medicine and for modeling diseases; yet, poor cell survival during DE differentiation remains unsolved. In this study, our use of B27 supplement in modified differentiation protocols has led to a substantial improvement. We used an SOX17-enhanced green fluorescent protein (eGFP) reporter hESC line to compare and modify established DE differentiation protocols. Both total live cell numbers and the percentages of eGFP-positive cells were used to assess differentiation efficiency. Among tested protocols, three modified protocols with serum-free B27 supplement were developed to generate a high number of DE cells. Massive cell death was avoided during DE differentiation and the percentage of DE cells remained high. When the resulting DE cells were further differentiated toward the pancreatic lineage, the expression of pancreatic-specific markers was significantly increased. Similar high DE differentiation efficiency was observed in H1 hESCs and iPSCs through the modified protocols. In B27 components, bovine serum albumin was found to facilitate DE differentiation and cell survival. Using our modified DE differentiation protocols, satisfactory quantities of quality DE can be produced as primary material for further endoderm lineage differentiation. PMID:26132288

  10. Distance-Based and Low Energy Adaptive Clustering Protocol for Wireless Sensor Networks

    PubMed Central

    Gani, Abdullah; Anisi, Mohammad Hossein; Ab Hamid, Siti Hafizah; Akhunzada, Adnan; Khan, Muhammad Khurram

    2016-01-01

    A wireless sensor network (WSN) comprises small sensor nodes with limited energy capabilities. The power constraints of WSNs necessitate efficient energy utilization to extend the overall network lifetime of these networks. We propose a distance-based and low-energy adaptive clustering (DISCPLN) protocol to streamline the green issue of efficient energy utilization in WSNs. We also enhance our proposed protocol into the multi-hop-DISCPLN protocol to increase the lifetime of the network in terms of high throughput with minimum delay time and packet loss. We also propose the mobile-DISCPLN protocol to maintain the stability of the network. The modelling and comparison of these protocols with their corresponding benchmarks exhibit promising results. PMID:27658194

  11. Recyclable amplification for single-photon entanglement from photon loss and decoherence

    NASA Astrophysics Data System (ADS)

    Zhou, Lan; Chen, Ling-Quan; Zhong, Wei; Sheng, Yu-Bo

    2018-01-01

    We put forward a highly efficient recyclable single-photon assisted amplification protocol, which can protect single-photon entanglement (SPE) from photon loss and decoherence. Making use of quantum nondemolition detection gates constructed with the help of cross-Kerr nonlinearity, our protocol has some attractive advantages. First, the parties can recover less-entangled SPE to be maximally entangled SPE, and reduce photon loss simultaneously. Second, if the protocol fails, the parties can repeat the protocol to reuse some discarded items, which can increase the success probability. Third, when the protocol is successful, they can similarly repeat the protocol to further increase the fidelity of the SPE. Thereby, our protocol provides a possible way to obtain high entanglement, high fidelity and high success probability simultaneously. In particular, our protocol shows higher success probability in the practical high photon loss channel. Based on the above features, our amplification protocol has potential for future application in long-distance quantum communication.

  12. An efficient protocol for the synthesis of highly sensitive indole imines utilizing green chemistry: optimization of reaction conditions.

    PubMed

    Nisar, Bushra; Rubab, Syeda Laila; Raza, Abdul Rauf; Tariq, Sobia; Sultan, Ayesha; Tahir, Muhammad Nawaz

    2018-04-11

    Novel and highly sensitive indole-based imines have been synthesized. Their synthesis has been compared employing a variety of protocols. Ultimately, a convenient, economical and high yielding set of conditions employing green chemistry have been designed for their synthesis.

  13. An energy-efficient MAC protocol using dynamic queue management for delay-tolerant mobile sensor networks.

    PubMed

    Li, Jie; Li, Qiyue; Qu, Yugui; Zhao, Baohua

    2011-01-01

    Conventional MAC protocols for wireless sensor network perform poorly when faced with a delay-tolerant mobile network environment. Characterized by a highly dynamic and sparse topology, poor network connectivity as well as data delay-tolerance, delay-tolerant mobile sensor networks exacerbate the severe power constraints and memory limitations of nodes. This paper proposes an energy-efficient MAC protocol using dynamic queue management (EQ-MAC) for power saving and data queue management. Via data transfers initiated by the target sink and the use of a dynamic queue management strategy based on priority, EQ-MAC effectively avoids untargeted transfers, increases the chance of successful data transmission, and makes useful data reach the target terminal in a timely manner. Experimental results show that EQ-MAC has high energy efficiency in comparison with a conventional MAC protocol. It also achieves a 46% decrease in packet drop probability, 79% increase in system throughput, and 25% decrease in mean packet delay.

  14. An Energy-Efficient MAC Protocol Using Dynamic Queue Management for Delay-Tolerant Mobile Sensor Networks

    PubMed Central

    Li, Jie; Li, Qiyue; Qu, Yugui; Zhao, Baohua

    2011-01-01

    Conventional MAC protocols for wireless sensor network perform poorly when faced with a delay-tolerant mobile network environment. Characterized by a highly dynamic and sparse topology, poor network connectivity as well as data delay-tolerance, delay-tolerant mobile sensor networks exacerbate the severe power constraints and memory limitations of nodes. This paper proposes an energy-efficient MAC protocol using dynamic queue management (EQ-MAC) for power saving and data queue management. Via data transfers initiated by the target sink and the use of a dynamic queue management strategy based on priority, EQ-MAC effectively avoids untargeted transfers, increases the chance of successful data transmission, and makes useful data reach the target terminal in a timely manner. Experimental results show that EQ-MAC has high energy efficiency in comparison with a conventional MAC protocol. It also achieves a 46% decrease in packet drop probability, 79% increase in system throughput, and 25% decrease in mean packet delay. PMID:22319385

  15. Protocol Independent Adaptive Route Update for VANET

    PubMed Central

    Rasheed, Asim; Qayyum, Amir

    2014-01-01

    High relative node velocity and high active node density have presented challenges to existing routing approaches within highly scaled ad hoc wireless networks, such as Vehicular Ad hoc Networks (VANET). Efficient routing requires finding optimum route with minimum delay, updating it on availability of a better one, and repairing it on link breakages. Current routing protocols are generally focused on finding and maintaining an efficient route, with very less emphasis on route update. Adaptive route update usually becomes impractical for dense networks due to large routing overheads. This paper presents an adaptive route update approach which can provide solution for any baseline routing protocol. The proposed adaptation eliminates the classification of reactive and proactive by categorizing them as logical conditions to find and update the route. PMID:24723807

  16. Efficient and universal quantum key distribution based on chaos and middleware

    NASA Astrophysics Data System (ADS)

    Jiang, Dong; Chen, Yuanyuan; Gu, Xuemei; Xie, Ling; Chen, Lijun

    2017-01-01

    Quantum key distribution (QKD) promises unconditionally secure communications, however, the low bit rate of QKD cannot meet the requirements of high-speed applications. Despite the many solutions that have been proposed in recent years, they are neither efficient to generate the secret keys nor compatible with other QKD systems. This paper, based on chaotic cryptography and middleware technology, proposes an efficient and universal QKD protocol that can be directly deployed on top of any existing QKD system without modifying the underlying QKD protocol and optical platform. It initially takes the bit string generated by the QKD system as input, periodically updates the chaotic system, and efficiently outputs the bit sequences. Theoretical analysis and simulation results demonstrate that our protocol can efficiently increase the bit rate of the QKD system as well as securely generate bit sequences with perfect statistical properties. Compared with the existing methods, our protocol is more efficient and universal, it can be rapidly deployed on the QKD system to increase the bit rate when the QKD system becomes the bottleneck of its communication system.

  17. Establishment of integrated protocols for automated high throughput kinetic chlorophyll fluorescence analyses.

    PubMed

    Tschiersch, Henning; Junker, Astrid; Meyer, Rhonda C; Altmann, Thomas

    2017-01-01

    Automated plant phenotyping has been established as a powerful new tool in studying plant growth, development and response to various types of biotic or abiotic stressors. Respective facilities mainly apply non-invasive imaging based methods, which enable the continuous quantification of the dynamics of plant growth and physiology during developmental progression. However, especially for plants of larger size, integrative, automated and high throughput measurements of complex physiological parameters such as photosystem II efficiency determined through kinetic chlorophyll fluorescence analysis remain a challenge. We present the technical installations and the establishment of experimental procedures that allow the integrated high throughput imaging of all commonly determined PSII parameters for small and large plants using kinetic chlorophyll fluorescence imaging systems (FluorCam, PSI) integrated into automated phenotyping facilities (Scanalyzer, LemnaTec). Besides determination of the maximum PSII efficiency, we focused on implementation of high throughput amenable protocols recording PSII operating efficiency (Φ PSII ). Using the presented setup, this parameter is shown to be reproducibly measured in differently sized plants despite the corresponding variation in distance between plants and light source that caused small differences in incident light intensity. Values of Φ PSII obtained with the automated chlorophyll fluorescence imaging setup correlated very well with conventionally determined data using a spot-measuring chlorophyll fluorometer. The established high throughput operating protocols enable the screening of up to 1080 small and 184 large plants per hour, respectively. The application of the implemented high throughput protocols is demonstrated in screening experiments performed with large Arabidopsis and maize populations assessing natural variation in PSII efficiency. The incorporation of imaging systems suitable for kinetic chlorophyll fluorescence analysis leads to a substantial extension of the feature spectrum to be assessed in the presented high throughput automated plant phenotyping platforms, thus enabling the simultaneous assessment of plant architectural and biomass-related traits and their relations to physiological features such as PSII operating efficiency. The implemented high throughput protocols are applicable to a broad spectrum of model and crop plants of different sizes (up to 1.80 m height) and architectures. The deeper understanding of the relation of plant architecture, biomass formation and photosynthetic efficiency has a great potential with respect to crop and yield improvement strategies.

  18. Evaluation of two different protocols for peripheral blood stem cell collection with the Fresenius AS 104 blood cell separator.

    PubMed

    Menichella, G; Lai, M; Pierelli, L; Vittori, M; Serafini, R; Ciarli, M; Foddai, M L; Salerno, G; Sica, S; Scambia, G; Leone, G; Bizzi, B

    1997-01-01

    Reconstitution of hematopoiesis by means of peripheral blood stem cells is a valid alternative to autologous bone marrow transplantation. The aim of this investigation was to increase the efficiency of collection of circulating blood progenitor cells and to obtain a purer product for transplant. We carried out leukapheresis procedures with the Fresenius AS 104 blood cell separator, using two different protocols, the previously used PBSC-LYM and a new mononuclear cell collection program. Both programs were highly effective in collecting mononuclear cells (MNC) and CD34+ cells. Some differences were found, especially regarding MNC yield and efficiencies. There are remarkable differences in the efficiency of collection of CD34+ cells (62.38% with the new program as opposed to 31.69% with the older one). Linear regression analysis showed a negative correlation between blood volume processed and MNC efficiency only for the PBSC-LYM program. Differences were also observed in the degree of inverse correlation existing in both programs between patients' white blood cell precount and MNC collection efficiency. The inverse correlation was stronger for the PBSC-LYM program. Seven patients with solid tumors and hematologic malignancies received high dose chemotherapy and were subsequently transplanted with peripheral blood stem cells collected using the new protocol. All patients obtained a complete and stable engraftment with the reinfusion product collected with one or two leukapheresis procedures. High efficiencies and yields were observed in the new protocol for MNC and CD34+ cells. These were able to effect rapid and complete bone marrow recovery after myeloablative chemotherapy.

  19. An Efficient and QoS Supported Multichannel MAC Protocol for Vehicular Ad Hoc Networks

    PubMed Central

    Tan, Guozhen; Yu, Chao

    2017-01-01

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety (transport efficiency and infotainment) applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. Different types of applications require different levels Quality-of-Service (QoS) support. Recently, transport efficiency and infotainment applications (e.g., electronic map download and Internet access) have received more and more attention, and this kind of applications is expected to become a big market driver in a near future. In this paper, we propose an Efficient and QoS supported Multichannel Medium Access Control (EQM-MAC) protocol for VANETs in a highway environment. The EQM-MAC protocol utilizes the service channel resources for non-safety message transmissions during the whole synchronization interval, and it dynamically adjusts minimum contention window size for different non-safety services according to the traffic conditions. Theoretical model analysis and extensive simulation results show that the EQM-MAC protocol can support QoS services, while ensuring the high saturation throughput and low transmission delay for non-safety applications. PMID:28991217

  20. Highly efficient water-mediated approach to access benzazoles: metal catalyst and base-free synthesis of 2-substituted benzimidazoles, benzoxazoles, and benzothiazoles.

    PubMed

    Bala, Manju; Verma, Praveen Kumar; Sharma, Deepika; Kumar, Neeraj; Singh, Bikram

    2015-05-01

    An efficient water-catalyzed method has been developed for the synthesis of 2-substituted benzimidazoles, benzoxazoles, and benzothiazoles in one step. The present method excludes the usage of toxic metal catalysts and bases to produce benzazoles in good to excellent yields. An efficient and versatile water-mediated method has been established for the synthesis of various 2-arylbenzazoles. The present protocol excludes the usage of any catalyst and additive provided excellent selectivities and yields with high functional group tolerance for the synthesis of 2-arylated benzimidazoles, benzoxazoles, and benzothiazoles. Benzazolones were also synthesized using similar reaction protocol.

  1. Relationship between ovarian reserve and preovulatory estradiol during a fixed-time AI protocol in beef heifers

    USDA-ARS?s Scientific Manuscript database

    Estradiol production is essential for reproductive efficiency. This study compared numbers of follicles in beef cows that did or did not have elevated preovulatory estradiol during a fixed-time AI (FTAI) protocol. In experiment 1, 5 low estradiol (LowE2) and 5 high estradiol (HighE2) cows were slaug...

  2. An in silico method to identify computer-based protocols worthy of clinical study: An insulin infusion protocol use case

    PubMed Central

    Wong, Anthony F; Pielmeier, Ulrike; Haug, Peter J; Andreassen, Steen

    2016-01-01

    Objective Develop an efficient non-clinical method for identifying promising computer-based protocols for clinical study. An in silico comparison can provide information that informs the decision to proceed to a clinical trial. The authors compared two existing computer-based insulin infusion protocols: eProtocol-insulin from Utah, USA, and Glucosafe from Denmark. Materials and Methods The authors used eProtocol-insulin to manage intensive care unit (ICU) hyperglycemia with intravenous (IV) insulin from 2004 to 2010. Recommendations accepted by the bedside clinicians directly link the subsequent blood glucose values to eProtocol-insulin recommendations and provide a unique clinical database. The authors retrospectively compared in silico 18 984 eProtocol-insulin continuous IV insulin infusion rate recommendations from 408 ICU patients with those of Glucosafe, the candidate computer-based protocol. The subsequent blood glucose measurement value (low, on target, high) was used to identify if the insulin recommendation was too high, on target, or too low. Results Glucosafe consistently provided more favorable continuous IV insulin infusion rate recommendations than eProtocol-insulin for on target (64% of comparisons), low (80% of comparisons), or high (70% of comparisons) blood glucose. Aggregated eProtocol-insulin and Glucosafe continuous IV insulin infusion rates were clinically similar though statistically significantly different (Wilcoxon signed rank test P = .01). In contrast, when stratified by low, on target, or high subsequent blood glucose measurement, insulin infusion rates from eProtocol-insulin and Glucosafe were statistically significantly different (Wilcoxon signed rank test, P < .001), and clinically different. Discussion This in silico comparison appears to be an efficient nonclinical method for identifying promising computer-based protocols. Conclusion Preclinical in silico comparison analytical framework allows rapid and inexpensive identification of computer-based protocol care strategies that justify expensive and burdensome clinical trials. PMID:26228765

  3. AIB-OR: improving onion routing circuit construction using anonymous identity-based cryptosystems.

    PubMed

    Wang, Changji; Shi, Dongyuan; Xu, Xilei

    2015-01-01

    The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. However, existing onion routing protocols usually exhibit poor performance due to repeated encryption operations. In this paper, we first present an improved anonymous multi-receiver identity-based encryption (AMRIBE) scheme, and an improved identity-based one-way anonymous key agreement (IBOWAKE) protocol. We then propose an efficient onion routing protocol named AIB-OR that provides provable security and strong anonymity. Our main approach is to use our improved AMRIBE scheme and improved IBOWAKE protocol in onion routing circuit construction. Compared with other onion routing protocols, AIB-OR provides high efficiency, scalability, strong anonymity and fault tolerance. Performance measurements from a prototype implementation show that our proposed AIB-OR can achieve high bandwidths and low latencies when deployed over the Internet.

  4. AIB-OR: Improving Onion Routing Circuit Construction Using Anonymous Identity-Based Cryptosystems

    PubMed Central

    Wang, Changji; Shi, Dongyuan; Xu, Xilei

    2015-01-01

    The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. However, existing onion routing protocols usually exhibit poor performance due to repeated encryption operations. In this paper, we first present an improved anonymous multi-receiver identity-based encryption (AMRIBE) scheme, and an improved identity-based one-way anonymous key agreement (IBOWAKE) protocol. We then propose an efficient onion routing protocol named AIB-OR that provides provable security and strong anonymity. Our main approach is to use our improved AMRIBE scheme and improved IBOWAKE protocol in onion routing circuit construction. Compared with other onion routing protocols, AIB-OR provides high efficiency, scalability, strong anonymity and fault tolerance. Performance measurements from a prototype implementation show that our proposed AIB-OR can achieve high bandwidths and low latencies when deployed over the Internet. PMID:25815879

  5. Security of a discretely signaled continuous variable quantum key distribution protocol for high rate systems.

    PubMed

    Zhang, Zheshen; Voss, Paul L

    2009-07-06

    We propose a continuous variable based quantum key distribution protocol that makes use of discretely signaled coherent light and reverse error reconciliation. We present a rigorous security proof against collective attacks with realistic lossy, noisy quantum channels, imperfect detector efficiency, and detector electronic noise. This protocol is promising for convenient, high-speed operation at link distances up to 50 km with the use of post-selection.

  6. Comparison of Gluten Extraction Protocols Assessed by LC-MS/MS Analysis.

    PubMed

    Fallahbaghery, Azadeh; Zou, Wei; Byrne, Keren; Howitt, Crispin A; Colgrave, Michelle L

    2017-04-05

    The efficiency of gluten extraction is of critical importance to the results derived from any analytical method for gluten detection and quantitation, whether it employs reagent-based technology (antibodies) or analytical instrumentation (mass spectrometry). If the target proteins are not efficiently extracted, the end result will be an under-estimation in the gluten content posing a health risk to people affected by conditions such as celiac disease (CD) and nonceliac gluten sensitivity (NCGS). Five different extraction protocols were investigated using LC-MRM-MS for their ability to efficiently and reproducibly extract gluten. The rapid and simple "IPA/DTT" protocol and related "two-step" protocol were enriched for gluten proteins, 55/86% (trypsin/chymotrypsin) and 41/68% of all protein identifications, respectively, with both methods showing high reproducibility (CV < 15%). When using multistep protocols, it was critical to examine all fractions, as coextraction of proteins occurred across fractions, with significant levels of proteins existing in unexpected fractions and not all proteins within a particular gluten class behaving the same.

  7. An Efficient and Secure Arbitrary N-Party Quantum Key Agreement Protocol Using Bell States

    NASA Astrophysics Data System (ADS)

    Liu, Wen-Jie; Xu, Yong; Yang, Ching-Nung; Gao, Pei-Pei; Yu, Wen-Bin

    2018-01-01

    Two quantum key agreement protocols using Bell states and Bell measurement were recently proposed by Shukla et al. (Quantum Inf. Process. 13(11), 2391-2405, 2014). However, Zhu et al. pointed out that there are some security flaws and proposed an improved version (Quantum Inf. Process. 14(11), 4245-4254, 2015). In this study, we will show Zhu et al.'s improvement still exists some security problems, and its efficiency is not high enough. For solving these problems, we utilize four Pauli operations { I, Z, X, Y} to encode two bits instead of the original two operations { I, X} to encode one bit, and then propose an efficient and secure arbitrary N-party quantum key agreement protocol. In the protocol, the channel checking with decoy single photons is introduced to avoid the eavesdropper's flip attack, and a post-measurement mechanism is used to prevent against the collusion attack. The security analysis shows the present protocol can guarantee the correctness, security, privacy and fairness of quantum key agreement.

  8. Biometrics based authentication scheme for session initiation protocol.

    PubMed

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.

  9. Seamless Insert-Plasmid Assembly at High Efficiency and Low Cost

    PubMed Central

    Benoit, Roger M.; Ostermeier, Christian; Geiser, Martin; Li, Julia Su Zhou; Widmer, Hans; Auer, Manfred

    2016-01-01

    Seamless cloning methods, such as co-transformation cloning, sequence- and ligation-independent cloning (SLIC) or the Gibson assembly, are essential tools for the precise construction of plasmids. The efficiency of co-transformation cloning is however low and the Gibson assembly reagents are expensive. With the aim to improve the robustness of seamless cloning experiments while keeping costs low, we examined the importance of complementary single-stranded DNA ends for co-transformation cloning and the influence of single-stranded gaps in circular plasmids on SLIC cloning efficiency. Most importantly, our data show that single-stranded gaps in double-stranded plasmids, which occur in typical SLIC protocols, can drastically decrease the efficiency at which the DNA transforms competent E. coli bacteria. Accordingly, filling-in of single-stranded gaps using DNA polymerase resulted in increased transformation efficiency. Ligation of the remaining nicks did not lead to a further increase in transformation efficiency. These findings demonstrate that highly efficient insert-plasmid assembly can be achieved by using only T5 exonuclease and Phusion DNA polymerase, without Taq DNA ligase from the original Gibson protocol, which significantly reduces the cost of the reactions. We successfully used this modified Gibson assembly protocol with two short insert-plasmid overlap regions, each counting only 15 nucleotides. PMID:27073895

  10. Highly efficient gene transfer using a retroviral vector into murine T cells for preclinical chimeric antigen receptor-expressing T cell therapy

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kusabuka, Hotaka; Fujiwara, Kento; Tokunaga, Yusuke

    Adoptive immunotherapy using chimeric antigen receptor-expressing T (CAR-T) cells has attracted attention as an efficacious strategy for cancer treatment. To prove the efficacy and safety of CAR-T cell therapy, the elucidation of immunological mechanisms underlying it in mice is required. Although a retroviral vector (Rv) is mainly used for the introduction of CAR to murine T cells, gene transduction efficiency is generally less than 50%. The low transduction efficiency causes poor precision in the functional analysis of CAR-T cells. We attempted to improve the Rv gene transduction protocol to more efficiently generate functional CAR-T cells by optimizing the period ofmore » pre-cultivation and antibody stimulation. In the improved protocol, gene transduction efficiency to murine T cells was more than 90%. In addition, almost all of the prepared murine T cells expressed CAR after puromycin selection. These CAR-T cells had antigen-specific cytotoxic activity and secreted multiple cytokines by antigen stimulation. We believe that our optimized gene transduction protocol for murine T cells contributes to the advancement of T cell biology and development of immunotherapy using genetically engineered T cells. - Highlights: • We established highly efficient gene transduction protocols for murine T cells. • CD8{sup +} CAR-T cells had antigen-specific cytotoxic activity. • CD4{sup +} CAR-T cells secreted multiple cytokines by antigen stimulation. • This finding can contribute to the development of T-cell biology and immunotherapy.« less

  11. Synthesis of a new class of Betti bases by the Mannich-type reaction: efficient, facile, solvent-free and one-pot protocol.

    PubMed

    Shahrisa, Aziz; Teimuri-Mofrad, Reza; Gholamhosseini-Nazari, Mahdi

    2015-02-01

    A variety of organocatalysts has been screened for the synthesis of arylaminonaphthols. It has been shown that (N,N-dimethylethanolamine) is a highly efficient organocatalyst for the direct synthesis of a novel class of arylaminonaphthols via three-component condensation of 2-naphthol, aldehydes, and arylamines under solvent-free conditions. Mild, one-pot, and green reaction conditions, relatively short reaction times and good yields make this protocol highly significant. 25 new compounds have been synthesized by this method.

  12. Chapter 22: Compressed Air Evaluation Protocol. The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kurnik, Charles W; Benton, Nathanael; Burns, Patrick

    Compressed-air systems are used widely throughout industry for many operations, including pneumatic tools, packaging and automation equipment, conveyors, and other industrial process operations. Compressed-air systems are defined as a group of subsystems composed of air compressors, air treatment equipment, controls, piping, pneumatic tools, pneumatically powered machinery, and process applications using compressed air. A compressed-air system has three primary functional subsystems: supply, distribution, and demand. Air compressors are the primary energy consumers in a compressed-air system and are the primary focus of this protocol. The two compressed-air energy efficiency measures specifically addressed in this protocol are: High-efficiency/variable speed drive (VSD) compressormore » replacing modulating, load/unload, or constant-speed compressor; and Compressed-air leak survey and repairs. This protocol provides direction on how to reliably verify savings from these two measures using a consistent approach for each.« less

  13. An efficient and reliable geographic routing protocol based on partial network coding for underwater sensor networks.

    PubMed

    Hao, Kun; Jin, Zhigang; Shen, Haifeng; Wang, Ying

    2015-05-28

    Efficient routing protocols for data packet delivery are crucial to underwater sensor networks (UWSNs). However, communication in UWSNs is a challenging task because of the characteristics of the acoustic channel. Network coding is a promising technique for efficient data packet delivery thanks to the broadcast nature of acoustic channels and the relatively high computation capabilities of the sensor nodes. In this work, we present GPNC, a novel geographic routing protocol for UWSNs that incorporates partial network coding to encode data packets and uses sensor nodes' location information to greedily forward data packets to sink nodes. GPNC can effectively reduce network delays and retransmissions of redundant packets causing additional network energy consumption. Simulation results show that GPNC can significantly improve network throughput and packet delivery ratio, while reducing energy consumption and network latency when compared with other routing protocols.

  14. Incineration of polychlorinated biphenyls in high-efficiency boilers: a viable disposal option

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hunt, G.T.; Wolf, P.; Fennelly, P.F.

    1984-03-01

    Approximately 750 million pounds of polychlorinated biphenyls (PCBs) remain in service today in the United States. The eventual disposition of these materials and the vast stock piles already removed from commerce and use represents a formidable problem to both U.S. industry (e.g., utility companies) and federal and state environmental agencies. Despite the fact that available disposal options include the use of high-temperature incineration, disposal efforts have been significantly hampered by the lack of approved incineration facilities. The results of comprehensive PCB incineration programs conducted in accordance with EPA test protocols at each of three high-efficiency boiler sites are presented. Fluemore » gas sampling procedures included the use of both the modified method 5 PCB train and the Source Assessment Sampling System (SASS). Analytical protocols included the use of gas chromatography (GC/ECD) and combined gas chromatography/mass spectrometry (GC/MS). PCB destruction efficiency data for each of nine test runs were in excess of the 99.9% values assumed by the EPA regulation. The cumulative data set lends further credibility to the use of high-efficiency boilers as a viable disposal option for PCB contaminated (50-500 ppm) waste oils when conducted in strict accordance with existing EPA protocols.« less

  15. Chapter 5: Residential Furnaces and Boilers Evaluation Protocol. The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kurnik, Charles W.; Jacobson, David

    The high-efficiency boiler and furnace measure produces gas heating savings resulting from installation of more energy-efficient heating equipment in a residence. Such equipment, which ranges in size from 60 kBtu/hr to 300 kBtu/hr, is installed primarily in single-family homes and multifamily buildings with individual heating systems for each dwelling unit. This protocol does not cover integrated heating and water heating units which can be used in lieu of space heating only equipment.

  16. RNA isolation from loquat and other recalcitrant woody plants with high quality and yield.

    PubMed

    Morante-Carriel, Jaime; Sellés-Marchart, Susana; Martínez-Márquez, Ascensión; Martínez-Esteso, María José; Luque, Ignacio; Bru-Martínez, Roque

    2014-05-01

    RNA isolation is difficult in plants that contain large amounts of polysaccharides and polyphenol compounds. To date, no commercial kit has been developed for the isolation of high-quality RNA from tissues with these characteristics, especially for fruit. The common protocols for RNA isolation are tedious and usually result in poor yields when applied to recalcitrant plant tissues. Here an efficient RNA isolation protocol based on cetyltrimethylammonium bromide (CTAB) and two successive precipitations with 10 M lithium chloride (LiCl) was developed specifically for loquat fruits, but it was proved to work efficiently in other tissues of loquat and woody plants. The RNA isolated by this improved protocol was not only of high purity and integrity (A260/A280 ratios ranged from 1.90 to 2.04 and A260/A230 ratios were>2.0) but also of high yield (up to 720 μg on average [coefficient of variation=21%] total RNA per gram fresh tissue). The protocol was tested on loquat fruit (different stages of development, postharvest, ripening, and bruising), leaf, root, flower, stem, and bud; quince fruit and root; grapevine cells in liquid culture; and rose petals. The RNA obtained with this method is amenable to enzymatic treatments and can be efficiently applied for research on gene characterization, expression, and function. Copyright © 2014 Elsevier Inc. All rights reserved.

  17. Efficient Group Coordination in Multicast Trees

    DTIC Science & Technology

    2001-01-01

    describe a novel protocol to coordinate multipoint groupwork within the IP-multicast framework. The protocol supports Internet-wide coordination for large...and highly-interactive groupwork , relying on the dissemination of coordination directives among group members across a shared end-to-end multicast

  18. Research on TCP/IP network communication based on Node.js

    NASA Astrophysics Data System (ADS)

    Huang, Jing; Cai, Lixiong

    2018-04-01

    In the face of big data, long connection and high synchronization, TCP/IP network communication will cause performance bottlenecks due to its blocking multi-threading service model. This paper presents a method of TCP/IP network communication protocol based on Node.js. On the basis of analyzing the characteristics of Node.js architecture and asynchronous non-blocking I/O model, the principle of its efficiency is discussed, and then compare and analyze the network communication model of TCP/IP protocol to expound the reasons why TCP/IP protocol stack is widely used in network communication. Finally, according to the large data and high concurrency in the large-scale grape growing environment monitoring process, a TCP server design based on Node.js is completed. The results show that the example runs stably and efficiently.

  19. Cryopreservation of Human Pluripotent Stem Cells in Defined Medium

    PubMed Central

    Liu, Weiwei; Chen, Guokai

    2014-01-01

    This protocol describes a cryopreservation procedure using an enzyme-free dissociation method to harvest cells and preserve cells in albumin-free chemically defined E8 medium for human pluripotent stem cells (hPSCs). The dissociation by EDTA/PBS produces small cell aggregates that allow high survival efficiency in passaging and cryopreservation. The preservation in E8 medium eliminates serum or other animal products, and is suitable for the increasing demand for high quality hPSCs in translational research. In combination with the special feature of EDTA/PBS dissociation, this protocol allows efficient cryopreservation in more time-saving manner. PMID:25366897

  20. Liver plasma membranes: an effective method to analyze membrane proteome.

    PubMed

    Cao, Rui; Liang, Songping

    2012-01-01

    Plasma membrane proteins are critical for the maintenance of biological systems and represent important targets for the treatment of disease. The hydrophobicity and low abundance of plasma membrane proteins make them difficult to analyze. The protocols given here are the efficient isolation/digestion procedures for liver plasma membrane proteomic analysis. Both protocol for the isolation of plasma membranes and protocol for the in-gel digestion of gel-embedded plasma membrane proteins are presented. The later method allows the use of a high detergent concentration to achieve efficient solubilization of hydrophobic plasma membrane proteins while avoiding interference with the subsequent LC-MS/MS analysis.

  1. An Eco-Friendly Improved Protocol for the Synthesis of Bis(3-indolyl)methanes Using Poly(4-vinylpyridinium)hydrogen Sulfate as Efficient, Heterogeneous, and Recyclable Solid Acid Catalyst

    PubMed Central

    Banothu, Janardhan; Gali, Rajitha; Velpula, Ravibabu; Bavantula, Rajitha; Crooks, Peter A.

    2013-01-01

    Highly efficient and eco-friendly protocol for the synthesis of bis(3-indolyl)methanes by the electrophilic substitution reaction of indole with aldehydes catalyzed by poly(4-vinylpyridinium)hydrogen sulfate was described. Excellent yields, shorter reaction times, simple work-up procedure, avoiding hazardous organic solvents, and reusability of the catalyst are the most obvious advantages of this method. PMID:24052864

  2. Distributed reservation control protocols for random access broadcasting channels

    NASA Technical Reports Server (NTRS)

    Greene, E. P.; Ephremides, A.

    1981-01-01

    Attention is given to a communication network consisting of an arbitrary number of nodes which can communicate with each other via a time-division multiple access (TDMA) broadcast channel. The reported investigation is concerned with the development of efficient distributed multiple access protocols for traffic consisting primarily of single packet messages in a datagram mode of operation. The motivation for the design of the protocols came from the consideration of efficient multiple access utilization of moderate to high bandwidth (4-40 Mbit/s capacity) communication satellite channels used for the transmission of short (1000-10,000 bits) fixed length packets. Under these circumstances, the ratio of roundtrip propagation time to packet transmission time is between 100 to 10,000. It is shown how a TDMA channel can be adaptively shared by datagram traffic and constant bandwidth users such as in digital voice applications. The distributed reservation control protocols described are a hybrid between contention and reservation protocols.

  3. Highly efficient one-pot three-component synthesis of naphthopyran derivatives in water catalyzed by hydroxyapatite

    EPA Science Inventory

    An expeditious and efficient protocol for the synthesis of naphthopyrans has been developed that proceeds via one-pot three-component sequential reaction in water catalyzed by hydroxyapatite or sodium-modified-hydroxyapatite. The title compounds have been obtained in high yield a...

  4. Performance Evaluation of FAST TCP Traffic-Flows in Multihomed MANETs

    NASA Astrophysics Data System (ADS)

    Mudassir, Mumajjed Ul; Akram, Adeel

    In Mobile Ad hoc Networks (MANETs) an efficient communication protocol is required at the transport layer. Mobile nodes moving around will have temporary and rather short-lived connectivity with each other and the Internet, thus requiring efficient utilization of network resources. Moreover the problems arising due to high mobility, collision and congestion must also be considered. Multihoming allows higher reliability and enhancement of network throughput. FAST TCP is a new promising transport layer protocol developed for high-speed high-latency networks. In this paper, we have analyzed the performance of FAST TCP traffic flows in multihomed MANETs and compared it with standard TCP (TCP Reno) traffic flows in non-multihomed MANETs.

  5. Novel protocol for highly efficient gas-phase chemical derivatization of surface amine groups using trifluoroacetic anhydride

    NASA Astrophysics Data System (ADS)

    Duchoslav, Jiri; Kehrer, Matthias; Hinterreiter, Andreas; Duchoslav, Vojtech; Unterweger, Christoph; Fürst, Christian; Steinberger, Roland; Stifter, David

    2018-06-01

    In the current work, chemical derivatization of amine (NH2) groups with trifluoroacetic anhydride (TFAA) as an analytical method to improve the information scope of X-ray photoelectron spectroscopy (XPS) is investigated. TFAA is known to successfully label hydroxyl (OH) groups. With the introduction of a newly developed gas-phase derivatization protocol conducted at ambient pressure and using a catalyst also NH2 groups can now efficiently be labelled with a high yield and without the formation of unwanted by-products. By establishing a comprehensive and self-consistent database of reference binding energies for XPS a promising approach for distinguishing hydroxyl from amine groups is presented. The protocol was verified on different polymers, including poly(allylamine), poly(ethyleneimine), poly(vinylalcohol) and chitosan, the latter one containing both types of addressed chemical groups.

  6. A rapid and efficient SDS-based RNA isolation protocol from different tissues of coffee.

    PubMed

    Huded, Arun Kumar C; Jingade, Pavankumar; Mishra, Manoj Kumar

    2018-03-01

    Isolation of high-quality RNA from coffee is challenging because of high level of polysaccharides, polyphenols and other secondary metabolites. In the present study, a rapid and efficient RNA extraction protocol from different tissues of coffee was optimized. Sufficiently high quality and quantity (225.6-454.8 µg/g) of RNA was obtained by using the optimized protocol. The presence of two distinct bands of 28S rRNA and 18S rRNA in agarose gel proved the intactness of the RNA samples. The average spectrophotometric values of the isolated RNA ranged from 1.96 to 2.02 ( A 260/280 ) and 1.95 to 2.14 ( A 260/230 ), indicating the high quality of RNA devoid of polyphenols, polysaccharides and protein contamination. In the optimized protocol, addition of PVPP to the extraction buffer and a brief incubation of samples at 65 °C and subsequent purification with potassium acetate resulted in good-quality RNA isolation. The suitability of RNA for downstream processing was confirmed by PCR amplification with cytochrome c oxidase gene-specific primers. The amplification of a single 392 bp fragment using cDNA and 1.5 kb fragment using genomic DNA samples confirmed the absence of DNA contamination. The present protocol is rapid and yielded good quality and quantity of RNA suitable for functional genomics studies.

  7. The Traffic Adaptive Data Dissemination (TrAD) Protocol for both Urban and Highway Scenarios.

    PubMed

    Tian, Bin; Hou, Kun Mean; Zhou, Haiying

    2016-06-21

    The worldwide economic cost of road crashes and injuries is estimated to be US$518 billion per year and the annual congestion cost in France is estimated to be €5.9 billion. Vehicular Ad hoc Networks (VANETs) are one solution to improve transport features such as traffic safety, traffic jam and infotainment on wheels, where a great number of event-driven messages need to be disseminated in a timely way in a region of interest. In comparison with traditional wireless networks, VANETs have to consider the highly dynamic network topology and lossy links due to node mobility. Inter-Vehicle Communication (IVC) protocols are the keystone of VANETs. According to our survey, most of the proposed IVC protocols focus on either highway or urban scenarios, but not on both. Furthermore, too few protocols, considering both scenarios, can achieve high performance. In this paper, an infrastructure-less Traffic Adaptive data Dissemination (TrAD) protocol which takes into account road traffic and network traffic status for both highway and urban scenarios will be presented. TrAD has double broadcast suppression techniques and is designed to adapt efficiently to the irregular road topology. The performance of the TrAD protocol was evaluated quantitatively by means of realistic simulations taking into account different real road maps, traffic routes and vehicular densities. The obtained simulation results show that TrAD is more efficient in terms of packet delivery ratio, number of transmissions and delay in comparison with the performance of three well-known reference protocols. Moreover, TrAD can also tolerate a reasonable degree of GPS drift and still achieve efficient data dissemination.

  8. The Traffic Adaptive Data Dissemination (TrAD) Protocol for both Urban and Highway Scenarios

    PubMed Central

    Tian, Bin; Hou, Kun Mean; Zhou, Haiying

    2016-01-01

    The worldwide economic cost of road crashes and injuries is estimated to be US$518 billion per year and the annual congestion cost in France is estimated to be €5.9 billion. Vehicular Ad hoc Networks (VANETs) are one solution to improve transport features such as traffic safety, traffic jam and infotainment on wheels, where a great number of event-driven messages need to be disseminated in a timely way in a region of interest. In comparison with traditional wireless networks, VANETs have to consider the highly dynamic network topology and lossy links due to node mobility. Inter-Vehicle Communication (IVC) protocols are the keystone of VANETs. According to our survey, most of the proposed IVC protocols focus on either highway or urban scenarios, but not on both. Furthermore, too few protocols, considering both scenarios, can achieve high performance. In this paper, an infrastructure-less Traffic Adaptive data Dissemination (TrAD) protocol which takes into account road traffic and network traffic status for both highway and urban scenarios will be presented. TrAD has double broadcast suppression techniques and is designed to adapt efficiently to the irregular road topology. The performance of the TrAD protocol was evaluated quantitatively by means of realistic simulations taking into account different real road maps, traffic routes and vehicular densities. The obtained simulation results show that TrAD is more efficient in terms of packet delivery ratio, number of transmissions and delay in comparison with the performance of three well-known reference protocols. Moreover, TrAD can also tolerate a reasonable degree of GPS drift and still achieve efficient data dissemination. PMID:27338393

  9. The cryopreservation protocol optimal for progenitor recovery is not optimal for preservation of marrow repopulating ability.

    PubMed

    Balint, B; Ivanović, Z; Petakov, M; Taseski, J; Jovcić, G; Stojanović, N; Milenković, P

    1999-03-01

    The efficiency of five different cryopreservation protocols (our original controlled-rate and noncontrolled-rate protocols) was evaluated on the basis of the recovery after thawing of very primitive pluripotent hemopoietic stem cells (MRA(CFU-GM), pluripotent progenitors (CFU-Sd12) and committed granulocyte-monocyte progenitors (CFU-GM) in mouse bone marrow. Although the nucleated cell recovery and viability determined immediately after the thawing and washing of the cells were found to be similar, whether controlled-rate or noncontrolled-rate cryopreservation protocols were used, the recovery of MRA(CFU-GM), CFU-Sd12 and CFU-GM varied depending on the type of protocol and the cryoprotector (DMSO) concentrations used. It was shown that the controlled-rate protocol was more efficient, enabling better MRA(CFU-GM), CFU-Sd12 and CFU-GM recovery from frozen samples. The most efficient was the controlled-rate protocol of cryopreservation designed to compensate for the release of fusion heat, which enabled a better survival of CFU-Sd12 and CFU-GM when combined with a lower (5%) DMSO concentration. On the contrary, a satisfactory survival rate of very primitive stem cells (MRA(CFU-GM)) was achieved only when 10% DMSO was included with a five-step protocol of cryopreservation. These results point to adequately used controlled-rate freezing as essential for a highly efficient cryopreservation of some of the categories of hematopoietic stem and progenitor cells. At the same time, it was obvious that a higher DMSO concentration was necessary for the cryopreservation of very primitive stem cells, but not, however, for more mature progenitor cells (CFU-S, CFU-GM). These results imply the existence of a mechanism that decreases the intracellular concentration of DMSO in primitive MRA cells, which is not the case for less primitive progenitors.

  10. Tandem Aldol-Michael Reactions in Aqueous Diethylamine Medium: A Greener and Efficient Approach to Bis-Pyrimidine Derivatives

    PubMed Central

    Al-Majid, Abdullah M.; Barakat, Assem; AL-Najjar, Hany J.; Mabkhot, Yahia N.; Ghabbour, Hazem A.; Fun, Hoong-Kun

    2013-01-01

    A simple protocol, involving the green synthesis for the construction of novel bis-pyrimidine derivatives, 3a–i and 4a–e are accomplished by the aqueous diethylamine media promoted tandem Aldol-Michael reaction between two molecules of barbituric acid derivatives 1a,b with various aldehydes. This efficient synthetic protocol using an economic and environmentally friendly reaction media with versatility and shorter reaction time provides bis-pyrimidine derivatives with high yields (88%–99%). PMID:24317435

  11. Herpes simplex virus mutant generation and dual-detection methods for gaining insight into latent/lytic cycles in vivo.

    PubMed

    Sawtell, Nancy M; Thompson, Richard L

    2014-01-01

    Two important components to a useful strategy to examine viral gene regulation in vivo are (1) a highly efficient protocol to generate viral mutants that limits undesired mutation and retains full replication competency in vivo and (2) an efficient system to detect and quantify viral promoter activity in rare cells in vivo. Our strategy and protocols for generating, characterizing, and employing HSV viral promoter/reporter mutants in vivo are provided in this two-part chapter.

  12. Sugar microanalysis by HPLC with benzoylation: improvement via introduction of a C-8 cartridge and a high efficiency ODS column.

    PubMed

    Miyagi, Michiko; Yokoyama, Hirokazu; Hibi, Toshifumi

    2007-07-01

    An HPLC protocol for sugar microanalysis based on the formation of ultraviolet-absorbing benzoyl chloride derivatives was improved. Here, samples were prepared with a C-8 cartridge and analyzed with a high efficiency ODS column, in which porous spherical silica particles 3 microm in diameter were packed. These devices allowed us to simultaneously quantify multiple sugars and sugar alcohols up to 10 ng/ml and to provide satisfactory separations of some sugars, such as fructose and myo-inositol and sorbitol and mannitol. This protocol, which does not require special apparatuses, should become a powerful tool in sugar research.

  13. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Duan, Sisi; Nicely, Lucas D; Zhang, Haibin

    Modern large-scale networks require the ability to withstand arbitrary failures (i.e., Byzantine failures). Byzantine reliable broadcast algorithms can be used to reliably disseminate information in the presence of Byzantine failures. We design a novel Byzantine reliable broadcast protocol for loosely connected and synchronous networks. While previous such protocols all assume correct senders, our protocol is the first to handle Byzantine senders. To achieve this goal, we have developed new techniques for fault detection and fault tolerance. Our protocol is efficient, and under normal circumstances, no expensive public-key cryptographic operations are used. We implement and evaluate our protocol, demonstrating that ourmore » protocol has high throughput and is superior to the existing protocols in uncivil executions.« less

  14. An Energy-Efficient and High-Quality Video Transmission Architecture in Wireless Video-Based Sensor Networks.

    PubMed

    Aghdasi, Hadi S; Abbaspour, Maghsoud; Moghadam, Mohsen Ebrahimi; Samei, Yasaman

    2008-08-04

    Technological progress in the fields of Micro Electro-Mechanical Systems (MEMS) and wireless communications and also the availability of CMOS cameras, microphones and small-scale array sensors, which may ubiquitously capture multimedia content from the field, have fostered the development of low-cost limited resources Wireless Video-based Sensor Networks (WVSN). With regards to the constraints of videobased sensor nodes and wireless sensor networks, a supporting video stream is not easy to implement with the present sensor network protocols. In this paper, a thorough architecture is presented for video transmission over WVSN called Energy-efficient and high-Quality Video transmission Architecture (EQV-Architecture). This architecture influences three layers of communication protocol stack and considers wireless video sensor nodes constraints like limited process and energy resources while video quality is preserved in the receiver side. Application, transport, and network layers are the layers in which the compression protocol, transport protocol, and routing protocol are proposed respectively, also a dropping scheme is presented in network layer. Simulation results over various environments with dissimilar conditions revealed the effectiveness of the architecture in improving the lifetime of the network as well as preserving the video quality.

  15. Effects of protocol step length on biomechanical measures in swimming.

    PubMed

    Barbosa, Tiago M; de Jesus, Kelly; Abraldes, J Arturo; Ribeiro, João; Figueiredo, Pedro; Vilas-Boas, João Paulo; Fernandes, Ricardo J

    2015-03-01

    The assessment of energetic and mechanical parameters in swimming often requires the use of an intermittent incremental protocol, whose step lengths are corner stones for the efficiency of the evaluation procedures. To analyze changes in swimming kinematics and interlimb coordination behavior in 3 variants, with different step lengths, of an intermittent incremental protocol. Twenty-two male swimmers performed n×di variants of an intermittent and incremental protocol (n≤7; d1=200 m, d2=300 m, and d3=400 m). Swimmers were videotaped in the sagittal plane for 2-dimensional kinematical analysis using a dual-media setup. Video images were digitized with a motion-capture system. Parameters that were assessed included the stroke kinematics, the segmental and anatomical landmark kinematics, and interlimb coordination. Movement efficiency was also estimated. There were no significant variations in any of the selected variables according to the step lengths. A high to very high relationship was observed between step lengths. The bias was much reduced and the 95%CI fairly tight. Since there were no meaningful differences between the 3 protocol variants, the 1 with shortest step length (ie, 200 m) should be adopted for logistical reasons.

  16. Experimental measurement-device-independent verification of quantum steering

    NASA Astrophysics Data System (ADS)

    Kocsis, Sacha; Hall, Michael J. W.; Bennet, Adam J.; Saunders, Dylan J.; Pryde, Geoff J.

    2015-01-01

    Bell non-locality between distant quantum systems—that is, joint correlations which violate a Bell inequality—can be verified without trusting the measurement devices used, nor those performing the measurements. This leads to unconditionally secure protocols for quantum information tasks such as cryptographic key distribution. However, complete verification of Bell non-locality requires high detection efficiencies, and is not robust to typical transmission losses over long distances. In contrast, quantum or Einstein-Podolsky-Rosen steering, a weaker form of quantum correlation, can be verified for arbitrarily low detection efficiencies and high losses. The cost is that current steering-verification protocols require complete trust in one of the measurement devices and its operator, allowing only one-sided secure key distribution. Here we present measurement-device-independent steering protocols that remove this need for trust, even when Bell non-locality is not present. We experimentally demonstrate this principle for singlet states and states that do not violate a Bell inequality.

  17. Experimental measurement-device-independent verification of quantum steering.

    PubMed

    Kocsis, Sacha; Hall, Michael J W; Bennet, Adam J; Saunders, Dylan J; Pryde, Geoff J

    2015-01-07

    Bell non-locality between distant quantum systems--that is, joint correlations which violate a Bell inequality--can be verified without trusting the measurement devices used, nor those performing the measurements. This leads to unconditionally secure protocols for quantum information tasks such as cryptographic key distribution. However, complete verification of Bell non-locality requires high detection efficiencies, and is not robust to typical transmission losses over long distances. In contrast, quantum or Einstein-Podolsky-Rosen steering, a weaker form of quantum correlation, can be verified for arbitrarily low detection efficiencies and high losses. The cost is that current steering-verification protocols require complete trust in one of the measurement devices and its operator, allowing only one-sided secure key distribution. Here we present measurement-device-independent steering protocols that remove this need for trust, even when Bell non-locality is not present. We experimentally demonstrate this principle for singlet states and states that do not violate a Bell inequality.

  18. Large scale validation of an efficient CRISPR/Cas-based multi gene editing protocol in Escherichia coli.

    PubMed

    Zerbini, Francesca; Zanella, Ilaria; Fraccascia, Davide; König, Enrico; Irene, Carmela; Frattini, Luca F; Tomasi, Michele; Fantappiè, Laura; Ganfini, Luisa; Caproni, Elena; Parri, Matteo; Grandi, Alberto; Grandi, Guido

    2017-04-24

    The exploitation of the CRISPR/Cas9 machinery coupled to lambda (λ) recombinase-mediated homologous recombination (recombineering) is becoming the method of choice for genome editing in E. coli. First proposed by Jiang and co-workers, the strategy has been subsequently fine-tuned by several authors who demonstrated, by using few selected loci, that the efficiency of mutagenesis (number of mutant colonies over total number of colonies analyzed) can be extremely high (up to 100%). However, from published data it is difficult to appreciate the robustness of the technology, defined as the number of successfully mutated loci over the total number of targeted loci. This information is particularly relevant in high-throughput genome editing, where repetition of experiments to rescue missing mutants would be impractical. This work describes a "brute force" validation activity, which culminated in the definition of a robust, simple and rapid protocol for single or multiple gene deletions. We first set up our own version of the CRISPR/Cas9 protocol and then we evaluated the mutagenesis efficiency by changing different parameters including sequence of guide RNAs, length and concentration of donor DNAs, and use of single stranded and double stranded donor DNAs. We then validated the optimized conditions targeting 78 "dispensable" genes. This work led to the definition of a protocol, featuring the use of double stranded synthetic donor DNAs, which guarantees mutagenesis efficiencies consistently higher than 10% and a robustness of 100%. The procedure can be applied also for simultaneous gene deletions. This work defines for the first time the robustness of a CRISPR/Cas9-based protocol based on a large sample size. Since the technical solutions here proposed can be applied to other similar procedures, the data could be of general interest for the scientific community working on bacterial genome editing and, in particular, for those involved in synthetic biology projects requiring high throughput procedures.

  19. An Exercise Protocol Designed to control Energy Expenditure and to have a Positive Impact on Maximal Oxygen Consumption for Long-Term Space Missions

    NASA Astrophysics Data System (ADS)

    Matsuo, Tomoaki; Ohkawara, Kazunori; Seino, Satoshi; Shimojo, Nobutake; Yamada, Shin; Ohshima, Hiroshi; Tanaka, Kiyoji; Mukai, Chiaki

    2013-02-01

    Maximal oxygen consumption decreases during spaceflight, and astronauts also experience controversial weight loss. Future space missions require a more efficient exercise program to maintain work efficiency and to control increased energy expenditure (EE). We have been developing two types of original exercise training protocols which are better suited to astronauts’ daily routine exercise during long-term spaceflight: sprint interval training (SIT) and high-intensity interval aerobic training (HIAT). In this study, we compared the total EE, including excess post-exercise energy expenditure (EPEE), induced by our interval cycling protocols with the total EE of a traditional, continuous aerobic training (CAT). In the results, while the EPEEs after the SIT and HIAT were greater than after the CAT, the total EE for an entire exercise/rest session with the CAT was the greatest of our three exercise protocols. The SIT and HIAT would be potential protocols to control energy expenditure for long space missions.

  20. Efficient model checking of network authentication protocol based on SPIN

    NASA Astrophysics Data System (ADS)

    Tan, Zhi-hua; Zhang, Da-fang; Miao, Li; Zhao, Dan

    2013-03-01

    Model checking is a very useful technique for verifying the network authentication protocols. In order to improve the efficiency of modeling and verification on the protocols with the model checking technology, this paper first proposes a universal formalization description method of the protocol. Combined with the model checker SPIN, the method can expediently verify the properties of the protocol. By some modeling simplified strategies, this paper can model several protocols efficiently, and reduce the states space of the model. Compared with the previous literature, this paper achieves higher degree of automation, and better efficiency of verification. Finally based on the method described in the paper, we model and verify the Privacy and Key Management (PKM) authentication protocol. The experimental results show that the method of model checking is effective, which is useful for the other authentication protocols.

  1. An Efficient Plant Regeneration and Transformation System of Ma Bamboo (Dendrocalamus latiflorus Munro) Started from Young Shoot as Explant

    PubMed Central

    Ye, Shanwen; Cai, Changyang; Ren, Huibo; Wang, Wenjia; Xiang, Mengqi; Tang, Xiaoshan; Zhu, Caiping; Yin, Tengfei; Zhang, Li; Zhu, Qiang

    2017-01-01

    Genetic engineering technology has been successfully used in many plant species, but is limited in woody plants, especially in bamboos. Ma bamboo (Dendrocalamus latiflorus Munro) is one of the most important bamboo species in Asia, and its genetic improvement was largely restricted by the lack of an efficient regeneration and transformation method. Here we reported a plantlet regeneration and Agrobacterium-mediated transformation protocol by using Ma bamboo young shoots as explants. Under our optimized conditions, embryogenic calluses were successfully induced from the excised young shoots on callus induction medium and rapidly grew on callus multiplication medium. Shoots and roots were regenerated on shoot induction medium and root induction medium, respectively, with high efficiency. An Agrobacterium-mediated genetic transformation protocol of Ma bamboo was established, verified by PCR and GUS staining. Furthermore, the maize Lc gene under the control of the ubiquitin promoter was successfully introduced into Ma bamboo genome and generated an anthocyanin over-accumulation phenotype. Our methods established here will facilitate the basic research as well as genetic breeding of this important bamboo species. Key achievements: A stable and high efficiency regeneration and Agrobacterium-mediated transformation protocol for Ma bamboo from vegetative organ is established. PMID:28798758

  2. Peach (Prunus persica L.).

    PubMed

    Sabbadini, Silvia; Pandolfini, Tiziana; Girolomini, Luca; Molesini, Barbara; Navacchi, Oriano

    2015-01-01

    Until now, the application of genetic transformation techniques in peach has been limited by the difficulties in developing efficient regeneration and transformation protocols. Here we describe an efficient regeneration protocol for the commercial micropropagation of GF677 rootstock (Prunus persica × Prunus amygdalus). The method is based on the production, via organogenesis, of meristematic bulk tissues characterized by a high competence for shoot regeneration. This protocol has also been used to obtain GF677 plants genetically engineered with an empty hairpin cassette (hereafter indicated as hp-pBin19), through Agrobacterium tumefaciens-mediated transformation. After 7-8 months of selection on media containing kanamycin, we obtained two genetically modified GF677 lines. PCR and Southern blot analyses were performed to confirm the genetic status.

  3. An Efficient Buyer-Seller Watermarking Protocol Based on Chameleon Encryption

    NASA Astrophysics Data System (ADS)

    Poh, Geong Sen; Martin, Keith M.

    Buyer-seller watermarking protocols are designed to deter clients from illegally distributing copies of digital content. This is achieved by allowing a distributor to insert a unique watermark into content in such a way that the distributor does not know the final watermarked copy that is given to the client. This protects both the client and distributor from attempts by one to falsely accuse the other of misuse. Buyer-seller watermarking protocols are normally based on asymmetric cryptographic primitives known as homomorphic encryption schemes. However, the computational and communication overhead of this conventional approach is high. In this paper we propose a different approach, based on the symmetric Chameleon encryption scheme. We show that this leads to significant gains in computational and operational efficiency.

  4. Improving the efficiency of single and multiple teleportation protocols based on the direct use of partially entangled states

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fortes, Raphael; Rigolin, Gustavo, E-mail: rigolin@ifi.unicamp.br

    We push the limits of the direct use of partially pure entangled states to perform quantum teleportation by presenting several protocols in many different scenarios that achieve the optimal efficiency possible. We review and put in a single formalism the three major strategies known to date that allow one to use partially entangled states for direct quantum teleportation (no distillation strategies permitted) and compare their efficiencies in real world implementations. We show how one can improve the efficiency of many direct teleportation protocols by combining these techniques. We then develop new teleportation protocols employing multipartite partially entangled states. The threemore » techniques are also used here in order to achieve the highest efficiency possible. Finally, we prove the upper bound for the optimal success rate for protocols based on partially entangled Bell states and show that some of the protocols here developed achieve such a bound. -- Highlights: •Optimal direct teleportation protocols using directly partially entangled states. •We put in a single formalism all strategies of direct teleportation. •We extend these techniques for multipartite partially entangle states. •We give upper bounds for the optimal efficiency of these protocols.« less

  5. Establishment of an efficient virus-induced gene silencing (VIGS) assay in Arabidopsis by Agrobacterium-mediated rubbing infection.

    PubMed

    Manhães, Ana Marcia E de A; de Oliveira, Marcos V V; Shan, Libo

    2015-01-01

    Several VIGS protocols have been established for high-throughput functional genomic screens as it bypasses the time-consuming and laborious process of generation of transgenic plants. The silencing efficiency in this approach is largely hindered by a technically demanding step in which the first pair of newly emerged true leaves at the 2-week-old stage are infiltrated with a needleless syringe. To further optimize VIGS efficiency and achieve rapid inoculation for a large-scale functional genomic study, here we describe a protocol of an efficient VIGS assay in Arabidopsis using Agrobacterium-mediated rubbing infection. The Agrobacterium inoculation is performed by simply rubbing the leaves with Filter Agent Celite(®) 545. The highly efficient and uniform silencing effect was indicated by the development of a visibly albino phenotype due to silencing of the Cloroplastos alterados 1 (CLA1) gene in the newly emerged leaves. In addition, the albino phenotype could be observed in stems and flowers, indicating its potential application for gene functional studies in the late vegetative development and flowering stages.

  6. A General Catalytic Method for Highly Cost- and Atom-Efficient Nucleophilic Substitutions.

    PubMed

    Huy, Peter H; Filbrich, Isabel

    2018-05-23

    A general formamide-catalyzed protocol for the efficient transformation of alcohols into alkyl chlorides, which is promoted by substoichiometric amounts (down to 34 mol %) of inexpensive trichlorotriazine (TCT), is introduced. This is the first example of a TCT-mediated dihydroxychlorination of an OH-containing substrate (e.g., alcohols and carboxylic acids) in which all three chlorine atoms of TCT are transferred to the starting material. The consequently enhanced atom economy facilitates a significantly improved waste balance (E-factors down to 4), cost efficiency, and scalability (>50 g). Furthermore, the current procedure is distinguished by high levels of functional-group compatibility and stereoselectivity, as only weakly acidic cyanuric acid is released as exclusive byproduct. Finally, a one-pot protocol for the preparation of amines, azides, ethers, and sulfides enabled the synthesis of the drug rivastigmine with twofold S N 2 inversion, which demonstrates the high practical value of the presented method. © 2018 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  7. Improved production of transgenic Dioscorea zingiberensis (Dioscoreaceae) by Agrobacterium tumefaciens-mediated transformation.

    PubMed

    Shi, L; Fan, J Q; Hu, C G; Luo, J; Yao, J L

    2012-02-03

    The establishment of high-efficiency Agrobacterium-mediated transformation techniques could improve the production of Dioscorea zingiberensis, a medicinal species with a high diosgenin content. We co-cultivated embryogenic calli induced from mature seeds with A. tumefaciens strain EHA105. A binary vector, pCAMBIA1381, which contains the gfp and hpt genes under the control of the ubiquitin promoter and the CaMV 35S promoter, respectively, was used for transformation. Pre-culture, basic medium, acetosyringone, and bacterial density were evaluated to establish the most efficient protocol. The optimal conditions consisted of MS medium without CaCl(2) for pre- and co-cultivation, three days for pre-culture, addition of 200 μM AS, and an OD(600) of 0.5. The transgenic plants grown under selection were confirmed by PCR analysis and Southern blot analysis. This protocol produced transgenic D. zingiberensis plants in seven months, with a transformation efficiency of 6%.

  8. Short Communication An efficient method for simultaneous extraction of high-quality RNA and DNA from various plant tissues.

    PubMed

    Oliveira, R R; Viana, A J C; Reátegui, A C E; Vincentz, M G A

    2015-12-29

    Determination of gene expression is an important tool to study biological processes and relies on the quality of the extracted RNA. Changes in gene expression profiles may be directly related to mutations in regulatory DNA sequences or alterations in DNA cytosine methylation, which is an epigenetic mark. Correlation of gene expression with DNA sequence or epigenetic mark polymorphism is often desirable; for this, a robust protocol to isolate high-quality RNA and DNA simultaneously from the same sample is required. Although commercial kits and protocols are available, they are mainly optimized for animal tissues and, in general, restricted to RNA or DNA extraction, not both. In the present study, we describe an efficient and accessible method to extract both RNA and DNA simultaneously from the same sample of various plant tissues, using small amounts of starting material. The protocol was efficient in the extraction of high-quality nucleic acids from several Arabidopsis thaliana tissues (e.g., leaf, inflorescence stem, flower, fruit, cotyledon, seedlings, root, and embryo) and from other tissues of non-model plants, such as Avicennia schaueriana (Acanthaceae), Theobroma cacao (Malvaceae), Paspalum notatum (Poaceae), and Sorghum bicolor (Poaceae). The obtained nucleic acids were used as templates for downstream analyses, such as mRNA sequencing, quantitative real time-polymerase chain reaction, bisulfite treatment, and others; the results were comparable to those obtained with commercial kits. We believe that this protocol could be applied to a broad range of plant species, help avoid technical and sampling biases, and facilitate several RNA- and DNA-dependent analyses.

  9. The Experimental Demonstration of High Efficiency Interaction-free Measurement for Quantum Counterfactual-like Communication.

    PubMed

    Liu, Chao; Liu, Jinhong; Zhang, Junxiang; Zhu, Shiyao

    2017-09-07

    We present an interaction-free measurement with quantum Zeno effect and a high efficiency η = 74.6% ± 0.15%. As a proof-of-principle demonstration, this measurement can be used to implement a quantum counterfactual-like communication protocol. Instead of a single photon state, we use a coherent light as the input source and show that the output agrees with the proposed quantum counterfactual communication protocol according to Salih et al. Although the counterfactuality is not achieved due to the presence of a few photons in the public channel, we show that the signal light is nearly absent in the public channel, which exhibits a proof-of-principle quantum counterfactual-like property of communication.

  10. An Abbreviated Protocol for High-Risk Screening Breast MRI Saves Time and Resources.

    PubMed

    Harvey, Susan C; Di Carlo, Phillip A; Lee, Bonmyong; Obadina, Eniola; Sippo, Dorothy; Mullen, Lisa

    2016-04-01

    To review the ability of an abbreviated, high-risk, screening, breast MRI protocol to detect cancer and save resources. High-risk screening breast MR images were reviewed, from both an abbreviated protocol and a full diagnostic protocol. Differences in cancer detection, scanner utilization, interpretation times, and need for additional imaging were recorded in an integrated data form, and reviewed and compared. A total of 568 MRI cases were reviewed, with the abbreviated and full protocols. No difference was found in the number of cancers detected. Scan times were decreased by 18.8 minutes per case, for a total of 10,678 minutes (178 hours). Interpretation time, on average, was 1.55 minutes for the abbreviated protocol, compared with 6.43 minutes for the full protocol. Review of the full protocol led to a significant change in the final BI-RADS(®) assessment in 12 of 568 (2.1%) cases. Abbreviated MRI is as effective as full-protocol MRI for demonstration of cancers in the high-risk screening setting, with only 12 (2.1%) cases recommended for additional MRI evaluation. The efficiency and resource savings of an abbreviated protocol would be significant, and would allow for opportunities to provide MRI for additional patients, as well as improved radiologist time management and workflow, with the potential to add real-time MRI interpretation or double reading. Copyright © 2016 American College of Radiology. Published by Elsevier Inc. All rights reserved.

  11. An Abbreviated Protocol for High-Risk Screening Breast MRI Saves Time and Resources.

    PubMed

    Harvey, Susan C; Di Carlo, Phillip A; Lee, Bonmyong; Obadina, Eniola; Sippo, Dorothy; Mullen, Lisa

    2016-11-01

    To review the ability of an abbreviated, high-risk, screening, breast MRI protocol to detect cancer and save resources. High-risk screening breast MR images were reviewed, from both an abbreviated protocol and a full diagnostic protocol. Differences in cancer detection, scanner utilization, interpretation times, and need for additional imaging were recorded in an integrated data form, and reviewed and compared. A total of 568 MRI cases were reviewed, with the abbreviated and full protocols. No difference was found in the number of cancers detected. Scan times were decreased by 18.8 minutes per case, for a total of 10,678 minutes (178 hours). Interpretation time, on average, was 1.55 minutes for the abbreviated protocol, compared with 6.43 minutes for the full protocol. Review of the full protocol led to a significant change in the final BI-RADS ® assessment in 12 of 568 (2.1%) cases. Abbreviated MRI is as effective as full-protocol MRI for demonstration of cancers in the high-risk screening setting, with only 12 (2.1 %) cases recommended for additional MRI evaluation. The efficiency and resource savings of an abbreviated protocol would be significant, and would allow for opportunities to provide MRI for additional patients, as well as improved radiologist time management and workflow, with the potential to add real-time MRI interpretation or double reading. Copyright © 2016 American College of Radiology. Published by Elsevier Inc. All rights reserved.

  12. Generation of genetic constructs that simultaneously express several shRNAs.

    PubMed

    Kretova, Olga V; Alembekov, Ildar R; Tchurikov, Nickolai A

    2012-05-01

    RNAi has potential as an antiviral gene therapy strategy. Cassette constructs simultaneously expressing several siRNAs could prove to be the most efficient technique in developing gene therapy approaches for highly mutable viruses such as HIV-1. Here we describe a rapid and cost-saving protocol to generate cassettes that simultaneously express three siRNAs for repression of HIV-1 and CCR5 transcripts. siRNA biological activity was tested in a non-viral system, and exhibited both efficiency and specificity. Our results suggest this protocol can be used to rapidly generate cassette constructs for antiviral gene therapy applications.

  13. Towards building high performance medical image management system for clinical trials

    NASA Astrophysics Data System (ADS)

    Wang, Fusheng; Lee, Rubao; Zhang, Xiaodong; Saltz, Joel

    2011-03-01

    Medical image based biomarkers are being established for therapeutic cancer clinical trials, where image assessment is among the essential tasks. Large scale image assessment is often performed by a large group of experts by retrieving images from a centralized image repository to workstations to markup and annotate images. In such environment, it is critical to provide a high performance image management system that supports efficient concurrent image retrievals in a distributed environment. There are several major challenges: high throughput of large scale image data over the Internet from the server for multiple concurrent client users, efficient communication protocols for transporting data, and effective management of versioning of data for audit trails. We study the major bottlenecks for such a system, propose and evaluate a solution by using a hybrid image storage with solid state drives and hard disk drives, RESTfulWeb Services based protocols for exchanging image data, and a database based versioning scheme for efficient archive of image revision history. Our experiments show promising results of our methods, and our work provides a guideline for building enterprise level high performance medical image management systems.

  14. Data dissemination using gossiping in wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Medidi, Muralidhar; Ding, Jin; Medidi, Sirisha

    2005-06-01

    Disseminating data among sensors is a fundamental operation in energy-constrained wireless sensor networks. We present a gossip-based adaptive protocol for data dissemination to improve energy efficiency of this operation. To overcome the data implosion problems associated with dissemination operation, our protocol uses meta-data to name the data using high-level data descriptors and negotiation to eliminate redundant transmissions of duplicate data in the network. Further, we adapt the gossiping with data aggregation possibilities in sensor networks. We simulated our data dissemination protocol, and compared it to the SPIN protocol. We find that our protocol improves on the energy consumption by about 20% over others, while improving significantly over the data dissemination rate of gossiping.

  15. Development of an efficient real-time quantitative PCR protocol for detection of Xanthomonas arboricola pv. pruni in Prunus species.

    PubMed

    Palacio-Bielsa, Ana; Cubero, Jaime; Cambra, Miguel A; Collados, Raquel; Berruete, Isabel M; López, María M

    2011-01-01

    Xanthomonas arboricola pv. pruni, the causal agent of bacterial spot disease of stone fruit, is considered a quarantine organism by the European Union and the European and Mediterranean Plant Protection Organization (EPPO). The bacterium can undergo an epiphytic phase and/or be latent and can be transmitted by plant material, but currently, only visual inspections are used to certify plants as being X. arboricola pv. pruni free. A novel and highly sensitive real-time TaqMan PCR detection protocol was designed based on a sequence of a gene for a putative protein related to an ABC transporter ATP-binding system in X. arboricola pv. pruni. Pathogen detection can be completed within a few hours with a sensitivity of 10(2) CFU ml(-1), thus surpassing the sensitivity of the existing conventional PCR. Specificity was assessed for X. arboricola pv. pruni strains from different origins as well as for closely related Xanthomonas species, non-Xanthomonas species, saprophytic bacteria, and healthy Prunus samples. The efficiency of the developed protocol was evaluated with field samples of 14 Prunus species and rootstocks. For symptomatic leaf samples, the protocol was very efficient even when washed tissues of the leaves were directly amplified without any previous DNA extraction. For samples of 117 asymptomatic leaves and 285 buds, the protocol was more efficient after a simple DNA extraction, and X. arboricola pv. pruni was detected in 9.4% and 9.1% of the 402 samples analyzed, respectively, demonstrating its frequent epiphytic or endophytic phase. This newly developed real-time PCR protocol can be used as a quantitative assay, offers a reliable and sensitive test for X. arboricola pv. pruni, and is suitable as a screening test for symptomatic as well as asymptomatic plant material.

  16. High-Speed TCP Testing

    NASA Technical Reports Server (NTRS)

    Brooks, David E.; Gassman, Holly; Beering, Dave R.; Welch, Arun; Hoder, Douglas J.; Ivancic, William D.

    1999-01-01

    Transmission Control Protocol (TCP) is the underlying protocol used within the Internet for reliable information transfer. As such, there is great interest to have all implementations of TCP efficiently interoperate. This is particularly important for links exhibiting long bandwidth-delay products. The tools exist to perform TCP analysis at low rates and low delays. However, for extremely high-rate and lone-delay links such as 622 Mbps over geosynchronous satellites, new tools and testing techniques are required. This paper describes the tools and techniques used to analyze and debug various TCP implementations over high-speed, long-delay links.

  17. A slotted access control protocol for metropolitan WDM ring networks

    NASA Astrophysics Data System (ADS)

    Baziana, P. A.; Pountourakis, I. E.

    2009-03-01

    In this study we focus on the serious scalability problems that many access protocols for WDM ring networks introduce due to the use of a dedicated wavelength per access node for either transmission or reception. We propose an efficient slotted MAC protocol suitable for WDM ring metropolitan area networks. The proposed network architecture employs a separate wavelength for control information exchange prior to the data packet transmission. Each access node is equipped with a pair of tunable transceivers for data communication and a pair of fixed tuned transceivers for control information exchange. Also, each access node includes a set of fixed delay lines for synchronization reasons; to keep the data packets, while the control information is processed. An efficient access algorithm is applied to avoid both the data wavelengths and the receiver collisions. In our protocol, each access node is capable of transmitting and receiving over any of the data wavelengths, facing the scalability issues. Two different slot reuse schemes are assumed: the source and the destination stripping schemes. For both schemes, performance measures evaluation is provided via an analytic model. The analytical results are validated by a discrete event simulation model that uses Poisson traffic sources. Simulation results show that the proposed protocol manages efficient bandwidth utilization, especially under high load. Also, comparative simulation results prove that our protocol achieves significant performance improvement as compared with other WDMA protocols which restrict transmission over a dedicated data wavelength. Finally, performance measures evaluation is explored for diverse numbers of buffer size, access nodes and data wavelengths.

  18. High-efficiency transformation by biolistics of soybean, common bean and cotton transgenic plants.

    PubMed

    Rech, Elibio L; Vianna, Giovanni R; Aragão, Francisco J L

    2008-01-01

    This protocol describes a method for high-frequency recovery of transgenic soybean, bean and cotton plants, by combining resistance to the herbicide imazapyr as a selectable marker, multiple shoot induction from embryonic axes of mature seeds and biolistics techniques. This protocol involves the following stages: plasmid design, preparation of soybean, common bean and cotton apical meristems for bombardment, microparticle-coated DNA bombardment of apical meristems and in vitro culture and selection of transgenic plants. The average frequencies (the total number of fertile transgenic plants divided by the total number of bombarded embryonic axes) of producing germline transgenic soybean and bean and cotton plants using this protocol are 9, 2.7 and 0.55%, respectively. This protocol is suitable for studies of gene function as well as the production of transgenic cultivars carrying different traits for breeding programs. This protocol can be completed in 7-10 months.

  19. Efficient simultaneous dense coding and teleportation with two-photon four-qubit cluster states

    NASA Astrophysics Data System (ADS)

    Zhang, Cai; Situ, Haozhen; Li, Qin; He, Guang Ping

    2016-08-01

    We firstly propose a simultaneous dense coding protocol with two-photon four-qubit cluster states in which two receivers can simultaneously get their respective classical information sent by a sender. Because each photon has two degrees of freedom, the protocol will achieve a high transmittance. The security of the simultaneous dense coding protocol has also been analyzed. Secondly, we investigate how to simultaneously teleport two different quantum states with polarization and path degree of freedom using cluster states to two receivers, respectively, and discuss its security. The preparation and transmission of two-photon four-qubit cluster states is less difficult than that of four-photon entangled states, and it has been experimentally generated with nearly perfect fidelity and high generation rate. Thus, our protocols are feasible with current quantum techniques.

  20. Hi-C 2.0: An optimized Hi-C procedure for high-resolution genome-wide mapping of chromosome conformation.

    PubMed

    Belaghzal, Houda; Dekker, Job; Gibcus, Johan H

    2017-07-01

    Chromosome conformation capture-based methods such as Hi-C have become mainstream techniques for the study of the 3D organization of genomes. These methods convert chromatin interactions reflecting topological chromatin structures into digital information (counts of pair-wise interactions). Here, we describe an updated protocol for Hi-C (Hi-C 2.0) that integrates recent improvements into a single protocol for efficient and high-resolution capture of chromatin interactions. This protocol combines chromatin digestion and frequently cutting enzymes to obtain kilobase (kb) resolution. It also includes steps to reduce random ligation and the generation of uninformative molecules, such as unligated ends, to improve the amount of valid intra-chromosomal read pairs. This protocol allows for obtaining information on conformational structures such as compartment and topologically associating domains, as well as high-resolution conformational features such as DNA loops. Copyright © 2017 Elsevier Inc. All rights reserved.

  1. Privacy-Assured Aggregation Protocol for Smart Metering: A Proactive Fault-Tolerant Approach [Proactive Fault-Tolerant Aggregation Protocol for Privacy-Assured Smart Metering

    DOE PAGES

    Won, Jongho; Ma, Chris Y. T.; Yau, David K. Y.; ...

    2016-06-01

    Smart meters are integral to demand response in emerging smart grids, by reporting the electricity consumption of users to serve application needs. But reporting real-time usage information for individual households raises privacy concerns. Existing techniques to guarantee differential privacy (DP) of smart meter users either are not fault tolerant or achieve (possibly partial) fault tolerance at high communication overheads. In this paper, we propose a fault-tolerant protocol for smart metering that can handle general communication failures while ensuring DP with significantly improved efficiency and lower errors compared with the state of the art. Our protocol handles fail-stop faults proactively bymore » using a novel design of future ciphertexts, and distributes trust among the smart meters by sharing secret keys among them. We prove the DP properties of our protocol and analyze its advantages in fault tolerance, accuracy, and communication efficiency relative to competing techniques. We illustrate our analysis by simulations driven by real-world traces of electricity consumption.« less

  2. Privacy-Assured Aggregation Protocol for Smart Metering: A Proactive Fault-Tolerant Approach [Proactive Fault-Tolerant Aggregation Protocol for Privacy-Assured Smart Metering

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Won, Jongho; Ma, Chris Y. T.; Yau, David K. Y.

    Smart meters are integral to demand response in emerging smart grids, by reporting the electricity consumption of users to serve application needs. But reporting real-time usage information for individual households raises privacy concerns. Existing techniques to guarantee differential privacy (DP) of smart meter users either are not fault tolerant or achieve (possibly partial) fault tolerance at high communication overheads. In this paper, we propose a fault-tolerant protocol for smart metering that can handle general communication failures while ensuring DP with significantly improved efficiency and lower errors compared with the state of the art. Our protocol handles fail-stop faults proactively bymore » using a novel design of future ciphertexts, and distributes trust among the smart meters by sharing secret keys among them. We prove the DP properties of our protocol and analyze its advantages in fault tolerance, accuracy, and communication efficiency relative to competing techniques. We illustrate our analysis by simulations driven by real-world traces of electricity consumption.« less

  3. Zebrafish embryology and cartilage staining protocols for high school students.

    PubMed

    Emran, Farida; Brooks, Jacqueline M; Zimmerman, Steven R; Johnson, Susan L; Lue, Robert A

    2009-06-01

    The Life Sciences-Howard Hughes Medical Institute Outreach Program at Harvard University supports high school science education by offering an on-campus program for students and their teachers to participate in investigative, hands-on laboratory sessions. The outreach program has recently designed and launched a successful zebrafish embryology protocol that we present here. The main objectives of this protocol are to introduce students to zebrafish as a model research organism and to provide students with direct experience with current techniques used in embryological research. The content of the lab is designed to generate discussions on embryology, genetics, fertilization, natural selection, and animal adaptation. The protocol produces reliable results in a time-efficient manner using a minimum of reagents. The protocol presented here consists of three sections: observations of live zebrafish larvae at different developmental stages, cartilage staining of zebrafish larvae, and a mutant hunt involving identification of two zebrafish mutants (nacre and chokh). Here, we describe the protocol, show the results obtained for each section, and suggest possible alternatives for different lab settings.

  4. Performance Improvement in Geographic Routing for Vehicular Ad Hoc Networks

    PubMed Central

    Kaiwartya, Omprakash; Kumar, Sushil; Lobiyal, D. K.; Abdullah, Abdul Hanan; Hassan, Ahmed Nazar

    2014-01-01

    Geographic routing is one of the most investigated themes by researchers for reliable and efficient dissemination of information in Vehicular Ad Hoc Networks (VANETs). Recently, different Geographic Distance Routing (GEDIR) protocols have been suggested in the literature. These protocols focus on reducing the forwarding region towards destination to select the Next Hop Vehicles (NHV). Most of these protocols suffer from the problem of elevated one-hop link disconnection, high end-to-end delay and low throughput even at normal vehicle speed in high vehicle density environment. This paper proposes a Geographic Distance Routing protocol based on Segment vehicle, Link quality and Degree of connectivity (SLD-GEDIR). The protocol selects a reliable NHV using the criteria segment vehicles, one-hop link quality and degree of connectivity. The proposed protocol has been simulated in NS-2 and its performance has been compared with the state-of-the-art protocols: P-GEDIR, J-GEDIR and V-GEDIR. The empirical results clearly reveal that SLD-GEDIR has lower link disconnection and end-to-end delay, and higher throughput as compared to the state-of-the-art protocols. It should be noted that the performance of the proposed protocol is preserved irrespective of vehicle density and speed. PMID:25429415

  5. Performance improvement in geographic routing for Vehicular Ad Hoc Networks.

    PubMed

    Kaiwartya, Omprakash; Kumar, Sushil; Lobiyal, D K; Abdullah, Abdul Hanan; Hassan, Ahmed Nazar

    2014-11-25

    Geographic routing is one of the most investigated themes by researchers for reliable and efficient dissemination of information in Vehicular Ad Hoc Networks (VANETs). Recently, different Geographic Distance Routing (GEDIR) protocols have been suggested in the literature. These protocols focus on reducing the forwarding region towards destination to select the Next Hop Vehicles (NHV). Most of these protocols suffer from the problem of elevated one-hop link disconnection, high end-to-end delay and low throughput even at normal vehicle speed in high vehicle density environment. This paper proposes a Geographic Distance Routing protocol based on Segment vehicle, Link quality and Degree of connectivity (SLD-GEDIR). The protocol selects a reliable NHV using the criteria segment vehicles, one-hop link quality and degree of connectivity. The proposed protocol has been simulated in NS-2 and its performance has been compared with the state-of-the-art protocols: P-GEDIR, J-GEDIR and V-GEDIR. The empirical results clearly reveal that SLD-GEDIR has lower link disconnection and end-to-end delay, and higher throughput as compared to the state-of-the-art protocols. It should be noted that the performance of the proposed protocol is preserved irrespective of vehicle density and speed.

  6. Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis.

    PubMed

    Alanazi, Adwan; Elleithy, Khaled

    2015-09-02

    Many routing protocols have been proposed for wireless sensor networks. These routing protocols are almost always based on energy efficiency. However, recent advances in complementary metal-oxide semiconductor (CMOS) cameras and small microphones have led to the development of Wireless Multimedia Sensor Networks (WMSN) as a class of wireless sensor networks which pose additional challenges. The transmission of imaging and video data needs routing protocols with both energy efficiency and Quality of Service (QoS) characteristics in order to guarantee the efficient use of the sensor nodes and effective access to the collected data. Also, with integration of real time applications in Wireless Senor Networks (WSNs), the use of QoS routing protocols is not only becoming a significant topic, but is also gaining the attention of researchers. In designing an efficient QoS routing protocol, the reliability and guarantee of end-to-end delay are critical events while conserving energy. Thus, considerable research has been focused on designing energy efficient and robust QoS routing protocols. In this paper, we present a state of the art research work based on real-time QoS routing protocols for WMSNs that have already been proposed. This paper categorizes the real-time QoS routing protocols into probabilistic and deterministic protocols. In addition, both categories are classified into soft and hard real time protocols by highlighting the QoS issues including the limitations and features of each protocol. Furthermore, we have compared the performance of mobility-aware query based real-time QoS routing protocols from each category using Network Simulator-2 (NS2). This paper also focuses on the design challenges and future research directions as well as highlights the characteristics of each QoS routing protocol.

  7. Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis

    PubMed Central

    Alanazi, Adwan; Elleithy, Khaled

    2015-01-01

    Many routing protocols have been proposed for wireless sensor networks. These routing protocols are almost always based on energy efficiency. However, recent advances in complementary metal-oxide semiconductor (CMOS) cameras and small microphones have led to the development of Wireless Multimedia Sensor Networks (WMSN) as a class of wireless sensor networks which pose additional challenges. The transmission of imaging and video data needs routing protocols with both energy efficiency and Quality of Service (QoS) characteristics in order to guarantee the efficient use of the sensor nodes and effective access to the collected data. Also, with integration of real time applications in Wireless Senor Networks (WSNs), the use of QoS routing protocols is not only becoming a significant topic, but is also gaining the attention of researchers. In designing an efficient QoS routing protocol, the reliability and guarantee of end-to-end delay are critical events while conserving energy. Thus, considerable research has been focused on designing energy efficient and robust QoS routing protocols. In this paper, we present a state of the art research work based on real-time QoS routing protocols for WMSNs that have already been proposed. This paper categorizes the real-time QoS routing protocols into probabilistic and deterministic protocols. In addition, both categories are classified into soft and hard real time protocols by highlighting the QoS issues including the limitations and features of each protocol. Furthermore, we have compared the performance of mobility-aware query based real-time QoS routing protocols from each category using Network Simulator-2 (NS2). This paper also focuses on the design challenges and future research directions as well as highlights the characteristics of each QoS routing protocol. PMID:26364639

  8. Efficiency and security problems of anonymous key agreement protocol based on chaotic maps

    NASA Astrophysics Data System (ADS)

    Yoon, Eun-Jun

    2012-07-01

    In 2011, Niu-Wang proposed an anonymous key agreement protocol based on chaotic maps in [Niu Y, Wang X. An anonymous key agreement protocol based on chaotic maps. Commun Nonlinear Sci Simulat 2011;16(4):1986-92]. Niu-Wang's protocol not only achieves session key agreement between a server and a user, but also allows the user to anonymously interact with the server. Nevertheless, this paper points out that Niu-Wang's protocol has the following efficiency and security problems: (1) The protocol has computational efficiency problem when a trusted third party decrypts the user sending message. (2) The protocol is vulnerable to Denial of Service (DoS) attack based on illegal message modification by an attacker.

  9. A Secure and Efficient Handover Authentication Protocol for Wireless Networks

    PubMed Central

    Wang, Weijia; Hu, Lei

    2014-01-01

    Handover authentication protocol is a promising access control technology in the fields of WLANs and mobile wireless sensor networks. In this paper, we firstly review an efficient handover authentication protocol, named PairHand, and its existing security attacks and improvements. Then, we present an improved key recovery attack by using the linearly combining method and reanalyze its feasibility on the improved PairHand protocol. Finally, we present a new handover authentication protocol, which not only achieves the same desirable efficiency features of PairHand, but enjoys the provable security in the random oracle model. PMID:24971471

  10. Near Theoretical Gigabit Link Efficiency for Distributed Data Acquisition Systems

    PubMed Central

    Abu-Nimeh, Faisal T.; Choong, Woon-Seng

    2017-01-01

    Link efficiency, data integrity, and continuity for high-throughput and real-time systems is crucial. Most of these applications require specialized hardware and operating systems as well as extensive tuning in order to achieve high efficiency. Here, we present an implementation of gigabit Ethernet data streaming which can achieve 99.26% link efficiency while maintaining no packet losses. The design and implementation are built on OpenPET, an opensource data acquisition platform for nuclear medical imaging, where (a) a crate hosting multiple OpenPET detector boards uses a User Datagram Protocol over Internet Protocol (UDP/IP) Ethernet soft-core, that is capable of understanding PAUSE frames, to stream data out to a computer workstation; (b) the receiving computer uses Netmap to allow the processing software (i.e., user space), which is written in Python, to directly receive and manage the network card’s ring buffers, bypassing the operating system kernel’s networking stack; and (c) a multi-threaded application using synchronized queues is implemented in the processing software (Python) to free up the ring buffers as quickly as possible while preserving data integrity and flow continuity. PMID:28630948

  11. Near Theoretical Gigabit Link Efficiency for Distributed Data Acquisition Systems.

    PubMed

    Abu-Nimeh, Faisal T; Choong, Woon-Seng

    2017-03-01

    Link efficiency, data integrity, and continuity for high-throughput and real-time systems is crucial. Most of these applications require specialized hardware and operating systems as well as extensive tuning in order to achieve high efficiency. Here, we present an implementation of gigabit Ethernet data streaming which can achieve 99.26% link efficiency while maintaining no packet losses. The design and implementation are built on OpenPET, an opensource data acquisition platform for nuclear medical imaging, where (a) a crate hosting multiple OpenPET detector boards uses a User Datagram Protocol over Internet Protocol (UDP/IP) Ethernet soft-core, that is capable of understanding PAUSE frames, to stream data out to a computer workstation; (b) the receiving computer uses Netmap to allow the processing software (i.e., user space), which is written in Python, to directly receive and manage the network card's ring buffers, bypassing the operating system kernel's networking stack; and (c) a multi-threaded application using synchronized queues is implemented in the processing software (Python) to free up the ring buffers as quickly as possible while preserving data integrity and flow continuity.

  12. A Survey on an Energy-Efficient and Energy-Balanced Routing Protocol for Wireless Sensor Networks.

    PubMed

    Ogundile, Olayinka O; Alfa, Attahiru S

    2017-05-10

    Wireless sensor networks (WSNs) form an important part of industrial application. There has been growing interest in the potential use of WSNs in applications such as environment monitoring, disaster management, health care monitoring, intelligence surveillance and defence reconnaissance. In these applications, the sensor nodes (SNs) are envisaged to be deployed in sizeable numbers in an outlying area, and it is quite difficult to replace these SNs after complete deployment in many scenarios. Therefore, as SNs are predominantly battery powered devices, the energy consumption of the nodes must be properly managed in order to prolong the network lifetime and functionality to a rational time. Different energy-efficient and energy-balanced routing protocols have been proposed in literature over the years. The energy-efficient routing protocols strive to increase the network lifetime by minimizing the energy consumption in each SN. On the other hand, the energy-balanced routing protocols protract the network lifetime by uniformly balancing the energy consumption among the nodes in the network. There have been various survey papers put forward by researchers to review the performance and classify the different energy-efficient routing protocols for WSNs. However, there seems to be no clear survey emphasizing the importance, concepts, and principles of load-balanced energy routing protocols for WSNs. In this paper, we provide a clear picture of both the energy-efficient and energy-balanced routing protocols for WSNs. More importantly, this paper presents an extensive survey of the different state-of-the-art energy-efficient and energy-balanced routing protocols. A taxonomy is introduced in this paper to classify the surveyed energy-efficient and energy-balanced routing protocols based on their proposed mode of communication towards the base station (BS). In addition, we classified these routing protocols based on the solution types or algorithms, and the input decision variables defined in the routing algorithm. The strengths and weaknesses of the choice of the decision variables used in the design of these energy-efficient and energy-balanced routing protocols are emphasised. Finally, we suggest possible research directions in order to optimize the energy consumption in sensor networks.

  13. A Survey on an Energy-Efficient and Energy-Balanced Routing Protocol for Wireless Sensor Networks

    PubMed Central

    Ogundile, Olayinka O.; Alfa, Attahiru S.

    2017-01-01

    Wireless sensor networks (WSNs) form an important part of industrial application. There has been growing interest in the potential use of WSNs in applications such as environment monitoring, disaster management, health care monitoring, intelligence surveillance and defence reconnaissance. In these applications, the sensor nodes (SNs) are envisaged to be deployed in sizeable numbers in an outlying area, and it is quite difficult to replace these SNs after complete deployment in many scenarios. Therefore, as SNs are predominantly battery powered devices, the energy consumption of the nodes must be properly managed in order to prolong the network lifetime and functionality to a rational time. Different energy-efficient and energy-balanced routing protocols have been proposed in literature over the years. The energy-efficient routing protocols strive to increase the network lifetime by minimizing the energy consumption in each SN. On the other hand, the energy-balanced routing protocols protract the network lifetime by uniformly balancing the energy consumption among the nodes in the network. There have been various survey papers put forward by researchers to review the performance and classify the different energy-efficient routing protocols for WSNs. However, there seems to be no clear survey emphasizing the importance, concepts, and principles of load-balanced energy routing protocols for WSNs. In this paper, we provide a clear picture of both the energy-efficient and energy-balanced routing protocols for WSNs. More importantly, this paper presents an extensive survey of the different state-of-the-art energy-efficient and energy-balanced routing protocols. A taxonomy is introduced in this paper to classify the surveyed energy-efficient and energy-balanced routing protocols based on their proposed mode of communication towards the base station (BS). In addition, we classified these routing protocols based on the solution types or algorithms, and the input decision variables defined in the routing algorithm. The strengths and weaknesses of the choice of the decision variables used in the design of these energy-efficient and energy-balanced routing protocols are emphasised. Finally, we suggest possible research directions in order to optimize the energy consumption in sensor networks. PMID:28489054

  14. Practical State Machine Replication with Confidentiality

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Duan, Sisi; Zhang, Haibin

    2016-01-01

    We study how to enable arbitrary randomized algorithms in Byzantine fault-tolerant (BFT) settings. We formalize a randomized BFT protocol and provide a simple and efficient construction that can be built on any existing BFT protocols while adding practically no overhead. We go one step further to revisit a confidential BFT protocol (Yin et al., SOSP '03). We show that their scheme is potentially susceptible to safety and confidentiality attacks. We then present a new protocol that is secure in the stronger model we formalize, by extending the idea of a randomized BFT protocol. Our protocol uses only efficient symmetric cryptography,more » while Yin et al.'s uses costly threshold signatures. We implemented and evaluated our protocols on microbenchmarks and real-world use cases. We show that our randomized BFT protocol is as efficient as conventional BFT protocols, and our confidential BFT protocol is two to three orders of magnitude faster than Yin et al.'s, which is less secure than ours.« less

  15. Total synthesis of mycobacterial arabinogalactan containing 92 monosaccharide units

    NASA Astrophysics Data System (ADS)

    Wu, Yong; Xiong, De-Cai; Chen, Si-Cong; Wang, Yong-Shi; Ye, Xin-Shan

    2017-03-01

    Carbohydrates are diverse bio-macromolecules with highly complex structures that are involved in numerous biological processes. Well-defined carbohydrates obtained by chemical synthesis are essential to the understanding of their functions. However, synthesis of carbohydrates is greatly hampered by its insufficient efficiency. So far, assembly of long carbohydrate chains remains one of the most challenging tasks for synthetic chemists. Here we describe a highly efficient assembly of a 92-mer polysaccharide by the preactivation-based one-pot glycosylation protocol. Several linear and branched oligosaccharide/polysaccharide fragments ranging from 5-mer to 31-mer in length have been rapidly constructed in one-pot manner, which enables the first total synthesis of a biologically important mycobacterial arabinogalactan through a highly convergent [31+31+30] coupling reaction. Our results show that the preactivation-based one-pot glycosylation protocol may provide access to the construction of long and complicated carbohydrate chains.

  16. A two-hop based adaptive routing protocol for real-time wireless sensor networks.

    PubMed

    Rachamalla, Sandhya; Kancherla, Anitha Sheela

    2016-01-01

    One of the most important and challenging issues in wireless sensor networks (WSNs) is to optimally manage the limited energy of nodes without degrading the routing efficiency. In this paper, we propose an energy-efficient adaptive routing mechanism for WSNs, which saves energy of nodes by removing the much delayed packets without degrading the real-time performance of the used routing protocol. It uses the adaptive transmission power algorithm which is based on the attenuation of the wireless link to improve the energy efficiency. The proposed routing mechanism can be associated with any geographic routing protocol and its performance is evaluated by integrating with the well known two-hop based real-time routing protocol, PATH and the resulting protocol is energy-efficient adaptive routing protocol (EE-ARP). The EE-ARP performs well in terms of energy consumption, deadline miss ratio, packet drop and end-to-end delay.

  17. Optimization and evaluation of single-cell whole-genome multiple displacement amplification.

    PubMed

    Spits, C; Le Caignec, C; De Rycke, M; Van Haute, L; Van Steirteghem, A; Liebaers, I; Sermon, K

    2006-05-01

    The scarcity of genomic DNA can be a limiting factor in some fields of genetic research. One of the methods developed to overcome this difficulty is whole genome amplification (WGA). Recently, multiple displacement amplification (MDA) has proved very efficient in the WGA of small DNA samples and pools of cells, the reaction being catalyzed by the phi29 or the Bst DNA polymerases. The aim of the present study was to develop a reliable, efficient, and fast protocol for MDA at the single-cell level. We first compared the efficiency of phi29 and Bst polymerases on DNA samples and single cells. The phi29 polymerase generated accurately, in a short time and from a single cell, sufficient DNA for a large set of tests, whereas the Bst enzyme showed a low efficiency and a high error rate. A single-cell protocol was optimized using the phi29 polymerase and was evaluated on 60 single cells; the DNA obtained DNA was assessed by 22 locus-specific PCRs. This new protocol can be useful for many applications involving minute quantities of starting material, such as forensic DNA analysis, prenatal and preimplantation genetic diagnosis, or cancer research. (c) 2006 Wiley-Liss, Inc.

  18. Eco-friendly microwave-assisted protocol to prepare hyaluronan-fatty acid conjugates and to induce their self-assembly process.

    PubMed

    Calce, Enrica; Mercurio, Flavia Anna; Leone, Marilisa; Saviano, Michele; De Luca, Stefania

    2016-06-05

    An environmentally sustainable and energy-efficient synthetic process has been developed to prepare hyaluronan-based nano-sized material. It consists in a microwave-promoted acylation of the hydroxyl function of the polysaccharide with natural fatty acids, performed under solvent-free conditions. The efficient interaction of the solid reagents with the MW radiation accounts for the obtained high yielded products. The self-assembly process of the obtained compounds very fast occurred in an aqueous medium under MW-radiation, thus allowing the development of a green protocol for the nano-particles preparation. Copyright © 2016 Elsevier Ltd. All rights reserved.

  19. Unconditional security of time-energy entanglement quantum key distribution using dual-basis interferometry.

    PubMed

    Zhang, Zheshen; Mower, Jacob; Englund, Dirk; Wong, Franco N C; Shapiro, Jeffrey H

    2014-03-28

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous parametric down-conversion and show that it is secure against collective attacks. Its security rests upon visibility data-obtained from Franson and conjugate-Franson interferometers-that probe photon-pair frequency correlations and arrival-time correlations. From these measurements, an upper bound can be established on the eavesdropper's Holevo information by translating the Gaussian-state security analysis for continuous-variable quantum key distribution so that it applies to our protocol. We show that visibility data from just the Franson interferometer provides a weaker, but nonetheless useful, secure-key rate lower bound. To handle multiple-pair emissions, we incorporate the decoy-state approach into our protocol. Our results show that over a 200-km transmission distance in optical fiber, time-energy entanglement HDQKD could permit a 700-bit/sec secure-key rate and a photon information efficiency of 2 secure-key bits per photon coincidence in the key-generation phase using receivers with a 15% system efficiency.

  20. TreeMAC: Localized TDMA MAC protocol for real-time high-data-rate sensor networks

    USGS Publications Warehouse

    Song, W.-Z.; Huang, R.; Shirazi, B.; Husent, R.L.

    2009-01-01

    Earlier sensor network MAC protocols focus on energy conservation in low-duty cycle applications, while some recent applications involve real-time high-data-rate signals. This motivates us to design an innovative localized TDMA MAC protocol to achieve high throughput and low congestion in data collection sensor networks, besides energy conservation. TreeMAC divides a time cycle into frames and frame into slots. Parent determines children's frame assigmnent based on their relative bandwidth demand, and each node calculates its own slot assignment based on its hop-count to the sink. This innovative 2-dimensional frame-slot assignment algorithm has the following nice theory properties. Firstly, given any node, at any time slot, there is at most one active sender in its neighborhood (includ ing itself). Secondly, the packet scheduling with TreelMAC is bufferless, which therefore minimizes the probability of network congestion. Thirdly, the data throughput to gateway is at least 1/3 of the optimum assuming reliable links. Our experiments on a 24 node test bed demonstrate that TreeMAC protocol significantly improves network throughput and energy efficiency, by comparing to the TinyOS's default CSMA MAC protocol and a recent TDMA MAC protocol Funneling-MAC[8]. ?? 2009 IEEE.

  1. Electro-Optic Quantum Memory for Light Using Two-Level Atoms

    NASA Astrophysics Data System (ADS)

    Hétet, G.; Longdell, J. J.; Alexander, A. L.; Lam, P. K.; Sellars, M. J.

    2008-01-01

    We present a simple quantum memory scheme that allows for the storage of a light field in an ensemble of two-level atoms. The technique is analogous to the NMR gradient echo for which the imprinting and recalling of the input field are performed by controlling a linearly varying broadening. Our protocol is perfectly efficient in the limit of high optical depths and the output pulse is emitted in the forward direction. We provide a numerical analysis of the protocol together with an experiment performed in a solid state system. In close agreement with our model, the experiment shows a total efficiency of up to 15%, and a recall efficiency of 26%. We suggest simple realizable improvements for the experiment to surpass the no-cloning limit.

  2. Electro-optic quantum memory for light using two-level atoms.

    PubMed

    Hétet, G; Longdell, J J; Alexander, A L; Lam, P K; Sellars, M J

    2008-01-18

    We present a simple quantum memory scheme that allows for the storage of a light field in an ensemble of two-level atoms. The technique is analogous to the NMR gradient echo for which the imprinting and recalling of the input field are performed by controlling a linearly varying broadening. Our protocol is perfectly efficient in the limit of high optical depths and the output pulse is emitted in the forward direction. We provide a numerical analysis of the protocol together with an experiment performed in a solid state system. In close agreement with our model, the experiment shows a total efficiency of up to 15%, and a recall efficiency of 26%. We suggest simple realizable improvements for the experiment to surpass the no-cloning limit.

  3. Highly chemoselective intermolecular cross-benzoin reactions using an ad hoc designed novel N-heterocyclic carbene catalyst.

    PubMed

    Delany, Eoghan G; Connon, Stephen J

    2018-01-31

    The design of a novel N-heterocyclic carbene catalyst incorporating a bulky yet highly electron-deficient N-aryl substituent has allowed the development of an efficient protocol for the first highly chemoselective intermolecular benzoin condensations between two non-identical aromatic aldehydes.

  4. Synthesis of High-Load, Hybrid Silica-Immobilized Heterocyclic Benzyl Phosphate (Si–OHBP) and Triazolyl Phosphate (Si–OHTP) Alkylating Reagents

    PubMed Central

    2016-01-01

    The development of new ROMP-derived silica-immobilized heterocyclic phosphate reagents and their application in purification-free protocols is reported. Grafting of norbornenyl norbornenyl-functionalized (Nb-tagged) silica particles with functionalized Nb-tagged heterocyclic phosphate monomers efficiently yield high-load, hybrid silica-immobilized oligomeric heterobenzyl phosphates (Si–OHBP) and heterotriazolyl phosphates (Si–OHTP) as efficient alkylation agents. Applications of these reagents for the diversification of N-, O-, and S-nucleophilic species, for efficient heterobenzylation and hetero(triazolyl)methylation have been validated. PMID:27300761

  5. Wide-area technologies and services in the Trans-Pacific High Data Rate (HDR) satellite communications experiments

    NASA Technical Reports Server (NTRS)

    Hsu, E.; Hung, C.; Kadowaki, N.; Yoshimura, N.; Takahashi, T.; Shopbell, P.; Walker, G.; Wellnitz, D.; Gary, P.; Clark, G.; hide

    2000-01-01

    This paper describes the technologies and services used in the experiments and demonstrations using the Trans-Pacific high data rate satellite communications infrastructure, and how the environment tasked protocol adaptability, scalability, efficiency, interoperability, and robustness.

  6. Fused Silica Ion Trap Chip with Efficient Optical Collection System for Timekeeping, Sensing, and Emulation

    DTIC Science & Technology

    2015-01-22

    applications in fast single photon sources, quantum repeater circuitry, and high fidelity remote entanglement of atoms for quantum information protocols. We...fluorescence for motion/force sensors through Doppler velocimetry; and for the efficient collection of single photons from trapped ions for...Doppler velocimetry; and for the efficient collection of single photons from trapped ions for applications in fast single photon sources, quantum

  7. Comparative evaluation of total RNA extraction methods in Theobroma cacao using shoot apical meristems.

    PubMed

    Silva, D V; Branco, S M J; Holanda, I S A; Royaert, S; Motamayor, J C; Marelli, J P; Corrêa, R X

    2016-03-04

    Theobroma cacao is a species of great economic importance with its beans used for chocolate production. The tree has been a target of various molecular studies. It contains many polyphenols, which complicate the extraction of nucleic acids with the extraction protocols requiring a large amount of plant material. These issues, therefore, necessitate the optimization of the protocols. The aim of the present study was to evaluate different methods for extraction of total RNA from shoot apical meristems of T. cacao 'CCN 51' and to assess the influence of storage conditions for the meristems on the extraction. The study also aimed to identify the most efficient protocol for RNA extraction using a small amount of plant material. Four different protocols were evaluated for RNA extraction using one shoot apical meristem per sample. Among these protocols, one that was more efficient was then tested to extract RNA using four different numbers of shoot apical meristems, subjected to three different storage conditions. The best protocol was tested for cDNA amplification using reverse transcription-polymerase chain reaction; the cDNA quality was determined to be satisfactory for molecular analyses. The study revealed that with the best RNA extraction protocol, one shoot apical meristem was sufficient for extraction of high-quality total RNA. The results obtained might enable advances in genetic analyses and molecular studies using reduced amount of plant material.

  8. A universal TaqMan-based RT-PCR protocol for cost-efficient detection of small noncoding RNA.

    PubMed

    Jung, Ulrike; Jiang, Xiaoou; Kaufmann, Stefan H E; Patzel, Volker

    2013-12-01

    Several methods for the detection of RNA have been developed over time. For small RNA detection, a stem-loop reverse primer-based protocol relying on TaqMan RT-PCR has been described. This protocol requires an individual specific TaqMan probe for each target RNA and, hence, is highly cost-intensive for experiments with small sample sizes or large numbers of different samples. We describe a universal TaqMan-based probe protocol which can be used to detect any target sequence and demonstrate its applicability for the detection of endogenous as well as artificial eukaryotic and bacterial small RNAs. While the specific and the universal probe-based protocol showed the same sensitivity, the absolute sensitivity of detection was found to be more than 100-fold lower for both than previously reported. In subsequent experiments, we found previously unknown limitations intrinsic to the method affecting its feasibility in determination of mature template RISC incorporation as well as in multiplexing. Both protocols were equally specific in discriminating between correct and incorrect small RNA targets or between mature miRNA and its unprocessed RNA precursor, indicating the stem-loop RT-primer, but not the TaqMan probe, triggers target specificity. The presented universal TaqMan-based RT-PCR protocol represents a cost-efficient method for the detection of small RNAs.

  9. A secure cluster-based multipath routing protocol for WMSNs.

    PubMed

    Almalkawi, Islam T; Zapata, Manel Guerrero; Al-Karaki, Jamal N

    2011-01-01

    The new characteristics of Wireless Multimedia Sensor Network (WMSN) and its design issues brought by handling different traffic classes of multimedia content (video streams, audio, and still images) as well as scalar data over the network, make the proposed routing protocols for typical WSNs not directly applicable for WMSNs. Handling real-time multimedia data requires both energy efficiency and QoS assurance in order to ensure efficient utility of different capabilities of sensor resources and correct delivery of collected information. In this paper, we propose a Secure Cluster-based Multipath Routing protocol for WMSNs, SCMR, to satisfy the requirements of delivering different data types and support high data rate multimedia traffic. SCMR exploits the hierarchical structure of powerful cluster heads and the optimized multiple paths to support timeliness and reliable high data rate multimedia communication with minimum energy dissipation. Also, we present a light-weight distributed security mechanism of key management in order to secure the communication between sensor nodes and protect the network against different types of attacks. Performance evaluation from simulation results demonstrates a significant performance improvement comparing with existing protocols (which do not even provide any kind of security feature) in terms of average end-to-end delay, network throughput, packet delivery ratio, and energy consumption.

  10. A Secure Cluster-Based Multipath Routing Protocol for WMSNs

    PubMed Central

    Almalkawi, Islam T.; Zapata, Manel Guerrero; Al-Karaki, Jamal N.

    2011-01-01

    The new characteristics of Wireless Multimedia Sensor Network (WMSN) and its design issues brought by handling different traffic classes of multimedia content (video streams, audio, and still images) as well as scalar data over the network, make the proposed routing protocols for typical WSNs not directly applicable for WMSNs. Handling real-time multimedia data requires both energy efficiency and QoS assurance in order to ensure efficient utility of different capabilities of sensor resources and correct delivery of collected information. In this paper, we propose a Secure Cluster-based Multipath Routing protocol for WMSNs, SCMR, to satisfy the requirements of delivering different data types and support high data rate multimedia traffic. SCMR exploits the hierarchical structure of powerful cluster heads and the optimized multiple paths to support timeliness and reliable high data rate multimedia communication with minimum energy dissipation. Also, we present a light-weight distributed security mechanism of key management in order to secure the communication between sensor nodes and protect the network against different types of attacks. Performance evaluation from simulation results demonstrates a significant performance improvement comparing with existing protocols (which do not even provide any kind of security feature) in terms of average end-to-end delay, network throughput, packet delivery ratio, and energy consumption. PMID:22163854

  11. Laissez-Faire : Fully Asymmetric Backscatter Communication

    PubMed Central

    Hu, Pan; Zhang, Pengyu; Ganesan, Deepak

    2016-01-01

    Backscatter provides dual-benefits of energy harvesting and low-power communication, making it attractive to a broad class of wireless sensors. But the design of a protocol that enables extremely power-efficient radios for harvesting-based sensors as well as high-rate data transfer for data-rich sensors presents a conundrum. In this paper, we present a new fully asymmetric backscatter communication protocol where nodes blindly transmit data as and when they sense. This model enables fully flexible node designs, from extraordinarily power-efficient backscatter radios that consume barely a few micro-watts to high-throughput radios that can stream at hundreds of Kbps while consuming a paltry tens of micro-watts. The challenge, however, lies in decoding concurrent streams at the reader, which we achieve using a novel combination of time-domain separation of interleaved signal edges, and phase-domain separation of colliding transmissions. We provide an implementation of our protocol, LF-Backscatter, and show that it can achieve an order of magnitude or more improvement in throughput, latency and power over state-of-art alternatives. PMID:28286885

  12. An Energy Balanced and Lifetime Extended Routing Protocol for Underwater Sensor Networks.

    PubMed

    Wang, Hao; Wang, Shilian; Zhang, Eryang; Lu, Luxi

    2018-05-17

    Energy limitation is an adverse problem in designing routing protocols for underwater sensor networks (UWSNs). To prolong the network lifetime with limited battery power, an energy balanced and efficient routing protocol, called energy balanced and lifetime extended routing protocol (EBLE), is proposed in this paper. The proposed EBLE not only balances traffic loads according to the residual energy, but also optimizes data transmissions by selecting low-cost paths. Two phases are operated in the EBLE data transmission process: (1) candidate forwarding set selection phase and (2) data transmission phase. In candidate forwarding set selection phase, nodes update candidate forwarding nodes by broadcasting the position and residual energy level information. The cost value of available nodes is calculated and stored in each sensor node. Then in data transmission phase, high residual energy and relatively low-cost paths are selected based on the cost function and residual energy level information. We also introduce detailed analysis of optimal energy consumption in UWSNs. Numerical simulation results on a variety of node distributions and data load distributions prove that EBLE outperforms other routing protocols (BTM, BEAR and direct transmission) in terms of network lifetime and energy efficiency.

  13. Efficient methods for enol phosphate synthesis using carbon-centred magnesium bases.

    PubMed

    Kerr, William J; Lindsay, David M; Patel, Vipulkumar K; Rajamanickam, Muralikrishnan

    2015-10-28

    Efficient conversion of ketones into kinetic enol phosphates under mild and accessible conditions has been realised using the developed methods with di-tert-butylmagnesium and bismesitylmagnesium. Optimisation of the quench protocol resulted in high yields of enol phosphates from a range of cyclohexanones and aryl methyl ketones, with tolerance of a range of additional functional units.

  14. Entanglement distillation for quantum communication network with atomic-ensemble memories.

    PubMed

    Li, Tao; Yang, Guo-Jian; Deng, Fu-Guo

    2014-10-06

    Atomic ensembles are effective memory nodes for quantum communication network due to the long coherence time and the collective enhancement effect for the nonlinear interaction between an ensemble and a photon. Here we investigate the possibility of achieving the entanglement distillation for nonlocal atomic ensembles by the input-output process of a single photon as a result of cavity quantum electrodynamics. We give an optimal entanglement concentration protocol (ECP) for two-atomic-ensemble systems in a partially entangled pure state with known parameters and an efficient ECP for the systems in an unknown partially entangled pure state with a nondestructive parity-check detector (PCD). For the systems in a mixed entangled state, we introduce an entanglement purification protocol with PCDs. These entanglement distillation protocols have high fidelity and efficiency with current experimental techniques, and they are useful for quantum communication network with atomic-ensemble memories.

  15. Cryopreservation for preservation of potato genetic resources

    PubMed Central

    Niino, Takao; Arizaga, Miriam Valle

    2015-01-01

    Cryopreservation is becoming a very important tool for the long-term storage of plant genetic resources and efficient cryopreservation protocols have been developed for a large number of plant species. Practical procedures, developed using in vitro tissue culture, can be a simple and reliable preservation option of potato genetic resources rather than maintaining by vegetative propagation in genebanks due their allogamous nature. Cryopreserved materials insure a long-term backup of field collections against loss of plant germplasm. Occurrence of genetic variation, in tissue culture cells during prolonged subcultures, can be avoided with suitable cryopreservation protocols that provide high regrowth, leading and facilitating a systematic and strategic cryo-banking of plant genetic resources. Cryopreservation protocols for potato reviewed here, can efficiently complement field and in vitro conservation, providing for preservation of genotypes difficult to preserve by other methods, wild types and other species decided as priority collections. PMID:25931979

  16. General method for rapid purification of native chromatin fragments.

    PubMed

    Kuznetsov, Vyacheslav I; Haws, Spencer A; Fox, Catherine A; Denu, John M

    2018-05-24

    Biochemical, proteomic and epigenetic studies of chromatin rely on the efficient ability to isolate native nucleosomes in high yield and purity. However, isolation of native chromatin suitable for many downstream experiments remains a challenging task. This is especially true for the budding yeast Saccharomyces cerevisiae, which continues to serve as an important model organism for the study of chromatin structure and function. Here, we developed a time- and cost-efficient universal protocol for isolation of native chromatin fragments from yeast, insect, and mammalian cells. The resulting protocol preserves histone posttranslational modification in the native chromatin state, and is applicable for both parallel multi-sample spin-column purification and large scale isolation. This protocol is based on the efficient and stable purification of polynucleosomes, features a combination of optimized cell lysis and purification conditions, three options for chromatin fragmentation, and a novel ion-exchange chromatographic purification strategy.  The procedure will aid chromatin researchers interested in isolating native chromatin material for biochemical studies, and as a mild, acid- and detergent-free sample preparation method for mass-spectrometry analysis. Published under license by The American Society for Biochemistry and Molecular Biology, Inc.

  17. Increasing on-target cleavage efficiency for CRISPR/Cas9-induced large fragment deletion in Myxococcus xanthus.

    PubMed

    Yang, Ying-Jie; Wang, Ye; Li, Zhi-Feng; Gong, Ya; Zhang, Peng; Hu, Wen-Chao; Sheng, Duo-Hong; Li, Yue-Zhong

    2017-08-16

    The CRISPR/Cas9 system is a powerful tool for genome editing, in which the sgRNA binds and guides the Cas9 protein for the sequence-specific cleavage. The protocol is employable in different organisms, but is often limited by cell damage due to the endonuclease activity of the introduced Cas9 and the potential off-target DNA cleavage from incorrect guide by the 20 nt spacer. In this study, after resolving some critical limits, we have established an efficient CRISPR/Cas9 system for the deletion of large genome fragments related to the biosynthesis of secondary metabolites in Myxococcus xanthus cells. We revealed that the high expression of a codon-optimized cas9 gene in M. xanthus was cytotoxic, and developed a temporally high expression strategy to reduce the cell damage from high expressions of Cas9. We optimized the deletion protocol by using the tRNA-sgRNA-tRNA chimeric structure to ensure correct sgRNA sequence. We found that, in addition to the position-dependent nucleotide preference, the free energy of a 20 nt spacer was a key factor for the deletion efficiency. By using the developed protocol, we achieved the CRISPR/Cas9-induced deletion of large biosynthetic gene clusters for secondary metabolites in M. xanthus DK1622 and its epothilone-producing mutant. The findings and the proposals described in this paper were suggested to be workable in other organisms, for example, other Gram negative bacteria with high GC content.

  18. Design and Evaluation of Complex Moving HIFU Treatment Protocols

    NASA Astrophysics Data System (ADS)

    Kargl, Steven G.; Andrew, Marilee A.; Kaczkowski, Peter J.; Brayman, Andrew A.; Crum, Lawrence A.

    2005-03-01

    The use of moving high-intensity focused ultrasound (HIFU) treatment protocols is of interest in achieving efficient formation of large-volume thermal lesions in tissue. Judicious protocol design is critical in order to avoid collateral damage to healthy tissues outside the treatment zone. A KZK-BHTE model, extended to simulate multiple, moving scans in tissue, is used to investigate protocol design considerations. Prediction and experimental observations are presented which 1) validate the model, 2) illustrate how to assess the effects of acoustic nonlinearity, and 3) demonstrate how to assess and control collateral damage such as prefocal lesion formation and lesion formation resulting from thermal conduction without direct HIFU exposure. Experimental data consist of linear and circular scan protocols delivered over a range of exposure regimes in ex vivo bovine liver.

  19. IEEE 802.15.4 Frame Aggregation Enhancement to Provide High Performance in Life-Critical Patient Monitoring Systems

    PubMed Central

    Akbar, Muhammad Sajjad; Yu, Hongnian; Cang, Shuang

    2017-01-01

    In wireless body area sensor networks (WBASNs), Quality of Service (QoS) provision for patient monitoring systems in terms of time-critical deadlines, high throughput and energy efficiency is a challenging task. The periodic data from these systems generates a large number of small packets in a short time period which needs an efficient channel access mechanism. The IEEE 802.15.4 standard is recommended for low power devices and widely used for many wireless sensor networks applications. It provides a hybrid channel access mechanism at the Media Access Control (MAC) layer which plays a key role in overall successful transmission in WBASNs. There are many WBASN’s MAC protocols that use this hybrid channel access mechanism in variety of sensor applications. However, these protocols are less efficient for patient monitoring systems where life critical data requires limited delay, high throughput and energy efficient communication simultaneously. To address these issues, this paper proposes a frame aggregation scheme by using the aggregated-MAC protocol data unit (A-MPDU) which works with the IEEE 802.15.4 MAC layer. To implement the scheme accurately, we develop a traffic patterns analysis mechanism to understand the requirements of the sensor nodes in patient monitoring systems, then model the channel access to find the performance gap on the basis of obtained requirements, finally propose the design based on the needs of patient monitoring systems. The mechanism is initially verified using numerical modelling and then simulation is conducted using NS2.29, Castalia 3.2 and OMNeT++. The proposed scheme provides the optimal performance considering the required QoS. PMID:28134853

  20. IEEE 802.15.4 Frame Aggregation Enhancement to Provide High Performance in Life-Critical Patient Monitoring Systems.

    PubMed

    Akbar, Muhammad Sajjad; Yu, Hongnian; Cang, Shuang

    2017-01-28

    In wireless body area sensor networks (WBASNs), Quality of Service (QoS) provision for patient monitoring systems in terms of time-critical deadlines, high throughput and energy efficiency is a challenging task. The periodic data from these systems generates a large number of small packets in a short time period which needs an efficient channel access mechanism. The IEEE 802.15.4 standard is recommended for low power devices and widely used for many wireless sensor networks applications. It provides a hybrid channel access mechanism at the Media Access Control (MAC) layer which plays a key role in overall successful transmission in WBASNs. There are many WBASN's MAC protocols that use this hybrid channel access mechanism in variety of sensor applications. However, these protocols are less efficient for patient monitoring systems where life critical data requires limited delay, high throughput and energy efficient communication simultaneously. To address these issues, this paper proposes a frame aggregation scheme by using the aggregated-MAC protocol data unit (A-MPDU) which works with the IEEE 802.15.4 MAC layer. To implement the scheme accurately, we develop a traffic patterns analysis mechanism to understand the requirements of the sensor nodes in patient monitoring systems, then model the channel access to find the performance gap on the basis of obtained requirements, finally propose the design based on the needs of patient monitoring systems. The mechanism is initially verified using numerical modelling and then simulation is conducted using NS2.29, Castalia 3.2 and OMNeT++. The proposed scheme provides the optimal performance considering the required QoS.

  1. Anti-Noise Bidirectional Quantum Steganography Protocol with Large Payload

    NASA Astrophysics Data System (ADS)

    Qu, Zhiguo; Chen, Siyi; Ji, Sai; Ma, Songya; Wang, Xiaojun

    2018-06-01

    An anti-noise bidirectional quantum steganography protocol with large payload protocol is proposed in this paper. In the new protocol, Alice and Bob enable to transmit classical information bits to each other while teleporting secret quantum states covertly. The new protocol introduces the bidirectional quantum remote state preparation into the bidirectional quantum secure communication, not only to expand secret information from classical bits to quantum state, but also extract the phase and amplitude values of secret quantum state for greatly enlarging the capacity of secret information. The new protocol can also achieve better imperceptibility, since the eavesdropper can hardly detect the hidden channel or even obtain effective secret quantum states. Comparing with the previous quantum steganography achievements, due to its unique bidirectional quantum steganography, the new protocol can obtain higher transmission efficiency and better availability. Furthermore, the new algorithm can effectively resist quantum noises through theoretical analysis. Finally, the performance analysis proves the conclusion that the new protocol not only has good imperceptibility, high security, but also large payload.

  2. Anti-Noise Bidirectional Quantum Steganography Protocol with Large Payload

    NASA Astrophysics Data System (ADS)

    Qu, Zhiguo; Chen, Siyi; Ji, Sai; Ma, Songya; Wang, Xiaojun

    2018-03-01

    An anti-noise bidirectional quantum steganography protocol with large payload protocol is proposed in this paper. In the new protocol, Alice and Bob enable to transmit classical information bits to each other while teleporting secret quantum states covertly. The new protocol introduces the bidirectional quantum remote state preparation into the bidirectional quantum secure communication, not only to expand secret information from classical bits to quantum state, but also extract the phase and amplitude values of secret quantum state for greatly enlarging the capacity of secret information. The new protocol can also achieve better imperceptibility, since the eavesdropper can hardly detect the hidden channel or even obtain effective secret quantum states. Comparing with the previous quantum steganography achievements, due to its unique bidirectional quantum steganography, the new protocol can obtain higher transmission efficiency and better availability. Furthermore, the new algorithm can effectively resist quantum noises through theoretical analysis. Finally, the performance analysis proves the conclusion that the new protocol not only has good imperceptibility, high security, but also large payload.

  3. Fast, efficient error reconciliation for quantum cryptography

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Buttler, W.T.; Lamoreaux, S.K.; Torgerson, J.R.

    2003-05-01

    We describe an error-reconciliation protocol, which we call Winnow, based on the exchange of parity and Hamming's 'syndrome' for N-bit subunits of a large dataset. The Winnow protocol was developed in the context of quantum-key distribution and offers significant advantages and net higher efficiency compared to other widely used protocols within the quantum cryptography community. A detailed mathematical analysis of the Winnow protocol is presented in the context of practical implementations of quantum-key distribution; in particular, the information overhead required for secure implementation is one of the most important criteria in the evaluation of a particular error-reconciliation protocol. The increasemore » in efficiency for the Winnow protocol is largely due to the reduction in authenticated public communication required for its implementation.« less

  4. Novel lipophilic chloroquine analogues for a highly efficient gene transfer into gynecological tumors.

    PubMed

    Keil, O; Bojar, H; Prisack, H B; Dall, P

    2001-10-08

    Liposomal vectors based on cationic lipids have been proven to be an attractive alternative to viral vectors in gene therapy protocols with regard to safety and manufacturing concerns. In order to improve the transfection efficiency we have synthesized two novel carboxycholesteryl-modified chloroquine analogues. Due to their potential endosomal buffering capacity these compounds enable the efficient transfection of various gynecological tumors and therefore are promising reagents in gene therapy applications.

  5. A native Bayesian classifier based routing protocol for VANETS

    NASA Astrophysics Data System (ADS)

    Bao, Zhenshan; Zhou, Keqin; Zhang, Wenbo; Gong, Xiaolei

    2016-12-01

    Geographic routing protocols are one of the most hot research areas in VANET (Vehicular Ad-hoc Network). However, there are few routing protocols can take both the transmission efficient and the usage of ratio into account. As we have noticed, different messages in VANET may ask different quality of service. So we raised a Native Bayesian Classifier based routing protocol (Naive Bayesian Classifier-Greedy, NBC-Greedy), which can classify and transmit different messages by its emergency degree. As a result, we can balance the transmission efficient and the usage of ratio with this protocol. Based on Matlab simulation, we can draw a conclusion that NBC-Greedy is more efficient and stable than LR-Greedy and GPSR.

  6. Doubled haploid production from Spanish onion (Allium cepa L.) germplasm: embryogenesis induction, plant regeneration and chromosome doubling.

    PubMed

    Fayos, Oreto; Vallés, María P; Garcés-Claver, Ana; Mallor, Cristina; Castillo, Ana M

    2015-01-01

    The use of doubled haploids in onion breeding is limited due to the low gynogenesis efficiency of this species. Gynogenesis capacity from Spanish germplasm, including the sweet cultivar Fuentes de Ebro, the highly pungent landrace BGHZ1354 and the two Valenciana type commercial varieties Recas and Rita, was evaluated and optimized in this study. The OH-1 population, characterized by a high gynogenesis induction, was used as control. Growing conditions of the donor plants were tested with a one-step protocol and field plants produced a slightly higher percentage of embryogenesis induction than growth chamber plants. A one-step protocol was compared with a two-step protocol for embryogenesis induction. Spanish germplasm produced a 2-3 times higher percentage of embryogenesis with the two-step protocol, Recas showing the highest percentage (2.09%) and Fuentes de Ebro the lowest (0.53%). These percentages were significantly lower than those from the OH-1 population, with an average of 15% independently of the protocol used. The effect of different containers on plant regeneration was tested using both protocols. The highest percentage of acclimated plants was obtained with the two-step protocol in combination with Eco2box (70%), whereas the lowest percentage was observed with glass tubes in the two protocols (20-23%). Different amiprofos-methyl (APM) treatments were applied to embryos for chromosome doubling. A similar number of doubled haploid plants were recovered with 25 or 50 μM APM in liquid medium. However, the application of 25 μM in solid medium for 24 h produced the highest number of doubled haploid plants. Somatic regeneration from flower buds of haploid and mixoploid plants proved to be a successful approach for chromosome doubling, since diploid plants were obtained from the four regenerated lines. In this study, doubled haploid plants were produced from the four Spanish cultivars, however further improvements are needed to increase their gynogenesis efficiency.

  7. Efficient method of protein extraction from Theobroma cacao L. roots for two-dimensional gel electrophoresis and mass spectrometry analyses.

    PubMed

    Bertolde, F Z; Almeida, A-A F; Silva, F A C; Oliveira, T M; Pirovani, C P

    2014-07-04

    Theobroma cacao is a woody and recalcitrant plant with a very high level of interfering compounds. Standard protocols for protein extraction were proposed for various types of samples, but the presence of interfering compounds in many samples prevented the isolation of proteins suitable for two-dimensional gel electrophoresis (2-DE). An efficient method to extract root proteins for 2-DE was established to overcome these problems. The main features of this protocol are: i) precipitation with trichloroacetic acid/acetone overnight to prepare the acetone dry powder (ADP), ii) several additional steps of sonication in the ADP preparation and extractions with dense sodium dodecyl sulfate and phenol, and iii) adding two stages of phenol extractions. Proteins were extracted from roots using this new protocol (Method B) and a protocol described in the literature for T. cacao leaves and meristems (Method A). Using these methods, we obtained a protein yield of about 0.7 and 2.5 mg per 1.0 g lyophilized root, and a total of 60 and 400 spots could be separated, respectively. Through Method B, it was possible to isolate high-quality protein and a high yield of roots from T. cacao for high-quality 2-DE gels. To demonstrate the quality of the extracted proteins from roots of T. cacao using Method B, several protein spots were cut from the 2-DE gels, analyzed by tandem mass spectrometry, and identified. Method B was further tested on Citrus roots, with a protein yield of about 2.7 mg per 1.0 g lyophilized root and 800 detected spots.

  8. Highly Efficient Coherent Optical Memory Based on Electromagnetically Induced Transparency

    NASA Astrophysics Data System (ADS)

    Hsiao, Ya-Fen; Tsai, Pin-Ju; Chen, Hung-Shiue; Lin, Sheng-Xiang; Hung, Chih-Chiao; Lee, Chih-Hsi; Chen, Yi-Hsin; Chen, Yong-Fan; Yu, Ite A.; Chen, Ying-Cheng

    2018-05-01

    Quantum memory is an important component in the long-distance quantum communication based on the quantum repeater protocol. To outperform the direct transmission of photons with quantum repeaters, it is crucial to develop quantum memories with high fidelity, high efficiency and a long storage time. Here, we achieve a storage efficiency of 92.0 (1.5)% for a coherent optical memory based on the electromagnetically induced transparency scheme in optically dense cold atomic media. We also obtain a useful time-bandwidth product of 1200, considering only storage where the retrieval efficiency remains above 50%. Both are the best record to date in all kinds of schemes for the realization of optical memory. Our work significantly advances the pursuit of a high-performance optical memory and should have important applications in quantum information science.

  9. Highly Efficient Coherent Optical Memory Based on Electromagnetically Induced Transparency.

    PubMed

    Hsiao, Ya-Fen; Tsai, Pin-Ju; Chen, Hung-Shiue; Lin, Sheng-Xiang; Hung, Chih-Chiao; Lee, Chih-Hsi; Chen, Yi-Hsin; Chen, Yong-Fan; Yu, Ite A; Chen, Ying-Cheng

    2018-05-04

    Quantum memory is an important component in the long-distance quantum communication based on the quantum repeater protocol. To outperform the direct transmission of photons with quantum repeaters, it is crucial to develop quantum memories with high fidelity, high efficiency and a long storage time. Here, we achieve a storage efficiency of 92.0 (1.5)% for a coherent optical memory based on the electromagnetically induced transparency scheme in optically dense cold atomic media. We also obtain a useful time-bandwidth product of 1200, considering only storage where the retrieval efficiency remains above 50%. Both are the best record to date in all kinds of schemes for the realization of optical memory. Our work significantly advances the pursuit of a high-performance optical memory and should have important applications in quantum information science.

  10. Process membership in asynchronous environments

    NASA Technical Reports Server (NTRS)

    Ricciardi, Aleta M.; Birman, Kenneth P.

    1993-01-01

    The development of reliable distributed software is simplified by the ability to assume a fail-stop failure model. The emulation of such a model in an asynchronous distributed environment is discussed. The solution proposed, called Strong-GMP, can be supported through a highly efficient protocol, and was implemented as part of a distributed systems software project at Cornell University. The precise definition of the problem, the protocol, correctness proofs, and an analysis of costs are addressed.

  11. Copper-catalyzed oxidative C-O bond formation of 2-acyl phenols and 1,3-dicarbonyl compounds with ethers: direct access to phenol esters and enol esters.

    PubMed

    Park, Jihye; Han, Sang Hoon; Sharma, Satyasheel; Han, Sangil; Shin, Youngmi; Mishra, Neeraj Kumar; Kwak, Jong Hwan; Lee, Cheong Hoon; Lee, Jeongmi; Kim, In Su

    2014-05-16

    A copper-catalyzed oxidative coupling of 2-carbonyl-substituted phenols and 1,3-dicarbonyl compounds with a wide range of dibenzyl or dialkyl ethers is described. This protocol provides an efficient preparation of phenol esters and enol esters in good yields with high chemoselectivity. This method represents an alternative protocol for classical esterification reactions.

  12. Highly efficient oxidation of amines to imines by singlet oxygen and its application in Ugi-type reactions.

    PubMed

    Jiang, Gaoxi; Chen, Jian; Huang, Jie-Sheng; Che, Chi-Ming

    2009-10-15

    A variety of secondary benzylic amines were oxidized to imines in 90% to >99% yields by singlet oxygen generated from oxygen and a porphyrin photosensitizer. On the basis of these reactions, a protocol was developed for oxidative Ugi-type reactions with singlet oxygen as the oxidant. This protocol has been used to synthesize C1- and N-functionalized benzylic amines in up to 96% yields.

  13. Adaptive Voting Algorithms for the Reliable Dissemination of Data in Fault-Prone Distributed Environments

    DTIC Science & Technology

    2008-01-01

    on Op. Sys. Principles, ACM SIGOPS, Brighton , UK , October. Pollack, S. and McQuay, W.K. (2005) ‘Joint battlespace infosphere applications using...the voting protocols for good performance while meeting the reliability requirements of data delivery in a high assurance setting. Two metric quantify...the effectiveness of voting protocols: Data Transfer Efficiency (DTE) and Time-to-Complete (TTC) data delivery . DTE captures the network bandwidth

  14. An Effective Collaborative Mobile Weighted Clustering Schemes for Energy Balancing in Wireless Sensor Networks.

    PubMed

    Tang, Chengpei; Shokla, Sanesy Kumcr; Modhawar, George; Wang, Qiang

    2016-02-19

    Collaborative strategies for mobile sensor nodes ensure the efficiency and the robustness of data processing, while limiting the required communication bandwidth. In order to solve the problem of pipeline inspection and oil leakage monitoring, a collaborative weighted mobile sensing scheme is proposed. By adopting a weighted mobile sensing scheme, the adaptive collaborative clustering protocol can realize an even distribution of energy load among the mobile sensor nodes in each round, and make the best use of battery energy. A detailed theoretical analysis and experimental results revealed that the proposed protocol is an energy efficient collaborative strategy such that the sensor nodes can communicate with a fusion center and produce high power gain.

  15. The impacts of electricity dispatch protocols on the emission reductions due to wind power and carbon tax.

    PubMed

    Yu, Yang; Rajagopal, Ram

    2015-02-17

    Two dispatch protocols have been adopted by electricity markets to deal with the uncertainty of wind power but the effects of the selection between the dispatch protocols have not been comprehensively analyzed. We establish a framework to compare the impacts of adopting different dispatch protocols on the efficacy of using wind power and implementing a carbon tax to reduce emissions. We suggest that a market has high potential to achieve greater emission reduction by adopting the stochastic dispatch protocol instead of the static protocol when the wind energy in the market is highly uncertain or the market has enough adjustable generators, such as gas-fired combustion generators. Furthermore, the carbon-tax policy is more cost-efficient for reducing CO2 emission when the market operates according to the stochastic protocol rather than the static protocol. An empirical study, which is calibrated according to the data from the Electric Reliability Council of Texas market, confirms that using wind energy in the Texas market results in a 12% CO2 emission reduction when the market uses the stochastic dispatch protocol instead of the 8% emission reduction associated with the static protocol. In addition, if a 6$/ton carbon tax is implemented in the Texas market operated according to the stochastic protocol, the CO2 emission is similar to the emission level from the same market with a 16$/ton carbon tax operated according to the static protocol. Correspondingly, the 16$/ton carbon tax associated with the static protocol costs 42.6% more than the 6$/ton carbon tax associated with the stochastic protocol.

  16. Protocol: a rapid and economical procedure for purification of plasmid or plant DNA with diverse applications in plant biology

    PubMed Central

    2010-01-01

    Research in plant molecular biology involves DNA purification on a daily basis. Although different commercial kits enable convenient extraction of high-quality DNA from E. coli cells, PCR and agarose gel samples as well as plant tissues, each kit is designed for a particular type of DNA extraction work, and the cost of purchasing these kits over a long run can be considerable. Furthermore, a simple method for the isolation of binary plasmid from Agrobacterium tumefaciens cells with satisfactory yield is lacking. Here we describe an easy protocol using homemade silicon dioxide matrix and seven simple solutions for DNA extraction from E. coli and A. tumefaciens cells, PCR and restriction digests, agarose gel slices, and plant tissues. Compared with the commercial kits, this protocol allows rapid DNA purification from diverse sources with comparable yield and purity at negligible cost. Following this protocol, we have demonstrated: (1) DNA fragments as small as a MYC-epitope tag coding sequence can be successfully recovered from an agarose gel slice; (2) Miniprep DNA from E. coli can be eluted with as little as 5 μl water, leading to high DNA concentrations (>1 μg/μl) for efficient biolistic bombardment of Arabidopsis seedlings, polyethylene glycol (PEG)-mediated Arabidopsis protoplast transfection and maize protoplast electroporation; (3) Binary plasmid DNA prepared from A. tumefaciens is suitable for verification by restriction analysis without the need for large scale propagation; (4) High-quality genomic DNA is readily isolated from several plant species including Arabidopsis, tobacco and maize. Thus, the silicon dioxide matrix-based DNA purification protocol offers an easy, efficient and economical way to extract DNA for various purposes in plant research. PMID:20180960

  17. Routing Protocols for Underwater Wireless Sensor Networks: Taxonomy, Research Challenges, Routing Strategies and Future Directions.

    PubMed

    Khan, Anwar; Ali, Ihsan; Ghani, Abdullah; Khan, Nawsher; Alsaqer, Mohammed; Rahman, Atiq Ur; Mahmood, Hasan

    2018-05-18

    Recent research in underwater wireless sensor networks (UWSNs) has gained the attention of researchers in academia and industry for a number of applications. They include disaster and earthquake prediction, water quality and environment monitoring, leakage and mine detection, military surveillance and underwater navigation. However, the aquatic medium is associated with a number of limitations and challenges: long multipath delay, high interference and noise, harsh environment, low bandwidth and limited battery life of the sensor nodes. These challenges demand research techniques and strategies to be overcome in an efficient and effective fashion. The design of routing protocols for UWSNs is one of the promising solutions to cope with these challenges. This paper presents a survey of the routing protocols for UWSNs. For the ease of description, the addressed routing protocols are classified into two groups: localization-based and localization-free protocols. These groups are further subdivided according to the problems they address or the major parameters they consider during routing. Unlike the existing surveys, this survey considers only the latest and state-of-the-art routing protocols. In addition, every protocol is described in terms of its routing strategy and the problem it addresses and solves. The merit(s) of each protocol is (are) highlighted along with the cost. A description of the protocols in this fashion has a number of advantages for researchers, as compared to the existing surveys. Firstly, the description of the routing strategy of each protocol makes its routing operation easily understandable. Secondly, the demerit(s) of a protocol provides (provide) insight into overcoming its flaw(s) in future investigation. This, in turn, leads to the foundation of new protocols that are more intelligent, robust and efficient with respect to the desired parameters. Thirdly, a protocol can be selected for the appropriate application based on its described merit(s). Finally, open challenges and research directions are presented for future investigation.

  18. Routing Protocols for Underwater Wireless Sensor Networks: Taxonomy, Research Challenges, Routing Strategies and Future Directions

    PubMed Central

    Ghani, Abdullah; Alsaqer, Mohammed; Rahman, Atiq Ur; Mahmood, Hasan

    2018-01-01

    Recent research in underwater wireless sensor networks (UWSNs) has gained the attention of researchers in academia and industry for a number of applications. They include disaster and earthquake prediction, water quality and environment monitoring, leakage and mine detection, military surveillance and underwater navigation. However, the aquatic medium is associated with a number of limitations and challenges: long multipath delay, high interference and noise, harsh environment, low bandwidth and limited battery life of the sensor nodes. These challenges demand research techniques and strategies to be overcome in an efficient and effective fashion. The design of routing protocols for UWSNs is one of the promising solutions to cope with these challenges. This paper presents a survey of the routing protocols for UWSNs. For the ease of description, the addressed routing protocols are classified into two groups: localization-based and localization-free protocols. These groups are further subdivided according to the problems they address or the major parameters they consider during routing. Unlike the existing surveys, this survey considers only the latest and state-of-the-art routing protocols. In addition, every protocol is described in terms of its routing strategy and the problem it addresses and solves. The merit(s) of each protocol is (are) highlighted along with the cost. A description of the protocols in this fashion has a number of advantages for researchers, as compared to the existing surveys. Firstly, the description of the routing strategy of each protocol makes its routing operation easily understandable. Secondly, the demerit(s) of a protocol provides (provide) insight into overcoming its flaw(s) in future investigation. This, in turn, leads to the foundation of new protocols that are more intelligent, robust and efficient with respect to the desired parameters. Thirdly, a protocol can be selected for the appropriate application based on its described merit(s). Finally, open challenges and research directions are presented for future investigation. PMID:29783686

  19. A Power-Optimized Cooperative MAC Protocol for Lifetime Extension in Wireless Sensor Networks.

    PubMed

    Liu, Kai; Wu, Shan; Huang, Bo; Liu, Feng; Xu, Zhen

    2016-10-01

    In wireless sensor networks, in order to satisfy the requirement of long working time of energy-limited nodes, we need to design an energy-efficient and lifetime-extended medium access control (MAC) protocol. In this paper, a node cooperation mechanism that one or multiple nodes with higher channel gain and sufficient residual energy help a sender relay its data packets to its recipient is employed to achieve this objective. We first propose a transmission power optimization algorithm to prolong network lifetime by optimizing the transmission powers of the sender and its cooperative nodes to maximize their minimum residual energy after their data packet transmissions. Based on it, we propose a corresponding power-optimized cooperative MAC protocol. A cooperative node contention mechanism is designed to ensure that the sender can effectively select a group of cooperative nodes with the lowest energy consumption and the best channel quality for cooperative transmissions, thus further improving the energy efficiency. Simulation results show that compared to typical MAC protocol with direct transmissions and energy-efficient cooperative MAC protocol, the proposed cooperative MAC protocol can efficiently improve the energy efficiency and extend the network lifetime.

  20. A Power-Optimized Cooperative MAC Protocol for Lifetime Extension in Wireless Sensor Networks

    PubMed Central

    Liu, Kai; Wu, Shan; Huang, Bo; Liu, Feng; Xu, Zhen

    2016-01-01

    In wireless sensor networks, in order to satisfy the requirement of long working time of energy-limited nodes, we need to design an energy-efficient and lifetime-extended medium access control (MAC) protocol. In this paper, a node cooperation mechanism that one or multiple nodes with higher channel gain and sufficient residual energy help a sender relay its data packets to its recipient is employed to achieve this objective. We first propose a transmission power optimization algorithm to prolong network lifetime by optimizing the transmission powers of the sender and its cooperative nodes to maximize their minimum residual energy after their data packet transmissions. Based on it, we propose a corresponding power-optimized cooperative MAC protocol. A cooperative node contention mechanism is designed to ensure that the sender can effectively select a group of cooperative nodes with the lowest energy consumption and the best channel quality for cooperative transmissions, thus further improving the energy efficiency. Simulation results show that compared to typical MAC protocol with direct transmissions and energy-efficient cooperative MAC protocol, the proposed cooperative MAC protocol can efficiently improve the energy efficiency and extend the network lifetime. PMID:27706079

  1. Two-party quantum key agreement protocols under collective noise channel

    NASA Astrophysics Data System (ADS)

    Gao, Hao; Chen, Xiao-Guang; Qian, Song-Rong

    2018-06-01

    Recently, quantum communication has become a very popular research field. The quantum key agreement (QKA) plays an important role in the field of quantum communication, based on its unconditional security in terms of theory. Among all kinds of QKA protocols, QKA protocols resisting collective noise are widely being studied. In this paper, we propose improved two-party QKA protocols resisting collective noise and present a feasible plan for information reconciliation. Our protocols' qubit efficiency has achieved 26.67%, which is the best among all the two-party QKA protocols against collective noise, thus showing that our protocol can improve the transmission efficiency of quantum key agreement.

  2. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy.

    PubMed

    Qiu, Shuming; Xu, Guoai; Ahmad, Haseeb; Guo, Yanhui

    2018-01-01

    The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash's scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash's protocol. We point out that Farash's protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.'s scheme. We prove that the proposed protocol not only overcomes the issues in Farash's scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure.

  3. An efficient and high-throughput protocol for Agrobacterium-mediated transformation based on phosphomannose isomerase positive selection in Japonica rice (Oryza sativa L.).

    PubMed

    Duan, Yongbo; Zhai, Chenguang; Li, Hao; Li, Juan; Mei, Wenqian; Gui, Huaping; Ni, Dahu; Song, Fengshun; Li, Li; Zhang, Wanggen; Yang, Jianbo

    2012-09-01

    A number of Agrobacterium-mediated rice transformation systems have been developed and widely used in numerous laboratories and research institutes. However, those systems generally employ antibiotics like kanamycin and hygromycin, or herbicide as selectable agents, and are used for the small-scale experiments. To address high-throughput production of transgenic rice plants via Agrobacterium-mediated transformation, and to eliminate public concern on antibiotic markers, we developed a comprehensive efficient protocol, covering from explant preparation to the acquisition of low copy events by real-time PCR analysis before transplant to field, for high-throughput production of transgenic plants of Japonica rice varieties Wanjing97 and Nipponbare using Escherichia coli phosphomannose isomerase gene (pmi) as a selectable marker. The transformation frequencies (TF) of Wanjing97 and Nipponbare were achieved as high as 54.8 and 47.5%, respectively, in one round of selection of 7.5 or 12.5 g/L mannose appended with 5 g/L sucrose. High-throughput transformation from inoculation to transplant of low copy events was accomplished within 55-60 days. Moreover, the Taqman assay data from a large number of transformants showed 45.2% in Wanjing97 and 31.5% in Nipponbare as a low copy rate, and the transformants are fertile and follow the Mendelian segregation ratio. This protocol facilitates us to perform genome-wide functional annotation of the open reading frames and utilization of the agronomically important genes in rice under a reduced public concern on selectable markers. We describe a comprehensive protocol for large scale production of transgenic Japonica rice plants using non-antibiotic selectable agent, at simplified, cost- and labor-saving manners.

  4. Facile Construction of Random Gene Mutagenesis Library for Directed Evolution Without the Use of Restriction Enzyme in Escherichia coli.

    PubMed

    Kim, Jae-Eung; Huang, Rui; Chen, Hui; You, Chun; Zhang, Y-H Percival

    2016-09-01

    A foolproof protocol was developed for the construction of mutant DNA library for directed protein evolution. First, a library of linear mutant gene was generated by error-prone PCR or molecular shuffling, and a linear vector backbone was prepared by high-fidelity PCR. Second, the amplified insert and vector fragments were assembled by overlap-extension PCR with a pair of 5'-phosphorylated primers. Third, full-length linear plasmids with phosphorylated 5'-ends were self-ligated with T4 ligase, yielding circular plasmids encoding mutant variants suitable for high-efficiency transformation. Self-made competent Escherichia coli BL21(DE3) showed a transformation efficiency of 2.4 × 10(5) cfu/µg of the self-ligated circular plasmid. Using this method, three mutants of mCherry fluorescent protein were found to alter their colors and fluorescent intensities under visible and UV lights, respectively. Also, one mutant of 6-phosphorogluconate dehydrogenase from a thermophilic bacterium Moorella thermoacetica was found to show the 3.5-fold improved catalytic efficiency (kcat /Km ) on NAD(+) as compared to the wild-type. This protocol is DNA-sequence independent, and does not require restriction enzymes, special E. coli host, or labor-intensive optimization. In addition, this protocol can be used for subcloning the relatively long DNA sequences into any position of plasmids. Copyright © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  5. Power Conservation through Energy Efficient Routing in Wireless Sensor Networks.

    PubMed

    Kandris, Dionisis; Tsioumas, Panagiotis; Tzes, Anthony; Nikolakopoulos, George; Vergados, Dimitrios D

    2009-01-01

    The power awareness issue is the primary concern within the domain of Wireless Sensor Networks (WSNs). Most power dissipation ocurrs during communication, thus routing protocols in WSNs mainly aim at power conservation. Moreover, a routing protocol should be scalable, so that its effectiveness does not degrade as the network size increases. In response to these issues, this work describes the development of an efficient routing protocol, named SHPER (Scaling Hierarchical Power Efficient Routing).

  6. A new communication protocol family for a distributed spacecraft control system

    NASA Technical Reports Server (NTRS)

    Baldi, Andrea; Pace, Marco

    1994-01-01

    In this paper we describe the concepts behind and architecture of a communication protocol family, which was designed to fulfill the communication requirements of ESOC's new distributed spacecraft control system SCOS 2. A distributed spacecraft control system needs a data delivery subsystem to be used for telemetry (TLM) distribution, telecommand (TLC) dispatch and inter-application communication, characterized by the following properties: reliability, so that any operational workstation is guaranteed to receive the data it needs to accomplish its role; efficiency, so that the telemetry distribution, even for missions with high telemetry rates, does not cause a degradation of the overall control system performance; scalability, so that the network is not the bottleneck both in terms of bandwidth and reconfiguration; flexibility, so that it can be efficiently used in many different situations. The new protocol family which satisfies the above requirements is built on top of widely used communication protocols (UDP and TCP), provides reliable point-to-point and broadcast communication (UDP+) and is implemented in C++. Reliability is achieved using a retransmission mechanism based on a sequence numbering scheme. Such a scheme allows to have cost-effective performances compared to the traditional protocols, because retransmission is only triggered by applications which explicitly need reliability. This flexibility enables applications with different profiles to take advantage of the available protocols, so that the best rate between sped and reliability can be achieved case by case.

  7. Robust Distant Entanglement Generation Using Coherent Multiphoton Scattering

    NASA Astrophysics Data System (ADS)

    Chan, Ching-Kit; Sham, L. J.

    2013-02-01

    We describe a protocol to entangle two qubits at a distance by using resonance fluorescence. The scheme makes use of the postselection of large and distinguishable fluorescence signals corresponding to entangled and unentangled qubit states and has the merits of both high success probability and high entanglement fidelity owing to the multiphoton nature. Our result shows that the entanglement generation is robust against photon fluctuations in the fluorescence signals for a wide range of driving fields. We also demonstrate that this new protocol has an average entanglement duration within the decoherence time of corresponding qubit systems, based on current experimental photon efficiency.

  8. Robust distant entanglement generation using coherent multiphoton scattering.

    PubMed

    Chan, Ching-Kit; Sham, L J

    2013-02-15

    We describe a protocol to entangle two qubits at a distance by using resonance fluorescence. The scheme makes use of the postselection of large and distinguishable fluorescence signals corresponding to entangled and unentangled qubit states and has the merits of both high success probability and high entanglement fidelity owing to the multiphoton nature. Our result shows that the entanglement generation is robust against photon fluctuations in the fluorescence signals for a wide range of driving fields. We also demonstrate that this new protocol has an average entanglement duration within the decoherence time of corresponding qubit systems, based on current experimental photon efficiency.

  9. High-throughput real-time quantitative reverse transcription PCR.

    PubMed

    Bookout, Angie L; Cummins, Carolyn L; Mangelsdorf, David J; Pesola, Jean M; Kramer, Martha F

    2006-02-01

    Extensive detail on the application of the real-time quantitative polymerase chain reaction (QPCR) for the analysis of gene expression is provided in this unit. The protocols are designed for high-throughput, 384-well-format instruments, such as the Applied Biosystems 7900HT, but may be modified to suit any real-time PCR instrument. QPCR primer and probe design and validation are discussed, and three relative quantitation methods are described: the standard curve method, the efficiency-corrected DeltaCt method, and the comparative cycle time, or DeltaDeltaCt method. In addition, a method is provided for absolute quantification of RNA in unknown samples. RNA standards are subjected to RT-PCR in the same manner as the experimental samples, thus accounting for the reaction efficiencies of both procedures. This protocol describes the production and quantitation of synthetic RNA molecules for real-time and non-real-time RT-PCR applications.

  10. All-in-One CRISPR-Cas9/FokI-dCas9 Vector-Mediated Multiplex Genome Engineering in Cultured Cells.

    PubMed

    Sakuma, Tetsushi; Sakamoto, Takuya; Yamamoto, Takashi

    2017-01-01

    CRISPR-Cas9 enables highly convenient multiplex genome engineering in cultured cells, because it utilizes generic Cas9 nuclease and an easily customizable single-guide RNA (sgRNA) for site-specific DNA double-strand break induction. We previously established a multiplex CRISPR-Cas9 assembly system for constructing an all-in-one vector simultaneously expressing multiple sgRNAs and Cas9 nuclease or other Cas9 variants including FokI-dCas9, which supersedes the wild-type Cas9 with regard to high specificity. In this chapter, we describe a streamlined protocol to design and construct multiplex CRISPR-Cas9 or FokI-dCas9 vectors, to introduce them into cultured cells by lipofection or electroporation, to enrich the genomically edited cells with a transient puromycin selection, to validate the mutation efficiency by Surveyor nuclease assay, and to perform off-target analyses. We show that our protocol enables highly efficient multiplex genome engineering even in hard-to-transfect HepG2 cells.

  11. MR efficiency using automated MRI-desktop eProtocol

    NASA Astrophysics Data System (ADS)

    Gao, Fei; Xu, Yanzhe; Panda, Anshuman; Zhang, Min; Hanson, James; Su, Congzhe; Wu, Teresa; Pavlicek, William; James, Judy R.

    2017-03-01

    MRI protocols are instruction sheets that radiology technologists use in routine clinical practice for guidance (e.g., slice position, acquisition parameters etc.). In Mayo Clinic Arizona (MCA), there are over 900 MR protocols (ranging across neuro, body, cardiac, breast etc.) which makes maintaining and updating the protocol instructions a labor intensive effort. The task is even more challenging given different vendors (Siemens, GE etc.). This is a universal problem faced by all the hospitals and/or medical research institutions. To increase the efficiency of the MR practice, we designed and implemented a web-based platform (eProtocol) to automate the management of MRI protocols. It is built upon a database that automatically extracts protocol information from DICOM compliant images and provides a user-friendly interface to the technologists to create, edit and update the protocols. Advanced operations such as protocol migrations from scanner to scanner and capability to upload Multimedia content were also implemented. To the best of our knowledge, eProtocol is the first MR protocol automated management tool used clinically. It is expected that this platform will significantly improve the radiology operations efficiency including better image quality and exam consistency, fewer repeat examinations and less acquisition errors. These protocols instructions will be readily available to the technologists during scans. In addition, this web-based platform can be extended to other imaging modalities such as CT, Mammography, and Interventional Radiology and different vendors for imaging protocol management.

  12. Efficient, footprint-free human iPSC genome editing by consolidation of Cas9/CRISPR and piggyBac technologies.

    PubMed

    Wang, Gang; Yang, Luhan; Grishin, Dennis; Rios, Xavier; Ye, Lillian Y; Hu, Yong; Li, Kai; Zhang, Donghui; Church, George M; Pu, William T

    2017-01-01

    Genome editing of human induced pluripotent stem cells (hiPSCs) offers unprecedented opportunities for in vitro disease modeling and personalized cell replacement therapy. The introduction of Cas9-directed genome editing has expanded adoption of this approach. However, marker-free genome editing using standard protocols remains inefficient, yielding desired targeted alleles at a rate of ∼1-5%. We developed a protocol based on a doxycycline-inducible Cas9 transgene carried on a piggyBac transposon to enable robust and highly efficient Cas9-directed genome editing, so that a parental line can be expeditiously engineered to harbor many separate mutations. Treatment with doxycycline and transfection with guide RNA (gRNA), donor DNA and piggyBac transposase resulted in efficient, targeted genome editing and concurrent scarless transgene excision. Using this approach, in 7 weeks it is possible to efficiently obtain genome-edited clones with minimal off-target mutagenesis and with indel mutation frequencies of 40-50% and homology-directed repair (HDR) frequencies of 10-20%.

  13. Efficient isolation method for high-quality genomic DNA from cicada exuviae.

    PubMed

    Nguyen, Hoa Quynh; Kim, Ye Inn; Borzée, Amaël; Jang, Yikweon

    2017-10-01

    In recent years, animal ethics issues have led researchers to explore nondestructive methods to access materials for genetic studies. Cicada exuviae are among those materials because they are cast skins that individuals left after molt and are easily collected. In this study, we aim to identify the most efficient extraction method to obtain high quantity and quality of DNA from cicada exuviae. We compared relative DNA yield and purity of six extraction protocols, including both manual protocols and available commercial kits, extracting from four different exoskeleton parts. Furthermore, amplification and sequencing of genomic DNA were evaluated in terms of availability of sequencing sequence at the expected genomic size. Both the choice of protocol and exuvia part significantly affected DNA yield and purity. Only samples that were extracted using the PowerSoil DNA Isolation kit generated gel bands of expected size as well as successful sequencing results. The failed attempts to extract DNA using other protocols could be partially explained by a low DNA yield from cicada exuviae and partly by contamination with humic acids that exist in the soil where cicada nymphs reside before emergence, as shown by spectroscopic measurements. Genomic DNA extracted from cicada exuviae could provide valuable information for species identification, allowing the investigation of genetic diversity across consecutive broods, or spatiotemporal variation among various populations. Consequently, we hope to provide a simple method to acquire pure genomic DNA applicable for multiple research purposes.

  14. Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks

    PubMed Central

    2017-01-01

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle’s safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given. PMID:29231882

  15. Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks.

    PubMed

    Song, Caixia

    2017-12-12

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle's safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given.

  16. Efficient multiparty quantum key agreement with collective detection.

    PubMed

    Huang, Wei; Su, Qi; Liu, Bin; He, Yuan-Hang; Fan, Fan; Xu, Bing-Jie

    2017-11-10

    As a burgeoning branch of quantum cryptography, quantum key agreement is a kind of key establishing processes where the security and fairness of the established common key should be guaranteed simultaneously. However, the difficulty on designing a qualified quantum key agreement protocol increases significantly with the increase of the number of the involved participants. Thus far, only few of the existing multiparty quantum key agreement (MQKA) protocols can really achieve security and fairness. Nevertheless, these qualified MQKA protocols are either too inefficient or too impractical. In this paper, an MQKA protocol is proposed with single photons in travelling mode. Since only one eavesdropping detection is needed in the proposed protocol, the qubit efficiency and measurement efficiency of it are higher than those of the existing ones in theory. Compared with the protocols which make use of the entangled states or multi-particle measurements, the proposed protocol is more feasible with the current technologies. Security and fairness analysis shows that the proposed protocol is not only immune to the attacks from external eavesdroppers, but also free from the attacks from internal betrayers.

  17. Gossip-Based Broadcast

    NASA Astrophysics Data System (ADS)

    Leitão, João; Pereira, José; Rodrigues, Luís

    Gossip, or epidemic, protocols have emerged as a powerful strategy to implement highly scalable and resilient reliable broadcast primitives on large scale peer-to-peer networks. Epidemic protocols are scalable because they distribute the load among all nodes in the system and resilient because they have an intrinsic level of redundancy that masks node and network failures. This chapter provides an introduction to gossip-based broadcast on large-scale unstructured peer-to-peer overlay networks: it surveys the main results in the field, discusses techniques to build and maintain the overlays that support efficient dissemination strategies, and provides an in-depth discussion and experimental evaluation of two concrete protocols, named HyParView and Plumtree.

  18. A minimal cost micropropagation protocol for Dianthus caryophyllus L.-- a commercially significant venture.

    PubMed

    Pant, Manu

    2016-03-01

    In tissue culture, high production cost of the products restricts their reach. Though tissue culture is a major strength in floriculture it is marred by pricing issues. Hence, we developed a complete regeneration low cost micropropagation protocol for an economically important floriculture crop, carnation (Dianthus caryophyllus L.). Successful regeneration of carnation from nodal explants on cost-efficient medium indicates that psyllium husk, sugar and RO water can effectively replace the conventional medium comprising agar, sucrose and distilled water. The protocol can contribute to increased carnation production at comparatively reduced cost, and there by encourage wide scale adoption by the common growers.

  19. DNA electrotransfer into the skin using a combination of one high- and one low-voltage pulse.

    PubMed

    Pavselj, N; Préat, V

    2005-09-02

    Electroporation is an effective alternative to viral methods to significantly improve DNA transfection after intradermal and topical delivery. The aim of the study was to check whether a combination of a short high-voltage pulse (HV) to permeabilize the skin cells and a long low-voltage pulse (LV) to transfer DNA by electrophoresis was more efficient to enhance DNA expression than conventional repeated HV or LV pulses alone after intradermal injection of DNA plasmid. GFP and luciferase expressions in the skin were enhanced by HV+LV protocol as compared to HV or LV pulses alone. The expression lasted for up to 10 days. Consistently, HV+LV protocol induced a higher Th2 immune response against ovalbumin than HV or LV pulses. Standard methods were used to assess the effect of electric pulses on skin: the application of a combination of HV and LV pulses on rat skin fold delivered by plate electrodes was well tolerated. These data demonstrate that a combination of one HV (700 to 1000 V/cm; 100 micros) followed by one LV (140 to 200 V/cm; 400 ms) is an efficient electroporation protocol to enhance DNA expression in the skin.

  20. Photonic sources and detectors for quantum information protocols: A trilogy in eight parts

    NASA Astrophysics Data System (ADS)

    Rangarajan, Radhika

    Quantum information processing (QIP) promises to revolutionize existing methods of manipulating data, via truly unique paradigms based on fundamental nonclassical physical phenomenon. However, the eventual success of optical QIP depends critically on the available technologies. Currently, creating multiple-photon states is extremely inefficient because almost no source thus far has been well optimized. Additionally, high-efficiency single-photon detectors can drastically improve multi-photon QIP (typical efficiencies are ˜70%). In fact, it has been shown that scalable linear optical quantum computing is possible only if the product of the source and detector efficiencies exceeds ˜67%. The research presented here focuses on developing optimized source and detector technologies for enabling scalable QIP. The goal of our source research is to develop an ideal " indistinguishable" source of ultrabright polarization-entangled but spatially- and spectrally-unentangled photon pairs. We engineer such an ideal source by first designing spatio-spectrally unentangled photons using optimized and group-velocity matched spontaneous parametric down conversion (SPDC). Next, we generate polarization-entangled photons using the engineered SPDC. Here we present solutions to the various challenges encountered during the indistinguishable source development. We demonstrate high-fidelity ultrafast pulsed and cw-diode laser-pumped sources of polarization-entangled photons, as well as the first production of polarization-entanglement directly from the highly nonlinear biaxial crystal BiB3O6 (BiBO). We also discuss the first experimental confirmation of the emission-angle dependence of the downconversion polarization (the Migdall effect), and a novel scheme for polarization-dependent focusing. The goal of our single-photon detector research is to develop a very high-efficiency detection system that can also resolve incident photon number, a feature absent from the typical detectors employed for QIP. We discuss the various cryogenic, optical and electronic challenges encountered en route to detector development and present details on detector characterization, ultra-short electronics design and photon-number-resolution studies. The source and detector technologies developed here share a common goal: to enhance the efficiency of existing quantum protocols and pave the way for new ones. Here we discuss some of the possible benefits via a popular quantum protocol---teleportation---as well as a novel quantum communication technique---hyper-fingerprinting. Taken as a whole, this dissertation explores viable technological options for enhancing optical quantum information protocols, offers a perspective on the current status and limitations of existing technologies, and highlights the possibilities enabled by optimized photonic sources and detectors.

  1. Chapter 2: Commercial and Industrial Lighting Evaluation Protocol. The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kurnik, Charles W; Gowans, Dakers; Telarico, Chad

    The Commercial and Industrial Lighting Evaluation Protocol (the protocol) describes methods to account for gross energy savings resulting from the programmatic installation of efficient lighting equipment in large populations of commercial, industrial, and other nonresidential facilities. This protocol does not address savings resulting from changes in codes and standards, or from education and training activities. A separate Uniform Methods Project (UMP) protocol, Chapter 3: Commercial and Industrial Lighting Controls Evaluation Protocol, addresses methods for evaluating savings resulting from lighting control measures such as adding time clocks, tuning energy management system commands, and adding occupancy sensors.

  2. New odourless protocols for efficient Pauson-Khand annulations.

    PubMed

    Brown, Jack A; Irvine, Stephanie; Kerr, William J; Pearson, Colin M

    2005-07-07

    An inexpensive and commercially available odourless additive, dodecyl methyl sulfide, has been shown to be a highly effective promoter in the Pauson-Khand cyclisation of both intra- and intermolecular substrates, affording good to excellent yields of cyclopentenone products.

  3. A facile and eco-friendly synthesis of diarylthiazoles and diarylimidazoles in water

    EPA Science Inventory

    A simple, efficient and high yielding greener protocol for the synthesis of substituted thiazoles and imidazoles is described that utilizes the reaction of readily available α-tosyloxy ketones with variety of thioamides/amidines in water

  4. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy

    PubMed Central

    2018-01-01

    The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash’s scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash’s protocol. We point out that Farash’s protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.’s scheme. We prove that the proposed protocol not only overcomes the issues in Farash’s scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure. PMID:29547619

  5. An Effective Collaborative Mobile Weighted Clustering Schemes for Energy Balancing in Wireless Sensor Networks

    PubMed Central

    Tang, Chengpei; Shokla, Sanesy Kumcr; Modhawar, George; Wang, Qiang

    2016-01-01

    Collaborative strategies for mobile sensor nodes ensure the efficiency and the robustness of data processing, while limiting the required communication bandwidth. In order to solve the problem of pipeline inspection and oil leakage monitoring, a collaborative weighted mobile sensing scheme is proposed. By adopting a weighted mobile sensing scheme, the adaptive collaborative clustering protocol can realize an even distribution of energy load among the mobile sensor nodes in each round, and make the best use of battery energy. A detailed theoretical analysis and experimental results revealed that the proposed protocol is an energy efficient collaborative strategy such that the sensor nodes can communicate with a fusion center and produce high power gain. PMID:26907285

  6. Energy-efficient boarder node medium access control protocol for wireless sensor networks.

    PubMed

    Razaque, Abdul; Elleithy, Khaled M

    2014-03-12

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi-synchronous feature with a low duty cycle, which is advantageous for reducing the latency and energy consumption for several WSN application areas to improve the throughput. BN-MAC uses a unique window slot size to enhance the contention resolution issue for improved throughput. BN-MAC also prefers to communicate within a one-hop destination using Anycast, which maintains load balancing to maintain network reliability. BN-MAC is introduced with the goal of supporting four major application areas: monitoring and behavioral areas, controlling natural disasters, human-centric applications, and tracking mobility and static home automation devices from remote places. These application areas require a congestion-free mobility-supported MAC protocol to guarantee reliable data delivery. BN-MAC was evaluated using network simulator-2 (ns2) and compared with other hybrid MAC protocols, such as Zebra medium access control (Z-MAC), advertisement-based MAC (A-MAC), Speck-MAC, adaptive duty cycle SMAC (ADC-SMAC), and low-power real-time medium access control (LPR-MAC). The simulation results indicate that BN-MAC is a robust and energy-efficient protocol that outperforms other hybrid MAC protocols in the context of quality of service (QoS) parameters, such as energy consumption, latency, throughput, channel access time, successful delivery rate, coverage efficiency, and average duty cycle.

  7. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    PubMed Central

    Razaque, Abdul; Elleithy, Khaled M.

    2014-01-01

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi-synchronous feature with a low duty cycle, which is advantageous for reducing the latency and energy consumption for several WSN application areas to improve the throughput. BN-MAC uses a unique window slot size to enhance the contention resolution issue for improved throughput. BN-MAC also prefers to communicate within a one-hop destination using Anycast, which maintains load balancing to maintain network reliability. BN-MAC is introduced with the goal of supporting four major application areas: monitoring and behavioral areas, controlling natural disasters, human-centric applications, and tracking mobility and static home automation devices from remote places. These application areas require a congestion-free mobility-supported MAC protocol to guarantee reliable data delivery. BN-MAC was evaluated using network simulator-2 (ns2) and compared with other hybrid MAC protocols, such as Zebra medium access control (Z-MAC), advertisement-based MAC (A-MAC), Speck-MAC, adaptive duty cycle SMAC (ADC-SMAC), and low-power real-time medium access control (LPR-MAC). The simulation results indicate that BN-MAC is a robust and energy-efficient protocol that outperforms other hybrid MAC protocols in the context of quality of service (QoS) parameters, such as energy consumption, latency, throughput, channel access time, successful delivery rate, coverage efficiency, and average duty cycle. PMID:24625737

  8. Nonpainful wide-area compression inhibits experimental pain.

    PubMed

    Honigman, Liat; Bar-Bachar, Ofrit; Yarnitsky, David; Sprecher, Elliot; Granovsky, Yelena

    2016-09-01

    Compression therapy, a well-recognized treatment for lymphoedema and venous disorders, pressurizes limbs and generates massive non-noxious afferent sensory barrages. The aim of this study was to study whether such afferent activity has an analgesic effect when applied on the lower limbs, hypothesizing that larger compression areas will induce stronger analgesic effects, and whether this effect correlates with conditioned pain modulation (CPM). Thirty young healthy subjects received painful heat and pressure stimuli (47°C for 30 seconds, forearm; 300 kPa for 15 seconds, wrist) before and during 3 compression protocols of either SMALL (up to ankles), MEDIUM (up to knees), or LARGE (up to hips) compression areas. Conditioned pain modulation (heat pain conditioned by noxious cold water) was tested before and after each compression protocol. The LARGE protocol induced more analgesia for heat than the SMALL protocol (P < 0.001). The analgesic effect interacted with gender (P = 0.015). The LARGE protocol was more efficient for females, whereas the MEDIUM protocol was more efficient for males. Pressure pain was reduced by all protocols (P < 0.001) with no differences between protocols and no gender effect. Conditioned pain modulation was more efficient than the compression-induced analgesia. For the LARGE protocol, precompression CPM efficiency positively correlated with compression-induced analgesia. Large body area compression exerts an area-dependent analgesic effect on experimental pain stimuli. The observed correlation with pain inhibition in response to robust non-noxious sensory stimulation may suggest that compression therapy shares similar mechanisms with inhibitory pain modulation assessed through CPM.

  9. Efficient multiuser quantum cryptography network based on entanglement.

    PubMed

    Xue, Peng; Wang, Kunkun; Wang, Xiaoping

    2017-04-04

    We present an efficient quantum key distribution protocol with a certain entangled state to solve a special cryptographic task. Also, we provide a proof of security of this protocol by generalizing the proof of modified of Lo-Chau scheme. Based on this two-user scheme, a quantum cryptography network protocol is proposed without any quantum memory.

  10. Efficient multiuser quantum cryptography network based on entanglement

    PubMed Central

    Xue, Peng; Wang, Kunkun; Wang, Xiaoping

    2017-01-01

    We present an efficient quantum key distribution protocol with a certain entangled state to solve a special cryptographic task. Also, we provide a proof of security of this protocol by generalizing the proof of modified of Lo-Chau scheme. Based on this two-user scheme, a quantum cryptography network protocol is proposed without any quantum memory. PMID:28374854

  11. Efficient multiuser quantum cryptography network based on entanglement

    NASA Astrophysics Data System (ADS)

    Xue, Peng; Wang, Kunkun; Wang, Xiaoping

    2017-04-01

    We present an efficient quantum key distribution protocol with a certain entangled state to solve a special cryptographic task. Also, we provide a proof of security of this protocol by generalizing the proof of modified of Lo-Chau scheme. Based on this two-user scheme, a quantum cryptography network protocol is proposed without any quantum memory.

  12. Throughput and Energy Efficiency of a Cooperative Hybrid ARQ Protocol for Underwater Acoustic Sensor Networks

    PubMed Central

    Ghosh, Arindam; Lee, Jae-Won; Cho, Ho-Shin

    2013-01-01

    Due to its efficiency, reliability and better channel and resource utilization, cooperative transmission technologies have been attractive options in underwater as well as terrestrial sensor networks. Their performance can be further improved if merged with forward error correction (FEC) techniques. In this paper, we propose and analyze a retransmission protocol named Cooperative-Hybrid Automatic Repeat reQuest (C-HARQ) for underwater acoustic sensor networks, which exploits both the reliability of cooperative ARQ (CARQ) and the efficiency of incremental redundancy-hybrid ARQ (IR-HARQ) using rate-compatible punctured convolution (RCPC) codes. Extensive Monte Carlo simulations are performed to investigate the performance of the protocol, in terms of both throughput and energy efficiency. The results clearly reveal the enhancement in performance achieved by the C-HARQ protocol, which outperforms both CARQ and conventional stop and wait ARQ (S&W ARQ). Further, using computer simulations, optimum values of various network parameters are estimated so as to extract the best performance out of the C-HARQ protocol. PMID:24217359

  13. Efficiency in nonequilibrium molecular dynamics Monte Carlo simulations

    DOE PAGES

    Radak, Brian K.; Roux, Benoît

    2016-10-07

    Hybrid algorithms combining nonequilibrium molecular dynamics and Monte Carlo (neMD/MC) offer a powerful avenue for improving the sampling efficiency of computer simulations of complex systems. These neMD/MC algorithms are also increasingly finding use in applications where conventional approaches are impractical, such as constant-pH simulations with explicit solvent. However, selecting an optimal nonequilibrium protocol for maximum efficiency often represents a non-trivial challenge. This work evaluates the efficiency of a broad class of neMD/MC algorithms and protocols within the theoretical framework of linear response theory. The approximations are validated against constant pH-MD simulations and shown to provide accurate predictions of neMD/MC performance.more » An assessment of a large set of protocols confirms (both theoretically and empirically) that a linear work protocol gives the best neMD/MC performance. Lastly, a well-defined criterion for optimizing the time parameters of the protocol is proposed and demonstrated with an adaptive algorithm that improves the performance on-the-fly with minimal cost.« less

  14. High-Performance, Reliable Multicasting: Foundations for Future Internet Groupware Applications

    NASA Technical Reports Server (NTRS)

    Callahan, John; Montgomery, Todd; Whetten, Brian

    1997-01-01

    Network protocols that provide efficient, reliable, and totally-ordered message delivery to large numbers of users will be needed to support many future Internet applications. The Reliable Multicast Protocol (RMP) is implemented on top of IP multicast to facilitate reliable transfer of data for replicated databases and groupware applications that will emerge on the Internet over the next decade. This paper explores some of the basic questions and applications of reliable multicasting in the context of the development and analysis of RMP.

  15. Enantioselective Syntheses of (−)-Alloyohimbane and (−)-Yohimbane by an Efficient Enzymatic Desymmetrization Process

    PubMed Central

    Ghosh, Arun K.; Sarkar, Anindya

    2016-01-01

    Enantioselective syntheses of (−)-alloyohimbane and (−)-yohimbane was accomplished in a convergent manner. The key step involved a modified mild protocol for the enantioselective enzymatic desymmetrization of meso-diacetate. The protocol provided convenient access to an optically active monoacetate in multi-gram scale in high enantiomeric purity. This monoacetate was converted to (−)-alloyohimbane. Reductive amination of the derived aldehyde causes the isomerization leading to the trans-product and allows the synthesis of (−)-yohimbane. PMID:28757804

  16. Protocols for efficient simulations of long-time protein dynamics using coarse-grained CABS model.

    PubMed

    Jamroz, Michal; Kolinski, Andrzej; Kmiecik, Sebastian

    2014-01-01

    Coarse-grained (CG) modeling is a well-acknowledged simulation approach for getting insight into long-time scale protein folding events at reasonable computational cost. Depending on the design of a CG model, the simulation protocols vary from highly case-specific-requiring user-defined assumptions about the folding scenario-to more sophisticated blind prediction methods for which only a protein sequence is required. Here we describe the framework protocol for the simulations of long-term dynamics of globular proteins, with the use of the CABS CG protein model and sequence data. The simulations can start from a random or a selected (e.g., native) structure. The described protocol has been validated using experimental data for protein folding model systems-the prediction results agreed well with the experimental results.

  17. Derivation of highly purified cardiomyocytes from human induced pluripotent stem cells using small molecule-modulated differentiation and subsequent glucose starvation.

    PubMed

    Sharma, Arun; Li, Guang; Rajarajan, Kuppusamy; Hamaguchi, Ryoko; Burridge, Paul W; Wu, Sean M

    2015-03-18

    Human induced pluripotent stem cell-derived cardiomyocytes (hiPSC-CMs) have become an important cell source to address the lack of primary cardiomyocytes available for basic research and translational applications. To differentiate hiPSCs into cardiomyocytes, various protocols including embryoid body (EB)-based differentiation and growth factor induction have been developed. However, these protocols are inefficient and highly variable in their ability to generate purified cardiomyocytes. Recently, a small molecule-based protocol utilizing modulation of Wnt/β-Catenin signaling was shown to promote cardiac differentiation with high efficiency. With this protocol, greater than 50%-60% of differentiated cells were cardiac troponin-positive cardiomyocytes were consistently observed. To further increase cardiomyocyte purity, the differentiated cells were subjected to glucose starvation to specifically eliminate non-cardiomyocytes based on the metabolic differences between cardiomyocytes and non-cardiomyocytes. Using this selection strategy, we consistently obtained a greater than 30% increase in the ratio of cardiomyocytes to non-cardiomyocytes in a population of differentiated cells. These highly purified cardiomyocytes should enhance the reliability of results from human iPSC-based in vitro disease modeling studies and drug screening assays.

  18. Validation of a Nylon-Flocked-Swab Protocol for Efficient Recovery of Bacterial Spores from Smooth and Rough Surfaces▿

    PubMed Central

    Probst, Alexander; Facius, Rainer; Wirth, Reinhard; Moissl-Eichinger, Christine

    2010-01-01

    In order to meet planetary-protection requirements, culturable bacterial spore loads are measured representatively for the total microbial contamination of spacecraft. However, the National Aeronautics and Space Administration's (NASA's) cotton swab protocols for spore load determination have not changed for decades. To determine whether a more efficient alternative was available, a novel swab was evaluated for recovery of different Bacillus atrophaeus spore concentrations on stainless steel and other surfaces. Two protocols for the nylon-flocked swab (NFS) were validated and compared to the present NASA standard protocol. The results indicate that the novel swab protocols recover 3- to 4-fold more (45.4% and 49.0% recovery efficiency) B. atrophaeus spores than the NASA standard method (13.2%). Moreover, the nylon-flocked-swab protocols were superior in recovery efficiency for spores of seven different Bacillus species, including Bacillus anthracis Sterne (recovery efficiency, 20%). The recovery efficiencies for B. atrophaeus spores from different surfaces showed a variation from 5.9 to 62.0%, depending on the roughness of the surface analyzed. Direct inoculation of the swab resulted in a recovery rate of about 80%, consistent with the results of scanning electron micrographs that allowed detailed comparisons of the two swab types. The results of this investigation will significantly contribute to the cleanliness control of future life detection missions and will provide significant improvement in detection of B. anthracis contamination for law enforcement and security efforts. PMID:20543054

  19. Generation of Oligodendrogenic Spinal Neural Progenitor Cells From Human Induced Pluripotent Stem Cells.

    PubMed

    Khazaei, Mohamad; Ahuja, Christopher S; Fehlings, Michael G

    2017-08-14

    This unit describes protocols for the efficient generation of oligodendrogenic neural progenitor cells (o-NPCs) from human induced pluripotent stem cells (hiPSCs). Specifically, detailed methods are provided for the maintenance and differentiation of hiPSCs, human induced pluripotent stem cell-derived neural progenitor cells (hiPS-NPCs), and human induced pluripotent stem cell-oligodendrogenic neural progenitor cells (hiPSC-o-NPCs) with the final products being suitable for in vitro experimentation or in vivo transplantation. Throughout, cell exposure to growth factors and patterning morphogens has been optimized for both concentration and timing, based on the literature and empirical experience, resulting in a robust and highly efficient protocol. Using this derivation procedure, it is possible to obtain millions of oligodendrogenic-NPCs within 40 days of initial cell plating which is substantially shorter than other protocols for similar cell types. This protocol has also been optimized to use translationally relevant human iPSCs as the parent cell line. The resultant cells have been extensively characterized both in vitro and in vivo and express key markers of an oligodendrogenic lineage. © 2017 by John Wiley & Sons, Inc. Copyright © 2017 John Wiley and Sons, Inc.

  20. L2-LBMT: A Layered Load Balance Routing Protocol for underwater multimedia data transmission

    NASA Astrophysics Data System (ADS)

    Lv, Ze; Tang, Ruichun; Tao, Ye; Sun, Xin; Xu, Xiaowei

    2017-12-01

    Providing highly efficient underwater transmission of mass multimedia data is challenging due to the particularities of the underwater environment. Although there are many schemes proposed to optimize the underwater acoustic network communication protocols, from physical layer, data link layer, network layer to transport layer, the existing routing protocols for underwater wireless sensor network (UWSN) still cannot well deal with the problems in transmitting multimedia data because of the difficulties involved in high energy consumption, low transmission reliability or high transmission delay. It prevents us from applying underwater multimedia data to real-time monitoring of marine environment in practical application, especially in emergency search, rescue operation and military field. Therefore, the inefficient transmission of marine multimedia data has become a serious problem that needs to be solved urgently. In this paper, A Layered Load Balance Routing Protocol (L2-LBMT) is proposed for underwater multimedia data transmission. In L2-LBMT, we use layered and load-balance Ad Hoc Network to transmit data, and adopt segmented data reliable transfer (SDRT) protocol to improve the data transport reliability. And a 3-node variant of tornado (3-VT) code is also combined with the Ad Hoc Network to transmit little emergency data more quickly. The simulation results show that the proposed protocol can balance energy consumption of each node, effectively prolong the network lifetime and reduce transmission delay of marine multimedia data.

  1. Protocol Processing for 100 Gbit/s and Beyond - A Soft Real-Time Approach in Hardware and Software

    NASA Astrophysics Data System (ADS)

    Büchner, Steffen; Lopacinski, Lukasz; Kraemer, Rolf; Nolte, Jörg

    2017-09-01

    100 Gbit/s wireless communication protocol processing stresses all parts of a communication system until the outermost. The efficient use of upcoming 100 Gbit/s and beyond transmission technology requires the rethinking of the way protocols are processed by the communication endpoints. This paper summarizes the achievements of the project End2End100. We will present a comprehensive soft real-time stream processing approach that allows the protocol designer to develop, analyze, and plan scalable protocols for ultra high data rates of 100 Gbit/s and beyond. Furthermore, we will present an ultra-low power, adaptable, and massively parallelized FEC (Forward Error Correction) scheme that detects and corrects bit errors at line rate with an energy consumption between 1 pJ/bit and 13 pJ/bit. The evaluation results discussed in this publication show that our comprehensive approach allows end-to-end communication with a very low protocol processing overhead.

  2. Optimization of methods for the genetic modification of human T cells.

    PubMed

    Bilal, Mahmood Y; Vacaflores, Aldo; Houtman, Jon Cd

    2015-11-01

    CD4(+) T cells are not only critical in the fight against parasitic, bacterial and viral infections, but are also involved in many autoimmune and pathological disorders. Studies of protein function in human T cells are confined to techniques such as RNA interference (RNAi) owing to ethical reasons and relative simplicity of these methods. However, introduction of RNAi or genes into primary human T cells is often hampered by toxic effects from transfection or transduction methods that yield cell numbers inadequate for downstream assays. Additionally, the efficiency of recombinant DNA expression is frequently low because of multiple factors including efficacy of the method and strength of the targeting RNAs. Here, we describe detailed protocols that will aid in the study of primary human CD4(+) T cells. First, we describe a method for development of effective microRNA/shRNAs using available online algorithms. Second, we illustrate an optimized protocol for high efficacy retroviral or lentiviral transduction of human T-cell lines. Importantly, we demonstrate that activated primary human CD4(+) T cells can be transduced efficiently with lentiviruses, with a highly activated population of T cells receiving the largest number of copies of integrated DNA. We also illustrate a method for efficient lentiviral transduction of hard-to-transduce un-activated primary human CD4(+) T cells. These protocols will significantly assist in understanding the activation and function of human T cells and will ultimately aid in the development or improvement of current drugs that target human CD4(+) T cells.

  3. Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing

    NASA Astrophysics Data System (ADS)

    Yu, Kun-Fei; Gu, Jun; Hwang, Tzonelih; Gope, Prosanta

    2017-08-01

    This paper proposes a multi-party semi-quantum secret sharing (MSQSS) protocol which allows a quantum party (manager) to share a secret among several classical parties (agents) based on GHZ-like states. By utilizing the special properties of GHZ-like states, the proposed scheme can easily detect outside eavesdropping attacks and has the highest qubit efficiency among the existing MSQSS protocols. Then, we illustrate an efficient way to convert the proposed MSQSS protocol into a multi-party semi-quantum key distribution (MSQKD) protocol. The proposed approach is even useful to convert all the existing measure-resend type of semi-quantum secret sharing protocols into semi-quantum key distribution protocols.

  4. An optimized immunohistochemistry protocol for detecting the guidance cue Netrin-1 in neural tissue.

    PubMed

    Salameh, Samer; Nouel, Dominique; Flores, Cecilia; Hoops, Daniel

    2018-01-01

    Netrin-1, an axon guidance protein, is difficult to detect using immunohistochemistry. We performed a multi-step, blinded, and controlled protocol optimization procedure to establish an efficient and effective fluorescent immunohistochemistry protocol for characterizing Netrin-1 expression. Coronal mouse brain sections were used to test numerous antigen retrieval methods and combinations thereof in order to optimize the stain quality of a commercially available Netrin-1 antibody. Stain quality was evaluated by experienced neuroanatomists for two criteria: signal intensity and signal-to-noise ratio. After five rounds of testing protocol variants, we established a modified immunohistochemistry protocol that produced a Netrin-1 signal with good signal intensity and a high signal-to-noise ratio. The key protocol modifications are as follows: •Use phosphate buffer (PB) as the blocking solution solvent.•Use 1% sodium dodecyl sulfate (SDS) treatment for antigen retrieval. The original protocol was optimized for use with the Netrin-1 antibody produced by Novus Biologicals. However, we subsequently further modified the protocol to work with the antibody produced by Abcam. The Abcam protocol uses PBS as the blocking solution solvent and adds a citrate buffer antigen retrieval step.

  5. Intelligent routing protocol for ad hoc wireless network

    NASA Astrophysics Data System (ADS)

    Peng, Chaorong; Chen, Chang Wen

    2006-05-01

    A novel routing scheme for mobile ad hoc networks (MANETs), which combines hybrid and multi-inter-routing path properties with a distributed topology discovery route mechanism using control agents is proposed in this paper. In recent years, a variety of hybrid routing protocols for Mobile Ad hoc wireless networks (MANETs) have been developed. Which is proactively maintains routing information for a local neighborhood, while reactively acquiring routes to destinations beyond the global. The hybrid protocol reduces routing discovery latency and the end-to-end delay by providing high connectivity without requiring much of the scarce network capacity. On the other side the hybrid routing protocols in MANETs likes Zone Routing Protocol still need route "re-discover" time when a route between zones link break. Sine the topology update information needs to be broadcast routing request on local zone. Due to this delay, the routing protocol may not be applicable for real-time data and multimedia communication. We utilize the advantages of a clustering organization and multi-routing path in routing protocol to achieve several goals at the same time. Firstly, IRP efficiently saves network bandwidth and reduces route reconstruction time when a routing path fails. The IRP protocol does not require global periodic routing advertisements, local control agents will automatically monitor and repair broke links. Secondly, it efficiently reduces congestion and traffic "bottlenecks" for ClusterHeads in clustering network. Thirdly, it reduces significant overheads associated with maintaining clusters. Fourthly, it improves clusters stability due to dynamic topology changing frequently. In this paper, we present the Intelligent Routing Protocol. First, we discuss the problem of routing in ad hoc networks and the motivation of IRP. We describe the hierarchical architecture of IRP. We describe the routing process and illustrate it with an example. Further, we describe the control manage mechanisms, which are used to control active route and reduce the traffic amount in the route discovery procedure. Finial, the numerical experiments are given to show the effectiveness of IRP routing protocol.

  6. Nonpainful wide-area compression inhibits experimental pain

    PubMed Central

    Honigman, Liat; Bar-Bachar, Ofrit; Yarnitsky, David; Sprecher, Elliot; Granovsky, Yelena

    2016-01-01

    Abstract Compression therapy, a well-recognized treatment for lymphoedema and venous disorders, pressurizes limbs and generates massive non-noxious afferent sensory barrages. The aim of this study was to study whether such afferent activity has an analgesic effect when applied on the lower limbs, hypothesizing that larger compression areas will induce stronger analgesic effects, and whether this effect correlates with conditioned pain modulation (CPM). Thirty young healthy subjects received painful heat and pressure stimuli (47°C for 30 seconds, forearm; 300 kPa for 15 seconds, wrist) before and during 3 compression protocols of either SMALL (up to ankles), MEDIUM (up to knees), or LARGE (up to hips) compression areas. Conditioned pain modulation (heat pain conditioned by noxious cold water) was tested before and after each compression protocol. The LARGE protocol induced more analgesia for heat than the SMALL protocol (P < 0.001). The analgesic effect interacted with gender (P = 0.015). The LARGE protocol was more efficient for females, whereas the MEDIUM protocol was more efficient for males. Pressure pain was reduced by all protocols (P < 0.001) with no differences between protocols and no gender effect. Conditioned pain modulation was more efficient than the compression-induced analgesia. For the LARGE protocol, precompression CPM efficiency positively correlated with compression-induced analgesia. Large body area compression exerts an area-dependent analgesic effect on experimental pain stimuli. The observed correlation with pain inhibition in response to robust non-noxious sensory stimulation may suggest that compression therapy shares similar mechanisms with inhibitory pain modulation assessed through CPM. PMID:27152691

  7. An Efficient Data-Gathering Routing Protocol for Underwater Wireless Sensor Networks.

    PubMed

    Javaid, Nadeem; Ilyas, Naveed; Ahmad, Ashfaq; Alrajeh, Nabil; Qasim, Umar; Khan, Zahoor Ali; Liaqat, Tayyaba; Khan, Majid Iqbal

    2015-11-17

    Most applications of underwater wireless sensor networks (UWSNs) demand reliable data delivery over a longer period in an efficient and timely manner. However, the harsh and unpredictable underwater environment makes routing more challenging as compared to terrestrial WSNs. Most of the existing schemes deploy mobile sensors or a mobile sink (MS) to maximize data gathering. However, the relatively high deployment cost prevents their usage in most applications. Thus, this paper presents an autonomous underwater vehicle (AUV)-aided efficient data-gathering (AEDG) routing protocol for reliable data delivery in UWSNs. To prolong the network lifetime, AEDG employs an AUV for data collection from gateways and uses a shortest path tree (SPT) algorithm while associating sensor nodes with the gateways. The AEDG protocol also limits the number of associated nodes with the gateway nodes to minimize the network energy consumption and to prevent the gateways from overloading. Moreover, gateways are rotated with the passage of time to balance the energy consumption of the network. To prevent data loss, AEDG allows dynamic data collection at the AUV depending on the limited number of member nodes that are associated with each gateway. We also develop a sub-optimal elliptical trajectory of AUV by using a connected dominating set (CDS) to further facilitate network throughput maximization. The performance of the AEDG is validated via simulations, which demonstrate the effectiveness of AEDG in comparison to two existing UWSN routing protocols in terms of the selected performance metrics.

  8. An Efficient Data-Gathering Routing Protocol for Underwater Wireless Sensor Networks

    PubMed Central

    Javaid, Nadeem; Ilyas, Naveed; Ahmad, Ashfaq; Alrajeh, Nabil; Qasim, Umar; Khan, Zahoor Ali; Liaqat, Tayyaba; Khan, Majid Iqbal

    2015-01-01

    Most applications of underwater wireless sensor networks (UWSNs) demand reliable data delivery over a longer period in an efficient and timely manner. However, the harsh and unpredictable underwater environment makes routing more challenging as compared to terrestrial WSNs. Most of the existing schemes deploy mobile sensors or a mobile sink (MS) to maximize data gathering. However, the relatively high deployment cost prevents their usage in most applications. Thus, this paper presents an autonomous underwater vehicle (AUV)-aided efficient data-gathering (AEDG) routing protocol for reliable data delivery in UWSNs. To prolong the network lifetime, AEDG employs an AUV for data collection from gateways and uses a shortest path tree (SPT) algorithm while associating sensor nodes with the gateways. The AEDG protocol also limits the number of associated nodes with the gateway nodes to minimize the network energy consumption and to prevent the gateways from overloading. Moreover, gateways are rotated with the passage of time to balance the energy consumption of the network. To prevent data loss, AEDG allows dynamic data collection at the AUV depending on the limited number of member nodes that are associated with each gateway. We also develop a sub-optimal elliptical trajectory of AUV by using a connected dominating set (CDS) to further facilitate network throughput maximization. The performance of the AEDG is validated via simulations, which demonstrate the effectiveness of AEDG in comparison to two existing UWSN routing protocols in terms of the selected performance metrics. PMID:26593924

  9. Greener and Sustainable Approaches to the Synthesis of Pharmaceutically Active Heterocycles

    EPA Science Inventory

    Green chemistry is a rapidly developing field providing a proactive avenue for the sustainable development of future science and technology. Green chemistry can be applied to the design of highly efficient, environmentally benign synthetic protocols to deliver life-saving medicin...

  10. Efficiency of different protocols for enamel clean-up after bracket debonding: an in vitro study

    PubMed Central

    Sigilião, Lara Carvalho Freitas; Marquezan, Mariana; Elias, Carlos Nelson; Ruellas, Antônio Carlos; Sant'Anna, Eduardo Franzotti

    2015-01-01

    Objective: This study aimed to assess the efficiency of six protocols for cleaning-up tooth enamel after bracket debonding. Methods: A total of 60 premolars were divided into six groups, according to the tools used for clean-up: 12-blade bur at low speed (G12L), 12-blade bur at high speed (G12H), 30-blade bur at low speed (G30L), DU10CO ORTHO polisher (GDU), Renew System (GR) and Diagloss polisher (GD). Mean roughness (Ra) and mean roughness depth (Rz) of enamel surface were analyzed with a profilometer. Paired t-test was used to assess Ra and Rz before and after enamel clean-up. ANOVA/Tukey tests were used for intergroup comparison. The duration of removal procedures was recorded. The association between time and variation in enamel roughness (∆Ra, ∆Rz) were evaluated by Pearson's correlation test. Enamel topography was assessed by scanning electron microscopy (SEM). Results: In Groups G12L and G12H, original enamel roughness did not change significantly. In Groups G30L, GDU, GR and GD, a smoother surface (p < 0.05) was found after clean-up. In Groups G30L and GD, the protocols used were more time-consuming than those used in the other groups. Negative and moderate correlation was observed between time and (∆Ra, ∆Rz); Ra and (∆Ra, ∆Rz); Rz (r = - 0.445, r = - 0.475, p < 0.01). Conclusion: All enamel clean-up protocols were efficient because they did not result in increased surface roughness. The longer the time spent performing the protocol, the lower the surface roughness. PMID:26560825

  11. Data Acquisition for a Patient-directed Intervention Protocol in the Dynamic Intensive Care Unit Setting

    PubMed Central

    Chlan, Linda; Patterson, Robert P.; Heiderscheit, Annie

    2011-01-01

    Methods to easily, accurately, and efficiently obtain data in an ICU-based clinical trial can be challenging in this high-tech setting. Patient medical status and the dynamic nature of this clinical setting further complicates data collection. The purpose of this paper is to describe the modifications of commercially available headphones and the application of a data logging device to capture frequency and length of protocol use (music listening or headphones only for noise cancellation) without burdening participants or busy ICU nurses. With the automatic capture of protocol use by research participants, there have been no instances of lost data for this clinical trial. PMID:21382515

  12. Data acquisition for a patient-directed intervention protocol in the dynamic intensive care unit setting.

    PubMed

    Chlan, Linda; Patterson, Robert P; Heiderscheit, Annie

    2011-07-01

    Methods to easily, accurately, and efficiently obtain data in an ICU-based clinical trial can be challenging in this high-tech setting. Patient medical status and the dynamic nature of this clinical setting further complicate data collection. The purpose of this paper is to describe the modifications of commercially available headphones and the application of a data logging device to capture frequency and length of protocol use (music listening or headphones only for noise cancellation) without burdening participants or busy ICU nurses. With the automatic capture of protocol use by research participants, there have been no instances of lost data for this clinical trial. Copyright © 2011 Elsevier Inc. All rights reserved.

  13. Chapter 1: Introduction. The Uniform Methods Project: Methods for Determining Energy-Efficiency Savings for Specific Measures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Li, Michael; Haeri, Hossein; Reynolds, Arlis

    This chapter provides a set of model protocols for determining energy and demand savings that result from specific energy efficiency measures implemented through state and utility efficiency programs. The methods described here are approaches that are or are among the most commonly used and accepted in the energy efficiency industry for certain measures or programs. As such, they draw from the existing body of research and best practices for energy efficiency program evaluation, measurement, and verification (EM&V). These protocols were developed as part of the Uniform Methods Project (UMP), funded by the U.S. Department of Energy (DOE). The principal objectivemore » for the project was to establish easy-to-follow protocols based on commonly accepted methods for a core set of widely deployed energy efficiency measures.« less

  14. ACTS 118x Final Report High-Speed TCP Interoperability Testing

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Zernic, Mike; Hoder, Douglas J.; Brooks, David E.; Beering, Dave R.; Welch, Arun

    1999-01-01

    With the recent explosion of the Internet and the enormous business opportunities available to communication system providers, great interest has developed in improving the efficiency of data transfer using the Transmission Control Protocol (TCP) of the Internet Protocol (IP) suite. The satellite system providers are interested in solving TCP efficiency problems associated with long delays and error-prone links. Similarly, the terrestrial community is interested in solving TCP problems over high-bandwidth links. Whereas the wireless community is interested in improving TCP performance over bandwidth constrained, error-prone links. NASA realized that solutions had already been proposed for most of the problems associated with efficient data transfer over large bandwidth-delay links (which include satellite links). The solutions are detailed in various Internet Engineering Task Force (IETF) Request for Comments (RFCs). Unfortunately, most of these solutions had not been tested at high-speed (155+ Mbps). Therefore, the NASA's ACTS experiments program initiated a series of TCP experiments to demonstrate scalability of TCP/IP and determine how far the protocol can be optimized over a 622 Mbps satellite link. These experiments were known as the 118i and 118j experiments. During the 118i and 118j experiments, NASA worked closely with SUN Microsystems and FORE Systems to improve the operating system, TCP stacks. and network interface cards and drivers. We were able to obtain instantaneous data throughput rates of greater than 520 Mbps and average throughput rates of 470 Mbps using TCP over Asynchronous Transfer Mode (ATM) over a 622 Mbps Synchronous Optical Network (SONET) OC12 link. Following the success of these experiments and the successful government/industry collaboration, a new series of experiments. the 118x experiments. were developed.

  15. An Energy Efficient MAC Protocol for Multi-Hop Swallowable Body Sensor Networks

    PubMed Central

    Lin, Lin; Yang, Chengfeng; Wong, Kai Juan; Yan, Hao; Shen, Junwen; Phee, Soo Jay

    2014-01-01

    Swallowable body sensor networks (BSNs) are composed of sensors which are swallowed by patients and send the collected data to the outside coordinator. These sensors are energy constraint and the batteries are difficult to be replaced. The medium access control (MAC) protocol plays an important role in energy management. This paper investigates an energy efficient MAC protocol design for swallowable BSNs. Multi-hop communication is analyzed and proved more energy efficient than single-hop communication within the human body when the circuitry power is low. Based on this result, a centrally controlled time slotting schedule is proposed. The major workload is shifted from the sensors to the coordinator. The coordinator collects the path-loss map and calculates the schedules, including routing, slot assignment and transmission power. Sensor nodes follow the schedules to send data in a multi-hop way. The proposed protocol is compared with the IEEE 802.15.6 protocol in terms of energy consumption. The results show that it is more energy efficient than IEEE 802.15.6 for swallowable BSN scenarios. PMID:25330049

  16. TreeMAC: Localized TDMA MAC protocol for real-time high-data-rate sensor networks

    USGS Publications Warehouse

    Song, W.-Z.; Huang, R.; Shirazi, B.; LaHusen, R.

    2009-01-01

    Earlier sensor network MAC protocols focus on energy conservation in low-duty cycle applications, while some recent applications involve real-time high-data-rate signals. This motivates us to design an innovative localized TDMA MAC protocol to achieve high throughput and low congestion in data collection sensor networks, besides energy conservation. TreeMAC divides a time cycle into frames and each frame into slots. A parent node determines the children's frame assignment based on their relative bandwidth demand, and each node calculates its own slot assignment based on its hop-count to the sink. This innovative 2-dimensional frame-slot assignment algorithm has the following nice theory properties. First, given any node, at any time slot, there is at most one active sender in its neighborhood (including itself). Second, the packet scheduling with TreeMAC is bufferless, which therefore minimizes the probability of network congestion. Third, the data throughput to the gateway is at least 1/3 of the optimum assuming reliable links. Our experiments on a 24-node testbed show that TreeMAC protocol significantly improves network throughput, fairness, and energy efficiency compared to TinyOS's default CSMA MAC protocol and a recent TDMA MAC protocol Funneling-MAC. Partial results of this paper were published in Song, Huang, Shirazi and Lahusen [W.-Z. Song, R. Huang, B. Shirazi, and R. Lahusen, TreeMAC: Localized TDMA MAC protocol for high-throughput and fairness in sensor networks, in: The 7th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom, March 2009]. Our new contributions include analyses of the performance of TreeMAC from various aspects. We also present more implementation detail and evaluate TreeMAC from other aspects. ?? 2009 Elsevier B.V.

  17. SYBR safeTM efficiently replaces ethidium bromide in Aspergillus fumigatus gene disruption.

    PubMed

    Canela, H M S; Takami, L A; Ferreira, M E S

    2017-02-08

    Invasive aspergillosis is a disease responsible for high mortality rates, caused mainly by Aspergillus fumigatus. The available drugs are limited and this disease continues to occur at an unacceptable frequency. Gene disruption is essential in the search for new drug targets. An efficient protocol for A. fumigatus gene disruption was described but it requires ethidium bromide, a genotoxic agent, for DNA staining. Therefore, the present study tested SYBR safe TM , a non-genotoxic DNA stain, in A. fumigatus gene disruption protocol. The chosen gene was cipC, which has already been disrupted successfully in our laboratory. A deletion cassette was constructed in Saccharomyces cerevisiae and used in A. fumigatus transformation. There was no statistical difference between the tested DNA stains. The success rate of S. cerevisiae transformation was 63.3% for ethidium bromide and 70% for SYBR safe TM . For A. fumigatus gene disruption, the success rate for ethidium bromide was 100 and 97% for SYBR safe TM . In conclusion, SYBR safe TM efficiently replaced ethidium bromide, making this dye a safe and efficient alternative for DNA staining in A. fumigatus gene disruption.

  18. Cryptanalysis and improvement of an improved two factor authentication protocol for telecare medical information systems.

    PubMed

    Chaudhry, Shehzad Ashraf; Naqvi, Husnain; Shon, Taeshik; Sher, Muhammad; Farash, Mohammad Sabzinejad

    2015-06-01

    Telecare medical information systems (TMIS) provides rapid and convenient health care services remotely. Efficient authentication is a prerequisite to guarantee the security and privacy of patients in TMIS. Authentication is used to verify the legality of the patients and TMIS server during remote access. Very recently Islam et al. (J. Med. Syst. 38(10):135, 2014) proposed a two factor authentication protocol for TMIS using elliptic curve cryptography (ECC) to improve Xu et al.'s (J. Med. Syst. 38(1):9994, 2014) protocol. They claimed their improved protocol to be efficient and provides all security requirements. However our analysis reveals that Islam et al.'s protocol suffers from user impersonation and server impersonation attacks. Furthermore we proposed an enhanced protocol. The proposed protocol while delivering all the virtues of Islam et al.'s protocol resists all known attacks.

  19. Efficient protocols for Stirling heat engines at the micro-scale

    NASA Astrophysics Data System (ADS)

    Muratore-Ginanneschi, Paolo; Schwieger, Kay

    2015-10-01

    We investigate the thermodynamic efficiency of sub-micro-scale Stirling heat engines operating under the conditions described by overdamped stochastic thermodynamics. We show how to construct optimal protocols such that at maximum power the efficiency attains for constant isotropic mobility the universal law η=2 ηC/(4-ηC) , where ηC is the efficiency of an ideal Carnot cycle. We show that these protocols are specified by the solution of an optimal mass transport problem. Such solution can be determined explicitly using well-known Monge-Ampère-Kantorovich reconstruction algorithms. Furthermore, we show that the same law describes the efficiency of heat engines operating at maximum work over short time periods. Finally, we illustrate the straightforward extension of these results to cases when the mobility is anisotropic and temperature dependent.

  20. High-Throughput Screening Assay for Embryoid Body Differentiation of Human Embryonic Stem Cells

    PubMed Central

    Outten, Joel T.; Gadue, Paul; French, Deborah L.; Diamond, Scott L.

    2012-01-01

    Serum-free human pluripotent stem cell media offer the potential to develop reproducible clinically applicable differentiation strategies and protocols. The vast array of possible growth factor and cytokine combinations for media formulations makes differentiation protocol optimization both labor and cost-intensive. This unit describes a 96-well plate, 4-color flow cytometry-based screening assay to optimize pluripotent stem cell differentiation protocols. We provide conditions both to differentiate human embryonic stem cells (hESCs) to the three primary germ layers, ectoderm, endoderm, and mesoderm, and to utilize flow cytometry to distinguish between them. This assay exhibits low inter-well variability and can be utilized to efficiently screen a variety of media formulations, reducing cost, incubator space, and labor. Protocols can be adapted to a variety of differentiation stages and lineages. PMID:22415836

  1. W-MAC: A Workload-Aware MAC Protocol for Heterogeneous Convergecast in Wireless Sensor Networks

    PubMed Central

    Xia, Ming; Dong, Yabo; Lu, Dongming

    2011-01-01

    The power consumption and latency of existing MAC protocols for wireless sensor networks (WSNs) are high in heterogeneous convergecast, where each sensor node generates different amounts of data in one convergecast operation. To solve this problem, we present W-MAC, a workload-aware MAC protocol for heterogeneous convergecast in WSNs. A subtree-based iterative cascading scheduling mechanism and a workload-aware time slice allocation mechanism are proposed to minimize the power consumption of nodes, while offering a low data latency. In addition, an efficient schedule adjustment mechanism is provided for adapting to data traffic variation and network topology change. Analytical and simulation results show that the proposed protocol provides a significant energy saving and latency reduction in heterogeneous convergecast, and can effectively support data aggregation to further improve the performance. PMID:22163753

  2. Experimental Realization of High-Efficiency Counterfactual Computation.

    PubMed

    Kong, Fei; Ju, Chenyong; Huang, Pu; Wang, Pengfei; Kong, Xi; Shi, Fazhan; Jiang, Liang; Du, Jiangfeng

    2015-08-21

    Counterfactual computation (CFC) exemplifies the fascinating quantum process by which the result of a computation may be learned without actually running the computer. In previous experimental studies, the counterfactual efficiency is limited to below 50%. Here we report an experimental realization of the generalized CFC protocol, in which the counterfactual efficiency can break the 50% limit and even approach unity in principle. The experiment is performed with the spins of a negatively charged nitrogen-vacancy color center in diamond. Taking advantage of the quantum Zeno effect, the computer can remain in the not-running subspace due to the frequent projection by the environment, while the computation result can be revealed by final detection. The counterfactual efficiency up to 85% has been demonstrated in our experiment, which opens the possibility of many exciting applications of CFC, such as high-efficiency quantum integration and imaging.

  3. Experimental Realization of High-Efficiency Counterfactual Computation

    NASA Astrophysics Data System (ADS)

    Kong, Fei; Ju, Chenyong; Huang, Pu; Wang, Pengfei; Kong, Xi; Shi, Fazhan; Jiang, Liang; Du, Jiangfeng

    2015-08-01

    Counterfactual computation (CFC) exemplifies the fascinating quantum process by which the result of a computation may be learned without actually running the computer. In previous experimental studies, the counterfactual efficiency is limited to below 50%. Here we report an experimental realization of the generalized CFC protocol, in which the counterfactual efficiency can break the 50% limit and even approach unity in principle. The experiment is performed with the spins of a negatively charged nitrogen-vacancy color center in diamond. Taking advantage of the quantum Zeno effect, the computer can remain in the not-running subspace due to the frequent projection by the environment, while the computation result can be revealed by final detection. The counterfactual efficiency up to 85% has been demonstrated in our experiment, which opens the possibility of many exciting applications of CFC, such as high-efficiency quantum integration and imaging.

  4. Heralded high-efficiency quantum repeater with atomic ensembles assisted by faithful single-photon transmission

    NASA Astrophysics Data System (ADS)

    Li, Tao; Deng, Fu-Guo

    2015-10-01

    Quantum repeater is one of the important building blocks for long distance quantum communication network. The previous quantum repeaters based on atomic ensembles and linear optical elements can only be performed with a maximal success probability of 1/2 during the entanglement creation and entanglement swapping procedures. Meanwhile, the polarization noise during the entanglement distribution process is harmful to the entangled channel created. Here we introduce a general interface between a polarized photon and an atomic ensemble trapped in a single-sided optical cavity, and with which we propose a high-efficiency quantum repeater protocol in which the robust entanglement distribution is accomplished by the stable spatial-temporal entanglement and it can in principle create the deterministic entanglement between neighboring atomic ensembles in a heralded way as a result of cavity quantum electrodynamics. Meanwhile, the simplified parity-check gate makes the entanglement swapping be completed with unity efficiency, other than 1/2 with linear optics. We detail the performance of our protocol with current experimental parameters and show its robustness to the imperfections, i.e., detuning and coupling variation, involved in the reflection process. These good features make it a useful building block in long distance quantum communication.

  5. Heralded high-efficiency quantum repeater with atomic ensembles assisted by faithful single-photon transmission.

    PubMed

    Li, Tao; Deng, Fu-Guo

    2015-10-27

    Quantum repeater is one of the important building blocks for long distance quantum communication network. The previous quantum repeaters based on atomic ensembles and linear optical elements can only be performed with a maximal success probability of 1/2 during the entanglement creation and entanglement swapping procedures. Meanwhile, the polarization noise during the entanglement distribution process is harmful to the entangled channel created. Here we introduce a general interface between a polarized photon and an atomic ensemble trapped in a single-sided optical cavity, and with which we propose a high-efficiency quantum repeater protocol in which the robust entanglement distribution is accomplished by the stable spatial-temporal entanglement and it can in principle create the deterministic entanglement between neighboring atomic ensembles in a heralded way as a result of cavity quantum electrodynamics. Meanwhile, the simplified parity-check gate makes the entanglement swapping be completed with unity efficiency, other than 1/2 with linear optics. We detail the performance of our protocol with current experimental parameters and show its robustness to the imperfections, i.e., detuning and coupling variation, involved in the reflection process. These good features make it a useful building block in long distance quantum communication.

  6. Heralded high-efficiency quantum repeater with atomic ensembles assisted by faithful single-photon transmission

    PubMed Central

    Li, Tao; Deng, Fu-Guo

    2015-01-01

    Quantum repeater is one of the important building blocks for long distance quantum communication network. The previous quantum repeaters based on atomic ensembles and linear optical elements can only be performed with a maximal success probability of 1/2 during the entanglement creation and entanglement swapping procedures. Meanwhile, the polarization noise during the entanglement distribution process is harmful to the entangled channel created. Here we introduce a general interface between a polarized photon and an atomic ensemble trapped in a single-sided optical cavity, and with which we propose a high-efficiency quantum repeater protocol in which the robust entanglement distribution is accomplished by the stable spatial-temporal entanglement and it can in principle create the deterministic entanglement between neighboring atomic ensembles in a heralded way as a result of cavity quantum electrodynamics. Meanwhile, the simplified parity-check gate makes the entanglement swapping be completed with unity efficiency, other than 1/2 with linear optics. We detail the performance of our protocol with current experimental parameters and show its robustness to the imperfections, i.e., detuning and coupling variation, involved in the reflection process. These good features make it a useful building block in long distance quantum communication. PMID:26502993

  7. ENVIRONMENTAL TECHNOLOGY VERIFICATION COATINGS AND COATING EQUIPMENT PROGRAM (ETV CCEP) HIGH TRANSFER EFFICIENCE SPRAY EQUIPMENT--GENERIC VERIFICATION PROTOCOL

    EPA Science Inventory

    The Environmental Technology Verification (ETV) Program has been established to verify the performance characteristics of innovative environmental technologies and report this objective information, thus, accelerating the entrance of these new technologies into the marketplace. V...

  8. HYDROLYSIS OF MTBE TO TBA IN GROUND WATER SAMPLES WITH HYDROCHLORIC ACID

    EPA Science Inventory

    Conventional sampling and analytical protocols have poor sensitivity for fuel oxygenates that are alcohols, such as tert-butyl alcohol (TBA). Because alcohols are miscible or highly soluble in water, alcohols are not efficiently transferred to the gas chromatograph for analysis....

  9. Highly efficient one-pot/one-step synthesis of multiblock copolymers from three-component polymerization of carbon dioxide, epoxide and lactone.

    PubMed

    Li, Yang; Hong, Jiali; Wei, Renjian; Zhang, Yingying; Tong, Zaizai; Zhang, Xinghong; Du, Binyang; Xu, Junting; Fan, Zhiqiang

    2015-02-01

    It is a long-standing challenge to combine mixed monomers into multiblock copolymer (MBC) in a one-pot/one-step polymerization manner. We report the first example of MBC with biodegradable polycarbonate and polyester blocks that were synthesized from highly efficient one-pot/one-step polymerization of cyclohexene oxide (CHO), CO 2 and ε-caprolactone (ε-CL) in the presence of zinc-cobalt double metal cyanide complex and stannous octoate. In this protocol, two cross-chain exchange reactions (CCER) occurred at dual catalysts respectively and connected two independent chain propagation procedures ( i.e. , polycarbonate formation and polyester formation) simultaneously in a block-by-block manner, affording MBC without tapering structure. The multiblock structure of MBC was determined by the rate ratio of CCER to the two chain propagations and could be simply tuned by various kinetic factors. This protocol is also of significance due to partial utilization of renewable CO 2 and improved mechanical properties of the resultant MBC.

  10. E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks

    PubMed Central

    Kumar, Pardeep; Lee, Sang-Gon; Lee, Hoon-Jae

    2012-01-01

    A wireless medical sensor network (WMSN) can sense humans’ physiological signs without sacrificing patient comfort and transmit patient vital signs to health professionals’ hand-held devices. The patient physiological data are highly sensitive and WMSNs are extremely vulnerable to many attacks. Therefore, it must be ensured that patients’ medical signs are not exposed to unauthorized users. Consequently, strong user authentication is the main concern for the success and large scale deployment of WMSNs. In this regard, this paper presents an efficient, strong authentication protocol, named E-SAP, for healthcare application using WMSNs. The proposed E-SAP includes: (1) a two-factor (i.e., password and smartcard) professional authentication; (2) mutual authentication between the professional and the medical sensor; (3) symmetric encryption/decryption for providing message confidentiality; (4) establishment of a secure session key at the end of authentication; and (5) professionals can change their password. Further, the proposed protocol requires three message exchanges between the professional, medical sensor node and gateway node, and achieves efficiency (i.e., low computation and communication cost). Through the formal analysis, security analysis and performance analysis, we demonstrate that E-SAP is more secure against many practical attacks, and allows a tradeoff between the security and the performance cost for healthcare application using WMSNs. PMID:22438729

  11. Comparison of electro-fusion and intracytoplasmic nuclear injection methods in pig cloning.

    PubMed

    Kurome, Mayuko; Fujimura, Tatsuya; Murakami, Hiroshi; Takahagi, Yoichi; Wako, Naohiro; Ochiai, Takashi; Miyazaki, Koji; Nagashima, Hiroshi

    2003-01-01

    This paper methodologically compares the electro-fusion (EF) and intracytoplasmic injection (ICI) methods, as well as simultaneous fusion/activation (SA) and delayed activation (DA), in somatic nuclear transfer in pigs using fetal fibroblast cells. Comparison of the remodeling pattern of donor nuclei after nuclear transfer by ICI or EF showed that a high rate (80-100%) of premature chromosome condensation occurred in both cases whether or not Ca2+ was present in the fusion medium. Formation of pseudo-pronuclei tended to be lower for nuclear transfer performed by the ICI method (65% vs. 85-97%, p < 0.05). In vitro developmental potential of nuclear transfer embryos reconstructed with IVM oocytes using the EF method was higher than that of those produced by the ICI method (blastocyst formation: 19 vs. 5%, p < 0.05), and it was not improved using in vivo-matured oocytes as recipient cytoplasts. Embryos produced using SA protocol developed to blastocysts with the same degree of efficiency as those produced under the DA protocol (11 vs. 12%). Use of the EF method in conjunction with SA was shown to be an efficient method for producing cloned pigs based on producing a cloned normal pig fetus. However, subtle differences in nuclear remodeling patterns between the SA and DA protocols may imply variations in their nuclear reprogramming efficiency.

  12. E-SAP: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks.

    PubMed

    Kumar, Pardeep; Lee, Sang-Gon; Lee, Hoon-Jae

    2012-01-01

    A wireless medical sensor network (WMSN) can sense humans' physiological signs without sacrificing patient comfort and transmit patient vital signs to health professionals' hand-held devices. The patient physiological data are highly sensitive and WMSNs are extremely vulnerable to many attacks. Therefore, it must be ensured that patients' medical signs are not exposed to unauthorized users. Consequently, strong user authentication is the main concern for the success and large scale deployment of WMSNs. In this regard, this paper presents an efficient, strong authentication protocol, named E-SAP, for healthcare application using WMSNs. The proposed E-SAP includes: (1) a two-factor (i.e., password and smartcard) professional authentication; (2) mutual authentication between the professional and the medical sensor; (3) symmetric encryption/decryption for providing message confidentiality; (4) establishment of a secure session key at the end of authentication; and (5) professionals can change their password. Further, the proposed protocol requires three message exchanges between the professional, medical sensor node and gateway node, and achieves efficiency (i.e., low computation and communication cost). Through the formal analysis, security analysis and performance analysis, we demonstrate that E-SAP is more secure against many practical attacks, and allows a tradeoff between the security and the performance cost for healthcare application using WMSNs.

  13. Efficient transformation and regeneration of transgenic cassava using the neomycin phosphotransferase gene as aminoglycoside resistance marker gene.

    PubMed

    Niklaus, Michael; Gruissem, Wilhelm; Vanderschuren, Hervé

    2011-01-01

    Cassava is one of the most important crops in the tropics. Its industrial use for starch and biofuel production is also increasing its importance for agricultural production in tropical countries. In the last decade cassava biotechnology has emerged as a valuable alternative to the breeding constraints of this highly heterozygous crop for improved trait development of cassava germplasm. Cassava transformation remains difficult and time-consuming because of limitations in selecting transgenic tissues and regeneration of transgenic plantlets. We have recently reported an efficient and robust cassava transformation protocol using the hygromycin phosphotransferase II (hptII) gene as selection marker and the aminoglycoside hygromycin at optimal concentrations to maximize the regeneration of transgenic plantlets. In the present work, we expanded the transformation protocol to the use of the neomycin phosphotransferase II (nptII) gene as selection marker. Several aminoglycosides compatible with the use of nptII were tested and optimal concentrations for cassava transformation were determined. Given its efficiency equivalent to hptII as selection marker with the described protocol, the use of nptII opens new possibilities to engineer transgenic cassava lines with multiple T-DNA insertions and to produce transgenic cassava with a resistance marker gene that is already deregulated in several commercial transgenic crops.

  14. An Energy-Efficient MAC Protocol for Medical Emergency Monitoring Body Sensor Networks

    PubMed Central

    Zhang, Chongqing; Wang, Yinglong; Liang, Yongquan; Shu, Minglei; Chen, Changfang

    2016-01-01

    Medical emergency monitoring body sensor networks (BSNs) monitor the occurrence of medical emergencies and are helpful for the daily care of the elderly and chronically ill people. Such BSNs are characterized by rare traffic when there is no emergency occurring, high real-time and reliable requirements of emergency data and demand for a fast wake-up mechanism for waking up all nodes when an emergency happens. A beacon-enabled MAC protocol is specially designed to meet the demands of medical emergency monitoring BSNs. The rarity of traffic is exploited to improve energy efficiency. By adopting a long superframe structure to avoid unnecessary beacons and allocating most of the superframe to be inactive periods, the duty cycle is reduced to an extremely low level to save energy. Short active time slots are interposed into the superframe and shared by all of the nodes to deliver the emergency data in a low-delay and reliable way to meet the real-time and reliable requirements. The interposition slots can also be used by the coordinator to broadcast network demands to wake-up all nodes in a low-delay and energy-efficient way. Experiments display that the proposed MAC protocol works well in BSNs with low emergency data traffic. PMID:26999145

  15. Treatment Protocol for High Velocity/High Energy Gunshot Injuries to the Face

    PubMed Central

    Peled, Micha; Leiser, Yoav; Emodi, Omri; Krausz, Amir

    2011-01-01

    Major causes of facial combat injuries include blasts, high-velocity/high-energy missiles, and low-velocity missiles. High-velocity bullets fired from assault rifles encompass special ballistic properties, creating a transient cavitation space with a small entrance wound and a much larger exit wound. There is no dispute regarding the fact that primary emergency treatment of ballistic injuries to the face commences in accordance with the current advanced trauma life support (ATLS) recommendations; the main areas in which disputes do exist concern the question of the timing, sequence, and modes of surgical treatment. The aim of the present study is to present the treatment outcome of high-velocity/high-energy gunshot injuries to the face, using a protocol based on the experience of a single level I trauma center. A group of 23 injured combat soldiers who sustained bullet and shrapnel injuries to the maxillofacial region during a 3-week regional military conflict were evaluated in this study. Nine patients met the inclusion criteria (high-velocity/high-energy injuries) and were included in the study. According to our protocol, upon arrival patients underwent endotracheal intubation and were hemodynamically stabilized in the shock-trauma unit and underwent total-body computed tomography with 3-D reconstruction of the head and neck and computed tomography angiography. All patients underwent maxillofacial surgery upon the day of arrival according to the protocol we present. In view of our treatment outcomes, results, and low complication rates, we conclude that strict adherence to a well-founded and structured treatment protocol based on clinical experience is mandatory in providing efficient, appropriate, and successful treatment to a relatively large group of patients who sustain various degrees of maxillofacial injuries during a short period of time. PMID:23449809

  16. Establishment of a rapid, inexpensive protocol for extraction of high quality RNA from small amounts of strawberry plant tissues and other recalcitrant fruit crops.

    PubMed

    Christou, Anastasis; Georgiadou, Egli C; Filippou, Panagiota; Manganaris, George A; Fotopoulos, Vasileios

    2014-03-01

    Strawberry plant tissues and particularly fruit material are rich in polysaccharides and polyphenolic compounds, thus rendering the isolation of nucleic acids a difficult task. This work describes the successful modification of a total RNA extraction protocol, which enables the isolation of high quantity and quality of total RNA from small amounts of strawberry leaf, root and fruit tissues. Reverse-transcription polymerase chain reaction (RT-PCR) amplification of GAPDH housekeeping gene from isolated RNA further supports the proposed protocol efficiency and its use for downstream molecular applications. This novel procedure was also successfully followed using other fruit tissues, such as olive and kiwifruit. In addition, optional treatment with RNase A following initial nucleic acid extraction can provide sufficient quality and quality of genomic DNA for subsequent PCR analyses, as evidenced from PCR amplification of housekeeping genes using extracted genomic DNA as template. Overall, this optimized protocol allows easy, rapid and economic isolation of high quality RNA from small amounts of an important fruit crop, such as strawberry, with extended applicability to other recalcitrant fruit crops. Copyright © 2013 Elsevier B.V. All rights reserved.

  17. Quantitative Assessment of In-solution Digestion Efficiency Identifies Optimal Protocols for Unbiased Protein Analysis*

    PubMed Central

    León, Ileana R.; Schwämmle, Veit; Jensen, Ole N.; Sprenger, Richard R.

    2013-01-01

    The majority of mass spectrometry-based protein quantification studies uses peptide-centric analytical methods and thus strongly relies on efficient and unbiased protein digestion protocols for sample preparation. We present a novel objective approach to assess protein digestion efficiency using a combination of qualitative and quantitative liquid chromatography-tandem MS methods and statistical data analysis. In contrast to previous studies we employed both standard qualitative as well as data-independent quantitative workflows to systematically assess trypsin digestion efficiency and bias using mitochondrial protein fractions. We evaluated nine trypsin-based digestion protocols, based on standard in-solution or on spin filter-aided digestion, including new optimized protocols. We investigated various reagents for protein solubilization and denaturation (dodecyl sulfate, deoxycholate, urea), several trypsin digestion conditions (buffer, RapiGest, deoxycholate, urea), and two methods for removal of detergents before analysis of peptides (acid precipitation or phase separation with ethyl acetate). Our data-independent quantitative liquid chromatography-tandem MS workflow quantified over 3700 distinct peptides with 96% completeness between all protocols and replicates, with an average 40% protein sequence coverage and an average of 11 peptides identified per protein. Systematic quantitative and statistical analysis of physicochemical parameters demonstrated that deoxycholate-assisted in-solution digestion combined with phase transfer allows for efficient, unbiased generation and recovery of peptides from all protein classes, including membrane proteins. This deoxycholate-assisted protocol was also optimal for spin filter-aided digestions as compared with existing methods. PMID:23792921

  18. A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation.

    PubMed

    Rahayu, Triana Mugia; Lee, Sang-Gon; Lee, Hoon-Jae

    2015-06-26

    The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.

  19. A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation

    PubMed Central

    Rahayu, Triana Mugia; Lee, Sang-Gon; Lee, Hoon-Jae

    2015-01-01

    The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both. PMID:26131669

  20. Energy Efficient Medium Access Control Protocol for Clustered Wireless Sensor Networks with Adaptive Cross-Layer Scheduling.

    PubMed

    Sefuba, Maria; Walingo, Tom; Takawira, Fambirai

    2015-09-18

    This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols.

  1. Energy Efficient Medium Access Control Protocol for Clustered Wireless Sensor Networks with Adaptive Cross-Layer Scheduling

    PubMed Central

    Sefuba, Maria; Walingo, Tom; Takawira, Fambirai

    2015-01-01

    This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols. PMID:26393608

  2. Chemoenzymatic Dynamic Kinetic Resolution: A Powerful Tool for the Preparation of Enantiomerically Pure Alcohols and Amines

    PubMed Central

    2015-01-01

    Chemoenzymatic dynamic kinetic resolution (DKR) constitutes a convenient and efficient method to access enantiomerically pure alcohol and amine derivatives. This Perspective highlights the work carried out within this field during the past two decades and pinpoints important avenues for future research. First, the Perspective will summarize the more developed area of alcohol DKR, by delineating the way from the earliest proof-of-concept protocols to the current state-of-the-art systems that allows for the highly efficient and selective preparation of a wide range of enantiomerically pure alcohol derivatives. Thereafter, the Perspective will focus on the more challenging DKR of amines, by presenting the currently available homogeneous and heterogeneous methods and their respective limitations. In these two parts, significant attention will be dedicated to the design of efficient racemization methods as an important means of developing milder DKR protocols. In the final part of the Perspective, a brief overview of the research that has been devoted toward improving enzymes as biocatalysts is presented. PMID:25730714

  3. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

    PubMed

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.

  4. Multi-Party Privacy-Preserving Set Intersection with Quasi-Linear Complexity

    NASA Astrophysics Data System (ADS)

    Cheon, Jung Hee; Jarecki, Stanislaw; Seo, Jae Hong

    Secure computation of the set intersection functionality allows n parties to find the intersection between their datasets without revealing anything else about them. An efficient protocol for such a task could have multiple potential applications in commerce, health care, and security. However, all currently known secure set intersection protocols for n>2 parties have computational costs that are quadratic in the (maximum) number of entries in the dataset contributed by each party, making secure computation of the set intersection only practical for small datasets. In this paper, we describe the first multi-party protocol for securely computing the set intersection functionality with both the communication and the computation costs that are quasi-linear in the size of the datasets. For a fixed security parameter, our protocols require O(n2k) bits of communication and Õ(n2k) group multiplications per player in the malicious adversary setting, where k is the size of each dataset. Our protocol follows the basic idea of the protocol proposed by Kissner and Song, but we gain efficiency by using different representations of the polynomials associated with users' datasets and careful employment of algorithms that interpolate or evaluate polynomials on multiple points more efficiently. Moreover, the proposed protocol is robust. This means that the protocol outputs the desired result even if some corrupted players leave during the execution of the protocol.

  5. A rapid and efficient in vitro regeneration system for lettuce (Lactuca sativa L.).

    PubMed

    Armas, Isabel; Pogrebnyak, Natalia; Raskin, Ilya

    2017-01-01

    Successful biotechnological improvement of crop plants requires a reliable and efficient in vitro regeneration system. Lettuce ( Lactuca sativa L.), one the most important vegetable crops worldwide, is strongly genotype-dependent in terms of regeneration capacity, limiting the potential for biotechnological improvement of cultivars which show recalcitrance under currently available protocols. The effect of different nutrient sources, plant hormone combinations and activated charcoal supplementation on shoot induction efficiency was evaluated on the cultivar 'RSL NFR', which had previously shown poor regeneration efficiency. Multiple shoot organogenesis from cotyledon explants was recorded at the highest frequency and speed on Murashige and Skoog regeneration medium supplemented with 200 mg/l of activated charcoal, 3% sucrose, 10 mg/l benzylaminopurine and 0.5 mg/l naphthaleneacetic acid, which induced shoots through direct regeneration in 90.8 ± 7.9% of explants. High shoot induction efficiency was also observed, albeit not quantified, when using this medium on some other cultivars. This activated charcoal-containing regeneration medium might offer a rapid and efficient option for direct shoot induction in some lettuce genotypes that do not respond well to common lettuce regeneration protocols. This is also the first report of the effect of activated charcoal in lettuce tissue culture.

  6. γ-Alumina Nanoparticle Catalyzed Efficient Synthesis of Highly Substituted Imidazoles.

    PubMed

    Reddy, Bandapalli Palakshi; Vijayakumar, Vijayaparthasarathi; Arasu, Mariadhas Valan; Al-Dhabi, Naif Abdullah

    2015-10-21

    γ-Alumina nano particle catalyzed multi component reaction of benzil, arylaldehyde and aryl amines afforded the highly substituted 1,2,4,5-tetraaryl imidazoles with good to excellent yield in less reaction time under the sonication as well as the conventional methods. Convenient operational simplicity, mild conditions and the reusability of catalyst were the other advantages of this developed protocol.

  7. A More Efficient Contextuality Distillation Protocol

    NASA Astrophysics Data System (ADS)

    Meng, Hui-xian; Cao, Huai-xin; Wang, Wen-hua; Fan, Ya-jing; Chen, Liang

    2018-03-01

    Based on the fact that both nonlocality and contextuality are resource theories, it is natural to ask how to amplify them more efficiently. In this paper, we present a contextuality distillation protocol which produces an n-cycle box B ∗ B ' from two given n-cycle boxes B and B '. It works efficiently for a class of contextual n-cycle ( n ≥ 4) boxes which we termed as "the generalized correlated contextual n-cycle boxes". For any two generalized correlated contextual n-cycle boxes B and B ', B ∗ B ' is more contextual than both B and B '. Moreover, they can be distilled toward to the maximally contextual box C H n as the times of iteration goes to infinity. Among the known protocols, our protocol has the strongest approximate ability and is optimal in terms of its distillation rate. What is worth noting is that our protocol can witness a larger set of nonlocal boxes that make communication complexity trivial than the protocol in Brunner and Skrzypczyk (Phys. Rev. Lett. 102, 160403 2009), this might be helpful for exploring the problem that why quantum nonlocality is limited.

  8. A More Efficient Contextuality Distillation Protocol

    NASA Astrophysics Data System (ADS)

    Meng, Hui-xian; Cao, Huai-xin; Wang, Wen-hua; Fan, Ya-jing; Chen, Liang

    2017-12-01

    Based on the fact that both nonlocality and contextuality are resource theories, it is natural to ask how to amplify them more efficiently. In this paper, we present a contextuality distillation protocol which produces an n-cycle box B ∗ B ' from two given n-cycle boxes B and B '. It works efficiently for a class of contextual n-cycle (n ≥ 4) boxes which we termed as "the generalized correlated contextual n-cycle boxes". For any two generalized correlated contextual n-cycle boxes B and B ', B ∗ B ' is more contextual than both B and B '. Moreover, they can be distilled toward to the maximally contextual box C H n as the times of iteration goes to infinity. Among the known protocols, our protocol has the strongest approximate ability and is optimal in terms of its distillation rate. What is worth noting is that our protocol can witness a larger set of nonlocal boxes that make communication complexity trivial than the protocol in Brunner and Skrzypczyk (Phys. Rev. Lett. 102, 160403 2009), this might be helpful for exploring the problem that why quantum nonlocality is limited.

  9. Environmental Technology Verification Coatings and Coating Equipment Program (ETV CCEP) High Transfer Efficiency Spray Equipment--Generic Verification Protocol

    EPA Science Inventory

    The Environmental Technology Verification (ETV) Program has been established by the U.S. Environmental Protection Agency (EPA) to verify the performance characteristics of innovative environmental technologies across all media and report this objective information to the states, ...

  10. Quantum Communication with a High-Rate Entangled Photon Source

    NASA Technical Reports Server (NTRS)

    Wilson, Nathaniel C.; Chaffee, Dalton W.; Lekki, John D.; Wilson, Jeffrey D.

    2016-01-01

    A high generation rate photon-pair source using a dual element periodically-poled potassium titanyl phosphate (PP KTP) waveguide is described. The photon-pair source features a high pair generation rate, a compact power-efficient package, and continuous wave (CW) or pulsed operation. Characterization and test results are presented. Details and preliminary results of a laboratory free-space QKD experiment with the B92 protocol are also presented.

  11. Utilization of paramagnetic microparticles for automated isolation of free circulating mRNA as a new tool in prostate cancer diagnostics.

    PubMed

    Fojtu, Michaela; Gumulec, Jaromir; Balvan, Jan; Raudenska, Martina; Sztalmachova, Marketa; Polanska, Hana; Smerkova, Kristyna; Adam, Vojtech; Kizek, Rene; Masarik, Michal

    2014-02-01

    Determination of serum mRNA gained a lot of attention in recent years, particularly from the perspective of disease markers. Streptavidin-modified paramagnetic particles (SMPs) seem an interesting technique, mainly due to possible automated isolation and high efficiency. The aim of this study was to optimize serum isolation protocol to reduce the consumption of chemicals and sample volume. The following factors were optimized: amounts of (i) paramagnetic particles, (ii) oligo(dT)20 probe, (iii) serum, and (iv) the binding sequence (SMPs, oligo(dT)20 , serum vs. oligo(dT)20 , serum and SMPs). RNA content was measured, and the expression of metallothionein-2A as possible prostate cancer marker was analyzed to demonstrate measurable RNA content with ability for RT-PCR detection. Isolation is possible on serum volume range (10-200 μL) without altering of efficiency or purity. Amount of SMPs can be reduced up to 5 μL, with optimal results within 10-30 μL SMPs. Volume of oligo(dT)20 does not affect efficiency, when used within 0.1-0.4 μL. This optimized protocol was also modified to fit needs of automated one-step single-tube analysis with identical efficiency compared to conventional setup. One-step analysis protocol is considered a promising simplification, making RNA isolation suitable for automatable process. © 2013 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  12. Application of an access technology delivery protocol to two children with cerebral palsy.

    PubMed

    Mumford, Leslie; Chau, Tom

    2015-07-14

    This study further delineates the merits and limitations of the Access Technology Delivery Protocol (ATDP) through its application to two children with severe disabilities. We conducted mixed methods case studies to demonstrate the ATDP with two children with no reliable means of access to an external device. Evaluations of response efficiency, satisfaction, goal attainment, technology use and participation were made after 8 and 16 weeks of training with custom access technologies. After 16 weeks, one child's switch offered improved response efficiency, high teacher satisfaction and increased participation. The other child's switch resulted in improved satisfaction and switch effectiveness but lower overall efficiency. The latter child was no longer using his switch by the end of the study. These contrasting findings indicate that changes to any contextual factors that may impact the user's switch performance should mandate a reassessment of the access pathway. Secondly, it is important to ensure that individuals who will be responsible for switch training be identified at the outset and engaged throughout the ATDP. Finally, the ATDP should continue to be tested with individuals with severe disabilities to build an evidence base for the delivery of response efficient access solutions. Implications for Rehabilitation A data-driven, comprehensive access technology delivery protocol for children with complex communication needs could help to mitigate technology abandonment. Successful adoption of an access technology requires personalized design, training of the technology user, the teaching staff, the caregivers and other communication partners, and integration with functional activities.

  13. Establishment of an efficient plant regeneration culture protocol and achievement of successful genetic transformation in Jatropha curcas L.

    PubMed

    Liu, Ying; Liu, Guoxuan; Yang, Yali; Niu, Sufang; Yang, Fuguang; Yang, Shaoxia; Tang, Jianian; Chen, Jianping

    2017-12-01

    An efficient and reproducible protocol is described for shoot-bud regeneration and Agrobacterium tumefaciens-mediated genetic transformation of J. curcas. Treating the explants with high concentrations (5-120 mg/L) of TDZ for short durations (5-80 min) before inoculation culture increased significantly the regeneration frequency and improved the quality of the regenerated buds. The highest shoot-buds induction rate (87.35%) was achieved when petiole explants were treated with 20 mg/L TDZ solution for 20 min and inoculated on hormone-free MS medium for 30 days. Regenerated shoots of 0.5 cm or a little longer were isolated and grafted to seedling stocks of the same species, and then the grafted plantlets were planted on half-strength MS medium containing 0.1 mg/L IBA and 2 mg/L sodium nitroprusside (SNP). This grafting strategy was found to be very effective, to obtain that healthy grafted plantlets ready for acclimatization within 20 days. By the above mentioned protocol and with general Agrobacterium - mediated genetic transformation methods only 65 days were needed to obtain intact transgenic plants.

  14. ACTS 118x: High Speed TCP Interoperability Testing

    NASA Technical Reports Server (NTRS)

    Brooks, David E.; Buffinton, Craig; Beering, Dave R.; Welch, Arun; Ivancic, William D.; Zernic, Mike; Hoder, Douglas J.

    1999-01-01

    With the recent explosion of the Internet and the enormous business opportunities available to communication system providers, great interest has developed in improving the efficiency of data transfer over satellite links using the Transmission Control Protocol (TCP) of the Internet Protocol (IP) suite. The NASA's ACTS experiments program initiated a series of TCP experiments to demonstrate scalability of TCP/IP and determine to what extent the protocol can be optimized over a 622 Mbps satellite link. Through partnerships with the government technology oriented labs, computer, telecommunication, and satellite industries NASA Glenn was able to: (1) promote the development of interoperable, high-performance TCP/IP implementations across multiple computing / operating platforms; (2) work with the satellite industry to answer outstanding questions regarding the use of standard protocols (TCP/IP and ATM) for the delivery of advanced data services, and for use in spacecraft architectures; and (3) conduct a series of TCP/IP interoperability tests over OC12 ATM over a satellite network in a multi-vendor environment using ACTS. The experiments' various network configurations and the results are presented.

  15. Multicast Delayed Authentication For Streaming Synchrophasor Data in the Smart Grid

    PubMed Central

    Câmara, Sérgio; Anand, Dhananjay; Pillitteri, Victoria; Carmo, Luiz

    2017-01-01

    Multicast authentication of synchrophasor data is challenging due to the design requirements of Smart Grid monitoring systems such as low security overhead, tolerance of lossy networks, time-criticality and high data rates. In this work, we propose inf -TESLA, Infinite Timed Efficient Stream Loss-tolerant Authentication, a multicast delayed authentication protocol for communication links used to stream synchrophasor data for wide area control of electric power networks. Our approach is based on the authentication protocol TESLA but is augmented to accommodate high frequency transmissions of unbounded length. inf TESLA protocol utilizes the Dual Offset Key Chains mechanism to reduce authentication delay and computational cost associated with key chain commitment. We provide a description of the mechanism using two different modes for disclosing keys and demonstrate its security against a man-in-the-middle attack attempt. We compare our approach against the TESLA protocol in a 2-day simulation scenario, showing a reduction of 15.82% and 47.29% in computational cost, sender and receiver respectively, and a cumulative reduction in the communication overhead. PMID:28736582

  16. Multicast Delayed Authentication For Streaming Synchrophasor Data in the Smart Grid.

    PubMed

    Câmara, Sérgio; Anand, Dhananjay; Pillitteri, Victoria; Carmo, Luiz

    2016-01-01

    Multicast authentication of synchrophasor data is challenging due to the design requirements of Smart Grid monitoring systems such as low security overhead, tolerance of lossy networks, time-criticality and high data rates. In this work, we propose inf -TESLA, Infinite Timed Efficient Stream Loss-tolerant Authentication, a multicast delayed authentication protocol for communication links used to stream synchrophasor data for wide area control of electric power networks. Our approach is based on the authentication protocol TESLA but is augmented to accommodate high frequency transmissions of unbounded length. inf TESLA protocol utilizes the Dual Offset Key Chains mechanism to reduce authentication delay and computational cost associated with key chain commitment. We provide a description of the mechanism using two different modes for disclosing keys and demonstrate its security against a man-in-the-middle attack attempt. We compare our approach against the TESLA protocol in a 2-day simulation scenario, showing a reduction of 15.82% and 47.29% in computational cost, sender and receiver respectively, and a cumulative reduction in the communication overhead.

  17. Embedding and Chemical Reactivation of Green Fluorescent Protein in the Whole Mouse Brain for Optical Micro-Imaging

    PubMed Central

    Gang, Yadong; Zhou, Hongfu; Jia, Yao; Liu, Ling; Liu, Xiuli; Rao, Gong; Li, Longhui; Wang, Xiaojun; Lv, Xiaohua; Xiong, Hanqing; Yang, Zhongqin; Luo, Qingming; Gong, Hui; Zeng, Shaoqun

    2017-01-01

    Resin embedding has been widely applied to fixing biological tissues for sectioning and imaging, but has long been regarded as incompatible with green fluorescent protein (GFP) labeled sample because it reduces fluorescence. Recently, it has been reported that resin-embedded GFP-labeled brain tissue can be imaged with high resolution. In this protocol, we describe an optimized protocol for resin embedding and chemical reactivation of fluorescent protein labeled mouse brain, we have used mice as experiment model, but the protocol should be applied to other species. This method involves whole brain embedding and chemical reactivation of the fluorescent signal in resin-embedded tissue. The whole brain embedding process takes a total of 7 days. The duration of chemical reactivation is ~2 min for penetrating 4 μm below the surface in the resin-embedded brain. This protocol provides an efficient way to prepare fluorescent protein labeled sample for high-resolution optical imaging. This kind of sample was demonstrated to be imaged by various optical micro-imaging methods. Fine structures labeled with GFP across a whole brain can be detected. PMID:28352214

  18. Design of efficient and simple interface testing equipment for opto-electric tracking system

    NASA Astrophysics Data System (ADS)

    Liu, Qiong; Deng, Chao; Tian, Jing; Mao, Yao

    2016-10-01

    Interface testing for opto-electric tracking system is one important work to assure system running performance, aiming to verify the design result of every electronic interface matching the communication protocols or not, by different levels. Opto-electric tracking system nowadays is more complicated, composed of many functional units. Usually, interface testing is executed between units manufactured completely, highly depending on unit design and manufacture progress as well as relative people. As a result, it always takes days or weeks, inefficiently. To solve the problem, this paper promotes an efficient and simple interface testing equipment for opto-electric tracking system, consisting of optional interface circuit card, processor and test program. The hardware cards provide matched hardware interface(s), easily offered from hardware engineer. Automatic code generation technique is imported, providing adaption to new communication protocols. Automatic acquiring items, automatic constructing code architecture and automatic encoding are used to form a new program quickly with adaption. After simple steps, a standard customized new interface testing equipment with matching test program and interface(s) is ready for a waiting-test system in minutes. The efficient and simple interface testing equipment for opto-electric tracking system has worked for many opto-electric tracking system to test entire or part interfaces, reducing test time from days to hours, greatly improving test efficiency, with high software quality and stability, without manual coding. Used as a common tool, the efficient and simple interface testing equipment for opto-electric tracking system promoted by this paper has changed traditional interface testing method and created much higher efficiency.

  19. The Simulation of Read-time Scalable Coherent Interface

    NASA Technical Reports Server (NTRS)

    Li, Qiang; Grant, Terry; Grover, Radhika S.

    1997-01-01

    Scalable Coherent Interface (SCI, IEEE/ANSI Std 1596-1992) (SCI1, SCI2) is a high performance interconnect for shared memory multiprocessor systems. In this project we investigate an SCI Real Time Protocols (RTSCI1) using Directed Flow Control Symbols. We studied the issues of efficient generation of control symbols, and created a simulation model of the protocol on a ring-based SCI system. This report presents the results of the study. The project has been implemented using SES/Workbench. The details that follow encompass aspects of both SCI and Flow Control Protocols, as well as the effect of realistic client/server processing delay. The report is organized as follows. Section 2 provides a description of the simulation model. Section 3 describes the protocol implementation details. The next three sections of the report elaborate on the workload, results and conclusions. Appended to the report is a description of the tool, SES/Workbench, used in our simulation, and internal details of our implementation of the protocol.

  20. ECS: efficient communication scheduling for underwater sensor networks.

    PubMed

    Hong, Lu; Hong, Feng; Guo, Zhongwen; Li, Zhengbao

    2011-01-01

    TDMA protocols have attracted a lot of attention for underwater acoustic sensor networks (UWSNs), because of the unique characteristics of acoustic signal propagation such as great energy consumption in transmission, long propagation delay and long communication range. Previous TDMA protocols all allocated transmission time to nodes based on discrete time slots. This paper proposes an efficient continuous time scheduling TDMA protocol (ECS) for UWSNs, including the continuous time based and sender oriented conflict analysis model, the transmission moment allocation algorithm and the distributed topology maintenance algorithm. Simulation results confirm that ECS improves network throughput by 20% on average, compared to existing MAC protocols.

  1. Geometric Heat Engines Featuring Power that Grows with Efficiency.

    PubMed

    Raz, O; Subaşı, Y; Pugatch, R

    2016-04-22

    Thermodynamics places a limit on the efficiency of heat engines, but not on their output power or on how the power and efficiency change with the engine's cycle time. In this Letter, we develop a geometrical description of the power and efficiency as a function of the cycle time, applicable to an important class of heat engine models. This geometrical description is used to design engine protocols that attain both the maximal power and maximal efficiency at the fast driving limit. Furthermore, using this method, we also prove that no protocol can exactly attain the Carnot efficiency at nonzero power.

  2. Generation of gene edited birds in one generation using sperm transfection assisted gene editing (STAGE).

    PubMed

    Cooper, Caitlin A; Challagulla, Arjun; Jenkins, Kristie A; Wise, Terry G; O'Neil, Terri E; Morris, Kirsten R; Tizard, Mark L; Doran, Timothy J

    2017-06-01

    Generating transgenic and gene edited mammals involves in vitro manipulation of oocytes or single cell embryos. Due to the comparative inaccessibility of avian oocytes and single cell embryos, novel protocols have been developed to produce transgenic and gene edited birds. While these protocols are relatively efficient, they involve two generation intervals before reaching complete somatic and germline expressing transgenic or gene edited birds. Most of this work has been done with chickens, and many protocols require in vitro culturing of primordial germ cells (PGCs). However, for many other bird species no methodology for long term culture of PGCs exists. Developing methodologies to produce germline transgenic or gene edited birds in the first generation would save significant amounts of time and resource. Furthermore, developing protocols that can be readily adapted to a wide variety of avian species would open up new research opportunities. Here we report a method using sperm as a delivery mechanism for gene editing vectors which we call sperm transfection assisted gene editing (STAGE). We have successfully used this method to generate GFP knockout embryos and chickens, as well as generate embryos with mutations in the doublesex and mab-3 related transcription factor 1 (DMRT1) gene using the CRISPR/Cas9 system. The efficiency of the method varies from as low as 0% to as high as 26% with multiple factors such as CRISPR guide efficiency and mRNA stability likely impacting the outcome. This straightforward methodology could simplify gene editing in many bird species including those for which no methodology currently exists.

  3. PR-PR: Cross-Platform Laboratory Automation System

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Linshiz, G; Stawski, N; Goyal, G

    To enable protocol standardization, sharing, and efficient implementation across laboratory automation platforms, we have further developed the PR-PR open-source high-level biology-friendly robot programming language as a cross-platform laboratory automation system. Beyond liquid-handling robotics, PR-PR now supports microfluidic and microscopy platforms, as well as protocol translation into human languages, such as English. While the same set of basic PR-PR commands and features are available for each supported platform, the underlying optimization and translation modules vary from platform to platform. Here, we describe these further developments to PR-PR, and demonstrate the experimental implementation and validation of PR-PR protocols for combinatorial modified Goldenmore » Gate DNA assembly across liquid-handling robotic, microfluidic, and manual platforms. To further test PR-PR cross-platform performance, we then implement and assess PR-PR protocols for Kunkel DNA mutagenesis and hierarchical Gibson DNA assembly for microfluidic and manual platforms.« less

  4. Advanced information processing system: Authentication protocols for network communication

    NASA Technical Reports Server (NTRS)

    Harper, Richard E.; Adams, Stuart J.; Babikyan, Carol A.; Butler, Bryan P.; Clark, Anne L.; Lala, Jaynarayan H.

    1994-01-01

    In safety critical I/O and intercomputer communication networks, reliable message transmission is an important concern. Difficulties of communication and fault identification in networks arise primarily because the sender of a transmission cannot be identified with certainty, an intermediate node can corrupt a message without certainty of detection, and a babbling node cannot be identified and silenced without lengthy diagnosis and reconfiguration . Authentication protocols use digital signature techniques to verify the authenticity of messages with high probability. Such protocols appear to provide an efficient solution to many of these problems. The objective of this program is to develop, demonstrate, and evaluate intercomputer communication architectures which employ authentication. As a context for the evaluation, the authentication protocol-based communication concept was demonstrated under this program by hosting a real-time flight critical guidance, navigation and control algorithm on a distributed, heterogeneous, mixed redundancy system of workstations and embedded fault-tolerant computers.

  5. Network, system, and status software enhancements for the autonomously managed electrical power system breadboard. Volume 2: Protocol specification

    NASA Technical Reports Server (NTRS)

    Mckee, James W.

    1990-01-01

    This volume (2 of 4) contains the specification, structured flow charts, and code listing for the protocol. The purpose of an autonomous power system on a spacecraft is to relieve humans from having to continuously monitor and control the generation, storage, and distribution of power in the craft. This implies that algorithms will have been developed to monitor and control the power system. The power system will contain computers on which the algorithms run. There should be one control computer system that makes the high level decisions and sends commands to and receive data from the other distributed computers. This will require a communications network and an efficient protocol by which the computers will communicate. One of the major requirements on the protocol is that it be real time because of the need to control the power elements.

  6. PR-PR: cross-platform laboratory automation system.

    PubMed

    Linshiz, Gregory; Stawski, Nina; Goyal, Garima; Bi, Changhao; Poust, Sean; Sharma, Monica; Mutalik, Vivek; Keasling, Jay D; Hillson, Nathan J

    2014-08-15

    To enable protocol standardization, sharing, and efficient implementation across laboratory automation platforms, we have further developed the PR-PR open-source high-level biology-friendly robot programming language as a cross-platform laboratory automation system. Beyond liquid-handling robotics, PR-PR now supports microfluidic and microscopy platforms, as well as protocol translation into human languages, such as English. While the same set of basic PR-PR commands and features are available for each supported platform, the underlying optimization and translation modules vary from platform to platform. Here, we describe these further developments to PR-PR, and demonstrate the experimental implementation and validation of PR-PR protocols for combinatorial modified Golden Gate DNA assembly across liquid-handling robotic, microfluidic, and manual platforms. To further test PR-PR cross-platform performance, we then implement and assess PR-PR protocols for Kunkel DNA mutagenesis and hierarchical Gibson DNA assembly for microfluidic and manual platforms.

  7. A Robust and Energy-Efficient Transport Protocol for Cognitive Radio Sensor Networks

    PubMed Central

    Salim, Shelly; Moh, Sangman

    2014-01-01

    A cognitive radio sensor network (CRSN) is a wireless sensor network in which sensor nodes are equipped with cognitive radio. CRSNs benefit from cognitive radio capabilities such as dynamic spectrum access and transmission parameters reconfigurability; but cognitive radio also brings additional challenges and leads to higher energy consumption. Motivated to improve the energy efficiency in CRSNs, we propose a robust and energy-efficient transport protocol (RETP). The novelties of RETP are two-fold: (I) it combines distributed channel sensing and channel decision with centralized schedule-based data transmission; and (II) it differentiates the types of data transmission on the basis of data content and adopts different acknowledgment methods for different transmission types. To the best of our knowledge, no transport layer protocols have yet been designed for CRSNs. Simulation results show that the proposed protocol achieves remarkably longer network lifetime and shorter event-detection delay compared to those achieved with a conventional transport protocol, while simultaneously preserving event-detection reliability. PMID:25333288

  8. TANDEM BIS-ALDOL REACTION OF KETONES: A FACILE ONE-POT SYNTHESIS OF 1,3-DIOXANES IN AQUEOUS MEDIUM

    EPA Science Inventory

    A novel tandem bis-aldol reaction of ketone with paraformaldehyde catalyzed by polystyrenesulfonic acid in aqueous medium delivers 1,3-dioxanes in high yield. This one pot, operationally simple microwave-assisted synthetic protocol proceeds efficiently in water in the absence of ...

  9. Mixing with microwaves: solvent-free and catalyst-free synthesis of pyrazoles and diazepines

    EPA Science Inventory

    A simple and facile condensation of hydrazines/hydrazides and diamines with 1,3-diketones/β-ketoester leads to the preparation of pyrazoles and diazepines in high yields. This eco-friendly protocol is accelerated by microwave heating and efficiently carried out without any r...

  10. Robust generation and expansion of skeletal muscle progenitors and myocytes from human pluripotent stem cells.

    PubMed

    Shelton, Michael; Kocharyan, Avetik; Liu, Jun; Skerjanc, Ilona S; Stanford, William L

    2016-05-15

    Human pluripotent stem cells provide a developmental model to study early embryonic and tissue development, tease apart human disease processes, perform drug screens to identify potential molecular effectors of in situ regeneration, and provide a source for cell and tissue based transplantation. Highly efficient differentiation protocols have been established for many cell types and tissues; however, until very recently robust differentiation into skeletal muscle cells had not been possible unless driven by transgenic expression of master regulators of myogenesis. Nevertheless, several breakthrough protocols have been published in the past two years that efficiently generate cells of the skeletal muscle lineage from pluripotent stem cells. Here, we present an updated version of our recently described 50-day protocol in detail, whereby chemically defined media are used to drive and support muscle lineage development from initial CHIR99021-induced mesoderm through to PAX7-expressing skeletal muscle progenitors and mature skeletal myocytes. Furthermore, we report an optional method to passage and expand differentiating skeletal muscle progenitors approximately 3-fold every 2weeks using Collagenase IV and continued FGF2 supplementation. Both protocols have been optimized using a variety of human pluripotent stem cell lines including patient-derived induced pluripotent stem cells. Taken together, our differentiation and expansion protocols provide sufficient quantities of skeletal muscle progenitors and myocytes that could be used for a variety of studies. Copyright © 2015 The Authors. Published by Elsevier Inc. All rights reserved.

  11. An empirical evaluation of lightweight random walk based routing protocol in duty cycle aware wireless sensor networks.

    PubMed

    Mian, Adnan Noor; Fatima, Mehwish; Khan, Raees; Prakash, Ravi

    2014-01-01

    Energy efficiency is an important design paradigm in Wireless Sensor Networks (WSNs) and its consumption in dynamic environment is even more critical. Duty cycling of sensor nodes is used to address the energy consumption problem. However, along with advantages, duty cycle aware networks introduce some complexities like synchronization and latency. Due to their inherent characteristics, many traditional routing protocols show low performance in densely deployed WSNs with duty cycle awareness, when sensor nodes are supposed to have high mobility. In this paper we first present a three messages exchange Lightweight Random Walk Routing (LRWR) protocol and then evaluate its performance in WSNs for routing low data rate packets. Through NS-2 based simulations, we examine the LRWR protocol by comparing it with DYMO, a widely used WSN protocol, in both static and dynamic environments with varying duty cycles, assuming the standard IEEE 802.15.4 in lower layers. Results for the three metrics, that is, reliability, end-to-end delay, and energy consumption, show that LRWR protocol outperforms DYMO in scalability, mobility, and robustness, showing this protocol as a suitable choice in low duty cycle and dense WSNs.

  12. Modifications in trypsin digestion protocol for increasing the efficiency and coverage.

    PubMed

    Syal, Kirtimaan; Tadala, Raghu

    2015-01-01

    Standard trypsin digestion protocol of proteins followed by MALDI-MS analysis has been realized as an important tool for the identification and characterization of proteins. In this article, we proposed the elimination of the step of 'staining/de-staining of gel pieces' in in-gel digestion protocol in order to improve the efficiency of trypsin digestion. Coomassie dye is known to interfere with digestion of proteins by trypsin and the procedure of staining-de-staining could result in loss of photoaffinity probe, post translational modifications and catalytic activities of enzymes. Further, we studied parameters like hydrophobicity and isoelectric point, and attempted to quantitatively relate it to the efficiency of trypsin digestion. We suggest that properties of proteins should be considered and trypsin digestion protocol should be appropriately modified as per sequence and other information.

  13. Energy metabolic state in hypothermically stored boar spermatozoa using a revised protocol for efficient ATP extraction.

    PubMed

    Nguyen, Quynh Thu; Wallner, Ulrike; Schmicke, Marion; Waberski, Dagmar; Henning, Heiko

    2016-11-15

    Mammalian spermatozoa utilize ATP as the energy source for key functions on the route to fertilization. ATP and its precursor nucleotides ADP and AMP are regularly investigated in sperm physiology studies, mostly by bioluminescence assays. Assay results vary widely, mainly due to different efficiencies in nucleotide extraction and prevention of their enzymatic degradation. Here, we describe a revised, validated protocol for efficient phosphatase inhibition and adenine nucleotide extraction resulting in consistently high ATP concentrations exceeding previously reported values for boar spermatozoa up to 20-fold. The revised assay is applicable for determining ATP concentrations and adenylate energy charge in extracts from fresh and frozen samples, thereby allowing simultaneous assessment of semen samples from long-term storage experiments. After validation, the assay was applied to liquid-preserved boar spermatozoa stored at 17°C and 5°C for 24 and 72 h. Cooling to 5°C, but not storage duration, reduced ATP concentration in spermatozoa (P<0.05), which was accompanied by the appearance of AMP and ADP in the preservation medium. ATP and energy charge were highly correlated to the proportion of membrane-intact spermatozoa, supporting the idea of nucleotides leaking through disrupted membranes in cold-shocked cells. The present assay allows highly standardized studies of energy metabolism in spermatozoa. © 2016. Published by The Company of Biologists Ltd.

  14. Energy metabolic state in hypothermically stored boar spermatozoa using a revised protocol for efficient ATP extraction

    PubMed Central

    Nguyen, Quynh Thu; Wallner, Ulrike; Schmicke, Marion; Waberski, Dagmar

    2016-01-01

    ABSTRACT Mammalian spermatozoa utilize ATP as the energy source for key functions on the route to fertilization. ATP and its precursor nucleotides ADP and AMP are regularly investigated in sperm physiology studies, mostly by bioluminescence assays. Assay results vary widely, mainly due to different efficiencies in nucleotide extraction and prevention of their enzymatic degradation. Here, we describe a revised, validated protocol for efficient phosphatase inhibition and adenine nucleotide extraction resulting in consistently high ATP concentrations exceeding previously reported values for boar spermatozoa up to 20-fold. The revised assay is applicable for determining ATP concentrations and adenylate energy charge in extracts from fresh and frozen samples, thereby allowing simultaneous assessment of semen samples from long-term storage experiments. After validation, the assay was applied to liquid-preserved boar spermatozoa stored at 17°C and 5°C for 24 and 72 h. Cooling to 5°C, but not storage duration, reduced ATP concentration in spermatozoa (P<0.05), which was accompanied by the appearance of AMP and ADP in the preservation medium. ATP and energy charge were highly correlated to the proportion of membrane-intact spermatozoa, supporting the idea of nucleotides leaking through disrupted membranes in cold-shocked cells. The present assay allows highly standardized studies of energy metabolism in spermatozoa. PMID:27612509

  15. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography

    PubMed Central

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.’s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.’s protocol and existing similar protocols. PMID:27163786

  16. Enhancement of Beaconless Location-Based Routing with Signal Strength Assistance for Ad-Hoc Networks

    NASA Astrophysics Data System (ADS)

    Chen, Guowei; Itoh, Kenichi; Sato, Takuro

    Routing in Ad-hoc networks is unreliable due to the mobility of the nodes. Location-based routing protocols, unlike other protocols which rely on flooding, excel in network scalability. Furthermore, new location-based routing protocols, like, e. g. BLR [1], IGF [2], & CBF [3] have been proposed, with the feature of not requiring beacons in MAC-layer, which improve more in terms of scalability. Such beaconless routing protocols can work efficiently in dense network areas. However, these protocols' algorithms have no ability to avoid from routing into sparse areas. In this article, historical signal strength has been added as a factor into the BLR algorithm, which avoids routing into sparse area, and consequently improves the global routing efficiency.

  17. Efficient preparation of shuffled DNA libraries through recombination (Gateway) cloning.

    PubMed

    Lehtonen, Soili I; Taskinen, Barbara; Ojala, Elina; Kukkurainen, Sampo; Rahikainen, Rolle; Riihimäki, Tiina A; Laitinen, Olli H; Kulomaa, Markku S; Hytönen, Vesa P

    2015-01-01

    Efficient and robust subcloning is essential for the construction of high-diversity DNA libraries in the field of directed evolution. We have developed a more efficient method for the subcloning of DNA-shuffled libraries by employing recombination cloning (Gateway). The Gateway cloning procedure was performed directly after the gene reassembly reaction, without additional purification and amplification steps, thus simplifying the conventional DNA shuffling protocols. Recombination-based cloning, directly from the heterologous reassembly reaction, conserved the high quality of the library and reduced the time required for the library construction. The described method is generally compatible for the construction of DNA-shuffled gene libraries. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  18. Energy-efficient and fast data gathering protocols for indoor wireless sensor networks.

    PubMed

    Tümer, Abdullah Erdal; Gündüz, Mesut

    2010-01-01

    Wireless Sensor Networks have become an important technology with numerous potential applications for the interaction of computers and the physical environment in civilian and military areas. In the routing protocols that are specifically designed for the applications used by sensor networks, the limited available power of the sensor nodes has been taken into consideration in order to extend the lifetime of the networks. In this paper, two protocols based on LEACH and called R-EERP and S-EERP with base and threshold values are presented. R-EERP and S-EERP are two efficient energy aware routing protocols that can be used for some critical applications such as detecting dangerous gases (methane, ammonium, carbon monoxide, etc.) in an indoor environment. In R-EERP, sensor nodes are deployed randomly in a field similar to LEACH. In S-EERP, nodes are deployed sequentially in the rooms of the flats of a multi-story building. In both protocols, nodes forming clusters do not change during a cluster change time, only the cluster heads change. Furthermore, an XOR operation is performed on the collected data in order to prevent the sending of the same data sensed by the nodes close to each other. Simulation results show that our proposed protocols are more energy-efficient than the conventional LEACH protocol.

  19. A survey on routing protocols for large-scale wireless sensor networks.

    PubMed

    Li, Changle; Zhang, Hanxiao; Hao, Binbin; Li, Jiandong

    2011-01-01

    With the advances in micro-electronics, wireless sensor devices have been made much smaller and more integrated, and large-scale wireless sensor networks (WSNs) based the cooperation among the significant amount of nodes have become a hot topic. "Large-scale" means mainly large area or high density of a network. Accordingly the routing protocols must scale well to the network scope extension and node density increases. A sensor node is normally energy-limited and cannot be recharged, and thus its energy consumption has a quite significant effect on the scalability of the protocol. To the best of our knowledge, currently the mainstream methods to solve the energy problem in large-scale WSNs are the hierarchical routing protocols. In a hierarchical routing protocol, all the nodes are divided into several groups with different assignment levels. The nodes within the high level are responsible for data aggregation and management work, and the low level nodes for sensing their surroundings and collecting information. The hierarchical routing protocols are proved to be more energy-efficient than flat ones in which all the nodes play the same role, especially in terms of the data aggregation and the flooding of the control packets. With focus on the hierarchical structure, in this paper we provide an insight into routing protocols designed specifically for large-scale WSNs. According to the different objectives, the protocols are generally classified based on different criteria such as control overhead reduction, energy consumption mitigation and energy balance. In order to gain a comprehensive understanding of each protocol, we highlight their innovative ideas, describe the underlying principles in detail and analyze their advantages and disadvantages. Moreover a comparison of each routing protocol is conducted to demonstrate the differences between the protocols in terms of message complexity, memory requirements, localization, data aggregation, clustering manner and other metrics. Finally some open issues in routing protocol design in large-scale wireless sensor networks and conclusions are proposed.

  20. A Survey on Routing Protocols for Large-Scale Wireless Sensor Networks

    PubMed Central

    Li, Changle; Zhang, Hanxiao; Hao, Binbin; Li, Jiandong

    2011-01-01

    With the advances in micro-electronics, wireless sensor devices have been made much smaller and more integrated, and large-scale wireless sensor networks (WSNs) based the cooperation among the significant amount of nodes have become a hot topic. “Large-scale” means mainly large area or high density of a network. Accordingly the routing protocols must scale well to the network scope extension and node density increases. A sensor node is normally energy-limited and cannot be recharged, and thus its energy consumption has a quite significant effect on the scalability of the protocol. To the best of our knowledge, currently the mainstream methods to solve the energy problem in large-scale WSNs are the hierarchical routing protocols. In a hierarchical routing protocol, all the nodes are divided into several groups with different assignment levels. The nodes within the high level are responsible for data aggregation and management work, and the low level nodes for sensing their surroundings and collecting information. The hierarchical routing protocols are proved to be more energy-efficient than flat ones in which all the nodes play the same role, especially in terms of the data aggregation and the flooding of the control packets. With focus on the hierarchical structure, in this paper we provide an insight into routing protocols designed specifically for large-scale WSNs. According to the different objectives, the protocols are generally classified based on different criteria such as control overhead reduction, energy consumption mitigation and energy balance. In order to gain a comprehensive understanding of each protocol, we highlight their innovative ideas, describe the underlying principles in detail and analyze their advantages and disadvantages. Moreover a comparison of each routing protocol is conducted to demonstrate the differences between the protocols in terms of message complexity, memory requirements, localization, data aggregation, clustering manner and other metrics. Finally some open issues in routing protocol design in large-scale wireless sensor networks and conclusions are proposed. PMID:22163808

  1. Highly efficient methods to obtain homogeneous dorsal neural progenitor cells from human and mouse embryonic stem cells and induced pluripotent stem cells.

    PubMed

    Zhang, Meixiang; Ngo, Justine; Pirozzi, Filomena; Sun, Ying-Pu; Wynshaw-Boris, Anthony

    2018-03-15

    Embryonic stem cells (ESCs) and induced pluripotent stem cells (iPSCs) have been widely used to generate cellular models harboring specific disease-related genotypes. Of particular importance are ESC and iPSC applications capable of producing dorsal telencephalic neural progenitor cells (NPCs) that are representative of the cerebral cortex and overcome the challenges of maintaining a homogeneous population of cortical progenitors over several passages in vitro. While previous studies were able to derive NPCs from pluripotent cell types, the fraction of dorsal NPCs in this population is small and decreases over several passages. Here, we present three protocols that are highly efficient in differentiating mouse and human ESCs, as well as human iPSCs, into a homogeneous and stable population of dorsal NPCs. These protocols will be useful for modeling cerebral cortical neurological and neurodegenerative disorders in both mouse and human as well as for high-throughput drug screening for therapeutic development. We optimized three different strategies for generating dorsal telencephalic NPCs from mouse and human pluripotent cell types through single or double inhibition of bone morphogenetic protein (BMP) and/or SMAD pathways. Mouse and human pluripotent cells were aggregated to form embryoid bodies in suspension and were treated with dorsomorphin alone (BMP inhibition) or combined with SB431542 (double BMP/SMAD inhibition) during neural induction. Neural rosettes were then selected from plated embryoid bodies to purify the population of dorsal NPCs. We tested the expression of key dorsal NPC markers as well as nonectodermal markers to confirm the efficiency of our three methods in comparison to published and commercial protocols. Single and double inhibition of BMP and/or SMAD during neural induction led to the efficient differentiation of dorsal NPCs, based on the high percentage of PAX6-positive cells and the NPC gene expression profile. There were no statistically significant differences in the variation of PAX6 and SOX1-positive NPCs between the two human pluripotent cell-derived methods; therefore, both methods are suitable for producing stable dorsal NPCs. When further differentiated into mature neurons, NPCs gave rise to a population of almost exclusively forebrain cortical neurons, confirming the dorsal fate commitment of the progenitors. The methods described in this study show improvements over previously published studies and are highly efficient at differentiating human and mouse pluripotent cell types into dorsal PAX6-positive NPCs and eventually into forebrain cortical neurons.

  2. College of American Pathologists Cancer Protocols: Optimizing Format for Accuracy and Efficiency.

    PubMed

    Strickland-Marmol, Leah B; Muro-Cacho, Carlos A; Barnett, Scott D; Banas, Matthew R; Foulis, Philip R

    2016-06-01

    -The data in College of American Pathologists cancer protocols have to be presented effectively to health care providers. There is no consensus on the format of those protocols, resulting in various designs among pathologists. Cancer protocols are independently created by site-specific experts, so there is inconsistent wording and repetition of data. This lack of standardization can be confusing and may lead to interpretation errors. -To define a synopsis format that is effective in delivering essential pathologic information and to evaluate the aesthetic appeal and the impact of varying format styles on the speed and accuracy of data extraction. -We queried individuals from several health care backgrounds using varying formats of the fallopian tube protocol of the College of American Pathologists without content modification to investigate their aesthetic appeal, accuracy, efficiency, and readability/complexity. Descriptive statistics, an item difficulty index, and 3 tests of readability were used. -Columned formats were aesthetically more appealing than justified formats (P < .001) and were associated with greater accuracy and efficiency. Incorrect assumptions were made about items not included in the protocol. Uniform wording and short sentences were associated with better performance by participants. -Based on these data, we propose standardized protocol formats for cancer resections of the fallopian tube and the more-familiar colon, employing headers, short phrases, and uniform terminology. This template can be easily and minimally modified for other sites, standardizing format and verbiage and increasing user accuracy and efficiency. Principles of human factors engineering should be considered in the display of patient data.

  3. Energy efficiency as a commodity: The emergence of a secondary market for efficiency savings in commercial buildings

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kats, G.H.; Rosenfield, A.H.; McIntosh, T.A.

    1997-06-01

    The energy efficiency industry is constrained by lack of financing. For example, in the United States, commercial and public buildings need an investment of $100 billion for cost-effective retrofits with an average payback of about four years. But the current level of financing is stagnant at only about 34% of this level per year. The U.S. Department of Energy (DOE) has led the development of the North American Energy Measurement and Verification Protocol (NEMVP). This Protocol will increase the reliability and quality of estimated efficiency savings and improve realized savings. A critical element in the development of low cost financingmore » and a secondary market--whether for homes or credit card debt--is the adoption of protocols to provide uniformity and reliability of the product. This is also true of energy efficiency installations, which have been characterized by inconsistency in the installation methodologies and, frequently, unreliability of savings. This Protocol, published in April 1996, is a DOE-led effort involving American Society of Heating, Refrigerating, and Air-Conditioning Engineers, Inc. ASHRAE, National Association of Energy Service Companies NAESCO, National Association of Regulatory Utility Commissioners NARUC, National Association of State Energy Officials NASEO, US Environmental Protection Agency EPA, Canada`s Canadian Association of Energy Service Companies CAESCO, and Mexico`s Comision Nacional Para El Ahorro De Energia CONAE and Fideicomiso De Apoyo Al Programa De Ahorro De Energia Del Sector Electrico FIDE. DOE has begun to build on this Protocol to develop new forms of lower-cost financing including, ultimately, development of a secondary market for energy efficiency. This could double financing for building energy efficiency within five years.« less

  4. ECS: Efficient Communication Scheduling for Underwater Sensor Networks

    PubMed Central

    Hong, Lu; Hong, Feng; Guo, Zhongwen; Li, Zhengbao

    2011-01-01

    TDMA protocols have attracted a lot of attention for underwater acoustic sensor networks (UWSNs), because of the unique characteristics of acoustic signal propagation such as great energy consumption in transmission, long propagation delay and long communication range. Previous TDMA protocols all allocated transmission time to nodes based on discrete time slots. This paper proposes an efficient continuous time scheduling TDMA protocol (ECS) for UWSNs, including the continuous time based and sender oriented conflict analysis model, the transmission moment allocation algorithm and the distributed topology maintenance algorithm. Simulation results confirm that ECS improves network throughput by 20% on average, compared to existing MAC protocols. PMID:22163775

  5. In vivo evaluation of the effect of stimulus distribution on FIR statistical efficiency in event-related fMRI

    PubMed Central

    Jansma, J Martijn; de Zwart, Jacco A; van Gelderen, Peter; Duyn, Jeff H; Drevets, Wayne C; Furey, Maura L

    2013-01-01

    Technical developments in MRI have improved signal to noise, allowing use of analysis methods such as Finite impulse response (FIR) of rapid event related functional MRI (er-fMRI). FIR is one of the most informative analysis methods as it determines onset and full shape of the hemodynamic response function (HRF) without any a-priori assumptions. FIR is however vulnerable to multicollinearity, which is directly related to the distribution of stimuli over time. Efficiency can be optimized by simplifying a design, and restricting stimuli distribution to specific sequences, while more design flexibility necessarily reduces efficiency. However, the actual effect of efficiency on fMRI results has never been tested in vivo. Thus, it is currently difficult to make an informed choice between protocol flexibility and statistical efficiency. The main goal of this study was to assign concrete fMRI signal to noise values to the abstract scale of FIR statistical efficiency. Ten subjects repeated a perception task with five random and m-sequence based protocol, with varying but, according to literature, acceptable levels of multicollinearity. Results indicated substantial differences in signal standard deviation, while the level was a function of multicollinearity. Experiment protocols varied up to 55.4% in standard deviation. Results confirm that quality of fMRI in an FIR analysis can significantly and substantially vary with statistical efficiency. Our in vivo measurements can be used to aid in making an informed decision between freedom in protocol design and statistical efficiency. PMID:23473798

  6. Cooling Tower (Evaporative Cooling System) Measurement and Verification Protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kurnik, Charles W.; Boyd, Brian; Stoughton, Kate M.

    This measurement and verification (M and V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings resulting from water conservation measures (WCMs) in energy performance contracts associated with cooling tower efficiency projects. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M and V plan, and details the procedures to use to determine water savings.

  7. Outdoor Irrigation Measurement and Verification Protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kurnik, Charles W.; Stoughton, Kate M.; Figueroa, Jorge

    This measurement and verification (M&V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings resulting from water conservation measures (WCMs) in energy performance contracts associated with outdoor irrigation efficiency projects. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M&V plan, and details the procedures to use to determine water savings.

  8. Research on IPv6 intrusion detection system Snort-based

    NASA Astrophysics Data System (ADS)

    Shen, Zihao; Wang, Hui

    2010-07-01

    This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.

  9. An siRNA-based method for efficient silencing of gene expression in mature brown adipocytes.

    PubMed

    Isidor, Marie S; Winther, Sally; Basse, Astrid L; Petersen, M Christine H; Cannon, Barbara; Nedergaard, Jan; Hansen, Jacob B

    2016-01-01

    Brown adipose tissue is a promising therapeutic target for opposing obesity, glucose intolerance and insulin resistance. The ability to modulate gene expression in mature brown adipocytes is important to understand brown adipocyte function and delineate novel regulatory mechanisms of non-shivering thermogenesis. The aim of this study was to optimize a lipofection-based small interfering RNA (siRNA) transfection protocol for efficient silencing of gene expression in mature brown adipocytes. We determined that a critical parameter was to deliver the siRNA to mature adipocytes by reverse transfection, i.e. transfection of non-adherent cells. Using this protocol, we effectively knocked down both high- and low-abundance transcripts in a model of mature brown adipocytes (WT-1) as well as in primary mature mouse brown adipocytes. A functional consequence of the knockdown was confirmed by an attenuated increase in uncoupled respiration (thermogenesis) in response to β-adrenergic stimulation of mature WT-1 brown adipocytes transfected with uncoupling protein 1 siRNA. Efficient gene silencing was also obtained in various mouse and human white adipocyte models (3T3-L1, primary mouse white adipocytes, hMADS) with the ability to undergo "browning." In summary, we report an easy and versatile reverse siRNA transfection protocol to achieve specific silencing of gene expression in various models of mature brown and browning-competent white adipocytes, including primary cells.

  10. iTunes song-gifting is a low-cost, efficient recruitment tool to engage high-risk MSM in internet research.

    PubMed

    Holland, Christine M; Ritchie, Natalie D; Du Bois, Steve N

    2015-10-01

    This brief report describes methodology and results of a novel, efficient, and low-cost recruitment tool to engage high-risk MSM in online research. We developed an incentivization protocol using iTunes song-gifting to encourage participation of high-risk MSM in an Internet-based survey of HIV status, childhood sexual abuse, and adult behavior and functioning. Our recruitment methodology yielded 489 participants in 4.5 months at a total incentive cost of $1.43USD per participant. The sample comprised a critically high-risk group of MSM, including 71.0 % who reported recent condomless anal intercourse. We offer a "how-to" guide to aid future investigators in using iTunes song-gifting incentives.

  11. Highly efficient transformation system for Malassezia furfur and Malassezia pachydermatis using Agrobacterium tumefaciens-mediated transformation.

    PubMed

    Celis, A M; Vos, A M; Triana, S; Medina, C A; Escobar, N; Restrepo, S; Wösten, H A B; de Cock, H

    2017-03-01

    Malassezia spp. are part of the normal human and animal mycobiota but are also associated with a variety of dermatological diseases. The absence of a transformation system hampered studies to reveal mechanisms underlying the switch from the non-pathogenic to pathogenic life style. Here we describe, a highly efficient Agrobacterium-mediated genetic transformation system for Malassezia furfur and M. pachydermatis. A binary T-DNA vector with the hygromycin B phosphotransferase (hpt) selection marker and the green fluorescent protein gene (gfp) was introduced in M. furfur and M. pachydermatis by combining the transformation protocols of Agaricus bisporus and Cryptococcus neoformans. Optimal temperature and co-cultivation time for transformation were 5 and 7days at 19°C and 24°C, respectively. Transformation efficiency was 0.75-1.5% for M. furfur and 0.6-7.5% for M. pachydermatis. Integration of the hpt resistance cassette and gfp was verified using PCR and fluorescence microscopy, respectively. The T-DNA was mitotically stable in approximately 80% of the transformants after 10 times sub-culturing in the absence of hygromycin. Improving transformation protocols contribute to study the biology and pathophysiology of Malassezia. Copyright © 2017 The Authors. Published by Elsevier B.V. All rights reserved.

  12. Efficient entanglement distillation without quantum memory.

    PubMed

    Abdelkhalek, Daniela; Syllwasschy, Mareike; Cerf, Nicolas J; Fiurášek, Jaromír; Schnabel, Roman

    2016-05-31

    Entanglement distribution between distant parties is an essential component to most quantum communication protocols. Unfortunately, decoherence effects such as phase noise in optical fibres are known to demolish entanglement. Iterative (multistep) entanglement distillation protocols have long been proposed to overcome decoherence, but their probabilistic nature makes them inefficient since the success probability decays exponentially with the number of steps. Quantum memories have been contemplated to make entanglement distillation practical, but suitable quantum memories are not realised to date. Here, we present the theory for an efficient iterative entanglement distillation protocol without quantum memories and provide a proof-of-principle experimental demonstration. The scheme is applied to phase-diffused two-mode-squeezed states and proven to distil entanglement for up to three iteration steps. The data are indistinguishable from those that an efficient scheme using quantum memories would produce. Since our protocol includes the final measurement it is particularly promising for enhancing continuous-variable quantum key distribution.

  13. Efficient entanglement distillation without quantum memory

    PubMed Central

    Abdelkhalek, Daniela; Syllwasschy, Mareike; Cerf, Nicolas J.; Fiurášek, Jaromír; Schnabel, Roman

    2016-01-01

    Entanglement distribution between distant parties is an essential component to most quantum communication protocols. Unfortunately, decoherence effects such as phase noise in optical fibres are known to demolish entanglement. Iterative (multistep) entanglement distillation protocols have long been proposed to overcome decoherence, but their probabilistic nature makes them inefficient since the success probability decays exponentially with the number of steps. Quantum memories have been contemplated to make entanglement distillation practical, but suitable quantum memories are not realised to date. Here, we present the theory for an efficient iterative entanglement distillation protocol without quantum memories and provide a proof-of-principle experimental demonstration. The scheme is applied to phase-diffused two-mode-squeezed states and proven to distil entanglement for up to three iteration steps. The data are indistinguishable from those that an efficient scheme using quantum memories would produce. Since our protocol includes the final measurement it is particularly promising for enhancing continuous-variable quantum key distribution. PMID:27241946

  14. On the designing of a tamper resistant prescription RFID access control system.

    PubMed

    Safkhani, Masoumeh; Bagheri, Nasour; Naderi, Majid

    2012-12-01

    Recently, Chen et al. have proposed a novel tamper resistant prescription RFID access control system, published in the Journal of Medical Systems. In this paper we consider the security of the proposed protocol and identify some existing weaknesses. The main attack is a reader impersonation attack which allows an active adversary to impersonate a legitimate doctor, e.g. the patient's doctor, to access the patient's tag and change the patient prescription. The presented attack is quite efficient. To impersonate a doctor, the adversary should eavesdrop one session between the doctor and the patient's tag and then she can impersonate the doctor with the success probability of '1'. In addition, we present efficient reader-tag to back-end database impersonation, de-synchronization and traceability attacks against the protocol. Finally, we propose an improved version of protocol which is more efficient compared to the original protocol while provides the desired security against the presented attacks.

  15. Thiolation mediated pegylation platform to generate functional universal red blood cells.

    PubMed

    Nacharaju, Parimala; Manjula, Belur N; Acharya, Seetharama A

    2007-01-01

    The PEGylation that adds an extension arm on protein amino groups with the conservation of their positive charge masks the A and D antigens of erythrocytes efficiently. In the present study, the efficiency of masking the antigens of RBC by PEGylation protocols that do not conserve the charge with and without adding extension arms is compared. The conjugation of PEG-5000 to RBCs through the addition of extension arms masked the D antigen more efficiently than the other protocol. A combination of PEG-5 K and PEG-20 K is needed to mask the A antigen, irrespective of the PEGylation approach. The oxygen affinity of the PEGylated RBCs increased by the extension arm facilitated PEGylation. The protocol involving the conjugation of PEG-chains without adding extension arm did not alter the oxygen affinity of RBCs. A combination of PEGylation protocols is an alternate strategy to generate universal red blood cells with good levels of oxygen affinity.

  16. A Concurrent Multiple Negotiation Protocol Based on Colored Petri Nets.

    PubMed

    Niu, Lei; Ren, Fenghui; Zhang, Minjie; Bai, Quan

    2017-11-01

    Concurrent multiple negotiation (CMN) provides a mechanism for an agent to simultaneously conduct more than one negotiation. There may exist different interdependency relationships among these negotiations and these interdependency relationships can impact the outcomes of these negotiations. The outcomes of these concurrent negotiations contribute together for the agent to achieve an overall negotiation goal. Handling a CMN while considering interdependency relationships among multiple negotiations is a challenging research problem. This paper: 1) comprehensively highlights research problems of negotiations at concurrent negotiation level; 2) provides a graph-based CMN model with consideration of the interdependency relationships; and 3) proposes a colored Petri net-based negotiation protocol for conducting CMNs. With the proposed protocol, a CMN can be efficiently and concurrently processed and negotiation agreements can be efficiently achieved. Experimental results indicate the effectiveness and efficiency of the proposed protocol in terms of the negotiation success rate, the negotiation time and the negotiation outcome.

  17. An energy-efficient data gathering protocol in large wireless sensor network

    NASA Astrophysics Data System (ADS)

    Wang, Yamin; Zhang, Ruihua; Tao, Shizhong

    2006-11-01

    Wireless sensor network consisting of a large number of small sensors with low-power transceiver can be an effective tool for gathering data in a variety of environment. The collected data must be transmitted to the base station for further processing. Since a network consists of sensors with limited battery energy, the method for data gathering and routing must be energy efficient in order to prolong the lifetime of the network. In this paper, we presented an energy-efficient data gathering protocol in wireless sensor network. The new protocol used data fusion technology clusters nodes into groups and builds a chain among the cluster heads according to a hybrid of the residual energy and distance to the base station. Results in stochastic geometry are used to derive the optimum parameter of our algorithm that minimizes the total energy spent in the network. Simulation results show performance superiority of the new protocol.

  18. An Efficient Metadynamics-Based Protocol To Model the Binding Affinity and the Transition State Ensemble of G-Protein-Coupled Receptor Ligands.

    PubMed

    Saleh, Noureldin; Ibrahim, Passainte; Saladino, Giorgio; Gervasio, Francesco Luigi; Clark, Timothy

    2017-05-22

    A generally applicable metadynamics scheme for predicting the free energy profile of ligand binding to G-protein-coupled receptors (GPCRs) is described. A common and effective collective variable (CV) has been defined using the ideally placed and highly conserved Trp6.48 as a reference point for ligand-GPCR distance measurement and the common orientation of GPCRs in the cell membrane. Using this single CV together with well-tempered multiple-walker metadynamics with a funnel-like boundary allows an efficient exploration of the entire ligand binding path from the extracellular medium to the orthosteric binding site, including vestibule and intermediate sites. The protocol can be used with X-ray structures or high-quality homology models (based on a high-quality template and after thorough refinement) for the receptor and is universally applicable to agonists, antagonists, and partial and reverse agonists. The root-mean-square error (RMSE) in predicted binding free energies for 12 diverse ligands in five receptors (a total of 23 data points) is surprisingly small (less than 1 kcal mol -1 ). The RMSEs for simulations that use receptor X-ray structures and homology models are very similar.

  19. Easi-CRISPR for creating knock-in and conditional knockout mouse models using long ssDNA donors.

    PubMed

    Miura, Hiromi; Quadros, Rolen M; Gurumurthy, Channabasavaiah B; Ohtsuka, Masato

    2018-01-01

    CRISPR/Cas9-based genome editing can easily generate knockout mouse models by disrupting the gene sequence, but its efficiency for creating models that require either insertion of exogenous DNA (knock-in) or replacement of genomic segments is very poor. The majority of mouse models used in research involve knock-in (reporters or recombinases) or gene replacement (e.g., conditional knockout alleles containing exons flanked by LoxP sites). A few methods for creating such models have been reported that use double-stranded DNA as donors, but their efficiency is typically 1-10% and therefore not suitable for routine use. We recently demonstrated that long single-stranded DNAs (ssDNAs) serve as very efficient donors, both for insertion and for gene replacement. We call this method efficient additions with ssDNA inserts-CRISPR (Easi-CRISPR) because it is a highly efficient technology (efficiency is typically 30-60% and reaches as high as 100% in some cases). The protocol takes ∼2 months to generate the founder mice.

  20. Two-party quantum key agreement with five-particle entangled states

    NASA Astrophysics Data System (ADS)

    He, Ye-Feng; Ma, Wen-Ping

    A two-party quantum key agreement protocol is proposed with five-particle entangled states and the delayed measurement technique. According to the measurement correlation property of five-particle entangled states, two participants can deduce the measurement results of each other’s initial quantum states. As a result, two parties can extract the secret keys of each other by using the publicly announced value or by performing the delayed measurement, respectively. Thus, a shared key is fairly established. Since each particle is transmitted only once in quantum channel, the protocol is congenitally free from the Trojan horse attacks. It is shown that the protocol not only is secure against both participant and outsider attacks but also has no information leakage problem. Moreover, it has high qubit efficiency.

  1. A modified error correction protocol for CCITT signalling system no. 7 on satellite links

    NASA Astrophysics Data System (ADS)

    Kreuer, Dieter; Quernheim, Ulrich

    1991-10-01

    Comite Consultatif International des Telegraphe et Telephone (CCITT) Signalling System No. 7 (SS7) provides a level 2 error correction protocol particularly suited for links with propagation delays higher than 15 ms. Not being originally designed for satellite links, however, the so called Preventive Cyclic Retransmission (PCR) Method only performs well on satellite channels when traffic is low. A modified level 2 error control protocol, termed Fix Delay Retransmission (FDR) method is suggested which performs better at high loads, thus providing a more efficient use of the limited carrier capacity. Both the PCR and the FDR methods are investigated by means of simulation and results concerning throughput, queueing delay, and system delay, respectively. The FDR method exhibits higher capacity and shorter delay than the PCR method.

  2. Packet-Based Protocol Efficiency for Aeronautical and Satellite Communications

    NASA Technical Reports Server (NTRS)

    Carek, David A.

    2005-01-01

    This paper examines the relation between bit error ratios and the effective link efficiency when transporting data with a packet-based protocol. Relations are developed to quantify the impact of a protocol s packet size and header size relative to the bit error ratio of the underlying link. These relations are examined in the context of radio transmissions that exhibit variable error conditions, such as those used in satellite, aeronautical, and other wireless networks. A comparison of two packet sizing methodologies is presented. From these relations, the true ability of a link to deliver user data, or information, is determined. Relations are developed to calculate the optimal protocol packet size forgiven link error characteristics. These relations could be useful in future research for developing an adaptive protocol layer. They can also be used for sizing protocols in the design of static links, where bit error ratios have small variability.

  3. A Novel Re-keying Function Protocol (NRFP) For Wireless Sensor Network Security

    PubMed Central

    Abdullah, Maan Younis; Hua, Gui Wei; Alsharabi, Naif

    2008-01-01

    This paper describes a novel re-keying function protocol (NRFP) for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs), covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding innetwork processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks. PMID:27873963

  4. A Novel Re-keying Function Protocol (NRFP) For Wireless Sensor Network Security.

    PubMed

    Abdullah, Maan Younis; Hua, Gui Wei; Alsharabi, Naif

    2008-12-04

    This paper describes a novel re-keying function protocol (NRFP) for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs), covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding in-network processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks.

  5. Optimization of Agrobacterium-Mediated Transformation in Soybean.

    PubMed

    Li, Shuxuan; Cong, Yahui; Liu, Yaping; Wang, Tingting; Shuai, Qin; Chen, Nana; Gai, Junyi; Li, Yan

    2017-01-01

    High transformation efficiency is a prerequisite for study of gene function and molecular breeding. Agrobacterium tumefaciens -mediated transformation is a preferred method in many plants. However, the transformation efficiency in soybean is still low. The objective of this study is to optimize Agrobacterium -mediated transformation in soybean by improving the infection efficiency of Agrobacterium and regeneration efficiency of explants. Firstly, four factors affecting Agrobacterium infection efficiency were investigated by estimation of the rate of GUS transient expression in soybean cotyledonary explants, including Agrobacterium concentrations, soybean explants, Agrobacterium suspension medium, and co-cultivation time. The results showed that an infection efficiency of over 96% was achieved by collecting the Agrobacterium at a concentration of OD 650 = 0.6, then using an Agrobacterium suspension medium containing 154.2 mg/L dithiothreitol to infect the half-seed cotyledonary explants (from mature seeds imbibed for 1 day), and co-cultured them for 5 days. The Agrobacterium infection efficiencies for soybean varieties Jack Purple and Tianlong 1 were higher than the other six varieties. Secondly, the rates of shoot elongation were compared among six different concentration combinations of gibberellic acid (GA 3 ) and indole-3-acetic acid (IAA). The shoot elongation rate of 34 and 26% was achieved when using the combination of 1.0 mg/L GA 3 and 0.1 mg/L IAA for Jack Purple and Tianlong 1, respectively. This rate was higher than the other five concentration combinations of GA 3 and IAA, with an 18 and 11% increase over the original laboratory protocol (a combination of 0.5 mg/L GA 3 and 0.1 mg/L IAA), respectively. The transformation efficiency was 7 and 10% for Jack Purple and Tianlong 1 at this optimized hormone concentration combination, respectively, which was 2 and 6% higher than the original protocol, respectively. Finally, GUS histochemical staining, PCR, herbicide (glufosinate) painting, and QuickStix Kit for Liberty Link ( bar ) were used to verify the positive transgenic plants, and absolute quantification PCR confirmed the exogenous gene existed as one to three copies in the soybean genome. This study provides an improved protocol for Agrobacterium -mediated transformation in soybean and a useful reference to improve the transformation efficiency in other plant species.

  6. An access technology delivery protocol for children with severe and multiple disabilities: a case demonstration.

    PubMed

    Mumford, Leslie; Lam, Rachel; Wright, Virginia; Chau, Tom

    2014-08-01

    This study applied response efficiency theory to create the Access Technology Delivery Protocol (ATDP), a child and family-centred collaborative approach to the implementation of access technologies. We conducted a descriptive, mixed methods case study to demonstrate the ATDP method with a 12-year-old boy with no reliable means of access to an external device. Evaluations of response efficiency, satisfaction, goal attainment, technology use and participation were made after 8 and 16 weeks of training with a custom smile-based access technology. At the 16 week mark, the new access technology offered better response quality; teacher satisfaction was high; average technology usage was 3-4 times per week for up to 1 h each time; switch sensitivity and specificity reached 78% and 64%, respectively, and participation scores increased by 38%. This case supports further development and testing of the ATDP with additional children with multiple or severe disabilities.

  7. Electroencephalography for children with autistic spectrum disorder: a sedation protocol.

    PubMed

    Keidan, Ilan; Ben-Menachem, Erez; Tzadok, Michal; Ben-Zeev, Bruria; Berkenstadt, Haim

    2015-02-01

    To report the effectiveness and efficiency of a predetermined sedation protocol for providing sedation for electroencephalograph (EEG) studies in children with autism. Sleep EEG has been advocated for the majority of children with autism spectrum disorder. In most cases, sedation is required to allow adequate studies. Most sedation drugs have negative effects on the EEG pattern. The sedation protocol we adopted included chloral hydrate, dexmedetomidine, and ketamine and was evaluated prospectively for 2 years. One hundred and eighty-three children with autistic spectrum disorder were sedated with the described drug protocol that was efficient, provided adequate EEG readings, and was not associated with serious adverse events. Our protocol kept costs to a minimum but provided appropriate escalation in care when required. © 2014 John Wiley & Sons Ltd.

  8. Development of an efficient regeneration and transformation method for the new potential oilseed crop Lepidium campestre

    PubMed Central

    2013-01-01

    Background Lepidium campestre is an undomesticated oilseed species with a great potential to become a new crop for both food and industrial feedstocks production. Genetic modification is needed for further improving the oil quantity and quality of Lepidium. Studies on in vitro shoot regeneration of Lepidium are very limited and there is no transformation protocol available. Results We have investigated the effects of different factors, especially the type, concentration and combination of plant growth regulators (PGRs) on in vitro shoot regeneration of Lepidium. The results showed that the 2,4-D treatment was crucial to shoot regeneration from different explants. The duration of 2,4-D exposure between 2-4 days did not show significant difference in shoot regeneration, while the effect of 2,4-D concentration varied greatly depending on the type of explants and cytokinins used, for example, the low concentration of 2,4-D combined with TDZ significantly increased the regeneration frequency of hypocotyls. Cotyledon and hypocotyl explants responded differently to cytokinin, for example, TDZ was more effective than zeatin in promoting shoot regeneration from hypocotyls, but did not affect the regeneration of cotyledons which was more affected by high concentration of zeatin. The results also showed that NAA was not effective for shoot regeneration. Germination in light increased the regeneration frequency compared to that in dark. After optimization of the different conditions, an efficient regeneration protocol was developed with the regeneration efficiency of 92.7%. Using this protocol, the transformation frequency of 6% in average was achieved. The presence of transgenes in the transgenic lines was confirmed by GUS staining, PCR and Southern blot analyses. Conclusion Through systematic investigation of important factors affecting in vitro shoot regeneration, we have developed an efficient regeneration and transformation protocol for the genetic modification of Lepidium campestre. The method may also be applied to the related species. PMID:23937221

  9. An Improved System for Generation of Diploid Cloned Porcine Embryos Using Induced Pluripotent Stem Cells Synchronized to Metaphase.

    PubMed

    Kim, Eunhye; Zheng, Zhong; Jeon, Yubyeol; Jin, Yong-Xun; Hwang, Seon-Ung; Cai, Lian; Lee, Chang-Kyu; Kim, Nam-Hyung; Hyun, Sang-Hwan

    2016-01-01

    Pigs provide outstanding models of human genetic diseases due to their striking similarities with human anatomy, physiology and genetics. Although transgenic pigs have been produced using genetically modified somatic cells and nuclear transfer (SCNT), the cloning efficiency was extremely low. Here, we report an improved method to produce diploid cloned embryos from porcine induced pluripotent stem cells (piPSCs), which were synchronized to the G2/M stage using a double blocking method with aphidicolin and nocodazole. The efficiency of this synchronization method on our piPSC lines was first tested. Then, we modified our traditional SCNT protocol to find a workable protocol. In particular, the removal of a 6DMAP treatment post-activation enhanced the extrusion rate of pseudo-second-polar bodies (p2PB) (81.3% vs. 15.8%, based on peak time, 4hpa). Moreover, an immediate activation method yielded significantly more blastocysts than delayed activation (31.3% vs. 16.0%, based on fused embryos). The immunofluorescent results confirmed the effect of the 6DMAP treatment removal, showing remarkable p2PB extrusion during a series of nuclear transfer procedures. The reconstructed embryos from metaphase piPSCs with our modified protocol demonstrated normal morphology at 2-cell, 4-cell and blastocyst stages and a high rate of normal karyotype. This study demonstrated a new and efficient way to produce viable cloned embryos from piPSCs when synchronized to the G2/M phase of the cell cycle, which may lead to opportunities to produce cloned pigs from piPSCs more efficiently.

  10. CRISPR/Cas9-Directed Gene Editing for the Generation of Loss-of-Function Mutants in High-Throughput Zebrafish F0 Screens.

    PubMed

    Shankaran, Sunita S; Dahlem, Timothy J; Bisgrove, Brent W; Yost, H Joseph; Tristani-Firouzi, Martin

    2017-07-05

    The ability to perform reverse genetics in the zebrafish model organism has been greatly advanced with the advent of the CRISPR (clustered regularly interspaced short palindromic repeats)/Cas9 (CRISPR-associated) system. The high level of efficiency in generating mutations when using the CRISPR/Cas9 system combined with the rapid generation time of the zebrafish model organism has made the possibility of performing F 0 screens in this organism a reality. This unit describes a detailed protocol for performing an F 0 screen using the CRISPR/Cas9 system in zebrafish starting with the design and production of custom CRISPR/Cas9 reagents for injection. Next, two approaches for determining the efficiency of mutation induction by the custom CRISPR/Cas9 reagents that are easily performed using standard molecular biology protocols are detailed. Finally, screening for F 0 induced phenotypes using the zebrafish flh gene as an example is discussed. © 2017 by John Wiley & Sons, Inc. Copyright © 2017 John Wiley & Sons, Inc.

  11. The Use of Efficient Broadcast Protocols in Asynchronous Distributed Systems. Ph.D. Thesis

    NASA Technical Reports Server (NTRS)

    Schmuck, Frank Bernhard

    1988-01-01

    Reliable broadcast protocols are important tools in distributed and fault-tolerant programming. They are useful for sharing information and for maintaining replicated data in a distributed system. However, a wide range of such protocols has been proposed. These protocols differ in their fault tolerance and delivery ordering characteristics. There is a tradeoff between the cost of a broadcast protocol and how much ordering it provides. It is, therefore, desirable to employ protocols that support only a low degree of ordering whenever possible. This dissertation presents techniques for deciding how strongly ordered a protocol is necessary to solve a given application problem. It is shown that there are two distinct classes of application problems: problems that can be solved with efficient, asynchronous protocols, and problems that require global ordering. The concept of a linearization function that maps partially ordered sets of events to totally ordered histories is introduced. How to construct an asynchronous implementation that solves a given problem if a linearization function for it can be found is shown. It is proved that in general the question of whether a problem has an asynchronous solution is undecidable. Hence there exists no general algorithm that would automatically construct a suitable linearization function for a given problem. Therefore, an important subclass of problems that have certain commutativity properties are considered. Techniques for constructing asynchronous implementations for this class are presented. These techniques are useful for constructing efficient asynchronous implementations for a broad range of practical problems.

  12. A simplified field protocol for genetic sampling of birds using buccal swabs

    USGS Publications Warehouse

    Vilstrup, Julia T.; Mullins, Thomas D.; Miller, Mark P.; McDearman, Will; Walters, Jeffrey R.; Haig, Susan M.

    2018-01-01

    DNA sampling is an essential prerequisite for conducting population genetic studies. For many years, blood sampling has been the preferred method for obtaining DNA in birds because of their nucleated red blood cells. Nonetheless, use of buccal swabs has been gaining favor because they are less invasive yet still yield adequate amounts of DNA for amplifying mitochondrial and nuclear markers; however, buccal swab protocols often include steps (e.g., extended air-drying and storage under frozen conditions) not easily adapted to field settings. Furthermore, commercial extraction kits and swabs for buccal sampling can be expensive for large population studies. We therefore developed an efficient, cost-effective, and field-friendly protocol for sampling wild birds after comparing DNA yield among 3 inexpensive buccal swab types (2 with foam tips and 1 with a cotton tip). Extraction and amplification success was high (100% and 97.2% respectively) using inexpensive generic swabs. We found foam-tipped swabs provided higher DNA yields than cotton-tipped swabs. We further determined that omitting a drying step and storing swabs in Longmire buffer increased efficiency in the field while still yielding sufficient amounts of DNA for detailed population genetic studies using mitochondrial and nuclear markers. This new field protocol allows time- and cost-effective DNA sampling of juveniles or small-bodied birds for which drawing blood may cause excessive stress to birds and technicians alike.

  13. Neuromodulating Attention and Mind-Wandering Processes with a Single Session Real Time EEG.

    PubMed

    Gonçalves, Óscar F; Carvalho, Sandra; Mendes, Augusto J; Leite, Jorge; Boggio, Paulo S

    2018-06-01

    Our minds are continuously alternating between external attention (EA) and mind wandering (MW). An appropriate balance between EA and MW is important for promoting efficient perceptual processing, executive functioning, decision-making, auto-biographical memory, and creativity. There is evidence that EA processes are associated with increased activity in high-frequency EEG bands (e.g., SMR), contrasting with the dominance of low-frequency bands during MW (e.g., Theta). The aim of the present study was to test the effects of two distinct single session real-time EEG (rtEEG) protocols (SMR up-training/Theta down-training-SMR⇑Theta⇓; Theta up-training/SMR down-training-Theta⇑SMR⇓) on EA and MW processes. Thirty healthy volunteers were randomly assigned to one of two rtEEG training protocols (SMR⇑Theta⇓; Theta⇑SMR⇓). Before and after the rtEEG training, participants completed the attention network task (ANT) along with several MW measures. Both training protocols were effective in increasing SMR (SMR⇑Theta⇓) and theta (Theta⇑SMR⇓) amplitudes but not in decreasing the amplitude of down-trained bands. There were no significant effects of the rtEEG training in either EA or MW measures. However, there was a significant positive correlation between post-training SMR increases and the use of deliberate MW (rather than spontaneous) strategies. Additionally, for the Theta⇑SMR⇓ protocol, increase in post-training Theta amplitude was significantly associated with a decreased efficiency in the orientation network.

  14. Biobanking of patient and patient-derived xenograft ovarian tumour tissue: efficient preservation with low and high fetal calf serum based methods.

    PubMed

    Alkema, Nicolette G; Tomar, Tushar; Duiker, Evelien W; Jan Meersma, Gert; Klip, Harry; van der Zee, Ate G J; Wisman, G Bea A; de Jong, Steven

    2015-10-06

    Using patient-derived xenografts (PDXs) for preclinical cancer research demands proper storage of tumour material to facilitate logistics and to reduce the number of animals needed. We successfully established 45 subcutaneous ovarian cancer PDXs, reflecting all histological subtypes, with an overall take rate of 68%. Corresponding cells from mouse replaced human tumour stromal and endothelial cells in second generation PDXs as demonstrated with mouse-specific vimentin and CD31 immunohistochemical staining. For biobanking purposes two cryopreservation methods, a fetal calf serum (FCS)-based (95%v/v) "FCS/DMSO" protocol and a low serum-based (10%v/v) "vitrification" protocol were tested. After primary cryopreservation, tumour take rates were 38% and 67% using either the vitrification or FCS/DMSO-based cryopreservation protocol, respectively. Cryopreserved tumour tissue of established PDXs achieved take rates of 67% and 94%, respectively compared to 91% using fresh PDX tumour tissue. Genotyping analysis showed that no changes in copy number alterations were introduced by any of the biobanking methods. Our results indicate that both protocols can be used for biobanking of ovarian tumour and PDX tissues. However, FCS/DMSO-based cryopreservation is more successful. Moreover, primary engraftment of fresh patient-derived tumours in mice followed by freezing tissue of successfully established PDXs is the preferred way of efficient ovarian cancer PDX biobanking.

  15. Transfection using DEAE-dextran.

    PubMed

    Selden, R F

    2001-05-01

    Two protocols for DEAE-dextran transfection of cells are provided in this unit. The Basic Protocol describes a procedure used to transfect adherent cells and the first Alternate Protocol presents a method used to transfect suspension cells. If an increase in transfection efficiency is needed, cells can be treated with chloroquine as described in the second Alternate Protocol.

  16. Communications protocol

    NASA Technical Reports Server (NTRS)

    Zhou, Xiaoming (Inventor); Baras, John S. (Inventor)

    2010-01-01

    The present invention relates to an improved communications protocol which increases the efficiency of transmission in return channels on a multi-channel slotted Alohas system by incorporating advanced error correction algorithms, selective retransmission protocols and the use of reserved channels to satisfy the retransmission requests.

  17. Sweet Potato [Ipomoea batatas (L.) Lam].

    PubMed

    Song, Guo-qing; Yamaguchi, Ken-ichi

    2006-01-01

    Among the available transformation methods reported on sweet potato, Agrobacterium tumefaciens-mediated transformation is more successful and desirable. Stem explants have shown to be ideal for the transformation of sweet potato because of their ready availability as explants, the simple transformation process, and high-frequency-regeneration via somatic embryogenesis. Under the two-step kanamycin-hygromycin selection method and using the appropriate explants type (stem explants), the efficiency of transformation can be considerably improved in cv. Beniazuma. The high efficiency in the transformation of stem explants suggests that the transformation protocol described in this chapter warrants testing for routine stable transformation of diverse varieties of sweet potato.

  18. Asynchronous Message Service Reference Implementation

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.

    2011-01-01

    This software provides a library of middleware functions with a simple application programming interface, enabling implementation of distributed applications in conformance with the CCSDS AMS (Consultative Committee for Space Data Systems Asynchronous Message Service) specification. The AMS service, and its protocols, implement an architectural concept under which the modules of mission systems may be designed as if they were to operate in isolation, each one producing and consuming mission information without explicit awareness of which other modules are currently operating. Communication relationships among such modules are self-configuring; this tends to minimize complexity in the development and operations of modular data systems. A system built on this model is a society of generally autonomous, inter-operating modules that may fluctuate freely over time in response to changing mission objectives, modules functional upgrades, and recovery from individual module failure. The purpose of AMS, then, is to reduce mission cost and risk by providing standard, reusable infrastructure for the exchange of information among data system modules in a manner that is simple to use, highly automated, flexible, robust, scalable, and efficient. The implementation is designed to spawn multiple threads of AMS functionality under the control of an AMS application program. These threads enable all members of an AMS-based, distributed application to discover one another in real time, subscribe to messages on specific topics, and to publish messages on specific topics. The query/reply (client/server) communication model is also supported. Message exchange is optionally subject to encryption (to support confidentiality) and authorization. Fault tolerance measures in the discovery protocol minimize the likelihood of overall application failure due to any single operational error anywhere in the system. The multi-threaded design simplifies processing while enabling application nodes to operate at high speeds; linked lists protected by mutex semaphores and condition variables are used for efficient, inter-thread communication. Applications may use a variety of transport protocols underlying AMS itself, including TCP (Transmission Control Protocol), UDP (User Datagram Protocol), and message queues.

  19. Rapid whole-brain resting-state fMRI at 3 T: Efficiency-optimized three-dimensional EPI versus repetition time-matched simultaneous-multi-slice EPI.

    PubMed

    Stirnberg, Rüdiger; Huijbers, Willem; Brenner, Daniel; Poser, Benedikt A; Breteler, Monique; Stöcker, Tony

    2017-12-01

    State-of-the-art simultaneous-multi-slice (SMS-)EPI and 3D-EPI share several properties that benefit functional MRI acquisition. Both sequences employ equivalent parallel imaging undersampling with controlled aliasing to achieve high temporal sampling rates. As a volumetric imaging sequence, 3D-EPI offers additional means of acceleration complementary to 2D-CAIPIRINHA sampling, such as fast water excitation and elliptical sampling. We performed an application-oriented comparison between a tailored, six-fold CAIPIRINHA-accelerated 3D-EPI protocol at 530 ms temporal and 2.4 mm isotropic spatial resolution and an SMS-EPI protocol with identical spatial and temporal resolution for whole-brain resting-state fMRI at 3 T. The latter required eight-fold slice acceleration to compensate for the lack of elliptical sampling and fast water excitation. Both sequences used vendor-supplied on-line image reconstruction. We acquired test/retest resting-state fMRI scans in ten volunteers, with simultaneous acquisition of cardiac and respiration data, subsequently used for optional physiological noise removal (nuisance regression). We found that the 3D-EPI protocol has significantly increased temporal signal-to-noise ratio throughout the brain as compared to the SMS-EPI protocol, especially when employing motion and nuisance regression. Both sequence types reliably identified known functional networks with stronger functional connectivity values for the 3D-EPI protocol. We conclude that the more time-efficient 3D-EPI primarily benefits from reduced parallel imaging noise due to a higher, actual k-space sampling density compared to SMS-EPI. The resultant BOLD sensitivity increase makes 3D-EPI a valuable alternative to SMS-EPI for whole-brain fMRI at 3 T, with voxel sizes well below 3 mm isotropic and sampling rates high enough to separate dominant cardiac signals from BOLD signals in the frequency domain. Copyright © 2017 Elsevier Inc. All rights reserved.

  20. A versatile system for rapid multiplex genome-edited CAR T cell generation

    PubMed Central

    Ren, Jiangtao; Zhang, Xuhua; Liu, Xiaojun; Fang, Chongyun; Jiang, Shuguang; June, Carl H.; Zhao, Yangbing

    2017-01-01

    The therapeutic potential of CRISPR system has already been demonstrated in many instances and begun to overlap with the rapidly expanding field of cancer immunotherapy, especially on the production of genetically modified T cell receptor or chimeric antigen receptor (CAR) T cells. Efficient genomic disruption of multiple gene loci to generate universal donor cells, as well as potent effector T cells resistant to multiple inhibitory pathways such as PD-1 and CTLA4 is an attractive strategy for cell therapy. In this study, we accomplished rapid and efficient multiplex genomic editing, and re-directing T cells with antigen specific CAR via a one-shot CRISPR protocol by incorporation of multiple gRNAs in a CAR lentiviral vector. High efficient double knockout of endogenous TCR and HLA class I could be easily achieved to generate allogeneic universal CAR T cells. We also generated Fas-resistant universal CAR T cells by triple gene disruption. Simultaneous gene editing of four gene loci using the one-shot CRISPR protocol to generate allogeneic universal T cells deficient of both PD1 and CTLA-4 was also attempted. PMID:28199983

  1. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shah, Nihar K.; Wei, Max; Letschert, Virginie

    Hydrofluorocarbons (HFCs) emitted from uses such as refrigerants and thermal insulating foam, are now the fastest growing greenhouse gases (GHGs), with global warming potentials (GWP) thousands of times higher than carbon dioxide (CO2). Because of the short lifetime of these molecules in the atmosphere,1 mitigating the amount of these short-lived climate pollutants (SLCPs) provides a faster path to climate change mitigation than control of CO2 alone. This has led to proposals from Africa, Europe, India, Island States, and North America to amend the Montreal Protocol on Substances that Deplete the Ozone Layer (Montreal Protocol) to phase-down high-GWP HFCs. Simultaneously, energymore » efficiency market transformation programs such as standards, labeling and incentive programs are endeavoring to improve the energy efficiency for refrigeration and air conditioning equipment to provide life cycle cost, energy, GHG, and peak load savings. In this paper we provide an estimate of the magnitude of such GHG and peak electric load savings potential, for room air conditioning, if the refrigerant transition and energy efficiency improvement policies are implemented either separately or in parallel.« less

  2. Design and development of compact monitoring system for disaster remote health centres.

    PubMed

    Santhi, S; Sadasivam, G S

    2015-02-01

    To enhance speedy communication between the patient and the doctor through newly proposed routing protocol at the mobile node. The proposed model is applied for a telemedicine application during disaster recovery management. In this paper, Energy Efficient Link Stability Routing Protocol (EELSRP) has been developed by simulation and real time. This framework is designed for the immediate healing of affected persons in remote areas, especially at the time of the disaster where there is no hospital proximity. In case of disasters, there might be an outbreak of infectious diseases. In such cases, the patient's medical record is also transferred by the field operator from disaster place to the hospital to facilitate the identification of the disease-causing agent and to prescribe the necessary medication. The heterogeneous networking framework provides reliable, energy efficientand speedy communication between the patient and the doctor using the proposed routing protocol at the mobile node. The performance of the simulation and real time versions of the Energy Efficient Link Stability Routing Protocol (EELSRP) protocol has been analyzed. Experimental results prove the efficiency of the real-time version of EESLRP protocol. The packet delivery ratio and throughput of the real time version of EELSRP protocol is increased by 3% and 10%, respectively, when compared to the simulated version of EELSRP. The end-to-end delay and energy consumption are reduced by 10% and 2% in the real time version of EELSRP.

  3. Enhancing Endosomal Escape of Transduced Proteins by Photochemical Internalisation

    PubMed Central

    Mellert, Kevin; Lamla, Markus; Scheffzek, Klaus; Wittig, Rainer; Kaufmann, Dieter

    2012-01-01

    Induced internalisation of functional proteins into cultured cells has become an important aspect in a rising number of in vitro and in vivo assays. The endo-lysosomal entrapment of the transduced proteins remains the major problem in all transduction protocols. In this study we compared the efficiency, cytotoxicity and protein targeting of different commercially available transduction reagents by transducing a well-studied fluorescently labelled protein (Atto488-bovine serum albumin) into cultured human sarcoma cells. The amount of internalised protein and toxicity differed between the different reagents, but the percentage of transduced cells was consistently high. Furthermore, in all protocols the signals of the transduced Atto488-BSA were predominantly punctual consistent with an endosomal localisation. To overcome the endosomal entrapment, the transduction protocols were combined with a photochemical internalisation (PCI) treatment. Using this combination revealed that an endosomal disruption is highly effective in cell penetrating peptide (CPP) mediated transduction, whereas lipid-mediated transductions lead to a lower signal spreading throughout the cytosol. No change in the signal distribution could be achieved in treatments using non-lipid polymers as a transduction reagent. Therefore, the combination of protein transduction protocols based on CPPs with the endosomolytic treatment PCI can facilitate protein transduction experiments in vitro. PMID:23285056

  4. Enhancing endosomal escape of transduced proteins by photochemical internalisation.

    PubMed

    Mellert, Kevin; Lamla, Markus; Scheffzek, Klaus; Wittig, Rainer; Kaufmann, Dieter

    2012-01-01

    Induced internalisation of functional proteins into cultured cells has become an important aspect in a rising number of in vitro and in vivo assays. The endo-lysosomal entrapment of the transduced proteins remains the major problem in all transduction protocols. In this study we compared the efficiency, cytotoxicity and protein targeting of different commercially available transduction reagents by transducing a well-studied fluorescently labelled protein (Atto488-bovine serum albumin) into cultured human sarcoma cells. The amount of internalised protein and toxicity differed between the different reagents, but the percentage of transduced cells was consistently high. Furthermore, in all protocols the signals of the transduced Atto488-BSA were predominantly punctual consistent with an endosomal localisation. To overcome the endosomal entrapment, the transduction protocols were combined with a photochemical internalisation (PCI) treatment. Using this combination revealed that an endosomal disruption is highly effective in cell penetrating peptide (CPP) mediated transduction, whereas lipid-mediated transductions lead to a lower signal spreading throughout the cytosol. No change in the signal distribution could be achieved in treatments using non-lipid polymers as a transduction reagent. Therefore, the combination of protein transduction protocols based on CPPs with the endosomolytic treatment PCI can facilitate protein transduction experiments in vitro.

  5. Improved cryoEM-Guided Iterative Molecular Dynamics–Rosetta Protein Structure Refinement Protocol for High Precision Protein Structure Prediction

    PubMed Central

    2016-01-01

    Many excellent methods exist that incorporate cryo-electron microscopy (cryoEM) data to constrain computational protein structure prediction and refinement. Previously, it was shown that iteration of two such orthogonal sampling and scoring methods – Rosetta and molecular dynamics (MD) simulations – facilitated exploration of conformational space in principle. Here, we go beyond a proof-of-concept study and address significant remaining limitations of the iterative MD–Rosetta protein structure refinement protocol. Specifically, all parts of the iterative refinement protocol are now guided by medium-resolution cryoEM density maps, and previous knowledge about the native structure of the protein is no longer necessary. Models are identified solely based on score or simulation time. All four benchmark proteins showed substantial improvement through three rounds of the iterative refinement protocol. The best-scoring final models of two proteins had sub-Ångstrom RMSD to the native structure over residues in secondary structure elements. Molecular dynamics was most efficient in refining secondary structure elements and was thus highly complementary to the Rosetta refinement which is most powerful in refining side chains and loop regions. PMID:25883538

  6. A protocol for the delivery of cannabidiol (CBD) and combined CBD and ∆9-tetrahydrocannabinol (THC) by vaporisation

    PubMed Central

    2014-01-01

    Background Significant interest has emerged in the therapeutic and interactive effects of different cannabinoids. Cannabidiol (CBD) has been shown to have anxiolytic and antipsychotic effects with high doses administered orally. We report a series of studies conducted to determine the vaporisation efficiency of high doses of CBD, alone and in combination with ∆9-tetrahydrocannabinol (THC), to achieve faster onset effects in experimental and clinical trials and emulate smoked cannabis. Methods Purified THC and CBD (40 mg/ml and 100 mg/ml respectively) were loaded onto a liquid absorbing pad in a Volcano® vaporiser, vaporised and the vapours quantitatively analysed. Preliminary studies determined 200 mg CBD to be the highest dose effectively vaporised at 230°C, yielding an availability of approximately 40% in the vapour phase. Six confirmatory studies examined the quantity of each compound delivered when 200 mg or 4 mg CBD was loaded together with 8 mg of THC. Results THC showed 55% availability when vaporised alone or with low dose CBD, while large variation in the availability of high dose CBD impacted upon the availability of THC when co-administered, with each compound affecting the vaporisation efficiency of the other in a dynamic and dose-dependent manner. We describe optimised protocols that enable delivery of 160 mg CBD through vaporisation. Conclusions While THC administration by vaporisation is increasingly adopted in experimental studies, often with oral predosing with CBD to examine interactive effects, no studies to date have reported the administration of CBD by vaporisation. We report the detailed methodology aimed at optimising the efficiency of delivery of therapeutic doses of CBD, alone and in combination with THC, by vaporisation. These protocols provide a technical advance that may inform methodology for clinical trials in humans, especially for examining interactions between THC and CBD and for therapeutic applications of CBD. Trial registration Current Controlled Trials ISRCTN24109245 PMID:25319497

  7. A protocol for the delivery of cannabidiol (CBD) and combined CBD and ∆9-tetrahydrocannabinol (THC) by vaporisation.

    PubMed

    Solowij, Nadia; Broyd, Samantha J; van Hell, Hendrika H; Hazekamp, Arno

    2014-10-16

    Significant interest has emerged in the therapeutic and interactive effects of different cannabinoids. Cannabidiol (CBD) has been shown to have anxiolytic and antipsychotic effects with high doses administered orally. We report a series of studies conducted to determine the vaporisation efficiency of high doses of CBD, alone and in combination with ∆9-tetrahydrocannabinol (THC), to achieve faster onset effects in experimental and clinical trials and emulate smoked cannabis. Purified THC and CBD (40 mg/ml and 100 mg/ml respectively) were loaded onto a liquid absorbing pad in a Volcano vaporiser, vaporised and the vapours quantitatively analysed. Preliminary studies determined 200 mg CBD to be the highest dose effectively vaporised at 230 ° C, yielding an availability of approximately 40% in the vapour phase. Six confirmatory studies examined the quantity of each compound delivered when 200 mg or 4 mg CBD was loaded together with 8 mg of THC. THC showed 55% availability when vaporised alone or with low dose CBD, while large variation in the availability of high dose CBD impacted upon the availability of THC when co-administered, with each compound affecting the vaporisation efficiency of the other in a dynamic and dose-dependent manner. We describe optimised protocols that enable delivery of 160 mg CBD through vaporisation. While THC administration by vaporisation is increasingly adopted in experimental studies, often with oral predosing with CBD to examine interactive effects, no studies to date have reported the administration of CBD by vaporisation. We report the detailed methodology aimed at optimising the efficiency of delivery of therapeutic doses of CBD, alone and in combination with THC, by vaporisation. These protocols provide a technical advance that may inform methodology for clinical trials in humans, especially for examining interactions between THC and CBD and for therapeutic applications of CBD. Current Controlled Trials ISRCTN24109245.

  8. Non-adiabatic quantum state preparation and quantum state transport in chains of Rydberg atoms

    NASA Astrophysics Data System (ADS)

    Ostmann, Maike; Minář, Jiří; Marcuzzi, Matteo; Levi, Emanuele; Lesanovsky, Igor

    2017-12-01

    Motivated by recent progress in the experimental manipulation of cold atoms in optical lattices, we study three different protocols for non-adiabatic quantum state preparation and state transport in chains of Rydberg atoms. The protocols we discuss are based on the blockade mechanism between atoms which, when excited to a Rydberg state, interact through a van der Waals potential, and rely on single-site addressing. Specifically, we discuss protocols for efficient creation of an antiferromagnetic GHZ state, a class of matrix product states including a so-called Rydberg crystal and for the state transport of a single-qubit quantum state between two ends of a chain of atoms. We identify system parameters allowing for the operation of the protocols on timescales shorter than the lifetime of the Rydberg states while yielding high fidelity output states. We discuss the effect of positional disorder on the resulting states and comment on limitations due to other sources of noise such as radiative decay of the Rydberg states. The proposed protocols provide a testbed for benchmarking the performance of quantum information processing platforms based on Rydberg atoms.

  9. Capping the cost of compliance with the Kyoto Protocol and recycling revenues into land-use projects.

    PubMed

    Schlamadinger, B; Obersteiner, M; Michaelowa, A; Grubb, M; Azar, C; Yamagata, Y; Goldberg, D; Read, P; Kirschbaum, M U; Fearnside, P M; Sugiyama, T; Rametsteiner, E; Böswald, K

    2001-07-14

    There is the concern among some countries that compliance costs with commitments under the Kyoto Protocol may be unacceptably high. There is also the concern that technical difficulties with the inclusion of land use, land-use change, and forestry activities in non-Annex I countries might lead to an effective exclusion of such activities from consideration under the Protocol. This paper is proposing a mechanism that addresses both these concerns. In essence, it is suggested that parties should be able to purchase fixed-price offset certificates if they feel they cannot achieve compliance through other means alone, such as by improved energy efficiency, increased use of renewable energy, or use of the flexible mechanisms in the Kyoto Protocol. These offset certificates would act as a price cap for the cost of compliance for any party to the Protocol. Revenues from purchase of the offset certificates would be directed to forest-based activities in non-Annex I countries such as forest protection that may carry multiple benefits including enhancing net carbon sequestration.

  10. Establishment of an efficient in vitro regeneration protocol for rapid and mass propagation of Dendrobium chrysotoxum Lindl. using seed culture.

    PubMed

    Nongdam, Potshangbam; Tikendra, Leimapokpam

    2014-01-01

    An efficient in vitro regeneration protocol from seed culture has been established successfully for Dendrobium chrysotoxum, an epiphytic orchid having tremendous ornamental and medicinal values. Seed germination response was encouraging in Mitra (M) medium enriched with different combinations of auxins and cytokinins. Medium supplemented with 0.4% activated charcoal (AC), 2 mg/L 6-benzyl amino purine (BAP), and 2 mg/L indole-3-acetic acid (IAA) produced best seed germination percentage in 2 weeks of culture. Incorporation of higher concentration of kinetin (KN) or BAP in combination with low auxin in medium induced pronounced shooting and leaf formation. Reduction in leaf development was evident when cytokinins exist singly in medium indicating synergistic effect of auxin and cytokinin in leaf induction. Presence of elevated level of indole-3-butyric acid (IBA) or 1-naphthalene acetic acid (NAA) with low cytokinin content in medium generated more in vitro rooting, though IBA was found to be more effective in rooting induction as compared to NAA. The in vitro protocol for asymbiotic seed germination developed from the present investigation can be used for rapid mass propagation of this highly important Dendrobium orchid species.

  11. Strategies for Optimal MAC Parameters Tuning in IEEE 802.15.6 Wearable Wireless Sensor Networks.

    PubMed

    Alam, Muhammad Mahtab; Ben Hamida, Elyes

    2015-09-01

    Wireless body area networks (WBAN) has penetrated immensely in revolutionizing the classical heath-care system. Recently, number of WBAN applications has emerged which introduce potential limits to existing solutions. In particular, IEEE 802.15.6 standard has provided great flexibility, provisions and capabilities to deal emerging applications. In this paper, we investigate the application-specific throughput analysis by fine-tuning the physical (PHY) and medium access control (MAC) parameters of the IEEE 802.15.6 standard. Based on PHY characterizations in narrow band, at the MAC layer, carrier sense multiple access collision avoidance (CSMA/CA) and scheduled access protocols are extensively analyzed. It is concluded that, IEEE 802.15.6 standard can satisfy most of the WBANs applications throughput requirements by maximum achieving 680 Kbps. However, those emerging applications which require high quality audio or video transmissions, standard is not able to meet their constraints. Moreover, delay, energy efficiency and successful packet reception are considered as key performance metrics for comparing the MAC protocols. CSMA/CA protocol provides the best results to meet the delay constraints of medical and non-medical WBAN applications. Whereas, the scheduled access approach, performs very well both in energy efficiency and packet reception ratio.

  12. Establishment of an Efficient In Vitro Regeneration Protocol for Rapid and Mass Propagation of Dendrobium chrysotoxum Lindl. Using Seed Culture

    PubMed Central

    2014-01-01

    An efficient in vitro regeneration protocol from seed culture has been established successfully for Dendrobium chrysotoxum, an epiphytic orchid having tremendous ornamental and medicinal values. Seed germination response was encouraging in Mitra (M) medium enriched with different combinations of auxins and cytokinins. Medium supplemented with 0.4% activated charcoal (AC), 2 mg/L 6-benzyl amino purine (BAP), and 2 mg/L indole-3-acetic acid (IAA) produced best seed germination percentage in 2 weeks of culture. Incorporation of higher concentration of kinetin (KN) or BAP in combination with low auxin in medium induced pronounced shooting and leaf formation. Reduction in leaf development was evident when cytokinins exist singly in medium indicating synergistic effect of auxin and cytokinin in leaf induction. Presence of elevated level of indole-3-butyric acid (IBA) or 1-naphthalene acetic acid (NAA) with low cytokinin content in medium generated more in vitro rooting, though IBA was found to be more effective in rooting induction as compared to NAA. The in vitro protocol for asymbiotic seed germination developed from the present investigation can be used for rapid mass propagation of this highly important Dendrobium orchid species. PMID:25401154

  13. Efficient and Selective N-Methylation of Nitroarenes under Mild Reaction Conditions.

    PubMed

    Pedrajas, Elena; Sorribes, Iván; Guillamón, Eva; Junge, Kathrin; Beller, Matthias; Llusar, Rosa

    2017-09-21

    Herein, we report a straightforward protocol for the preparation of N,N-dimethylated amines from readily available nitro starting materials using formic acid as a renewable C 1 source and silanes as reducing agents. This tandem process is efficiently accomplished in the presence of a cubane-type Mo 3 PtS 4 catalyst. For the preparation of the novel [Mo 3 Pt(PPh 3 )S 4 Cl 3 (dmen) 3 ] + (3 + ) (dmen: N,N'-dimethylethylenediamine) compound we have followed a [3+1] building block strategy starting from the trinuclear [Mo 3 S 4 Cl 3 (dmen) 3 ] + (1 + ) and Pt(PPh 3 ) 4 (2) complexes. The heterobimetallic 3 + cation preserves the main structural features of its 1 + cluster precursor. Interestingly, this catalytic protocol operates at room temperature with high chemoselectivity when the 3 + catalyst co-exists with its trinuclear 1 + precursor. N-heterocyclic arenes, double bonds, ketones, cyanides and ester functional groups are well retained after N-methylation of the corresponding functionalized nitroarenes. In addition, benzylic-type as well as aliphatic nitro compounds can also be methylated following this protocol. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  14. Simulation Modeling and Performance Evaluation of Space Networks

    NASA Technical Reports Server (NTRS)

    Jennings, Esther H.; Segui, John

    2006-01-01

    In space exploration missions, the coordinated use of spacecraft as communication relays increases the efficiency of the endeavors. To conduct trade-off studies of the performance and resource usage of different communication protocols and network designs, JPL designed a comprehensive extendable tool, the Multi-mission Advanced Communications Hybrid Environment for Test and Evaluation (MACHETE). The design and development of MACHETE began in 2000 and is constantly evolving. Currently, MACHETE contains Consultative Committee for Space Data Systems (CCSDS) protocol standards such as Proximity-1, Advanced Orbiting Systems (AOS), Packet Telemetry/Telecommand, Space Communications Protocol Specification (SCPS), and the CCSDS File Delivery Protocol (CFDP). MACHETE uses the Aerospace Corporation s Satellite Orbital Analysis Program (SOAP) to generate the orbital geometry information and contact opportunities. Matlab scripts provide the link characteristics. At the core of MACHETE is a discrete event simulator, QualNet. Delay Tolerant Networking (DTN) is an end-to-end architecture providing communication in and/or through highly stressed networking environments. Stressed networking environments include those with intermittent connectivity, large and/or variable delays, and high bit error rates. To provide its services, the DTN protocols reside at the application layer of the constituent internets, forming a store-and-forward overlay network. The key capabilities of the bundling protocols include custody-based reliability, ability to cope with intermittent connectivity, ability to take advantage of scheduled and opportunistic connectivity, and late binding of names to addresses. In this presentation, we report on the addition of MACHETE models needed to support DTN, namely: the Bundle Protocol (BP) model. To illustrate the use of MACHETE with the additional DTN model, we provide an example simulation to benchmark its performance. We demonstrate the use of the DTN protocol and discuss statistics gathered concerning the total time needed to simulate numerous bundle transmissions

  15. An optimized 13C-urea breath test for the diagnosis of H pylori infection

    PubMed Central

    Campuzano-Maya, Germán

    2007-01-01

    AIM: To validate an optimized 13C-urea breath test (13C-UBT) protocol for the diagnosis of H pylori infection that is cost-efficient and maintains excellent diagnostic accuracy. METHODS: 70 healthy volunteers were tested with two simplified 13C-UBT protocols, with test meal (Protocol 2) and without test meal (Protocol 1). Breath samples were collected at 10, 20 and 30 min after ingestion of 50 mg 13C-urea dissolved in 10 mL of water, taken as a single swallow, followed by 200 mL of water (pH 6.0) and a circular motion around the waistline to homogenize the urea solution. Performance of both protocols was analyzed at various cut-off values. Results were validated against the European protocol. RESULTS: According to the reference protocol, 65.7% individuals were positive for H pylori infection and 34.3% were negative. There were no significant differences in the ability of both protocols to correctly identify positive and negative H pylori individuals. However, only Protocol 1 with no test meal achieved accuracy, sensitivity, specificity, positive and negative predictive values of 100%. The highest values achieved by Protocol 2 were 98.57%, 97.83%, 100%, 100% and 100%, respectively. CONCLUSION: A 10 min, 50 mg 13C-UBT with no test meal using a cut-off value of 2-2.5 is a highly accurate test for the diagnosis of H pylori infection at a reduced cost. PMID:17907288

  16. ENVIRONMENTAL TECHNOLOGY VERIFICATION TEST PROTOCOL, GENERAL VENTILATION FILTERS

    EPA Science Inventory

    The Environmental Technology Verification Test Protocol, General Ventilation Filters provides guidance for verification tests.

    Reference is made in the protocol to the ASHRAE 52.2P "Method of Testing General Ventilation Air-cleaning Devices for Removal Efficiency by P...

  17. In vivo evaluation of the effect of stimulus distribution on FIR statistical efficiency in event-related fMRI.

    PubMed

    Jansma, J Martijn; de Zwart, Jacco A; van Gelderen, Peter; Duyn, Jeff H; Drevets, Wayne C; Furey, Maura L

    2013-05-15

    Technical developments in MRI have improved signal to noise, allowing use of analysis methods such as Finite impulse response (FIR) of rapid event related functional MRI (er-fMRI). FIR is one of the most informative analysis methods as it determines onset and full shape of the hemodynamic response function (HRF) without any a priori assumptions. FIR is however vulnerable to multicollinearity, which is directly related to the distribution of stimuli over time. Efficiency can be optimized by simplifying a design, and restricting stimuli distribution to specific sequences, while more design flexibility necessarily reduces efficiency. However, the actual effect of efficiency on fMRI results has never been tested in vivo. Thus, it is currently difficult to make an informed choice between protocol flexibility and statistical efficiency. The main goal of this study was to assign concrete fMRI signal to noise values to the abstract scale of FIR statistical efficiency. Ten subjects repeated a perception task with five random and m-sequence based protocol, with varying but, according to literature, acceptable levels of multicollinearity. Results indicated substantial differences in signal standard deviation, while the level was a function of multicollinearity. Experiment protocols varied up to 55.4% in standard deviation. Results confirm that quality of fMRI in an FIR analysis can significantly and substantially vary with statistical efficiency. Our in vivo measurements can be used to aid in making an informed decision between freedom in protocol design and statistical efficiency. Published by Elsevier B.V.

  18. Energy Efficient and QoS sensitive Routing Protocol for Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Saeed Tanoli, Tariq; Khalid Khan, Muhammad

    2013-12-01

    Efficient routing is an important part of wireless ad hoc networks. Since in ad hoc networks we have limited resources, there are many limitations like bandwidth, battery consumption, and processing cycle etc. Reliability is also necessary since there is no allowance for invalid or incomplete information (and expired data is useless). There are various protocols that perform routing by considering one parameter but ignoring other parameters. In this paper we present a protocol that finds route on the basis of bandwidth, energy and mobility of the nodes participating in the communication.

  19. Beating the photon-number-splitting attack in practical quantum cryptography.

    PubMed

    Wang, Xiang-Bin

    2005-06-17

    We propose an efficient method to verify the upper bound of the fraction of counts caused by multiphoton pulses in practical quantum key distribution using weak coherent light, given whatever type of Eve's action. The protocol simply uses two coherent states for the signal pulses and vacuum for the decoy pulse. Our verified upper bound is sufficiently tight for quantum key distribution with a very lossy channel, in both the asymptotic and nonasymptotic case. So far our protocol is the only decoy-state protocol that works efficiently for currently existing setups.

  20. Automated selective disruption of slow wave sleep.

    PubMed

    Ooms, Sharon J; Zempel, John M; Holtzman, David M; Ju, Yo-El S

    2017-04-01

    Slow wave sleep (SWS) plays an important role in neurophysiologic restoration. Experimentally testing the effect of SWS disruption previously required highly time-intensive and subjective methods. Our goal was to develop an automated and objective protocol to reduce SWS without affecting sleep architecture. We developed a custom Matlab™ protocol to calculate electroencephalogram spectral power every 10s live during a polysomnogram, exclude artifact, and, if measurements met criteria for SWS, deliver increasingly louder tones through earphones. Middle-aged healthy volunteers (n=10) each underwent 2 polysomnograms, one with the SWS disruption protocol and one with sham condition. The SWS disruption protocol reduced SWS compared to sham condition, as measured by spectral power in the delta (0.5-4Hz) band, particularly in the 0.5-2Hz range (mean 20% decrease). A compensatory increase in the proportion of total spectral power in the theta (4-8Hz) and alpha (8-12Hz) bands was seen, but otherwise normal sleep features were preserved. N3 sleep decreased from 20±34 to 3±6min, otherwise there were no significant changes in total sleep time, sleep efficiency, or other macrostructural sleep characteristics. This novel SWS disruption protocol produces specific reductions in delta band power similar to existing methods, but has the advantage of being automated, such that SWS disruption can be performed easily in a highly standardized and operator-independent manner. This automated SWS disruption protocol effectively reduces SWS without impacting overall sleep architecture. Copyright © 2017 Elsevier B.V. All rights reserved.

  1. Efficient Regular Perovskite Solar Cells Based on Pristine [70]Fullerene as Electron-Selective Contact.

    PubMed

    Collavini, Silvia; Kosta, Ivet; Völker, Sebastian F; Cabanero, German; Grande, Hans J; Tena-Zaera, Ramón; Delgado, Juan Luis

    2016-06-08

    [70]Fullerene is presented as an efficient alternative electron-selective contact (ESC) for regular-architecture perovskite solar cells (PSCs). A smart and simple, well-described solution processing protocol for the preparation of [70]- and [60]fullerene-based solar cells, namely the fullerene saturation approach (FSA), allowed us to obtain similar power conversion efficiencies for both fullerene materials (i.e., 10.4 and 11.4 % for [70]- and [60]fullerene-based devices, respectively). Importantly, despite the low electron mobility and significant visible-light absorption of [70]fullerene, the presented protocol allows the employment of [70]fullerene as an efficient ESC. The [70]fullerene film thickness and its solubility in the perovskite processing solutions are crucial parameters, which can be controlled by the use of this simple solution processing protocol. The damage to the [70]fullerene film through dissolution during the perovskite deposition is avoided through the saturation of the perovskite processing solution with [70]fullerene. Additionally, this fullerene-saturation strategy improves the performance of the perovskite film significantly and enhances the power conversion efficiency of solar cells based on different ESCs (i.e., [60]fullerene, [70]fullerene, and TiO2 ). Therefore, this universal solution processing protocol widens the opportunities for the further development of PSCs. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  2. IRB Process Improvements: A Machine Learning Analysis.

    PubMed

    Shoenbill, Kimberly; Song, Yiqiang; Cobb, Nichelle L; Drezner, Marc K; Mendonca, Eneida A

    2017-06-01

    Clinical research involving humans is critically important, but it is a lengthy and expensive process. Most studies require institutional review board (IRB) approval. Our objective is to identify predictors of delays or accelerations in the IRB review process and apply this knowledge to inform process change in an effort to improve IRB efficiency, transparency, consistency and communication. We analyzed timelines of protocol submissions to determine protocol or IRB characteristics associated with different processing times. Our evaluation included single variable analysis to identify significant predictors of IRB processing time and machine learning methods to predict processing times through the IRB review system. Based on initial identified predictors, changes to IRB workflow and staffing procedures were instituted and we repeated our analysis. Our analysis identified several predictors of delays in the IRB review process including type of IRB review to be conducted, whether a protocol falls under Veteran's Administration purview and specific staff in charge of a protocol's review. We have identified several predictors of delays in IRB protocol review processing times using statistical and machine learning methods. Application of this knowledge to process improvement efforts in two IRBs has led to increased efficiency in protocol review. The workflow and system enhancements that are being made support our four-part goal of improving IRB efficiency, consistency, transparency, and communication.

  3. Satellite-Friendly Protocols and Standards

    NASA Astrophysics Data System (ADS)

    Koudelka, O.; Schmidt, M.; Ebert, J.; Schlemmer, H.; Kastner, S.; Riedler, W.

    2002-01-01

    We are currently observing a development unprecedented with other services, the enormous growth of the Internet. Video, voice and data applications can be supported via this network in high quality. Multi-media applications require high bandwidth which may not be available in many areas. When making proper use of the broadcast feature of a communications satellite, the performance of the satellite-based system can compare favourably to terrestrial solutions. Internet applications are in many cases highly asymmetric, making them very well suited to applications using small and inexpensive terminals. Data from one source may be used simultaneously by a large number of users. The Internet protocol suite has become the de-facto standard. But this protocol family in its original form has not been designed to support guaranteed quality of service, a prerequisite for real-time, high quality traffic. The Internet Protocol has to be adapted for the satellite environment, because long roundtrip delays and the error behaviour of the channel could make it inefficient over a GEO satellite. Another requirement is to utilise the satellite bandwidth as efficiently as possible. This can be achieved by adapting the access system to the nature of IP frames, which are variable in length. In the framework of ESA's ARTES project a novel satellite multimedia system was developed which utilises Multi-Frequency TDMA in a meshed network topology. The system supports Quality of Service (QoS) by reserving capacity with different QoS requirements. The system is centrally controlled by a master station with the implementation of a demand assignment (DAMA) system. A lean internal signalling system has been adopted. Network management is based on the SNMP protocol and industry-standard network management platforms, making interfaces to standard accounting and billing systems easy. Modern communication systems will have to be compliant to different standards in a very flexible manner. The developed system is based on a hardware architecture using FPGAs (Field-Programmable Gate Arrays). This provides means to configure the satellite gateway for different standards and to optimise the transmission parameters for varying user traffic, thus increasing the efficiency significantly. The paper describes the flexible system architecture and focuses particularly on the DAMA access scheme and the chosen quality-of-service implementation. Emphasis has been put on the support of IP Version 6. Different standards (e.g. RCS and possible follow-ups) and the possibility to support them are discussed.

  4. Flow cytometry for enrichment and titration in massively parallel DNA sequencing

    PubMed Central

    Sandberg, Julia; Ståhl, Patrik L.; Ahmadian, Afshin; Bjursell, Magnus K.; Lundeberg, Joakim

    2009-01-01

    Massively parallel DNA sequencing is revolutionizing genomics research throughout the life sciences. However, the reagent costs and labor requirements in current sequencing protocols are still substantial, although improvements are continuously being made. Here, we demonstrate an effective alternative to existing sample titration protocols for the Roche/454 system using Fluorescence Activated Cell Sorting (FACS) technology to determine the optimal DNA-to-bead ratio prior to large-scale sequencing. Our method, which eliminates the need for the costly pilot sequencing of samples during titration is capable of rapidly providing accurate DNA-to-bead ratios that are not biased by the quantification and sedimentation steps included in current protocols. Moreover, we demonstrate that FACS sorting can be readily used to highly enrich fractions of beads carrying template DNA, with near total elimination of empty beads and no downstream sacrifice of DNA sequencing quality. Automated enrichment by FACS is a simple approach to obtain pure samples for bead-based sequencing systems, and offers an efficient, low-cost alternative to current enrichment protocols. PMID:19304748

  5. Spin ensemble-based AC magnetometry using concatenated dynamical decoupling at low temperatures

    NASA Astrophysics Data System (ADS)

    Farfurnik, D.; Jarmola, A.; Budker, D.; Bar-Gill, N.

    2018-01-01

    Ensembles of nitrogen-vacancy centers in diamond are widely used as AC magnetometers. While such measurements are usually performed using standard (XY) dynamical decoupling (DD) protocols at room temperature, we study the sensitivities achieved by utilizing various DD protocols, for measuring magnetic AC fields at frequencies in the 10-250 kHz range, at room temperature and 77 K. By performing measurements on an isotopically pure 12C sample, we find that the Carr-Purcell-Meiboom-Gill protocol, which is not robust against pulse imperfections, is less efficient for magnetometry than robust XY-based sequences. The concatenation of a standard XY-based protocol may enhance the sensitivities only for measuring high-frequency fields, for which many (> 500) DD pulses are necessary and the robustness against pulse imperfections is critical. Moreover, we show that cooling is effective only for measuring low-frequency fields (˜10 kHz), for which the experiment time approaches T 1 at a small number of applied DD pulses.

  6. Magnetic-activated cell sorting before density gradient centrifugation improves recovery of high-quality spermatozoa.

    PubMed

    Berteli, T S; Da Broi, M G; Martins, W P; Ferriani, R A; Navarro, P A

    2017-07-01

    Recent studies have evaluated the use of magnetic-activated cell sorting (MACS) to reduce apoptotic spermatozoa and improve sperm quality. However, the efficiency of using MACS alone, before or after sperm processing by density gradient centrifugation (DGC) has not yet been established. The purpose of this study is to determine the optimal protocol of MACS in assisted reproduction techniques (ART). Thus, we compared sperm quality obtained by DGC alone (DGC), DGC followed by MACS (DGC-MACS), MACS followed by DGC (MACS-DGC), and MACS alone (MACS), and found that the combined methods (MACS-DGC and DGC-MACS) led to retrieval of less spermatozoa with fragmented DNA compared to the single protocols. However, MACS-DGC protocol led to a significantly higher percentage of spermatozoa with progressive motility and normal morphology than DGC-MACS protocol. These findings suggest the potential clinical value of using MACS-DGC to improve sperm quality in seminal preparation for ART. © 2017 American Society of Andrology and European Academy of Andrology.

  7. An Efficient Distributed Coverage Hole Detection Protocol for Wireless Sensor Networks.

    PubMed

    Sahoo, Prasan Kumar; Chiang, Ming-Jer; Wu, Shih-Lin

    2016-03-17

    In wireless sensor networks (WSNs), certain areas of the monitoring region may have coverage holes and serious coverage overlapping due to the random deployment of sensors. The failure of electronic components, software bugs and destructive agents could lead to the random death of the nodes. Sensors may be dead due to exhaustion of battery power, which may cause the network to be uncovered and disconnected. Based on the deployment nature of the nodes in remote or hostile environments, such as a battlefield or desert, it is impossible to recharge or replace the battery. However, the data gathered by the sensors are highly essential for the analysis, and therefore, the collaborative detection of coverage holes has strategic importance in WSNs. In this paper, distributed coverage hole detection algorithms are designed, where nodes can collaborate to detect the coverage holes autonomously. The performance evaluation of our protocols suggests that our protocols outperform in terms of hole detection time, limited power consumption and control packet overhead to detect holes as compared to other similar protocols.

  8. Analysis of Pervasive Mobile Ad Hoc Routing Protocols

    NASA Astrophysics Data System (ADS)

    Qadri, Nadia N.; Liotta, Antonio

    Mobile ad hoc networks (MANETs) are a fundamental element of pervasive networks and therefore, of pervasive systems that truly support pervasive computing, where user can communicate anywhere, anytime and on-the-fly. In fact, future advances in pervasive computing rely on advancements in mobile communication, which includes both infrastructure-based wireless networks and non-infrastructure-based MANETs. MANETs introduce a new communication paradigm, which does not require a fixed infrastructure - they rely on wireless terminals for routing and transport services. Due to highly dynamic topology, absence of established infrastructure for centralized administration, bandwidth constrained wireless links, and limited resources in MANETs, it is challenging to design an efficient and reliable routing protocol. This chapter reviews the key studies carried out so far on the performance of mobile ad hoc routing protocols. We discuss performance issues and metrics required for the evaluation of ad hoc routing protocols. This leads to a survey of existing work, which captures the performance of ad hoc routing algorithms and their behaviour from different perspectives and highlights avenues for future research.

  9. Fast equilibration protocol for million atom systems of highly entangled linear polyethylene chains

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sliozberg, Yelena R.; TKC Global, Inc., Aberdeen Proving Ground, Maryland 21005; Kröger, Martin

    Equilibrated systems of entangled polymer melts cannot be produced using direct brute force equilibration due to the slow reptation dynamics exhibited by high molecular weight chains. Instead, these dense systems are produced using computational techniques such as Monte Carlo-Molecular Dynamics hybrid algorithms, though the use of soft potentials has also shown promise mainly for coarse-grained polymeric systems. Through the use of soft-potentials, the melt can be equilibrated via molecular dynamics at intermediate and long length scales prior to switching to a Lennard-Jones potential. We will outline two different equilibration protocols, which use various degrees of information to produce the startingmore » configurations. In one protocol, we use only the equilibrium bond angle, bond length, and target density during the construction of the simulation cell, where the information is obtained from available experimental data and extracted from the force field without performing any prior simulation. In the second protocol, we moreover utilize the equilibrium radial distribution function and dihedral angle distribution. This information can be obtained from experimental data or from a simulation of short unentangled chains. Both methods can be used to prepare equilibrated and highly entangled systems, but the second protocol is much more computationally efficient. These systems can be strictly monodisperse or optionally polydisperse depending on the starting chain distribution. Our protocols, which utilize a soft-core harmonic potential, will be applied for the first time to equilibrate a million particle system of polyethylene chains consisting of 1000 united atoms at various temperatures. Calculations of structural and entanglement properties demonstrate that this method can be used as an alternative towards the generation of entangled equilibrium structures.« less

  10. High speed bus technology development

    NASA Astrophysics Data System (ADS)

    Modrow, Marlan B.; Hatfield, Donald W.

    1989-09-01

    The development and demonstration of the High Speed Data Bus system, a 50 Million bits per second (Mbps) local data network intended for avionics applications in advanced military aircraft is described. The Advanced System Avionics (ASA)/PAVE PILLAR program provided the avionics architecture concept and basic requirements. Designs for wire and fiber optic media were produced and hardware demonstrations were performed. An efficient, robust token-passing protocol was developed and partially demonstrated. The requirements specifications, the trade-offs made, and the resulting designs for both a coaxial wire media system and a fiber optics design are examined. Also, the development of a message-oriented media access protocol is described, from requirements definition through analysis, simulation and experimentation. Finally, the testing and demonstrations conducted on the breadboard and brassboard hardware is presented.

  11. Transient partial permeabilization with saponin enables cellular barcoding prior to surface marker staining1

    PubMed Central

    Behbehani, Gregory K.; Thom, Colin; Zunder, Eli R.; Finck, Rachel; Gaudilliere, Brice; Fragiadakis, Gabriela K.; Fantl, Wendy J.; Nolan, Garry P.

    2015-01-01

    Fluorescent cellular barcoding and mass-tag cellular barcoding are cytometric methods that enable high sample throughput, minimize inter-sample variation, and reduce reagent consumption. Previously employed barcoding protocols require that barcoding be performed after surface marker staining, complicating combining the technique with measurement of alcohol-sensitive surface epitopes. This report describes a method of barcoding fixed cells after a transient partial permeabilization with 0.02% saponin that results in efficient and consistent barcode staining with fluorescent or mass-tagged reagents while preserving surface marker staining. This approach simplifies barcoding protocols and allows direct comparison of surface marker staining of multiple samples without concern for variations in the antibody cocktail volume, antigen-antibody ratio, or machine sensitivity. Using this protocol, cellular barcoding can be used to reliably detect subtle differences in surface marker expression. PMID:25274027

  12. Amorphizing of Cu Nanoparticles toward Highly Efficient and Robust Electrocatalyst for CO2 Reduction to Liquid Fuels with High Faradaic Efficiencies.

    PubMed

    Duan, Yan-Xin; Meng, Fan-Lu; Liu, Kai-Hua; Yi, Sha-Sha; Li, Si-Jia; Yan, Jun-Min; Jiang, Qing

    2018-04-01

    Conversion of carbon dioxide (CO 2 ) into valuable chemicals, especially liquid fuels, through electrochemical reduction driven by sustainable energy sources, is a promising way to get rid of dependence on fossil fuels, wherein developing of highly efficient catalyst is still of paramount importance. In this study, as a proof-of-concept experiment, first a facile while very effective protocol is proposed to synthesize amorphous Cu NPs. Unexpectedly, superior electrochemical performances, including high catalytic activity and selectivity of CO 2 reduction to liquid fuels are achieved, that is, a total Faradaic efficiency of liquid fuels can sum up to the maximum value of 59% at -1.4 V, with formic acid (HCOOH) and ethanol (C 2 H 6 O) account for 37% and 22%, respectively, as well as a desirable long-term stability even up to 12 h. More importantly, this work opens a new avenue for improved electroreduction of CO 2 based on amorphous metal catalysts. © 2018 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  13. Room temperature alkynylation of H-phosphi(na)tes and secondary phosphine oxides with ethynylbenziodoxolone (EBX) reagents.

    PubMed

    Chen, C Chun; Waser, Jerome

    2014-11-04

    Highly efficient protocols for the alkynylation of H-phosphi(na)tes and secondary phosphine oxides with silyl, aryl and alkyl ethynyl-benziodoxolone (EBX) reagents are reported. Alkynyl phosphorus compounds were obtained in 69-93% yield without the need for a transition metal catalyst at room temperature under open flask conditions.

  14. Technical Assessment: Integrated Photonics

    DTIC Science & Technology

    2015-10-01

    in global internet protocol traffic as a function of time by local access technology. Photonics continues to play a critical role in enabling this...communication networks. This has enabled services like the internet , high performance computing, and power-efficient large-scale data centers. The...signal processing, quantum information science, and optics for free space applications. However major obstacles challenge the implementation of

  15. A Context-Aware Paradigm for Information Discovery and Dissemination in Mobile Environments

    ERIC Educational Resources Information Center

    Lundquist, Doug

    2011-01-01

    The increasing power and ubiquity of mobile wireless devices is enabling real-time information delivery for many diverse applications. A crucial question is how to allocate finite network resources efficiently and fairly despite the uncertainty common in highly dynamic mobile ad hoc networks. We propose a set of routing protocols, Self-Balancing…

  16. Copper-Catalyzed C(sp2)-S Coupling Reactions for the Synthesis of Aryl Dithiocarbamates with Thiuram Disulfide Reagents.

    PubMed

    Dong, Zhi-Bing; Liu, Xing; Bolm, Carsten

    2017-11-03

    An efficient protocol for the copper-catalyzed preparation of aryl dithiocarbamates from aryl iodides and inexpensive, environmentally benign tetraalkylthiuram disulfides was developed. The features of mild reaction conditions, high yields, and broad substrate scope render this new approach synthetically attractive for the preparation of potentially biologically active compounds.

  17. Pyrrolidinones derived from (S)-pyroglutamic acid: penmacric acid and analogues.

    PubMed

    Anwar, Muhammed; Bailey, Jonathan H; Dickinson, Laura C; Edwards, Hermia J; Goswami, Rajesh; Moloney, Mark G

    2003-07-07

    Alkylation reactions using alpha-halolactams or lactam enolates derived from bicyclic lactam templates can proceed with high endo- or exo- diastereoselectivity respectively. In the latter case, stereochemical correction by means of enolate generation and hindered phenol quench is possible with moderate efficiency. This protocol has been applied to the synthesis of protected penmacric acid and its analogues.

  18. The effects of superset configuration on kinetic, kinematic, and perceived exertion in the barbell bench press.

    PubMed

    Weakley, Jonathon Js; Till, Kevin; Read, Dale B; Phibbs, Padraic J; Roe, Gregory; Darrall-Jones, Joshua; Jones, Ben L

    2017-08-04

    Training that is efficient and effective is of great importance to an athlete. One method of improving efficiency is by incorporating supersets into resistance training routines. However, the structuring of supersets is still unexplored. Therefore, the purpose of this study was to assess the effects of agonist-antagonist (A-A), alternate peripheral (A-P), and similar biomechanical (SB) superset configurations on rate of perceived exertion (RPE), kinetic and kinematic changes during the bench press. 10 subjects performed resistance training protocols in a randomized-crossover design, with magnitude-based inferences assessing changes/differences within and between protocols. Changes in RPE were very likely and almost certainly greater in the A-P and SB protocols when compared with the A-A, while all superset protocols had very likely to almost certain reductions in mean velocity and power from baseline. Reductions in mean velocity and power were almost certainly greater in the SB protocol, with differences between the A-A and A-P protocols being unclear. Decreases in peak force were likely and almost certain in the A-A and SB protocols respectively, with changes in A-P being unclear. Differences between these protocols showed likely greater decreases in SB peak forces when compared to A-A, with all other superset comparisons being unclear. This study demonstrates the importance of exercise selection when incorporating supersets into a training routine. It is suggested that the practitioner uses A-A supersets when aiming to improve training efficiency and minimize reductions in kinetic and kinematic output of the agonist musculature while completing the barbell bench press.

  19. High Hydrostatic Pressure Pretreatment of Whey Protein Isolates Improves Their Digestibility and Antioxidant Capacity

    PubMed Central

    Iskandar, Michèle M.; Lands, Larry C.; Sabally, Kebba; Azadi, Behnam; Meehan, Brian; Mawji, Nadir; Skinner, Cameron D.; Kubow, Stan

    2015-01-01

    Whey proteins have well-established antioxidant and anti-inflammatory bioactivities. High hydrostatic pressure processing of whey protein isolates increases their in vitro digestibility resulting in enhanced antioxidant and anti-inflammatory effects. This study compared the effects of different digestion protocols on the digestibility of pressurized (pWPI) and native (nWPI) whey protein isolates and the antioxidant and anti-inflammatory properties of the hydrolysates. The pepsin-pancreatin digestion protocol was modified to better simulate human digestion by adjusting temperature and pH conditions, incubation times, enzymes utilized, enzyme-to-substrate ratio and ultrafiltration membrane molecular weight cut-off. pWPI showed a significantly greater proteolysis rate and rate of peptide appearance regardless of digestion protocol. Both digestion methods generated a greater relative abundance of eluting peptides and the appearance of new peptide peaks in association with pWPI digestion in comparison to nWPI hydrolysates. Hydrolysates of pWPI from both digestion conditions showed enhanced ferric-reducing antioxidant power relative to nWPI hydrolysates. Likewise, pWPI hydrolysates from both digestion protocols showed similar enhanced antioxidant and anti-inflammatory effects in a respiratory epithelial cell line as compared to nWPI hydrolysates. These findings indicate that regardless of considerable variations of in vitro digestion protocols, pressurization of WPI leads to more efficient digestion that improves its antioxidant and anti-inflammatory properties. PMID:28231198

  20. High Hydrostatic Pressure Pretreatment of Whey Protein Isolates Improves Their Digestibility and Antioxidant Capacity.

    PubMed

    Iskandar, Michèle M; Lands, Larry C; Sabally, Kebba; Azadi, Behnam; Meehan, Brian; Mawji, Nadir; Skinner, Cameron D; Kubow, Stan

    2015-05-28

    Whey proteins have well-established antioxidant and anti-inflammatory bioactivities. High hydrostatic pressure processing of whey protein isolates increases their in vitro digestibility resulting in enhanced antioxidant and anti-inflammatory effects. This study compared the effects of different digestion protocols on the digestibility of pressurized (pWPI) and native (nWPI) whey protein isolates and the antioxidant and anti-inflammatory properties of the hydrolysates. The pepsin-pancreatin digestion protocol was modified to better simulate human digestion by adjusting temperature and pH conditions, incubation times, enzymes utilized, enzyme-to-substrate ratio and ultrafiltration membrane molecular weight cut-off. pWPI showed a significantly greater proteolysis rate and rate of peptide appearance regardless of digestion protocol. Both digestion methods generated a greater relative abundance of eluting peptides and the appearance of new peptide peaks in association with pWPI digestion in comparison to nWPI hydrolysates. Hydrolysates of pWPI from both digestion conditions showed enhanced ferric-reducing antioxidant power relative to nWPI hydrolysates. Likewise, pWPI hydrolysates from both digestion protocols showed similar enhanced antioxidant and anti-inflammatory effects in a respiratory epithelial cell line as compared to nWPI hydrolysates. These findings indicate that regardless of considerable variations of in vitro digestion protocols, pressurization of WPI leads to more efficient digestion that improves its antioxidant and anti-inflammatory properties.

  1. Template-free synthesis of cube-like Ag/AgCl nanostructures via a direct-precipitation protocol: highly efficient sunlight-driven plasmonic photocatalysts.

    PubMed

    Zhu, Mingshan; Chen, Penglei; Ma, Wanhong; Lei, Bin; Liu, Minghua

    2012-11-01

    In this paper, we report that cube-like Ag/AgCl nanostructures could be facilely fabricated in a one-pot manner through a direct-precipitation protocol under ambient conditions, wherein no additional issues such as external energy (e.g., high temperature or high pressure), surfactants, or reducing agents are required. In terms of using sodium chloride (NaCl) as chlorine source and silver acetate (CH₃COOAg) as silver source, it is disclosed that simply by adding an aqueous solution of NaCl into an aqueous solution of CH₃COOAg, Ag/AgCl nanostructures with a cube-like geometry, could be successfully formulated. We show that thus-formulated cube-like Ag/AgCl nanospecies could be used as high-performance yet durable visible-light-driven or sunlight-driven plasmonic photocatalysts for the photodegradation of methyl orange (MO) and 4-chlorophenol (4-CP) pollutants. Compared with the commercially available P25-TiO₂, and the Ag/AgCl nanospheres previously fabricated via a surfactant-assisted method, our current cube-like Ag/AgCl nanostructures could exhibit much higher photocatalytic performance. Our template free protocol might open up new and varied opportunities for an easy synthesis of cube-like Ag/AgCl-based high-performance sunlight-driven plasmonic photocatalysts for organic pollutant elimination.

  2. Two-step entanglement concentration for arbitrary electronic cluster state

    NASA Astrophysics Data System (ADS)

    Zhao, Sheng-Yang; Liu, Jiong; Zhou, Lan; Sheng, Yu-Bo

    2013-12-01

    We present an efficient protocol for concentrating an arbitrary four-electron less-entangled cluster state into a maximally entangled cluster state. As a two-step entanglement concentration protocol (ECP), it only needs one pair of less-entangled cluster state, which makes this ECP more economical. With the help of electronic polarization beam splitter (PBS) and the charge detection, the whole concentration process is essentially the quantum nondemolition (QND) measurement. Therefore, the concentrated maximally entangled state can be remained for further application. Moreover, the discarded terms in some traditional ECPs can be reused to obtain a high success probability. It is feasible and useful in current one-way quantum computation.

  3. HomeADL for adaptive ADL monitoring within smart homes.

    PubMed

    Hong, Xin; Nugent, Chris D; Finlay, Dewar D; Mulvenna, Maurice

    2008-01-01

    In this paper we present homeADL: a representation standard for an inference hierarchy of activities of daily living which may be monitored in a sensor equipped smart home. The approach allows a free exchange of ADL monitoring structures between different communities who share the same concern of providing high quality healthcare to the elderly. Its ability of matching different ADL protocols enables a mapping between an ADL protocol to a suitable smart home which makes an effective management of smart homes within a community hence, not only being able to satisfy an individual's healthcare requirements but also efficiently using monitoring resources at hand.

  4. Authentication and Key Establishment in Dynamic Wireless Sensor Networks

    PubMed Central

    Qiu, Ying; Zhou, Jianying; Baek, Joonsang; Lopez, Javier

    2010-01-01

    When a sensor node roams within a very large and distributed wireless sensor network, which consists of numerous sensor nodes, its routing path and neighborhood keep changing. In order to provide a high level of security in this environment, the moving sensor node needs to be authenticated to new neighboring nodes and a key established for secure communication. The paper proposes an efficient and scalable protocol to establish and update the authentication key in a dynamic wireless sensor network environment. The protocol guarantees that two sensor nodes share at least one key with probability 1 (100%) with less memory and energy cost, while not causing considerable communication overhead. PMID:22319321

  5. An Energy-Efficient and Robust Multipath Routing Protocol for Cognitive Radio Ad Hoc Networks.

    PubMed

    Singh, Kishor; Moh, Sangman

    2017-09-04

    Routing in cognitive radio ad hoc networks (CRAHNs) is a daunting task owing to dynamic topology, intermittent connectivity, spectrum heterogeneity, and energy constraints. Other prominent aspects such as channel stability, path reliability, and route discovery frequency should also be exploited. Several routing protocols have been proposed for CRAHNs in the literature. By stressing on one of the aspects more than any other, however, they do not satisfy all requirements of throughput, energy efficiency, and robustness. In this paper, we propose an energy-efficient and robust multipath routing (ERMR) protocol for CRAHNs by considering all prominent aspects including residual energy and channel stability in design. Even when the current routing path fails, the alternative routing path is immediately utilized. In establishing primary and alternative routing paths, both residual energy and channel stability are exploited simultaneously. Our simulation study shows that the proposed ERMR outperforms the conventional protocol in terms of network throughput, packet delivery ratio, energy consumption, and end-to-end delay.

  6. An Energy-Efficient and Robust Multipath Routing Protocol for Cognitive Radio Ad Hoc Networks

    PubMed Central

    Singh, Kishor

    2017-01-01

    Routing in cognitive radio ad hoc networks (CRAHNs) is a daunting task owing to dynamic topology, intermittent connectivity, spectrum heterogeneity, and energy constraints. Other prominent aspects such as channel stability, path reliability, and route discovery frequency should also be exploited. Several routing protocols have been proposed for CRAHNs in the literature. By stressing on one of the aspects more than any other, however, they do not satisfy all requirements of throughput, energy efficiency, and robustness. In this paper, we propose an energy-efficient and robust multipath routing (ERMR) protocol for CRAHNs by considering all prominent aspects including residual energy and channel stability in design. Even when the current routing path fails, the alternative routing path is immediately utilized. In establishing primary and alternative routing paths, both residual energy and channel stability are exploited simultaneously. Our simulation study shows that the proposed ERMR outperforms the conventional protocol in terms of network throughput, packet delivery ratio, energy consumption, and end-to-end delay. PMID:28869551

  7. Efficient Isolation Protocol for B and T Lymphocytes from Human Palatine Tonsils

    PubMed Central

    Assadian, Farzaneh; Sandström, Karl; Laurell, Göran; Svensson, Catharina; Akusjärvi, Göran; Punga, Tanel

    2015-01-01

    Tonsils form a part of the immune system providing the first line of defense against inhaled pathogens. Usually the term “tonsils” refers to the palatine tonsils situated at the lateral walls of the oral part of the pharynx. Surgically removed palatine tonsils provide a convenient accessible source of B and T lymphocytes to study the interplay between foreign pathogens and the host immune system. This video protocol describes the dissection and processing of surgically removed human palatine tonsils, followed by the isolation of the individual B and T cell populations from the same tissue sample. We present a method, which efficiently separates tonsillar B and T lymphocytes using an antibody-dependent affinity protocol. Further, we use the method to demonstrate that human adenovirus infects specifically the tonsillar T cell fraction. The established protocol is generally applicable to efficiently and rapidly isolate tonsillar B and T cell populations to study the role of different types of pathogens in tonsillar immune responses. PMID:26650582

  8. A secure RFID-based WBAN for healthcare applications.

    PubMed

    Ullah, Sana; Alamri, Atif

    2013-10-01

    A Wireless Body Area Network (WBAN) allows the seamless integration of small and intelligent invasive or non-invasive sensor nodes in, on or around a human body for continuous health monitoring. These nodes are expected to use different power-efficient protocols in order to extend the WBAN lifetime. This paper highlights the power consumption and security issues of WBAN for healthcare applications. Numerous power saving mechanisms are discussed and a secure RFID-based protocol for WBAN is proposed. The performance of the proposed protocol is analyzed and compared with that of IEEE 802.15.6-based CSMA/CA and preamble-based TDMA protocols using extensive simulations. It is shown that the proposed protocol is power-efficient and protects patients' data from adversaries. It is less vulnerable to different attacks compared to that of IEEE 802.15.6-based CSMA/CA and preamble-based TDMA protocols. For a low traffic load and a single alkaline battery of capacity 2.6 Ah, the proposed protocol could extend the WBAN lifetime, when deployed on patients in hospitals or at homes, to approximately five years.

  9. Silver-Catalyzed Cyclopropanation of Alkenes Using N-Nosylhydrazones as Diazo Surrogates.

    PubMed

    Liu, Zhaohong; Zhang, Xinyu; Zanoni, Giuseppe; Bi, Xihe

    2017-12-15

    An efficient silver-catalyzed [2 + 1] cyclopropanation of sterically hindered internal alkenes with diazo compounds in which room-temperature-decomposable N-nosylhydrazones are used as diazo surrogates is reported. The unexpected unique catalytic activity of silver was ascribed to its dual role as a Lewis acid activating alkene substrates and as a transition metal forming silver carbenoids. A wide range of internal alkenes, including challenging diarylethenes, were suitable for this protocol, thereby affording a variety of cyclopropanes with high efficiency in a stereoselective manner under mild conditions.

  10. Building America Case Study: Philadelphia Housing Authority Energy-Efficiency Turnover Protocols, Philadelphia, Pennsylvania

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    2016-02-01

    Over one million HUD-supported public housing units provide rental housing for eligible low-income families across the country. A survey of over 100 public housing authorities (PHAs) across the country indicated that there is a high level of interest in developing low-cost solutions that improve energy efficiency and can be seamlessly included in the refurbishment process. Further, PHAs, have incentives (both internal and external) to reduce utility bills. ARIES worked with four PHAs to develop packages of energy efficiency retrofit measures the PHAs can cost-effectively implement with their own staffs in the normal course of housing operations at the time whenmore » units are refurbished between occupancies. The energy efficiency turnover protocols emphasized air infiltration reduction, duct sealing, and measures that improve equipment efficiency. ARIES documented implementation in 18 housing units. Reductions in average air leakage were 16 percent and duct leakage reductions averaged 23 percent. Total source energy consumption savings due to implemented measures was estimated at 3-10 percent based on BEopt modeling with a simple payback of 1.6 to 2.5 years. Implementation challenges were encountered mainly related to required operational changes and budgetary constraints. Nevertheless, simple measures can feasibly be accomplished by PHA staff at low or no cost. At typical housing unit turnover rates, these measures could impact hundreds of thousands of units per year nationally.« less

  11. Islip Housing Authority Energy Efficiency Turnover Protocols, Islip, New York (Fact Sheet)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    2014-08-01

    More than 1 million HUD-supported public housing units provide rental housing for eligible low-income families across the country. A survey of over 100 PHAs across the country indicated that there is a high level of interest in developing low cost solutions that improve energy efficiency and can be seamlessly included in the refurbishment process. Further, PHAs, have incentives (both internal and external) to reduce utility bills. ARIES worked with two public housing authorities (PHAs) to develop packages of energy efficiency retrofit measures the PHAs can cost effectively implement with their own staffs in the normal course of housing operations atmore » the time when units are refurbished between occupancies. The energy efficiency turnover protocols emphasized air infiltration reduction, duct sealing and measures that improve equipment efficiency. ARIES documented implementation in ten housing units. Reductions in average air leakage were 16-20% and duct leakage reductions averaged 38%. Total source energy consumption savings was estimated at 6-10% based on BEopt modeling with a simple payback of 1.7 to 2.2 years. Implementation challenges were encountered mainly related to required operational changes and budgetary constraints. Nevertheless, simple measures can feasibly be accomplished by PHA staff at low or no cost. At typical housing unit turnover rates, these measures could impact hundreds of thousands of unit per year nationally.« less

  12. Optimal approach to quantum communication using dynamic programming.

    PubMed

    Jiang, Liang; Taylor, Jacob M; Khaneja, Navin; Lukin, Mikhail D

    2007-10-30

    Reliable preparation of entanglement between distant systems is an outstanding problem in quantum information science and quantum communication. In practice, this has to be accomplished by noisy channels (such as optical fibers) that generally result in exponential attenuation of quantum signals at large distances. A special class of quantum error correction protocols, quantum repeater protocols, can be used to overcome such losses. In this work, we introduce a method for systematically optimizing existing protocols and developing more efficient protocols. Our approach makes use of a dynamic programming-based searching algorithm, the complexity of which scales only polynomially with the communication distance, letting us efficiently determine near-optimal solutions. We find significant improvements in both the speed and the final-state fidelity for preparing long-distance entangled states.

  13. Secure and Efficient Network Fault Localization

    DTIC Science & Technology

    2012-02-27

    ORGANIZATION NAME(S) AND ADDRESS (ES) Carnegie Mellon University,School of Computer Science,Computer Science Department,Pittsburgh,PA,15213 8. PERFORMING...ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS (ES) 10. SPONSOR/MONITOR’S ACRONYM(S) 11. SPONSOR/MONITOR’S REPORT...efficiency than previously known protocols for fault localization. Our proposed fault localization protocols also address the security threats that

  14. IMHRP: Improved Multi-Hop Routing Protocol for Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Huang, Jianhua; Ruan, Danwei; Hong, Yadong; Zhao, Ziming; Zheng, Hong

    2017-10-01

    Wireless sensor network (WSN) is a self-organizing system formed by a large number of low-cost sensor nodes through wireless communication. Sensor nodes collect environmental information and transmit it to the base station (BS). Sensor nodes usually have very limited battery energy. The batteries cannot be charged or replaced. Therefore, it is necessary to design an energy efficient routing protocol to maximize the network lifetime. This paper presents an improved multi-hop routing protocol (IMHRP) for homogeneous networks. In the IMHRP protocol, based on the distances to the BS, the CH nodes are divided into internal CH nodes and external CH nodes. The set-up phase of the protocol is based on the LEACH protocol and the minimum distance between CH nodes are limited to a special constant distance, so a more uniform distribution of CH nodes is achieved. In the steady-state phase, the routes of different CH nodes are created on the basis of the distances between the CH nodes. The energy efficiency of communication can be maximized. The simulation results show that the proposed algorithm can more effectively reduce the energy consumption of each round and prolong the network lifetime compared with LEACH protocol and MHT protocol.

  15. Comparison of 10 efficient protocols for photodynamic therapy of actinic keratosis: How relevant are effective light dose and local damage in predicting the complete response rate at 3 months?

    PubMed

    Vignion-Dewalle, Anne-Sophie; Baert, Gregory; Thecua, Elise; Lecomte, Fabienne; Vicentini, Claire; Abi-Rached, Henry; Mortier, Laurent; Mordon, Serge

    2018-04-18

    Topical photodynamic therapy is an established treatment modality for various dermatological conditions, including actinic keratosis. In Europe, the approved protocols for photodynamic therapy of actinic keratosis involve irradiation with either an Aktilite CL 128 lamp or daylight, whereas irradiation with the Blu-U illuminator is approved in the United States. Many other protocols using irradiation by a variety of light sources are also clinically efficient. This paper aims to compare 10 different protocols with clinically proven efficacy for photodynamic therapy of actinic keratosis and the available spectral irradiance of the light source. Effective irradiance, effective light dose, and local damage are compared. We also investigate whether there is an association between the complete response rate at 3 months and the effective light dose or local damage. The effective irradiance, also referred to as protoporphyrin IX-weighted irradiance, is obtained by integrating the spectral irradiance weighted by the normalized absorption spectrum of protoporphyrin IX over the wavelength. Integrating the effective irradiance over the irradiation time yields the effective light dose, which is also known as the protoporphyrin IX-weighted light dose. Local damage, defined as the total cumulative singlet oxygen molecules produced during treatment, is estimated using mathematical modeling of the photodynamic therapy process. This modeling is based on an iterative procedure taking into account the spatial and temporal variations in the protoporphyrin IX absorption spectrum during treatment. The protocol for daylight photodynamic therapy on a clear sunny day, the protocol for daylight photodynamic therapy on an overcast day, the photodynamic therapy protocol for a white LED lamp for operating rooms and the photodynamic therapy protocol for the Blu-U illuminator perform better than the six other protocols-all involving red light illumination-in terms of both effective light dose and local damage. However, no association between the complete response rate at 3 months and the effective light dose or local damage was found. Protocols that achieve high complete response rates at 3 months and low pain scores should be preferred regardless of the effective light dose and local damage. Lasers Surg. Med. © 2018 Wiley Periodicals, Inc. © 2018 Wiley Periodicals, Inc.

  16. High-throughput full-length single-cell mRNA-seq of rare cells.

    PubMed

    Ooi, Chin Chun; Mantalas, Gary L; Koh, Winston; Neff, Norma F; Fuchigami, Teruaki; Wong, Dawson J; Wilson, Robert J; Park, Seung-Min; Gambhir, Sanjiv S; Quake, Stephen R; Wang, Shan X

    2017-01-01

    Single-cell characterization techniques, such as mRNA-seq, have been applied to a diverse range of applications in cancer biology, yielding great insight into mechanisms leading to therapy resistance and tumor clonality. While single-cell techniques can yield a wealth of information, a common bottleneck is the lack of throughput, with many current processing methods being limited to the analysis of small volumes of single cell suspensions with cell densities on the order of 107 per mL. In this work, we present a high-throughput full-length mRNA-seq protocol incorporating a magnetic sifter and magnetic nanoparticle-antibody conjugates for rare cell enrichment, and Smart-seq2 chemistry for sequencing. We evaluate the efficiency and quality of this protocol with a simulated circulating tumor cell system, whereby non-small-cell lung cancer cell lines (NCI-H1650 and NCI-H1975) are spiked into whole blood, before being enriched for single-cell mRNA-seq by EpCAM-functionalized magnetic nanoparticles and the magnetic sifter. We obtain high efficiency (> 90%) capture and release of these simulated rare cells via the magnetic sifter, with reproducible transcriptome data. In addition, while mRNA-seq data is typically only used for gene expression analysis of transcriptomic data, we demonstrate the use of full-length mRNA-seq chemistries like Smart-seq2 to facilitate variant analysis of expressed genes. This enables the use of mRNA-seq data for differentiating cells in a heterogeneous population by both their phenotypic and variant profile. In a simulated heterogeneous mixture of circulating tumor cells in whole blood, we utilize this high-throughput protocol to differentiate these heterogeneous cells by both their phenotype (lung cancer versus white blood cells), and mutational profile (H1650 versus H1975 cells), in a single sequencing run. This high-throughput method can help facilitate single-cell analysis of rare cell populations, such as circulating tumor or endothelial cells, with demonstrably high-quality transcriptomic data.

  17. Unlocking the Potential of Phenacyl Protecting Groups: CO2-Based Formation and Photocatalytic Release of Caged Amines.

    PubMed

    Speckmeier, Elisabeth; Klimkait, Michael; Zeitler, Kirsten

    2018-04-06

    Orthogonal protection and deprotection of amines remain important tools in synthetic design as well as in chemical biology and material research applications. A robust, highly efficient, and sustainable method for the formation of phenacyl-based carbamate esters was developed using CO 2 for the in situ preparation of the intermediate carbamates. Our mild and broadly applicable protocol allows for the formation of phenacyl urethanes of anilines, primary amines, including amino acids, and secondary amines in high to excellent yields. Moreover, we demonstrate the utility by a mild and convenient photocatalytic deprotection protocol using visible light. A key feature of the [Ru(bpy) 3 ](PF 6 ) 2 -catalyzed method is the use of ascorbic acid as reductive quencher in a neutral, buffered, two-phase acetonitrile/water mixture, granting fast and highly selective deprotection for all presented examples.

  18. WEAMR — A Weighted Energy Aware Multipath Reliable Routing Mechanism for Hotline-Based WSNs

    PubMed Central

    Tufail, Ali; Qamar, Arslan; Khan, Adil Mehmood; Baig, Waleed Akram; Kim, Ki-Hyung

    2013-01-01

    Reliable source to sink communication is the most important factor for an efficient routing protocol especially in domains of military, healthcare and disaster recovery applications. We present weighted energy aware multipath reliable routing (WEAMR), a novel energy aware multipath routing protocol which utilizes hotline-assisted routing to meet such requirements for mission critical applications. The protocol reduces the number of average hops from source to destination and provides unmatched reliability as compared to well known reactive ad hoc protocols i.e., AODV and AOMDV. Our protocol makes efficient use of network paths based on weighted cost calculation and intelligently selects the best possible paths for data transmissions. The path cost calculation considers end to end number of hops, latency and minimum energy node value in the path. In case of path failure path recalculation is done efficiently with minimum latency and control packets overhead. Our evaluation shows that our proposal provides better end-to-end delivery with less routing overhead and higher packet delivery success ratio compared to AODV and AOMDV. The use of multipath also increases overall life time of WSN network using optimum energy available paths between sender and receiver in WDNs. PMID:23669714

  19. WEAMR-a weighted energy aware multipath reliable routing mechanism for hotline-based WSNs.

    PubMed

    Tufail, Ali; Qamar, Arslan; Khan, Adil Mehmood; Baig, Waleed Akram; Kim, Ki-Hyung

    2013-05-13

    Reliable source to sink communication is the most important factor for an efficient routing protocol especially in domains of military, healthcare and disaster recovery applications. We present weighted energy aware multipath reliable routing (WEAMR), a novel energy aware multipath routing protocol which utilizes hotline-assisted routing to meet such requirements for mission critical applications. The protocol reduces the number of average hops from source to destination and provides unmatched reliability as compared to well known reactive ad hoc protocols i.e., AODV and AOMDV. Our protocol makes efficient use of network paths based on weighted cost calculation and intelligently selects the best possible paths for data transmissions. The path cost calculation considers end to end number of hops, latency and minimum energy node value in the path. In case of path failure path recalculation is done efficiently with minimum latency and control packets overhead. Our evaluation shows that our proposal provides better end-to-end delivery with less routing overhead and higher packet delivery success ratio compared to AODV and AOMDV. The use of multipath also increases overall life time of WSN network using optimum energy available paths between sender and receiver in WDNs.

  20. PROTOCOL TO EVALUATE THE MOISTURE DURABILITY OF ENERGY-EFFICIENT WALLS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Boudreaux, Philip R; Pallin, Simon B; Hun, Diana E

    Walls account for about 8% of the energy used in residential buildings. This energy penalty can be reduced with higher insulation levels and increased airtightness. However, these measures can compromise the moisture durability and long-term performance of wall assemblies because they can lead to lower moisture tolerance due to reduced drying potential. To avert these problems, a moisture durability protocol was developed to evaluate the probability that an energy-efficient wall design will experience mold growth. This protocol examines the effects of moisture sources in walls through a combination of simulations and lab experiments, uses the mold growth index as themore » moisture durability indicator, and is based on a probabilistic approach that utilizes stochastically varying input parameters. The simulation tools used include a new validated method for taking into account the effects of air leakage in wall assemblies This paper provides an overview of the developed protocol, discussion of the probabilistic simulation approach and describes results from the evaluation of two wall assemblies in Climate Zones 2, 4, and 6. The protocol will be used to supply builders with wall designs that are energy efficient, moisture durable and cost-effective.« less

  1. Preparation and Evaluation of Multiple Nanoemulsions Containing Gadolinium (III) Chelate as a Potential Magnetic Resonance Imaging (MRI) Contrast Agent.

    PubMed

    Sigward, Estelle; Corvis, Yohann; Doan, Bich-Thuy; Kindsiko, Kadri; Seguin, Johanne; Scherman, Daniel; Brossard, Denis; Mignet, Nathalie; Espeau, Philippe; Crauste-Manciet, Sylvie

    2015-09-01

    The objective was to develop, characterize and assess the potentiality of W1/O/W2 self-emulsifying multiple nanoemulsions to enhance signal/noise ratio for Magnetic Resonance Imaging (MRI). For this purpose, a new formulation, was designed for encapsulation efficiency and stability. Various methods were used to characterize encapsulation efficiency ,in particular calorimetric methods (Differential Scanning Calorimetry (DSC), thermogravimetry analysis) and ultrafiltration. MRI in vitro relaxivities were assessed on loaded DTPA-Gd multiple nanoemulsions. Characterization of the formulation, in particular of encapsulation efficiency was a challenge due to interactions found with ultrafiltration method. Thanks to the specifically developed DSC protocol, we were able to confirm the formation of multiple nanoemulsions, differentiate loaded from unloaded nanoemulsions and measure the encapsulation efficiency which was found to be quite high with a 68% of drug loaded. Relaxivity studies showed that the self-emulsifying W/O/W nanoemulsions were positive contrast agents, exhibiting higher relaxivities than those of the DTPA-Gd solution taken as a reference. New self-emulsifying multiple nanoemulsions that were able to load satisfactory amounts of contrasting agent were successfully developed as potential MRI contrasting agents. A specific DSC protocol was needed to be developed to characterize these complex systems as it would be useful to develop these self-formation formulations.

  2. An Efficient Two-Tier Causal Protocol for Mobile Distributed Systems

    PubMed Central

    Dominguez, Eduardo Lopez; Pomares Hernandez, Saul E.; Gomez, Gustavo Rodriguez; Medina, Maria Auxilio

    2013-01-01

    Causal ordering is a useful tool for mobile distributed systems (MDS) to reduce the non-determinism induced by three main aspects: host mobility, asynchronous execution, and unpredictable communication delays. Several causal protocols for MDS exist. Most of them, in order to reduce the overhead and the computational cost over wireless channels and mobile hosts (MH), ensure causal ordering at and according to the causal view of the Base Stations. Nevertheless, these protocols introduce certain disadvantage, such as unnecessary inhibition at the delivery of messages. In this paper, we present an efficient causal protocol for groupware that satisfies the MDS's constraints, avoiding unnecessary inhibitions and ensuring the causal delivery based on the view of the MHs. One interesting aspect of our protocol is that it dynamically adapts the causal information attached to each message based on the number of messages with immediate dependency relation, and this is not directly proportional to the number of MHs. PMID:23585828

  3. Research on low-latency MAC protocols for wireless sensor networks

    NASA Astrophysics Data System (ADS)

    He, Chenguang; Sha, Xuejun; Lee, Chankil

    2007-11-01

    Energy-efficient should not be the only design goal in MAC protocols for wireless sensor networks, which involve the use of battery-operated computing and sensing devices. Low-latency operation becomes the same important as energy-efficient in the case that the traffic load is very heavy or the real-time constrain is used in applications like tracking or locating. This paper introduces some causes of traditional time delays which are inherent in a multi-hops network using existing WSN MAC protocols, illuminates the importance of low-latency MAC design for wireless sensor networks, and presents three MACs as examples of low-latency protocols designed specially for sleep delay, wait delay and wakeup delay in wireless sensor networks, respectively. The paper also discusses design trade-offs with emphasis on low-latency and points out their advantages and disadvantages, together with some design considerations and suggestions for MAC protocols for future applications and researches.

  4. A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity.

    PubMed

    Amin, Ruhul; Biswas, G P

    2015-08-01

    Telecare medical information system (TMIS) makes an efficient and convenient connection between patient(s)/user(s) and doctor(s) over the insecure internet. Therefore, data security, privacy and user authentication are enormously important for accessing important medical data over insecure communication. Recently, many user authentication protocols for TMIS have been proposed in the literature and it has been observed that most of the protocols cannot achieve complete security requirements. In this paper, we have scrutinized two (Mishra et al., Xu et al.) remote user authentication protocols using smart card and explained that both the protocols are suffering against several security weaknesses. We have then presented three-factor user authentication and key agreement protocol usable for TMIS, which fix the security pitfalls of the above mentioned schemes. The informal cryptanalysis makes certain that the proposed protocol provides well security protection on the relevant security attacks. Furthermore, the simulator AVISPA tool confirms that the protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The security functionalities and performance comparison analysis confirm that our protocol not only provide strong protection on security attacks, but it also achieves better complexities along with efficient login and password change phase as well as session key verification property.

  5. Deterministic and efficient quantum cryptography based on Bell's theorem

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chen Zengbing; Pan Jianwei; Physikalisches Institut, Universitaet Heidelberg, Philosophenweg 12, 69120 Heidelberg

    2006-05-15

    We propose a double-entanglement-based quantum cryptography protocol that is both efficient and deterministic. The proposal uses photon pairs with entanglement both in polarization and in time degrees of freedom; each measurement in which both of the two communicating parties register a photon can establish one and only one perfect correlation, and thus deterministically create a key bit. Eavesdropping can be detected by violation of local realism. A variation of the protocol shows a higher security, similar to the six-state protocol, under individual attacks. Our scheme allows a robust implementation under the current technology.

  6. A novel process of viral vector barcoding and library preparation enables high-diversity library generation and recombination-free paired-end sequencing

    PubMed Central

    Davidsson, Marcus; Diaz-Fernandez, Paula; Schwich, Oliver D.; Torroba, Marcos; Wang, Gang; Björklund, Tomas

    2016-01-01

    Detailed characterization and mapping of oligonucleotide function in vivo is generally a very time consuming effort that only allows for hypothesis driven subsampling of the full sequence to be analysed. Recent advances in deep sequencing together with highly efficient parallel oligonucleotide synthesis and cloning techniques have, however, opened up for entirely new ways to map genetic function in vivo. Here we present a novel, optimized protocol for the generation of universally applicable, barcode labelled, plasmid libraries. The libraries are designed to enable the production of viral vector preparations assessing coding or non-coding RNA function in vivo. When generating high diversity libraries, it is a challenge to achieve efficient cloning, unambiguous barcoding and detailed characterization using low-cost sequencing technologies. With the presented protocol, diversity of above 3 million uniquely barcoded adeno-associated viral (AAV) plasmids can be achieved in a single reaction through a process achievable in any molecular biology laboratory. This approach opens up for a multitude of in vivo assessments from the evaluation of enhancer and promoter regions to the optimization of genome editing. The generated plasmid libraries are also useful for validation of sequencing clustering algorithms and we here validate the newly presented message passing clustering process named Starcode. PMID:27874090

  7. Quality and Variability of Online Physical Therapy Protocols for Isolated Meniscal Repairs.

    PubMed

    Trofa, David P; Parisien, Robert L; Noticewala, Manish S; Noback, Peter C; Ahmad, Christopher S; Moutzouros, Vasilios; Makhni, Eric C

    2018-05-31

    The ideal meniscal repair postoperative rehabilitation protocol has yet to be determined. Further, patients are attempting to access health care content online at a precipitously increasing rate given the efficiency of modern search engines. The purpose of this investigation was to assess the quality and variability of meniscal repair rehabilitation protocols published online with the hypothesis that there would be a high degree of variability found across available protocols. To this end, Web-based meniscal repair physical therapy protocols from U.S. academic orthopaedic programs as well as the first 10 protocols identified by the Google search engine for the term "meniscal repair physical therapy protocol" were reviewed and assessed via a custom scoring rubric. Twenty protocols were identified from 155 U.S. academic orthopaedic programs for a total of 30 protocols. Twenty-six protocols (86.6%) recommended immediate postoperative bracing. Twelve (40.0%) protocols permitted immediate weight-bearing as tolerated (WBAT) postoperatively, while the remaining protocols permitted WBAT at an average of 4.0 (range, 1-7) weeks. There was considerable variation in range of motion (ROM) goals, with most protocols (73.3%) initiating immediate passive ROM to 90°. The types and timing of strength, proprioception, agility, and pivoting exercises advised were extremely diverse. Only five protocols (16.7%) employed functional testing as a marker for return to athletics. The results of this study indicate that only a minority of academic orthopaedic programs publish meniscal repair physical therapy protocols online and that within the most readily available online protocols there are significant disparities in regards to brace use, ROM, weight-bearing, and strengthening and proprioception exercises. These discrepancies reflect the fact that the best rehabilitation practices after a meniscal repair have yet to be elucidated. This represents a significant area for improved patient care through standardization. Thieme Medical Publishers 333 Seventh Avenue, New York, NY 10001, USA.

  8. Bulk Data Dissemination in Low Power Sensor Networks: Present and Future Directions

    PubMed Central

    Xu, Zhirong; Hu, Tianlei; Song, Qianshu

    2017-01-01

    Wireless sensor network-based (WSN-based) applications need an efficient and reliable data dissemination service to facilitate maintenance, management and data distribution tasks. As WSNs nowadays are becoming pervasive and data intensive, bulk data dissemination protocols have been extensively studied recently. This paper provides a comprehensive survey of the state-of-the-art bulk data dissemination protocols. The large number of papers available in the literature propose various techniques to optimize the dissemination protocols. Different from the existing survey works which separately explores the building blocks of dissemination, our work categorizes the literature according to the optimization purposes: Reliability, Scalability and Transmission/Energy efficiency. By summarizing and reviewing the key insights and techniques, we further discuss on the future directions for each category. Our survey helps unveil three key findings for future direction: (1) The recent advances in wireless communications (e.g., study on cross-technology interference, error estimating codes, constructive interference, capture effect) can be potentially exploited to support further optimization on the reliability and energy efficiency of dissemination protocols; (2) Dissemination in multi-channel, multi-task and opportunistic networks requires more efforts to fully exploit the spatial-temporal network resources to enhance the data propagation; (3) Since many designs incur changes on MAC layer protocols, the co-existence of dissemination with other network protocols is another problem left to be addressed. PMID:28098830

  9. Plant X-tender: An extension of the AssemblX system for the assembly and expression of multigene constructs in plants.

    PubMed

    Lukan, Tjaša; Machens, Fabian; Coll, Anna; Baebler, Špela; Messerschmidt, Katrin; Gruden, Kristina

    2018-01-01

    Cloning multiple DNA fragments for delivery of several genes of interest into the plant genome is one of the main technological challenges in plant synthetic biology. Despite several modular assembly methods developed in recent years, the plant biotechnology community has not widely adopted them yet, probably due to the lack of appropriate vectors and software tools. Here we present Plant X-tender, an extension of the highly efficient, scar-free and sequence-independent multigene assembly strategy AssemblX, based on overlap-depended cloning methods and rare-cutting restriction enzymes. Plant X-tender consists of a set of plant expression vectors and the protocols for most efficient cloning into the novel vector set needed for plant expression and thus introduces advantages of AssemblX into plant synthetic biology. The novel vector set covers different backbones and selection markers to allow full design flexibility. We have included ccdB counterselection, thereby allowing the transfer of multigene constructs into the novel vector set in a straightforward and highly efficient way. Vectors are available as empty backbones and are fully flexible regarding the orientation of expression cassettes and addition of linkers between them, if required. We optimised the assembly and subcloning protocol by testing different scar-less assembly approaches: the noncommercial SLiCE and TAR methods and the commercial Gibson assembly and NEBuilder HiFi DNA assembly kits. Plant X-tender was applicable even in combination with low efficient homemade chemically competent or electrocompetent Escherichia coli. We have further validated the developed procedure for plant protein expression by cloning two cassettes into the newly developed vectors and subsequently transferred them to Nicotiana benthamiana in a transient expression setup. Thereby we show that multigene constructs can be delivered into plant cells in a streamlined and highly efficient way. Our results will support faster introduction of synthetic biology into plant science.

  10. Plant X-tender: An extension of the AssemblX system for the assembly and expression of multigene constructs in plants

    PubMed Central

    Machens, Fabian; Coll, Anna; Baebler, Špela; Messerschmidt, Katrin; Gruden, Kristina

    2018-01-01

    Cloning multiple DNA fragments for delivery of several genes of interest into the plant genome is one of the main technological challenges in plant synthetic biology. Despite several modular assembly methods developed in recent years, the plant biotechnology community has not widely adopted them yet, probably due to the lack of appropriate vectors and software tools. Here we present Plant X-tender, an extension of the highly efficient, scar-free and sequence-independent multigene assembly strategy AssemblX, based on overlap-depended cloning methods and rare-cutting restriction enzymes. Plant X-tender consists of a set of plant expression vectors and the protocols for most efficient cloning into the novel vector set needed for plant expression and thus introduces advantages of AssemblX into plant synthetic biology. The novel vector set covers different backbones and selection markers to allow full design flexibility. We have included ccdB counterselection, thereby allowing the transfer of multigene constructs into the novel vector set in a straightforward and highly efficient way. Vectors are available as empty backbones and are fully flexible regarding the orientation of expression cassettes and addition of linkers between them, if required. We optimised the assembly and subcloning protocol by testing different scar-less assembly approaches: the noncommercial SLiCE and TAR methods and the commercial Gibson assembly and NEBuilder HiFi DNA assembly kits. Plant X-tender was applicable even in combination with low efficient homemade chemically competent or electrocompetent Escherichia coli. We have further validated the developed procedure for plant protein expression by cloning two cassettes into the newly developed vectors and subsequently transferred them to Nicotiana benthamiana in a transient expression setup. Thereby we show that multigene constructs can be delivered into plant cells in a streamlined and highly efficient way. Our results will support faster introduction of synthetic biology into plant science. PMID:29300787

  11. Prevalence and referral rates in neonatal hearing screening program using two step hearing screening protocol in Chennai - A prospective study.

    PubMed

    Vignesh, S S; Jaya, V; Sasireka, B I; Sarathy, Kamala; Vanthana, M

    2015-10-01

    To estimate the prevalence and referral rates in well born and high risk babies using two step hearing screening protocol with Distortion Product Otoacoustic Emissions (DPOAE) and Automated Auditory Brainstem Response (AABR). A prospective study was carried out on 1405 neonates (983 well born babies and 422 high risk babies) who were screened during May 2013 to January 2015 at Institute of Obstetrics and Gynecology, Madras Medical College, Chennai. All neonates were screened using two step screening protocol. They were initially tested with DPOAE. Referred babies in DPOAE were screened with AABR subsequently. Among 1405 (100%) neonates 983 (69.96%) were well born babies and 422 (30.03%) were high risk babies. Total referral rate in DPOAE was found to be 311 (22.13%) among which 195 (13.87%) were well born babies and 116 (8.25%) were high risk babies. Out of 311 babies 31 (2.20%) babies were referred in AABR screening. In 31 babies referred in AABR 11(0.78%) were from well born group and 20 (1.42%) were from the high risk group. Further diagnostic evaluation of these babies, 2 (0.14%) were confirmed to have hearing loss. This study reveals, the prevalence of congenital hearing loss in our population is 1.42 per 1000 babies. Using two step protocol especially AABR along with DPOAE at the initial level of testing significantly reduces referral rates in new born screening programs. Also AABR decreases the false positive responses hence increasing the efficiency of screening program. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  12. Cryptanalysis and Improvement of the Semi-quantum Secret Sharing Protocol

    NASA Astrophysics Data System (ADS)

    Gao, Xiang; Zhang, Shibin; Chang, Yan

    2017-08-01

    Recently, Xie et al. Int. J. Theor. Phys. 54, 3819-3824, (2015) proposed a Semi-quantum secret sharing protocol (SQSS). Yin et al. Int. J. Theor. Phys. 55: 4027-4035, (2016) pointed out that this protocol suffers from the intercept-resend attack. Yin et al. also proposed an improved protocol. However, we find out that Yin et al.'s paper has some problems, we analyze Yin et al.'s paper, then proposed the improved semi-quantum secret sharing protocol. Our protocol is more secure and efficient, most importantly, our protocol satisfies the condition of semi-quantum.

  13. Review and publication of protocol submissions to Trials - what have we learned in 10 years?

    PubMed

    Li, Tianjing; Boutron, Isabelle; Al-Shahi Salman, Rustam; Cobo, Erik; Flemyng, Ella; Grimshaw, Jeremy M; Altman, Douglas G

    2016-12-16

    Trials has 10 years of experience in providing open access publication of protocols for randomised controlled trials. In this editorial, the senior editors and editors-in-chief of Trials discuss editorial issues regarding managing trial protocol submissions, including the content and format of the protocol, timing of submission, approaches to tracking protocol amendments, and the purpose of peer reviewing a protocol submission. With the clarification and guidance provided, we hope we can make the process of publishing trial protocols more efficient and useful to trial investigators and readers.

  14. MTP: An atomic multicast transport protocol

    NASA Technical Reports Server (NTRS)

    Freier, Alan O.; Marzullo, Keith

    1990-01-01

    Multicast transport protocol (MTP); a reliable transport protocol that utilizes the multicast strategy of applicable lower layer network architectures is described. In addition to transporting data reliably and efficiently, MTP provides the client synchronization necessary for agreement on the receipt of data and the joining of the group of communicants.

  15. A data transmission method for particle physics experiments based on Ethernet physical layer

    NASA Astrophysics Data System (ADS)

    Huang, Xi-Ru; Cao, Ping; Zheng, Jia-Jun

    2015-11-01

    Due to its advantages of universality, flexibility and high performance, fast Ethernet is widely used in readout system design for modern particle physics experiments. However, Ethernet is usually used together with the TCP/IP protocol stack, which makes it difficult to implement readout systems because designers have to use the operating system to process this protocol. Furthermore, TCP/IP degrades the transmission efficiency and real-time performance. To maximize the performance of Ethernet in physics experiment applications, a data readout method based on the physical layer (PHY) is proposed. In this method, TCP/IP is replaced with a customized and simple protocol, which makes it easier to implement. On each readout module, data from the front-end electronics is first fed into an FPGA for protocol processing and then sent out to a PHY chip controlled by this FPGA for transmission. This kind of data path is fully implemented by hardware. From the side of the data acquisition system (DAQ), however, the absence of a standard protocol causes problems for the network related applications. To solve this problem, in the operating system kernel space, data received by the network interface card is redirected from the traditional flow to a specified memory space by a customized program. This memory space can easily be accessed by applications in user space. For the purpose of verification, a prototype system has been designed and implemented. Preliminary test results show that this method can meet the requirements of data transmission from the readout module to the DAQ with an efficient and simple manner. Supported by National Natural Science Foundation of China (11005107) and Independent Projects of State Key Laboratory of Particle Detection and Electronics (201301)

  16. Practical quantum key distribution protocol without monitoring signal disturbance.

    PubMed

    Sasaki, Toshihiko; Yamamoto, Yoshihisa; Koashi, Masato

    2014-05-22

    Quantum cryptography exploits the fundamental laws of quantum mechanics to provide a secure way to exchange private information. Such an exchange requires a common random bit sequence, called a key, to be shared secretly between the sender and the receiver. The basic idea behind quantum key distribution (QKD) has widely been understood as the property that any attempt to distinguish encoded quantum states causes a disturbance in the signal. As a result, implementation of a QKD protocol involves an estimation of the experimental parameters influenced by the eavesdropper's intervention, which is achieved by randomly sampling the signal. If the estimation of many parameters with high precision is required, the portion of the signal that is sacrificed increases, thus decreasing the efficiency of the protocol. Here we propose a QKD protocol based on an entirely different principle. The sender encodes a bit sequence onto non-orthogonal quantum states and the receiver randomly dictates how a single bit should be calculated from the sequence. The eavesdropper, who is unable to learn the whole of the sequence, cannot guess the bit value correctly. An achievable rate of secure key distribution is calculated by considering complementary choices between quantum measurements of two conjugate observables. We found that a practical implementation using a laser pulse train achieves a key rate comparable to a decoy-state QKD protocol, an often-used technique for lasers. It also has a better tolerance of bit errors and of finite-sized-key effects. We anticipate that this finding will give new insight into how the probabilistic nature of quantum mechanics can be related to secure communication, and will facilitate the simple and efficient use of conventional lasers for QKD.

  17. Factors affecting the efficient transformation of Colletotrichum species

    USGS Publications Warehouse

    Redman, Regina S.; Rodriguez, Rusty J.

    1994-01-01

    Factors affecting the efficient transformation of Colletotrichum species. Experimental Mycology, 18, 230-246. Twelve isolates representing four species of Colletotrichum were transformed either by enhanced protoplast, restriction enzyme-mediated integration (REMI), or electroporation-mediated protocols. The enhanced protoplast transformation protocol resulted in 100- and 50-fold increases in the transformation efficiencies of Colletotrichum lindemuthianum and C. magna , respectively. REMI transformation involved the use of Hin dIII and vector DNA linearized with HindIII to increase the number of integration events and potential gene disruptions in the fungal genome. Combining the enhanced protoplast and the REMI protocols resulted in a 22-fold increase in the number of hygromycin/nystatin-resistant mutants in C. lindemuthianum . Electroporation-mediated transformation was performed on mycelial fragments and spores of four Colletotrichum species, resulting in efficiencies of up to 1000 transformants/μg DNA. The pHA1.3 vector which confers hygromycin resistance contains telomeric sequences from Fusarium oxysporum , transforms by autonomous replication and genomic integration, and was essential for elevated transformation efficiencies of 100 to 10,000 transformants/μg DNA. Modifications of pHA1.3 occurred during bacterial amplification and post fungal transformation resulting in plasmids capable of significantly elevated transformation efficiencies in C. lindemuthianum.

  18. Continuous-variable quantum-key-distribution protocols with a non-Gaussian modulation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Leverrier, Anthony; Grangier, Philippe; Laboratoire Charles Fabry, Institut d'Optique, CNRS, Univ. Paris-Sud, Campus Polytechnique, RD 128, F-91127 Palaiseau Cedex

    2011-04-15

    In this paper, we consider continuous-variable quantum-key-distribution (QKD) protocols which use non-Gaussian modulations. These specific modulation schemes are compatible with very efficient error-correction procedures, hence allowing the protocols to outperform previous protocols in terms of achievable range. In their simplest implementation, these protocols are secure for any linear quantum channels (hence against Gaussian attacks). We also show how the use of decoy states makes the protocols secure against arbitrary collective attacks, which implies their unconditional security in the asymptotic limit.

  19. Environmental Technology Verification Coatings and Coating Equipment Program (ETV CCEP). High Transfer Efficiency Spray Equipment - Generic Verification Protocol (Revision 0)

    DTIC Science & Technology

    2006-09-30

    High-Pressure Waterjet • CO2 Pellet/Turbine Wheel • Ultrahigh-Pressure Waterjet 5 Process Water Reuse/Recycle • Cross-Flow Microfiltration ...documented on a process or laboratory form. Corrective action will involve taking all necessary steps to restore a measuring system to proper working order...In all cases, a nonconformance will be rectified before sample processing and analysis continues. If corrective action does not restore the

  20. Musical auditory stimulus acutely influences heart rate dynamic responses to medication in subjects with well-controlled hypertension.

    PubMed

    Martiniano, Eli Carlos; Santana, Milana Drumond Ramos; Barros, Érico Luiz Damasceno; do Socorro da Silva, Maria; Garner, David Matthew; de Abreu, Luiz Carlos; Valenti, Vitor E

    2018-01-17

    Music can improve the efficiency of medical treatment when correctly associated with drug action, reducing risk factors involving deteriorating cardiac function. We evaluated the effect of musical auditory stimulus associated with anti-hypertensive medication on heart rate (HR) autonomic control in hypertensive subjects. We evaluated 37 well-controlled hypertensive patients designated for anti-hypertensive medication. Heart rate variability (HRV) was calculated from the HR monitor recordings of two different, randomly sorted protocols (control and music) on two separate days. Patients were examined in a resting condition 10 minutes before medication and 20 minutes, 40 minutes and 60 minutes after oral medication. Music was played throughout the 60 minutes after medication with the same intensity for all subjects in the music protocol. We noted analogous response of systolic and diastolic arterial pressure in both protocols. HR decreased 60 minutes after medication in the music protocol while it remained unchanged in the control protocol. The effects of anti-hypertensive medication on SDNN (Standard deviation of all normal RR intervals), LF (low frequency, nu), HF (high frequency, nu) and alpha-1 scale were more intense in the music protocol. In conclusion, musical auditory stimulus increased HR autonomic responses to anti-hypertensive medication in well-controlled hypertensive subjects.

  1. A potent approach for the development of FPGA based DAQ system for HEP experiments

    NASA Astrophysics Data System (ADS)

    Khan, Shuaib Ahmad; Mitra, Jubin; David, Erno; Kiss, Tivadar; Nayak, Tapan Kumar

    2017-10-01

    With ever increasing particle beam energies and interaction rates in modern High Energy Physics (HEP) experiments in the present and future accelerator facilities, there has always been the demand for robust Data Acquisition (DAQ) schemes which perform in the harsh radiation environment and handle high data volume. The scheme is required to be flexible enough to adapt to the demands of future detector and electronics upgrades, and at the same time keeping the cost factor in mind. To address these challenges, in the present work, we discuss an efficient DAQ scheme for error resilient, high speed data communication on commercially available state-of-the-art FPGA with optical links. The scheme utilises GigaBit Transceiver (GBT) protocol to establish radiation tolerant communication link between on-detector front-end electronics situated in harsh radiation environment to the back-end Data Processing Unit (DPU) placed in a low radiation zone. The acquired data are reconstructed in DPU which reduces the data volume significantly, and then transmitted to the computing farms through high speed optical links using 10 Gigabit Ethernet (10GbE). In this study, we focus on implementation and testing of GBT protocol and 10GbE links on an Intel FPGA. Results of the measurements of resource utilisation, critical path delays, signal integrity, eye diagram and Bit Error Rate (BER) are presented, which are the indicators for efficient system performance.

  2. Optimization of Agrobacterium-Mediated Transformation in Soybean

    PubMed Central

    Li, Shuxuan; Cong, Yahui; Liu, Yaping; Wang, Tingting; Shuai, Qin; Chen, Nana; Gai, Junyi; Li, Yan

    2017-01-01

    High transformation efficiency is a prerequisite for study of gene function and molecular breeding. Agrobacterium tumefaciens-mediated transformation is a preferred method in many plants. However, the transformation efficiency in soybean is still low. The objective of this study is to optimize Agrobacterium-mediated transformation in soybean by improving the infection efficiency of Agrobacterium and regeneration efficiency of explants. Firstly, four factors affecting Agrobacterium infection efficiency were investigated by estimation of the rate of GUS transient expression in soybean cotyledonary explants, including Agrobacterium concentrations, soybean explants, Agrobacterium suspension medium, and co-cultivation time. The results showed that an infection efficiency of over 96% was achieved by collecting the Agrobacterium at a concentration of OD650 = 0.6, then using an Agrobacterium suspension medium containing 154.2 mg/L dithiothreitol to infect the half-seed cotyledonary explants (from mature seeds imbibed for 1 day), and co-cultured them for 5 days. The Agrobacterium infection efficiencies for soybean varieties Jack Purple and Tianlong 1 were higher than the other six varieties. Secondly, the rates of shoot elongation were compared among six different concentration combinations of gibberellic acid (GA3) and indole-3-acetic acid (IAA). The shoot elongation rate of 34 and 26% was achieved when using the combination of 1.0 mg/L GA3 and 0.1 mg/L IAA for Jack Purple and Tianlong 1, respectively. This rate was higher than the other five concentration combinations of GA3 and IAA, with an 18 and 11% increase over the original laboratory protocol (a combination of 0.5 mg/L GA3 and 0.1 mg/L IAA), respectively. The transformation efficiency was 7 and 10% for Jack Purple and Tianlong 1 at this optimized hormone concentration combination, respectively, which was 2 and 6% higher than the original protocol, respectively. Finally, GUS histochemical staining, PCR, herbicide (glufosinate) painting, and QuickStix Kit for Liberty Link (bar) were used to verify the positive transgenic plants, and absolute quantification PCR confirmed the exogenous gene existed as one to three copies in the soybean genome. This study provides an improved protocol for Agrobacterium-mediated transformation in soybean and a useful reference to improve the transformation efficiency in other plant species. PMID:28286512

  3. Automated selective disruption of slow wave sleep

    PubMed Central

    Ooms, Sharon J.; Zempel, John M.; Holtzman, David M.; Ju, Yo-El S.

    2017-01-01

    Background Slow wave sleep (SWS) plays an important role in neurophysiologic restoration. Experimentally testing the effect of SWS disruption previously required highly time-intensive and subjective methods. Our goal was to develop an automated and objective protocol to reduce SWS without affecting sleep architecture. New Method We developed a custom Matlab™ protocol to calculate electroencephalogram spectral power every 10 seconds live during a polysomnogram, exclude artifact, and, if measurements met criteria for SWS, deliver increasingly louder tones through earphones. Middle-aged healthy volunteers (n=10) each underwent 2 polysomnograms, one with the SWS disruption protocol and one with sham condition. Results The SWS disruption protocol reduced SWS compared to sham condition, as measured by spectral power in the delta (0.5–4 Hz) band, particularly in the 0.5–2 Hz range (mean 20% decrease). A compensatory increase in the proportion of total spectral power in the theta (4–8 Hz) and alpha (8–12 Hz) bands was seen, but otherwise normal sleep features were preserved. N3 sleep decreased from 20±34 to 3±6 minutes, otherwise there were no significant changes in total sleep time, sleep efficiency, or other macrostructural sleep characteristics. Comparison with existing method This novel SWS disruption protocol produces specific reductions in delta band power similar to existing methods, but has the advantage of being automated, such that SWS disruption can be performed easily in a highly standardized and operator-independent manner. Conclusion This automated SWS disruption protocol effectively reduces SWS without impacting overall sleep architecture. PMID:28238859

  4. Nutrient supplements boost yeast transformation efficiency

    PubMed Central

    Yu, Sheng-Chun; Dawson, Alexander; Henderson, Alyssa C.; Lockyer, Eloise J.; Read, Emily; Sritharan, Gayathri; Ryan, Marjah; Sgroi, Mara; Ngou, Pok M.; Woodruff, Rosie; Zhang, Ruifeng; Ren Teen Chia, Travis; Liu, Yu; Xiang, Yiyu; Spanu, Pietro D.

    2016-01-01

    Efficiency of yeast transformation is determined by the rate of yeast endocytosis. The aim of this study was to investigate the effect of introducing amino acids and other nutrients (inositol, adenine, or p-aminobenzoic acid) in the transformation medium to develop a highly efficient yeast transformation protocol. The target of rapamycin complex 1 (TORC1) kinase signalling complex influences the rate of yeast endocytosis. TORC signaling is induced by amino acids in the media. Here, we found that increasing the concentration of amino acids and other nutrients in the growth media lead to an increase yeast transformation efficiency up to 107 CFU per μg plasmid DNA and per 108 cells with a 13.8 kb plasmid DNA. This is over 130 times that of current published methods. This improvement may facilitate more efficient experimentation in which transformation efficiency is critical, such as yeast two-hybrid screening. PMID:27760994

  5. DEVELOPMENT, VALIDATION AND FIELD USE OF NOVEL METHOD FOR EXTRACTING AND ANALYZING ORGANOPHOSPHATE (OP) AND PYRETHROID PESTICIDE METABOLITES AND CREATININE FROM COMMERCIALLY AVAILABLE DISPOSABLE DIAPERS

    EPA Science Inventory

    The ability to efficiently extract urine from disposable diapers ensures an easy to use urine collection protocol and ready compliance for caregivers of very young children. The use of disposable diapers is also desirable because of their high capacity- urine is retained effecti...

  6. Induced Pluripotent Stem Cells: Generation, Characterization, and Differentiation--Methods and Protocols.

    PubMed

    Graversen, Veronica Kon; Chavala, Sai H

    2016-01-01

    Reprogramming fibroblasts into induced pluripotent stem cells (iPSC) remains a promising technique for cell replacement therapy. Diverse populations of somatic cells have been examined for their reprogramming potential. Recently, ocular ciliary body epithelial cells (CECs) have been reprogrammed with high reprogramming efficiency and single transcription factor reprogramming, making them an exciting candidate for cellular reprogramming strategies.

  7. Validation of high-quality potato seed production protocol under controlled conditions (CETS System) in cultivated potato species (Solanum tuberosum L.)

    USDA-ARS?s Scientific Manuscript database

    Low potato yield in Peru and other countries in the region are attributed to the use of low quality seeds and tuber recycling. Therefore, there is consensus on the need of incorporating seed production technologies that are effective and efficient but also consistent with the reality of potato in La...

  8. AD HOC Networks for the Autonomous Car

    NASA Astrophysics Data System (ADS)

    Ron, Davidescu; Negrus, Eugen

    2017-10-01

    The future of the vehicle is made of cars, roads and infrastructures connected in a two way automated communication in a holistic system. It is a mandatory to use Encryption to maintain Confidentiality, Integrity and Availability in an ad hoc vehicle network. Vehicle to Vehicle communication, requires multichannel interaction between mobile, moving and changing parties to insure the full benefit from data sharing and real time decision making, a network of such users referred as mobile ad hoc network (MANET), however as ad hoc networks were not implemented in such a scale, it is not clear what is the best method and protocol to apply. Furthermore the visibility of secure preferred asymmetric encrypted ad hoc networks in a real time environment of dense moving autonomous vehicles has to be demonstrated, In order to evaluate the performance of Ad Hoc networks in changing conditions a simulation of multiple protocols was performed on large number of mobile nodes. The following common routing protocols were tested, DSDV is a proactive protocol, every mobile station maintains a routing table with all available destinations, DSR is a reactive routing protocol which allows nodes in the MANET to dynamically discover a source route across multiple network hops, AODV is a reactive routing protocol Instead of being proactive. It minimizes the number of broadcasts by creating routes based on demand, SAODV is a secure version of AODV, requires heavyweight asymmetric cryptographic, ARIANDE is a routing protocol that relies on highly efficient symmetric cryptography the concept is primarily based on DSR. A methodical evolution was performed in a various density of transportation, based on known communication bench mark parameters including, Throughput Vs. time, Routing Load per packets and bytes. Out of the none encrypted protocols, It is clear that in terms of performance of throughput and routing load DSR protocol has a clear advantage the high node number mode. The encrypted protocols show lower performance with ARIANDE being superior to SAODV and SRP. Nevertheless all protocol simulation proved it to match required real time performance.

  9. Optimization of protocol design: a path to efficient, lower cost clinical trial execution

    PubMed Central

    Malikova, Marina A

    2016-01-01

    Managing clinical trials requires strategic planning and efficient execution. In order to achieve a timely delivery of important clinical trials’ outcomes, it is useful to establish standardized trial management guidelines and develop robust scoring methodology for evaluation of study protocol complexity. This review will explore the challenges clinical teams face in developing protocols to ensure that the right patients are enrolled and the right data are collected to demonstrate that a drug is safe and efficacious, while managing study costs and study complexity based on proposed comprehensive scoring model. Key factors to consider when developing protocols and techniques to minimize complexity will be discussed. A methodology to identify processes at planning phase, approaches to increase fiscal return and mitigate fiscal compliance risk for clinical trials will be addressed. PMID:28031939

  10. An Ultra-low-power Medium Access Control Protocol for Body Sensor Network.

    PubMed

    Li, Huaming; Tan, Jindong

    2005-01-01

    In this paper, a medium access control (MAC) protocol designed for Body Sensor Network (BSN-MAC) is proposed. BSN-MAC is an adaptive, feedback-based and IEEE 802.15.4-compatible MAC protocol. Due to the traffic coupling and sensor diversity characteristics of BSNs, common MAC protocols can not satisfy the unique requirements of the biomedical sensors in BSN. BSN-MAC exploits the feedback information from the deployed sensors to form a closed-loop control of the MAC parameters. A control algorithm is proposed to enable the BSN coordinator to adjust parameters of the IEEE 802.15.4 superframe to achieve both energy efficiency and low latency on energy critical nodes. We evaluate the performance of BSN-MAC using energy efficiency as the primary metric.

  11. IDMA-Based MAC Protocol for Satellite Networks with Consideration on Channel Quality

    PubMed Central

    2014-01-01

    In order to overcome the shortcomings of existing medium access control (MAC) protocols based on TDMA or CDMA in satellite networks, interleave division multiple access (IDMA) technique is introduced into satellite communication networks. Therefore, a novel wide-band IDMA MAC protocol based on channel quality is proposed in this paper, consisting of a dynamic power allocation algorithm, a rate adaptation algorithm, and a call admission control (CAC) scheme. Firstly, the power allocation algorithm combining the technique of IDMA SINR-evolution and channel quality prediction is developed to guarantee high power efficiency even in terrible channel conditions. Secondly, the effective rate adaptation algorithm, based on accurate channel information per timeslot and by the means of rate degradation, can be realized. What is more, based on channel quality prediction, the CAC scheme, combining the new power allocation algorithm, rate scheduling, and buffering strategies together, is proposed for the emerging IDMA systems, which can support a variety of traffic types, and offering quality of service (QoS) requirements corresponding to different priority levels. Simulation results show that the new wide-band IDMA MAC protocol can make accurate estimation of available resource considering the effect of multiuser detection (MUD) and QoS requirements of multimedia traffic, leading to low outage probability as well as high overall system throughput. PMID:25126592

  12. Design and Analysis of A Beacon-Less Routing Protocol for Large Volume Content Dissemination in Vehicular Ad Hoc Networks.

    PubMed

    Hu, Miao; Zhong, Zhangdui; Ni, Minming; Baiocchi, Andrea

    2016-11-01

    Large volume content dissemination is pursued by the growing number of high quality applications for Vehicular Ad hoc NETworks(VANETs), e.g., the live road surveillance service and the video-based overtaking assistant service. For the highly dynamical vehicular network topology, beacon-less routing protocols have been proven to be efficient in achieving a balance between the system performance and the control overhead. However, to the authors' best knowledge, the routing design for large volume content has not been well considered in the previous work, which will introduce new challenges, e.g., the enhanced connectivity requirement for a radio link. In this paper, a link Lifetime-aware Beacon-less Routing Protocol (LBRP) is designed for large volume content delivery in VANETs. Each vehicle makes the forwarding decision based on the message header information and its current state, including the speed and position information. A semi-Markov process analytical model is proposed to evaluate the expected delay in constructing one routing path for LBRP. Simulations show that the proposed LBRP scheme outperforms the traditional dissemination protocols in providing a low end-to-end delay. The analytical model is shown to exhibit a good match on the delay estimation with Monte Carlo simulations, as well.

  13. A rapid and versatile method for the isolation, purification and cryogenic storage of Schwann cells from adult rodent nerves

    PubMed Central

    Andersen, Natalia D.; Srinivas, Shruthi; Piñero, Gonzalo; Monje, Paula V.

    2016-01-01

    We herein developed a protocol for the rapid procurement of adult nerve-derived Schwann cells (SCs) that was optimized to implement an immediate enzymatic dissociation of fresh nerve tissue while maintaining high cell viability, improving yields and minimizing fibroblast and myelin contamination. This protocol introduces: (1) an efficient method for enzymatic cell release immediately after removal of the epineurium and extensive teasing of the nerve fibers; (2) an adaptable drop-plating method for selective cell attachment, removal of myelin debris, and expansion of the initial SC population in chemically defined medium; (3) a magnetic-activated cell sorting purification protocol for rapid and effective fibroblast elimination; and (4) an optional step of cryopreservation for the storage of the excess of cells. Highly proliferative SC cultures devoid of myelin and fibroblast growth were obtained within three days of nerve processing. Characterization of the initial, expanded, and cryopreserved cell products confirmed maintenance of SC identity, viability and growth rates throughout the process. Most importantly, SCs retained their sensitivity to mitogens and potential for differentiation even after cryopreservation. To conclude, this easy-to-implement and clinically relevant protocol allows for the preparation of expandable homogeneous SC cultures while minimizing time, manipulation of the cells, and exposure to culture variables. PMID:27549422

  14. An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks.

    PubMed

    Boubiche, Sabrina; Boubiche, Djallel Eddine; Bilami, Azzedine; Toral-Cruz, Homero

    2016-04-12

    Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes' resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach.

  15. Design and Analysis of A Beacon-Less Routing Protocol for Large Volume Content Dissemination in Vehicular Ad Hoc Networks

    PubMed Central

    Hu, Miao; Zhong, Zhangdui; Ni, Minming; Baiocchi, Andrea

    2016-01-01

    Large volume content dissemination is pursued by the growing number of high quality applications for Vehicular Ad hoc NETworks(VANETs), e.g., the live road surveillance service and the video-based overtaking assistant service. For the highly dynamical vehicular network topology, beacon-less routing protocols have been proven to be efficient in achieving a balance between the system performance and the control overhead. However, to the authors’ best knowledge, the routing design for large volume content has not been well considered in the previous work, which will introduce new challenges, e.g., the enhanced connectivity requirement for a radio link. In this paper, a link Lifetime-aware Beacon-less Routing Protocol (LBRP) is designed for large volume content delivery in VANETs. Each vehicle makes the forwarding decision based on the message header information and its current state, including the speed and position information. A semi-Markov process analytical model is proposed to evaluate the expected delay in constructing one routing path for LBRP. Simulations show that the proposed LBRP scheme outperforms the traditional dissemination protocols in providing a low end-to-end delay. The analytical model is shown to exhibit a good match on the delay estimation with Monte Carlo simulations, as well. PMID:27809285

  16. Copper- and copper–N-heterocyclic carbene-catalyzed C─H activating carboxylation of terminal alkynes with CO2 at ambient conditions

    PubMed Central

    Yu, Dingyi; Zhang, Yugen

    2010-01-01

    The use of carbon dioxide as a renewable and environmentally friendly source of carbon in organic synthesis is a highly attractive approach, but its real world applications remain a great challenge. The major obstacles for commercialization of most current protocols are their low catalytic performances, harsh reaction conditions, and limited substrate scope. It is important to develop new reactions and new protocols for CO2 transformations at mild conditions and in cost-efficient ways. Herein, a copper-catalyzed and copper–N-heterocyclic carbene-cocatalyzed transformation of CO2 to carboxylic acids via C─H bond activation of terminal alkynes with or without base additives is reported. Various propiolic acids were synthesized in good to excellent yields under ambient conditions without consumption of any organometallic or organic reagent additives. This system has a wide scope of substrates and functional group tolerances and provides a powerful tool for the synthesis of highly functionalized propiolic acids. This catalytic system is a simple and economically viable protocol with great potential in practical applications. PMID:21059950

  17. Optimization of a solid-state electron spin qubit using Gate Set Tomography

    DOE PAGES

    Dehollain, Juan P.; Muhonen, Juha T.; Blume-Kohout, Robin J.; ...

    2016-10-13

    Here, state of the art qubit systems are reaching the gate fidelities required for scalable quantum computation architectures. Further improvements in the fidelity of quantum gates demands characterization and benchmarking protocols that are efficient, reliable and extremely accurate. Ideally, a benchmarking protocol should also provide information on how to rectify residual errors. Gate Set Tomography (GST) is one such protocol designed to give detailed characterization of as-built qubits. We implemented GST on a high-fidelity electron-spin qubit confined by a single 31P atom in 28Si. The results reveal systematic errors that a randomized benchmarking analysis could measure but not identify, whereasmore » GST indicated the need for improved calibration of the length of the control pulses. After introducing this modification, we measured a new benchmark average gate fidelity of 99.942(8)%, an improvement on the previous value of 99.90(2)%. Furthermore, GST revealed high levels of non-Markovian noise in the system, which will need to be understood and addressed when the qubit is used within a fault-tolerant quantum computation scheme.« less

  18. Remote control of the industry processes. POWERLINK protocol application

    NASA Astrophysics Data System (ADS)

    Wóbel, A.; Paruzel, D.; Paszkiewicz, B.

    2017-08-01

    The present technological development enables the use of solutions characterized by a lower failure rate, and work with greater precision. This allows you to obtain the most efficient production, high speed production and reliability of individual components. The main scope of this article was POWERLINK protocol application for communication with the controller B & R through communication Ethernet for recording process parameters. This enables control of run production cycle using an internal network connected to the PC industry. Knowledge of the most important parameters of the production in real time allows detecting of a failure immediately after occurrence. For this purpose, the position of diagnostic use driver X20CP1301 B&R to record measurement data such as pressure, temperature valve between the parties and the torque required to change the valve setting was made. The use of POWERLINK protocol allows for the transmission of information on the status of every 200 μs.

  19. Wildlife feeding in parks: methods for monitoring the effectiveness of educational interventions and wildlife food attraction behaviors

    USGS Publications Warehouse

    Marion, Jeffrey L.; Dvorak, Robert G.; Manning, Robert E.

    2008-01-01

    Opportunities to view and interact with wildlife are often an important part of high quality recreational experiences. Such interactions frequently include wildlife feeding, resulting in food-conditioned behaviors that may cause harm to both wildlife and visitors. This study developed and applied efficient protocols for simultaneously evaluating wildlife feeding-related behaviors of visitors and related foraging behaviors of chipmunks along a trail in Zion National Park. Unobtrusive observation protocols permitted an evaluation of educational messages delivered, and documentation of wildlife success in obtaining human food and the strength of their food attraction behavior. Significant improvements were documented for some targeted visitor behaviors and human food available to chipmunks, with minor differences between treatments. Replication of these protocols as part of a long-term monitoring program can help protected area managers evaluate and improve the efficacy of their interventions and monitor the strength of food attraction behavior in wildlife.

  20. Detection of single-copy functional genes in prokaryotic cells by two-pass TSA-FISH with polynucleotide probes.

    PubMed

    Kawakami, Shuji; Hasegawa, Takuya; Imachi, Hiroyuki; Yamaguchi, Takashi; Harada, Hideki; Ohashi, Akiyoshi; Kubota, Kengo

    2012-02-01

    In situ detection of functional genes with single-cell resolution is currently of interest to microbiologists. Here, we developed a two-pass tyramide signal amplification (TSA)-fluorescence in situ hybridization (FISH) protocol with PCR-derived polynucleotide probes for the detection of single-copy genes in prokaryotic cells. The mcrA gene and the apsA gene in methanogens and sulfate-reducing bacteria, respectively, were targeted. The protocol showed bright fluorescence with a good signal-to-noise ratio and achieved a high efficiency of detection (>98%). The discrimination threshold was approximately 82-89% sequence identity. Microorganisms possessing the mcrA or apsA gene in anaerobic sludge samples were successfully detected by two-pass TSA-FISH with polynucleotide probes. The developed protocol is useful for identifying single microbial cells based on functional gene sequences. Copyright © 2011 Elsevier B.V. All rights reserved.

  1. Improvement of two-way continuous-variable quantum key distribution with virtual photon subtraction

    NASA Astrophysics Data System (ADS)

    Zhao, Yijia; Zhang, Yichen; Li, Zhengyu; Yu, Song; Guo, Hong

    2017-08-01

    We propose a method to improve the performance of two-way continuous-variable quantum key distribution protocol by virtual photon subtraction. The virtual photon subtraction implemented via non-Gaussian post-selection not only enhances the entanglement of two-mode squeezed vacuum state but also has advantages in simplifying physical operation and promoting efficiency. In two-way protocol, virtual photon subtraction could be applied on two sources independently. Numerical simulations show that the optimal performance of renovated two-way protocol is obtained with photon subtraction only used by Alice. The transmission distance and tolerable excess noise are improved by using the virtual photon subtraction with appropriate parameters. Moreover, the tolerable excess noise maintains a high value with the increase in distance so that the robustness of two-way continuous-variable quantum key distribution system is significantly improved, especially at long transmission distance.

  2. CPAC: Energy-Efficient Data Collection through Adaptive Selection of Compression Algorithms for Sensor Networks

    PubMed Central

    Lee, HyungJune; Kim, HyunSeok; Chang, Ik Joon

    2014-01-01

    We propose a technique to optimize the energy efficiency of data collection in sensor networks by exploiting a selective data compression. To achieve such an aim, we need to make optimal decisions regarding two aspects: (1) which sensor nodes should execute compression; and (2) which compression algorithm should be used by the selected sensor nodes. We formulate this problem into binary integer programs, which provide an energy-optimal solution under the given latency constraint. Our simulation results show that the optimization algorithm significantly reduces the overall network-wide energy consumption for data collection. In the environment having a stationary sink from stationary sensor nodes, the optimized data collection shows 47% energy savings compared to the state-of-the-art collection protocol (CTP). More importantly, we demonstrate that our optimized data collection provides the best performance in an intermittent network under high interference. In such networks, we found that the selective compression for frequent packet retransmissions saves up to 55% energy compared to the best known protocol. PMID:24721763

  3. One-pot preparation of mRNA/cDNA display by a novel and versatile puromycin-linker DNA.

    PubMed

    Mochizuki, Yuki; Biyani, Manish; Tsuji-Ueno, Sachika; Suzuki, Miho; Nishigaki, Koichi; Husimi, Yuzuru; Nemoto, Naoto

    2011-09-12

    A rapid, easy, and robust preparation method for mRNA/cDNA display using a newly designed puromycin-linker DNA is presented. The new linker is structurally simple, easy to synthesize, and cost-effective for use in "in vitro peptide and protein selection". An introduction of RNase T1 nuclease site to the new linker facilitates the easy recovery of mRNA/cDNA displayed protein by an improvement of the efficiency of ligating the linker to mRNAs and efficient release of mRNA/cDNA displayed protein from the solid-phase (magnetic bead). For application demonstration, affinity selections were successfully performed. Furthermore, we introduced a "one-pot" preparation protocol to perform mRNA display easy. Unlike conventional approaches that require tedious and downstream multistep process including purification, this protocol will make the mRNA/cDNA display methods more practical and convenient and also facilitate the development of next-generation, high-throughput mRNA/cDNA display systems amenable to automation.

  4. Simple and Efficient Generation of Aryl Radicals from Aryl Triflates: Synthesis of Aryl Boronates and Aryl Iodides at Room Temperature.

    PubMed

    Liu, Wenbo; Yang, Xiaobo; Gao, Yang; Li, Chao-Jun

    2017-06-28

    Despite the wide use of aryl radicals in organic synthesis, current methods to prepare them from aryl halides, carboxylic acids, boronic acids, and diazonium salts suffer from limitations. Aryl triflates, easily obtained from phenols, are promising aryl radical progenitors but remain elusive in this regard. Inspired by the single electron transfer process for aryl halides to access aryl radicals, we developed a simple and efficient protocol to convert aryl triflates to aryl radicals. Our success lies in exploiting sodium iodide as the soft electron donor assisted by light. This strategy enables the scalable synthesis of two types of important organic molecules, i.e., aryl boronates and aryl iodides, in good to high yields, with broad functional group compatibility in a transition-metal-free manner at room temperature. This protocol is anticipated to find potential applications in other aryl-radical-involved reactions by using aryl triflates as aryl radical precursors.

  5. An Enhanced Secure Identity-Based Certificateless Public Key Authentication Scheme for Vehicular Sensor Networks.

    PubMed

    Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng

    2018-01-11

    Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes.

  6. Micropropagation of Asparagus by in vitro shoot culture.

    PubMed

    Stajner, Nataša

    2013-01-01

    Asparagus officinalis is most extensively studied species within the genus Asparagus, which is well known as garden asparagus. This species is dioecious with unisexual flowers, which means that generative propagation gives roughly equal number of male and female plants. Male plants are high yielders and preferred commercially over female plants. Tissue culture techniques could efficiently promote vegetative propagation of male plants and pave the way for efficient plant breeding.This chapter describes an efficient micropropagation protocol for developing rapid growing in vitro Asparagus shoot cultures. The source of explants, inoculation, and shoot proliferation, followed by shoot propagation, rooting, and acclimatization is described. The optimal medium for Asparagus micropropagation described in this chapter is composed of MS macro- and microelements and a combination of auxins and cytokinins. Plant growth regulators NAA, kinetin, and BA were used in various concentrations. Three different media representing the whole micropropagation protocol of Asparagus are described; medium for shoot initiation, medium for shoot multiplication, and medium for root formation. By in vitro propagation of Asparagus, root initiation is difficult, but can be promoted by adding growth retardant ancymidol which also greatly promotes shoot development and suppresses callus formation.

  7. Chapter 17 Sterile Plate-Based Vitrification of Adherent Human Pluripotent Stem Cells and Their Derivatives Using the TWIST Method.

    PubMed

    Neubauer, Julia C; Stracke, Frank; Zimmermann, Heiko

    2017-01-01

    Due to their high biological complexity, e.g., their close cell-to-cell contacts, cryopreservation of human pluripotent stem cells with standard slow-rate protocols often is inefficient and can hardly be standardized. Vitrification that means ultrafast freezing already showed very good viability and recovery rates for this sensitive cell system, but is only applicable for low cell numbers, bears a high risk of contamination, and can hardly be implemented under GxP regulations. In this chapter, a sterile plate-based vitrification method for adherent pluripotent stem cells and their derivatives is presented based on a procedure and device for human embryonic stem cells developed by Beier et al. (Cryobiology 66:8-16, 2013). This protocol overcomes the limitations of conventional vitrification procedures resulting in the highly efficient preservation of ready-to-use adherent pluripotent stem cells with the possibility of vitrifying cells in multi-well formats for direct application in high-throughput screenings.

  8. An improved high-throughput lipid extraction method for the analysis of human brain lipids.

    PubMed

    Abbott, Sarah K; Jenner, Andrew M; Mitchell, Todd W; Brown, Simon H J; Halliday, Glenda M; Garner, Brett

    2013-03-01

    We have developed a protocol suitable for high-throughput lipidomic analysis of human brain samples. The traditional Folch extraction (using chloroform and glass-glass homogenization) was compared to a high-throughput method combining methyl-tert-butyl ether (MTBE) extraction with mechanical homogenization utilizing ceramic beads. This high-throughput method significantly reduced sample handling time and increased efficiency compared to glass-glass homogenizing. Furthermore, replacing chloroform with MTBE is safer (less carcinogenic/toxic), with lipids dissolving in the upper phase, allowing for easier pipetting and the potential for automation (i.e., robotics). Both methods were applied to the analysis of human occipital cortex. Lipid species (including ceramides, sphingomyelins, choline glycerophospholipids, ethanolamine glycerophospholipids and phosphatidylserines) were analyzed via electrospray ionization mass spectrometry and sterol species were analyzed using gas chromatography mass spectrometry. No differences in lipid species composition were evident when the lipid extraction protocols were compared, indicating that MTBE extraction with mechanical bead homogenization provides an improved method for the lipidomic profiling of human brain tissue.

  9. Novel method for high-throughput colony PCR screening in nanoliter-reactors

    PubMed Central

    Walser, Marcel; Pellaux, Rene; Meyer, Andreas; Bechtold, Matthias; Vanderschuren, Herve; Reinhardt, Richard; Magyar, Joseph; Panke, Sven; Held, Martin

    2009-01-01

    We introduce a technology for the rapid identification and sequencing of conserved DNA elements employing a novel suspension array based on nanoliter (nl)-reactors made from alginate. The reactors have a volume of 35 nl and serve as reaction compartments during monoseptic growth of microbial library clones, colony lysis, thermocycling and screening for sequence motifs via semi-quantitative fluorescence analyses. nl-Reactors were kept in suspension during all high-throughput steps which allowed performing the protocol in a highly space-effective fashion and at negligible expenses of consumables and reagents. As a first application, 11 high-quality microsatellites for polymorphism studies in cassava were isolated and sequenced out of a library of 20 000 clones in 2 days. The technology is widely scalable and we envision that throughputs for nl-reactor based screenings can be increased up to 100 000 and more samples per day thereby efficiently complementing protocols based on established deep-sequencing technologies. PMID:19282448

  10. Photoredox-catalyzed deuteration and tritiation of pharmaceutical compounds

    PubMed Central

    Loh, Yong Yao; Nagao, Kazunori; Hoover, Andrew J.; Hesk, David; Rivera, Nelo R.; Colletti, Steven L.; Davies, Ian W.; MacMillan, David W. C.

    2018-01-01

    Deuterium- and tritium-labeled pharmaceutical compounds are pivotal diagnostic tools in drug discovery research, providing vital information about the biological fate of drugs and drug metabolites. Herein we demonstrate that a photoredox-mediated hydrogen atom transfer protocol can efficiently and selectively install deuterium (D) and tritium (T) at α-amino sp3 carbon-hydrogen bonds in a single step, using isotopically labeled water (D2O or T2O) as the source of hydrogen isotope. In this context, we also report a convenient synthesis of T2O from T2, providing access to high-specific-activity T2O. This protocol has been successfully applied to the high incorporation of deuterium and tritium in 18 drug molecules, which meet the requirements for use in ligand-binding assays and absorption, distribution, metabolism, and excretion studies. PMID:29123019

  11. Purification of Bacteriophages Using Anion-Exchange Chromatography.

    PubMed

    Vandenheuvel, Dieter; Rombouts, Sofie; Adriaenssens, Evelien M

    2018-01-01

    In bacteriophage research and therapy, most applications ask for highly purified phage suspensions. The standard technique for this is ultracentrifugation using cesium chloride gradients. This technique is cumbersome, elaborate and expensive. Moreover, it is unsuitable for the purification of large quantities of phage suspensions.The protocol described here, uses anion-exchange chromatography to bind phages to a stationary phase. This is done using an FLPC system, combined with Convective Interaction Media (CIM ® ) monoliths. Afterward, the column is washed to remove impurities from the CIM ® disk. By using a buffer solution with a high ionic strength, the phages are subsequently eluted from the column and collected. In this way phages can be efficiently purified and concentrated.This protocol can be used to determine the optimal buffers, stationary phase chemistry and elution conditions, as well as the maximal capacity and recovery of the columns.

  12. A facile approach to manufacturing non-ionic surfactant nanodipsersions using proniosome technology and high-pressure homogenization.

    PubMed

    Najlah, Mohammad; Hidayat, Kanar; Omer, Huner K; Mwesigwa, Enosh; Ahmed, Waqar; AlObaidy, Kais G; Phoenix, David A; Elhissi, Abdelbary

    2015-03-01

    In this study, a niosome nanodispersion was manufactured using high-pressure homogenization following the hydration of proniosomes. Using beclometasone dipropionate (BDP) as a model drug, the characteristics of the homogenized niosomes were compared with vesicles prepared via the conventional approach of probe-sonication. Particle size, zeta potential, and the drug entrapment efficiency were similar for both size reduction mechanisms. However, high-pressure homogenization was much more efficient than sonication in terms of homogenization output rate, avoidance of sample contamination, offering a greater potential for a large-scale manufacturing of noisome nanodispersions. For example, high-pressure homogenization was capable of producing small size niosomes (209 nm) using a short single-step of size reduction (6 min) as compared with the time-consuming process of sonication (237 nm in >18 min) and the BDP entrapment efficiency was 29.65% ± 4.04 and 36.4% ± 2.8. In addition, for homogenization, the output rate of the high-pressure homogenization was 10 ml/min compared with 0.83 ml/min using the sonication protocol. In conclusion, a facile, applicable, and highly efficient approach for preparing niosome nanodispersions has been established using proniosome technology and high-pressure homogenization.

  13. Energy Consumption Research of Mobile Data Collection Protocol for Underwater Nodes Using an USV.

    PubMed

    Lv, Zhichao; Zhang, Jie; Jin, Jiucai; Li, Qi; Gao, Baoru

    2018-04-16

    The Unmanned Surface Vehicle (USV) integrated with an acoustic modem is a novel mobile vehicle for data collection, which has an advantage in terms of mobility, efficiency, and collection cost. In the scenario of data collection, the USV is controlled autonomously along the planning trajectory and the data of underwater nodes are dynamically collected. In order to improve the efficiency of data collection and extend the life of the underwater nodes, a mobile data collection protocol for underwater nodes using the USV was proposed. In the protocol, the stop-and-wait ARQ transmission mechanism is adopted, where the duty cycle is designed considering the ratio between the sleep mode and the detection mode, and the transmission ratio is defined by the duty cycle, wake-up signal cycles, and USV’s speed. According to protocol, the evaluation index for energy consumption is constructed based on the duty cycle and the transmission ratio. The energy consumption of the protocol is simulated and analyzed using the mobile communication experiment data of USV, taking into consideration USV’s speed, data sequence length, and duty cycle. Optimized protocol parameters are identified, which in turn denotes the proposed protocol’s feasibility and effectiveness.

  14. Simplified production and concentration of HIV-1-based lentiviral vectors using HYPERFlask vessels and anion exchange membrane chromatography

    PubMed Central

    Kutner, Robert H; Puthli, Sharon; Marino, Michael P; Reiser, Jakob

    2009-01-01

    Background During the past twelve years, lentiviral (LV) vectors have emerged as valuable tools for transgene delivery because of their ability to transduce nondividing cells and their capacity to sustain long-term transgene expression in target cells in vitro and in vivo. However, despite significant progress, the production and concentration of high-titer, high-quality LV vector stocks is still cumbersome and costly. Methods Here we present a simplified protocol for LV vector production on a laboratory scale using HYPERFlask vessels. HYPERFlask vessels are high-yield, high-performance flasks that utilize a multilayered gas permeable growth surface for efficient gas exchange, allowing convenient production of high-titer LV vectors. For subsequent concentration of LV vector stocks produced in this way, we describe a facile protocol involving Mustang Q anion exchange membrane chromatography. Results Our results show that unconcentrated LV vector stocks with titers in excess of 108 transduction units (TU) per ml were obtained using HYPERFlasks and that these titers were higher than those produced in parallel using regular 150-cm2 tissue culture dishes. We also show that up to 500 ml of an unconcentrated LV vector stock prepared using a HYPERFlask vessel could be concentrated using a single Mustang Q Acrodisc with a membrane volume of 0.18 ml. Up to 5.3 × 1010 TU were recovered from a single HYPERFlask vessel. Conclusion The protocol described here is easy to implement and should facilitate high-titer LV vector production for preclinical studies in animal models without the need for multiple tissue culture dishes and ultracentrifugation-based concentration protocols. PMID:19220915

  15. SVANET: A smart vehicular ad hoc network for efficient data transmission with wireless sensors.

    PubMed

    Sahoo, Prasan Kumar; Chiang, Ming-Jer; Wu, Shih-Lin

    2014-11-25

    Wireless sensors can sense any event, such as accidents, as well as icy roads, and can forward the rescue/warning messages through intermediate vehicles for any necessary help. In this paper, we propose a smart vehicular ad hoc network (SVANET) architecture that uses wireless sensors to detect events and vehicles to transmit the safety and non-safety messages efficiently by using different service channels and one control channel with different priorities. We have developed a data transmission protocol for the vehicles in the highway, in which data can be forwarded with the help of vehicles if they are connected with each other or data can be forwarded with the help of nearby wireless sensors. Our data transmission protocol is designed to increase the driving safety, to prevent accidents and to utilize channels efficiently by adjusting the control and service channel time intervals dynamically. Besides, our protocol can transmit information to vehicles in advance, so that drivers can decide an alternate route in case of traffic congestion. For various data sharing, we design a method that can select a few leader nodes among vehicles running along a highway to broadcast data efficiently. Simulation results show that our protocol can outperform the existing standard in terms of the end to end packet delivery ratio and latency.

  16. SVANET: A Smart Vehicular Ad Hoc Network for Efficient Data Transmission with Wireless Sensors

    PubMed Central

    Sahoo, Prasan Kumar; Chiang, Ming-Jer; Wu, Shih-Lin

    2014-01-01

    Wireless sensors can sense any event, such as accidents, as well as icy roads, and can forward the rescue/warning messages through intermediate vehicles for any necessary help. In this paper, we propose a smart vehicular ad hoc network (SVANET) architecture that uses wireless sensors to detect events and vehicles to transmit the safety and non-safety messages efficiently by using different service channels and one control channel with different priorities. We have developed a data transmission protocol for the vehicles in the highway, in which data can be forwarded with the help of vehicles if they are connected with each other or data can be forwarded with the help of nearby wireless sensors. Our data transmission protocol is designed to increase the driving safety, to prevent accidents and to utilize channels efficiently by adjusting the control and service channel time intervals dynamically. Besides, our protocol can transmit information to vehicles in advance, so that drivers can decide an alternate route in case of traffic congestion. For various data sharing, we design a method that can select a few leader nodes among vehicles running along a highway to broadcast data efficiently. Simulation results show that our protocol can outperform the existing standard in terms of the end to end packet delivery ratio and latency. PMID:25429409

  17. Efficiency of metaphase II oocytes following minimal/mild ovarian stimulation in vitro fertilization.

    PubMed

    Zhang, John J; Yang, Mingxue; Merhi, Zaher

    2016-01-01

    An inverse relationship between oocyte efficiency and ovarian response was reported in conventional IVF. The purpose of this study was to report metaphase II (MII) oocyte efficiency according to oocyte yield in minimal/mild stimulation IVF (mIVF) and to assess whether oocyte yield affects live birth rate (LBR). Infertile women ( n  = 264) aged < 39 years old with normal ovarian reserve who had mIVF were recruited. All participants received the same protocol for ovarian stimulation. All the embryos were cultured to the blastocyst stage and vitrified using a freeze-all approach. This was followed by a single blastocyst transferred to each participant in subsequent cycles over a 6-month period. Ovarian response was categorized according to the number of MII oocyte yield (low: 1-2, intermediate: 3-6 and high ≥ 7 MII oocytes). MII oocyte utilization rate was calculated as the number of live births divided by the number of MII oocytes produced after only one oocyte retrieval and subsequent transfers of vitrified/warmed blastocysts. The main outcome measure was cumulative LBR over a 6-month period. Among all the participants, 1173 total retrieved oocytes (4.4 ± 0.2 per patient) resulted in 1019 (3.9 ± 0.2 per patient) total MII oocytes, a clinical pregnancy rate of 48.1 % and a LBR of 41.2 %. Oocyte utilization rate was inversely related to ovarian response where it was 30.3 % in the "low" vs. 9.3 % in the "intermediate" vs. 4.3 % in the "high" oocyte yield groups ( p  < 0.05). Implantation rate significantly dropped as the number of MII oocytes increased and was highest in the "low" oocyte yield group ( p  < 0.0001). Cumulative LBR was similar in "low," "intermediate," and "high" oocyte yield groups ( p  > 0.05). The number of MII oocytes had poor sensitivity and specificity for predicting a live birth. These data extend the hypothesis of oocyte efficiency reported in conventional IVF protocols to mIVF protocols. Registration clinicaltrials.gov: NCT00799929.

  18. Compact continuous-variable entanglement distillation.

    PubMed

    Datta, Animesh; Zhang, Lijian; Nunn, Joshua; Langford, Nathan K; Feito, Alvaro; Plenio, Martin B; Walmsley, Ian A

    2012-02-10

    We introduce a new scheme for continuous-variable entanglement distillation that requires only linear temporal and constant physical or spatial resources. Distillation is the process by which high-quality entanglement may be distributed between distant nodes of a network in the unavoidable presence of decoherence. The known versions of this protocol scale exponentially in space and doubly exponentially in time. Our optimal scheme therefore provides exponential improvements over existing protocols. It uses a fixed-resource module-an entanglement distillery-comprising only four quantum memories of at most 50% storage efficiency and allowing a feasible experimental implementation. Tangible quantum advantages are obtainable by using existing off-resonant Raman quantum memories outside their conventional role of storage.

  19. Generation and confirmation of a (100 x 100)-dimensional entangled quantum system.

    PubMed

    Krenn, Mario; Huber, Marcus; Fickler, Robert; Lapkiewicz, Radek; Ramelow, Sven; Zeilinger, Anton

    2014-04-29

    Entangled quantum systems have properties that have fundamentally overthrown the classical worldview. Increasing the complexity of entangled states by expanding their dimensionality allows the implementation of novel fundamental tests of nature, and moreover also enables genuinely new protocols for quantum information processing. Here we present the creation of a (100 × 100)-dimensional entangled quantum system, using spatial modes of photons. For its verification we develop a novel nonlinear criterion which infers entanglement dimensionality of a global state by using only information about its subspace correlations. This allows very practical experimental implementation as well as highly efficient extraction of entanglement dimensionality information. Applications in quantum cryptography and other protocols are very promising.

  20. VANET Clustering Based Routing Protocol Suitable for Deserts.

    PubMed

    Nasr, Mohammed Mohsen Mohammed; Abdelgader, Abdeldime Mohamed Salih; Wang, Zhi-Gong; Shen, Lian-Feng

    2016-04-06

    In recent years, there has emerged applications of vehicular ad hoc networks (VANETs) towards security, safety, rescue, exploration, military and communication redundancy systems in non-populated areas, besides its ordinary use in urban environments as an essential part of intelligent transportation systems (ITS). This paper proposes a novel algorithm for the process of organizing a cluster structure and cluster head election (CHE) suitable for VANETs. Moreover, it presents a robust clustering-based routing protocol, which is appropriate for deserts and can achieve high communication efficiency, ensuring reliable information delivery and optimal exploitation of the equipment on each vehicle. A comprehensive simulation is conducted to evaluate the performance of the proposed CHE and routing algorithms.

  1. VANET Clustering Based Routing Protocol Suitable for Deserts

    PubMed Central

    Mohammed Nasr, Mohammed Mohsen; Abdelgader, Abdeldime Mohamed Salih; Wang, Zhi-Gong; Shen, Lian-Feng

    2016-01-01

    In recent years, there has emerged applications of vehicular ad hoc networks (VANETs) towards security, safety, rescue, exploration, military and communication redundancy systems in non-populated areas, besides its ordinary use in urban environments as an essential part of intelligent transportation systems (ITS). This paper proposes a novel algorithm for the process of organizing a cluster structure and cluster head election (CHE) suitable for VANETs. Moreover, it presents a robust clustering-based routing protocol, which is appropriate for deserts and can achieve high communication efficiency, ensuring reliable information delivery and optimal exploitation of the equipment on each vehicle. A comprehensive simulation is conducted to evaluate the performance of the proposed CHE and routing algorithms. PMID:27058539

  2. Generation and confirmation of a (100 × 100)-dimensional entangled quantum system

    PubMed Central

    Krenn, Mario; Huber, Marcus; Fickler, Robert; Lapkiewicz, Radek; Ramelow, Sven; Zeilinger, Anton

    2014-01-01

    Entangled quantum systems have properties that have fundamentally overthrown the classical worldview. Increasing the complexity of entangled states by expanding their dimensionality allows the implementation of novel fundamental tests of nature, and moreover also enables genuinely new protocols for quantum information processing. Here we present the creation of a (100 × 100)-dimensional entangled quantum system, using spatial modes of photons. For its verification we develop a novel nonlinear criterion which infers entanglement dimensionality of a global state by using only information about its subspace correlations. This allows very practical experimental implementation as well as highly efficient extraction of entanglement dimensionality information. Applications in quantum cryptography and other protocols are very promising. PMID:24706902

  3. A psychoengineering paradigm for the neurocognitive mechanisms of biofeedback and neurofeedback.

    PubMed

    Gaume, A; Vialatte, A; Mora-Sánchez, A; Ramdani, C; Vialatte, F B

    2016-09-01

    We believe that the missing keystone to design effective and efficient biofeedback and neurofeedback protocols is a comprehensive model of the mechanisms of feedback learning. In this manuscript we review the learning models in behavioral, developmental and cognitive psychology, and derive a synthetic model of the psychological perspective on biofeedback. We afterwards review the neural correlates of feedback learning mechanisms, and present a general neuroscience model of biofeedback. We subsequently show how biomedical engineering principles can be applied to design efficient feedback protocols. We finally present an integrative psychoengineering model of the feedback learning processes, and provide new guidelines for the efficient design of biofeedback and neurofeedback protocols. We identify five key properties, (1) perceptibility=can the subject perceive the biosignal?, (2) autonomy=can the subject regulate by himself?, (3) mastery=degree of control over the biosignal, (4) motivation=rewards system of the biofeedback, and (5) learnability=possibility of learning. We conclude with guidelines for the investigation and promotion of these properties in biofeedback protocols. Copyright © 2016 Elsevier Ltd. All rights reserved.

  4. Clinically applied procedures for human ovarian tissue cryopreservation result in different levels of efficacy and efficiency.

    PubMed

    Bastings, Lobke; Westphal, Johan R; Beerendonk, Catharina C M; Bekkers, Ruud L M; Zusterzeel, Petra L M; Hendriks, Jan C M; Braat, Didi D M; Peek, Ronald

    2016-12-01

    Different protocols are being used worldwide for the cryopreservation of human ovarian tissue for fertility preservation purposes. The efficiency and efficacy of the majority of these protocols has not been extensively evaluated, possibly resulting in sub-optimally cryopreserved ovarian tissue. To address the impact of this issue, we assessed the effects of two clinically successful human ovarian tissue slow-freezing cryopreservation procedures on the quality of the cryopreserved tissue. To differentiate between cryopreservation ( C ) versus thawing ( T ) related effects, four combinations of these two (A and B) very different cryopreservation/thawing protocols (A C A T , A C B T , B C A T , B C B T ) were studied. Before and after cryopreservation and thawing, the percentage of living and morphologically normal follicles, as well as the overall tissue viability, was assessed. Our experiments revealed that the choice of the cryopreservation protocol noticeably affected the overall tissue viability and percentage of living follicles, with a higher viability after protocol B C when compared to A C . No statistically significant differences in tissue viability were observed between the two thawing protocols, but thawing protocol B T required considerably more human effort and materials than thawing protocol A T . Tissue morphology was best retained using the B C A T combination. Our results indicate that extensive and systematical evaluation of clinically used protocols is warranted.

  5. Rapid and efficient method to extract metagenomic DNA from estuarine sediments.

    PubMed

    Shamim, Kashif; Sharma, Jaya; Dubey, Santosh Kumar

    2017-07-01

    Metagenomic DNA from sediments of selective estuaries of Goa, India was extracted using a simple, fast, efficient and environment friendly method. The recovery of pure metagenomic DNA from our method was significantly high as compared to other well-known methods since the concentration of recovered metagenomic DNA ranged from 1185.1 to 4579.7 µg/g of sediment. The purity of metagenomic DNA was also considerably high as the ratio of absorbance at 260 and 280 nm ranged from 1.88 to 1.94. Therefore, the recovered metagenomic DNA was directly used to perform various molecular biology experiments viz. restriction digestion, PCR amplification, cloning and metagenomic library construction. This clearly proved that our protocol for metagenomic DNA extraction using silica gel efficiently removed the contaminants and prevented shearing of the metagenomic DNA. Thus, this modified method can be used to recover pure metagenomic DNA from various estuarine sediments in a rapid, efficient and eco-friendly manner.

  6. SPP: A data base processor data communications protocol

    NASA Technical Reports Server (NTRS)

    Fishwick, P. A.

    1983-01-01

    The design and implementation of a data communications protocol for the Intel Data Base Processor (DBP) is defined. The protocol is termed SPP (Service Port Protocol) since it enables data transfer between the host computer and the DBP service port. The protocol implementation is extensible in that it is explicitly layered and the protocol functionality is hierarchically organized. Extensive trace and performance capabilities have been supplied with the protocol software to permit optional efficient monitoring of the data transfer between the host and the Intel data base processor. Machine independence was considered to be an important attribute during the design and implementation of SPP. The protocol source is fully commented and is included in Appendix A of this report.

  7. Cationized Magnetoferritin Enables Rapid Labeling and Concentration of Gram-Positive and Gram-Negative Bacteria in Magnetic Cell Separation Columns

    PubMed Central

    Spencer, J.; Schwarzacher, W.

    2016-01-01

    ABSTRACT In order to identify pathogens rapidly and reliably, bacterial capture and concentration from large sample volumes into smaller ones are often required. Magnetic labeling and capture of bacteria using a magnetic field hold great promise for achieving this goal, but the current protocols have poor capture efficiency. Here, we present a rapid and highly efficient approach to magnetic labeling and capture of both Gram-negative (Escherichia coli) and Gram-positive (Staphylococcus aureus) bacteria using cationized magnetoferritin (cat-MF). Magnetic labeling was achieved within a 1-min incubation period with cat-MF, and 99.97% of the labeled bacteria were immobilized in commercially available magnetic cell separation (MACS) columns. Longer incubation times led to more efficient capture, with S. aureus being immobilized to a greater extent than E. coli. Finally, low numbers of magnetically labeled E. coli bacteria (<100 CFU per ml) were immobilized with 100% efficiency and concentrated 7-fold within 15 min. Therefore, our study provides a novel protocol for rapid and highly efficient magnetic labeling, capture, and concentration of both Gram-positive and Gram-negative bacteria. IMPORTANCE Antimicrobial resistance (AMR) is a significant global challenge. Rapid identification of pathogens will retard the spread of AMR by enabling targeted treatment with suitable agents and by reducing inappropriate antimicrobial use. Rapid detection methods based on microfluidic devices require that bacteria are concentrated from large volumes into much smaller ones. Concentration of bacteria is also important to detect low numbers of pathogens with confidence. Here, we demonstrate that magnetic separation columns capture small amounts of bacteria with 100% efficiency. Rapid magnetization was achieved by exposing bacteria to cationic magnetic nanoparticles, and magnetized bacteria were concentrated 7-fold inside the column. Thus, bacterial capture and concentration were achieved within 15 min. This approach could be extended to encompass the capture and concentration of specific pathogens, for example, by functionalizing magnetic nanoparticles with antibodies or small molecule probes. PMID:27060124

  8. Cationized Magnetoferritin Enables Rapid Labeling and Concentration of Gram-Positive and Gram-Negative Bacteria in Magnetic Cell Separation Columns.

    PubMed

    Correia Carreira, S; Spencer, J; Schwarzacher, W; Seddon, A M

    2016-06-15

    In order to identify pathogens rapidly and reliably, bacterial capture and concentration from large sample volumes into smaller ones are often required. Magnetic labeling and capture of bacteria using a magnetic field hold great promise for achieving this goal, but the current protocols have poor capture efficiency. Here, we present a rapid and highly efficient approach to magnetic labeling and capture of both Gram-negative (Escherichia coli) and Gram-positive (Staphylococcus aureus) bacteria using cationized magnetoferritin (cat-MF). Magnetic labeling was achieved within a 1-min incubation period with cat-MF, and 99.97% of the labeled bacteria were immobilized in commercially available magnetic cell separation (MACS) columns. Longer incubation times led to more efficient capture, with S. aureus being immobilized to a greater extent than E. coli Finally, low numbers of magnetically labeled E. coli bacteria (<100 CFU per ml) were immobilized with 100% efficiency and concentrated 7-fold within 15 min. Therefore, our study provides a novel protocol for rapid and highly efficient magnetic labeling, capture, and concentration of both Gram-positive and Gram-negative bacteria. Antimicrobial resistance (AMR) is a significant global challenge. Rapid identification of pathogens will retard the spread of AMR by enabling targeted treatment with suitable agents and by reducing inappropriate antimicrobial use. Rapid detection methods based on microfluidic devices require that bacteria are concentrated from large volumes into much smaller ones. Concentration of bacteria is also important to detect low numbers of pathogens with confidence. Here, we demonstrate that magnetic separation columns capture small amounts of bacteria with 100% efficiency. Rapid magnetization was achieved by exposing bacteria to cationic magnetic nanoparticles, and magnetized bacteria were concentrated 7-fold inside the column. Thus, bacterial capture and concentration were achieved within 15 min. This approach could be extended to encompass the capture and concentration of specific pathogens, for example, by functionalizing magnetic nanoparticles with antibodies or small molecule probes. Copyright © 2016 Correia Carreira et al.

  9. Automation of a Nile red staining assay enables high throughput quantification of microalgal lipid production.

    PubMed

    Morschett, Holger; Wiechert, Wolfgang; Oldiges, Marco

    2016-02-09

    Within the context of microalgal lipid production for biofuels and bulk chemical applications, specialized higher throughput devices for small scale parallelized cultivation are expected to boost the time efficiency of phototrophic bioprocess development. However, the increasing number of possible experiments is directly coupled to the demand for lipid quantification protocols that enable reliably measuring large sets of samples within short time and that can deal with the reduced sample volume typically generated at screening scale. To meet these demands, a dye based assay was established using a liquid handling robot to provide reproducible high throughput quantification of lipids with minimized hands-on-time. Lipid production was monitored using the fluorescent dye Nile red with dimethyl sulfoxide as solvent facilitating dye permeation. The staining kinetics of cells at different concentrations and physiological states were investigated to successfully down-scale the assay to 96 well microtiter plates. Gravimetric calibration against a well-established extractive protocol enabled absolute quantification of intracellular lipids improving precision from ±8 to ±2 % on average. Implementation into an automated liquid handling platform allows for measuring up to 48 samples within 6.5 h, reducing hands-on-time to a third compared to manual operation. Moreover, it was shown that automation enhances accuracy and precision compared to manual preparation. It was revealed that established protocols relying on optical density or cell number for biomass adjustion prior to staining may suffer from errors due to significant changes of the cells' optical and physiological properties during cultivation. Alternatively, the biovolume was used as a measure for biomass concentration so that errors from morphological changes can be excluded. The newly established assay proved to be applicable for absolute quantification of algal lipids avoiding limitations of currently established protocols, namely biomass adjustment and limited throughput. Automation was shown to improve data reliability, as well as experimental throughput simultaneously minimizing the needed hands-on-time to a third. Thereby, the presented protocol meets the demands for the analysis of samples generated by the upcoming generation of devices for higher throughput phototrophic cultivation and thereby contributes to boosting the time efficiency for setting up algae lipid production processes.

  10. Effects of low-volume high-intensity interval training in a community setting: a pilot study.

    PubMed

    Reljic, Dejan; Wittmann, Felix; Fischer, Joachim E

    2018-06-01

    High-intensity interval training (HIIT) is emerging as an effective and time-efficient exercise strategy for health promotion. However, most HIIT studies are conducted in laboratory settings and evidence regarding the efficacy of time-efficient "low-volume" HIIT is based mainly on demanding "all-out" protocols. Thus, the aim of this pilot study was to assess the feasibility and efficacy of two low-volume (≤ 30 min time-effort/week), non-all-out HIIT protocols, performed 2 ×/week over 8 weeks in a community-based fitness centre. Thirty-four sedentary men and women were randomised to either 2 × 4-min HIIT (2 × 4-HIIT) or 5 × 1-min HIIT (5 × 1-HIIT) at 85-95% maximal heart rate (HR max ), or an active control group performing moderate-intensity continuous training (MICT, 76 min/week) at 65-75% HR max . The exercise protocols were well tolerated and no adverse events occurred. 2 × 4-HIIT and 5 × 1-HIIT exhibited lower dropout rates (17 and 8 vs. 30%) than MICT. All training modes improved VO 2max (2 × 4-HIIT: + 20%, P < 0.01; 5 × 1-HIIT: + 27%, P < 0.001; MICT: + 16%, P < 0.05), but the HIIT protocols required 60% less time commitment. Both HIIT protocols and MICT had positive impact on cholesterol profiles. Only 5 × 1-HIIT significantly improved waist circumference (P < 0.05) and subjective work ability (P < 0.05). The present study indicates that low-volume HIIT can be feasibly implemented in a community-based setting. Moreover, our data suggest that practical (non-all-out) HIIT that requires as little as 30 min/week, either performed as 2 × 4-HIIT or 5 × 1-HIIT, may induce significant improvements in VO 2max and cardiometabolic risk markers.

  11. Stereospecific Palladium-Catalyzed C-H Arylation of Pyroglutamic Acid Derivatives at the C3 Position Enabled by 8-Aminoquinoline as a Directing Group.

    PubMed

    Verho, Oscar; Maetani, Micah; Melillo, Bruno; Zoller, Jochen; Schreiber, Stuart L

    2017-09-01

    An efficient and stereospecific Pd-catalyzed protocol for the C-H arylation of pyroglutamic acid derivatives that uses 8-aminoquinoline as a directing group is described. The reaction was shown to proceed efficiently with a variety of aryl and heteroaryl iodides bearing different functional groups, giving C3-arylated cis products in good to high yields. Removal of the 8-aminoquinoline unit from these C-H arylation products enables access to synthetically useful cis and trans pyroglutamic acid-based building blocks.

  12. Microwave-Assisted Organocatalytic Intramolecular Knoevenagel/Hetero Diels-Alder Reaction with O-(Arylpropynyloxy)-Salicylaldehydes: Synthesis of Polycyclic Embelin Derivatives.

    PubMed

    Martín-Acosta, Pedro; Feresin, Gabriela; Tapia, Alejandro; Estévez-Braun, Ana

    2016-10-21

    A highly efficient and regioselective approach to new polycyclic embelin derivatives through a domino Knoevenagel condensation/intramolecular hetero Diels-Alder reaction using O-(arylpropynyloxy)-salicylaldehydes in the presence of ethylenediamine diacetate (EDDA) is reported. This organocatalyzed protocol is compatible toward a wide range of aryl-substituted alkynyl ethers with electron-donating and electron-withdrawing groups. When other active methylene compounds were subjected to this domino reaction the corresponding adducts were obtained in high yield.

  13. An Efficient Distributed Coverage Hole Detection Protocol for Wireless Sensor Networks

    PubMed Central

    Kumar Sahoo, Prasan; Chiang, Ming-Jer; Wu, Shih-Lin

    2016-01-01

    In wireless sensor networks (WSNs), certain areas of the monitoring region may have coverage holes and serious coverage overlapping due to the random deployment of sensors. The failure of electronic components, software bugs and destructive agents could lead to the random death of the nodes. Sensors may be dead due to exhaustion of battery power, which may cause the network to be uncovered and disconnected. Based on the deployment nature of the nodes in remote or hostile environments, such as a battlefield or desert, it is impossible to recharge or replace the battery. However, the data gathered by the sensors are highly essential for the analysis, and therefore, the collaborative detection of coverage holes has strategic importance in WSNs. In this paper, distributed coverage hole detection algorithms are designed, where nodes can collaborate to detect the coverage holes autonomously. The performance evaluation of our protocols suggests that our protocols outperform in terms of hole detection time, limited power consumption and control packet overhead to detect holes as compared to other similar protocols. PMID:26999143

  14. Magic state distillation protocols with noisy Clifford gates

    NASA Astrophysics Data System (ADS)

    Brooks, Peter

    2013-03-01

    A promising approach to universal fault-tolerant quantum computation is to implement the non-universal group of Clifford gates, and to achieve universality by adding the ability to prepare high-fidelity copies of certain ``magic states''. By applying state distillation protocols, many noisy copies of a magic state ancilla can be purified into a smaller number of clean copies which are arbitrarily close to the perfect state, using only Clifford operations. In practice, the Clifford gates themselves will be noisy, which can limit the efficiency of state distillation and put a floor on the achievable fidelity with the desired state. Recently, a number of new state distillation protocols have been proposed that have the potential to reduce the required resource overhead. I analyze these protocols and explore the tradeoffs between these different approaches to magic state distillation when noisy Clifford gates are taken into account. Supported in part by IARPA under contract D11PC20165, by NSF under Grant No. PHY-0803371, by DOE under Grant No. DE-FG03-92-ER40701, and by NSA/ARO under Grant No. W911NF-09-1-0442.

  15. An efficient immunodetection method for histone modifications in plants.

    PubMed

    Nic-Can, Geovanny; Hernández-Castellano, Sara; Kú-González, Angela; Loyola-Vargas, Víctor M; De-la-Peña, Clelia

    2013-12-16

    Epigenetic mechanisms can be highly dynamic, but the cross-talk among them and with the genome is still poorly understood. Many of these mechanisms work at different places in the cell and at different times of organism development. Covalent histone modifications are one of the most complex and studied epigenetic mechanisms involved in cellular reprogramming and development in plants. Therefore, the knowledge of the spatial distribution of histone methylation in different tissues is important to understand their behavior on specific cells. Based on the importance of epigenetic marks for biology, we present a simplified, inexpensive and efficient protocol for in situ immunolocalization on different tissues such as flowers, buds, callus, somatic embryo and meristematic tissue from several plants of agronomical and biological importance. Here, we fully describe all the steps to perform the localization of histone modifications. Using this method, we were able to visualize the distribution of H3K4me3 and H3K9me2 without loss of histological integrity of tissues from several plants, including Agave tequilana, Capsicum chinense, Coffea canephora and Cedrela odorata, as well as Arabidopsis thaliana. There are many protocols to study chromatin modifications; however, most of them are expensive, difficult and require sophisticated equipment. Here, we provide an efficient protocol for in situ localization of histone methylation that dispenses with the use of expensive and sensitive enzymes. The present method can be used to investigate the cellular distribution and localization of a wide array of proteins, which could help to clarify the biological role that they play at specific times and places in different tissues of various plant species.

  16. Efficient and stable transformation of hop (Humulus lupulus L.) var. Eroica by particle bombardment.

    PubMed

    Batista, Dora; Fonseca, Sandra; Serrazina, Susana; Figueiredo, Andreia; Pais, Maria Salomé

    2008-07-01

    To the best of our knowledge, this is the first accurate and reliable protocol for hop (Humulus lupulus L.) genetic transformation using particle bombardment. Based on the highly productive regeneration system previously developed by us for hop var. Eroica, two efficient transformation protocols were established using petioles and green organogenic nodular clusters (GONCs) bombarded with gusA reporter and hpt selectable genes. A total of 36 hygromycin B-resistant (hyg(r)) plants obtained upon continuous selection were successfully transferred to the greenhouse, and a first generation group of transplanted plants was followed after spending a complete vegetative cycle. PCR analysis showed the presence of one of both transgenes in 25 plants, corresponding to an integration frequency of 69.4% and an overall transformation efficiency of 7.5%. Although all final transformants were GUS negative, the integration frequency of gusA gene was higher than that of hpt gene. Petiole-derived transgenic plants showed a higher co-integration rate of 76.9%. Real-time PCR analysis confirmed co-integration in 86% of the plants tested and its stability until the first generation, and identified positive plants amongst those previously assessed as hpt (+) only by conventional PCR. Our results suggest that the integration frequencies presented here, as well as those of others, may have been underestimated, and that PCR results should be taken with precaution not only for false positives, but also for false negatives. The protocols here described could be very useful for future introduction of metabolic or resistance traits in hop cultivars even if slight modifications for other genotypes are needed.

  17. A Robust and Efficient Quantum Private Comparison of Equality Based on the Entangled Swapping of GHZ-like State and χ + State

    NASA Astrophysics Data System (ADS)

    Xu, Ling; Zhao, Zhiwen

    2017-08-01

    A new quantum protocol with the assistance of a semi-honest third party (TP) is proposed, which allows the participants comparing the equality of their private information without disclosing them. Different from previous protocols, this protocol utilizes quantum key distribution against the collective-dephasing noise and the collective-rotation noise, which is more robust and abandons few samples, to transmit the classical information. In addition, this protocol utilizes the GHZ-like state and the χ + state to produce the entanglement swapping. And the Bell basis and the dual basis are used to measure the particle pair so that 3 bits of each participant's private information can be compared in each comparison time, which is more efficient and consumes fewer comparison times. Meanwhile, there is no need of unitary operation and hash function in this protocol. At the end, various kinds of outside attack and participant attack are discussed and analyzed to be invalid, so it can complete the comparison in security.

  18. An efficient and secure certificateless authentication protocol for healthcare system on wireless medical sensor networks.

    PubMed

    Guo, Rui; Wen, Qiaoyan; Jin, Zhengping; Zhang, Hua

    2013-01-01

    Sensor networks have opened up new opportunities in healthcare systems, which can transmit patient's condition to health professional's hand-held devices in time. The patient's physiological signals are very sensitive and the networks are extremely vulnerable to many attacks. It must be ensured that patient's privacy is not exposed to unauthorized entities. Therefore, the control of access to healthcare systems has become a crucial challenge. An efficient and secure authentication protocol will thus be needed in wireless medical sensor networks. In this paper, we propose a certificateless authentication scheme without bilinear pairing while providing patient anonymity. Compared with other related protocols, the proposed scheme needs less computation and communication cost and preserves stronger security. Our performance evaluations show that this protocol is more practical for healthcare system in wireless medical sensor networks.

  19. An Efficient and Secure Certificateless Authentication Protocol for Healthcare System on Wireless Medical Sensor Networks

    PubMed Central

    Guo, Rui; Wen, Qiaoyan; Jin, Zhengping; Zhang, Hua

    2013-01-01

    Sensor networks have opened up new opportunities in healthcare systems, which can transmit patient's condition to health professional's hand-held devices in time. The patient's physiological signals are very sensitive and the networks are extremely vulnerable to many attacks. It must be ensured that patient's privacy is not exposed to unauthorized entities. Therefore, the control of access to healthcare systems has become a crucial challenge. An efficient and secure authentication protocol will thus be needed in wireless medical sensor networks. In this paper, we propose a certificateless authentication scheme without bilinear pairing while providing patient anonymity. Compared with other related protocols, the proposed scheme needs less computation and communication cost and preserves stronger security. Our performance evaluations show that this protocol is more practical for healthcare system in wireless medical sensor networks. PMID:23710147

  20. High-Efficiency Plug-and-Play Source of Heralded Single Photons

    NASA Astrophysics Data System (ADS)

    Montaut, Nicola; Sansoni, Linda; Meyer-Scott, Evan; Ricken, Raimund; Quiring, Viktor; Herrmann, Harald; Silberhorn, Christine

    2017-08-01

    Reliable generation of single photons is of key importance for fundamental physical experiments and to demonstrate quantum protocols. Waveguide-based photon-pair sources have shown great promise in this regard due to their large spectral tunability, high generation rates, and long temporal coherence of the photon wave packet. However, integrating such sources with fiber-optic networks often results in a strong degradation of performance. We answer this challenge by presenting an alignment-free source of photon pairs in the telecommunications band that maintains heralding efficiency >50 % even after fiber pigtailing, photon separation, and pump suppression. The source combines this outstanding performance in heralding efficiency with a compact, stable, and easy-to-use "plug-and-play" package: one simply connects a laser to the input and detectors to the output, and the source is ready to use. This high performance can be achieved even outside the lab without the need for alignment which makes the source extremely useful for any experiment or demonstration needing heralded single photons.

  1. Demonstration-Scale High-Cell-Density Fermentation of Pichia pastoris.

    PubMed

    Liu, Wan-Cang; Zhu, Ping

    2018-01-01

    Pichia pastoris has been one of the most successful heterologous overexpression systems in generating proteins for large-scale production through high-cell-density fermentation. However, optimizing conditions of the large-scale high-cell-density fermentation for biochemistry and industrialization is usually a laborious and time-consuming process. Furthermore, it is often difficult to produce authentic proteins in large quantities, which is a major obstacle for functional and structural features analysis and industrial application. For these reasons, we have developed a protocol for efficient demonstration-scale high-cell-density fermentation of P. pastoris, which employs a new methanol-feeding strategy-biomass-stat strategy and a strategy of increased air pressure instead of pure oxygen supplement. The protocol included three typical stages of glycerol batch fermentation (initial culture phase), glycerol fed-batch fermentation (biomass accumulation phase), and methanol fed-batch fermentation (induction phase), which allows direct online-monitoring of fermentation conditions, including broth pH, temperature, DO, anti-foam generation, and feeding of glycerol and methanol. Using this protocol, production of the recombinant β-xylosidase of Lentinula edodes origin in 1000-L scale fermentation can be up to ~900 mg/L or 9.4 mg/g cells (dry cell weight, intracellular expression), with the specific production rate and average specific production of 0.1 mg/g/h and 0.081 mg/g/h, respectively. The methodology described in this protocol can be easily transferred to other systems, and eligible to scale up for a large number of proteins used in either the scientific studies or commercial purposes.

  2. Premethylation of Foreign DNA Improves Integrative Transformation Efficiency in Synechocystis sp. Strain PCC 6803

    PubMed Central

    Wang, Bo; Yu, Jianping

    2015-01-01

    Restriction digestion of foreign DNA is one of the key biological barriers against genetic transformation in microorganisms. To establish a high-efficiency transformation protocol in the model cyanobacterium, Synechocystis sp. strain PCC 6803 (Synechocystis 6803), we investigated the effects of premethylation of foreign DNA on the integrative transformation of this strain. In this study, two type II methyltransferase-encoding genes, i.e., sll0729 (gene M) and slr0214 (gene C), were cloned from the chromosome of Synechocystis 6803 and expressed in Escherichia coli harboring an integration plasmid. After premethylation treatment in E. coli, the integration plasmid was extracted and used for transformation of Synechocystis 6803. The results showed that although expression of methyltransferase M had little impact on the transformation of Synechocystis 6803, expression of methyltransferase C resulted in 11- to 161-fold-higher efficiency in the subsequent integrative transformation of Synechocystis 6803. Effective expression of methyltransferase C, which could be achieved by optimizing the 5′ untranslated region, was critical to efficient premethylation of the donor DNA and thus high transformation efficiency in Synechocystis 6803. Since premethylating foreign DNA prior to transforming Synechocystis avoids changing the host genetic background, the study thus provides an improved method for high-efficiency integrative transformation of Synechocystis 6803. PMID:26452551

  3. One-step purification of assembly-competent tubulin from diverse eukaryotic sources

    PubMed Central

    Widlund, Per O.; Podolski, Marija; Reber, Simone; Alper, Joshua; Storch, Marko; Hyman, Anthony A.; Howard, Jonathon; Drechsel, David N.

    2012-01-01

    We have developed a protocol that allows rapid and efficient purification of native, active tubulin from a variety of species and tissue sources by affinity chromatography. The affinity matrix comprises a bacterially expressed, recombinant protein, the TOG1/2 domains from Saccharomyces cerevisiae Stu2, covalently coupled to a Sepharose support. The resin has a high capacity to specifically bind tubulin from clarified crude cell extracts, and, after washing, highly purified tubulin can be eluted under mild conditions. The eluted tubulin is fully functional and can be efficiently assembled into microtubules. The method eliminates the need to use heterologous systems for the study of microtubule-associated proteins and motor proteins, which has been a major issue in microtubule-related research. PMID:22993214

  4. Pd-catalyzed aerobic oxidative annulation of cyclohexanones and 2-aminophenyl ketones: A direct approach to acridines

    NASA Astrophysics Data System (ADS)

    Mu, Wanlu; Li, Xiaowei; Wang, Longfei; Chen, Yong; Wu, Yanchao

    2017-08-01

    An efficient aerobic oxidative annulation of cyclohexanones and 2-aminophenyl ketones approach to substituted acridines, a structural motif for a large number of pharmaceuticals and functional materials is described. The key feature of this method is the use of oxygen as the sole oxidant and Pd catalyst, which resulting in the high regioselectivity with unsymmetrical meta-substituted cyclohexanones. The electron gap of the global redox condensation process is filled and the reaction efficiency is significantly promoted by O2 as a redox moderator. This protocol possesses many advantages such as using O2 as a cheap and nonhazardous oxidant, high regioselectivity and water as the only by-product, which meet the principle of green chemistry.

  5. An assessment of the efficiency of fungal DNA extraction methods for maximizing the detection of medically important fungi using PCR.

    PubMed

    Karakousis, A; Tan, L; Ellis, D; Alexiou, H; Wormald, P J

    2006-04-01

    To date, no single reported DNA extraction method is suitable for the efficient extraction of DNA from all fungal species. The efficiency of extraction is of particular importance in PCR-based medical diagnostic applications where the quantity of fungus in a tissue biopsy may be limited. We subjected 16 medically relevant fungi to physical, chemical and enzymatic cell wall disruption methods which constitutes the first step in extracting DNA. Examination by light microscopy showed that grinding with mortar and pestle was the most efficient means of disrupting the rigid fungal cell walls of hyphae and conidia. We then trialled several published DNA isolation protocols to ascertain the most efficient method of extraction. Optimal extraction was achieved by incorporating a lyticase and proteinase K enzymatic digestion step and adapting a DNA extraction procedure from a commercial kit (MO BIO) to generate high yields of high quality DNA from all 16 species. DNA quality was confirmed by the successful PCR amplification of the conserved region of the fungal 18S small-subunit rRNA multicopy gene.

  6. An economic and feasible Quantum Sealed-bid Auction protocol

    NASA Astrophysics Data System (ADS)

    Zhang, Rui; Shi, Run-hua; Qin, Jia-qi; Peng, Zhen-wan

    2018-02-01

    We present an economic and feasible Quantum Sealed-bid Auction protocol using quantum secure direct communication based on single photons in both the polarization and the spatial-mode degrees of freedom, where each single photon can carry two bits of classical information. Compared with previous protocols, our protocol has higher efficiency. In addition, we propose a secure post-confirmation mechanism without quantum entanglement to guarantee the security and the fairness of the auction.

  7. Chapter 10: Peak Demand and Time-Differentiated Energy Savings Cross-Cutting Protocol. The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kurnik, Charles W; Stern, Frank; Spencer, Justin

    Savings from electric energy efficiency measures and programs are often expressed in terms of annual energy and presented as kilowatt-hours per year (kWh/year). However, for a full assessment of the value of these savings, it is usually necessary to consider the measure or program's impact on peak demand as well as time-differentiated energy savings. This cross-cutting protocol describes methods for estimating the peak demand and time-differentiated energy impacts of measures implemented through energy efficiency programs.

  8. Morphology evolution in high-performance polymer solar cells processed from nonhalogenated solvent

    DOE PAGES

    Cai, Wanzhu; Liu, Peng; Jin, Yaocheng; ...

    2015-05-26

    A new processing protocol based on non-halogenated solvent and additive is developed to produce polymer solar cells with power conversion efficiencies better than those processed from commonly used halogenated solvent-additive pair. Morphology studies show that good performance correlates with a finely distributed nanomorphology with a well-defined polymer fibril network structure, which leads to balanced charge transport in device operation.

  9. TCP Pacing Developed

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    2002-01-01

    Transmission control protocol (TCP) was conceived and designed to run over a variety of communication links, including wireless and high-bandwidth links. However, with recent technological advances in satellite and fiber-optic networks, researchers are reevaluating the flexibility of TCP. The TCP pacing and packet pair probing implementation may help overcome two of the major obstacles identified for efficient bandwidth utilization over communication links with large delay-bandwidth products.

  10. A 250-Mbit/s ring local computer network using 1.3-microns single-mode optical fibers

    NASA Technical Reports Server (NTRS)

    Eng, S. T.; Tell, R.; Andersson, T.; Eng, B.

    1985-01-01

    A 250-Mbit/s three-station fiber-optic ring local computer network was built and successfully demonstrated. A conventional token protocol was employed for bus arbitration to maximize the bus efficiency under high loading conditions, and a non-return-to-zero (NRS) data encoding format was selected for simplicity and maximum utilization of the ECL-circuit bandwidth.

  11. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kurnik, Charles W.; Stoughton, Kate M; Figueroa, Jorge

    This measurement and verification (M&V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings resulting from water conservation measures (WCMs) in energy performance contracts associated with outdoor irrigation efficiency projects. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M&V plan, and details the procedures to use to determine water savings.

  12. Quantum key distribution using basis encoding of Gaussian-modulated coherent states

    NASA Astrophysics Data System (ADS)

    Huang, Peng; Huang, Jingzheng; Zhang, Zheshen; Zeng, Guihua

    2018-04-01

    The continuous-variable quantum key distribution (CVQKD) has been demonstrated to be available in practical secure quantum cryptography. However, its performance is restricted strongly by the channel excess noise and the reconciliation efficiency. In this paper, we present a quantum key distribution (QKD) protocol by encoding the secret keys on the random choices of two measurement bases: the conjugate quadratures X and P . The employed encoding method can dramatically weaken the effects of channel excess noise and reconciliation efficiency on the performance of the QKD protocol. Subsequently, the proposed scheme exhibits the capability to tolerate much higher excess noise and enables us to reach a much longer secure transmission distance even at lower reconciliation efficiency. The proposal can work alternatively to strengthen significantly the performance of the known Gaussian-modulated CVQKD protocol and serve as a multiplier for practical secure quantum cryptography with continuous variables.

  13. Shock-induced termination of reentrant cardiac arrhythmias: Comparing monophasic and biphasic shock protocols

    NASA Astrophysics Data System (ADS)

    Bragard, Jean; Simic, Ana; Elorza, Jorge; Grigoriev, Roman O.; Cherry, Elizabeth M.; Gilmour, Robert F.; Otani, Niels F.; Fenton, Flavio H.

    2013-12-01

    In this article, we compare quantitatively the efficiency of three different protocols commonly used in commercial defibrillators. These are based on monophasic and both symmetric and asymmetric biphasic shocks. A numerical one-dimensional model of cardiac tissue using the bidomain formulation is used in order to test the different protocols. In particular, we performed a total of 4.8 × 106 simulations by varying shock waveform, shock energy, initial conditions, and heterogeneity in internal electrical conductivity. Whenever the shock successfully removed the reentrant dynamics in the tissue, we classified the mechanism. The analysis of the numerical data shows that biphasic shocks are significantly more efficient (by about 25%) than the corresponding monophasic ones. We determine that the increase in efficiency of the biphasic shocks can be explained by the higher proportion of newly excited tissue through the mechanism of direct activation.

  14. Shock-induced termination of reentrant cardiac arrhythmias: Comparing monophasic and biphasic shock protocols

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bragard, Jean, E-mail: jbragard@unav.es; Simic, Ana; Elorza, Jorge

    2013-12-15

    In this article, we compare quantitatively the efficiency of three different protocols commonly used in commercial defibrillators. These are based on monophasic and both symmetric and asymmetric biphasic shocks. A numerical one–dimensional model of cardiac tissue using the bidomain formulation is used in order to test the different protocols. In particular, we performed a total of 4.8 × 10{sup 6} simulations by varying shock waveform, shock energy, initial conditions, and heterogeneity in internal electrical conductivity. Whenever the shock successfully removed the reentrant dynamics in the tissue, we classified the mechanism. The analysis of the numerical data shows that biphasic shocksmore » are significantly more efficient (by about 25%) than the corresponding monophasic ones. We determine that the increase in efficiency of the biphasic shocks can be explained by the higher proportion of newly excited tissue through the mechanism of direct activation.« less

  15. Chapter 6: Residential Lighting Evaluation Protocol. The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kurnik, Charles W; Dimetrosky, Scott; Parkinson, Katie

    Given new regulations, increased complexity in the market, and the general shift from CFLs to LEDs, this evaluation protocol was updated in 2017 to shift the focus of the protocols toward LEDs and away from CFLs and to resolve evaluation uncertainties affecting residential lighting incentive programs.

  16. Quantification of Fatty Acid Oxidation Products Using On-line High Performance Liquid Chromatography Tandem Mass Spectrometry

    PubMed Central

    Levison, Bruce S.; Zhang, Renliang; Wang, Zeneng; Fu, Xiaoming; DiDonato, Joseph A.; Hazen, Stanley L.

    2013-01-01

    Oxidized fatty acids formed via lipid peroxidation are implicated in pathological processes such as inflammation and atherosclerosis. A number of methods may be used to detect specific oxidized fatty acids containing a single or multiple combinations of epoxide, hydroxyl, ketone and hydroperoxide moieties on varying carbon chain lengths from C8 up to C30. Some of these methods are nonspecific and their use in biological systems is fraught with difficulty. Measures of specific-oxidized fatty acid derivatives help in identifying oxidation pathways in pathological processes. We used liquid chromatography coupled with electrospray ionization tandem mass spectrometry (LC-MS/MS) as efficient, selective and sensitive methods for identifying and analyzing multiple specific fatty acid peroxidation products in human plasma and other biological matrices. We then distilled the essential components of a number of these analyses to provide an efficient protocol by which fatty acid oxidation products and their parent compounds can be determined. In this protocol, addition of synthetic internal standard to the sample, followed by base hydrolysis at elevated temperature, and liquid-liquid phase sample extraction with lighter than water solvents facilitates isolation of the oxidized fatty acid species. These species can be identified and accurately quantified using stable isotope dilution and multiple reaction monitoring. Use of a coupled multiplexed gradient HPLC system on the front end enables high-throughput chromatography and more efficient use of mass spectrometer time. PMID:23499838

  17. Integrated Circuit Chip Improves Network Efficiency

    NASA Technical Reports Server (NTRS)

    2008-01-01

    Prior to 1999 and the development of SpaceWire, a standard for high-speed links for computer networks managed by the European Space Agency (ESA), there was no high-speed communications protocol for flight electronics. Onboard computers, processing units, and other electronics had to be designed for individual projects and then redesigned for subsequent projects, which increased development periods, costs, and risks. After adopting the SpaceWire protocol in 2000, NASA implemented the standard on the Swift mission, a gamma ray burst-alert telescope launched in November 2004. Scientists and developers on the James Webb Space Telescope further developed the network version of SpaceWire. In essence, SpaceWire enables more science missions at a lower cost, because it provides a standard interface between flight electronics components; new systems need not be custom built to accommodate individual missions, so electronics can be reused. New protocols are helping to standardize higher layers of computer communication. Goddard Space Flight Center improved on the ESA-developed SpaceWire by enabling standard protocols, which included defining quality of service and supporting plug-and-play capabilities. Goddard upgraded SpaceWire to make the routers more efficient and reliable, with features including redundant cables, simultaneous discrete broadcast pulses, prevention of network blockage, and improved verification. Redundant cables simplify management because the user does not need to worry about which connection is available, and simultaneous broadcast signals allow multiple users to broadcast low-latency side-band signal pulses across the network using the same resources for data communication. Additional features have been added to the SpaceWire switch to prevent network blockage so that more robust networks can be designed. Goddard s verification environment for the link-and-switch implementation continuously randomizes and tests different parts, constantly anticipating situations, which helps improve communications reliability. It has been tested in many different implementations for compatibility.

  18. Protocols for second-generation business satellites systems

    NASA Astrophysics Data System (ADS)

    Evans, B. G.; Coakley, F. P.; El Amin, M. H. M.

    The paper discusses the nature and mix of traffic in business satellite systems and describes the limitations on the protocol imposed by the differing impairments of speech, video, and data. A simple TDMA system protocol is presented which meets the requirements of mixed-service operation. The efficiency of the protocol together with implications for allocation, scheduling and synchronisation are discussed. Future-generation satellites will probably use on-board processing. Some initial work on protocols that make use of on-board processing and the implications for satellite and earth-station equipment are presented.

  19. An exercise protocol designed to control energy expenditure for long-term space missions.

    PubMed

    Matsuo, Tomoaki; Ohkawara, Kazunori; Seino, Satoshi; Shimojo, Nobutake; Yamada, Shin; Ohshima, Hiroshi; Tanaka, Kiyoji; Mukai, Chiaki

    2012-08-01

    Astronauts experience weight loss during spaceflight. Future space missions require a more efficient exercise program not only to maintain work efficiency, but also to control increased energy expenditure (EE). When discussing issues concerning EE incurred through exercise, excess post-exercise energy expenditure (EPEE) must also be considered. The aim of this study was to compare the total EE, including EPEE, induced by two types of interval cycling protocols with the total EE of a traditional, continuous cycling protocol. There were 10 healthy men, ages 20 to 31 yr, who completed 3 exercise sessions: sprint interval training (SIT) consisting of 7 sets of 30-s cycling at 120% VO2max with a 15-s rest between each bout; high-intensity interval aerobic training (HIAT) consisting of 3 sets of 3-min cycling at 80-90% VO2max with a 2-min active rest at 50% VO2max; and continuous aerobic training (CAT) consisting of 40 min of cycling at 60-65% VO2max. During each session, resting metabolic rate, exercise EE, and a 180-min post-exercise EE were measured. The EPEEs during the SIT, HIAT, and CAT averaged 32 +/- 19, 21 +/- 16, and 13 +/- 13 kcal, and the total EE for an entire exercise/ rest session averaged 109 +/- 20, 182 +/- 17, and 363 +/- 45 kcal, respectively. While the EPEE after the CAT was significantly less than after the SIT, the total EE with the CAT was the greatest of the three. The SIT and HIAT would be potential protocols to control energy expenditure for long space missions.

  20. Promoting adverse drug reaction reporting: comparison of different approaches.

    PubMed

    Ribeiro-Vaz, Inês; Santos, Cristina Costa; Cruz-Correia, Ricardo

    2016-01-01

    To describe different approaches to promote adverse drug reaction reporting among health care professionals, determining their cost-effectiveness. We analyzed and compared several approaches taken by the Northern Pharmacovigilance Centre (Portugal) to promote adverse drug reaction reporting. Approaches were compared regarding the number and relevance of adverse drug reaction reports obtained and costs involved. Costs by report were estimated by adding the initial costs and the running costs of each intervention. These costs were divided by the number of reports obtained with each intervention, to assess its cost-effectiveness. All the approaches seem to have increased the number of adverse drug reaction reports. We noted the biggest increase with protocols (321 reports, costing 1.96 € each), followed by first educational approach (265 reports, 20.31 €/report) and by the hyperlink approach (136 reports, 15.59 €/report). Regarding the severity of adverse drug reactions, protocols were the most efficient approach, costing 2.29 €/report, followed by hyperlinks (30.28 €/report, having no running costs). Concerning unexpected adverse drug reactions, the best result was obtained with protocols (5.12 €/report), followed by first educational approach (38.79 €/report). We recommend implementing protocols in other pharmacovigilance centers. They seem to be the most efficient intervention, allowing receiving adverse drug reactions reports at lower costs. The increase applied not only to the total number of reports, but also to the severity, unexpectedness and high degree of causality attributed to the adverse drug reactions. Still, hyperlinks have the advantage of not involving running costs, showing the second best performance in cost per adverse drug reactions report.

  1. Considerations in establishing a post-mortem brain and tissue bank for the study of myalgic encephalomyelitis/chronic fatigue syndrome: a proposed protocol.

    PubMed

    Nacul, Luis; O'Donovan, Dominic G; Lacerda, Eliana M; Gveric, Djordje; Goldring, Kirstin; Hall, Alison; Bowman, Erinna; Pheby, Derek

    2014-06-18

    Our aim, having previously investigated through a qualitative study involving extensive discussions with experts and patients the issues involved in establishing and maintaining a disease specific brain and tissue bank for myalgic encephalomyelitis/chronic fatigue syndrome (ME/CFS), was to develop a protocol for a UK ME/CFS repository of high quality human tissue from well characterised subjects with ME/CFS and controls suitable for a broad range of research applications. This would involve a specific donor program coupled with rapid tissue collection and processing, supplemented by comprehensive prospectively collected clinical, laboratory and self-assessment data from cases and controls. We reviewed the operations of existing tissue banks from published literature and from their internal protocols and standard operating procedures (SOPs). On this basis, we developed the protocol presented here, which was designed to meet high technical and ethical standards and legal requirements and was based on recommendations of the MRC UK Brain Banks Network. The facility would be most efficient and cost-effective if incorporated into an existing tissue bank. Tissue collection would be rapid and follow robust protocols to ensure preservation sufficient for a wide range of research uses. A central tissue bank would have resources both for wide-scale donor recruitment and rapid response to donor death for prompt harvesting and processing of tissue. An ME/CFS brain and tissue bank could be established using this protocol. Success would depend on careful consideration of logistic, technical, legal and ethical issues, continuous consultation with patients and the donor population, and a sustainable model of funding ideally involving research councils, health services, and patient charities. This initiative could revolutionise the understanding of this still poorly-understood disease and enhance development of diagnostic biomarkers and treatments.

  2. Reproducibility analysis of upper limbs reachable workspace, and effects of acquisition protocol, sex and hand dominancy.

    PubMed

    Clément, Julien; Raison, Maxime; Rouleau, Dominique M

    2018-02-08

    None of the physical testing, nor the goniometers currently used to assess upper limb function have a high validity, sensitivity or reliability. The reachable workspace, i.e. the area covered by the farthest points a subject can reach by hand without moving his/her body, shows promise but has yet to be validated, particularly in terms of reproducibility. Therefore, this study aims to evaluate the reproducibility of the reachable workspace over a period of several weeks, and to assess the effects of two proposed acquisition protocols, as well as those of gender, and hand dominancy. Shoulder movements were recorded using a motion capture system on 10 female and 10 male healthy subjects during a random protocol, i.e. simply asking them to achieve the farthest points they could reach with their hands, and during a standardized protocol, i.e. asking them to perform predefined shoulder elevations while keeping their trunk and elbow straight. The standardized protocol was repeated 7 weeks later. Repeated measures showed no significant difference, good to excellent intraclass correlation coefficients (0.46-0.81) and small bias (0.0-1.2%). The random protocol provided significantly lower and more scattered values for the reachable workspace (80.0 ± 22.6% vs. 91.0 ± 8.1%, p = .004), whereas gender and hand-dominancy had no effect. This study showed that the reachable workspace was highly reliable over a period of 7 weeks and that both upper limbs provided similar results. It could be used to monitor various pathologies of the upper limbs and to assess treatment efficiency, using a subject's healthy limb as reference. Copyright © 2017 Elsevier Ltd. All rights reserved.

  3. Multiparty quantum key agreement protocol based on locally indistinguishable orthogonal product states

    NASA Astrophysics Data System (ADS)

    Jiang, Dong-Huan; Xu, Guang-Bao

    2018-07-01

    Based on locally indistinguishable orthogonal product states, we propose a novel multiparty quantum key agreement (QKA) protocol. In this protocol, the private key information of each party is encoded as some orthogonal product states that cannot be perfectly distinguished by local operations and classical communications. To ensure the security of the protocol with small amount of decoy particles, the different particles of each product state are transmitted separately. This protocol not only can make each participant fairly negotiate a shared key, but also can avoid information leakage in the maximum extent. We give a detailed security proof of this protocol. From comparison result with the existing QKA protocols, we can know that the new protocol is more efficient.

  4. Development and implementation of clinical trial protocol templates at the National Institute of Allergy and Infectious Diseases.

    PubMed

    Bridge, Heather; Smolskis, Mary; Bianchine, Peter; Dixon, Dennis O; Kelly, Grace; Herpin, Betsey; Tavel, Jorge

    2009-08-01

    A clinical research protocol document must reflect both sound scientific rationale as well as local, national and, when applicable, international regulatory and human subject protections requirements. These requirements originate from a variety of sources, undergo frequent revision and are subject to interpretation. Tools to assist clinical investigators in the production of clinical protocols could facilitate navigating these requirements and ultimately increase the efficiency of clinical research. The National Institute of Allergy and Infectious Diseases (NIAID) developed templates for investigators to serve as the foundation for protocol development. These protocol templates are designed as tools to support investigators in developing clinical protocols. NIAID established a series of working groups to determine how to improve its capacity to conduct clinical research more efficiently and effectively. The Protocol Template Working Group was convened to determine what protocol templates currently existed within NIAID and whether standard NIAID protocol templates should be produced. After review and assessment of existing protocol documents and requirements, the group reached consensus about required and optional content, determined the format and identified methods for distribution as well as education of investigators in the use of these templates. The templates were approved by the NIAID Executive Committee in 2006 and posted as part of the NIAID Clinical Research Toolkit [1] website for broad access. These documents require scheduled revisions to stay current with regulatory and policy changes. The structure of any clinical protocol template, whether comprehensive or specific to a particular study phase, setting or design, affects how it is used by investigators. Each structure presents its own set of advantages and disadvantages. While useful, protocol templates are not stand-alone tools for creating an optimal protocol document, but must be complemented by institutional resources and support. Education and guidance of investigators in the appropriate use of templates is necessary to ensure a complete yet concise protocol document. Due to changing regulatory requirements, clinical protocol templates cannot become static, but require frequent revisions.

  5. Enhanced Weight based DSR for Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Verma, Samant; Jain, Sweta

    2011-12-01

    Routing in ad hoc network is a great problematic, since a good routing protocol must ensure fast and efficient packet forwarding, which isn't evident in ad hoc networks. In literature there exists lot of routing protocols however they don't include all the aspects of ad hoc networks as mobility, device and medium constraints which make these protocols not efficient for some configuration and categories of ad hoc networks. Thus in this paper we propose an improvement of Weight Based DSR in order to include some of the aspects of ad hoc networks as stability, remaining battery power, load and trust factor and proposing a new approach Enhanced Weight Based DSR.

  6. A secure RFID mutual authentication protocol for healthcare environments using elliptic curve cryptography.

    PubMed

    Jin, Chunhua; Xu, Chunxiang; Zhang, Xiaojun; Zhao, Jining

    2015-03-01

    Radio Frequency Identification(RFID) is an automatic identification technology, which can be widely used in healthcare environments to locate and track staff, equipment and patients. However, potential security and privacy problems in RFID system remain a challenge. In this paper, we design a mutual authentication protocol for RFID based on elliptic curve cryptography(ECC). We use pre-computing method within tag's communication, so that our protocol can get better efficiency. In terms of security, our protocol can achieve confidentiality, unforgeability, mutual authentication, tag's anonymity, availability and forward security. Our protocol also can overcome the weakness in the existing protocols. Therefore, our protocol is suitable for healthcare environments.

  7. Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols

    PubMed Central

    Nam, Junghyun; Kim, Moonseong

    2014-01-01

    We revisit the SM2 protocol, which is widely used in Chinese commercial applications and by Chinese government agencies. Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order to assure protocol implementers of their security properties, the SM2 protocol does not have a proof of security. In this paper, we prove the security of the SM2 protocol in the widely accepted indistinguishability-based Bellare-Rogaway model under the elliptic curve discrete logarithm problem (ECDLP) assumption. We also present a simplified and more efficient version of the SM2 protocol with an accompanying security proof. PMID:25276863

  8. Molecular Identification of Date Palm Cultivars Using Random Amplified Polymorphic DNA (RAPD) Markers.

    PubMed

    Al-Khalifah, Nasser S; Shanavaskhan, A E

    2017-01-01

    Ambiguity in the total number of date palm cultivars across the world is pointing toward the necessity for an enumerative study using standard morphological and molecular markers. Among molecular markers, DNA markers are more suitable and ubiquitous to most applications. They are highly polymorphic in nature, frequently occurring in genomes, easy to access, and highly reproducible. Various molecular markers such as restriction fragment length polymorphism (RFLP), amplified fragment length polymorphism (AFLP), simple sequence repeats (SSR), inter-simple sequence repeats (ISSR), and random amplified polymorphic DNA (RAPD) markers have been successfully used as efficient tools for analysis of genetic variation in date palm. This chapter explains a stepwise protocol for extracting total genomic DNA from date palm leaves. A user-friendly protocol for RAPD analysis and a table showing the primers used in different molecular techniques that produce polymorphisms in date palm are also provided.

  9. Rapid and reliable high-throughput methods of DNA extraction for use in barcoding and molecular systematics of mushrooms.

    PubMed

    Dentinger, Bryn T M; Margaritescu, Simona; Moncalvo, Jean-Marc

    2010-07-01

    We present two methods for DNA extraction from fresh and dried mushrooms that are adaptable to high-throughput sequencing initiatives, such as DNA barcoding. Our results show that these protocols yield ∼85% sequencing success from recently collected materials. Tests with both recent (<2 year) and older (>100 years) specimens reveal that older collections have low success rates and may be an inefficient resource for populating a barcode database. However, our method of extracting DNA from herbarium samples using small amount of tissue is reliable and could be used for important historical specimens. The application of these protocols greatly reduces time, and therefore cost, of generating DNA sequences from mushrooms and other fungi vs. traditional extraction methods. The efficiency of these methods illustrates that standardization and streamlining of sample processing should be shifted from the laboratory to the field. © 2009 Blackwell Publishing Ltd.

  10. High-throughput mouse genotyping using robotics automation.

    PubMed

    Linask, Kaari L; Lo, Cecilia W

    2005-02-01

    The use of mouse models is rapidly expanding in biomedical research. This has dictated the need for the rapid genotyping of mutant mouse colonies for more efficient utilization of animal holding space. We have established a high-throughput protocol for mouse genotyping using two robotics workstations: a liquid-handling robot to assemble PCR and a microfluidics electrophoresis robot for PCR product analysis. This dual-robotics setup incurs lower start-up costs than a fully automated system while still minimizing human intervention. Essential to this automation scheme is the construction of a database containing customized scripts for programming the robotics workstations. Using these scripts and the robotics systems, multiple combinations of genotyping reactions can be assembled simultaneously, allowing even complex genotyping data to be generated rapidly with consistency and accuracy. A detailed protocol, database, scripts, and additional background information are available at http://dir.nhlbi.nih.gov/labs/ldb-chd/autogene/.

  11. Chapter 15: Commercial New Construction Evaluation Protocol. The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kurnik, Charles W.; Keates, Steven

    This protocol is intended to describe the recommended method when evaluating the whole-building performance of new construction projects in the commercial sector. The protocol focuses on energy conservation measures (ECMs) or packages of measures where evaluators can analyze impacts using building simulation. These ECMs typically require the use of calibrated building simulations under Option D of the International Performance Measurement and Verification Protocol (IPMVP).

  12. Modeling and Simulation of a Novel Relay Node Based Secure Routing Protocol Using Multiple Mobile Sink for Wireless Sensor Networks.

    PubMed

    Perumal, Madhumathy; Dhandapani, Sivakumar

    2015-01-01

    Data gathering and optimal path selection for wireless sensor networks (WSN) using existing protocols result in collision. Increase in collision further increases the possibility of packet drop. Thus there is a necessity to eliminate collision during data aggregation. Increasing the efficiency is the need of the hour with maximum security. This paper is an effort to come up with a reliable and energy efficient WSN routing and secure protocol with minimum delay. This technique is named as relay node based secure routing protocol for multiple mobile sink (RSRPMS). This protocol finds the rendezvous point for optimal transmission of data using a "splitting tree" technique in tree-shaped network topology and then to determine all the subsequent positions of a sink the "Biased Random Walk" model is used. In case of an event, the sink gathers the data from all sources, when they are in the sensing range of rendezvous point. Otherwise relay node is selected from its neighbor to transfer packets from rendezvous point to sink. A symmetric key cryptography is used for secure transmission. The proposed relay node based secure routing protocol for multiple mobile sink (RSRPMS) is experimented and simulation results are compared with Intelligent Agent-Based Routing (IAR) protocol to prove that there is increase in the network lifetime compared with other routing protocols.

  13. Efficiency of Adaptive Temperature-Based Replica Exchange for Sampling Large-Scale Protein Conformational Transitions.

    PubMed

    Zhang, Weihong; Chen, Jianhan

    2013-06-11

    Temperature-based replica exchange (RE) is now considered a principal technique for enhanced sampling of protein conformations. It is also recognized that existence of sharp cooperative transitions (such as protein folding/unfolding) can lead to temperature exchange bottlenecks and significantly reduce the sampling efficiency. Here, we revisit two adaptive temperature-based RE protocols, namely, exchange equalization (EE) and current maximization (CM), that were previously examined using atomistic simulations (Lee and Olson, J. Chem. Physics2011, 134, 24111). Both protocols aim to overcome exchange bottlenecks by adaptively adjusting the simulation temperatures, either to achieve uniform exchange rates (in EE) or to maximize temperature diffusion (CM). By designing a realistic yet computationally tractable coarse-grained protein model, one can sample many reversible folding/unfolding transitions using conventional constant temperature molecular dynamics (MD), standard REMD, EE-REMD, and CM-REMD. This allows rigorous evaluation of the sampling efficiency, by directly comparing the rates of folding/unfolding transitions and convergence of various thermodynamic properties of interest. The results demonstrate that both EE and CM can indeed enhance temperature diffusion compared to standard RE, by ∼3- and over 10-fold, respectively. Surprisingly, the rates of reversible folding/unfolding transitions are similar in all three RE protocols. The convergence rates of several key thermodynamic properties, including the folding stability and various 1D and 2D free energy surfaces, are also similar. Therefore, the efficiency of RE protocols does not appear to be limited by temperature diffusion, but by the inherent rates of spontaneous large-scale conformational rearrangements. This is particularly true considering that virtually all RE simulations of proteins in practice involve exchange attempt frequencies (∼ps(-1)) that are several orders of magnitude faster than the slowest protein motions (∼μs(-1)). Our results also suggest that the efficiency of RE will not likely be improved by other protocols that aim to accelerate exchange or temperature diffusion. Instead, protocols with some types of guided tempering will likely be necessary to drive faster large-scale conformational transitions.

  14. A decentralized fuzzy C-means-based energy-efficient routing protocol for wireless sensor networks.

    PubMed

    Alia, Osama Moh'd

    2014-01-01

    Energy conservation in wireless sensor networks (WSNs) is a vital consideration when designing wireless networking protocols. In this paper, we propose a Decentralized Fuzzy Clustering Protocol, named DCFP, which minimizes total network energy dissipation to promote maximum network lifetime. The process of constructing the infrastructure for a given WSN is performed only once at the beginning of the protocol at a base station, which remains unchanged throughout the network's lifetime. In this initial construction step, a fuzzy C-means algorithm is adopted to allocate sensor nodes into their most appropriate clusters. Subsequently, the protocol runs its rounds where each round is divided into a CH-Election phase and a Data Transmission phase. In the CH-Election phase, the election of new cluster heads is done locally in each cluster where a new multicriteria objective function is proposed to enhance the quality of elected cluster heads. In the Data Transmission phase, the sensing and data transmission from each sensor node to their respective cluster head is performed and cluster heads in turn aggregate and send the sensed data to the base station. Simulation results demonstrate that the proposed protocol improves network lifetime, data delivery, and energy consumption compared to other well-known energy-efficient protocols.

  15. A Decentralized Fuzzy C-Means-Based Energy-Efficient Routing Protocol for Wireless Sensor Networks

    PubMed Central

    2014-01-01

    Energy conservation in wireless sensor networks (WSNs) is a vital consideration when designing wireless networking protocols. In this paper, we propose a Decentralized Fuzzy Clustering Protocol, named DCFP, which minimizes total network energy dissipation to promote maximum network lifetime. The process of constructing the infrastructure for a given WSN is performed only once at the beginning of the protocol at a base station, which remains unchanged throughout the network's lifetime. In this initial construction step, a fuzzy C-means algorithm is adopted to allocate sensor nodes into their most appropriate clusters. Subsequently, the protocol runs its rounds where each round is divided into a CH-Election phase and a Data Transmission phase. In the CH-Election phase, the election of new cluster heads is done locally in each cluster where a new multicriteria objective function is proposed to enhance the quality of elected cluster heads. In the Data Transmission phase, the sensing and data transmission from each sensor node to their respective cluster head is performed and cluster heads in turn aggregate and send the sensed data to the base station. Simulation results demonstrate that the proposed protocol improves network lifetime, data delivery, and energy consumption compared to other well-known energy-efficient protocols. PMID:25162060

  16. A Passive Testing Approach for Protocols in Wireless Sensor Networks

    PubMed Central

    Che, Xiaoping; Maag, Stephane; Tan, Hwee-Xian; Tan, Hwee-Pink; Zhou, Zhangbing

    2015-01-01

    Smart systems are today increasingly developed with the number of wireless sensor devices drastically increasing. They are implemented within several contexts throughout our environment. Thus, sensed data transported in ubiquitous systems are important, and the way to carry them must be efficient and reliable. For that purpose, several routing protocols have been proposed for wireless sensor networks (WSN). However, one stage that is often neglected before their deployment is the conformance testing process, a crucial and challenging step. Compared to active testing techniques commonly used in wired networks, passive approaches are more suitable to the WSN environment. While some works propose to specify the protocol with state models or to analyze them with simulators and emulators, we here propose a logic-based approach for formally specifying some functional requirements of a novel WSN routing protocol. We provide an algorithm to evaluate these properties on collected protocol execution traces. Further, we demonstrate the efficiency and suitability of our approach by its application into common WSN functional properties, as well as specific ones designed from our own routing protocol. We provide relevant testing verdicts through a real indoor testbed and the implementation of our protocol. Furthermore, the flexibility, genericity and practicability of our approach have been proven by the experimental results. PMID:26610495

  17. A Passive Testing Approach for Protocols in Wireless Sensor Networks.

    PubMed

    Che, Xiaoping; Maag, Stephane; Tan, Hwee-Xian; Tan, Hwee-Pink; Zhou, Zhangbing

    2015-11-19

    Smart systems are today increasingly developed with the number of wireless sensor devices drastically increasing. They are implemented within several contexts throughout our environment. Thus, sensed data transported in ubiquitous systems are important, and the way to carry them must be efficient and reliable. For that purpose, several routing protocols have been proposed for wireless sensor networks (WSN). However, one stage that is often neglected before their deployment is the conformance testing process, a crucial and challenging step. Compared to active testing techniques commonly used in wired networks, passive approaches are more suitable to the WSN environment. While some works propose to specify the protocol with state models or to analyze them with simulators and emulators, we here propose a logic-based approach for formally specifying some functional requirements of a novel WSN routing protocol. We provide an algorithm to evaluate these properties on collected protocol execution traces. Further, we demonstrate the efficiency and suitability of our approach by its application into common WSN functional properties, as well as specific ones designed from our own routing protocol. We provide relevant testing verdicts through a real indoor testbed and the implementation of our protocol. Furthermore, the flexibility, genericity and practicability of our approach have been proven by the experimental results.

  18. Secure and scalable deduplication of horizontally partitioned health data for privacy-preserving distributed statistical computation.

    PubMed

    Yigzaw, Kassaye Yitbarek; Michalas, Antonis; Bellika, Johan Gustav

    2017-01-03

    Techniques have been developed to compute statistics on distributed datasets without revealing private information except the statistical results. However, duplicate records in a distributed dataset may lead to incorrect statistical results. Therefore, to increase the accuracy of the statistical analysis of a distributed dataset, secure deduplication is an important preprocessing step. We designed a secure protocol for the deduplication of horizontally partitioned datasets with deterministic record linkage algorithms. We provided a formal security analysis of the protocol in the presence of semi-honest adversaries. The protocol was implemented and deployed across three microbiology laboratories located in Norway, and we ran experiments on the datasets in which the number of records for each laboratory varied. Experiments were also performed on simulated microbiology datasets and data custodians connected through a local area network. The security analysis demonstrated that the protocol protects the privacy of individuals and data custodians under a semi-honest adversarial model. More precisely, the protocol remains secure with the collusion of up to N - 2 corrupt data custodians. The total runtime for the protocol scales linearly with the addition of data custodians and records. One million simulated records distributed across 20 data custodians were deduplicated within 45 s. The experimental results showed that the protocol is more efficient and scalable than previous protocols for the same problem. The proposed deduplication protocol is efficient and scalable for practical uses while protecting the privacy of patients and data custodians.

  19. A Simple XML Producer-Consumer Protocol

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy

    2000-01-01

    This document describes a simple XML-based protocol that can be used for producers of events to communicate with consumers of events. The protocol described here is not meant to be the most efficient protocol, the most logical protocol, or the best protocol in any way. This protocol was defined quickly and it's intent is to give us a reasonable protocol that we can implement relatively easily and then use to gain experience in distributed event services. This experience will help us evaluate proposals for event representations, XML-based encoding of information, and communication protocols. The next section of this document describes how we represent events in this protocol and then defines the two events that we choose to use for our initial experiments. These definitions are made by example so that they are informal and easy to understand. The following section then proceeds to define the producer-consumer protocol we have agreed upon for our initial experiments.

  20. Deterministic secure quantum communication using a single d-level system.

    PubMed

    Jiang, Dong; Chen, Yuanyuan; Gu, Xuemei; Xie, Ling; Chen, Lijun

    2017-03-22

    Deterministic secure quantum communication (DSQC) can transmit secret messages between two parties without first generating a shared secret key. Compared with quantum key distribution (QKD), DSQC avoids the waste of qubits arising from basis reconciliation and thus reaches higher efficiency. In this paper, based on data block transmission and order rearrangement technologies, we propose a DSQC protocol. It utilizes a set of single d-level systems as message carriers, which are used to directly encode the secret message in one communication process. Theoretical analysis shows that these employed technologies guarantee the security, and the use of a higher dimensional quantum system makes our protocol achieve higher security and efficiency. Since only quantum memory is required for implementation, our protocol is feasible with current technologies. Furthermore, Trojan horse attack (THA) is taken into account in our protocol. We give a THA model and show that THA significantly increases the multi-photon rate and can thus be detected.

  1. Quantum Correlations in Nonlocal Boson Sampling.

    PubMed

    Shahandeh, Farid; Lund, Austin P; Ralph, Timothy C

    2017-09-22

    Determination of the quantum nature of correlations between two spatially separated systems plays a crucial role in quantum information science. Of particular interest is the questions of if and how these correlations enable quantum information protocols to be more powerful. Here, we report on a distributed quantum computation protocol in which the input and output quantum states are considered to be classically correlated in quantum informatics. Nevertheless, we show that the correlations between the outcomes of the measurements on the output state cannot be efficiently simulated using classical algorithms. Crucially, at the same time, local measurement outcomes can be efficiently simulated on classical computers. We show that the only known classicality criterion violated by the input and output states in our protocol is the one used in quantum optics, namely, phase-space nonclassicality. As a result, we argue that the global phase-space nonclassicality inherent within the output state of our protocol represents true quantum correlations.

  2. Pepper, sweet (Capsicum annuum).

    PubMed

    Heidmann, Iris; Boutilier, Kim

    2015-01-01

    Capsicum (pepper) species are economically important crops that are recalcitrant to genetic transformation by Agrobacterium (Agrobacterium tumefaciens). A number of protocols for pepper transformation have been described but are not routinely applicable. The main bottleneck in pepper transformation is the low frequency of cells that are both susceptible for Agrobacterium infection and have the ability to regenerate. Here, we describe a protocol for the efficient regeneration of transgenic sweet pepper (C. annuum) through inducible activation of the BABY BOOM (BBM) AP2/ERF transcription factor. Using this approach, we can routinely achieve a transformation efficiency of at least 0.6 %. The main improvements in this protocol are the reproducibility in transforming different genotypes and the ability to produce fertile shoots. An added advantage of this protocol is that BBM activity can be induced subsequently in stable transgenic lines, providing a novel regeneration system for clonal propagation through somatic embryogenesis.

  3. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kurnik, Charles W.; Boyd, Brian; Stoughton, Kate M.

    This measurement and verification (M and V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings resulting from water conservation measures (WCMs) in energy performance contracts associated with cooling tower efficiency projects. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M and V plan, and details the procedures to use to determine water savings.

  4. Multi-party Quantum Key Agreement without Entanglement

    NASA Astrophysics Data System (ADS)

    Cai, Bin-Bin; Guo, Gong-De; Lin, Song

    2017-04-01

    A new efficient quantum key agreement protocol without entanglement is proposed. In this protocol, each user encodes his secret key into the traveling particles by performing one of four rotation operations that one cannot perfectly distinguish. In the end, all users can simultaneously obtain the final shared key. The security of the presented protocol against some common attacks is discussed. It is shown that this protocol can effectively protect the privacy of each user and satisfy the requirement of fairness in theory. Moreover, the quantum carriers and the encoding operations used in the protocol can be achieved in realistic physical devices. Therefore, the presented protocol is feasible with current technology.

  5. Efficient decentralized consensus protocols

    NASA Technical Reports Server (NTRS)

    Lakshman, T. V.; Agrawala, A. K.

    1986-01-01

    Decentralized consensus protocols are characterized by successive rounds of message interchanges. Protocols which achieve a consensus in one round of message interchange require O(N-squared) messages, where N is the number of participants. In this paper, a communication scheme, based on finite projective planes, which requires only O(N sq rt N) messages for each round is presented. Using this communication scheme, decentralized consensus protocols which achieve a consensus within two rounds of message interchange are developed. The protocols are symmetric, and the communication scheme does not impose any hierarchical structure. The scheme is illustrated using blocking and nonblocking commit protocols, decentralized extrema finding, and computation of the sum function.

  6. A dyadic protocol for training complex skills: a replication using female participants.

    PubMed

    Sanchez-Ku, M L; Arthur, W

    2000-01-01

    The effectiveness and efficiency of the active interlocked modeling (AIM) dyadic protocol in training complex skills has been extensively demonstrated. However, past evaluation studies have all used male participants exclusively. Consequently, the present study investigated the generalizability of the effectiveness and efficiency gains to women. We randomly assigned 108 female participants to either the AIM-dyad condition or a standard individual control training condition. The results supported the robustness and viability of the AIM protocol. Although their overall performance was lower than that obtained for men in previous studies, women trained in the AIM-dyad condition performed as well as those trained in the individual condition. Thus, the efficiency gains associated with the AIM-dyad protocol, which result from the ability to train two people simultaneously to reach the same performance level as a single person with no increase in training time or machine cost, are generalizable to female participants. The applied and basic research implications of the present study are discussed within the context of well-documented male/female differences in the performance of complex psychomotor tasks. For instance, given the number of women entering the workforce and the significant proportion of women in professions previously deemed to be male-dominated (e.g., air navigation), it is reassuring to know that sex differences in task performance do not necessarily imply sex differences in the effectiveness of training protocols.

  7. How to Improve the Peer Review Method: Free-Selection vs Assigned-Pair Protocol Evaluated in a Computer Networking Course

    ERIC Educational Resources Information Center

    Papadopoulos, Pantelis M.; Lagkas, Thomas D.; Demetriadis, Stavros N.

    2012-01-01

    This study provides field research evidence on the efficiency of a "free-selection" peer review assignment protocol as compared to the typically implemented "assigned-pair" protocol. The study employed 54 sophomore students who were randomly assigned into three groups: Assigned-Pair (AP) (the teacher assigns student works for review to student…

  8. Quantum dense key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.

    2004-03-01

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.

  9. A Lightweight Protocol for Secure Video Streaming

    PubMed Central

    Morkevicius, Nerijus; Bagdonas, Kazimieras

    2018-01-01

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing “Fog Node-End Device” layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard. PMID:29757988

  10. A Lightweight Protocol for Secure Video Streaming.

    PubMed

    Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis

    2018-05-14

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.

  11. The Space Communications Protocol Standards Program

    NASA Technical Reports Server (NTRS)

    Jeffries, Alan; Hooke, Adrian J.

    1994-01-01

    In the fall of 1992 NASA and the Department of Defense chartered a technical team to explore the possibility of developing a common set of space data communications standards for potential dual-use across the U.S. national space mission support infrastructure. The team focused on the data communications needs of those activities associated with on-lined control of civil and military aircraft. A two-pronged approach was adopted: a top-down survey of representative civil and military space data communications requirements was conducted; and a bottom-up analysis of available standard data communications protocols was performed. A striking intersection of civil and military space mission requirements emerged, and an equally striking consensus on the approach towards joint civil and military space protocol development was reached. The team concluded that wide segments of the U.S. civil and military space communities have common needs for: (1) an efficient file transfer protocol; (2) various flavors of underlying data transport service; (3) an optional data protection mechanism to assure end-to-end security of message exchange; and (4) an efficient internetworking protocol. These recommendations led to initiating a program to develop a suite of protocols based on these findings. This paper describes the current status of this program.

  12. An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks

    PubMed Central

    Boubiche, Sabrina; Boubiche, Djallel Eddine; Bilami, Azzedine; Toral-Cruz, Homero

    2016-01-01

    Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes’ resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach. PMID:27077866

  13. Service discovery with routing protocols for MANETs

    NASA Astrophysics Data System (ADS)

    Gu, Xuemai; Shi, Shuo

    2005-11-01

    Service discovery is becoming an important topic as its use throughout the Internet becomes more widespread. In Mobile Ad hoc Networks (MANETs), the routing protocol is very important because it is special network. To find a path for data, and destination nodes, nodes send packets to each node, creating substantial overhead traffic and consuming much time. Even though a variety of routing protocols have been developed for use in MANETs, they are insufficient for reducing overhead traffic and time. In this paper, we propose SDRP: a new service discovery protocol combined with routing policies in MANETs. The protocol is performed upon a distributed network. We describe a service by a unique ID number and use a group-cast routing policy in advertisement and request. The group-cast routing policy decreases the traffic in networks, and it is efficient to find destination node. In addition, the nodes included in the reply path also cache the advertisement information, and it means when each node finds a node next time, they can know where it is as soon as possible, so they minimize the time. Finally, we compare SDRP with both Flood and MAODV in terms of overload, and average delay. Simulation results show SDRP can spend less response time and accommodate even high mobility network environments.

  14. Tissue Sampling Guides for Porcine Biomedical Models.

    PubMed

    Albl, Barbara; Haesner, Serena; Braun-Reichhart, Christina; Streckel, Elisabeth; Renner, Simone; Seeliger, Frank; Wolf, Eckhard; Wanke, Rüdiger; Blutke, Andreas

    2016-04-01

    This article provides guidelines for organ and tissue sampling adapted to porcine animal models in translational medical research. Detailed protocols for the determination of sampling locations and numbers as well as recommendations on the orientation, size, and trimming direction of samples from ∼50 different porcine organs and tissues are provided in the Supplementary Material. The proposed sampling protocols include the generation of samples suitable for subsequent qualitative and quantitative analyses, including cryohistology, paraffin, and plastic histology; immunohistochemistry;in situhybridization; electron microscopy; and quantitative stereology as well as molecular analyses of DNA, RNA, proteins, metabolites, and electrolytes. With regard to the planned extent of sampling efforts, time, and personnel expenses, and dependent upon the scheduled analyses, different protocols are provided. These protocols are adjusted for (I) routine screenings, as used in general toxicity studies or in analyses of gene expression patterns or histopathological organ alterations, (II) advanced analyses of single organs/tissues, and (III) large-scale sampling procedures to be applied in biobank projects. Providing a robust reference for studies of porcine models, the described protocols will ensure the efficiency of sampling, the systematic recovery of high-quality samples representing the entire organ or tissue as well as the intra-/interstudy comparability and reproducibility of results. © The Author(s) 2016.

  15. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Grant, Robert

    Under this grant, three significant software packages were developed or improved, all with the goal of improving the ease-of-use of HPC libraries. The first component is a Python package, named DistArray (originally named Odin), that provides a high-level interface to distributed array computing. This interface is based on the popular and widely used NumPy package and is integrated with the IPython project for enhanced interactive parallel distributed computing. The second Python package is the Distributed Array Protocol (DAP) that enables separate distributed array libraries to share arrays efficiently without copying or sending messages. If a distributed array library supports themore » DAP, it is then automatically able to communicate with any other library that also supports the protocol. This protocol allows DistArray to communicate with the Trilinos library via PyTrilinos, which was also enhanced during this project. A third package, PyTrilinos, was extended to support distributed structured arrays (in addition to the unstructured arrays of its original design), allow more flexible distributed arrays (i.e., the restriction to double precision data was lifted), and implement the DAP. DAP support includes both exporting the protocol so that external packages can use distributed Trilinos data structures, and importing the protocol so that PyTrilinos can work with distributed data from external packages.« less

  16. Real-time echocardiogram transmission protocol based on regions and visualization modes.

    PubMed

    Cavero, Eva; Alesanco, Álvaro; García, José

    2014-09-01

    This paper proposes an Echocardiogram Transmission Protocol (ETP) for real-time end-to-end transmission of echocardiograms over IP networks. The ETP has been designed taking into account the echocardiogram characteristics of each visualized region, encoding each region according to its data type, visualization characteristics and diagnostic importance in order to improve the coding and thus the transmission efficiency. Furthermore, each region is sent separately and different error protection techniques can be used for each region. This leads to an efficient use of resources and provides greater protection for those regions with more clinical information. Synchronization is implemented for regions that change over time. The echocardiogram composition is different for each device. The protocol is valid for all echocardiogram devices thanks to the incorporation of configuration information which includes the composition of the echocardiogram. The efficiency of the ETP has been proved in terms of the number of bits sent with the proposed protocol. The codec and transmission rates used for the regions of interest have been set according to previous recommendations. Although the saving in the codified bits depends on the video composition, a coding gain higher than 7% with respect to without using ETP has been achieved.

  17. Performance Analysis of IEEE 802.15.3 MAC Protocol with Different ACK Polices

    NASA Astrophysics Data System (ADS)

    Mehta, S.; Kwak, K. S.

    The wireless personal area network (WPAN) is an emerging wireless technology for future short range indoor and outdoor communication applications. The IEEE 802.15.3 medium access control (MAC) is proposed, specially, for short range high data rates applications, to coordinate the access to the wireless medium among the competing devices. This paper uses analytical model to study the performance analysis of WPAN (IEEE 802.15.3) MAC in terms of throughput, efficient bandwidth utilization, and delay with various acknowledgment schemes under different parameters. Also, some important observations are obtained, which can be very useful to the protocol architectures. Finally, we come up with some important research issues to further investigate the possible improvements in the WPAN MAC.

  18. Microplastics in seafood: Benchmark protocol for their extraction and characterization.

    PubMed

    Dehaut, Alexandre; Cassone, Anne-Laure; Frère, Laura; Hermabessiere, Ludovic; Himber, Charlotte; Rinnert, Emmanuel; Rivière, Gilles; Lambert, Christophe; Soudant, Philippe; Huvet, Arnaud; Duflos, Guillaume; Paul-Pont, Ika

    2016-08-01

    Pollution of the oceans by microplastics (<5 mm) represents a major environmental problem. To date, a limited number of studies have investigated the level of contamination of marine organisms collected in situ. For extraction and characterization of microplastics in biological samples, the crucial step is the identification of solvent(s) or chemical(s) that efficiently dissolve organic matter without degrading plastic polymers for their identification in a time and cost effective way. Most published papers, as well as OSPAR recommendations for the development of a common monitoring protocol for plastic particles in fish and shellfish at the European level, use protocols containing nitric acid to digest the biological tissues, despite reports of polyamide degradation with this chemical. In the present study, six existing approaches were tested and their effects were compared on up to 15 different plastic polymers, as well as their efficiency in digesting biological matrices. Plastic integrity was evaluated through microscopic inspection, weighing, pyrolysis coupled with gas chromatography and mass spectrometry, and Raman spectrometry before and after digestion. Tissues from mussels, crabs and fish were digested before being filtered on glass fibre filters. Digestion efficiency was evaluated through microscopical inspection of the filters and determination of the relative removal of organic matter content after digestion. Five out of the six tested protocols led to significant degradation of plastic particles and/or insufficient tissue digestion. The protocol using a KOH 10% solution and incubation at 60 °C during a 24 h period led to an efficient digestion of biological tissues with no significant degradation on all tested polymers, except for cellulose acetate. This protocol appeared to be the best compromise for extraction and later identification of microplastics in biological samples and should be implemented in further monitoring studies to ensure relevance and comparison of environmental and seafood product quality studies. Copyright © 2016 Elsevier Ltd. All rights reserved.

  19. Assisted closed-loop optimization of SSVEP-BCI efficiency

    PubMed Central

    Fernandez-Vargas, Jacobo; Pfaff, Hanns U.; Rodríguez, Francisco B.; Varona, Pablo

    2012-01-01

    We designed a novel assisted closed-loop optimization protocol to improve the efficiency of brain-computer interfaces (BCI) based on steady state visually evoked potentials (SSVEP). In traditional paradigms, the control over the BCI-performance completely depends on the subjects' ability to learn from the given feedback cues. By contrast, in the proposed protocol both the subject and the machine share information and control over the BCI goal. Generally, the innovative assistance consists in the delivery of online information together with the online adaptation of BCI stimuli properties. In our case, this adaptive optimization process is realized by (1) a closed-loop search for the best set of SSVEP flicker frequencies and (2) feedback of actual SSVEP magnitudes to both the subject and the machine. These closed-loop interactions between subject and machine are evaluated in real-time by continuous measurement of their efficiencies, which are used as online criteria to adapt the BCI control parameters. The proposed protocol aims to compensate for variability in possibly unknown subjects' state and trait dimensions. In a study with N = 18 subjects, we found significant evidence that our protocol outperformed classic SSVEP-BCI control paradigms. Evidence is presented that it takes indeed into account interindividual variabilities: e.g., under the new protocol, baseline resting state EEG measures predict subjects' BCI performances. This paper illustrates the promising potential of assisted closed-loop protocols in BCI systems. Probably their applicability might be expanded to innovative uses, e.g., as possible new diagnostic/therapeutic tools for clinical contexts and as new paradigms for basic research. PMID:23443214

  20. Assisted closed-loop optimization of SSVEP-BCI efficiency.

    PubMed

    Fernandez-Vargas, Jacobo; Pfaff, Hanns U; Rodríguez, Francisco B; Varona, Pablo

    2013-01-01

    We designed a novel assisted closed-loop optimization protocol to improve the efficiency of brain-computer interfaces (BCI) based on steady state visually evoked potentials (SSVEP). In traditional paradigms, the control over the BCI-performance completely depends on the subjects' ability to learn from the given feedback cues. By contrast, in the proposed protocol both the subject and the machine share information and control over the BCI goal. Generally, the innovative assistance consists in the delivery of online information together with the online adaptation of BCI stimuli properties. In our case, this adaptive optimization process is realized by (1) a closed-loop search for the best set of SSVEP flicker frequencies and (2) feedback of actual SSVEP magnitudes to both the subject and the machine. These closed-loop interactions between subject and machine are evaluated in real-time by continuous measurement of their efficiencies, which are used as online criteria to adapt the BCI control parameters. The proposed protocol aims to compensate for variability in possibly unknown subjects' state and trait dimensions. In a study with N = 18 subjects, we found significant evidence that our protocol outperformed classic SSVEP-BCI control paradigms. Evidence is presented that it takes indeed into account interindividual variabilities: e.g., under the new protocol, baseline resting state EEG measures predict subjects' BCI performances. This paper illustrates the promising potential of assisted closed-loop protocols in BCI systems. Probably their applicability might be expanded to innovative uses, e.g., as possible new diagnostic/therapeutic tools for clinical contexts and as new paradigms for basic research.

Top