Sample records for information sharing protocol

  1. The Native Plant Propagation Protocol Database: 16 years of sharing information

    Treesearch

    R. Kasten Dumroese; Thomas D. Landis

    2016-01-01

    The Native Plant Propagation Protocol Database was launched in 2001 to provide an online mechanism for sharing information about growing native plants. It relies on plant propagators to upload their protocols (detailed directions for growing particular native plants) so that others may benefit from their experience. Currently the database has nearly 3000 protocols and...

  2. Multiprocessor shared-memory information exchange

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Santoline, L.L.; Bowers, M.D.; Crew, A.W.

    1989-02-01

    In distributed microprocessor-based instrumentation and control systems, the inter-and intra-subsystem communication requirements ultimately form the basis for the overall system architecture. This paper describes a software protocol which addresses the intra-subsystem communications problem. Specifically the protocol allows for multiple processors to exchange information via a shared-memory interface. The authors primary goal is to provide a reliable means for information to be exchanged between central application processor boards (masters) and dedicated function processor boards (slaves) in a single computer chassis. The resultant Multiprocessor Shared-Memory Information Exchange (MSMIE) protocol, a standard master-slave shared-memory interface suitable for use in nuclear safety systems, ismore » designed to pass unidirectional buffers of information between the processors while providing a minimum, deterministic cycle time for this data exchange.« less

  3. General A Scheme to Share Information via Employing Discrete Algorithm to Quantum States

    NASA Astrophysics Data System (ADS)

    Kang, Guo-Dong; Fang, Mao-Fa

    2011-02-01

    We propose a protocol for information sharing between two legitimate parties (Bob and Alice) via public-key cryptography. In particular, we specialize the protocol by employing discrete algorithm under mod that maps integers to quantum states via photon rotations. Based on this algorithm, we find that the protocol is secure under various classes of attacks. Specially, owe to the algorithm, the security of the classical privacy contained in the quantum public-key and the corresponding ciphertext is guaranteed. And the protocol is robust against the impersonation attack and the active wiretapping attack by designing particular checking processing, thus the protocol is valid.

  4. Relativistic (2,3)-threshold quantum secret sharing

    NASA Astrophysics Data System (ADS)

    Ahmadi, Mehdi; Wu, Ya-Dong; Sanders, Barry C.

    2017-09-01

    In quantum secret sharing protocols, the usual presumption is that the distribution of quantum shares and players' collaboration are both performed inertially. Here we develop a quantum secret sharing protocol that relaxes these assumptions wherein we consider the effects due to the accelerating motion of the shares. Specifically, we solve the (2,3)-threshold continuous-variable quantum secret sharing in noninertial frames. To this aim, we formulate the effect of relativistic motion on the quantum field inside a cavity as a bosonic quantum Gaussian channel. We investigate how the fidelity of quantum secret sharing is affected by nonuniform motion of the quantum shares. Furthermore, we fully characterize the canonical form of the Gaussian channel, which can be utilized in quantum-information-processing protocols to include relativistic effects.

  5. The US Culture Collection Network responding to the requirements of the Nagoya Protocol on Access and Benefit Sharing

    USDA-ARS?s Scientific Manuscript database

    The US Culture Collection Network held a meeting to share information about how collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Bio...

  6. Multilayer quantum secret sharing based on GHZ state and generalized Bell basis measurement in multiparty agents

    NASA Astrophysics Data System (ADS)

    Wang, Xiao-Jun; An, Long-Xi; Yu, Xu-Tao; Zhang, Zai-Chen

    2017-10-01

    A multilayer quantum secret sharing protocol based on GHZ state is proposed. Alice has the secret carried by quantum state and wants to distribute this secret to multiple agent nodes in the network. In this protocol, the secret is transmitted and shared layer by layer from root Alice to layered agents. The number of agents in each layer is a geometric sequence with a specific common ratio. By sharing GHZ maximally entangled states and making generalized Bell basis measurement, one qubit state can be distributed to multiparty agents and the secret is shared. Only when all agents at the last layer cooperate together, the secret can be recovered. Compared with other protocols based on the entangled state, this protocol adopts layered construction so that secret can be distributed to more agents with fewer particles GHZ state. This quantum secret sharing protocol can be used in wireless network to ensure the security of information delivery.

  7. The U.S. Culture Collection Network Responding to the Requirements of the Nagoya Protocol on Access and Benefit Sharing

    Treesearch

    Kevin McCluskey; Katharine B. Barker; Hazel A. Barton; Kyria Boundy-Mills; Daniel R. Brown; Jonathan A. Coddington; Kevin Cook; Philippe Desmeth; David Geiser; Jessie A. Glaeser; Stephanie Greene; Seogchan Kang; Michael W. Lomas; Ulrich Melcher; Scott E. Miller; David R. Nobles; Kristina J. Owens; Jerome H. Reichman; Manuela da Silva; John Wertz; Cale Whitworth; David Smith; Steven E. Lindow

    2017-01-01

    The U.S. Culture Collection Network held a meeting to share information about how culture collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity (CBD). The meeting included representatives...

  8. A no-key-exchange secure image sharing scheme based on Shamir's three-pass cryptography protocol and the multiple-parameter fractional Fourier transform.

    PubMed

    Lang, Jun

    2012-01-30

    In this paper, we propose a novel secure image sharing scheme based on Shamir's three-pass protocol and the multiple-parameter fractional Fourier transform (MPFRFT), which can safely exchange information with no advance distribution of either secret keys or public keys between users. The image is encrypted directly by the MPFRFT spectrum without the use of phase keys, and information can be shared by transmitting the encrypted image (or message) three times between users. Numerical simulation results are given to verify the performance of the proposed algorithm.

  9. High-Dimensional Circular Quantum Secret Sharing Using Orbital Angular Momentum

    NASA Astrophysics Data System (ADS)

    Tang, Dawei; Wang, Tie-jun; Mi, Sichen; Geng, Xiao-Meng; Wang, Chuan

    2016-11-01

    Quantum secret sharing is to distribute secret message securely between multi-parties. Here exploiting orbital angular momentum (OAM) state of single photons as the information carrier, we propose a high-dimensional circular quantum secret sharing protocol which increases the channel capacity largely. In the proposed protocol, the secret message is split into two parts, and each encoded on the OAM state of single photons. The security of the protocol is guaranteed by the laws of non-cloning theorem. And the secret messages could not be recovered except that the two receivers collaborated with each other. Moreover, the proposed protocol could be extended into high-level quantum systems, and the enhanced security could be achieved.

  10. X-Windows Information Sharing Protocol Widget Class

    NASA Technical Reports Server (NTRS)

    Barry, Matthew R.

    2006-01-01

    The X-Windows Information Sharing Protocol (ISP) Widget Class ("Class") is used here in the object-oriented-programming sense of the word) was devised to simplify the task of implementing ISP graphical-user-interface (GUI) computer programs. ISP programming tasks require many method calls to identify, query, and interpret the connections and messages exchanged between a client and an ISP server. Most X-Windows GUI programs use widget sets or toolkits to facilitate management of complex objects. The widget standards facilitate construction of toolkits and application programs. The X-Windows Information Sharing Protocol (ISP) Widget Class encapsulates the client side of the ISP programming libraries within the framework of an X-Windows widget. Using the widget framework, X-Windows GUI programs can interact with ISP services in an abstract way and in the same manner as that of other graphical widgets, making it easier to write ISP GUI client programs. Wrapping ISP client services inside a widget framework enables a programmer to treat an ISP server interface as though it were a GUI. Moreover, an alternate subclass could implement another communication protocol in the same sort of widget.

  11. Controlling Distributed Planning

    NASA Technical Reports Server (NTRS)

    Clement, Bradley; Barrett, Anthony

    2004-01-01

    A system of software implements an extended version of an approach, denoted shared activity coordination (SHAC), to the interleaving of planning and the exchange of plan information among organizations devoted to different missions that normally communicate infrequently except that they need to collaborate on joint activities and/or the use of shared resources. SHAC enables the planning and scheduling systems of the organizations to coordinate by resolving conflicts while optimizing local planning solutions. The present software provides a framework for modeling and executing communication protocols for SHAC. Shared activities are represented in each interacting planning system to establish consensus on joint activities or to inform the other systems of consumption of a common resource or a change in a shared state. The representations of shared activities are extended to include information on (1) the role(s) of each participant, (2) permissions (defined as specifications of which participant controls what aspects of shared activities and scheduling thereof), and (3) constraints on the parameters of shared activities. Also defined in the software are protocols for changing roles, permissions, and constraints during the course of coordination and execution.

  12. Sequential quantum secret sharing in a noisy environment aided with weak measurements

    NASA Astrophysics Data System (ADS)

    Ray, Maharshi; Chatterjee, Sourav; Chakrabarty, Indranil

    2016-05-01

    In this work we give a (n,n)-threshold protocol for sequential secret sharing of quantum information for the first time. By sequential secret sharing we refer to a situation where the dealer is not having all the secrets at the same time, at the beginning of the protocol; however if the dealer wishes to share secrets at subsequent phases she/he can realize it with the help of our protocol. First of all we present our protocol for three parties and later we generalize it for the situation where we have more (n> 3) parties. Interestingly, we show that our protocol of sequential secret sharing requires less amount of quantum as well as classical resource as compared to the situation wherein existing protocols are repeatedly used. Further in a much more realistic situation, we consider the sharing of qubits through two kinds of noisy channels, namely the phase damping channel (PDC) and the amplitude damping channel (ADC). When we carry out the sequential secret sharing in the presence of noise we observe that the fidelity of secret sharing at the kth iteration is independent of the effect of noise at the (k - 1)th iteration. In case of ADC we have seen that the average fidelity of secret sharing drops down to ½ which is equivalent to a random guess of the quantum secret. Interestingly, we find that by applying weak measurements one can enhance the average fidelity. This increase of the average fidelity can be achieved with certain trade off with the success probability of the weak measurements.

  13. Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States

    NASA Astrophysics Data System (ADS)

    Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua

    2018-03-01

    A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.

  14. Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States

    NASA Astrophysics Data System (ADS)

    Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua

    2018-06-01

    A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.

  15. Threshold Things That Think: Authorisation for Resharing

    NASA Astrophysics Data System (ADS)

    Peeters, Roel; Kohlweiss, Markulf; Preneel, Bart

    As we are evolving towards ubiquitous computing, users carry an increasing number of mobile devices with sensitive information. The security of this information can be protected using threshold cryptography, in which secret computations are shared between multiple devices. Threshold cryptography can be made more robust by resharing protocols, which allow recovery from partial compromises. This paper introduces user-friendly and secure protocols for the authorisation of resharing protocols. We present both automatic and manual protocols, utilising a group manual authentication protocol to add a new device. We analyse the security of these protocols: our analysis considers permanent and temporary compromises, denial of service attacks and manual authentications errors of the user.

  16. Semi-quantum Dialogue Based on Single Photons

    NASA Astrophysics Data System (ADS)

    Ye, Tian-Yu; Ye, Chong-Qiang

    2018-02-01

    In this paper, we propose two semi-quantum dialogue (SQD) protocols by using single photons as the quantum carriers, where one requires the classical party to possess the measurement capability and the other does not have this requirement. The security toward active attacks from an outside Eve in the first SQD protocol is guaranteed by the complete robustness of present semi-quantum key distribution (SQKD) protocols, the classical one-time pad encryption, the classical party's randomization operation and the decoy photon technology. The information leakage problem of the first SQD protocol is overcome by the classical party' classical basis measurements on the single photons carrying messages which makes him share their initial states with the quantum party. The security toward active attacks from Eve in the second SQD protocol is guaranteed by the classical party's randomization operation, the complete robustness of present SQKD protocol and the classical one-time pad encryption. The information leakage problem of the second SQD protocol is overcome by the quantum party' classical basis measurements on each two adjacent single photons carrying messages which makes her share their initial states with the classical party. Compared with the traditional information leakage resistant QD protocols, the advantage of the proposed SQD protocols lies in that they only require one party to have quantum capabilities. Compared with the existing SQD protocol, the advantage of the proposed SQD protocols lies in that they only employ single photons rather than two-photon entangled states as the quantum carriers. The proposed SQD protocols can be implemented with present quantum technologies.

  17. Quantum secret sharing with identity authentication based on Bell states

    NASA Astrophysics Data System (ADS)

    Abulkasim, Hussein; Hamad, Safwat; Khalifa, Amal; El Bahnasy, Khalid

    Quantum secret sharing techniques allow two parties or more to securely share a key, while the same number of parties or less can efficiently deduce the secret key. In this paper, we propose an authenticated quantum secret sharing protocol, where a quantum dialogue protocol is adopted to authenticate the identity of the parties. The participants simultaneously authenticate the identity of each other based on parts of a prior shared key. Moreover, the whole prior shared key can be reused for deducing the secret data. Although the proposed scheme does not significantly improve the efficiency performance, it is more secure compared to some existing quantum secret sharing scheme due to the identity authentication process. In addition, the proposed scheme can stand against participant attack, man-in-the-middle attack, impersonation attack, Trojan-horse attack as well as information leaks.

  18. Retrieving and routing quantum information in a quantum network

    NASA Astrophysics Data System (ADS)

    Sazim, S.; Chiranjeevi, V.; Chakrabarty, I.; Srinathan, K.

    2015-12-01

    In extant quantum secret sharing protocols, once the secret is shared in a quantum network ( qnet) it cannot be retrieved, even if the dealer wishes that his/her secret no longer be available in the network. For instance, if the dealer is part of the two qnets, say {{Q}}_1 and {{Q}}_2 and he/she subsequently finds that {{Q}}_2 is more reliable than {{Q}}_1, he/she may wish to transfer all her secrets from {{Q}}_1 to {{Q}}_2. Known protocols are inadequate to address such a revocation. In this work we address this problem by designing a protocol that enables the source/dealer to bring back the information shared in the network, if desired. Unlike classical revocation, the no-cloning theorem automatically ensures that the secret is no longer shared in the network. The implications of our results are multi-fold. One interesting implication of our technique is the possibility of routing qubits in asynchronous qnets. By asynchrony we mean that the requisite data/resources are intermittently available (but not necessarily simultaneously) in the qnet. For example, we show that a source S can send quantum information to a destination R even though (a) S and R share no quantum resource, (b) R's identity is unknown to S at the time of sending the message, but is subsequently decided, (c) S herself can be R at a later date and/or in a different location to bequeath her information (`backed-up' in the qnet) and (d) importantly, the path chosen for routing the secret may hit a dead end due to resource constraints, congestion, etc., (therefore the information needs to be back-tracked and sent along an alternate path). Another implication of our technique is the possibility of using insecure resources. For instance, if the quantum memory within an organization is insufficient, it may safely store (using our protocol) its private information with a neighboring organization without (a) revealing critical data to the host and (b) losing control over retrieving the data. Putting the two implications together, namely routing and secure storage, it is possible to envision applications like quantum mail (qmail) as an outsourced service.

  19. Multiparty quantum key agreement protocol based on locally indistinguishable orthogonal product states

    NASA Astrophysics Data System (ADS)

    Jiang, Dong-Huan; Xu, Guang-Bao

    2018-07-01

    Based on locally indistinguishable orthogonal product states, we propose a novel multiparty quantum key agreement (QKA) protocol. In this protocol, the private key information of each party is encoded as some orthogonal product states that cannot be perfectly distinguished by local operations and classical communications. To ensure the security of the protocol with small amount of decoy particles, the different particles of each product state are transmitted separately. This protocol not only can make each participant fairly negotiate a shared key, but also can avoid information leakage in the maximum extent. We give a detailed security proof of this protocol. From comparison result with the existing QKA protocols, we can know that the new protocol is more efficient.

  20. The U.S. Culture Collection Network Responding to the Requirements of the Nagoya Protocol on Access and Benefit Sharing

    PubMed Central

    Barker, Katharine B.; Barton, Hazel A.; Boundy-Mills, Kyria; Brown, Daniel R.; Coddington, Jonathan A.; Cook, Kevin; Desmeth, Philippe; Geiser, David; Glaeser, Jessie A.; Greene, Stephanie; Kang, Seogchan; Lomas, Michael W.; Melcher, Ulrich; Miller, Scott E.; Nobles, David R.; Owens, Kristina J.; Reichman, Jerome H.; da Silva, Manuela; Wertz, John; Whitworth, Cale; Smith, David

    2017-01-01

    ABSTRACT The U.S. Culture Collection Network held a meeting to share information about how culture collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity (CBD). The meeting included representatives of many culture collections and other biological collections, the U.S. Department of State, U.S. Department of Agriculture, Secretariat of the CBD, interested scientific societies, and collection groups, including Scientific Collections International and the Global Genome Biodiversity Network. The participants learned about the policies of the United States and other countries regarding access to genetic resources, the definition of genetic resources, and the status of historical materials and genetic sequence information. Key topics included what constitutes access and how the CBD Access and Benefit-Sharing Clearing-House can help guide researchers through the process of obtaining Prior Informed Consent on Mutually Agreed Terms. U.S. scientists and their international collaborators are required to follow the regulations of other countries when working with microbes originally isolated outside the United States, and the local regulations required by the Nagoya Protocol vary by the country of origin of the genetic resource. Managers of diverse living collections in the United States described their holdings and their efforts to provide access to genetic resources. This meeting laid the foundation for cooperation in establishing a set of standard operating procedures for U.S. and international culture collections in response to the Nagoya Protocol. PMID:28811341

  1. The U.S. Culture Collection Network Responding to the Requirements of the Nagoya Protocol on Access and Benefit Sharing.

    PubMed

    McCluskey, Kevin; Barker, Katharine B; Barton, Hazel A; Boundy-Mills, Kyria; Brown, Daniel R; Coddington, Jonathan A; Cook, Kevin; Desmeth, Philippe; Geiser, David; Glaeser, Jessie A; Greene, Stephanie; Kang, Seogchan; Lomas, Michael W; Melcher, Ulrich; Miller, Scott E; Nobles, David R; Owens, Kristina J; Reichman, Jerome H; da Silva, Manuela; Wertz, John; Whitworth, Cale; Smith, David

    2017-08-15

    The U.S. Culture Collection Network held a meeting to share information about how culture collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity (CBD). The meeting included representatives of many culture collections and other biological collections, the U.S. Department of State, U.S. Department of Agriculture, Secretariat of the CBD, interested scientific societies, and collection groups, including Scientific Collections International and the Global Genome Biodiversity Network. The participants learned about the policies of the United States and other countries regarding access to genetic resources, the definition of genetic resources, and the status of historical materials and genetic sequence information. Key topics included what constitutes access and how the CBD Access and Benefit-Sharing Clearing-House can help guide researchers through the process of obtaining Prior Informed Consent on Mutually Agreed Terms. U.S. scientists and their international collaborators are required to follow the regulations of other countries when working with microbes originally isolated outside the United States, and the local regulations required by the Nagoya Protocol vary by the country of origin of the genetic resource. Managers of diverse living collections in the United States described their holdings and their efforts to provide access to genetic resources. This meeting laid the foundation for cooperation in establishing a set of standard operating procedures for U.S. and international culture collections in response to the Nagoya Protocol.

  2. Efficient File Sharing by Multicast - P2P Protocol Using Network Coding and Rank Based Peer Selection

    NASA Technical Reports Server (NTRS)

    Stoenescu, Tudor M.; Woo, Simon S.

    2009-01-01

    In this work, we consider information dissemination and sharing in a distributed peer-to-peer (P2P highly dynamic communication network. In particular, we explore a network coding technique for transmission and a rank based peer selection method for network formation. The combined approach has been shown to improve information sharing and delivery to all users when considering the challenges imposed by the space network environments.

  3. Cell synchrony and chromosomal protocols for somatic cells of cotton gossypium hirsutum

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Van`t Hof, J.; Lamm, S.S.

    1994-10-10

    The intent of this pamphlet is to share information with others who are interested in useful protocols for cotton cytogenetics and cytology. The protocols described are a beginning effort and they are expected to be improved. All methods, results and data given pertain to cultivar MD 51ne. We are not satisfied with our results of in situ hybridization.

  4. Plug into a Network.

    ERIC Educational Resources Information Center

    Vander Linden, Doug; Clark, Larry

    1994-01-01

    Stand-alone, single-user software programs for classroom use can be prohibitively expensive, compared to information-sharing network systems. Based on a Kansas district's experience, this article explains three types of networks (device-sharing, operating-system-based, and client-server-based) and discusses network protocols, software choices,…

  5. Establishing security of quantum key distribution without monitoring disturbance

    NASA Astrophysics Data System (ADS)

    Koashi, Masato

    2015-10-01

    In conventional quantum key distribution (QKD) protocols, the information leak to an eavesdropper is estimated through the basic principle of quantum mechanics dictated in the original version of Heisenberg's uncertainty principle. The amount of leaked information on a shared sifted key is bounded from above essentially by using information-disturbance trade-off relations, based on the amount of signal disturbance measured via randomly sampled or inserted probe signals. Here we discuss an entirely different avenue toward the private communication, which does not rely on the information disturbance trade-off relations and hence does not require a monitoring of signal disturbance. The independence of the amount of privacy amplification from that of disturbance tends to give it a high tolerance on the channel noises. The lifting of the burden of precise statistical estimation of disturbance leads to a favorable finite-key-size effect. A protocol based on the novel principle can be implemented by only using photon detectors and classical optics tools: a laser, a phase modulator, and an interferometer. The protocol resembles the differential-phase-shift QKD protocol in that both share a simple binary phase shift keying on a coherent train of weak pulses from a laser. The difference lies in the use of a variable-delay interferometer in the new protocol, which randomly changes the combination of pulse pairs to be superposed. This extra randomness has turned out to be enough to upper-bound the information extracted by the eavesdropper, regardless of how they have disturbed the quantum signal.

  6. Enhancing FBI Terrorism and Homeland Security Information Sharing With State, Local and Tribal Agencies

    DTIC Science & Technology

    2010-09-01

    the proposed NSI implementation (PM-ISE, 2008). The ISE reported, in October 2009, that the Los Angeles Police Department ( LAPD ) ISE...position of the Department of Defense or the U.S. Government. IRB Protocol number ________________. 12a. DISTRIBUTION / AVAILABILITY STATEMENT...critical, priority issue for all levels of government. The consensus of all three categories of literature was that government information sharing

  7. Cryptanalysis on a scheme to share information via employing a discrete algorithm to quantum states

    NASA Astrophysics Data System (ADS)

    Amellal, H.; Meslouhi, A.; El Baz, M.; Hassouni, Y.; El Allati, A.

    2017-03-01

    Recently, Yang and Hwang [Int. J. Theor. Phys. 53, 224 (2014)] demonstrated that the scheme to share information via employing discrete algorithm to quantum states presented by Kang and Fang [Commun. Theor. Phys. 55, 239 (2011)] suffers from a major vulnerability allowing an eavesdropper to perform a measurement and resend attack. By introducing an additional checking state framework, the authors have proposed an improved protocol to overcome this weakness. This work calls into question the invoked vulnerability in order to clarify a misinterpretation in the same protocol stages also introduce a possible leakage information strategy, known as a faked state attack, despite the proposed improvement, which means that the same security problem may persist. Finally, an upgrading technic was introduced in order to enhance the security transmission.

  8. Two-party secret key distribution via a modified quantum secret sharing protocol.

    PubMed

    Grice, W P; Evans, P G; Lawrie, B; Legré, M; Lougovski, P; Ray, W; Williams, B P; Qi, B; Smith, A M

    2015-03-23

    We present and demonstrate a novel protocol for distributing secret keys between two and only two parties based on N-party single-qubit Quantum Secret Sharing (QSS). We demonstrate our new protocol with N = 3 parties using phase-encoded photons. We show that any two out of N parties can build a secret key based on partial information from each other and with collaboration from the remaining N - 2 parties. Our implementation allows for an accessible transition between N-party QSS and arbitrary two party QKD without modification of hardware. In addition, our approach significantly reduces the number of resources such as single photon detectors, lasers and dark fiber connections needed to implement QKD.

  9. Secure quantum communication using classical correlated channel

    NASA Astrophysics Data System (ADS)

    Costa, D.; de Almeida, N. G.; Villas-Boas, C. J.

    2016-10-01

    We propose a secure protocol to send quantum information from one part to another without a quantum channel. In our protocol, which resembles quantum teleportation, a sender (Alice) and a receiver (Bob) share classical correlated states instead of EPR ones, with Alice performing measurements in two different bases and then communicating her results to Bob through a classical channel. Our secure quantum communication protocol requires the same amount of classical bits as the standard quantum teleportation protocol. In our scheme, as in the usual quantum teleportation protocol, once the classical channel is established in a secure way, a spy (Eve) will never be able to recover the information of the unknown quantum state, even if she is aware of Alice's measurement results. Security, advantages, and limitations of our protocol are discussed and compared with the standard quantum teleportation protocol.

  10. Conducting Clinically Based Intimate Partner Violence Research: Safety Protocol Recommendations.

    PubMed

    Anderson, Jocelyn C; Glass, Nancy E; Campbell, Jacquelyn C

    Maintaining safety is of utmost importance during research involving participants who have experienced intimate partner violence (IPV). Limited guidance on safety protocols to protect participants is available, particularly information related to technology-based approaches to informed consent, data collection, and contacting participants during the course of a study. The purpose of the article is to provide details on the safety protocol developed and utilized with women receiving care at an urban HIV clinic and who were taking part in an observational study of IPV, mental health symptoms, and substance abuse and their relationship to HIV treatment adherence. The protocol presents the technological strategies to promote safety and allow autonomy in participant decision-making throughout the research process, including Voice over Internet Protocol telephone numbers, and tablet-based eligibility screening and data collection. Protocols for management of participants at risk for suicide and/or intimate partner homicide that included automated high-risk messaging to participants and research staff and facilitated disclosure of risk to clinical staff based on participant preferences are discussed. Use of technology and partnership with clinic staff helped to provide an environment where research regarding IPV could be conducted without undue burden or risk to participants. Utilizing tablet-based survey administration provided multiple practical and safety benefits for participants. Most women who screened into high-risk categories for suicide or intimate partner homicide did not choose to have their results shared with their healthcare providers, indicating the importance of allowing participants control over information sharing whenever possible.

  11. iLAP: a workflow-driven software for experimental protocol development, data acquisition and analysis

    PubMed Central

    2009-01-01

    Background In recent years, the genome biology community has expended considerable effort to confront the challenges of managing heterogeneous data in a structured and organized way and developed laboratory information management systems (LIMS) for both raw and processed data. On the other hand, electronic notebooks were developed to record and manage scientific data, and facilitate data-sharing. Software which enables both, management of large datasets and digital recording of laboratory procedures would serve a real need in laboratories using medium and high-throughput techniques. Results We have developed iLAP (Laboratory data management, Analysis, and Protocol development), a workflow-driven information management system specifically designed to create and manage experimental protocols, and to analyze and share laboratory data. The system combines experimental protocol development, wizard-based data acquisition, and high-throughput data analysis into a single, integrated system. We demonstrate the power and the flexibility of the platform using a microscopy case study based on a combinatorial multiple fluorescence in situ hybridization (m-FISH) protocol and 3D-image reconstruction. iLAP is freely available under the open source license AGPL from http://genome.tugraz.at/iLAP/. Conclusion iLAP is a flexible and versatile information management system, which has the potential to close the gap between electronic notebooks and LIMS and can therefore be of great value for a broad scientific community. PMID:19941647

  12. Running a network on a shoestring: the Global Invasive Species Information Network

    USGS Publications Warehouse

    Jarnevich, Catherine S.; Simpson, Annie; Graham, James J; Newman, Gregory J.; Bargeron, Chuck T.

    2015-01-01

    The Global Invasive Species Information Network (GISIN) was conceptualized in 2004 to aggregate and disseminate invasive species data in a standardized way. A decade later the GISIN community has implemented a data portal and three of six GISIN data aggregation models in the GISIN data exchange Protocol, including invasive species status information, resource URLs, and occurrence data. The portal is based on a protocol developed by representatives from 15 countries and 27 organizations of the global invasive species information management community. The GISIN has 19 data providers sharing 34,343 species status records, 1,693,073 occurrences, and 15,601 resource URLs. While the GISIN's goal is to be global, much of its data and funding are provided by the United States. Several initiatives use the GISIN as their information backbone, such as the Great Lakes Early Detection Network (GLEDN) and the North American Invasive Species Network (NAISN). Here we share several success stories and organizational challenges that remain.

  13. Authenticated multi-user quantum key distribution with single particles

    NASA Astrophysics Data System (ADS)

    Lin, Song; Wang, Hui; Guo, Gong-De; Ye, Guo-Hua; Du, Hong-Zhen; Liu, Xiao-Fen

    2016-03-01

    Quantum key distribution (QKD) has been growing rapidly in recent years and becomes one of the hottest issues in quantum information science. During the implementation of QKD on a network, identity authentication has been one main problem. In this paper, an efficient authenticated multi-user quantum key distribution (MQKD) protocol with single particles is proposed. In this protocol, any two users on a quantum network can perform mutual authentication and share a secure session key with the assistance of a semi-honest center. Meanwhile, the particles, which are used as quantum information carriers, are not required to be stored, therefore the proposed protocol is feasible with current technology. Finally, security analysis shows that this protocol is secure in theory.

  14. A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System.

    PubMed

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi

    2015-08-01

    Radio Frequency Identification (RFID) based solutions are widely used for providing many healthcare applications include patient monitoring, object traceability, drug administration system and telecare medicine information system (TMIS) etc. In order to reduce malpractices and ensure patient privacy, in 2015, Srivastava et al. proposed a hash based RFID tag authentication protocol in TMIS. Their protocol uses lightweight hash operation and synchronized secret value shared between back-end server and tag, which is more secure and efficient than other related RFID authentication protocols. Unfortunately, in this paper, we demonstrate that Srivastava et al.'s tag authentication protocol has a serious security problem in that an adversary may use the stolen/lost reader to connect to the medical back-end server that store information associated with tagged objects and this privacy damage causing the adversary could reveal medical data obtained from stolen/lost readers in a malicious way. Therefore, we propose a secure and efficient RFID tag authentication protocol to overcome security flaws and improve the system efficiency. Compared with Srivastava et al.'s protocol, the proposed protocol not only inherits the advantages of Srivastava et al.'s authentication protocol for TMIS but also provides better security with high system efficiency.

  15. Safety of Rural Nursing Home-to-Emergency Department Transfers: Improving Communication and Patient Information Sharing Across Settings.

    PubMed

    Tupper, Judith B; Gray, Carolyn E; Pearson, Karen B; Coburn, Andrew F

    2015-01-01

    The "siloed" approach to healthcare delivery contributes to communication challenges and to potential patient harm when patients transfer between settings. This article reports on the evaluation of a demonstration in 10 rural communities to improve the safety of nursing facility (NF) transfers to hospital emergency departments by forming interprofessional teams of hospital, emergency medical service, and NF staff to develop and implement tools and protocols for standardizing critical interfacility communication pathways and information sharing. We worked with each of the 10 teams to document current communication processes and information sharing tools and to design, implement, and evaluate strategies/tools to increase effective communication and sharing of patient information across settings. A mixed methods approach was used to evaluate changes from baseline in documentation of patient information shared across settings during the transfer process. Study findings showed significant improvement in key areas across the three settings, including infection status and baseline mental functioning. Improvement strategies and performance varied across settings; however, accurate and consistent information sharing of advance directives and medication lists remains a challenge. Study results demonstrate that with neutral facilitation and technical support, collaborative interfacility teams can assess and effectively address communication and information sharing problems that threaten patient safety.

  16. Eavesdropping on the improved three-party quantum secret sharing protocol

    NASA Astrophysics Data System (ADS)

    Gao, Gan

    2011-02-01

    Lin et al. [Song Lin, Fei Gao, Qiao-yan Wen, Fu-chen Zhu, Opt. Commun. 281 (2008) 4553] pointed out that the multiparty quantum secret sharing protocol [Zhan-jun Zhang, Gan Gao, Xin Wang, Lian-fang Han, Shou-hua Shi, Opt. Commun. 269 (2007) 418] is not secure and proposed an improved three-party quantum secret sharing protocol. In this paper, we study the security of the improved three-party quantum secret sharing protocol and find that it is still not secure. Finally, a further improved three-party quantum secret sharing protocol is proposed.

  17. Experimental demonstration of graph-state quantum secret sharing.

    PubMed

    Bell, B A; Markham, D; Herrera-Martí, D A; Marin, A; Wadsworth, W J; Rarity, J G; Tame, M S

    2014-11-21

    Quantum communication and computing offer many new opportunities for information processing in a connected world. Networks using quantum resources with tailor-made entanglement structures have been proposed for a variety of tasks, including distributing, sharing and processing information. Recently, a class of states known as graph states has emerged, providing versatile quantum resources for such networking tasks. Here we report an experimental demonstration of graph state-based quantum secret sharing--an important primitive for a quantum network with applications ranging from secure money transfer to multiparty quantum computation. We use an all-optical setup, encoding quantum information into photons representing a five-qubit graph state. We find that one can reliably encode, distribute and share quantum information amongst four parties, with various access structures based on the complex connectivity of the graph. Our results show that graph states are a promising approach for realising sophisticated multi-layered communication protocols in quantum networks.

  18. On Alarm Protocol in Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Cichoń, Jacek; Kapelko, Rafał; Lemiesz, Jakub; Zawada, Marcin

    We consider the problem of efficient alarm protocol for ad-hoc radio networks consisting of devices that try to gain access for transmission through a shared radio communication channel. The problem arise in tasks that sensors have to quickly inform the target user about an alert situation such as presence of fire, dangerous radiation, seismic vibrations, and more. In this paper, we present a protocol which uses O(logn) time slots and show that Ω(logn/loglogn) is a lower bound for used time slots.

  19. Secret Key Generation via a Modified Quantum Secret Sharing Protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Smith IV, Amos M; Evans, Philip G; Lawrie, Benjamin J

    We present and experimentally show a novel protocol for distributing secret information between two and only two parties in a N-party single-qubit Quantum Secret Sharing (QSS) system. We demonstrate this new algorithm with N = 3 active parties over 6km of telecom. ber. Our experimental device is based on the Clavis2 Quantum Key Distribution (QKD) system built by ID Quantique but is generalizable to any implementation. We show that any two out of the N parties can build secret keys based on partial information from each other and with collaboration from the remaining N > 2 parties. This algorithm allowsmore » for the creation of two-party secret keys were standard QSS does not and signicantly reduces the number of resources needed to implement QKD on a highly connected network such as the electrical grid.« less

  20. The effectiveness and cost-effectiveness of shared care: protocol for a realist review.

    PubMed

    Hardwick, Rebecca; Pearson, Mark; Byng, Richard; Anderson, Rob

    2013-02-12

    Shared care (an enhanced information exchange over and above routine outpatient letters) is commonly used to improve care coordination and communication between a specialist and primary care services for people with long-term conditions. Evidence of the effectiveness and cost-effectiveness of shared care is mixed. Informed decision-making for targeting shared care requires a greater understanding of how it works, for whom it works, in what contexts and why. This protocol outlines how realist review methods can be used to synthesise evidence on shared care for long-term conditions.A further aim of the review is to explore economic evaluations of shared care. Economic evaluations are difficult to synthesise due to problems in accounting for contextual differences that impact on resource use and opportunity costs. Realist review methods have been suggested as a way to overcome some of these issues, so this review will also assess whether realist review methods are amenable to synthesising economic evidence. Database and web searching will be carried out in order to find relevant evidence to develop and test programme theories about how shared care works. The review will have two phases. Phase 1 will concentrate on the contextual conditions and mechanisms that influence how shared care works, in order to develop programme theories, which partially explain how it works. Phase 2 will focus on testing these programme theories. A Project Reference Group made up of health service professionals and people with actual experience of long-term conditions will be used to ground the study in real-life experience. Review findings will be disseminated through local and sub-national networks for integrated care and long-term conditions. This realist review will explore why and for whom shared care works, in order to support decision-makers working to improve the effectiveness of care for people outside hospital. The development of realist review methods to take into account cost and cost-effectiveness evidence is particularly innovative and challenging, and if successful will offer a new approach to synthesising economic evidence. This systematic review protocol is registered on the PROSPERO database (registration number: CRD42012002842).

  1. Melanins and melanogenesis: methods, standards, protocols.

    PubMed

    d'Ischia, Marco; Wakamatsu, Kazumasa; Napolitano, Alessandra; Briganti, Stefania; Garcia-Borron, José-Carlos; Kovacs, Daniela; Meredith, Paul; Pezzella, Alessandro; Picardo, Mauro; Sarna, Tadeusz; Simon, John D; Ito, Shosuke

    2013-09-01

    Despite considerable advances in the past decade, melanin research still suffers from the lack of universally accepted and shared nomenclature, methodologies, and structural models. This paper stems from the joint efforts of chemists, biochemists, physicists, biologists, and physicians with recognized and consolidated expertise in the field of melanins and melanogenesis, who critically reviewed and experimentally revisited methods, standards, and protocols to provide for the first time a consensus set of recommended procedures to be adopted and shared by researchers involved in pigment cell research. The aim of the paper was to define an unprecedented frame of reference built on cutting-edge knowledge and state-of-the-art methodology, to enable reliable comparison of results among laboratories and new progress in the field based on standardized methods and shared information. © 2013 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  2. Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing

    NASA Astrophysics Data System (ADS)

    Yu, Kun-Fei; Gu, Jun; Hwang, Tzonelih; Gope, Prosanta

    2017-08-01

    This paper proposes a multi-party semi-quantum secret sharing (MSQSS) protocol which allows a quantum party (manager) to share a secret among several classical parties (agents) based on GHZ-like states. By utilizing the special properties of GHZ-like states, the proposed scheme can easily detect outside eavesdropping attacks and has the highest qubit efficiency among the existing MSQSS protocols. Then, we illustrate an efficient way to convert the proposed MSQSS protocol into a multi-party semi-quantum key distribution (MSQKD) protocol. The proposed approach is even useful to convert all the existing measure-resend type of semi-quantum secret sharing protocols into semi-quantum key distribution protocols.

  3. Unification of quantum information theory

    NASA Astrophysics Data System (ADS)

    Abeyesinghe, Anura

    We present the unification of many previously disparate results in noisy quantum Shannon theory and the unification of all of noiseless quantum Shannon theory. More specifically we deal here with bipartite, unidirectional, and memoryless quantum Shannon theory. We find all the optimal protocols and quantify the relationship between the resources used, both for the one-shot and for the ensemble case, for what is arguably the most fundamental task in quantum information theory: sharing entangled states between a sender and a receiver. We find that all of these protocols are derived from our one-shot superdense coding protocol and relate nicely to each other. We then move on to noisy quantum information theory and give a simple, direct proof of the "mother" protocol, or rather her generalization to the Fully Quantum Slepian-Wolf protocol (FQSW). FQSW simultaneously accomplishes two goals: quantum communication-assisted entanglement distillation, and state transfer from the sender to the receiver. As a result, in addition to her other "children," the mother protocol generates the state merging primitive of Horodecki, Oppenheim, and Winter as well as a new class of distributed compression protocols for correlated quantum sources, which are optimal for sources described by separable density operators. Moreover, the mother protocol described here is easily transformed into the so-called "father" protocol, demonstrating that the division of single-sender/single-receiver protocols into two families was unnecessary: all protocols in the family are children of the mother.

  4. Trustworthy information sharing for biosecurity incident management - The AU2EU project

    NASA Astrophysics Data System (ADS)

    Zic, John

    2013-10-01

    Managing sensitive information between partners collaborating to address an exotic disease outbreak is crucial in preserving the medical, economic and social well-being of the affected population (whether it is human, animal or plant). Further, the ability to respond quickly to the outbreak by providing real-time, interactive access to shared (collaborative) information will minimise the impact of an outbreak. The sharing of information must be done carefully, with agreement between the partners and enforced by specific protocols. This paper presents an overview of a new joint project between EU partners and AU partners, total value of around €8.64 million, which is examining the issue of authentication and authorisation required to ensure that collaborative information in such situations is kept within the control of the collaborating partners and that accidental (or deliberate) release to unauthorised partners can be mitigated.

  5. Network support for turn-taking in multimedia collaboration

    NASA Astrophysics Data System (ADS)

    Dommel, Hans-Peter; Garcia-Luna-Aceves, Jose J.

    1997-01-01

    The effectiveness of collaborative multimedia systems depends on the regulation of access to their shared resources, such as continuous media or instruments used concurrently by multiple parties. Existing applications use only simple protocols to mediate such resource contention. Their cooperative rules follow a strict agenda and are largely application-specific. The inherent problem of floor control lacks a systematic methodology. This paper presents a general model on floor control for correct, scalable, fine-grained and fair resource sharing that integrates user interaction with network conditions, and adaptation to various media types. The motion of turn-taking known from psycholinguistics in studies on discourse structure is adapted for this framework. Viewed as a computational analogy to speech communication, online collaboration revolves around dynamically allocated access permissions called floors. The control semantics of floors derives from concurrently control methodology. An explicit specification and verification of a novel distributed Floor Control Protocol are presented. Hosts assume sharing roles that allow for efficient dissemination of control information, agreeing on a floor holder which is granted mutually exclusive access to a resource. Performance analytic aspects of floor control protocols are also briefly discussed.

  6. Multimedia-Based Integration of Cross-Layer Techniques

    DTIC Science & Technology

    2014-06-01

    wireless networks play a critical role in net-centric warfare, including the sharing of the time-sensitive battlefield information among military nodes for...layer protocols are key enablers in effectively deploying the military wireless network. This report discusses the design of cross-layer protocols...2 1.0 INTRODUCTION 1.1 Motivation The Air Force (AF) Wireless Networks (also denoted as military networks in this report) must be capable of

  7. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lee, Juhui; School of Computatioal Sciences, Korea Institute for Advanced Study, Seoul 130-722; Lee, Soojoon

    Extending the eavesdropping strategy devised by Zhang, Li, and Guo [Zhang, Li, and Guo, Phys. Rev. A 63, 036301 (2001)], we show that the multiparty quantum communication protocol based on entanglement swapping, which was proposed by Cabello (e-print quant-ph/0009025), is not secure. We modify the protocol so that entanglement swapping can secure multiparty quantum communication, such as multiparty quantum key distribution and quantum secret sharing of classical information, and show that the modified protocol is secure against the Zhang-Li-Guo strategy for eavesdropping as well as the basic intercept-resend attack.0.

  8. Cryptanalysis and Improvement of the Semi-quantum Secret Sharing Protocol

    NASA Astrophysics Data System (ADS)

    Gao, Xiang; Zhang, Shibin; Chang, Yan

    2017-08-01

    Recently, Xie et al. Int. J. Theor. Phys. 54, 3819-3824, (2015) proposed a Semi-quantum secret sharing protocol (SQSS). Yin et al. Int. J. Theor. Phys. 55: 4027-4035, (2016) pointed out that this protocol suffers from the intercept-resend attack. Yin et al. also proposed an improved protocol. However, we find out that Yin et al.'s paper has some problems, we analyze Yin et al.'s paper, then proposed the improved semi-quantum secret sharing protocol. Our protocol is more secure and efficient, most importantly, our protocol satisfies the condition of semi-quantum.

  9. Information trade-offs for optical quantum communication.

    PubMed

    Wilde, Mark M; Hayden, Patrick; Guha, Saikat

    2012-04-06

    Recent work has precisely characterized the achievable trade-offs between three key information processing tasks-classical communication (generation or consumption), quantum communication (generation or consumption), and shared entanglement (distribution or consumption), measured in bits, qubits, and ebits per channel use, respectively. Slices and corner points of this three-dimensional region reduce to well-known protocols for quantum channels. A trade-off coding technique can attain any point in the region and can outperform time sharing between the best-known protocols for accomplishing each information processing task by itself. Previously, the benefits of trade-off coding that had been found were too small to be of practical value (viz., for the dephasing and the universal cloning machine channels). In this Letter, we demonstrate that the associated performance gains are in fact remarkably high for several physically relevant bosonic channels that model free-space or fiber-optic links, thermal-noise channels, and amplifiers. We show that significant performance gains from trade-off coding also apply when trading photon-number resources between transmitting public and private classical information simultaneously over secret-key-assisted bosonic channels. © 2012 American Physical Society

  10. Simple group password-based authenticated key agreements for the integrated EPR information system.

    PubMed

    Lee, Tian-Fu; Chang, I-Pin; Wang, Ching-Cheng

    2013-04-01

    The security and privacy are important issues for electronic patient records (EPRs). The goal of EPRs is sharing the patients' medical histories such as the diagnosis records, reports and diagnosis image files among hospitals by the Internet. So the security issue for the integrated EPR information system is essential. That is, to ensure the information during transmission through by the Internet is secure and private. The group password-based authenticated key agreement (GPAKE) allows a group of users like doctors, nurses and patients to establish a common session key by using password authentication. Then the group of users can securely communicate by using this session key. Many approaches about GAPKE employ the public key infrastructure (PKI) in order to have higher security. However, it not only increases users' overheads and requires keeping an extra equipment for storing long-term secret keys, but also requires maintaining the public key system. This investigation presents a simple group password-based authenticated key agreement (SGPAKE) protocol for the integrated EPR information system. The proposed SGPAKE protocol does not require using the server or users' public keys. Each user only remembers his weak password shared with a trusted server, and then can obtain a common session key. Then all users can securely communicate by using this session key. The proposed SGPAKE protocol not only provides users with convince, but also has higher security.

  11. GLobal Integrated Design Environment (GLIDE): A Concurrent Engineering Application

    NASA Technical Reports Server (NTRS)

    McGuire, Melissa L.; Kunkel, Matthew R.; Smith, David A.

    2010-01-01

    The GLobal Integrated Design Environment (GLIDE) is a client-server software application purpose-built to mitigate issues associated with real time data sharing in concurrent engineering environments and to facilitate discipline-to-discipline interaction between multiple engineers and researchers. GLIDE is implemented in multiple programming languages utilizing standardized web protocols to enable secure parameter data sharing between engineers and researchers across the Internet in closed and/or widely distributed working environments. A well defined, HyperText Transfer Protocol (HTTP) based Application Programming Interface (API) to the GLIDE client/server environment enables users to interact with GLIDE, and each other, within common and familiar tools. One such common tool, Microsoft Excel (Microsoft Corporation), paired with its add-in API for GLIDE, is discussed in this paper. The top-level examples given demonstrate how this interface improves the efficiency of the design process of a concurrent engineering study while reducing potential errors associated with manually sharing information between study participants.

  12. Deterministic entanglement distillation for secure double-server blind quantum computation.

    PubMed

    Sheng, Yu-Bo; Zhou, Lan

    2015-01-15

    Blind quantum computation (BQC) provides an efficient method for the client who does not have enough sophisticated technology and knowledge to perform universal quantum computation. The single-server BQC protocol requires the client to have some minimum quantum ability, while the double-server BQC protocol makes the client's device completely classical, resorting to the pure and clean Bell state shared by two servers. Here, we provide a deterministic entanglement distillation protocol in a practical noisy environment for the double-server BQC protocol. This protocol can get the pure maximally entangled Bell state. The success probability can reach 100% in principle. The distilled maximally entangled states can be remaind to perform the BQC protocol subsequently. The parties who perform the distillation protocol do not need to exchange the classical information and they learn nothing from the client. It makes this protocol unconditionally secure and suitable for the future BQC protocol.

  13. Deterministic entanglement distillation for secure double-server blind quantum computation

    PubMed Central

    Sheng, Yu-Bo; Zhou, Lan

    2015-01-01

    Blind quantum computation (BQC) provides an efficient method for the client who does not have enough sophisticated technology and knowledge to perform universal quantum computation. The single-server BQC protocol requires the client to have some minimum quantum ability, while the double-server BQC protocol makes the client's device completely classical, resorting to the pure and clean Bell state shared by two servers. Here, we provide a deterministic entanglement distillation protocol in a practical noisy environment for the double-server BQC protocol. This protocol can get the pure maximally entangled Bell state. The success probability can reach 100% in principle. The distilled maximally entangled states can be remaind to perform the BQC protocol subsequently. The parties who perform the distillation protocol do not need to exchange the classical information and they learn nothing from the client. It makes this protocol unconditionally secure and suitable for the future BQC protocol. PMID:25588565

  14. XDS-I Gateway Development for HIE Connectivity with Legacy PACS at Gil Hospital.

    PubMed

    Simalango, Mikael Fernandus; Kim, Youngchul; Seo, Young Tae; Choi, Young Hwan; Cho, Yong Kyun

    2013-12-01

    The ability to support healthcare document sharing is imperative in a health information exchange (HIE). Sharing imaging documents or images, however, can be challenging, especially when they are stored in a picture archiving and communication system (PACS) archive that does not support document sharing via standard HIE protocols. This research proposes a standard-compliant imaging gateway that enables connectivity between a legacy PACS and the entire HIE. Investigation of the PACS solutions used at Gil Hospital was conducted. An imaging gateway application was then developed using a Java technology stack. Imaging document sharing capability enabled by the gateway was tested by integrating it into Gil Hospital's order communication system and its HIE infrastructure. The gateway can acquire radiology images from a PACS storage system, provide and register the images to Gil Hospital's HIE for document sharing purposes, and make the images retrievable by a cross-enterprise document sharing document viewer. Development of an imaging gateway that mediates communication between a PACS and an HIE can be considered a viable option when the PACS does not support the standard protocol for cross-enterprise document sharing for imaging. Furthermore, the availability of common HIE standards expedites the development and integration of the imaging gateway with an HIE.

  15. XDS-I Gateway Development for HIE Connectivity with Legacy PACS at Gil Hospital

    PubMed Central

    Simalango, Mikael Fernandus; Kim, Youngchul; Seo, Young Tae; Cho, Yong Kyun

    2013-01-01

    Objectives The ability to support healthcare document sharing is imperative in a health information exchange (HIE). Sharing imaging documents or images, however, can be challenging, especially when they are stored in a picture archiving and communication system (PACS) archive that does not support document sharing via standard HIE protocols. This research proposes a standard-compliant imaging gateway that enables connectivity between a legacy PACS and the entire HIE. Methods Investigation of the PACS solutions used at Gil Hospital was conducted. An imaging gateway application was then developed using a Java technology stack. Imaging document sharing capability enabled by the gateway was tested by integrating it into Gil Hospital's order communication system and its HIE infrastructure. Results The gateway can acquire radiology images from a PACS storage system, provide and register the images to Gil Hospital's HIE for document sharing purposes, and make the images retrievable by a cross-enterprise document sharing document viewer. Conclusions Development of an imaging gateway that mediates communication between a PACS and an HIE can be considered a viable option when the PACS does not support the standard protocol for cross-enterprise document sharing for imaging. Furthermore, the availability of common HIE standards expedites the development and integration of the imaging gateway with an HIE. PMID:24523994

  16. Entanglement-secured single-qubit quantum secret sharing

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Scherpelz, P.; Resch, R.; Berryrieser, D.

    In single-qubit quantum secret sharing, a secret is shared between N parties via manipulation and measurement of one qubit at a time. Each qubit is sent to all N parties in sequence; the secret is encoded in the first participant's preparation of the qubit state and the subsequent participants' choices of state rotation or measurement basis. We present a protocol for single-qubit quantum secret sharing using polarization entanglement of photon pairs produced in type-I spontaneous parametric downconversion. We investigate the protocol's security against eavesdropping attack under common experimental conditions: a lossy channel for photon transmission, and imperfect preparation of themore » initial qubit state. A protocol which exploits entanglement between photons, rather than simply polarization correlation, is more robustly secure. We implement the entanglement-based secret-sharing protocol with 87% secret-sharing fidelity, limited by the purity of the entangled state produced by our present apparatus. We demonstrate a photon-number splitting eavesdropping attack, which achieves no success against the entanglement-based protocol while showing the predicted rate of success against a correlation-based protocol.« less

  17. Informed shared decision-making supported by decision coaches for women with ductal carcinoma in situ: study protocol for a cluster randomized controlled trial.

    PubMed

    Berger-Höger, Birte; Liethmann, Katrin; Mühlhauser, Ingrid; Haastert, Burkhard; Steckelberg, Anke

    2015-10-12

    Women with breast cancer want to participate in treatment decision-making. Guidelines have confirmed the right of informed shared decision-making. However, previous research has shown that the implementation of informed shared decision-making is suboptimal for reasons of limited resources of physicians, power imbalances between patients and physicians and missing evidence-based patient information. We developed an informed shared decision-making program for women with primary ductal carcinoma in situ (DCIS). The program provides decision coaching for women by specialized nurses and aims at supporting involvement in decision-making and informed choices. In this trial, the informed shared decision-making program will be evaluated in breast care centers. A cluster randomized controlled trial will be conducted to compare the informed shared decision-making program with standard care. The program comprises an evidence-based patient decision aid and training of physicians (2 hours) and specialized breast care and oncology nurses (4 days) in informed shared decision-making. Sixteen certified breast care centers will be included, with 192 women with primary DCIS being recruited. Primary outcome is the extent of patients' involvement in shared decision-making as assessed by the MAPPIN-Odyad (Multifocal approach to the 'sharing' in shared decision-making: observer instrument dyad). Secondary endpoints include the sub-measures of the MAPPIN-inventory (MAPPIN-Onurse, MAPPIN-Ophysician, MAPPIN-Opatient, MAPPIN-Qnurse, MAPPIN-Qpatient and MAPPIN-Qphysician), informed choice, decisional conflict and the duration of encounters. It is expected that decision coaching and the provision of evidence-based patient decision aids will increase patients' involvement in decision-making with informed choices and reduce decisional conflicts and duration of physician encounters. Furthermore, an accompanying process evaluation will be conducted. To our knowledge, this is the first study investigating the implementation of decision coaches in German breast care centers. Current Controlled Trials ISRCTN46305518 , date of registration: 5 June 2015.

  18. The Development of the Older Persons and Informal Caregivers Survey Minimum DataSet (TOPICS-MDS): A Large-Scale Data Sharing Initiative

    PubMed Central

    Lutomski, Jennifer E.; Baars, Maria A. E.; Schalk, Bianca W. M.; Boter, Han; Buurman, Bianca M.; den Elzen, Wendy P. J.; Jansen, Aaltje P. D.; Kempen, Gertrudis I. J. M.; Steunenberg, Bas; Steyerberg, Ewout W.; Olde Rikkert, Marcel G. M.; Melis, René J. F.

    2013-01-01

    Introduction In 2008, the Ministry of Health, Welfare and Sport commissioned the National Care for the Elderly Programme. While numerous research projects in older persons’ health care were to be conducted under this national agenda, the Programme further advocated the development of The Older Persons and Informal Caregivers Survey Minimum DataSet (TOPICS-MDS) which would be integrated into all funded research protocols. In this context, we describe TOPICS data sharing initiative (www.topics-mds.eu). Materials and Methods A working group drafted TOPICS-MDS prototype, which was subsequently approved by a multidisciplinary panel. Using instruments validated for older populations, information was collected on demographics, morbidity, quality of life, functional limitations, mental health, social functioning and health service utilisation. For informal caregivers, information was collected on demographics, hours of informal care and quality of life (including subjective care-related burden). Results Between 2010 and 2013, a total of 41 research projects contributed data to TOPICS-MDS, resulting in preliminary data available for 32,310 older persons and 3,940 informal caregivers. The majority of studies sampled were from primary care settings and inclusion criteria differed across studies. Discussion TOPICS-MDS is a public data repository which contains essential data to better understand health challenges experienced by older persons and informal caregivers. Such findings are relevant for countries where increasing health-related expenditure has necessitated the evaluation of contemporary health care delivery. Although open sharing of data can be difficult to achieve in practice, proactively addressing issues of data protection, conflicting data analysis requests and funding limitations during TOPICS-MDS developmental phase has fostered a data sharing culture. To date, TOPICS-MDS has been successfully incorporated into 41 research projects, thus supporting the feasibility of constructing a large (>30,000 observations), standardised dataset pooled from various study protocols with different sampling frameworks. This unique implementation strategy improves efficiency and facilitates individual-level data meta-analysis. PMID:24324716

  19. Semantic Technologies and Bio-Ontologies.

    PubMed

    Gutierrez, Fernando

    2017-01-01

    As information available through data repositories constantly grows, the need for automated mechanisms for linking, querying, and sharing data has become a relevant factor both in research and industry. This situation is more evident in research fields such as the life sciences, where new experiments by different research groups are constantly generating new information regarding a wide variety of related study objects. However, current methods for representing information and knowledge are not suited for machine processing. The Semantic Technologies are a set of standards and protocols that intend to provide methods for representing and handling data that encourages reusability of information and is machine-readable. In this chapter, we will provide a brief introduction to Semantic Technologies, and how these protocols and standards have been incorporated into the life sciences to facilitate dissemination and access to information.

  20. Server-Controlled Identity-Based Authenticated Key Exchange

    NASA Astrophysics Data System (ADS)

    Guo, Hua; Mu, Yi; Zhang, Xiyong; Li, Zhoujun

    We present a threshold identity-based authenticated key exchange protocol that can be applied to an authenticated server-controlled gateway-user key exchange. The objective is to allow a user and a gateway to establish a shared session key with the permission of the back-end servers, while the back-end servers cannot obtain any information about the established session key. Our protocol has potential applications in strong access control of confidential resources. In particular, our protocol possesses the semantic security and demonstrates several highly-desirable security properties such as key privacy and transparency. We prove the security of the protocol based on the Bilinear Diffie-Hellman assumption in the random oracle model.

  1. MedBlock: Efficient and Secure Medical Data Sharing Via Blockchain.

    PubMed

    Fan, Kai; Wang, Shangyang; Ren, Yanhui; Li, Hui; Yang, Yintang

    2018-06-21

    With the development of electronic information technology, electronic medical records (EMRs) have been a common way to store the patients' data in hospitals. They are stored in different hospitals' databases, even for the same patient. Therefore, it is difficult to construct a summarized EMR for one patient from multiple hospital databases due to the security and privacy concerns. Meanwhile, current EMRs systems lack a standard data management and sharing policy, making it difficult for pharmaceutical scientists to develop precise medicines based on data obtained under different policies. To solve the above problems, we proposed a blockchain-based information management system, MedBlock, to handle patients' information. In this scheme, the distributed ledger of MedBlock allows the efficient EMRs access and EMRs retrieval. The improved consensus mechanism achieves consensus of EMRs without large energy consumption and network congestion. In addition, MedBlock also exhibits high information security combining the customized access control protocols and symmetric cryptography. MedBlock can play an important role in the sensitive medical information sharing.

  2. 75 FR 48734 - Self-Regulatory Organizations; EDGX Exchange, Inc.; Notice of Filing and Immediate Effectiveness...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-11

    ...) ISE FIX Session Fees The Exchange proposes to charge for legacy ISE \\4\\ Financial Information Exchange...-79). \\5\\ As stated in SR-ISE-2007-79, the ISE used the Financial Information Exchange (FIX) protocol... will provide Members a $0.0031 rebate per share for liquidity added on EDGX if the Member on a daily...

  3. An Efficient Multiparty Quantum Secret Sharing Protocol Based on Bell States in the High Dimension Hilbert Space

    NASA Astrophysics Data System (ADS)

    Gao, Gan; Wang, Li-Ping

    2010-11-01

    We propose a quantum secret sharing protocol, in which Bell states in the high dimension Hilbert space are employed. The biggest advantage of our protocol is the high source capacity. Compared with the previous secret sharing protocol, ours has the higher controlling efficiency. In addition, as decoy states in the high dimension Hilbert space are used, we needn’t destroy quantum entanglement for achieving the goal to check the channel security.

  4. Two new Controlled not Gate Based Quantum Secret Sharing Protocols without Entanglement Attenuation

    NASA Astrophysics Data System (ADS)

    Zhu, Zhen-Chao; Hu, Ai-Qun; Fu, An-Min

    2016-05-01

    In this paper, we propose two new controlled not gate based quantum secret sharing protocols. In these two protocols, each photon only travels once, which guarantees the agents located in long distance can be able to derive the dealer's secret without suffering entanglement attenuation problem. The protocols are secure against trojan horse attack, intercept-resend attack, entangle-measure attack and entanglement-swapping attack. The theoretical efficiency for qubits of these two protocols can approach 100 %, except those used for eavesdropping checking, all entangled states can be used for final secret sharing.

  5. Quantum teleportation and information splitting via four-qubit cluster state and a Bell state

    NASA Astrophysics Data System (ADS)

    Ramírez, Marlon David González; Falaye, Babatunde James; Sun, Guo-Hua; Cruz-Irisson, M.; Dong, Shi-Hai

    2017-10-01

    Quantum teleportation provides a "bodiless" way of transmitting the quantum state from one object to another, at a distant location, using a classical communication channel and a previously shared entangled state. In this paper, we present a tripartite scheme for probabilistic teleportation of an arbitrary single qubit state, without losing the information of the state being teleported, via a fourqubit cluster state of the form | ϕ>1234 = α|0000>+ β|1010>+ γ|0101>- η|1111>, as the quantum channel, where the nonzero real numbers α, β, γ, and η satisfy the relation j αj2 + | β|2 + | γ|2 + | η|2 = 1. With the introduction of an auxiliary qubit with state |0>, using a suitable unitary transformation and a positive-operator valued measure (POVM), the receiver can recreate the state of the original qubit. An important advantage of the teleportation scheme demonstrated here is that, if the teleportation fails, it can be repeated without teleporting copies of the unknown quantum state, if the concerned parties share another pair of entangled qubit. We also present a protocol for quantum information splitting of an arbitrary two-particle system via the aforementioned cluster state and a Bell-state as the quantum channel. Problems related to security attacks were examined for both the cases and it was found that this protocol is secure. This protocol is highly efficient and easy to implement.

  6. A kind of universal quantum secret sharing protocol

    NASA Astrophysics Data System (ADS)

    Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian

    2017-01-01

    Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix.

  7. A kind of universal quantum secret sharing protocol.

    PubMed

    Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian

    2017-01-12

    Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix.

  8. A kind of universal quantum secret sharing protocol

    PubMed Central

    Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian

    2017-01-01

    Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix. PMID:28079109

  9. A LAN Primer.

    ERIC Educational Resources Information Center

    Hazari, Sunil I.

    1991-01-01

    Local area networks (LANs) are systems of computers and peripherals connected together for the purposes of electronic mail and the convenience of sharing information and expensive resources. In planning the design of such a system, the components to consider are hardware, software, transmission media, topology, operating systems, and protocols.…

  10. Development of Communication Conventions in Instructional Electronic Chats.

    ERIC Educational Resources Information Center

    Collins, Mauri P.; Murphy, Karen L.

    1997-01-01

    This study used content analysis to identify the communication conventions and protocols that real-time, interactive electronic chat users developed in instructional settings. Most frequently used conventions included sharing information/techniques for conveying meaning and indicating interest in a topic, using keywords and names of individuals,…

  11. Facilitating Secure Sharing of Personal Health Data in the Cloud.

    PubMed

    Thilakanathan, Danan; Calvo, Rafael A; Chen, Shiping; Nepal, Surya; Glozier, Nick

    2016-05-27

    Internet-based applications are providing new ways of promoting health and reducing the cost of care. Although data can be kept encrypted in servers, the user does not have the ability to decide whom the data are shared with. Technically this is linked to the problem of who owns the data encryption keys required to decrypt the data. Currently, cloud service providers, rather than users, have full rights to the key. In practical terms this makes the users lose full control over their data. Trust and uptake of these applications can be increased by allowing patients to feel in control of their data, generally stored in cloud-based services. This paper addresses this security challenge by providing the user a way of controlling encryption keys independently of the cloud service provider. We provide a secure and usable system that enables a patient to share health information with doctors and specialists. We contribute a secure protocol for patients to share their data with doctors and others on the cloud while keeping complete ownership. We developed a simple, stereotypical health application and carried out security tests, performance tests, and usability tests with both students and doctors (N=15). We developed the health application as an app for Android mobile phones. We carried out the usability tests on potential participants and medical professionals. Of 20 participants, 14 (70%) either agreed or strongly agreed that they felt safer using our system. Using mixed methods, we show that participants agreed that privacy and security of health data are important and that our system addresses these issues. We presented a security protocol that enables patients to securely share their eHealth data with doctors and nurses and developed a secure and usable system that enables patients to share mental health information with doctors.

  12. Defense Simulation Internet: next generation information highway.

    PubMed

    Lilienthal, M G

    1995-06-01

    The Department of Defense has been engaged in the Defense Modeling and Simulation Initiative (DMSI) to provide advanced distributed simulation warfighters in geographically distributed localities. Lessons learned from the Defense Simulation Internet (DSI) concerning architecture, standards, protocols, interoperability, information sharing, and distributed data bases are equally applicable to telemedicine. Much of the vision and objectives of the DMSI are easily translated into the vision for world wide telemedicine.

  13. Measurement-device-independent semiquantum key distribution

    NASA Astrophysics Data System (ADS)

    He, Jinjun; Li, Qin; Wu, Chunhui; Chan, Wai Hong; Zhang, Shengyu

    Semiquantum key distribution (SQKD) allows two parties to share a common string when one of them is quantum and the other has rather limited quantum capability. Almost all existing SQKD protocols have been proved to be robust in theory, namely that if an eavesdropper tries to gain information, he will inevitably induce some detectable errors. However, ideal devices do not exist in reality and their imperfection may result in side-channel attacks, which can be used by an adversary to get some information on the secret key string. In this paper, we design a measurement-device-independent SQKD protocol for the first time, which can remove the threat of all detector side-channel attacks and show that it is also robust. In addition, we discuss the possible use of the proposed protocol in real-world applications and in QKD networks.

  14. A Study of Shared-Memory Mutual Exclusion Protocols Using CADP

    NASA Astrophysics Data System (ADS)

    Mateescu, Radu; Serwe, Wendelin

    Mutual exclusion protocols are an essential building block of concurrent systems: indeed, such a protocol is required whenever a shared resource has to be protected against concurrent non-atomic accesses. Hence, many variants of mutual exclusion protocols exist in the shared-memory setting, such as Peterson's or Dekker's well-known protocols. Although the functional correctness of these protocols has been studied extensively, relatively little attention has been paid to their non-functional aspects, such as their performance in the long run. In this paper, we report on experiments with the performance evaluation of mutual exclusion protocols using Interactive Markov Chains. Steady-state analysis provides an additional criterion for comparing protocols, which complements the verification of their functional properties. We also carefully re-examined the functional properties, whose accurate formulation as temporal logic formulas in the action-based setting turns out to be quite involved.

  15. Freeing data through The Polar Information Commons

    NASA Astrophysics Data System (ADS)

    de Bruin, Taco; Chen, Robert; Parsons, Mark; Carlson, David

    2010-05-01

    The polar regions are changing rapidly with dramatic global effect. Wise management of resources, improved decision support, and effective international cooperation on resource and geopolitical issues require deeper understanding and better prediction of these changes. Unfortunately, polar data and information remain scattered, scarce, and sporadic. Inspired by the Antarctic Treaty of 1959 that established the Antarctic as a global commons to be used only for peaceful purposes and scientific research, we assert that data and information about the polar regions are themselves "public goods" that should be shared ethically and with minimal constraint. We therefore envision the Polar Information Commons (PIC) as an open, virtual repository for vital scientific data and information that would provide a shared, community-based cyber-infrastructure fostering innovation, improving scientific efficiency, and encouraging participation in polar research, education, planning, and management. The PIC will build on the legacy of the International Polar Year (IPY), providing a long-term framework for access to and preservation of both existing and future data and information about the polar regions. Rapid change demands rapid data access. The PIC system will enable scientists to quickly expose their data to the world and share them through open protocols on the Internet. A PIC digital label will alert users and data centers to new polar data and ensure that usage rights are clear. The PIC will utilize the Science Commons Protocol for Implementing Open Access Data, which promotes open data access through the public domain coupled with community norms of practice to ensure use of data in a fair and equitable manner. A set of PIC norms is currently being developed in consultation with key polar data organizations and other stakeholders. We welcome inputs from the broad science community as we further develop and refine the PIC approach and move ahead with implementation.

  16. Freeing data through The Polar Information Commons

    NASA Astrophysics Data System (ADS)

    de Bruin, T.; Chen, R. S.; Parsons, M. A.; Carlson, D. J.

    2009-12-01

    The polar regions are changing rapidly with dramatic global effect. Wise management of resources, improved decision support, and effective international cooperation on resource and geopolitical issues require deeper understanding and better prediction of these changes. Unfortunately, polar data and information remain scattered, scarce, and sporadic. Inspired by the Antarctic Treaty of 1959 that established the Antarctic as a global commons to be used only for peaceful purposes and scientific research, we assert that data and information about the polar regions are themselves “public goods” that should be shared ethically and with minimal constraint. We therefore envision the Polar Information Commons (PIC) as an open, virtual repository for vital scientific data and information that would provide a shared, community-based cyber-infrastructure fostering innovation, improving scientific efficiency, and encouraging participation in polar research, education, planning, and management. The PIC will build on the legacy of the International Polar Year (IPY), providing a long-term framework for access to and preservation of both existing and future data and information about the polar regions. Rapid change demands rapid data access. The PIC system will enable scientists to quickly expose their data to the world and share them through open protocols on the Internet. A PIC digital label will alert users and data centers to new polar data and ensure that usage rights are clear. The PIC will utilize the Science Commons Protocol for Implementing Open Access Data, which promotes open data access through the public domain coupled with community norms of practice to ensure use of data in a fair and equitable manner. A set of PIC norms is currently being developed in consultation with key polar data organizations and other stakeholders. We welcome inputs from the broad science community as we further develop and refine the PIC approach and move ahead with implementation.

  17. Freeing data through The Polar Information Commons

    NASA Astrophysics Data System (ADS)

    de Bruin, T.; Chen, R. S.; Parsons, M. A.; Carlson, D. J.; Cass, K.; Finney, K.; Wilbanks, J.; Jochum, K.

    2010-12-01

    The polar regions are changing rapidly with dramatic global effect. Wise management of resources, improved decision support, and effective international cooperation on resource and geopolitical issues require deeper understanding and better prediction of these changes. Unfortunately, polar data and information remain scattered, scarce, and sporadic. Inspired by the Antarctic Treaty of 1959 that established the Antarctic as a global commons to be used only for peaceful purposes and scientific research, we assert that data and information about the polar regions are themselves “public goods” that should be shared ethically and with minimal constraint. ICSU’s Committee on Data (CODATA) therefore started the Polar Information Commons (PIC) as an open, virtual repository for vital scientific data and information. The PIC provides a shared, community-based cyber-infrastructure fostering innovation, improving scientific efficiency, and encouraging participation in polar research, education, planning, and management. The PIC builds on the legacy of the International Polar Year (IPY), providing a long-term framework for access to and preservation of both existing and future data and information about the polar regions. Rapid change demands rapid data access. The PIC system enables scientists to quickly expose their data to the world and share them through open protocols on the Internet. A PIC digital label will alert users and data centers to new polar data and ensure that usage rights are clear. The PIC utilizes the Science Commons Protocol for Implementing Open Access Data, which promotes open data access through the public domain coupled with community norms of practice to ensure use of data in a fair and equitable manner. A set of PIC norms has been developed in consultation with key polar data organizations and other stakeholders. We welcome inputs from the broad science community as we further develop and refine the PIC approach and move ahead with implementation.

  18. Sharing Service Resource Information for Application Integration in a Virtual Enterprise - Modeling the Communication Protocol for Exchanging Service Resource Information

    NASA Astrophysics Data System (ADS)

    Yamada, Hiroshi; Kawaguchi, Akira

    Grid computing and web service technologies enable us to use networked resources in a coordinated manner. An integrated service is made of individual services running on coordinated resources. In order to achieve such coordinated services autonomously, the initiator of a coordinated service needs to know detailed service resource information. This information ranges from static attributes like the IP address of the application server to highly dynamic ones like the CPU load. The most famous wide-area service discovery mechanism based on names is DNS. Its hierarchical tree organization and caching methods take advantage of the static information managed. However, in order to integrate business applications in a virtual enterprise, we need a discovery mechanism to search for the optimal resources based on the given a set of criteria (search keys). In this paper, we propose a communication protocol for exchanging service resource information among wide-area systems. We introduce the concept of the service domain that consists of service providers managed under the same management policy. This concept of the service domain is similar to that for autonomous systems (ASs). In each service domain, the service information provider manages the service resource information of service providers that exist in this service domain. The service resource information provider exchanges this information with other service resource information providers that belong to the different service domains. We also verified the protocol's behavior and effectiveness using a simulation model developed for proposed protocol.

  19. Reading for Understanding: Methodist Youths' Shared Scripture-Reading Practices

    ERIC Educational Resources Information Center

    Rackley, Eric D.

    2018-01-01

    Informed by reading comprehension and comprehension strategies research, this study explores the Scripture-reading practices of four Methodist youths. Several rounds of inductive thematic analyses of Scripture-reading protocols revealed a set of five strategic reading practices youths used to understand Scripture. They drew inferences about the…

  20. Infrastructure-Less Communication Platform for Off-The-Shelf Android Smartphones

    PubMed Central

    2018-01-01

    As smartphones and other small portable devices become more sophisticated and popular, opportunities for communication and information sharing among such device users have increased. In particular, since it is known that infrastructure-less device-to-device (D2D) communication platforms consisting only of such devices are excellent in terms of, for example, bandwidth efficiency, efforts are being made to merge their information sharing capabilities with conventional infrastructure. However, efficient multi-hop communication is difficult with the D2D communication protocol, and many conventional D2D communication platforms require modifications of the protocol and terminal operating systems (OSs). In response to these issues, this paper reports on a proposed tree-structured D2D communication platform for Android devices that combines Wi-Fi Direct and Wi-Fi functions. The proposed platform, which is expected to be used with general Android 4.0 (or higher) OS equipped terminals, makes it possible to construct an ad hoc network instantaneously without sharing prior knowledge among participating devices. We will show the feasibility of our proposed platform through its design and demonstrate the implementation of a prototype using real devices. In addition, we will report on our investigation into communication delays and stability based on the number of hops and on terminal performance through experimental confirmation experiments. PMID:29510536

  1. Infrastructure-Less Communication Platform for Off-The-Shelf Android Smartphones.

    PubMed

    Oide, Takuma; Abe, Toru; Suganuma, Takuo

    2018-03-04

    As smartphones and other small portable devices become more sophisticated and popular, opportunities for communication and information sharing among such device users have increased. In particular, since it is known that infrastructure-less device-to-device (D2D) communication platforms consisting only of such devices are excellent in terms of, for example, bandwidth efficiency, efforts are being made to merge their information sharing capabilities with conventional infrastructure. However, efficient multi-hop communication is difficult with the D2D communication protocol, and many conventional D2D communication platforms require modifications of the protocol and terminal operating systems (OSs). In response to these issues, this paper reports on a proposed tree-structured D2D communication platform for Android devices that combines Wi-Fi Direct and Wi-Fi functions. The proposed platform, which is expected to be used with general Android 4.0 (or higher) OS equipped terminals, makes it possible to construct an ad hoc network instantaneously without sharing prior knowledge among participating devices. We will show the feasibility of our proposed platform through its design and demonstrate the implementation of a prototype using real devices. In addition, we will report on our investigation into communication delays and stability based on the number of hops and on terminal performance through experimental confirmation experiments.

  2. ShareSync: A Solution for Deterministic Data Sharing over Ethernet

    NASA Technical Reports Server (NTRS)

    Dunn, Daniel J., II; Koons, William A.; Kennedy, Richard D.; Davis, Philip A.

    2007-01-01

    As part of upgrading the Contact Dynamics Simulation Laboratory (CDSL) at the NASA Marshall Space Flight Center (MSFC), a simple, cost effective method was needed to communicate data among the networked simulation machines and I/O controllers used to run the facility. To fill this need and similar applicable situations, a generic protocol was developed, called ShareSync. ShareSync is a lightweight, real-time, publish-subscribe Ethernet protocol for simple and deterministic data sharing across diverse machines and operating systems. ShareSync provides a simple Application Programming Interface (API) for simulation programmers to incorporate into their code. The protocol is compatible with virtually all Ethernet-capable machines, is flexible enough to support a variety of applications, is fast enough to provide soft real-time determinism, and is a low-cost resource for distributed simulation development, deployment, and maintenance. The first design cycle iteration of ShareSync has been completed, and the protocol has undergone several testing procedures including endurance and benchmarking tests and approaches the 2001ts data synchronization design goal for the CDSL.

  3. Comment on "Dynamic quantum secret sharing"

    NASA Astrophysics Data System (ADS)

    Liao, Ci-Hong; Yang, Chun-Wei; Hwang, Tzonelish

    2013-10-01

    Hsu et al. (Quantum Inf Process 12:331-344,2013) proposed a dynamic quantum secret sharing (DQSS) protocol using the entanglement swapping of Bell states for an agent to easily join (or leave) the system. In 2013, Wang and Li (Quantum Inf Process 12(5):1991-1997, 2013) proposed a collusion attack on Hsu et al.'s DQSS protocol. Nevertheless, this study points out a new security issue on Hsu et al.'s DQSS protocol regarding to the honesty of a revoked agent. Without considering this issue, the DQSS protocol could be failed to provide secret sharing function.

  4. Using semantics for representing experimental protocols.

    PubMed

    Giraldo, Olga; García, Alexander; López, Federico; Corcho, Oscar

    2017-11-13

    An experimental protocol is a sequence of tasks and operations executed to perform experimental research in biological and biomedical areas, e.g. biology, genetics, immunology, neurosciences, virology. Protocols often include references to equipment, reagents, descriptions of critical steps, troubleshooting and tips, as well as any other information that researchers deem important for facilitating the reusability of the protocol. Although experimental protocols are central to reproducibility, the descriptions are often cursory. There is the need for a unified framework with respect to the syntactic structure and the semantics for representing experimental protocols. In this paper we present "SMART Protocols ontology", an ontology for representing experimental protocols. Our ontology represents the protocol as a workflow with domain specific knowledge embedded within a document. We also present the S ample I nstrument R eagent O bjective (SIRO) model, which represents the minimal common information shared across experimental protocols. SIRO was conceived in the same realm as the Patient Intervention Comparison Outcome (PICO) model that supports search, retrieval and classification purposes in evidence based medicine. We evaluate our approach against a set of competency questions modeled as SPARQL queries and processed against a set of published and unpublished protocols modeled with the SP Ontology and the SIRO model. Our approach makes it possible to answer queries such as Which protocols use tumor tissue as a sample. Improving reporting structures for experimental protocols requires collective efforts from authors, peer reviewers, editors and funding bodies. The SP Ontology is a contribution towards this goal. We build upon previous experiences and bringing together the view of researchers managing protocols in their laboratory work. Website: https://smartprotocols.github.io/ .

  5. Three-step semiquantum secure direct communication protocol

    NASA Astrophysics Data System (ADS)

    Zou, XiangFu; Qiu, DaoWen

    2014-09-01

    Quantum secure direct communication is the direct communication of secret messages without need for establishing a shared secret key first. In the existing schemes, quantum secure direct communication is possible only when both parties are quantum. In this paper, we construct a three-step semiquantum secure direct communication (SQSDC) protocol based on single photon sources in which the sender Alice is classical. In a semiquantum protocol, a person is termed classical if he (she) can measure, prepare and send quantum states only with the fixed orthogonal quantum basis {|0>, |1>}. The security of the proposed SQSDC protocol is guaranteed by the complete robustness of semiquantum key distribution protocols and the unconditional security of classical one-time pad encryption. Therefore, the proposed SQSDC protocol is also completely robust. Complete robustness indicates that nonzero information acquired by an eavesdropper Eve on the secret message implies the nonzero probability that the legitimate participants can find errors on the bits tested by this protocol. In the proposed protocol, we suggest a method to check Eves disturbing in the doves returning phase such that Alice does not need to announce publicly any position or their coded bits value after the photons transmission is completed. Moreover, the proposed SQSDC protocol can be implemented with the existing techniques. Compared with many quantum secure direct communication protocols, the proposed SQSDC protocol has two merits: firstly the sender only needs classical capabilities; secondly to check Eves disturbing after the transmission of quantum states, no additional classical information is needed.

  6. Quantum Secure Group Communication.

    PubMed

    Li, Zheng-Hong; Zubairy, M Suhail; Al-Amri, M

    2018-03-01

    We propose a quantum secure group communication protocol for the purpose of sharing the same message among multiple authorized users. Our protocol can remove the need for key management that is needed for the quantum network built on quantum key distribution. Comparing with the secure quantum network based on BB84, we show our protocol is more efficient and securer. Particularly, in the security analysis, we introduce a new way of attack, i.e., the counterfactual quantum attack, which can steal information by "invisible" photons. This invisible photon can reveal a single-photon detector in the photon path without triggering the detector. Moreover, the photon can identify phase operations applied to itself, thereby stealing information. To defeat this counterfactual quantum attack, we propose a quantum multi-user authorization system. It allows us to precisely control the communication time so that the attack can not be completed in time.

  7. A system architecture for sharing de-identified, research-ready brain scans and health information across clinical imaging centers.

    PubMed

    Chervenak, Ann L; van Erp, Theo G M; Kesselman, Carl; D'Arcy, Mike; Sobell, Janet; Keator, David; Dahm, Lisa; Murry, Jim; Law, Meng; Hasso, Anton; Ames, Joseph; Macciardi, Fabio; Potkin, Steven G

    2012-01-01

    Progress in our understanding of brain disorders increasingly relies on the costly collection of large standardized brain magnetic resonance imaging (MRI) data sets. Moreover, the clinical interpretation of brain scans benefits from compare and contrast analyses of scans from patients with similar, and sometimes rare, demographic, diagnostic, and treatment status. A solution to both needs is to acquire standardized, research-ready clinical brain scans and to build the information technology infrastructure to share such scans, along with other pertinent information, across hospitals. This paper describes the design, deployment, and operation of a federated imaging system that captures and shares standardized, de-identified clinical brain images in a federation across multiple institutions. In addition to describing innovative aspects of the system architecture and our initial testing of the deployed infrastructure, we also describe the Standardized Imaging Protocol (SIP) developed for the project and our interactions with the Institutional Review Board (IRB) regarding handling patient data in the federated environment.

  8. A System Architecture for Sharing De-Identified, Research-Ready Brain Scans and Health Information Across Clinical Imaging Centers

    PubMed Central

    Chervenak, Ann L.; van Erp, Theo G.M.; Kesselman, Carl; D’Arcy, Mike; Sobell, Janet; Keator, David; Dahm, Lisa; Murry, Jim; Law, Meng; Hasso, Anton; Ames, Joseph; Macciardi, Fabio; Potkin, Steven G.

    2015-01-01

    Progress in our understanding of brain disorders increasingly relies on the costly collection of large standardized brain magnetic resonance imaging (MRI) data sets. Moreover, the clinical interpretation of brain scans benefits from compare and contrast analyses of scans from patients with similar, and sometimes rare, demographic, diagnostic, and treatment status. A solution to both needs is to acquire standardized, research-ready clinical brain scans and to build the information technology infrastructure to share such scans, along with other pertinent information, across hospitals. This paper describes the design, deployment, and operation of a federated imaging system that captures and shares standardized, de-identified clinical brain images in a federation across multiple institutions. In addition to describing innovative aspects of the system architecture and our initial testing of the deployed infrastructure, we also describe the Standardized Imaging Protocol (SIP) developed for the project and our interactions with the Institutional Review Board (IRB) regarding handling patient data in the federated environment. PMID:22941984

  9. Cloud Computing Security Issue: Survey

    NASA Astrophysics Data System (ADS)

    Kamal, Shailza; Kaur, Rajpreet

    2011-12-01

    Cloud computing is the growing field in IT industry since 2007 proposed by IBM. Another company like Google, Amazon, and Microsoft provides further products to cloud computing. The cloud computing is the internet based computing that shared recourses, information on demand. It provides the services like SaaS, IaaS and PaaS. The services and recourses are shared by virtualization that run multiple operation applications on cloud computing. This discussion gives the survey on the challenges on security issues during cloud computing and describes some standards and protocols that presents how security can be managed.

  10. Physical key-protected one-time pad

    PubMed Central

    Horstmeyer, Roarke; Judkewitz, Benjamin; Vellekoop, Ivo M.; Assawaworrarit, Sid; Yang, Changhuei

    2013-01-01

    We describe an encrypted communication principle that forms a secure link between two parties without electronically saving either of their keys. Instead, random cryptographic bits are kept safe within the unique mesoscopic randomness of two volumetric scattering materials. We demonstrate how a shared set of patterned optical probes can generate 10 gigabits of statistically verified randomness between a pair of unique 2 mm3 scattering objects. This shared randomness is used to facilitate information-theoretically secure communication following a modified one-time pad protocol. Benefits of volumetric physical storage over electronic memory include the inability to probe, duplicate or selectively reset any bits without fundamentally altering the entire key space. Our ability to securely couple the randomness contained within two unique physical objects can extend to strengthen hardware required by a variety of cryptographic protocols, which is currently a critically weak link in the security pipeline of our increasingly mobile communication culture. PMID:24345925

  11. Eavesdropping on counterfactual quantum key distribution with finite resources

    NASA Astrophysics Data System (ADS)

    Liu, Xingtong; Zhang, Bo; Wang, Jian; Tang, Chaojing; Zhao, Jingjing; Zhang, Sheng

    2014-08-01

    A striking scheme called "counterfactual quantum cryptography" gives a conceptually new approach to accomplish the task of key distribution. It allows two legitimate parties to share a secret even though a particle carrying secret information is not, in fact, transmitted through the quantum channel. Since an eavesdropper cannot directly access the entire quantum system of each signal particle, the protocol seems to provide practical security advantages. However, here we propose an eavesdropping method which works on the scheme in a finite key scenario. We show that, for practical systems only generating a finite number of keys, the eavesdropping can obtain all of the secret information without being detected. We also present a improved protocol as a countermeasure against this attack.

  12. The inadvertent disclosure of personal health information through peer-to-peer file sharing programs

    PubMed Central

    Neri, Emilio; Jonker, Elizabeth; Sokolova, Marina; Peyton, Liam; Neisa, Angelica; Scassa, Teresa

    2010-01-01

    Objective There has been a consistent concern about the inadvertent disclosure of personal information through peer-to-peer file sharing applications, such as Limewire and Morpheus. Examples of personal health and financial information being exposed have been published. We wanted to estimate the extent to which personal health information (PHI) is being disclosed in this way, and compare that to the extent of disclosure of personal financial information (PFI). Design After careful review and approval of our protocol by our institutional research ethics board, files were downloaded from peer-to-peer file sharing networks and manually analyzed for the presence of PHI and PFI. The geographic region of the IP addresses was determined, and classified as either USA or Canada. Measurement We estimated the proportion of files that contain personal health and financial information for each region. We also estimated the proportion of search terms that return files with personal health and financial information. We ascertained and discuss the ethical issues related to this study. Results Approximately 0.4% of Canadian IP addresses had PHI, as did 0.5% of US IP addresses. There was more disclosure of financial information, at 1.7% of Canadian IP addresses and 4.7% of US IP addresses. An analysis of search terms used in these file sharing networks showed that a small percentage of the terms would return PHI and PFI files (ie, there are people successfully searching for PFI and PHI on the peer-to-peer file sharing networks). Conclusion There is a real risk of inadvertent disclosure of PHI through peer-to-peer file sharing networks, although the risk is not as large as for PFI. Anyone keeping PHI on their computers should avoid installing file sharing applications on their computers, or if they have to use such tools, actively manage the risks of inadvertent disclosure of their, their family's, their clients', or patients' PHI. PMID:20190057

  13. Increasing value and reducing waste: addressing inaccessible research.

    PubMed

    Chan, An-Wen; Song, Fujian; Vickers, Andrew; Jefferson, Tom; Dickersin, Kay; Gøtzsche, Peter C; Krumholz, Harlan M; Ghersi, Davina; van der Worp, H Bart

    2014-01-18

    The methods and results of health research are documented in study protocols, full study reports (detailing all analyses), journal reports, and participant-level datasets. However, protocols, full study reports, and participant-level datasets are rarely available, and journal reports are available for only half of all studies and are plagued by selective reporting of methods and results. Furthermore, information provided in study protocols and reports varies in quality and is often incomplete. When full information about studies is inaccessible, billions of dollars in investment are wasted, bias is introduced, and research and care of patients are detrimentally affected. To help to improve this situation at a systemic level, three main actions are warranted. First, academic institutions and funders should reward investigators who fully disseminate their research protocols, reports, and participant-level datasets. Second, standards for the content of protocols and full study reports and for data sharing practices should be rigorously developed and adopted for all types of health research. Finally, journals, funders, sponsors, research ethics committees, regulators, and legislators should endorse and enforce policies supporting study registration and wide availability of journal reports, full study reports, and participant-level datasets. Copyright © 2014 Elsevier Ltd. All rights reserved.

  14. Increasing value and reducing waste: addressing inaccessible research

    PubMed Central

    Chan, An-Wen; Song, Fujian; Vickers, Andrew; Jefferson, Tom; Dickersin, Kay; Gøtzsche, Peter C.; Krumholz, Harlan M.; Ghersi, Davina; van der Worp, H. Bart

    2015-01-01

    The study protocol, publications, full study report detailing all analyses, and participant-level dataset constitute the main documentation of methods and results for health research. However, journal publications are available for only half of all studies and are plagued by selective reporting of methods and results. The protocol, full study report, and participant-level dataset are rarely available. The quality of information provided in study protocols and reports is variable and often incomplete. Inaccessibility of full information for the vast majority of studies wastes billions of dollars, introduces bias, and has a detrimental impact on patient care and research. To help improve this situation at a systemic level, three main actions are warranted. Firstly, it is important that academic institutions and funders reward investigators who fully disseminate their research protocols, reports, and participant-level datasets. Secondly, standards for the content of protocols, full study reports, and data sharing practices should be rigorously developed and adopted for all types of health research. Finally, journals, funders, sponsors, research ethics committees, regulators, and legislators should implement and enforce policies supporting study registration and availability of journal publications, full study reports, and participant-level datasets. PMID:24411650

  15. Interoperative fundus image and report sharing in compliance with integrating the healthcare enterprise conformance and web access to digital imaging and communication in medicine persistent object protocol.

    PubMed

    Wu, Hui-Qun; Lv, Zheng-Min; Geng, Xing-Yun; Jiang, Kui; Tang, Le-Min; Zhou, Guo-Min; Dong, Jian-Cheng

    2013-01-01

    To address issues in interoperability between different fundus image systems, we proposed a web eye-picture archiving and communication system (PACS) framework in conformance with digital imaging and communication in medicine (DICOM) and health level 7 (HL7) protocol to realize fundus images and reports sharing and communication through internet. Firstly, a telemedicine-based eye care work flow was established based on integrating the healthcare enterprise (IHE) Eye Care technical framework. Then, a browser/server architecture eye-PACS system was established in conformance with the web access to DICOM persistent object (WADO) protocol, which contains three tiers. In any client system installed with web browser, clinicians could log in the eye-PACS to observe fundus images and reports. Multipurpose internet mail extensions (MIME) type of a structured report is saved as pdf/html with reference link to relevant fundus image using the WADO syntax could provide enough information for clinicians. Some functions provided by open-source Oviyam could be used to query, zoom, move, measure, view DICOM fundus images. Such web eye-PACS in compliance to WADO protocol could be used to store and communicate fundus images and reports, therefore is of great significance for teleophthalmology.

  16. Secure medical information sharing in cloud computing.

    PubMed

    Shao, Zhiyi; Yang, Bo; Zhang, Wenzheng; Zhao, Yi; Wu, Zhenqiang; Miao, Meixia

    2015-01-01

    Medical information sharing is one of the most attractive applications of cloud computing, where searchable encryption is a fascinating solution for securely and conveniently sharing medical data among different medical organizers. However, almost all previous works are designed in symmetric key encryption environment. The only works in public key encryption do not support keyword trapdoor security, have long ciphertext related to the number of receivers, do not support receiver revocation without re-encrypting, and do not preserve the membership of receivers. In this paper, we propose a searchable encryption supporting multiple receivers for medical information sharing based on bilinear maps in public key encryption environment. In the proposed protocol, data owner stores only one copy of his encrypted file and its corresponding encrypted keywords on cloud for multiple designated receivers. The keyword ciphertext is significantly shorter and its length is constant without relation to the number of designated receivers, i.e., for n receivers the ciphertext length is only twice the element length in the group. Only the owner knows that with whom his data is shared, and the access to his data is still under control after having been put on the cloud. We formally prove the security of keyword ciphertext based on the intractability of Bilinear Diffie-Hellman problem and the keyword trapdoor based on Decisional Diffie-Hellman problem.

  17. Secure Infrastructure-Less Network (SINET)

    DTIC Science & Technology

    2017-06-01

    Protocol CNSA Commercial National Security Algorithm COMSEC Communications Security COTS Commercial off the Shelf CSfC Commercial Solutions for...ABSTRACT (maximum 200 words) Military leaders and first responders desire the familiarity of commercial -off-the-shelf lightweight mobile devices while...since they lack reliable or secure communication infrastructure. Routine and simple mobile information-sharing tasks become a challenge over the

  18. Matroids and quantum-secret-sharing schemes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sarvepalli, Pradeep; Raussendorf, Robert

    A secret-sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret. Classically, efficient secret-sharing schemes have been shown to be induced by matroids. Furthermore, access structures of such schemes can be characterized by an excluded minor relation. No such relations are known for quantum secret-sharing schemes. In this paper we take the first steps toward a matroidal characterization of quantum-secret-sharing schemes. In addition to providing a new perspective on quantum-secret-sharing schemes, this characterization has important benefits. While previousmore » work has shown how to construct quantum-secret-sharing schemes for general access structures, these schemes are not claimed to be efficient. In this context the present results prove to be useful; they enable us to construct efficient quantum-secret-sharing schemes for many general access structures. More precisely, we show that an identically self-dual matroid that is representable over a finite field induces a pure-state quantum-secret-sharing scheme with information rate 1.« less

  19. Facilitating Secure Sharing of Personal Health Data in the Cloud

    PubMed Central

    Nepal, Surya; Glozier, Nick

    2016-01-01

    Background Internet-based applications are providing new ways of promoting health and reducing the cost of care. Although data can be kept encrypted in servers, the user does not have the ability to decide whom the data are shared with. Technically this is linked to the problem of who owns the data encryption keys required to decrypt the data. Currently, cloud service providers, rather than users, have full rights to the key. In practical terms this makes the users lose full control over their data. Trust and uptake of these applications can be increased by allowing patients to feel in control of their data, generally stored in cloud-based services. Objective This paper addresses this security challenge by providing the user a way of controlling encryption keys independently of the cloud service provider. We provide a secure and usable system that enables a patient to share health information with doctors and specialists. Methods We contribute a secure protocol for patients to share their data with doctors and others on the cloud while keeping complete ownership. We developed a simple, stereotypical health application and carried out security tests, performance tests, and usability tests with both students and doctors (N=15). Results We developed the health application as an app for Android mobile phones. We carried out the usability tests on potential participants and medical professionals. Of 20 participants, 14 (70%) either agreed or strongly agreed that they felt safer using our system. Using mixed methods, we show that participants agreed that privacy and security of health data are important and that our system addresses these issues. Conclusions We presented a security protocol that enables patients to securely share their eHealth data with doctors and nurses and developed a secure and usable system that enables patients to share mental health information with doctors. PMID:27234691

  20. Visibility-Based Hypothesis Testing Using Higher-Order Optical Interference

    NASA Astrophysics Data System (ADS)

    Jachura, Michał; Jarzyna, Marcin; Lipka, Michał; Wasilewski, Wojciech; Banaszek, Konrad

    2018-03-01

    Many quantum information protocols rely on optical interference to compare data sets with efficiency or security unattainable by classical means. Standard implementations exploit first-order coherence between signals whose preparation requires a shared phase reference. Here, we analyze and experimentally demonstrate the binary discrimination of visibility hypotheses based on higher-order interference for optical signals with a random relative phase. This provides a robust protocol implementation primitive when a phase lock is unavailable or impractical. With the primitive cost quantified by the total detected optical energy, optimal operation is typically reached in the few-photon regime.

  1. Improving security of the ping-pong protocol

    NASA Astrophysics Data System (ADS)

    Zawadzki, Piotr

    2013-01-01

    A security layer for the asymptotically secure ping-pong protocol is proposed and analyzed in the paper. The operation of the improvement exploits inevitable errors introduced by the eavesdropping in the control and message modes. Its role is similar to the privacy amplification algorithms known from the quantum key distribution schemes. Messages are processed in blocks which guarantees that an eavesdropper is faced with a computationally infeasible problem as long as the system parameters are within reasonable limits. The introduced additional information preprocessing does not require quantum memory registers and confidential communication is possible without prior key agreement or some shared secret.

  2. Improving the multiparty quantum secret sharing over two collective-noise channels against insider attack

    NASA Astrophysics Data System (ADS)

    Sun, Ying; Wen, Qiao-yan; Zhu, Fu-chen

    2010-01-01

    The security of the multiparty quantum secret sharing protocol presented by Zhang [Z.J. Zhang, Physica A, 361 (2006) 233] is analyzed. It is shown that this protocol is vulnerable to the insider attack since eavesdropping detection is performed only when all states arrive at the last agent. We propose an attack strategy and give an improved version of the original protocol. The improved protocol is robust and has the same traits with the original one.

  3. CSMA/RN: A universal protocol for gigabit networks

    NASA Technical Reports Server (NTRS)

    Foudriat, E. C.; Maly, Kurt J.; Overstreet, C. Michael; Khanna, S.; Paterra, Frank

    1990-01-01

    Networks must provide intelligent access for nodes to share the communications resources. In the range of 100 Mbps to 1 Gbps, the demand access class of protocols were studied extensively. Many use some form of slot or reservation system and many the concept of attempt and defer to determine the presence or absence of incoming information. The random access class of protocols like shared channel systems (Ethernet), also use the concept of attempt and defer in the form of carrier sensing to alleviate the damaging effects of collisions. In CSMA/CD, the sensing of interference is on a global basis. All systems discussed above have one aspect in common, they examine activity on the network either locally or globally and react in an attempt and whatever mechanism. Of the attempt + mechanisms discussed, one is obviously missing; that is attempt and truncate. Attempt and truncate was studied in a ring configuration called the Carrier Sensed Multiple Access Ring Network (CSMA/RN). The system features of CSMA/RN are described including a discussion of the node operations for inserting and removing messages and for handling integrated traffic. The performance and operational features based on analytical and simulation studies which indicate that CSMA/RN is a useful and adaptable protocol over a wide range of network conditions are discussed. Finally, the research and development activities necessary to demonstrate and realize the potential of CSMA/RN as a universal, gigabit network protocol is outlined.

  4. Using information technology to improve the management of chronic disease.

    PubMed

    Celler, Branko G; Lovell, Nigel H; Basilakis, Jim

    2003-09-01

    Information and communications technology (ICT) is increasingly being used in management of chronic illness to facilitate shared services (virtual health networks and electronic health records), knowledge management (care rules and protocols, scheduling, information directories), as well as consumer-based health education and evidence-based clinical protocols. Common applications of ICT include home monitoring of vital signs for patients with chronic disease, as well as replacing home visits by nurses in person with telemedicine videophone consultations. A patient-managed Home Telecare System with integrated clinical signs monitoring, automated scheduling and medication reminders, as well as access to health education and daily logs, is presented as an example of ICT use for chronic disease self-management. A clinical case study demonstrates how early identification of adverse trends in clinical signs recorded in the home can either avoid hospital readmission or reduce the length of hospital stay.

  5. Study on Network Error Analysis and Locating based on Integrated Information Decision System

    NASA Astrophysics Data System (ADS)

    Yang, F.; Dong, Z. H.

    2017-10-01

    Integrated information decision system (IIDS) integrates multiple sub-system developed by many facilities, including almost hundred kinds of software, which provides with various services, such as email, short messages, drawing and sharing. Because the under-layer protocols are different, user standards are not unified, many errors are occurred during the stages of setup, configuration, and operation, which seriously affect the usage. Because the errors are various, which may be happened in different operation phases, stages, TCP/IP communication protocol layers, sub-system software, it is necessary to design a network error analysis and locating tool for IIDS to solve the above problems. This paper studies on network error analysis and locating based on IIDS, which provides strong theory and technology supports for the running and communicating of IIDS.

  6. Nonclassicality thresholds for multiqubit states: Numerical analysis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gruca, Jacek; Zukowski, Marek; Laskowski, Wieslaw

    2010-07-15

    States that strongly violate Bell's inequalities are required in many quantum-informational protocols as, for example, in cryptography, secret sharing, and the reduction of communication complexity. We investigate families of such states with a numerical method which allows us to reveal nonclassicality even without direct knowledge of Bell's inequalities for the given problem. An extensive set of numerical results is presented and discussed.

  7. Spacetime Replication of Quantum Information Using (2 , 3) Quantum Secret Sharing and Teleportation

    NASA Astrophysics Data System (ADS)

    Wu, Yadong; Khalid, Abdullah; Davijani, Masoud; Sanders, Barry

    The aim of this work is to construct a protocol to replicate quantum information in any valid configuration of causal diamonds and assess resources required to physically realize spacetime replication. We present a set of codes to replicate quantum information along with a scheme to realize these codes using continuous-variable quantum optics. We use our proposed experimental realizations to determine upper bounds on the quantum and classical resources required to simulate spacetime replication. For four causal diamonds, our implementation scheme is more efficient than the one proposed previously. Our codes are designed using a decomposition algorithm for complete directed graphs, (2 , 3) quantum secret sharing, quantum teleportation and entanglement swapping. These results show the simulation of spacetime replication of quantum information is feasible with existing experimental methods. Alberta Innovates, NSERC, China's 1000 Talent Plan and the Institute for Quantum Information and Matter, which is an NSF Physics Frontiers Center (NSF Grant PHY-1125565) with support of the Gordon and Betty Moore Foundation (GBMF-2644).

  8. Exploring NASA GES DISC Data with Interoperable Services

    NASA Technical Reports Server (NTRS)

    Zhao, Peisheng; Yang, Wenli; Hegde, Mahabal; Wei, Jennifer C.; Kempler, Steven; Pham, Long; Teng, William; Savtchenko, Andrey

    2015-01-01

    Overview of NASA GES DISC (NASA Goddard Earth Science Data and Information Services Center) data with interoperable services: Open-standard and Interoperable Services Improve data discoverability, accessibility, and usability with metadata, catalogue and portal standards Achieve data, information and knowledge sharing across applications with standardized interfaces and protocols Open Geospatial Consortium (OGC) Data Services and Specifications Web Coverage Service (WCS) -- data Web Map Service (WMS) -- pictures of data Web Map Tile Service (WMTS) --- pictures of data tiles Styled Layer Descriptors (SLD) --- rendered styles.

  9. The [Un]Spoken Challenges of Administrator Collaboration: An Exploration of One District Leadership Team's Use of Protocols to Promote Reflection and Shared Theories of Action

    ERIC Educational Resources Information Center

    Szczesiul, Stacy Agee

    2014-01-01

    This article explores the use of protocol-structured dialogue in promoting reflective practices and shared theories of action within a district leadership team. Protocols have been used to make individuals' theories of action visible and subject to evaluation. This is important for leaders trying to establish coherence across a system; in…

  10. Combining Epidemiologic Information Across Space Agencies

    NASA Technical Reports Server (NTRS)

    Minard, Charles G.; Clark, April L.; Wear, Mary L.; Mason, Sara; Van Baalen, Mary

    2010-01-01

    Space flight is a very unique occupational exposure with potential hazards that are not fully understood. A limited number of individuals have experienced the exposures incurred during space flight, and epidemiologic research would benefit from shared information across space agencies. However, data sharing can be problematic due to agency protection policies for personally identifiable information as well as medical records. Compliance with these protocols in the astronaut population is particularly difficult given the small, high-profile population under study. Creativity in combining data is necessary in order to overcome these difficulties and improve statistical power in research. This study presents methods in meta-analysis that may be used to combine non-attributable data across space agencies so that meaningful conclusions may be drawn about study interests. Methods for combining epidemiologic data across space agencies are presented, and the processes are demonstrated using life-time mortality data in U.S. astronauts and Russian cosmonauts. This proof of concept was found to be an acceptable way of sharing data across agencies, and will be used in the future as more relevant research interests are identified.

  11. Integrating Indigenous Traditional, Local and Scientific Knowledge for Improved Management, Policy and Decision-Making in Reindeer Husbandry in the Russian Arctic

    NASA Technical Reports Server (NTRS)

    Maynard, Nancy G.; Yurchak, Boris; Turi, Johan Mathis; Mathiesen, Svein D.; Aissi-Wespi, Rita L.

    2004-01-01

    As scientists and policy-makers from both indigenous and non-indigenous communities begin to build closer partnerships to address common sustainability issues such as the health impacts of climate change and anthropogenic activities, it becomes increasingly important to create shared information management systems which integrate all relevant factors for optimal information sharing and decision-making. This paper describes a new GIs-based system being designed to bring local and indigenous traditional knowledge together with scientific data and information, remote sensing, and information technologies to address health-related environment, weather, climate, pollution and land use change issues for improved decision/policy-making for reindeer husbandry. The system is building an easily-accessible archive of relevant current and historical, traditional, local and remotely-sensed and other data and observations for shared analysis, measuring, and monitoring parameters of interest. Protection of indigenous culturally sensitive information will be respected through appropriate data protocols. A mechanism which enables easy information sharing among all participants, which is real time and geo-referenced and which allows interconnectivity with remote sites is also being designed into the system for maximum communication among partners. A preliminary version of our system will be described for a Russian reindeer test site, which will include a combination of indigenous knowledge about local conditions and issues, remote sensing and ground-based data on such parameters as the vegetation state and distribution, snow cover, temperature, ice condition, and infrastructure.

  12. A Mobile Phone App to Support Young People in Making Shared Decisions in Therapy (Power Up): Study Protocol.

    PubMed

    Chapman, Louise; Edbrooke-Childs, Julian; Martin, Kate; Webber, Helen; Craven, Michael P; Hollis, Chris; Deighton, Jessica; Law, Roslyn; Fonagy, Peter; Wolpert, Miranda

    2017-10-30

    Evidence suggests that young people want to be active participants in their care and involved in decisions about their treatment. However, there is a lack of digital shared decision-making tools available to support young people in child and adolescent mental health services (CAMHS). The primary aim of this paper is to present the protocol of a feasibility trial for Power Up, a mobile phone app to empower young people in CAMHS to make their voices heard and participate in decisions around their care. In the development phase, 30 young people, parents, and clinicians will take part in interviews and focus groups to elicit opinions on an early version of the app. In the feasibility testing phase, 60 young people from across 7 to 10 London CAMHS sites will take part in a trial looking at the feasibility and acceptability of measuring the impact of Power Up on shared decision making. Data collection for the development phase ended in December 2016. Data collection for the feasibility testing phase will end in December 2017. Findings will inform the planning of a cluster controlled trial and contribute to the development and implementation of a shared decision-making app to be integrated into CAMHS. ISRCTN77194423; http://www.isrctn.com/ISRCTN77194423 (Archived by WebCite at http://www.webcitation.org/6td6MINP0). ClinicalTrials.gov NCT02987608; https://clinicaltrials.gov/ct2/show/NCT02987608 (Archived by WebCite at http://www.webcitation.org/6td6PNBZM). ©Louise Chapman, Julian Edbrooke-Childs, Kate Martin, Helen Webber, Michael P Craven, Chris Hollis, Jessica Deighton, Roslyn Law, Peter Fonagy, Miranda Wolpert. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 30.10.2017.

  13. Masking Quantum Information is Impossible

    NASA Astrophysics Data System (ADS)

    Modi, Kavan; Pati, Arun Kumar; SenDe, Aditi; Sen, Ujjwal

    2018-06-01

    Classical information encoded in composite quantum states can be completely hidden from the reduced subsystems and may be found only in the correlations. Can the same be true for quantum information? If quantum information is hidden from subsystems and spread over quantum correlation, we call it masking of quantum information. We show that while this may still be true for some restricted sets of nonorthogonal quantum states, it is not possible for arbitrary quantum states. This result suggests that quantum qubit commitment—a stronger version of the quantum bit commitment—is not possible in general. Our findings may have potential applications in secret sharing and future quantum communication protocols.

  14. Multi-party quantum key agreement with five-qubit brown states

    NASA Astrophysics Data System (ADS)

    Cai, Tao; Jiang, Min; Cao, Gang

    2018-05-01

    In this paper, we propose a multi-party quantum key agreement protocol with five-qubit brown states and single-qubit measurements. Our multi-party protocol ensures each participant to contribute equally to the agreement key. Each party performs three single-qubit unitary operations on three qubits of each brown state. Finally, by measuring brown states and decoding the measurement results, all participants can negotiate a shared secret key without classical bits exchange between them. With the analysis of security, our protocol demonstrates that it can resist against both outsider and participant attacks. Compared with other schemes, it also possesses a higher information efficiency. In terms of physical operation, it requires single-qubit measurements only which weakens the hardware requirements of participant and has a better operating flexibility.

  15. Security of counterfactual quantum cryptography

    NASA Astrophysics Data System (ADS)

    Yin, Zhen-Qiang; Li, Hong-Wei; Chen, Wei; Han, Zheng-Fu; Guo, Guang-Can

    2010-10-01

    Recently, a “counterfactual” quantum-key-distribution scheme was proposed by T.-G. Noh [Phys. Rev. Lett.PRLTAO0031-900710.1103/PhysRevLett.103.230501 103, 230501 (2009)]. In this scheme, two legitimate distant peers may share secret keys even when the information carriers are not traveled in the quantum channel. We find that this protocol is equivalent to an entanglement distillation protocol. According to this equivalence, a strict security proof and the asymptotic key bit rate are both obtained when a perfect single-photon source is applied and a Trojan horse attack can be detected. We also find that the security of this scheme is strongly related to not only the bit error rate but also the yields of photons. And our security proof may shed light on the security of other two-way protocols.

  16. Two-party quantum key agreement with five-particle entangled states

    NASA Astrophysics Data System (ADS)

    He, Ye-Feng; Ma, Wen-Ping

    A two-party quantum key agreement protocol is proposed with five-particle entangled states and the delayed measurement technique. According to the measurement correlation property of five-particle entangled states, two participants can deduce the measurement results of each other’s initial quantum states. As a result, two parties can extract the secret keys of each other by using the publicly announced value or by performing the delayed measurement, respectively. Thus, a shared key is fairly established. Since each particle is transmitted only once in quantum channel, the protocol is congenitally free from the Trojan horse attacks. It is shown that the protocol not only is secure against both participant and outsider attacks but also has no information leakage problem. Moreover, it has high qubit efficiency.

  17. Security of counterfactual quantum cryptography

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yin Zhenqiang; Li Hongwei; Chen Wei

    2010-10-15

    Recently, a 'counterfactual' quantum-key-distribution scheme was proposed by T.-G. Noh [Phys. Rev. Lett. 103, 230501 (2009)]. In this scheme, two legitimate distant peers may share secret keys even when the information carriers are not traveled in the quantum channel. We find that this protocol is equivalent to an entanglement distillation protocol. According to this equivalence, a strict security proof and the asymptotic key bit rate are both obtained when a perfect single-photon source is applied and a Trojan horse attack can be detected. We also find that the security of this scheme is strongly related to not only the bitmore » error rate but also the yields of photons. And our security proof may shed light on the security of other two-way protocols.« less

  18. Multi-party quantum key agreement protocol secure against collusion attacks

    NASA Astrophysics Data System (ADS)

    Wang, Ping; Sun, Zhiwei; Sun, Xiaoqiang

    2017-07-01

    The fairness of a secure multi-party quantum key agreement (MQKA) protocol requires that all involved parties are entirely peer entities and can equally influence the outcome of the protocol to establish a shared key wherein no one can decide the shared key alone. However, it is found that parts of the existing MQKA protocols are sensitive to collusion attacks, i.e., some of the dishonest participants can collaborate to predetermine the final key without being detected. In this paper, a multi-party QKA protocol resisting collusion attacks is proposed. Different from previous QKA protocol resisting N-1 coconspirators or resisting 1 coconspirators, we investigate the general circle-type MQKA protocol which can be secure against t dishonest participants' cooperation. Here, t < N. We hope the results of the presented paper will be helpful for further research on fair MQKA protocols.

  19. General Framework for Animal Food Safety Traceability Using GS1 and RFID

    NASA Astrophysics Data System (ADS)

    Cao, Weizhu; Zheng, Limin; Zhu, Hong; Wu, Ping

    GS1 is global traceability standard, which is composed by the encoding system (EAN/UCC, EPC), the data carriers identified automatically (bar codes, RFID), electronic data interchange standards (EDI, XML). RFID is a non-contact, multi-objective automatic identification technique. Tracing of source food, standardization of RFID tags, sharing of dynamic data are problems to solve urgently for recent traceability systems. The paper designed general framework for animal food safety traceability using GS1 and RFID. This framework uses RFID tags encoding with EPCglobal tag data standards. Each information server has access tier, business tier and resource tier. These servers are heterogeneous and distributed, providing user access interfaces by SOAP or HTTP protocols. For sharing dynamic data, discovery service and object name service are used to locate dynamic distributed information servers.

  20. Two-Party secret key distribution via a modified quantum secret sharing protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Grice, Warren P.; Evans, Philip G.; Lawrie, Benjamin

    We present and demonstrate a method of distributing secret information based on N-party single-qubit Quantum Secret Sharing (QSS) in a modied plug-and-play two-party Quantum Key Distribution (QKD) system with N 2 intermediate nodes and compare it to both standard QSS and QKD. Our setup is based on the Clavis2 QKD system built by ID Quantique but is generalizable to any implementation. We show that any two out of N parties can build a secret key based on partial information from each other and with collaboration from the remaining N 2 parties. This method signicantly reduces the number of resources (singlemore » photon detectors, lasers and dark ber connections) needed to implement QKD on the grid.« less

  1. Two-Party secret key distribution via a modified quantum secret sharing protocol

    DOE PAGES

    Grice, Warren P.; Evans, Philip G.; Lawrie, Benjamin; ...

    2015-01-01

    We present and demonstrate a method of distributing secret information based on N-party single-qubit Quantum Secret Sharing (QSS) in a modied plug-and-play two-party Quantum Key Distribution (QKD) system with N 2 intermediate nodes and compare it to both standard QSS and QKD. Our setup is based on the Clavis2 QKD system built by ID Quantique but is generalizable to any implementation. We show that any two out of N parties can build a secret key based on partial information from each other and with collaboration from the remaining N 2 parties. This method signicantly reduces the number of resources (singlemore » photon detectors, lasers and dark ber connections) needed to implement QKD on the grid.« less

  2. Counterfactual attack on counterfactual quantum key distribution

    NASA Astrophysics Data System (ADS)

    Zhang, Sheng; Wnang, Jian; Tang, Chao Jing

    2012-05-01

    It is interesting that counterfactual quantum cryptography protocols allow two remotely separated parties to share a secret key without transmitting any signal particles. Generally, these protocols, expected to provide security advantages, base their security on a translated no-cloning theorem. Therefore, they potentially exhibit unconditional security in theory. In this letter, we propose a new Trojan horse attack, by which an eavesdropper Eve can gain full information about the key without being noticed, to real implementations of a counterfactual quantum cryptography system. Most importantly, the presented attack is available even if the system has negligible imperfections. Therefore, it shows that the present realization of counterfactual quantum key distribution is vulnerable.

  3. Single-shot secure quantum network coding on butterfly network with free public communication

    NASA Astrophysics Data System (ADS)

    Owari, Masaki; Kato, Go; Hayashi, Masahito

    2018-01-01

    Quantum network coding on the butterfly network has been studied as a typical example of quantum multiple cast network. We propose a secure quantum network code for the butterfly network with free public classical communication in the multiple unicast setting under restricted eavesdropper’s power. This protocol certainly transmits quantum states when there is no attack. We also show the secrecy with shared randomness as additional resource when the eavesdropper wiretaps one of the channels in the butterfly network and also derives the information sending through public classical communication. Our protocol does not require verification process, which ensures single-shot security.

  4. Global scientific research commons under the Nagoya Protocol: Towards a collaborative economy model for the sharing of basic research assets.

    PubMed

    Dedeurwaerdere, Tom; Melindi-Ghidi, Paolo; Broggiato, Arianna

    2016-01-01

    This paper aims to get a better understanding of the motivational and transaction cost features of building global scientific research commons, with a view to contributing to the debate on the design of appropriate policy measures under the recently adopted Nagoya Protocol. For this purpose, the paper analyses the results of a world-wide survey of managers and users of microbial culture collections, which focused on the role of social and internalized motivations, organizational networks and external incentives in promoting the public availability of upstream research assets. Overall, the study confirms the hypotheses of the social production model of information and shareable goods, but it also shows the need to complete this model. For the sharing of materials, the underlying collaborative economy in excess capacity plays a key role in addition to the social production, while for data, competitive pressures amongst scientists tend to play a bigger role.

  5. Insecurity of position-based quantum-cryptography protocols against entanglement attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lau, Hoi-Kwan; Lo, Hoi-Kwong

    2011-01-15

    Recently, position-based quantum cryptography has been claimed to be unconditionally secure. On the contrary, here we show that the existing proposals for position-based quantum cryptography are, in fact, insecure if entanglement is shared among two adversaries. Specifically, we demonstrate how the adversaries can incorporate ideas of quantum teleportation and quantum secret sharing to compromise the security with certainty. The common flaw to all current protocols is that the Pauli operators always map a codeword to a codeword (up to an irrelevant overall phase). We propose a modified scheme lacking this property in which the same cheating strategy used to underminemore » the previous protocols can succeed with a rate of at most 85%. We prove the modified protocol is secure when the shared quantum resource between the adversaries is a two- or three-level system.« less

  6. Application of wireless networks-peer-to-peer information sharing

    NASA Astrophysics Data System (ADS)

    ellappan, Vijayan; chaki, suchismita; kumar, avn

    2017-11-01

    Peer to Peer communications and its applications have gotten to be ordinary construction modelling in the wired network environment. But then, they have not been successfully adjusted with the wireless environment. Unlike the traditional client-server framework, in a P2P framework, each node can play the role of client as well as server simultaneously and exchange data or information with others. We aim to design an application which can adapt to the wireless ad-hoc networks. Peer to Peer communication can help people to share their files (information, image, audio, video and so on) and communicate with each other without relying on a particular network infrastructure or limited data usage. Here there is a central server with the help of which, the peers will have the capability to get the information about the other peers in the network. Indeed, even without the Internet, devices have the potential to allow users to connect and communicate in a special way through short range remote protocols such Wi-Fi.

  7. Modelling the protocol stack in NCS with deterministic and stochastic petri net

    NASA Astrophysics Data System (ADS)

    Hui, Chen; Chunjie, Zhou; Weifeng, Zhu

    2011-06-01

    Protocol stack is the basis of the networked control systems (NCS). Full or partial reconfiguration of protocol stack offers both optimised communication service and system performance. Nowadays, field testing is unrealistic to determine the performance of reconfigurable protocol stack; and the Petri net formal description technique offers the best combination of intuitive representation, tool support and analytical capabilities. Traditionally, separation between the different layers of the OSI model has been a common practice. Nevertheless, such a layered modelling analysis framework of protocol stack leads to the lack of global optimisation for protocol reconfiguration. In this article, we proposed a general modelling analysis framework for NCS based on the cross-layer concept, which is to establish an efficiency system scheduling model through abstracting the time constraint, the task interrelation, the processor and the bus sub-models from upper and lower layers (application, data link and physical layer). Cross-layer design can help to overcome the inadequacy of global optimisation based on information sharing between protocol layers. To illustrate the framework, we take controller area network (CAN) as a case study. The simulation results of deterministic and stochastic Petri-net (DSPN) model can help us adjust the message scheduling scheme and obtain better system performance.

  8. A Novel College Network Resource Management Method using Cloud Computing

    NASA Astrophysics Data System (ADS)

    Lin, Chen

    At present information construction of college mainly has construction of college networks and management information system; there are many problems during the process of information. Cloud computing is development of distributed processing, parallel processing and grid computing, which make data stored on the cloud, make software and services placed in the cloud and build on top of various standards and protocols, you can get it through all kinds of equipments. This article introduces cloud computing and function of cloud computing, then analyzes the exiting problems of college network resource management, the cloud computing technology and methods are applied in the construction of college information sharing platform.

  9. Semiquantum secret sharing using entangled states

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Li Qin; Department of Computer Science, Sun Yat-sen University, Guangzhou 510006; Department of Mathematics, Hong Kong Baptist University, Kowloon

    Secret sharing is a procedure for sharing a secret among a number of participants such that only the qualified subsets of participants have the ability to reconstruct the secret. Even in the presence of eavesdropping, secret sharing can be achieved when all the members are quantum. So what happens if not all the members are quantum? In this paper, we propose two semiquantum secret sharing protocols by using maximally entangled Greenberger-Horne-Zeilinger-type states in which quantum Alice shares a secret with two classical parties, Bob and Charlie, in a way that both parties are sufficient to obtain the secret, but onemore » of them cannot. The presented protocols are also shown to be secure against eavesdropping.« less

  10. A distributed computing model for telemetry data processing

    NASA Astrophysics Data System (ADS)

    Barry, Matthew R.; Scott, Kevin L.; Weismuller, Steven P.

    1994-05-01

    We present a new approach to distributing processed telemetry data among spacecraft flight controllers within the control centers at NASA's Johnson Space Center. This approach facilitates the development of application programs which integrate spacecraft-telemetered data and ground-based synthesized data, then distributes this information to flight controllers for analysis and decision-making. The new approach combines various distributed computing models into one hybrid distributed computing model. The model employs both client-server and peer-to-peer distributed computing models cooperating to provide users with information throughout a diverse operations environment. Specifically, it provides an attractive foundation upon which we are building critical real-time monitoring and control applications, while simultaneously lending itself to peripheral applications in playback operations, mission preparations, flight controller training, and program development and verification. We have realized the hybrid distributed computing model through an information sharing protocol. We shall describe the motivations that inspired us to create this protocol, along with a brief conceptual description of the distributed computing models it employs. We describe the protocol design in more detail, discussing many of the program design considerations and techniques we have adopted. Finally, we describe how this model is especially suitable for supporting the implementation of distributed expert system applications.

  11. A distributed computing model for telemetry data processing

    NASA Technical Reports Server (NTRS)

    Barry, Matthew R.; Scott, Kevin L.; Weismuller, Steven P.

    1994-01-01

    We present a new approach to distributing processed telemetry data among spacecraft flight controllers within the control centers at NASA's Johnson Space Center. This approach facilitates the development of application programs which integrate spacecraft-telemetered data and ground-based synthesized data, then distributes this information to flight controllers for analysis and decision-making. The new approach combines various distributed computing models into one hybrid distributed computing model. The model employs both client-server and peer-to-peer distributed computing models cooperating to provide users with information throughout a diverse operations environment. Specifically, it provides an attractive foundation upon which we are building critical real-time monitoring and control applications, while simultaneously lending itself to peripheral applications in playback operations, mission preparations, flight controller training, and program development and verification. We have realized the hybrid distributed computing model through an information sharing protocol. We shall describe the motivations that inspired us to create this protocol, along with a brief conceptual description of the distributed computing models it employs. We describe the protocol design in more detail, discussing many of the program design considerations and techniques we have adopted. Finally, we describe how this model is especially suitable for supporting the implementation of distributed expert system applications.

  12. Using Dedal to share and reuse distributed engineering design information

    NASA Technical Reports Server (NTRS)

    Baya, Vinod; Baudin, Catherine; Mabogunje, Ade; Das, Aseem; Cannon, David M.; Leifer, Larry J.

    1994-01-01

    The overall goal of the project is to facilitate the reuse of previous design experience for the maintenance, repair and redesign of artifacts in the electromechanical engineering domain. An engineering team creates information in the form of meeting summaries, project memos, progress reports, engineering notes, spreadsheet calculations and CAD drawings. Design information captured in these media is difficult to reuse because the way design concepts are referred to evolve over the life of a project and because decisions, requirements and structure are interrelated but rarely explicitly linked. Based on protocol analysis of the information seeking behavior of designer's, we defined a language to describe the content and the form of design records and implemented this language in Dedal, a tool for indexing, modeling and retrieving design information. We first describe the approach to indexing and retrieval in Dedal. Next we describe ongoing work in extending Dedal's capabilities to a distributed environment by integrating it with World Wide Web. This will enable members of a design team who are not co-located to share and reuse information.

  13. DWTP: a basis for networked VR on the Internet

    NASA Astrophysics Data System (ADS)

    Broll, Wolfgang; Schick, Daniel

    1998-04-01

    Shared virtual worlds are one of today's major research topics. While limited to particular application areas and high speed networks in the past, they become more and more available to a large number of users. One reason for this development was the introduction of VRML (the Virtual Reality Modeling Language), which has been established as a standard of the exchange of 3D worlds on the Internet. Although a number of prototype systems have been developed to realize shared multi-user worlds based on VRML, no suitable network protocol to support the demands of such environments has yet been established. In this paper we will introduce our approach of a network protocol for shared virtual environments: DWTP--the Distributed Worlds Transfer and communication Protocol. We will show how DWTP meets the demands of shared virtual environments on the Internet. We will further present SmallView, our prototype of a distributed multi-user VR system, to show how DWTP can be used to realize shared worlds.

  14. Interlibrary Loan, the Key to Resource Sharing: A Manual of Procedures and Protocols.

    ERIC Educational Resources Information Center

    Alaska State Dept. of Education, Juneau. Div. of State Libraries.

    Intended for use by librarians in Alaska, this manual provides general guidelines for the maximum utilization of library resources through interlibrary loan service. The first of four major sections describes the Alaska Library Network (ALN), which provides protocols and procedures to libraries for resource sharing; points out that new protocols…

  15. Compliance with AAPM Practice Guideline 1.a: CT Protocol Management and Review — from the perspective of a university hospital

    PubMed Central

    Bour, Robert K.; Pozniak, Myron; Ranallo, Frank N.

    2015-01-01

    The purpose of this paper is to describe our experience with the AAPM Medical Physics Practice Guideline 1.a: “CT Protocol Management and Review Practice Guideline”. Specifically, we will share how our institution's quality management system addresses the suggestions within the AAPM practice report. We feel this paper is needed as it was beyond the scope of the AAPM practice guideline to provide specific details on fulfilling individual guidelines. Our hope is that other institutions will be able to emulate some of our practices and that this article would encourage other types of centers (e.g., community hospitals) to share their methodology for approaching CT protocol optimization and quality control. Our institution had a functioning CT protocol optimization process, albeit informal, since we began using CT. Recently, we made our protocol development and validation process compliant with a number of the ISO 9001:2008 clauses and this required us to formalize the roles of the members of our CT protocol optimization team. We rely heavily on PACS‐based IT solutions for acquiring radiologist feedback on the performance of our CT protocols and the performance of our CT scanners in terms of dose (scanner output) and the function of the automatic tube current modulation. Specific details on our quality management system covering both quality control and ongoing optimization have been provided. The roles of each CT protocol team member have been defined, and the critical role that IT solutions provides for the management of files and the monitoring of CT protocols has been reviewed. In addition, the invaluable role management provides by being a champion for the project has been explained; lack of a project champion will mitigate the efforts of a CT protocol optimization team. Meeting the guidelines set forth in the AAPM practice guideline was not inherently difficult, but did, in our case, require the cooperation of radiologists, technologists, physicists, IT, administrative staff, and hospital management. Some of the IT solutions presented in this paper are novel and currently unique to our institution. PACS number: 87.57.Q PMID:26103176

  16. Method-centered digital communities on protocols.io for fast-paced scientific innovation.

    PubMed

    Kindler, Lori; Stoliartchouk, Alexei; Teytelman, Leonid; Hurwitz, Bonnie L

    2016-01-01

    The Internet has enabled online social interaction for scientists beyond physical meetings and conferences. Yet despite these innovations in communication, dissemination of methods is often relegated to just academic publishing. Further, these methods remain static, with subsequent advances published elsewhere and unlinked. For communities undergoing fast-paced innovation, researchers need new capabilities to share, obtain feedback, and publish methods at the forefront of scientific development. For example, a renaissance in virology is now underway given the new metagenomic methods to sequence viral DNA directly from an environment. Metagenomics makes it possible to "see" natural viral communities that could not be previously studied through culturing methods. Yet, the knowledge of specialized techniques for the production and analysis of viral metagenomes remains in a subset of labs.  This problem is common to any community using and developing emerging technologies and techniques. We developed new capabilities to create virtual communities in protocols.io, an open access platform, for disseminating protocols and knowledge at the forefront of scientific development. To demonstrate these capabilities, we present a virology community forum called VERVENet. These new features allow virology researchers to share protocols and their annotations and optimizations, connect with the broader virtual community to share knowledge, job postings, conference announcements through a common online forum, and discover the current literature through personalized recommendations to promote discussion of cutting edge research. Virtual communities in protocols.io enhance a researcher's ability to: discuss and share protocols, connect with fellow community members, and learn about new and innovative research in the field.  The web-based software for developing virtual communities is free to use on protocols.io. Data are available through public APIs at protocols.io.

  17. A secure distributed logistic regression protocol for the detection of rare adverse drug events

    PubMed Central

    El Emam, Khaled; Samet, Saeed; Arbuckle, Luk; Tamblyn, Robyn; Earle, Craig; Kantarcioglu, Murat

    2013-01-01

    Background There is limited capacity to assess the comparative risks of medications after they enter the market. For rare adverse events, the pooling of data from multiple sources is necessary to have the power and sufficient population heterogeneity to detect differences in safety and effectiveness in genetic, ethnic and clinically defined subpopulations. However, combining datasets from different data custodians or jurisdictions to perform an analysis on the pooled data creates significant privacy concerns that would need to be addressed. Existing protocols for addressing these concerns can result in reduced analysis accuracy and can allow sensitive information to leak. Objective To develop a secure distributed multi-party computation protocol for logistic regression that provides strong privacy guarantees. Methods We developed a secure distributed logistic regression protocol using a single analysis center with multiple sites providing data. A theoretical security analysis demonstrates that the protocol is robust to plausible collusion attacks and does not allow the parties to gain new information from the data that are exchanged among them. The computational performance and accuracy of the protocol were evaluated on simulated datasets. Results The computational performance scales linearly as the dataset sizes increase. The addition of sites results in an exponential growth in computation time. However, for up to five sites, the time is still short and would not affect practical applications. The model parameters are the same as the results on pooled raw data analyzed in SAS, demonstrating high model accuracy. Conclusion The proposed protocol and prototype system would allow the development of logistic regression models in a secure manner without requiring the sharing of personal health information. This can alleviate one of the key barriers to the establishment of large-scale post-marketing surveillance programs. We extended the secure protocol to account for correlations among patients within sites through generalized estimating equations, and to accommodate other link functions by extending it to generalized linear models. PMID:22871397

  18. A secure distributed logistic regression protocol for the detection of rare adverse drug events.

    PubMed

    El Emam, Khaled; Samet, Saeed; Arbuckle, Luk; Tamblyn, Robyn; Earle, Craig; Kantarcioglu, Murat

    2013-05-01

    There is limited capacity to assess the comparative risks of medications after they enter the market. For rare adverse events, the pooling of data from multiple sources is necessary to have the power and sufficient population heterogeneity to detect differences in safety and effectiveness in genetic, ethnic and clinically defined subpopulations. However, combining datasets from different data custodians or jurisdictions to perform an analysis on the pooled data creates significant privacy concerns that would need to be addressed. Existing protocols for addressing these concerns can result in reduced analysis accuracy and can allow sensitive information to leak. To develop a secure distributed multi-party computation protocol for logistic regression that provides strong privacy guarantees. We developed a secure distributed logistic regression protocol using a single analysis center with multiple sites providing data. A theoretical security analysis demonstrates that the protocol is robust to plausible collusion attacks and does not allow the parties to gain new information from the data that are exchanged among them. The computational performance and accuracy of the protocol were evaluated on simulated datasets. The computational performance scales linearly as the dataset sizes increase. The addition of sites results in an exponential growth in computation time. However, for up to five sites, the time is still short and would not affect practical applications. The model parameters are the same as the results on pooled raw data analyzed in SAS, demonstrating high model accuracy. The proposed protocol and prototype system would allow the development of logistic regression models in a secure manner without requiring the sharing of personal health information. This can alleviate one of the key barriers to the establishment of large-scale post-marketing surveillance programs. We extended the secure protocol to account for correlations among patients within sites through generalized estimating equations, and to accommodate other link functions by extending it to generalized linear models.

  19. Why is data sharing in collaborative natural resource efforts so hard and what can we do to improve it?

    PubMed

    Volk, Carol J; Lucero, Yasmin; Barnas, Katie

    2014-05-01

    Increasingly, research and management in natural resource science rely on very large datasets compiled from multiple sources. While it is generally good to have more data, utilizing large, complex datasets has introduced challenges in data sharing, especially for collaborating researchers in disparate locations ("distributed research teams"). We surveyed natural resource scientists about common data-sharing problems. The major issues identified by our survey respondents (n = 118) when providing data were lack of clarity in the data request (including format of data requested). When receiving data, survey respondents reported various insufficiencies in documentation describing the data (e.g., no data collection description/no protocol, data aggregated, or summarized without explanation). Since metadata, or "information about the data," is a central obstacle in efficient data handling, we suggest documenting metadata through data dictionaries, protocols, read-me files, explicit null value documentation, and process metadata as essential to any large-scale research program. We advocate for all researchers, but especially those involved in distributed teams to alleviate these problems with the use of several readily available communication strategies including the use of organizational charts to define roles, data flow diagrams to outline procedures and timelines, and data update cycles to guide data-handling expectations. In particular, we argue that distributed research teams magnify data-sharing challenges making data management training even more crucial for natural resource scientists. If natural resource scientists fail to overcome communication and metadata documentation issues, then negative data-sharing experiences will likely continue to undermine the success of many large-scale collaborative projects.

  20. Why is Data Sharing in Collaborative Natural Resource Efforts so Hard and What can We Do to Improve it?

    NASA Astrophysics Data System (ADS)

    Volk, Carol J.; Lucero, Yasmin; Barnas, Katie

    2014-05-01

    Increasingly, research and management in natural resource science rely on very large datasets compiled from multiple sources. While it is generally good to have more data, utilizing large, complex datasets has introduced challenges in data sharing, especially for collaborating researchers in disparate locations ("distributed research teams"). We surveyed natural resource scientists about common data-sharing problems. The major issues identified by our survey respondents ( n = 118) when providing data were lack of clarity in the data request (including format of data requested). When receiving data, survey respondents reported various insufficiencies in documentation describing the data (e.g., no data collection description/no protocol, data aggregated, or summarized without explanation). Since metadata, or "information about the data," is a central obstacle in efficient data handling, we suggest documenting metadata through data dictionaries, protocols, read-me files, explicit null value documentation, and process metadata as essential to any large-scale research program. We advocate for all researchers, but especially those involved in distributed teams to alleviate these problems with the use of several readily available communication strategies including the use of organizational charts to define roles, data flow diagrams to outline procedures and timelines, and data update cycles to guide data-handling expectations. In particular, we argue that distributed research teams magnify data-sharing challenges making data management training even more crucial for natural resource scientists. If natural resource scientists fail to overcome communication and metadata documentation issues, then negative data-sharing experiences will likely continue to undermine the success of many large-scale collaborative projects.

  1. Biosurveillance Technology: Providing Situational Awareness through Increased Information Sharing

    DTIC Science & Technology

    2011-09-01

    Sri Lanka, there are “separate vertical programmes [sic] to control and monitor malaria , filariasis, leprosy, respiratory diseases, human rabies...Biohazard Detection System CAP Common Alerting Protocol CDC Centers for Disease Control and Prevention CDC HAN Centers for Disease Control and Prevention...LCDHD Preparedness Program running, I always had complete and total faith that you had everything under control and you would excel at every task. To

  2. Providing Hemostatic and Blood Conservation Options for Jehovah's Witness Patients in a Large Medical System.

    PubMed

    Bai, Yu; Castillo, Brian S; Tchakarov, Amanda; Escobar, Miguel A; Cotton, Bryan A; Holcomb, John B; Brown, Robert E

    2016-12-01

    People of the Jehovah's Witness faith believe that they shall "abstain from blood." Because of this belief, we encounter the challenges from Jehovah's Witness patients who actively seek medical care for themselves and their children, but refuse the transfusion of blood products, which may result in increased morbidity and mortality in this patient population. With the development/availability of new hemostatic/coagulation products and the advances in medical technology, we, in collaboration with our clinical colleagues and our local Jehovah's Witness leadership, have developed a clinical guideline comprising medical protocol and surgical strategy for patients refusing blood products. Included in the medical protocol is an informative handout on related details to help treating physicians and patients make informed decisions about transfusion alternatives. Together, we have entered the medical protocol into the entire Memorial Hermann Hospital's electronic system. We report the detailed development and implementation process in order to share our experience and encourage others to develop their own management plan for this patient population. © 2016 by the Association of Clinical Scientists, Inc.

  3. Privacy-Assured Aggregation Protocol for Smart Metering: A Proactive Fault-Tolerant Approach [Proactive Fault-Tolerant Aggregation Protocol for Privacy-Assured Smart Metering

    DOE PAGES

    Won, Jongho; Ma, Chris Y. T.; Yau, David K. Y.; ...

    2016-06-01

    Smart meters are integral to demand response in emerging smart grids, by reporting the electricity consumption of users to serve application needs. But reporting real-time usage information for individual households raises privacy concerns. Existing techniques to guarantee differential privacy (DP) of smart meter users either are not fault tolerant or achieve (possibly partial) fault tolerance at high communication overheads. In this paper, we propose a fault-tolerant protocol for smart metering that can handle general communication failures while ensuring DP with significantly improved efficiency and lower errors compared with the state of the art. Our protocol handles fail-stop faults proactively bymore » using a novel design of future ciphertexts, and distributes trust among the smart meters by sharing secret keys among them. We prove the DP properties of our protocol and analyze its advantages in fault tolerance, accuracy, and communication efficiency relative to competing techniques. We illustrate our analysis by simulations driven by real-world traces of electricity consumption.« less

  4. A large-alphabet three-party quantum key distribution protocol based on orbital and spin angular momenta hybrid entanglement

    NASA Astrophysics Data System (ADS)

    Lai, Hong; Luo, Mingxing; Zhang, Jun; Pieprzyk, Josef; Pan, Lei; Orgun, Mehmet A.

    2018-07-01

    The orthogonality of the orbital angular momentum (OAM) eigenstates enables a single photon carry an arbitrary number of bits. Moreover, additional degrees of freedom (DOFs) of OAM can span a high-dimensional Hilbert space, which could greatly increase information capacity and security. Moreover, the use of the spin angular momentum-OAM hybrid entangled state can increase Shannon dimensionality, because photons can be hybrid entangled in multiple DOFs. Based on these observations, we develop a hybrid entanglement quantum key distribution (QKD) protocol to achieve three-party quantum key distribution without classical message exchanges. In our proposed protocol, a communicating party uses a spatial light modulator (SLM) and a specific phase hologram to modulate photons' OAM state. Similarly, the other communicating parties use their SLMs and the fixed different phase holograms to modulate the OAM entangled photon pairs, producing the shared key among the parties Alice, Bob and Charlie without classical message exchanges. More importantly, when the same operation is repeated for every party, our protocol could be extended to a multiple-party QKD protocol.

  5. Privacy-Assured Aggregation Protocol for Smart Metering: A Proactive Fault-Tolerant Approach [Proactive Fault-Tolerant Aggregation Protocol for Privacy-Assured Smart Metering

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Won, Jongho; Ma, Chris Y. T.; Yau, David K. Y.

    Smart meters are integral to demand response in emerging smart grids, by reporting the electricity consumption of users to serve application needs. But reporting real-time usage information for individual households raises privacy concerns. Existing techniques to guarantee differential privacy (DP) of smart meter users either are not fault tolerant or achieve (possibly partial) fault tolerance at high communication overheads. In this paper, we propose a fault-tolerant protocol for smart metering that can handle general communication failures while ensuring DP with significantly improved efficiency and lower errors compared with the state of the art. Our protocol handles fail-stop faults proactively bymore » using a novel design of future ciphertexts, and distributes trust among the smart meters by sharing secret keys among them. We prove the DP properties of our protocol and analyze its advantages in fault tolerance, accuracy, and communication efficiency relative to competing techniques. We illustrate our analysis by simulations driven by real-world traces of electricity consumption.« less

  6. Incorporating Brokers within Collaboration Environments

    NASA Astrophysics Data System (ADS)

    Rajasekar, A.; Moore, R.; de Torcy, A.

    2013-12-01

    A collaboration environment, such as the integrated Rule Oriented Data System (iRODS - http://irods.diceresearch.org), provides interoperability mechanisms for accessing storage systems, authentication systems, messaging systems, information catalogs, networks, and policy engines from a wide variety of clients. The interoperability mechanisms function as brokers, translating actions requested by clients to the protocol required by a specific technology. The iRODS data grid is used to enable collaborative research within hydrology, seismology, earth science, climate, oceanography, plant biology, astronomy, physics, and genomics disciplines. Although each domain has unique resources, data formats, semantics, and protocols, the iRODS system provides a generic framework that is capable of managing collaborative research initiatives that span multiple disciplines. Each interoperability mechanism (broker) is linked to a name space that enables unified access across the heterogeneous systems. The collaboration environment provides not only support for brokers, but also support for virtualization of name spaces for users, files, collections, storage systems, metadata, and policies. The broker enables access to data or information in a remote system using the appropriate protocol, while the collaboration environment provides a uniform naming convention for accessing and manipulating each object. Within the NSF DataNet Federation Consortium project (http://www.datafed.org), three basic types of interoperability mechanisms have been identified and applied: 1) drivers for managing manipulation at the remote resource (such as data subsetting), 2) micro-services that execute the protocol required by the remote resource, and 3) policies for controlling the execution. For example, drivers have been written for manipulating NetCDF and HDF formatted files within THREDDS servers. Micro-services have been written that manage interactions with the CUAHSI data repository, the DataONE information catalog, and the GeoBrain broker. Policies have been written that manage transfer of messages between an iRODS message queue and the Advanced Message Queuing Protocol. Examples of these brokering mechanisms will be presented. The DFC collaboration environment serves as the intermediary between community resources and compute grids, enabling reproducible data-driven research. It is possible to create an analysis workflow that retrieves data subsets from a remote server, assemble the required input files, automate the execution of the workflow, automatically track the provenance of the workflow, and share the input files, workflow, and output files. A collaborator can re-execute a shared workflow, compare results, change input files, and re-execute an analysis.

  7. Maximizing Interhospital Transfer Resources for Neurosurgical Patients.

    PubMed

    Schnurman, Zane; Chin, Robert; Fishkin, Edward R; Huang, Paul P

    2017-08-01

    Delays in patient transfers are associated with worse outcomes for some neurosurgical conditions. One of the primary causes of transfer delay is lack of neurosurgery intensive care unit bed availability. In the present study, we characterize the results of implementing an interhospital transfer protocol to reduce unnecessary transfers and improve bed availability. A transfer protocol was implemented in July 2012 at the Bellevue Hospital Department of Neurosurgery that screened for and prevented transfer of low-risk patients who were unlikely to require specialized inpatient neurosurgical care. The impact of this protocol was assessed with prospectively recorded data on all potential interhospital transfers from May 2011 through June 2016. Of the 1978 calls (regarding 1886 individual patients), 402 occurred before the implementation of the transfer protocol and 1576 occurred after. Before the protocol, 84.1% of transfer requests were accepted, but 15.2% were subsequently denied for bed unavailability. After the protocol, a smaller share of transfer requests were accepted after protocol screening (71.8%, P < 0.001), but only 1.9% (P < 0.001) were subsequently denied because of bed unavailability. The diagnosis demographics changed significantly (P < 0.001), with a larger share of arriving transfers suffering from aneurysms or tumors after the protocol and a smaller share suffering from stenosis/disc disease without neurological symptoms. The transfer protocol implemented in the present study allowed transfer determination based on the need for specialized neurosurgical care rather than chance unavailability of beds. Developing interhospital transfer protocols may be an effective strategy to efficiently allocate limited hospital resources and improve transfer systems. Copyright © 2017 Elsevier Inc. All rights reserved.

  8. Quantum secret sharing with qudit graph states

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Keet, Adrian; Fortescue, Ben; Sanders, Barry C.

    We present a unified formalism for threshold quantum secret sharing using graph states of systems with prime dimension. We construct protocols for three varieties of secret sharing: with classical and quantum secrets shared between parties over both classical and quantum channels.

  9. Bound entangled states with a private key and their classical counterpart.

    PubMed

    Ozols, Maris; Smith, Graeme; Smolin, John A

    2014-03-21

    Entanglement is a fundamental resource for quantum information processing. In its pure form, it allows quantum teleportation and sharing classical secrets. Realistic quantum states are noisy and their usefulness is only partially understood. Bound-entangled states are central to this question--they have no distillable entanglement, yet sometimes still have a private classical key. We present a construction of bound-entangled states with a private key based on classical probability distributions. From this emerge states possessing a new classical analogue of bound entanglement, distinct from the long-sought bound information. We also find states of smaller dimensions and higher key rates than previously known. Our construction has implications for classical cryptography: we show that existing protocols are insufficient for extracting private key from our distributions due to their "bound-entangled" nature. We propose a simple extension of existing protocols that can extract a key from them.

  10. Trust, confidentiality, and the acceptability of sharing HIV-related patient data: lessons learned from a mixed methods study about Health Information Exchanges.

    PubMed

    Maiorana, Andre; Steward, Wayne T; Koester, Kimberly A; Pearson, Charles; Shade, Starley B; Chakravarty, Deepalika; Myers, Janet J

    2012-04-19

    Concerns about the confidentiality of personal health information have been identified as a potential obstacle to implementation of Health Information Exchanges (HIEs). Considering the stigma and confidentiality issues historically associated with human immunodeficiency virus (HIV) disease, we examine how trust-in technology, processes, and people-influenced the acceptability of data sharing among stakeholders prior to implementation of six HIEs intended to improve HIV care in parts of the United States. Our analyses identify the kinds of concerns expressed by stakeholders about electronic data sharing and focus on the factors that ultimately facilitated acceptability of the new exchanges. We conducted 549 surveys with patients and 66 semi-structured interviews with providers and other stakeholders prior to implementation of the HIEs to assess concerns about confidentiality in the electronic sharing of patient data. The patient quantitative data were analyzed using SAS 9.2 to yield sample descriptive statistics. The analysis of the qualitative interviews with providers and other stakeholders followed an open-coding process, and convergent and divergent perspectives emerging from those data were examined within and across the HIEs. We found widespread acceptability for electronic sharing of HIV-related patient data through HIEs. This acceptability appeared to be driven by growing comfort with information technologies, confidence in the security protocols utilized to protect data, trust in the providers and institutions who use the technologies, belief in the benefits to the patients, and awareness that electronic exchange represents an enhancement of data sharing already taking place by other means. HIE acceptability depended both on preexisting trust among patients, providers, and institutions and on building consensus and trust in the HIEs as part of preparation for implementation. The process of HIE development also resulted in forging shared vision among institutions. Patients and providers are willing to accept the electronic sharing of HIV patient data to improve care for a disease historically seen as highly stigmatized. Acceptability depends on the effort expended to understand and address potential concerns related to data sharing and confidentiality, and on the trust established among stakeholders in terms of the nature of the systems and how they will be used.

  11. Virtual laboratories: new opportunities for collaborative water science

    NASA Astrophysics Data System (ADS)

    Ceola, Serena; Arheimer, Berit; Bloeschl, Guenter; Baratti, Emanuele; Capell, Rene; Castellarin, Attilio; Freer, Jim; Han, Dawei; Hrachowitz, Markus; Hundecha, Yeshewatesfa; Hutton, Christopher; Lindström, Goran; Montanari, Alberto; Nijzink, Remko; Parajka, Juraj; Toth, Elena; Viglione, Alberto; Wagener, Thorsten

    2015-04-01

    Reproducibility and repeatability of experiments are the fundamental prerequisites that allow researchers to validate results and share hydrological knowledge, experience and expertise in the light of global water management problems. Virtual laboratories offer new opportunities to enable these prerequisites since they allow experimenters to share data, tools and pre-defined experimental procedures (i.e. protocols). Here we present the outcomes of a first collaborative numerical experiment undertaken by five different international research groups in a virtual laboratory to address the key issues of reproducibility and repeatability. Moving from the definition of accurate and detailed experimental protocols, a rainfall-runoff model was independently applied to 15 European catchments by the research groups and model results were collectively examined through a web-based discussion. We found that a detailed modelling protocol was crucial to ensure the comparability and reproducibility of the proposed experiment across groups. Our results suggest that sharing comprehensive and precise protocols and running the experiments within a controlled environment (e.g. virtual laboratory) is as fundamental as sharing data and tools for ensuring experiment repeatability and reproducibility across the broad scientific community and thus advancing hydrology in a more coherent way.

  12. Improving specialist drug prescribing in primary care using task and error analysis: an observational study.

    PubMed

    Chana, Narinder; Porat, Talya; Whittlesea, Cate; Delaney, Brendan

    2017-03-01

    Electronic prescribing has benefited from computerised clinical decision support systems (CDSSs); however, no published studies have evaluated the potential for a CDSS to support GPs in prescribing specialist drugs. To identify potential weaknesses and errors in the existing process of prescribing specialist drugs that could be addressed in the development of a CDSS. Semi-structured interviews with key informants followed by an observational study involving GPs in the UK. Twelve key informants were interviewed to investigate the use of CDSSs in the UK. Nine GPs were observed while performing case scenarios depicting requests from hospitals or patients to prescribe a specialist drug. Activity diagrams, hierarchical task analysis, and systematic human error reduction and prediction approach analyses were performed. The current process of prescribing specialist drugs by GPs is prone to error. Errors of omission due to lack of information were the most common errors, which could potentially result in a GP prescribing a specialist drug that should only be prescribed in hospitals, or prescribing a specialist drug without reference to a shared care protocol. Half of all possible errors in the prescribing process had a high probability of occurrence. A CDSS supporting GPs during the process of prescribing specialist drugs is needed. This could, first, support the decision making of whether or not to undertake prescribing, and, second, provide drug-specific parameters linked to shared care protocols, which could reduce the errors identified and increase patient safety. © British Journal of General Practice 2017.

  13. Multiparty Quantum Key Agreement Based on Quantum Search Algorithm

    PubMed Central

    Cao, Hao; Ma, Wenping

    2017-01-01

    Quantum key agreement is an important topic that the shared key must be negotiated equally by all participants, and any nontrivial subset of participants cannot fully determine the shared key. To date, the embed modes of subkey in all the previously proposed quantum key agreement protocols are based on either BB84 or entangled states. The research of the quantum key agreement protocol based on quantum search algorithms is still blank. In this paper, on the basis of investigating the properties of quantum search algorithms, we propose the first quantum key agreement protocol whose embed mode of subkey is based on a quantum search algorithm known as Grover’s algorithm. A novel example of protocols with 5 – party is presented. The efficiency analysis shows that our protocol is prior to existing MQKA protocols. Furthermore it is secure against both external attack and internal attacks. PMID:28332610

  14. Data Sharing to Improve Close Approach Monitoring and Safety of Flight

    NASA Astrophysics Data System (ADS)

    Chan, Joseph; DalBello, Richard; Hope, Dean; Wauthier, Pascal; Douglas, Tim; Inghram, Travis

    2009-03-01

    Individual satellite operators have done a good job of developing the internal protocols and procedures to ensure the safe operation of their fleets. However, data sharing among operators for close approach monitoring is conducted in an ad-hoc manner during relocations, and there is currently no standardized agreement among operators on the content, format, and distribution protocol for data sharing. Crowding in geostationary orbit, participation by new commercial actors, government interest in satellite constellations, and highly maneuverable spacecraft all suggest that satellite operators will need to begin a dialogue on standard communication protocols and procedure to improve situation awareness. We will give an overview of the current best practices among different operators for close approach monitoring and discuss the concept of an active data center to improve data sharing, conjunction monitoring, and avoidance among satellite operators. We will also report on the progress and lessons learned from a Data Center prototype conducted by several operators over a one year period.

  15. Secure alignment of coordinate systems using quantum correlation

    NASA Astrophysics Data System (ADS)

    Rezazadeh, F.; Mani, A.; Karimipour, V.

    2017-08-01

    We show that two parties far apart can use shared entangled states and classical communication to align their coordinate systems with a very high fidelity. Moreover, compared with previous methods proposed for such a task, i.e., sending parallel or antiparallel pairs or groups of spin states, our method has the extra advantages of using single-qubit measurements and also being secure, so that third parties do not extract any information about the aligned coordinate system established between the two parties. The latter property is important in many other quantum information protocols in which measurements inevitably play a significant role.

  16. Distributed Noise Generation for Density Estimation Based Clustering without Trusted Third Party

    NASA Astrophysics Data System (ADS)

    Su, Chunhua; Bao, Feng; Zhou, Jianying; Takagi, Tsuyoshi; Sakurai, Kouichi

    The rapid growth of the Internet provides people with tremendous opportunities for data collection, knowledge discovery and cooperative computation. However, it also brings the problem of sensitive information leakage. Both individuals and enterprises may suffer from the massive data collection and the information retrieval by distrusted parties. In this paper, we propose a privacy-preserving protocol for the distributed kernel density estimation-based clustering. Our scheme applies random data perturbation (RDP) technique and the verifiable secret sharing to solve the security problem of distributed kernel density estimation in [4] which assumed a mediate party to help in the computation.

  17. Assisted closed-loop optimization of SSVEP-BCI efficiency

    PubMed Central

    Fernandez-Vargas, Jacobo; Pfaff, Hanns U.; Rodríguez, Francisco B.; Varona, Pablo

    2012-01-01

    We designed a novel assisted closed-loop optimization protocol to improve the efficiency of brain-computer interfaces (BCI) based on steady state visually evoked potentials (SSVEP). In traditional paradigms, the control over the BCI-performance completely depends on the subjects' ability to learn from the given feedback cues. By contrast, in the proposed protocol both the subject and the machine share information and control over the BCI goal. Generally, the innovative assistance consists in the delivery of online information together with the online adaptation of BCI stimuli properties. In our case, this adaptive optimization process is realized by (1) a closed-loop search for the best set of SSVEP flicker frequencies and (2) feedback of actual SSVEP magnitudes to both the subject and the machine. These closed-loop interactions between subject and machine are evaluated in real-time by continuous measurement of their efficiencies, which are used as online criteria to adapt the BCI control parameters. The proposed protocol aims to compensate for variability in possibly unknown subjects' state and trait dimensions. In a study with N = 18 subjects, we found significant evidence that our protocol outperformed classic SSVEP-BCI control paradigms. Evidence is presented that it takes indeed into account interindividual variabilities: e.g., under the new protocol, baseline resting state EEG measures predict subjects' BCI performances. This paper illustrates the promising potential of assisted closed-loop protocols in BCI systems. Probably their applicability might be expanded to innovative uses, e.g., as possible new diagnostic/therapeutic tools for clinical contexts and as new paradigms for basic research. PMID:23443214

  18. Assisted closed-loop optimization of SSVEP-BCI efficiency.

    PubMed

    Fernandez-Vargas, Jacobo; Pfaff, Hanns U; Rodríguez, Francisco B; Varona, Pablo

    2013-01-01

    We designed a novel assisted closed-loop optimization protocol to improve the efficiency of brain-computer interfaces (BCI) based on steady state visually evoked potentials (SSVEP). In traditional paradigms, the control over the BCI-performance completely depends on the subjects' ability to learn from the given feedback cues. By contrast, in the proposed protocol both the subject and the machine share information and control over the BCI goal. Generally, the innovative assistance consists in the delivery of online information together with the online adaptation of BCI stimuli properties. In our case, this adaptive optimization process is realized by (1) a closed-loop search for the best set of SSVEP flicker frequencies and (2) feedback of actual SSVEP magnitudes to both the subject and the machine. These closed-loop interactions between subject and machine are evaluated in real-time by continuous measurement of their efficiencies, which are used as online criteria to adapt the BCI control parameters. The proposed protocol aims to compensate for variability in possibly unknown subjects' state and trait dimensions. In a study with N = 18 subjects, we found significant evidence that our protocol outperformed classic SSVEP-BCI control paradigms. Evidence is presented that it takes indeed into account interindividual variabilities: e.g., under the new protocol, baseline resting state EEG measures predict subjects' BCI performances. This paper illustrates the promising potential of assisted closed-loop protocols in BCI systems. Probably their applicability might be expanded to innovative uses, e.g., as possible new diagnostic/therapeutic tools for clinical contexts and as new paradigms for basic research.

  19. Spousal caregivers and persons with dementia: Increasing participation in shared leisure activities among hospital-based dementia support program participants.

    PubMed

    DiLauro, Michelle; Pereira, Amanda; Carr, Jennifer; Chiu, Mary; Wesson, Virginia

    2015-02-20

    Spousal caregivers of persons with dementia often have difficulty engaging persons with dementia in leisure activities. This qualitative descriptive study identifies how caregivers perceive their spouses' participation in leisure activities since dementia onset and the professional guidance caregivers require to increase persons with dementia participation in shared leisure activities. Nine spousal caregivers from a hospital-based caregiver intervention attended one of three focus groups. Using symbolic interactionism and selective optimization with compensation theory as guiding frameworks, thematic content analysis was performed. Three major themes were identified: Recognizing and acknowledging changes, Making sense of changes and conflicts, and Embracing changes and forging ahead. Findings can be used by healthcare providers to better understand caregivers' needs for engaging persons with dementia in shared leisure activities, and inform development of feedback protocols to enhance caregiver interventions. © The Author(s) 2015 Reprints and permissions: sagepub.co.uk/journalsPermissions.nav.

  20. Revisiting Deng et al.'s Multiparty Quantum Secret Sharing Protocol

    NASA Astrophysics Data System (ADS)

    Hwang, Tzonelih; Hwang, Cheng-Chieh; Yang, Chun-Wei; Li, Chuan-Ming

    2011-09-01

    The multiparty quantum secret sharing protocol [Deng et al. in Chin. Phys. Lett. 23: 1084-1087, 2006] is revisited in this study. It is found that the performance of Deng et al.'s protocol can be much improved by using the techniques of block-transmission and decoy single photons. As a result, the qubit efficiency is improved 2.4 times and only one classical communication, a public discussion, and two quantum communications between each agent and the secret holder are needed rather than n classical communications, n public discussions, and 3n/2 quantum communications required in the original scheme.

  1. Exploring Patterns of Soil Organic Matter Decomposition with Students through the Global Decomposition Project (GDP) and the Interactive Model of Leaf Decomposition (IMOLD)

    NASA Astrophysics Data System (ADS)

    Steiner, S. M.; Wood, J. H.

    2015-12-01

    As decomposition rates are affected by climate change, understanding crucial soil interactions that affect plant growth and decomposition becomes a vital part of contributing to the students' knowledge base. The Global Decomposition Project (GDP) is designed to introduce and educate students about soil organic matter and decomposition through a standardized protocol for collecting, reporting, and sharing data. The Interactive Model of Leaf Decomposition (IMOLD) utilizes animations and modeling to learn about the carbon cycle, leaf anatomy, and the role of microbes in decomposition. Paired together, IMOLD teaches the background information and allows simulation of numerous scenarios, and the GDP is a data collection protocol that allows students to gather usable measurements of decomposition in the field. Our presentation will detail how the GDP protocol works, how to obtain or make the materials needed, and how results will be shared. We will also highlight learning objectives from the three animations of IMOLD, and demonstrate how students can experiment with different climates and litter types using the interactive model to explore a variety of decomposition scenarios. The GDP demonstrates how scientific methods can be extended to educate broader audiences, and data collected by students can provide new insight into global patterns of soil decomposition. Using IMOLD, students will gain a better understanding of carbon cycling in the context of litter decomposition, as well as learn to pose questions they can answer with an authentic computer model. Using the GDP protocols and IMOLD provide a pathway for scientists and educators to interact and reach meaningful education and research goals.

  2. New Results on Unconditionally Secure Multi-receiver Manual Authentication

    NASA Astrophysics Data System (ADS)

    Wang, Shuhong; Safavi-Naini, Reihaneh

    Manual authentication is a recently proposed model of communication motivated by the settings where the only trusted infrastructure is a low bandwidth authenticated channel, possibly realized by the aid of a human, that connects the sender and the receiver who are otherwise connected through an insecure channel and do not have any shared key or public key infrastructure. A good example of such scenarios is pairing of devices in Bluetooth. Manual authentication systems are studied in computational and information theoretic security model and protocols with provable security have been proposed. In this paper we extend the results in information theoretic model in two directions. Firstly, we extend a single receiver scenario to multireceiver case where the sender wants to authenticate the same message to a group of receivers. We show new attacks (compared to single receiver case) that can launched in this model and demonstrate that the single receiver lower bound 2log(1/ɛ) + O(1) on the bandwidth of manual channel stays valid in the multireceiver scenario. We further propose a protocol that achieves this bound and provides security, in the sense that we define, if up to c receivers are corrupted. The second direction is the study of non-interactive protocols in unconditionally secure model. We prove that unlike computational security framework, without interaction a secure authentication protocol requires the bandwidth of the manual channel to be at least the same as the message size, hence non-trivial protocols do not exist.

  3. Libre: Freeing Polar Data in an Information Commons

    NASA Astrophysics Data System (ADS)

    Duerr, R. E.; Parsons, M. A.

    2010-12-01

    As noted in the session description “The polar regions are at the forefront of modern environmental change, currently experiencing the largest and fastest changes in climate and environment”. Wise use of resources, astute management of our environment, improved decision support, and effective international cooperation on natural resource and geopolitical issues require a deeper understanding of, and an ability to predict change and its impact. Understanding and knowledge are built on data and information, yet polar information is scattered, scarce, and sporadic. Rapid change demands rapid data access. We envision a system where investigators quickly expose their data to the world and share them, without restriction, through open protocols on the Internet. A single giant, central archive is not practical for all polar data held around the world. Instead, we seek a collaborative, virtual space, where scientific data and information could be shared ethically and with minimal constraints. Inspired by the Antarctic Treaty of 1959 that established the Antarctic as a global commons to generate greater scientific understanding, the International Council of Science leads the Polar Information Commons (PIC). The PIC, engendered by the International Polar Year (IPY) and work on the IPY data policy, serves as an open, virtual repository for vital scientific data and information. An international network of scientific and data management organizations concerned with the scientific quality, integrity, and stewardship of data is developing the PIC. The PIC utilizes the Science Commons Protocol for Implementing Open Access Data, including establishment of community norms to encourage appropriate contributions to and use of PIC content. Data descriptions (metadata) are not necessarily registered in formal repositories or catalogues. They may simply be exposed to search engines or broadcast through syndication services such as RSS or Atom. The data are labeled or branded as part of the PIC and are, therefore, open for use without restriction. The PIC label also alerts data centers around the world to new polar data. These data centers then assess and acquire important data for formal archiving, curation, and access through national and global data systems. The intent is to enable rapid data access without qualification, while establishing a process for long-term preservation and stewardship of critical data. This paper will review the ethical and legal basis for sharing polar data and information, as well as the technologies being employed to make the PIC a reality.

  4. A Scalable Architecture for Improving the Timeliness and Relevance of Cyber Incident Notifications

    DTIC Science & Technology

    2011-04-01

    the flow of communications is reasonably straight forward, but information often flows at the speed of human receipt and processing. Alberts & Hayes...these flows to the missions and people consuming them. Camus [30] can perform this through comparing logs to Lightweight Directory Access Protocol...publishing.af.mil/shared/media/epubs/AFI33- 138.pdf. [18] Alberts , D.S. and Hayes, R.E. (2003) “Power to the Edge: Command… Control… in the

  5. Privacy preserving protocol for detecting genetic relatives using rare variants.

    PubMed

    Hormozdiari, Farhad; Joo, Jong Wha J; Wadia, Akshay; Guan, Feng; Ostrosky, Rafail; Sahai, Amit; Eskin, Eleazar

    2014-06-15

    High-throughput sequencing technologies have impacted many areas of genetic research. One such area is the identification of relatives from genetic data. The standard approach for the identification of genetic relatives collects the genomic data of all individuals and stores it in a database. Then, each pair of individuals is compared to detect the set of genetic relatives, and the matched individuals are informed. The main drawback of this approach is the requirement of sharing your genetic data with a trusted third party to perform the relatedness test. In this work, we propose a secure protocol to detect the genetic relatives from sequencing data while not exposing any information about their genomes. We assume that individuals have access to their genome sequences but do not want to share their genomes with anyone else. Unlike previous approaches, our approach uses both common and rare variants which provide the ability to detect much more distant relationships securely. We use a simulated data generated from the 1000 genomes data and illustrate that we can easily detect up to fifth degree cousins which was not possible using the existing methods. We also show in the 1000 genomes data with cryptic relationships that our method can detect these individuals. The software is freely available for download at http://genetics.cs.ucla.edu/crypto/. © The Author 2014. Published by Oxford University Press.

  6. Qualitative thematic analysis of consent forms used in cancer genome sequencing.

    PubMed

    Allen, Clarissa; Foulkes, William D

    2011-07-19

    Large-scale whole genome sequencing (WGS) studies promise to revolutionize cancer research by identifying targets for therapy and by discovering molecular biomarkers to aid early diagnosis, to better determine prognosis and to improve treatment response prediction. Such projects raise a number of ethical, legal, and social (ELS) issues that should be considered. In this study, we set out to discover how these issues are being handled across different jurisdictions. We examined informed consent (IC) forms from 30 cancer genome sequencing studies to assess (1) stated purpose of sample collection, (2) scope of consent requested, (3) data sharing protocols (4) privacy protection measures, (5) described risks of participation, (6) subject re-contacting, and (7) protocol for withdrawal. There is a high degree of similarity in how cancer researchers engaged in WGS are protecting participant privacy. We observed a strong trend towards both using samples for additional, unspecified research and sharing data with other investigators. IC forms were varied in terms of how they discussed re-contacting participants, returning results and facilitating participant withdrawal. Contrary to expectation, there were no consistent trends that emerged over the eight year period from which forms were collected. Examining IC forms from WGS studies elucidates how investigators are handling ELS challenges posed by this research. This information is important for ensuring that while the public benefits of research are maximized, the rights of participants are also being appropriately respected.

  7. Verifiable Secret Redistribution

    DTIC Science & Technology

    2001-10-01

    but they are not trusted with secret. Thus, we require a protocol for redistribution without reconstruction of the secret . We also require...verification that the new shareholders have valid shares (ones that can be used to reconstruct the secret ). We present a new protocol to perform non...secret to shareholders in Shamir’s (m,n) threshold scheme (one in which we require m of n shares to reconstruct the secret ), and wish to redistribute the

  8. Quantum protocols within Spekkens' toy model

    NASA Astrophysics Data System (ADS)

    Disilvestro, Leonardo; Markham, Damian

    2017-05-01

    Quantum mechanics is known to provide significant improvements in information processing tasks when compared to classical models. These advantages range from computational speedups to security improvements. A key question is where these advantages come from. The toy model developed by Spekkens [R. W. Spekkens, Phys. Rev. A 75, 032110 (2007), 10.1103/PhysRevA.75.032110] mimics many of the features of quantum mechanics, such as entanglement and no cloning, regarded as being important in this regard, despite being a local hidden variable theory. In this work, we study several protocols within Spekkens' toy model where we see it can also mimic the advantages and limitations shown in the quantum case. We first provide explicit proofs for the impossibility of toy bit commitment and the existence of a toy error correction protocol and consequent k -threshold secret sharing. Then, defining a toy computational model based on the quantum one-way computer, we prove the existence of blind and verified protocols. Importantly, these two last quantum protocols are known to achieve a better-than-classical security. Our results suggest that such quantum improvements need not arise from any Bell-type nonlocality or contextuality, but rather as a consequence of steering correlations.

  9. My Retina Tracker™: An On-line International Registry for People Affected with Inherited Orphan Retinal Degenerative Diseases and their Genetic Relatives - A New Resource.

    PubMed

    Fisher, Joan K; Bromley, Russell L; Mansfield, Brian C

    2016-01-01

    My Retina Tracker™ is a new on-line registry for people affected with inherited orphan retinal degenerative diseases, and their unaffected, genetic relatives. Created and supported by the Foundation Fighting Blindness, it is an international resource designed to capture the disease from the perspective of the registry participant and their retinal health care providers. The registry operates under an Institutional Review Board (IRB)-approved protocol and allows sharing of de-identified data with participants, researchers and clinicians. All participants sign an informed consent that includes selecting which data they wish to share. There is no minimum age of participation. Guardians must sign on behalf of minors, and children between the ages of 12 to 17 also sign an informed assent. Participants may compare their disease to others in the registry using graphical interpretations of the aggregate registry data. Researchers and clinicians have two levels of access. The first provides an interface to interrogate all data fields registrants have agreed to share based on their answers in the IRB informed consent. The second provides a route to contact people in the registry who may be eligible for studies or trials, through the Foundation.

  10. An Identity Based Key Exchange Protocol in Cloud Computing

    NASA Astrophysics Data System (ADS)

    Molli, Venkateswara Rao; Tiwary, Omkar Nath

    2012-10-01

    Workflow systems often use delegation to enhance the flexibility of authorization; delegation transfers privileges among users across different administrative domains and facilitates information sharing. We present an independently verifiable delegation mechanism, where a delegation credential can be verified without the participation of domain administrators. This protocol, called role-based cascaded delegation (RBCD), supports simple and efficient cross-domain delegation of authority. RBCD enables a role member to create delegations based on the dynamic needs of collaboration; in the meantime, a delegation chain canbe verified by anyone without the participation of role administrators. We also propose the Measurable Risk Adaptive decentralized Role-based Delegation framework to address this problem. Describe an efficient realization of RBCD by using aggregate signatures, where the authentication information for an arbitrarily long role-based delegation chain is captured by one short signature of constant size. RBCD enables a role member to create delegations based on the need of collaboration; in the meantime anyone can verify a delegation chain without the participation of role administrators. The protocol is general and can be realized by any signature scheme. We have described a specific realization with a hierarchical certificate-based encryption scheme that gives delegation compact credentials.

  11. Three-input majority function as the unique optimal function for the bias amplification using nonlocal boxes

    NASA Astrophysics Data System (ADS)

    Mori, Ryuhei

    2016-11-01

    Brassard et al. [Phys. Rev. Lett. 96, 250401 (2006), 10.1103/PhysRevLett.96.250401] showed that shared nonlocal boxes with a CHSH (Clauser, Horne, Shimony, and Holt) probability greater than 3/+√{6 } 6 yield trivial communication complexity. There still exists a gap with the maximum CHSH probability 2/+√{2 } 4 achievable by quantum mechanics. It is an interesting open question to determine the exact threshold for the trivial communication complexity. Brassard et al.'s idea is based on recursive bias amplification by the three-input majority function. It was not obvious if another choice of function exhibits stronger bias amplification. We show that the three-input majority function is the unique optimal function, so that one cannot improve the threshold 3/+√{6 } 6 by Brassard et al.'s bias amplification. In this work, protocols for computing the function used for the bias amplification are restricted to be nonadaptive protocols or a particular adaptive protocol inspired by Pawłowski et al.'s protocol for information causality [Nature (London) 461, 1101 (2009), 10.1038/nature08400]. We first show an adaptive protocol inspired by Pawłowski et al.'s protocol, and then show that the adaptive protocol improves upon nonadaptive protocols. Finally, we show that the three-input majority function is the unique optimal function for the bias amplification if we apply the adaptive protocol to each step of the bias amplification.

  12. NASA Operational Environment Team (NOET): NASA's key to environmental technology

    NASA Technical Reports Server (NTRS)

    Cook, Beth

    1993-01-01

    NASA has stepped forward to face the environmental challenge to eliminate the use of Ozone-Layer Depleting Substances (OLDS) and to reduce our Hazardous Air Pollutants (HAP) by 50 percent in 1995. These requirements have been issued by the Clean Air Act, the Montreal Protocol, and various other legislative acts. A proactive group, the NASA Operational Environment Team or NOET, received its charter in April 1992 and was tasked with providing a network through which replacement activities and development experiences can be shared. This is a NASA-wide team which supports the research and development community by sharing information both in person and via a computerized network, assisting in specification and standard revisions, developing cleaner propulsion systems, and exploring environmentally-compliant alternatives to current processes.

  13. Quantum Authencryption with Two-Photon Entangled States for Off-Line Communicants

    NASA Astrophysics Data System (ADS)

    Ye, Tian-Yu

    2016-02-01

    In this paper, a quantum authencryption protocol is proposed by using the two-photon entangled states as the quantum resource. Two communicants Alice and Bob share two private keys in advance, which determine the generation of two-photon entangled states. The sender Alice sends the two-photon entangled state sequence encoded with her classical bits to the receiver Bob in the manner of one-step quantum transmission. Upon receiving the encoded quantum state sequence, Bob decodes out Alice's classical bits with the two-photon joint measurements and authenticates the integrity of Alice's secret with the help of one-way hash function. The proposed protocol only uses the one-step quantum transmission and needs neither a public discussion nor a trusted third party. As a result, the proposed protocol can be adapted to the case where the receiver is off-line, such as the quantum E-mail systems. Moreover, the proposed protocol provides the message authentication to one bit level with the help of one-way hash function and has an information-theoretical efficiency equal to 100 %.

  14. A Mobile Phone App to Support Young People in Making Shared Decisions in Therapy (Power Up): Study Protocol

    PubMed Central

    Martin, Kate; Webber, Helen; Craven, Michael P; Hollis, Chris; Deighton, Jessica; Law, Roslyn; Fonagy, Peter; Wolpert, Miranda

    2017-01-01

    Background Evidence suggests that young people want to be active participants in their care and involved in decisions about their treatment. However, there is a lack of digital shared decision-making tools available to support young people in child and adolescent mental health services (CAMHS). Objective The primary aim of this paper is to present the protocol of a feasibility trial for Power Up, a mobile phone app to empower young people in CAMHS to make their voices heard and participate in decisions around their care. Methods In the development phase, 30 young people, parents, and clinicians will take part in interviews and focus groups to elicit opinions on an early version of the app. In the feasibility testing phase, 60 young people from across 7 to 10 London CAMHS sites will take part in a trial looking at the feasibility and acceptability of measuring the impact of Power Up on shared decision making. Results Data collection for the development phase ended in December 2016. Data collection for the feasibility testing phase will end in December 2017. Conclusions Findings will inform the planning of a cluster controlled trial and contribute to the development and implementation of a shared decision-making app to be integrated into CAMHS. Trial Registration ISRCTN77194423; http://www.isrctn.com/ISRCTN77194423 (Archived by WebCite at http://www.webcitation.org/6td6MINP0). ClinicalTrials.gov NCT02987608; https://clinicaltrials.gov/ct2/show/NCT02987608 (Archived by WebCite at http://www.webcitation.org/6td6PNBZM) PMID:29084708

  15. Internet Protocol Display Sharing Solution for Mission Control Center Video System

    NASA Technical Reports Server (NTRS)

    Brown, Michael A.

    2009-01-01

    With the advent of broadcast television as a constant source of information throughout the NASA manned space flight Mission Control Center (MCC) at the Johnson Space Center (JSC), the current Video Transport System (VTS) characteristics provides the ability to visually enhance real-time applications as a broadcast channel that decision making flight controllers come to rely on, but can be difficult to maintain and costly. The Operations Technology Facility (OTF) of the Mission Operations Facility Division (MOFD) has been tasked to provide insight to new innovative technological solutions for the MCC environment focusing on alternative architectures for a VTS. New technology will be provided to enable sharing of all imagery from one specific computer display, better known as Display Sharing (DS), to other computer displays and display systems such as; large projector systems, flight control rooms, and back supporting rooms throughout the facilities and other offsite centers using IP networks. It has been stated that Internet Protocol (IP) applications are easily readied to substitute for the current visual architecture, but quality and speed may need to be forfeited for reducing cost and maintainability. Although the IP infrastructure can support many technologies, the simple task of sharing ones computer display can be rather clumsy and difficult to configure and manage to the many operators and products. The DS process shall invest in collectively automating the sharing of images while focusing on such characteristics as; managing bandwidth, encrypting security measures, synchronizing disconnections from loss of signal / loss of acquisitions, performance latency, and provide functions like, scalability, multi-sharing, ease of initial integration / sustained configuration, integration with video adjustments packages, collaborative tools, host / recipient controllability, and the utmost paramount priority, an enterprise solution that provides ownership to the whole process, while maintaining the integrity of the latest technological displayed image devices. This study will provide insights to the many possibilities that can be filtered down to a harmoniously responsive product that can be used in today's MCC environment.

  16. Quantum Dialogue with Authentication Based on Bell States

    NASA Astrophysics Data System (ADS)

    Shen, Dongsu; Ma, Wenping; Yin, Xunru; Li, Xiaoping

    2013-06-01

    We propose an authenticated quantum dialogue protocol, which is based on a shared private quantum entangled channel. In this protocol, the EPR pairs are randomly prepared in one of the four Bell states for communication. By performing four Pauli operations on the shared EPR pairs to encode their shared authentication key and secret message, two legitimate users can implement mutual identity authentication and quantum dialogue without the help from the third party authenticator. Furthermore, due to the EPR pairs which are used for secure communication are utilized to implement authentication and the whole authentication process is included in the direct secure communication process, it does not require additional particles to realize authentication in this protocol. The updated authentication key provides the counterparts with a new authentication key for the next authentication and direct communication. Compared with other secure communication with authentication protocols, this one is more secure and efficient owing to the combination of authentication and direct communication. Security analysis shows that it is secure against the eavesdropping attack, the impersonation attack and the man-in-the-middle (MITM) attack.

  17. Shared Activity Coordination

    NASA Technical Reports Server (NTRS)

    Clement, Bradley J.; Barrett, Anthony C.

    2003-01-01

    Interacting agents that interleave planning and execution must reach consensus on their commitments to each other. In domains where agents have varying degrees of interaction and different constraints on communication and computation, agents will require different coordination protocols in order to efficiently reach consensus in real time. We briefly describe a largely unexplored class of real-time, distributed planning problems (inspired by interacting spacecraft missions), new challenges they pose, and a general approach to solving the problems. These problems involve self-interested agents that have infrequent communication but collaborate on joint activities. We describe a Shared Activity Coordination (SHAC) framework that provides a decentralized algorithm for negotiating the scheduling of shared activities in a dynamic environment, a soft, real-time approach to reaching consensus during execution with limited communication, and a foundation for customizing protocols for negotiating planner interactions. We apply SHAC to a realistic simulation of interacting Mars missions and illustrate the simplicity of protocol development.

  18. Continual coordination through shared activities

    NASA Technical Reports Server (NTRS)

    Clement, Bradley J.; Barrett, Anthony C.

    2003-01-01

    Interacting agents that interleave planning and execution must reach consensus on their commitments to each other. In domains where agents have varying degrees of interaction and different constraints on communication and computation, agents will require different coordination protocols in order to efficiently reach consensus in real time. We briefly describe a largely unexplored class of realtime, distributed planning problems (inspired by interacting spacecraft missions), new challenges they pose, and a general approach to solving the problems. These problems involve self-interested agents that have infrequent communication but collaborate on joint activities. We describe a Shared Activity Coordination (SHAC) framework that provides a decentralized algorithm for negotiating the scheduling of shared activities over the lifetimes of separate missions, a soft, real-time approach to reaching consensus during execution with limited communication, and a foundation for customizing protocols for negotiating planner interactions. We apply SHAC to a realistic simulation of interacting Mars missions and illustrate the simplicity of protocol development.

  19. Argumentation for coordinating shared activities

    NASA Technical Reports Server (NTRS)

    Clement, Bradley J.; Barrett, Anthony C.; Schaffer, Steven R.

    2004-01-01

    an increasing need for space missions to be able to collaboratively (and competitively) develop plans both within and across missions. In addition, interacting spacecraft that interleave onboard planning and execution must reach consensus on their commitments to each other prior to execution. In domains where missions have varying degrees of interaction and different constraints on communication and computation, the missions will require different coordination protocols in order to efficiently reach consensus with in their imposed deadlines. We describe a Shared Activity Coordination (SHAC) framework that provides a decentralized algorithm for negotiating the scheduling of shared activities over the lifetimes of multiple agents and a foundation for customizing protocols for negotiating planner interactions. We investigate variations of a few simple protocols based on argumentation and distributed constraints satisfaction techniques and evaluate their abilities to reach consistent solutions according to computation, time, and communication costs in an abstract domain where spacecraft propose joint measurements.

  20. Informatics and Standards for Nanomedicine Technology

    PubMed Central

    Thomas, Dennis G.; Klaessig, Fred; Harper, Stacey L.; Fritts, Martin; Hoover, Mark D.; Gaheen, Sharon; Stokes, Todd H.; Reznik-Zellen, Rebecca; Freund, Elaine T.; Klemm, Juli D.; Paik, David S.; Baker, Nathan A.

    2011-01-01

    There are several issues to be addressed concerning the management and effective use of information (or data), generated from nanotechnology studies in biomedical research and medicine. These data are large in volume, diverse in content, and are beset with gaps and ambiguities in the description and characterization of nanomaterials. In this work, we have reviewed three areas of nanomedicine informatics: information resources; taxonomies, controlled vocabularies, and ontologies; and information standards. Informatics methods and standards in each of these areas are critical for enabling collaboration, data sharing, unambiguous representation and interpretation of data, semantic (meaningful) search and integration of data; and for ensuring data quality, reliability, and reproducibility. In particular, we have considered four types of information standards in this review, which are standard characterization protocols, common terminology standards, minimum information standards, and standard data communication (exchange) formats. Currently, due to gaps and ambiguities in the data, it is also difficult to apply computational methods and machine learning techniques to analyze, interpret and recognize patterns in data that are high dimensional in nature, and also to relate variations in nanomaterial properties to variations in their chemical composition, synthesis, characterization protocols, etc. Progress towards resolving the issues of information management in nanomedicine using informatics methods and standards discussed in this review will be essential to the rapidly growing field of nanomedicine informatics. PMID:21721140

  1. Trust, confidentiality, and the acceptability of sharing HIV-related patient data: lessons learned from a mixed methods study about Health Information Exchanges

    PubMed Central

    2012-01-01

    Background Concerns about the confidentiality of personal health information have been identified as a potential obstacle to implementation of Health Information Exchanges (HIEs). Considering the stigma and confidentiality issues historically associated with human immunodeficiency virus (HIV) disease, we examine how trust—in technology, processes, and people—influenced the acceptability of data sharing among stakeholders prior to implementation of six HIEs intended to improve HIV care in parts of the United States. Our analyses identify the kinds of concerns expressed by stakeholders about electronic data sharing and focus on the factors that ultimately facilitated acceptability of the new exchanges. Methods We conducted 549 surveys with patients and 66 semi-structured interviews with providers and other stakeholders prior to implementation of the HIEs to assess concerns about confidentiality in the electronic sharing of patient data. The patient quantitative data were analyzed using SAS 9.2 to yield sample descriptive statistics. The analysis of the qualitative interviews with providers and other stakeholders followed an open-coding process, and convergent and divergent perspectives emerging from those data were examined within and across the HIEs. Results We found widespread acceptability for electronic sharing of HIV-related patient data through HIEs. This acceptability appeared to be driven by growing comfort with information technologies, confidence in the security protocols utilized to protect data, trust in the providers and institutions who use the technologies, belief in the benefits to the patients, and awareness that electronic exchange represents an enhancement of data sharing already taking place by other means. HIE acceptability depended both on preexisting trust among patients, providers, and institutions and on building consensus and trust in the HIEs as part of preparation for implementation. The process of HIE development also resulted in forging shared vision among institutions. Conclusions Patients and providers are willing to accept the electronic sharing of HIV patient data to improve care for a disease historically seen as highly stigmatized. Acceptability depends on the effort expended to understand and address potential concerns related to data sharing and confidentiality, and on the trust established among stakeholders in terms of the nature of the systems and how they will be used. PMID:22515736

  2. Practical secure quantum communications

    NASA Astrophysics Data System (ADS)

    Diamanti, Eleni

    2015-05-01

    We review recent advances in the field of quantum cryptography, focusing in particular on practical implementations of two central protocols for quantum network applications, namely key distribution and coin flipping. The former allows two parties to share secret messages with information-theoretic security, even in the presence of a malicious eavesdropper in the communication channel, which is impossible with classical resources alone. The latter enables two distrustful parties to agree on a random bit, again with information-theoretic security, and with a cheating probability lower than the one that can be reached in a classical scenario. Our implementations rely on continuous-variable technology for quantum key distribution and on a plug and play discrete-variable system for coin flipping, and necessitate a rigorous security analysis adapted to the experimental schemes and their imperfections. In both cases, we demonstrate the protocols with provable security over record long distances in optical fibers and assess the performance of our systems as well as their limitations. The reported advances offer a powerful toolbox for practical applications of secure communications within future quantum networks.

  3. ISA-TAB-Nano: a specification for sharing nanomaterial research data in spreadsheet-based format.

    PubMed

    Thomas, Dennis G; Gaheen, Sharon; Harper, Stacey L; Fritts, Martin; Klaessig, Fred; Hahn-Dantona, Elizabeth; Paik, David; Pan, Sue; Stafford, Grace A; Freund, Elaine T; Klemm, Juli D; Baker, Nathan A

    2013-01-14

    The high-throughput genomics communities have been successfully using standardized spreadsheet-based formats to capture and share data within labs and among public repositories. The nanomedicine community has yet to adopt similar standards to share the diverse and multi-dimensional types of data (including metadata) pertaining to the description and characterization of nanomaterials. Owing to the lack of standardization in representing and sharing nanomaterial data, most of the data currently shared via publications and data resources are incomplete, poorly-integrated, and not suitable for meaningful interpretation and re-use of the data. Specifically, in its current state, data cannot be effectively utilized for the development of predictive models that will inform the rational design of nanomaterials. We have developed a specification called ISA-TAB-Nano, which comprises four spreadsheet-based file formats for representing and integrating various types of nanomaterial data. Three file formats (Investigation, Study, and Assay files) have been adapted from the established ISA-TAB specification; while the Material file format was developed de novo to more readily describe the complexity of nanomaterials and associated small molecules. In this paper, we have discussed the main features of each file format and how to use them for sharing nanomaterial descriptions and assay metadata. The ISA-TAB-Nano file formats provide a general and flexible framework to record and integrate nanomaterial descriptions, assay data (metadata and endpoint measurements) and protocol information. Like ISA-TAB, ISA-TAB-Nano supports the use of ontology terms to promote standardized descriptions and to facilitate search and integration of the data. The ISA-TAB-Nano specification has been submitted as an ASTM work item to obtain community feedback and to provide a nanotechnology data-sharing standard for public development and adoption.

  4. ISA-TAB-Nano: A Specification for Sharing Nanomaterial Research Data in Spreadsheet-based Format

    PubMed Central

    2013-01-01

    Background and motivation The high-throughput genomics communities have been successfully using standardized spreadsheet-based formats to capture and share data within labs and among public repositories. The nanomedicine community has yet to adopt similar standards to share the diverse and multi-dimensional types of data (including metadata) pertaining to the description and characterization of nanomaterials. Owing to the lack of standardization in representing and sharing nanomaterial data, most of the data currently shared via publications and data resources are incomplete, poorly-integrated, and not suitable for meaningful interpretation and re-use of the data. Specifically, in its current state, data cannot be effectively utilized for the development of predictive models that will inform the rational design of nanomaterials. Results We have developed a specification called ISA-TAB-Nano, which comprises four spreadsheet-based file formats for representing and integrating various types of nanomaterial data. Three file formats (Investigation, Study, and Assay files) have been adapted from the established ISA-TAB specification; while the Material file format was developed de novo to more readily describe the complexity of nanomaterials and associated small molecules. In this paper, we have discussed the main features of each file format and how to use them for sharing nanomaterial descriptions and assay metadata. Conclusion The ISA-TAB-Nano file formats provide a general and flexible framework to record and integrate nanomaterial descriptions, assay data (metadata and endpoint measurements) and protocol information. Like ISA-TAB, ISA-TAB-Nano supports the use of ontology terms to promote standardized descriptions and to facilitate search and integration of the data. The ISA-TAB-Nano specification has been submitted as an ASTM work item to obtain community feedback and to provide a nanotechnology data-sharing standard for public development and adoption. PMID:23311978

  5. Securely Measuring the Overlap between Private Datasets with Cryptosets

    PubMed Central

    Swamidass, S. Joshua; Matlock, Matthew; Rozenblit, Leon

    2015-01-01

    Many scientific questions are best approached by sharing data—collected by different groups or across large collaborative networks—into a combined analysis. Unfortunately, some of the most interesting and powerful datasets—like health records, genetic data, and drug discovery data—cannot be freely shared because they contain sensitive information. In many situations, knowing if private datasets overlap determines if it is worthwhile to navigate the institutional, ethical, and legal barriers that govern access to sensitive, private data. We report the first method of publicly measuring the overlap between private datasets that is secure under a malicious model without relying on private protocols or message passing. This method uses a publicly shareable summary of a dataset’s contents, its cryptoset, to estimate its overlap with other datasets. Cryptosets approach “information-theoretic” security, the strongest type of security possible in cryptography, which is not even crackable with infinite computing power. We empirically and theoretically assess both the accuracy of these estimates and the security of the approach, demonstrating that cryptosets are informative, with a stable accuracy, and secure. PMID:25714898

  6. The Use of Efficient Broadcast Protocols in Asynchronous Distributed Systems. Ph.D. Thesis

    NASA Technical Reports Server (NTRS)

    Schmuck, Frank Bernhard

    1988-01-01

    Reliable broadcast protocols are important tools in distributed and fault-tolerant programming. They are useful for sharing information and for maintaining replicated data in a distributed system. However, a wide range of such protocols has been proposed. These protocols differ in their fault tolerance and delivery ordering characteristics. There is a tradeoff between the cost of a broadcast protocol and how much ordering it provides. It is, therefore, desirable to employ protocols that support only a low degree of ordering whenever possible. This dissertation presents techniques for deciding how strongly ordered a protocol is necessary to solve a given application problem. It is shown that there are two distinct classes of application problems: problems that can be solved with efficient, asynchronous protocols, and problems that require global ordering. The concept of a linearization function that maps partially ordered sets of events to totally ordered histories is introduced. How to construct an asynchronous implementation that solves a given problem if a linearization function for it can be found is shown. It is proved that in general the question of whether a problem has an asynchronous solution is undecidable. Hence there exists no general algorithm that would automatically construct a suitable linearization function for a given problem. Therefore, an important subclass of problems that have certain commutativity properties are considered. Techniques for constructing asynchronous implementations for this class are presented. These techniques are useful for constructing efficient asynchronous implementations for a broad range of practical problems.

  7. Joint remote control of an arbitrary single-qubit state by using a multiparticle entangled state as the quantum channel

    NASA Astrophysics Data System (ADS)

    Lv, Shu-Xin; Zhao, Zheng-Wei; Zhou, Ping

    2018-01-01

    We present a scheme for joint remote implementation of an arbitrary single-qubit operation following some ideas in one-way quantum computation. All the senders share the information of implemented quantum operation and perform corresponding single-qubit measurements according to their information of implemented operation. An arbitrary single-qubit operation can be implemented upon the remote receiver's quantum system if the receiver cooperates with all the senders. Moreover, we study the protocol of multiparty joint remote implementation of an arbitrary single-qubit operation with many senders by using a multiparticle entangled state as the quantum channel.

  8. Memory attacks on device-independent quantum cryptography.

    PubMed

    Barrett, Jonathan; Colbeck, Roger; Kent, Adrian

    2013-01-04

    Device-independent quantum cryptographic schemes aim to guarantee security to users based only on the output statistics of any components used, and without the need to verify their internal functionality. Since this would protect users against untrustworthy or incompetent manufacturers, sabotage, or device degradation, this idea has excited much interest, and many device-independent schemes have been proposed. Here we identify a critical weakness of device-independent protocols that rely on public communication between secure laboratories. Untrusted devices may record their inputs and outputs and reveal information about them via publicly discussed outputs during later runs. Reusing devices thus compromises the security of a protocol and risks leaking secret data. Possible defenses include securely destroying or isolating used devices. However, these are costly and often impractical. We propose other more practical partial defenses as well as a new protocol structure for device-independent quantum key distribution that aims to achieve composable security in the case of two parties using a small number of devices to repeatedly share keys with each other (and no other party).

  9. Annotation and visualization of endogenous retroviral sequences using the Distributed Annotation System (DAS) and eBioX

    PubMed Central

    Martínez Barrio, Álvaro; Lagercrantz, Erik; Sperber, Göran O; Blomberg, Jonas; Bongcam-Rudloff, Erik

    2009-01-01

    Background The Distributed Annotation System (DAS) is a widely used network protocol for sharing biological information. The distributed aspects of the protocol enable the use of various reference and annotation servers for connecting biological sequence data to pertinent annotations in order to depict an integrated view of the data for the final user. Results An annotation server has been devised to provide information about the endogenous retroviruses detected and annotated by a specialized in silico tool called RetroTector. We describe the procedure to implement the DAS 1.5 protocol commands necessary for constructing the DAS annotation server. We use our server to exemplify those steps. Data distribution is kept separated from visualization which is carried out by eBioX, an easy to use open source program incorporating multiple bioinformatics utilities. Some well characterized endogenous retroviruses are shown in two different DAS clients. A rapid analysis of areas free from retroviral insertions could be facilitated by our annotations. Conclusion The DAS protocol has shown to be advantageous in the distribution of endogenous retrovirus data. The distributed nature of the protocol is also found to aid in combining annotation and visualization along a genome in order to enhance the understanding of ERV contribution to its evolution. Reference and annotation servers are conjointly used by eBioX to provide visualization of ERV annotations as well as other data sources. Our DAS data source can be found in the central public DAS service repository, , or at . PMID:19534743

  10. Shared decision-making in medical encounters regarding breast cancer treatment: the contribution of methodological triangulation.

    PubMed

    Durif-Bruckert, C; Roux, P; Morelle, M; Mignotte, H; Faure, C; Moumjid-Ferdjaoui, N

    2015-07-01

    The aim of this study on shared decision-making in the doctor-patient encounter about surgical treatment for early-stage breast cancer, conducted in a regional cancer centre in France, was to further the understanding of patient perceptions on shared decision-making. The study used methodological triangulation to collect data (both quantitative and qualitative) about patient preferences in the context of a clinical consultation in which surgeons followed a shared decision-making protocol. Data were analysed from a multi-disciplinary research perspective (social psychology and health economics). The triangulated data collection methods were questionnaires (n = 132), longitudinal interviews (n = 47) and observations of consultations (n = 26). Methodological triangulation revealed levels of divergence and complementarity between qualitative and quantitative results that suggest new perspectives on the three inter-related notions of decision-making, participation and information. Patients' responses revealed important differences between shared decision-making and participation per se. The authors note that subjecting patients to a normative behavioural model of shared decision-making in an era when paradigms of medical authority are shifting may undermine the patient's quest for what he or she believes is a more important right: a guarantee of the best care available. © 2014 John Wiley & Sons Ltd.

  11. Practices and Policies of Clinical Exome Sequencing Providers: Analysis and Implications

    PubMed Central

    Jamal, Seema M.; Yu, Joon-Ho; Chong, Jessica X.; Dent, Karin M.; Conta, Jessie H.; Tabor, Holly K.; Bamshad, Michael J.

    2013-01-01

    Exome and whole genome sequencing (ES/WGS) offer potential advantages over traditional approaches to diagnostic genetic testing. Consequently, use of ES/WGS in clinical settings is rapidly becoming commonplace. Yet there are myriad moral, ethical, and perhaps legal implications attached to the use of ES and health care professionals and institutions will need to consider these implications in the context of the varied practices and policies of ES service providers. We developed “core elements” of content and procedures for informed consent, data sharing, and results management and a quantitative scale to assess the extent to which research protocols met the standards established by these core elements. We then used these tools to evaluate the practices and policies of each of the 6 U.S. CLIA-certified labs offering clinical ES. Approaches toward informed consent, data sharing, and results return vary widely among ES providers as do the overall potential merits and disadvantages of each, and more importantly, the balance between the two. PMID:23610049

  12. Sharing information among existing data sources

    NASA Astrophysics Data System (ADS)

    Ashley, W. R., III

    1999-01-01

    The sharing of information between law enforcement agencies is a premise for the success of all jurisdictions. A wealth of information resides in both the databases and infrastructures of local, state, and regional agencies. However, this information is often not available to the law enforcement professionals who require it. When the information is, available, individual investigators must not only know that it exists, but where it resides, and how to retrieve it. In many cases, these types of cross-jurisdictional communications are limited to personal relationships that result from telephone calls, faxes, and in some cases, e-mail. As criminal elements become more sophisticated and distributed, law enforcement agencies must begin to develop infrastructures and common sharing mechanisms that address a constantly evolving criminal threat. Historically, criminals have taken advantage of the lack of communication between law enforcement agencies. Examples of this are evident in the search for stolen property and monetary dealings. Pawned property, cash transactions, and failure to supply child support are three common cross- jurisdictional crimes that could be better enforced by strengthening the lines of communication. Criminal behavior demonstrates that it is easier to profit from their actions by dealing in separate jurisdictions. For example, stolen property is sold outside of the jurisdiction of its origin. In most cases, simply traveling a short distance to the adjoining county or municipality is sufficient to ensure that apprehension of the criminal or seizure of the stolen property is highly unlikely. In addition to the traditional burglar, fugitives often sell or pawn property to finance their continued evasion from the law. Sharing of information in a rapid manner would increase the ability of law enforcement personnel to track and capture fugitives, as well as criminals. In an example to combat this threat, the State of Florida recently acted on the need to share crucial investigative information across jurisdictional bounds by establishing a communications infrastructure for all of its law enforcement jurisdictions. The Criminal Justice Network (CJ-Net) is a statewide TCP/IP network, dedicated to the sharing of law enforcement information. CJ-Net is managed and maintained by the Florida Department of Law Enforcement (FDLE) and provides open access and privileges to any criminal justice agency, including the state court and penitentiary systems. In addition to Florida, other states, such as North Carolina, are also beginning to implement common protocol communication infrastructures and architectures in order to link local jurisdictions together throughout the state. The law enforcement domain in an optimum situation for information-sharing technologies. Communication infrastructures are continually established, and as such, action is required to effectively use these networks to their full potential. Information technologies that are best suited for the law enforcement domain, must be evaluated and implemented in a cost-effective manner. Unlike the Defense Department and other large federal agencies, individual jurisdictions at both the local and state level cannot afford to expend limited resources on research and development of prototype systems. Therefore, we must identify enabling technologies that have matured in related domains and transition them into law enforcement at a minimum cost. Crucial to this measure, is the selection of the appropriate levels of information-sharing technologies to be inserted. Information-sharing technologies that are unproven or have extensive recurring costs are not suitable for this domain. Information-sharing technologies traditionally exist between two distinct polar bounds: the data warehousing approach and mediation across distributed heterogeneous data sources. These two ends of the spectrum represent extremely different philosophies in accomplishing the same goal. In the following sections of this paper, discussions of information-sharing mechanisms will be addressed and the effectiveness of each is examined for the law enforcement domain. In each case, it is the opinion of the author as to which approach would lend itself to the most appropriate solution to the problem of effectively sharing criminal justice information.

  13. Ethics review of studies during public health emergencies - the experience of the WHO ethics review committee during the Ebola virus disease epidemic.

    PubMed

    Alirol, Emilie; Kuesel, Annette C; Guraiib, Maria Magdalena; de la Fuente-Núñez, Vânia; Saxena, Abha; Gomes, Melba F

    2017-06-26

    Between 2013 and 2016, West Africa experienced the largest ever outbreak of Ebola Virus Disease. In the absence of registered treatments or vaccines to control this lethal disease, the World Health Organization coordinated and supported research to expedite identification of interventions that could control the outbreak and improve future control efforts. Consequently, the World Health Organization Research Ethics Review Committee (WHO-ERC) was heavily involved in reviews and ethics discussions. It reviewed 24 new and 22 amended protocols for research studies including interventional (drug, vaccine) and observational studies. WHO-ERC provided the reviews within on average 6 working days. The WHO-ERC often could not provide immediate approval of protocols for reasons which were not Ebola Virus Disease specific but related to protocol inconsistencies, missing information and complex informed consents. WHO-ERC considerations on Ebola Virus Disease specific issues (benefit-risk assessment, study design, exclusion of pregnant women and children from interventional studies, data and sample sharing, collaborative partnerships including international and local researchers and communities, community engagement and participant information) are presented. To accelerate study approval in future public health emergencies, we recommend: (1) internally consistent and complete submissions with information documents in language participants are likely to understand, (2) close collaboration between local and international researchers from research inception, (3) generation of template agreements for data and sample sharing and use during the ongoing global consultations on bio-banks, (4) formation of Joint Scientific Advisory and Data Safety Review Committees for all studies linked to a particular intervention or group of interventions, (5) formation of a Joint Ethics Review Committee with representatives of the Ethics Committees of all institutions and countries involved to strengthen reviews through the different perspectives provided without the 'opportunity costs' for time to final approval of multiple, independent reviews, (6) direct information exchange between the chairs of advisory, safety review and ethics committees, (7) more Ethics Committee support for investigators than is standard and (8) a global consultation on criteria for inclusion of pregnant women and children in interventional studies for conditions which put them at particularly high risk of mortality or other irreversible adverse outcomes under standard-of-care.

  14. Guidelines for Inclusion of Patient-Reported Outcomes in Clinical Trial Protocols: The SPIRIT-PRO Extension.

    PubMed

    Calvert, Melanie; Kyte, Derek; Mercieca-Bebber, Rebecca; Slade, Anita; Chan, An-Wen; King, Madeleine T; Hunn, Amanda; Bottomley, Andrew; Regnault, Antoine; Chan, An-Wen; Ells, Carolyn; O'Connor, Daniel; Revicki, Dennis; Patrick, Donald; Altman, Doug; Basch, Ethan; Velikova, Galina; Price, Gary; Draper, Heather; Blazeby, Jane; Scott, Jane; Coast, Joanna; Norquist, Josephine; Brown, Julia; Haywood, Kirstie; Johnson, Laura Lee; Campbell, Lisa; Frank, Lori; von Hildebrand, Maria; Brundage, Michael; Palmer, Michael; Kluetz, Paul; Stephens, Richard; Golub, Robert M; Mitchell, Sandra; Groves, Trish

    2018-02-06

    Patient-reported outcome (PRO) data from clinical trials can provide valuable evidence to inform shared decision making, labeling claims, clinical guidelines, and health policy; however, the PRO content of clinical trial protocols is often suboptimal. The SPIRIT (Standard Protocol Items: Recommendations for Interventional Trials) statement was published in 2013 and aims to improve the completeness of trial protocols by providing evidence-based recommendations for the minimum set of items to be addressed, but it does not provide PRO-specific guidance. To develop international, consensus-based, PRO-specific protocol guidance (the SPIRIT-PRO Extension). The SPIRIT-PRO Extension was developed following the Enhancing Quality and Transparency of Health Research (EQUATOR) Network's methodological framework for guideline development. This included (1) a systematic review of existing PRO-specific protocol guidance to generate a list of potential PRO-specific protocol items (published in 2014); (2) refinements to the list and removal of duplicate items by the International Society for Quality of Life Research (ISOQOL) Protocol Checklist Taskforce; (3) an international stakeholder survey of clinical trial research personnel, PRO methodologists, health economists, psychometricians, patient advocates, funders, industry representatives, journal editors, policy makers, ethicists, and researchers responsible for evidence synthesis (distributed by 38 international partner organizations in October 2016); (4) an international Delphi exercise (n = 137 invited; October 2016 to February 2017); and (5) consensus meeting (n = 30 invited; May 2017). Prior to voting, consensus meeting participants were informed of the results of the Delphi exercise and given data from structured reviews evaluating the PRO protocol content of 3 defined samples of trial protocols. The systematic review identified 162 PRO-specific protocol recommendations from 54 sources. The ISOQOL Taskforce (n = 21) reduced this to 56 items, which were considered by 138 international stakeholder survey participants and 99 Delphi panelists. The final wording of the SPIRIT-PRO Extension was agreed on at a consensus meeting (n = 29 participants) and reviewed by external group of experts during a consultation period. Eleven extensions and 5 elaborations to the SPIRIT 2013 checklist were recommended for inclusion in clinical trial protocols in which PROs are a primary or key secondary outcome. Extension items focused on PRO-specific issues relating to the trial rationale, objectives, eligibility criteria, concepts used to evaluate the intervention, time points for assessment, PRO instrument selection and measurement properties, data collection plan, translation to other languages, proxy completion, strategies to minimize missing data, and whether PRO data will be monitored during the study to inform clinical care. The SPIRIT-PRO guidelines provide recommendations for items that should be addressed and included in clinical trial protocols in which PROs are a primary or key secondary outcome. Improved design of clinical trials including PROs could help ensure high-quality data that may inform patient-centered care.

  15. Gencrypt: one-way cryptographic hashes to detect overlapping individuals across samples

    PubMed Central

    Turchin, Michael C.; Hirschhorn, Joel N.

    2012-01-01

    Summary: Meta-analysis across genome-wide association studies is a common approach for discovering genetic associations. However, in some meta-analysis efforts, individual-level data cannot be broadly shared by study investigators due to privacy and Institutional Review Board concerns. In such cases, researchers cannot confirm that each study represents a unique group of people, leading to potentially inflated test statistics and false positives. To resolve this problem, we created a software tool, Gencrypt, which utilizes a security protocol known as one-way cryptographic hashes to allow overlapping participants to be identified without sharing individual-level data. Availability: Gencrypt is freely available under the GNU general public license v3 at http://www.broadinstitute.org/software/gencrypt/ Contact: joelh@broadinstitute.org Supplementary information: Supplementary data are available at Bioinformatics online. PMID:22302573

  16. A message passing kernel for the hypercluster parallel processing test bed

    NASA Technical Reports Server (NTRS)

    Blech, Richard A.; Quealy, Angela; Cole, Gary L.

    1989-01-01

    A Message-Passing Kernel (MPK) for the Hypercluster parallel-processing test bed is described. The Hypercluster is being developed at the NASA Lewis Research Center to support investigations of parallel algorithms and architectures for computational fluid and structural mechanics applications. The Hypercluster resembles the hypercube architecture except that each node consists of multiple processors communicating through shared memory. The MPK efficiently routes information through the Hypercluster, using a message-passing protocol when necessary and faster shared-memory communication whenever possible. The MPK also interfaces all of the processors with the Hypercluster operating system (HYCLOPS), which runs on a Front-End Processor (FEP). This approach distributes many of the I/O tasks to the Hypercluster processors and eliminates the need for a separate I/O support program on the FEP.

  17. Thermodynamic description of non-Markovian information flux of nonequilibrium open quantum systems

    NASA Astrophysics Data System (ADS)

    Chen, Hong-Bin; Chen, Guang-Yin; Chen, Yueh-Nan

    2017-12-01

    One of the fundamental issues in the field of open quantum systems is the classification and quantification of non-Markovianity. In the contest of quantity-based measures of non-Markovianity, the intuition of non-Markovianity in terms of information backflow is widely discussed. However, it is not easy to characterize the information flux for a given system state and show its connection to non-Markovianity. Here, by using the concepts from thermodynamics and information theory, we discuss a potential definition of information flux of an open quantum system, valid for static environments. We present a simple protocol to show how a system attempts to share information with its environment and how it builds up system-environment correlations. We also show that the information returned from the correlations characterizes the non-Markovianity and a hierarchy of indivisibility of the system dynamics.

  18. Building Capacity for a Long-Term, in-Situ, National-Scale Phenology Monitoring Network: Successes, Challenges and Lessons Learned

    NASA Astrophysics Data System (ADS)

    Weltzin, J. F.; Browning, D. M.

    2014-12-01

    The USA National Phenology Network (USA-NPN; www.usanpn.org) is a national-scale science and monitoring initiative focused on phenology - the study of seasonal life-cycle events such as leafing, flowering, reproduction, and migration - as a tool to understand the response of biodiversity to environmental variation and change. USA-NPN provides a hierarchical, national monitoring framework that enables other organizations to leverage the capacity of the Network for their own applications - minimizing investment and duplication of effort - while promoting interoperability. Network participants can leverage: (1) Standardized monitoring protocols that have been broadly vetted, tested and published; (2) A centralized National Phenology Database (NPDb) for maintaining, archiving and replicating data, with standard metadata, terms-of-use, web-services, and documentation of QA/QC, plus tools for discovery, visualization and download of raw data and derived data products; and/or (3) A national in-situ, multi-taxa phenological monitoring system, Nature's Notebook, which enables participants to observe and record phenology of plants and animals - based on the protocols and information management system (IMS) described above - via either web or mobile applications. The protocols, NPDb and IMS, and Nature's Notebook represent a hierarchy of opportunities for involvement by a broad range of interested stakeholders, from individuals to agencies. For example, some organizations have adopted (e.g., the National Ecological Observatory Network or NEON) -- or are considering adopting (e.g., the Long-Term Agroecosystems Network or LTAR) -- the USA-NPN standardized protocols, but will develop their own database and IMS with web services to promote sharing of data with the NPDb. Other organizations (e.g., the Inventory and Monitoring Programs of the National Wildlife Refuge System and the National Park Service) have elected to use Nature's Notebook to support their phenological monitoring programs. We highlight the challenges and benefits of integrating phenology monitoring within existing and emerging national monitoring networks, and showcase opportunities that exist when standardized protocols are adopted and implemented to promote data interoperability and sharing.

  19. Offering to Share: How to Put Heads Together in Autism Neuroimaging

    ERIC Educational Resources Information Center

    Belmonte, Matthew K.; Mazziotta, John C.; Minshew, Nancy J.; Evans, Alan C.; Courchesne, Eric; Dager, Stephen R.; Bookheimer, Susan Y.; Aylward, Elizabeth H.; Amaral, David G.; Cantor, Rita M.; Chugani, Diane C.; Dale, Anders M.; Davatzikos, Christos; Gerig, Guido; Herbert, Martha R.; Lainhart, Janet E.; Murphy, Declan G.; Piven, Joseph; Reiss, Allan L.; Schultz, Robert T.; Zeffiro, Thomas A.; Levi-Pearl, Susan; Lajonchere, Clara; Colamarino, Sophia A.

    2008-01-01

    Data sharing in autism neuroimaging presents scientific, technical, and social obstacles. We outline the desiderata for a data-sharing scheme that combines imaging with other measures of phenotype and with genetics, defines requirements for comparability of derived data and recommendations for raw data, outlines a core protocol including…

  20. Asynchronous reference frame agreement in a quantum network

    NASA Astrophysics Data System (ADS)

    Islam, Tanvirul; Wehner, Stephanie

    2016-03-01

    An efficient implementation of many multiparty protocols for quantum networks requires that all the nodes in the network share a common reference frame. Establishing such a reference frame from scratch is especially challenging in an asynchronous network where network links might have arbitrary delays and the nodes do not share synchronised clocks. In this work, we study the problem of establishing a common reference frame in an asynchronous network of n nodes of which at most t are affected by arbitrary unknown error, and the identities of the faulty nodes are not known. We present a protocol that allows all the correctly functioning nodes to agree on a common reference frame as long as the network graph is complete and not more than t\\lt n/4 nodes are faulty. As the protocol is asynchronous, it can be used with some assumptions to synchronise clocks over a network. Also, the protocol has the appealing property that it allows any existing two-node asynchronous protocol for reference frame agreement to be lifted to a robust protocol for an asynchronous quantum network.

  1. Qualitative thematic analysis of consent forms used in cancer genome sequencing

    PubMed Central

    2011-01-01

    Background Large-scale whole genome sequencing (WGS) studies promise to revolutionize cancer research by identifying targets for therapy and by discovering molecular biomarkers to aid early diagnosis, to better determine prognosis and to improve treatment response prediction. Such projects raise a number of ethical, legal, and social (ELS) issues that should be considered. In this study, we set out to discover how these issues are being handled across different jurisdictions. Methods We examined informed consent (IC) forms from 30 cancer genome sequencing studies to assess (1) stated purpose of sample collection, (2) scope of consent requested, (3) data sharing protocols (4) privacy protection measures, (5) described risks of participation, (6) subject re-contacting, and (7) protocol for withdrawal. Results There is a high degree of similarity in how cancer researchers engaged in WGS are protecting participant privacy. We observed a strong trend towards both using samples for additional, unspecified research and sharing data with other investigators. IC forms were varied in terms of how they discussed re-contacting participants, returning results and facilitating participant withdrawal. Contrary to expectation, there were no consistent trends that emerged over the eight year period from which forms were collected. Conclusion Examining IC forms from WGS studies elucidates how investigators are handling ELS challenges posed by this research. This information is important for ensuring that while the public benefits of research are maximized, the rights of participants are also being appropriately respected. PMID:21771309

  2. Secured Communication for Business Process Outsourcing Using Optimized Arithmetic Cryptography Protocol Based on Virtual Parties

    NASA Astrophysics Data System (ADS)

    Pathak, Rohit; Joshi, Satyadhar

    Within a span of over a decade, India has become one of the most favored destinations across the world for Business Process Outsourcing (BPO) operations. India has rapidly achieved the status of being the most preferred destination for BPO for companies located in the US and Europe. Security and privacy are the two major issues needed to be addressed by the Indian software industry to have an increased and long-term outsourcing contract from the US. Another important issue is about sharing employee’s information to ensure that data and vital information of an outsourcing company is secured and protected. To ensure that the confidentiality of a client’s information is maintained, BPOs need to implement some data security measures. In this paper, we propose a new protocol for specifically for BPO Secure Multi-Party Computation (SMC). As there are many computations and surveys which involve confidential data from many parties or organizations and the concerned data is property of the organization, preservation and security of this data is of prime importance for such type of computations. Although the computation requires data from all the parties, but none of the associated parties would want to reveal their data to the other parties. We have proposed a new efficient and scalable protocol to perform computation on encrypted information. The information is encrypted in a manner that it does not affect the result of the computation. It uses modifier tokens which are distributed among virtual parties, and finally used in the computation. The computation function uses the acquired data and modifier tokens to compute right result from the encrypted data. Thus without revealing the data, right result can be computed and privacy of the parties is maintained. We have given a probabilistic security analysis of hacking the protocol and shown how zero hacking security can be achieved. Also we have analyzed the specific case of Indian BPO.

  3. Public health and terrorism preparedness: cross-border issues.

    PubMed

    Olson, Debra; Leitheiser, Aggie; Atchison, Christopher; Larson, Susan; Homzik, Cassandra

    2005-01-01

    On December 15, 2003, the Centers for Public Health Preparedness at the University of Minnesota and the University of Iowa convened the "Public Health and Terrorism Preparedness: Cross-Border Issues Roundtable." The purpose of the roundtable was to gather public health professionals and government agency representatives at the state, provincial, and local levels to identify unmet cross-border emergency preparedness and response needs and develop strategies for addressing these needs. Representatives from six state and local public health departments and three provincial governments were invited to identify cross-border needs and issues using a nominal group process. The result of the roundtable was identification of the needs considered most important and most doable across all the focus groups. The need to collaborate on and exchange plans and protocols among agencies was identified as most important and most doable across all groups. Development of contact protocols and creation and maintenance of a contact database was also considered important and doable for a majority of groups. Other needs ranked important across the majority of groups included specific isolation and quarantine protocols for multi-state responses; a system for rapid and secure exchange of information; specific protocols for sharing human resources across borders, including emergency credentials for physicians and health care workers; and a specific protocol to coordinate Strategic National Stockpile mechanisms across border communities.

  4. A systematic review of contemporary models of shared HIV care and HIV in primary care in high-income settings.

    PubMed

    Mapp, Fiona; Hutchinson, Jane; Estcourt, Claudia

    2015-12-01

    HIV shared care is uncommon in the UK although shared care could be a beneficial model of care. We review the literature on HIV shared care to determine current practice and clinical, economic and patient satisfaction outcomes. We searched MEDLINE, EMBASE, NICE Evidence, Cochrane collaboration, Google and websites of the British HIV Association, Aidsmap, Public Health England, World Health Organization and Terrence Higgins Trust using relevant search terms in August 2014. Studies published after 2000, from healthcare settings comparable to the UK that described links between primary care and specialised HIV services were included and compared using principles of the Critical Appraisal Skills Programme and Authority, Accuracy, Coverage, Objectivity, Date, Significance frameworks. Three of the nine included models reported clinical or patient satisfaction outcomes but data collection and analyses were inadequate. None reported economic outcomes although some provided financial costings. Facilitators of shared care included robust clinical protocols, training and timely communication. Few published examples of HIV shared care exist and quality of evidence is poor. There is no consistent association with improved clinical outcomes, cost effectiveness or acceptability. Models are context specific, driven by local need, although some generalisable features could inform novel service delivery. Further evaluative research is needed to determine optimal components of shared HIV care. © The Author(s) 2015.

  5. An implementation of the SNR high speed network communication protocol (Receiver part)

    NASA Astrophysics Data System (ADS)

    Wan, Wen-Jyh

    1995-03-01

    This thesis work is to implement the receiver pan of the SNR high speed network transport protocol. The approach was to use the Systems of Communicating Machines (SCM) as the formal definition of the protocol. Programs were developed on top of the Unix system using C programming language. The Unix system features that were adopted for this implementation were multitasking, signals, shared memory, semaphores, sockets, timers and process control. The problems encountered, and solved, were signal loss, shared memory conflicts, process synchronization, scheduling, data alignment and errors in the SCM specification itself. The result was a correctly functioning program which implemented the SNR protocol. The system was tested using different connection modes, lost packets, duplicate packets and large data transfers. The contributions of this thesis are: (1) implementation of the receiver part of the SNR high speed transport protocol; (2) testing and integration with the transmitter part of the SNR transport protocol on an FDDI data link layered network; (3) demonstration of the functions of the SNR transport protocol such as connection management, sequenced delivery, flow control and error recovery using selective repeat methods of retransmission; and (4) modifications to the SNR transport protocol specification such as corrections for incorrect predicate conditions, defining of additional packet types formats, solutions for signal lost and processes contention problems etc.

  6. Benchmarking pediatric cranial CT protocols using a dose tracking software system: a multicenter study.

    PubMed

    De Bondt, Timo; Mulkens, Tom; Zanca, Federica; Pyfferoen, Lotte; Casselman, Jan W; Parizel, Paul M

    2017-02-01

    To benchmark regional standard practice for paediatric cranial CT-procedures in terms of radiation dose and acquisition parameters. Paediatric cranial CT-data were retrospectively collected during a 1-year period, in 3 different hospitals of the same country. A dose tracking system was used to automatically gather information. Dose (CTDI and DLP), scan length, amount of retakes and demographic data were stratified by age and clinical indication; appropriate use of child-specific protocols was assessed. In total, 296 paediatric cranial CT-procedures were collected. Although the median dose of each hospital was below national and international diagnostic reference level (DRL) for all age categories, statistically significant (p-value < 0.001) dose differences among hospitals were observed. The hospital with lowest dose levels showed smallest dose variability and used age-stratified protocols for standardizing paediatric head exams. Erroneous selection of adult protocols for children still occurred, mostly in the oldest age-group. Even though all hospitals complied with national and international DRLs, dose tracking and benchmarking showed that further dose optimization and standardization is possible by using age-stratified protocols for paediatric cranial CT. Moreover, having a dose tracking system revealed that adult protocols are still applied for paediatric CT, a practice that must be avoided. • Significant differences were observed in the delivered dose between age-groups and hospitals. • Using age-adapted scanning protocols gives a nearly linear dose increase. • Sharing dose-data can be a trigger for hospitals to reduce dose levels.

  7. Linking community-based monitoring to water policy: Perceptions of citizen scientists.

    PubMed

    Carlson, Tyler; Cohen, Alice

    2018-05-05

    This paper examines the relationships between Community-Based Water Monitoring (CBM) and government-led water initiatives. Drawing on a cross-Canada survey of over one hundred organizations, we explore the reasons why communities undertake CBM, the monitoring protocols they follow, and the extent to which CBM program members feel their findings are incorporated into formal (i.e., government-led) decision-making processes. Our results indicate that despite following standardized and credible monitoring protocols, fewer than half of CBM organizations report that their data is being used to inform water policy at any level of government. Moreover, respondents report higher rates of cooperation and data-sharing between CBM organizations themselves than between CBM organizations and their respective governments. These findings are significant, because many governments continue to express support for CBM. We explore the barriers between CBM data collection and government policy, and suggest that structural barriers include lack of multi-year funding, inconsistent protocols, and poor communication. More broadly, we argue that the distinction between formal and informal programming is unclear, and that addressing known CBM challenges will rely on a change in perception: CBM cannot simply be a less expensive alternative to government-driven data collection. Copyright © 2018 The Authors. Published by Elsevier Ltd.. All rights reserved.

  8. Self-adaptive trust based ABR protocol for MANETs using Q-learning.

    PubMed

    Kumar, Anitha Vijaya; Jeyapal, Akilandeswari

    2014-01-01

    Mobile ad hoc networks (MANETs) are a collection of mobile nodes with a dynamic topology. MANETs work under scalable conditions for many applications and pose different security challenges. Due to the nomadic nature of nodes, detecting misbehaviour is a complex problem. Nodes also share routing information among the neighbours in order to find the route to the destination. This requires nodes to trust each other. Thus we can state that trust is a key concept in secure routing mechanisms. A number of cryptographic protection techniques based on trust have been proposed. Q-learning is a recently used technique, to achieve adaptive trust in MANETs. In comparison to other machine learning computational intelligence techniques, Q-learning achieves optimal results. Our work focuses on computing a score using Q-learning to weigh the trust of a particular node over associativity based routing (ABR) protocol. Thus secure and stable route is calculated as a weighted average of the trust value of the nodes in the route and associativity ticks ensure the stability of the route. Simulation results show that Q-learning based trust ABR protocol improves packet delivery ratio by 27% and reduces the route selection time by 40% over ABR protocol without trust calculation.

  9. Self-Adaptive Trust Based ABR Protocol for MANETs Using Q-Learning

    PubMed Central

    Jeyapal, Akilandeswari

    2014-01-01

    Mobile ad hoc networks (MANETs) are a collection of mobile nodes with a dynamic topology. MANETs work under scalable conditions for many applications and pose different security challenges. Due to the nomadic nature of nodes, detecting misbehaviour is a complex problem. Nodes also share routing information among the neighbours in order to find the route to the destination. This requires nodes to trust each other. Thus we can state that trust is a key concept in secure routing mechanisms. A number of cryptographic protection techniques based on trust have been proposed. Q-learning is a recently used technique, to achieve adaptive trust in MANETs. In comparison to other machine learning computational intelligence techniques, Q-learning achieves optimal results. Our work focuses on computing a score using Q-learning to weigh the trust of a particular node over associativity based routing (ABR) protocol. Thus secure and stable route is calculated as a weighted average of the trust value of the nodes in the route and associativity ticks ensure the stability of the route. Simulation results show that Q-learning based trust ABR protocol improves packet delivery ratio by 27% and reduces the route selection time by 40% over ABR protocol without trust calculation. PMID:25254243

  10. The SWITCH-ON Virtual Water-Science Laboratory

    NASA Astrophysics Data System (ADS)

    Arheimer, Berit; Boot, Gerben; Calero, Joan; Ceola, Serena; Gyllensvärd, Frida; Hrachowitz, Markus; Little, Lorna; Montanari, Alberto; Nijzink, Remko; Parajka, Juraj; Wagener, Thorsten

    2017-04-01

    The SWITCH-ON Virtual Water-Science Laboratory (VWSL) aims to facilitate collaboration and support reproducible experiments in water research. The goal is to overcome geographical distance for comparative hydrology and increase transparency when using computational tools in hydrological sciences. The VWSL gives access to open data through dedicated software tools for data search and upload, and helps creating collaborative protocols for joint experiments in the virtual environment. The VWSL will help scientists with: • Cooperation around the world - straightforward connections with other scientists in comparative analyses and collaboration, as a mean to accelerate scientific advance in hydrology. • Repeatability of experiments -thorough review of a large variety of numerical experiments, which is a foundational principle in scientific research, and improvement of research standards. • New forms of scientific research - by using online 'living' protocols, scientists you can elaborate ideas incrementally with a large group of colleagues and share data, tools, models, etc. in open science. The VWSL was developed within the EU project "Sharing Water Information to Tackle Changes in Hydrology - for Operational Needs" (Grant agreement No 603587). Visitors can choose to Define, Participate or Review experiments by clicking the start buttons (http://www.switch-on-vwsl.eu/). Anyone can view protocols without log-in (that's important for Open Science) - but to create, participate and edit protocols, you need to Log-in for security reasons. During the work process, the protocol is moved from one view to another as the experiment evolves from idea, to on-going, to be completed. The users of the Lab also get access to useful tools for running collaborative experiments, for instance: Open data Search, Data (and metadata) Upload, and Create Protocol tools. So far, eight collaborative experiments have been completed in the VWSL and resulted in research papers (published or submitted), and there are currently four on-going experiments, which also involves external participants, not paid by the project. The VWSL is now launched and open to everyone but it will be continuously developed and sustained also after the project. This presentation will give an on-line demonstration of the major features of the present VWSL and discuss some future visions and major challenges in this e-infrastructure.

  11. P2P proteomics -- data sharing for enhanced protein identification

    PubMed Central

    2012-01-01

    Background In order to tackle the important and challenging problem in proteomics of identifying known and new protein sequences using high-throughput methods, we propose a data-sharing platform that uses fully distributed P2P technologies to share specifications of peer-interaction protocols and service components. By using such a platform, information to be searched is no longer centralised in a few repositories but gathered from experiments in peer proteomics laboratories, which can subsequently be searched by fellow researchers. Methods The system distributively runs a data-sharing protocol specified in the Lightweight Communication Calculus underlying the system through which researchers interact via message passing. For this, researchers interact with the system through particular components that link to database querying systems based on BLAST and/or OMSSA and GUI-based visualisation environments. We have tested the proposed platform with data drawn from preexisting MS/MS data reservoirs from the 2006 ABRF (Association of Biomolecular Resource Facilities) test sample, which was extensively tested during the ABRF Proteomics Standards Research Group 2006 worldwide survey. In particular we have taken the data available from a subset of proteomics laboratories of Spain's National Institute for Proteomics, ProteoRed, a network for the coordination, integration and development of the Spanish proteomics facilities. Results and Discussion We performed queries against nine databases including seven ProteoRed proteomics laboratories, the NCBI Swiss-Prot database and the local database of the CSIC/UAB Proteomics Laboratory. A detailed analysis of the results indicated the presence of a protein that was supported by other NCBI matches and highly scored matches in several proteomics labs. The analysis clearly indicated that the protein was a relatively high concentrated contaminant that could be present in the ABRF sample. This fact is evident from the information that could be derived from the proposed P2P proteomics system, however it is not straightforward to arrive to the same conclusion by conventional means as it is difficult to discard organic contamination of samples. The actual presence of this contaminant was only stated after the ABRF study of all the identifications reported by the laboratories. PMID:22293032

  12. Unconditional security of entanglement-based continuous-variable quantum secret sharing

    NASA Astrophysics Data System (ADS)

    Kogias, Ioannis; Xiang, Yu; He, Qiongyi; Adesso, Gerardo

    2017-01-01

    The need for secrecy and security is essential in communication. Secret sharing is a conventional protocol to distribute a secret message to a group of parties, who cannot access it individually but need to cooperate in order to decode it. While several variants of this protocol have been investigated, including realizations using quantum systems, the security of quantum secret sharing schemes still remains unproven almost two decades after their original conception. Here we establish an unconditional security proof for entanglement-based continuous-variable quantum secret sharing schemes, in the limit of asymptotic keys and for an arbitrary number of players. We tackle the problem by resorting to the recently developed one-sided device-independent approach to quantum key distribution. We demonstrate theoretically the feasibility of our scheme, which can be implemented by Gaussian states and homodyne measurements, with no need for ideal single-photon sources or quantum memories. Our results contribute to validating quantum secret sharing as a viable primitive for quantum technologies.

  13. The NASA Scientific and Technical Information (STI) Program's Implementation of Open Archives Initiation (OAI) for Data Interoperability and Data Exchange

    NASA Technical Reports Server (NTRS)

    Rocker, JoAnne; Roncaglia, George J.; Heimerl, Lynn N.; Nelson, Michael L.

    2002-01-01

    Interoperability and data-exchange are critical for the survival of government information management programs. E-government initiatives are transforming the way the government interacts with the public. More information is to be made available through web-enabled technologies. Programs such as the NASA's Scientific and Technical Information (STI) Program Office are tasked to find more effective ways to disseminate information to the public. The NASA STI Program is an agency-wide program charged with gathering, organizing, storing, and disseminating NASA-produced information for research and public use. The program is investigating the use of a new protocol called the Open Archives Initiative (OAI) as a means to improve data interoperability and data collection. OAI promotes the use of the OAI harvesting protocol as a simple way for data sharing among repositories. In two separate initiatives, the STI Program is implementing OAI In collaboration with the Air Force, Department of Energy, and Old Dominion University, the NASA STI Program has funded research on implementing the OAI to exchange data between the three organizations. The second initiative is the deployment of OAI for the NASA technical report server (TRS) environment. The NASA TRS environment is comprised of distributed technical report servers with a centralized search interface. This paper focuses on the implementation of OAI to promote interoperability among diverse data repositories.

  14. From public health to international law: possible protocols for inclusion in the Framework Convention on Tobacco Control.

    PubMed Central

    Joossens, L.

    2000-01-01

    Faced with a difficult business environment in the United States and the falling demand for cigarettes in industrialized countries, multinational tobacco companies have been competing fiercely to expand their sales in developing countries. Because of the worldwide threat posed by smoking to health and the emphasis being placed by international tobacco companies on marketing in developing countries, an international regulatory strategy, such as the WHO proposed Framework Convention on Tobacco Control, is needed. This review describes from a public health perspective the possible scope and key considerations of protocols that should be included in the convention. The key international areas that should be considered in tobacco control are: prices, smuggling; tax-free tobacco products; advertising and sponsorship; the Internet; testing methods; package design and labelling; agriculture; and information sharing. PMID:10994267

  15. A radiology department intranet: development and applications.

    PubMed

    Willing, S J; Berland, L L

    1999-01-01

    An intranet is a "private Internet" that uses the protocols of the World Wide Web to share information resources within a company or with the company's business partners and clients. The hardware requirements for an intranet begin with a dedicated Web server permanently connected to the departmental network. The heart of a Web server is the hypertext transfer protocol (HTTP) service, which receives a page request from a client's browser and transmits the page back to the client. Although knowledge of hypertext markup language (HTML) is not essential for authoring a Web page, a working familiarity with HTML is useful, as is knowledge of programming and database management. Security can be ensured by using scripts to write information in hidden fields or by means of "cookies." Interfacing databases and database management systems with the Web server and conforming the user interface to HTML syntax can be achieved by means of the common gateway interface (CGI), Active Server Pages (ASP), or other methods. An intranet in a radiology department could include the following types of content: on-call schedules, work schedules and a calendar, a personnel directory, resident resources, memorandums and discussion groups, software for a radiology information system, and databases.

  16. From Chaos to Content: An Integrated Approach to Government Web Sites

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Demuth, Nora H.; Knudson, Christa K.

    2005-01-03

    The web development team of the Environmental Technology Directorate (ETD) at the U.S. Department of Energy’s Pacific Northwest National Laboratory (PNNL) redesigned the ETD website as a database-driven system, powered by the newly designed ETD Common Information System (ETD-CIS). The ETD website was redesigned in response to an analysis that showed the previous ETD websites were inefficient, costly, and lacking in a consistent focus. Redesigned and newly created websites based on a new ETD template provide a consistent image, meet or exceed accessibility standards, and are linked through a common database. The protocols used in developing the ETD website supportmore » integration of further organizational sites and facilitate internal use by staff and training on ETD website development and maintenance. Other PNNL organizations have approached the ETD web development team with an interest in applying the methods established by the ETD system. The ETD system protocol could potentially be used by other DOE laboratories to improve their website efficiency and content focus. “The tools by which we share science information must be as extraordinary as the information itself.[ ]” – DOE Science Director Raymond Orbach« less

  17. Reviews of theoretical frameworks: Challenges and judging the quality of theory application.

    PubMed

    Hean, Sarah; Anderson, Liz; Green, Chris; John, Carol; Pitt, Richard; O'Halloran, Cath

    2016-06-01

    Rigorous reviews of available information, from a range of resources, are required to support medical and health educators in their decision making. The aim of this article is to highlight the importance of a review of theoretical frameworks specifically as a supplement to reviews that focus on a synthesis of the empirical evidence alone. Establishing a shared understanding of theory as a concept is highlighted as a challenge and some practical strategies to achieving this are presented. This article also introduces the concept of theoretical quality, arguing that a critique of how theory is applied should complement the methodological appraisal of the literature in a review. We illustrate the challenge of establishing a shared meaning of theory through reference to experiences of an on-going review of this kind conducted in the field of interprofessional education (IPE) and use a high scoring paper selected in this review to illustrate how theoretical quality can be assessed. In reaching a shared understanding of theory as a concept, practical strategies that promote experiential and practical ways of knowing are required in addition to more propositional ways of sharing knowledge. Concepts of parsimony, testability, operational adequacy and empirical adequacy are explored as concepts that establish theoretical quality. Reviews of theoretical frameworks used in medical education are required to inform educational practice. Review teams should make time and effort to reach a shared understanding of the term theory. Theory reviews, and reviews more widely, should add an assessment of theory application to the protocol of their review method.

  18. Evolution equation for quantum entanglement

    NASA Astrophysics Data System (ADS)

    Konrad, Thomas; de Melo, Fernando; Tiersch, Markus; Kasztelan, Christian; Aragão, Adriano; Buchleitner, Andreas

    2008-02-01

    Quantum information technology largely relies on a precious and fragile resource, quantum entanglement, a highly non-trivial manifestation of the coherent superposition of states of composite quantum systems. However, our knowledge of the time evolution of this resource under realistic conditions-that is, when corrupted by environment-induced decoherence-is so far limited, and general statements on entanglement dynamics in open systems are scarce. Here we prove a simple and general factorization law for quantum systems shared by two parties, which describes the time evolution of entanglement on passage of either component through an arbitrary noisy channel. The robustness of entanglement-based quantum information processing protocols is thus easily and fully characterized by a single quantity.

  19. A shared computer-based problem-oriented patient record for the primary care team.

    PubMed

    Linnarsson, R; Nordgren, K

    1995-01-01

    1. INTRODUCTION. A computer-based patient record (CPR) system, Swedestar, has been developed for use in primary health care. The principal aim of the system is to support continuous quality improvement through improved information handling, improved decision-making, and improved procedures for quality assurance. The Swedestar system has evolved during a ten-year period beginning in 1984. 2. SYSTEM DESIGN. The design philosophy is based on the following key factors: a shared, problem-oriented patient record; structured data entry based on an extensive controlled vocabulary; advanced search and query functions, where the query language has the most important role; integrated decision support for drug prescribing and care protocols and guidelines; integrated procedures for quality assurance. 3. A SHARED PROBLEM-ORIENTED PATIENT RECORD. The core of the CPR system is the problem-oriented patient record. All problems of one patient, recorded by different members of the care team, are displayed on the problem list. Starting from this list, a problem follow-up can be made, one problem at a time or for several problems simultaneously. Thus, it is possible to get an integrated view, across provider categories, of those problems of one patient that belong together. This shared problem-oriented patient record provides an important basis for the primary care team work. 4. INTEGRATED DECISION SUPPORT. The decision support of the system includes a drug prescribing module and a care protocol module. The drug prescribing module is integrated with the patient records and includes an on-line check of the patient's medication list for potential interactions and data-driven reminders concerning major drug problems. Care protocols have been developed for the most common chronic diseases, such as asthma, diabetes, and hypertension. The patient records can be automatically checked according to the care protocols. 5. PRACTICAL EXPERIENCE. The Swedestar system has been implemented in a primary care area with 30,000 inhabitants. It is being used by all the primary care team members: 15 general practitioners, 25 district nurses, and 10 physiotherapists. Several years of practical experience of the CPR system shows that it has a positive impact on quality of care on four levels: 1) improved clinical follow-up of individual patients; 2) facilitated follow-up of aggregated data such as practice activity analysis, annual reports, and clinical indicators; 3) automated medical audit; and 4) concurrent audit. Within that primary care area, quality of care has improved substantially in several aspects due to the use of the CPR system [1].

  20. Input of Psychosocial Information During Multidisciplinary Team Meetings at Medical Oncology Departments: Protocol for an Observational Study.

    PubMed

    Horlait, Melissa; Van Belle, Simon; Leys, Mark

    2018-02-26

    Multidisciplinary team meetings (MDTMs) have become standard practice in oncology and gained the status of the key decision-making forum for cancer patient management. The current literature provides evidence that MDTMs are achieving their intended objectives but there are also indications to question the positive impact of MDTMs in oncology settings. For cancer management to be patient-centered, it is crucial that medical information as well as psychosocial aspects-such as the patients' living situation, possible family problems, patients' mental state, and patients' perceptions and values or preferences towards treatment or care-are considered and discussed during MDTMs. Previous studies demonstrate that failure to account for patients' psychosocial information has a negative impact on the implementation of the treatment recommendations formulated during MDTMs. Few empirical studies have demonstrated the predominant role of physicians during MDTMs, leading to the phenomenon that medical information is shared almost exclusively at the expense of psychosocial information. However, more in-depth insight on the underlying reasons why MDTMs fail to take into account psychosocial information of cancer patients is needed. This paper presents a research protocol for a cross-sectional observational study that will focus on exploring the barriers to considering psychosocial information during MDTMs at medical oncology departments. This protocol encompasses a cross-sectional comparative case study of MDTMs at medical oncology departments in Flanders, Belgium. MDTMs from various oncology subspecialties at inpatient medical oncology departments in multiple hospitals (academic as well as general hospitals) are compared. The observations focus on the "multidisciplinary oncology consultation" (MOC), a formally regulated and financed type of MDTM in Belgian oncology since 2003. Data are collected through nonparticipant observations of MOC-meetings. Observational data are supplemented with semi-structured individual interviews with members of the MOC-meetings. The protocol is part of a larger research project on communication and multidisciplinary collaboration in oncology departments. Results of this study will particularly focus on the input of psychosocial information during MDTMs. The concept of an MDTM should not merely be a group of care professionals who mostly work independently and occasionally liaise with one another. Interventions aiming to enhance the input of psychosocial information are crucial to ensure that MDTMs can benefit from their diverse membership to achieve their full potential. The findings from this study can be used to design nonclinical and organizational interventions that enhance multidisciplinary decision-making in oncology. ©Melissa Horlait, Simon Van Belle, Mark Leys. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 26.02.2018.

  1. Experimental Blind Quantum Computing for a Classical Client.

    PubMed

    Huang, He-Liang; Zhao, Qi; Ma, Xiongfeng; Liu, Chang; Su, Zu-En; Wang, Xi-Lin; Li, Li; Liu, Nai-Le; Sanders, Barry C; Lu, Chao-Yang; Pan, Jian-Wei

    2017-08-04

    To date, blind quantum computing demonstrations require clients to have weak quantum devices. Here we implement a proof-of-principle experiment for completely classical clients. Via classically interacting with two quantum servers that share entanglement, the client accomplishes the task of having the number 15 factorized by servers who are denied information about the computation itself. This concealment is accompanied by a verification protocol that tests servers' honesty and correctness. Our demonstration shows the feasibility of completely classical clients and thus is a key milestone towards secure cloud quantum computing.

  2. What CFOs should know before venturing into the cloud.

    PubMed

    Rajendran, Janakan

    2013-05-01

    There are three major trends in the use of cloud-based services for healthcare IT: Cloud computing involves the hosting of health IT applications in a service provider cloud. Cloud storage is a data storage service that can involve, for example, long-term storage and archival of information such as clinical data, medical images, and scanned documents. Data center colocation involves rental of secure space in the cloud from a vendor, an approach that allows a hospital to share power capacity and proven security protocols, reducing costs.

  3. Experimental Blind Quantum Computing for a Classical Client

    NASA Astrophysics Data System (ADS)

    Huang, He-Liang; Zhao, Qi; Ma, Xiongfeng; Liu, Chang; Su, Zu-En; Wang, Xi-Lin; Li, Li; Liu, Nai-Le; Sanders, Barry C.; Lu, Chao-Yang; Pan, Jian-Wei

    2017-08-01

    To date, blind quantum computing demonstrations require clients to have weak quantum devices. Here we implement a proof-of-principle experiment for completely classical clients. Via classically interacting with two quantum servers that share entanglement, the client accomplishes the task of having the number 15 factorized by servers who are denied information about the computation itself. This concealment is accompanied by a verification protocol that tests servers' honesty and correctness. Our demonstration shows the feasibility of completely classical clients and thus is a key milestone towards secure cloud quantum computing.

  4. Communication security in open health care networks.

    PubMed

    Blobel, B; Pharow, P; Engel, K; Spiegel, V; Krohn, R

    1999-01-01

    Fulfilling the shared care paradigm, health care networks providing open systems' interoperability in health care are needed. Such communicating and co-operating health information systems, dealing with sensitive personal medical information across organisational, regional, national or even international boundaries, require appropriate security solutions. Based on the generic security model, within the European MEDSEC project an open approach for secure EDI like HL7, EDIFACT, XDT or XML has been developed. The consideration includes both securing the message in an unsecure network and the transport of the unprotected information via secure channels (SSL, TLS etc.). Regarding EDI, an open and widely usable security solution has been specified and practically implemented for the examples of secure mailing and secure file transfer (FTP) via wrapping the sensitive information expressed by the corresponding protocols. The results are currently prepared for standardisation.

  5. Motivations, concerns and preferences of personal genome sequencing research participants: Baseline findings from the HealthSeq project

    PubMed Central

    Sanderson, Saskia C; Linderman, Michael D; Suckiel, Sabrina A; Diaz, George A; Zinberg, Randi E; Ferryman, Kadija; Wasserstein, Melissa; Kasarskis, Andrew; Schadt, Eric E

    2016-01-01

    Whole exome/genome sequencing (WES/WGS) is increasingly offered to ostensibly healthy individuals. Understanding the motivations and concerns of research participants seeking out personal WGS and their preferences regarding return-of-results and data sharing will help optimize protocols for WES/WGS. Baseline interviews including both qualitative and quantitative components were conducted with research participants (n=35) in the HealthSeq project, a longitudinal cohort study of individuals receiving personal WGS results. Data sharing preferences were recorded during informed consent. In the qualitative interview component, the dominant motivations that emerged were obtaining personal disease risk information, satisfying curiosity, contributing to research, self-exploration and interest in ancestry, and the dominant concern was the potential psychological impact of the results. In the quantitative component, 57% endorsed concerns about privacy. Most wanted to receive all personal WGS results (94%) and their raw data (89%); a third (37%) consented to having their data shared to the Database of Genotypes and Phenotypes (dbGaP). Early adopters of personal WGS in the HealthSeq project express a variety of health- and non-health-related motivations. Almost all want all available findings, while also expressing concerns about the psychological impact and privacy of their results. PMID:26036856

  6. Enabling information management systems in tactical network environments

    NASA Astrophysics Data System (ADS)

    Carvalho, Marco; Uszok, Andrzej; Suri, Niranjan; Bradshaw, Jeffrey M.; Ceccio, Philip J.; Hanna, James P.; Sinclair, Asher

    2009-05-01

    Net-Centric Information Management (IM) and sharing in tactical environments promises to revolutionize forward command and control capabilities by providing ubiquitous shared situational awareness to the warfighter. This vision can be realized by leveraging the tactical and Mobile Ad hoc Networks (MANET) which provide the underlying communications infrastructure, but, significant technical challenges remain. Enabling information management in these highly dynamic environments will require multiple support services and protocols which are affected by, and highly dependent on, the underlying capabilities and dynamics of the tactical network infrastructure. In this paper we investigate, discuss, and evaluate the effects of realistic tactical and mobile communications network environments on mission-critical information management systems. We motivate our discussion by introducing the Advanced Information Management System (AIMS) which is targeted for deployment in tactical sensor systems. We present some operational requirements for AIMS and highlight how critical IM support services such as discovery, transport, federation, and Quality of Service (QoS) management are necessary to meet these requirements. Our goal is to provide a qualitative analysis of the impact of underlying assumptions of availability and performance of some of the critical services supporting tactical information management. We will also propose and describe a number of technologies and capabilities that have been developed to address these challenges, providing alternative approaches for transport, service discovery, and federation services for tactical networks.

  7. Quantum dense key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.

    2004-03-01

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.

  8. Protocol for the ProCare Trial: a phase II randomised controlled trial of shared care for follow-up of men with prostate cancer

    PubMed Central

    Emery, Jon; Doorey, Juanita; Jefford, Michael; King, Madeleine; Pirotta, Marie; Hayne, Dickon; Martin, Andrew; Trevena, Lyndal; Lim, Tee; Constable, Roger; Hawks, Cynthia; Hyatt, Amelia; Hamid, Akhlil; Violet, John; Gill, Suki; Frydenberg, Mark; Schofield, Penelope

    2014-01-01

    Introduction Men with prostate cancer require long-term follow-up to monitor disease progression and manage common adverse physical and psychosocial consequences of treatment. There is growing recognition of the potential role of primary care in cancer follow-up. This paper describes the protocol for a phase II multisite randomised controlled trial of a novel model of shared care for the follow-up of men after completing treatment for low-moderate risk prostate cancer. Methods and analysis The intervention is a shared care model of follow-up visits in the first 12 months after completing treatment for prostate cancer with the following specific components: a survivorship care plan, general practitioner (GP) management guidelines, register and recall systems, screening for distress and unmet needs and patient information resources. Eligible men will have completed surgery and/or radiotherapy for low-moderate risk prostate cancer within the previous 8 weeks and have a GP who consents to participate. Ninety men will be randomised to the intervention or current hospital follow-up care. Study outcome measures will be collected at baseline, 3, 6 and 12 months and include anxiety, depression, unmet needs, prostate cancer-specific quality of life and satisfaction with care. Clinical processes and healthcare resource usage will also be measured. The principal emphasis of the analysis will be on obtaining estimates of the treatment effect size and assessing feasibility in order to inform the design of a subsequent phase III trial. Ethics and dissemination Ethics approval has been granted by the University of Western Australia and from all hospital recruitment sites in Western Australia and Victoria. Results of this phase II trial will be reported in peer-reviewed publications and in conference presentations. Trial Registration Australian New Zealand Clinical Trial Registry ACTRN12610000938000 PMID:24604487

  9. Efficient Group Coordination in Multicast Trees

    DTIC Science & Technology

    2001-01-01

    describe a novel protocol to coordinate multipoint groupwork within the IP-multicast framework. The protocol supports Internet-wide coordination for large...and highly-interactive groupwork , relying on the dissemination of coordination directives among group members across a shared end-to-end multicast

  10. Advanced orbiting systems test-bedding and protocol verification

    NASA Technical Reports Server (NTRS)

    Noles, James; De Gree, Melvin

    1989-01-01

    The Consultative Committee for Space Data Systems (CCSDS) has begun the development of a set of protocol recommendations for Advanced Orbiting Systems (SOS). The AOS validation program and formal definition of AOS protocols are reviewed, and the configuration control of the AOS formal specifications is summarized. Independent implementations of the AOS protocols by NASA and ESA are discussed, and cross-support/interoperability tests which will allow the space agencies of various countries to share AOS communication facilities are addressed.

  11. Digital Photograph Security: What Plastic Surgeons Need to Know.

    PubMed

    Thomas, Virginia A; Rugeley, Patricia B; Lau, Frank H

    2015-11-01

    Sharing and storing digital patient photographs occur daily in plastic surgery. Two major risks associated with the practice, data theft and Health Insurance Portability and Accountability Act (HIPAA) violations, have been dramatically amplified by high-speed data connections and digital camera ubiquity. The authors review what plastic surgeons need to know to mitigate those risks and provide recommendations for implementing an ideal, HIPAA-compliant solution for plastic surgeons' digital photography needs: smartphones and cloud storage. Through informal discussions with plastic surgeons, the authors identified the most common photograph sharing and storage methods. For each method, a literature search was performed to identify the risks of data theft and HIPAA violations. HIPAA violation risks were confirmed by the second author (P.B.R.), a compliance liaison and privacy officer. A comprehensive review of HIPAA-compliant cloud storage services was performed. When possible, informal interviews with cloud storage services representatives were conducted. The most common sharing and storage methods are not HIPAA compliant, and several are prone to data theft. The authors' review of cloud storage services identified six HIPAA-compliant vendors that have strong to excellent security protocols and policies. These options are reasonably priced. Digital photography and technological advances offer major benefits to plastic surgeons but are not without risks. A proper understanding of data security and HIPAA regulations needs to be applied to these technologies to safely capture their benefits. Cloud storage services offer efficient photograph sharing and storage with layers of security to ensure HIPAA compliance and mitigate data theft risk.

  12. Electronic health records and cardiac implantable electronic devices: new paradigms and efficiencies.

    PubMed

    Slotwiner, David J

    2016-10-01

    The anticipated advantages of electronic health records (EHRs)-improved efficiency and the ability to share information across the healthcare enterprise-have so far failed to materialize. There is growing recognition that interoperability holds the key to unlocking the greatest value of EHRs. Health information technology (HIT) systems including EHRs must be able to share data and be able to interpret the shared data. This requires a controlled vocabulary with explicit definitions (data elements) as well as protocols to communicate the context in which each data element is being used (syntactic structure). Cardiac implantable electronic devices (CIEDs) provide a clear example of the challenges faced by clinicians when data is not interoperable. The proprietary data formats created by each CIED manufacturer, as well as the multiple sources of data generated by CIEDs (hospital, office, remote monitoring, acute care setting), make it challenging to aggregate even a single patient's data into an EHR. The Heart Rhythm Society and CIED manufacturers have collaborated to develop and implement international standard-based specifications for interoperability that provide an end-to-end solution, enabling structured data to be communicated from CIED to a report generation system, EHR, research database, referring physician, registry, patient portal, and beyond. EHR and other health information technology vendors have been slow to implement these tools, in large part, because there have been no financial incentives for them to do so. It is incumbent upon us, as clinicians, to insist that the tools of interoperability be a prerequisite for the purchase of any and all health information technology systems.

  13. Database integration of protocol-specific neurological imaging datasets

    PubMed Central

    Pacurar, Emil E.; Sethi, Sean K.; Habib, Charbel; Laze, Marius O.; Martis-Laze, Rachel; Haacke, E. Mark

    2016-01-01

    For many years now, Magnetic Resonance Innovations (MR Innovations), a magnetic resonance imaging (MRI) software development, technology, and research company, has been aggregating a multitude of MRI data from different scanning sites through its collaborations and research contracts. The majority of the data has adhered to neuroimaging protocols developed by our group which has helped ensure its quality and consistency. The protocols involved include the study of: traumatic brain injury, extracranial venous imaging for multiple sclerosis and Parkinson's disease, and stroke. The database has proven invaluable in helping to establish disease biomarkers, validate findings across multiple data sets, develop and refine signal processing algorithms, and establish both public and private research collaborations. Myriad Masters and PhD dissertations have been possible thanks to the availability of this database. As an example of a project that cuts across diseases, we have used the data and specialized software to develop new guidelines for detecting cerebral microbleeds. Ultimately, the database has been vital in our ability to provide tools and information for researchers and radiologists in diagnosing their patients, and we encourage collaborations and welcome sharing of similar data in this database. PMID:25959660

  14. Applying standards to ICT models, tools and data in Europe to improve river basin networks and spread innovation on water sector

    NASA Astrophysics Data System (ADS)

    Pesquer, Lluís; Jirka, Simon; van de Giesen, Nick; Masó, Joan; Stasch, Christoph; Van Nooyen, Ronald; Prat, Ester; Pons, Xavier

    2015-04-01

    This work describes the strategy of the European Horizon 2020 project WaterInnEU. Its vision is to enhance the exploitation of EU funded ICT models, tools, protocols and policy briefs related to the water sector and to establish suitable conditions for new market opportunities based on these offerings. The main goals are: • Connect the research results and developments of previous EU funded activities with the already existing data available on European level and also with to the companies that are able to offer products and services based on these tools and data. • Offer an independent marketplace platform complemented by technical and commercial expertise as a service for users to allow the access to products and services best fitting their priorities, capabilities and procurement processes. One of the pillars of WaterInnEU is to stimulate and prioritize the application of international standards into ICT tools and policy briefs. The standardization of formats, services and processes will allow for a harmonized water management between different sectors, fragmented areas and scales (local, regional or international) approaches. Several levels of interoperability will be addressed: • Syntactic: Connecting system and tools together: Syntactic interoperability allows for client and service tools to automatically discover, access, and process data and information (query and exchange parts of a database) and to connect each other in process chains. The discovery of water related data is achieved using metadata cataloguing standards and, in particular, the one adopted by the INSPIRE directive: OGC Catalogue Service for the Web (CSW). • Semantic: Sharing a pan-European conceptual framework This is the ability of computer systems to exchange data with unambiguous, shared meaning. The project therefore addresses not only the packaging of data (syntax), but also the simultaneous transmission of the meaning with the data (semantics). This is accomplished by linking each data element to a controlled, shared vocabulary. In Europe, INSPIRE defines a shared vocabulary and its associated links to an ontology. For hydrographical information this can be used as a baseline. • Organizational: Harmonizing policy aspects This level of interoperability deals with operational methodologies and procedures that organizations use to administrate their own data and processing capabilities and to share those capabilities with others. This layer is addressed by the adoption of common policy briefs that facilitate both robust protocols and flexibility to interact with others. • Data visualization: Making data easy to see The WMS and WMTS standards are the most commonly used geographic information visualization standards for sharing information in web portals. Our solution will incorporate a quality extension of these standards for visualizing data quality as nested layers linked to the different data sets. In the presented approach, the use of standards can be seen twofold: the tools and products should leverage standards wherever possible to ensure interoperability between solution providers, and the platform itself must utilize standards as much as possible, to allow for example the integration with other systems through open APIs or the description of available items.

  15. Detector-device-independent quantum secret sharing with source flaws.

    PubMed

    Yang, Xiuqing; Wei, Kejin; Ma, Haiqiang; Liu, Hongwei; Yin, Zhenqiang; Cao, Zhu; Wu, Lingan

    2018-04-10

    Measurement-device-independent entanglement witness (MDI-EW) plays an important role for detecting entanglement with untrusted measurement device. We present a double blinding-attack on a quantum secret sharing (QSS) protocol based on GHZ state. Using the MDI-EW method, we propose a QSS protocol against all detector side-channels. We allow source flaws in practical QSS system, so that Charlie can securely distribute a key between the two agents Alice and Bob over long distances. Our protocol provides condition on the extracted key rate for the secret against both external eavesdropper and arbitrary dishonest participants. A tight bound for collective attacks can provide good bounds on the practical QSS with source flaws. Then we show through numerical simulations that using single-photon source a secure QSS over 136 km can be achieved.

  16. Meeting Submission Deadlines--A Shared Responsibility.

    ERIC Educational Resources Information Center

    Nachby, Andrew L.

    1979-01-01

    A research administrator is seen as one who provides an environment conducive to the performance of research by allowing the principal investigator to spend as little time as possible with administrative paperwork. A protocol routing sheet and a checklist for protocol submissions are provided. (MLW)

  17. A Report of the Joint Development of a Prototype Communications Link to Share Nuclear Accident Dispersion and Dose Assessment Modeling Products Between JAERI/WSPEEDI and LLNL/NARAC

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sullivan, T J; Belles, R D; Ellis, J S

    2001-05-01

    In June of 1997, under an umbrella Memorandum of Understanding between the Japan Atomic Energy Research Institute (JAERI) and the U.S. Department of Energy (US/DOE) concerning matters of nuclear research and development, a Specific Memorandum of Agreement (SMA) entitled ''A Collaborative Programme of Development of a Prototype Communication Link to Share Atmospheric Dispersion and Dose Assessment Modelling Products'' was signed. This SMA formalized an informal collaborative exchange between the DOE's Lawrence Livermore National Laboratory (LLNL) Atmospheric Release Advisory Capability (ARAC) center and the Japan Atomic Energy Research Institute (JAERI) Worldwide System for Prediction of Environmental Emergency Dose Information (WSPEEDI). Themore » intended objective of this agreement was to explore various modes of information exchange, beyond facsimile transmission, which could provide for the quick exchange of information between two major nuclear emergency dose assessment and prediction national centers to provide consistency checks and data exchange before public release of their calculations. The extreme sensitivity of the general public to any nuclear accident information has been a strong motivation to seek peer preview prior to public release. Other intended objectives of this work are the development of an affordable/accessible system for distribution of prediction results to other countries having no prediction capabilities and utilization of the link for collaboration studies. To fulfill the objectives of this project JAERI and LLNL scientists determined to assess the evolving Internet and rapidly emerging communications application software. Our timing was a little early in 1997-1998 but nonetheless a few candidate software packages were found, evaluated and a selection was made for initial test and evaluation. Subsequently several new candidate software packages have arrived, albeit with limitations. This report outlines the ARAC and JAERI emergency response assessment systems, describes the prototype communications protocol system established and the tools evaluated in that process. Three real-time applications of the information exchange protocol and lessons learned are discussed and then some conclusions and future plans are presented.« less

  18. Patient-Centered Imaging: Shared Decision Making for Cardiac Imaging Procedures with Exposure to Ionizing Radiation

    PubMed Central

    Einstein, Andrew J.; Berman, Daniel S.; Min, James K.; Hendel, Robert C.; Gerber, Thomas C.; Carr, J. Jeffrey; Cerqueira, Manuel D.; Cullom, S. James; DeKemp, Robert; Dickert, Neal; Dorbala, Sharmila; Garcia, Ernest V.; Gibbons, Raymond J.; Halliburton, Sandra S.; Hausleiter, Jörg; Heller, Gary V.; Jerome, Scott; Lesser, John R.; Fazel, Reza; Raff, Gilbert L.; Tilkemeier, Peter; Williams, Kim A.; Shaw, Leslee J.

    2014-01-01

    Objective To identify key components of a radiation accountability framework fostering patient-centered imaging and shared decision-making in cardiac imaging. Background An NIH-NHLBI/NCI-sponsored symposium was held in November 2012 to address these issues. Methods Symposium participants, working in three tracks, identified key components of a framework to target critical radiation safety issues for the patient, the laboratory, and the larger population of patients with known or suspected cardiovascular disease. Results Use of ionizing radiation during an imaging procedure should be disclosed to all patients by the ordering provider at the time of ordering, and reinforced by the performing provider team. An imaging protocol with effective dose ≤3mSv is considered very low risk, not warranting extensive discussion or written consent. However, a protocol effective dose <20mSv was proposed as a level requiring particular attention in terms of shared decision-making and either formal discussion or written informed consent. Laboratory reporting of radiation dosimetry is a critical component of creating a quality laboratory fostering a patient-centered environment with transparent procedural methodology. Efforts should be directed to avoiding testing involving radiation, in patients with inappropriate indications. Standardized reporting and diagnostic reference levels for computed tomography and nuclear cardiology are important for the goal of public reporting of laboratory radiation dose levels in conjunction with diagnostic performance. Conclusions The development of cardiac imaging technologies revolutionized cardiology practice by allowing routine, noninvasive assessment of myocardial perfusion and anatomy. It is now incumbent upon the imaging community to create an accountability framework to safely drive appropriate imaging utilization. PMID:24530677

  19. Blockchain protocols in clinical trials: Transparency and traceability of consent.

    PubMed

    Benchoufi, Mehdi; Porcher, Raphael; Ravaud, Philippe

    2017-01-01

    Clinical trial consent for protocols and their revisions should be transparent for patients and traceable for stakeholders. Our goal is to implement a process allowing for collection of patients' informed consent, which is bound to protocol revisions, storing and tracking the consent in a secure, unfalsifiable and publicly verifiable way, and enabling the sharing of this information in real time. For that, we build a consent workflow using a trending technology called Blockchain. This is a distributed technology that brings a built-in layer of transparency and traceability. From a more general and prospective point of view, we believe Blockchain technology brings a paradigmatical shift to the entire clinical research field. We designed a Proof-of-Concept protocol consisting of time-stamping each step of the patient's consent collection using Blockchain, thus archiving and historicising the consent through cryptographic validation in a securely unfalsifiable and transparent way. For each protocol revision, consent was sought again.  We obtained a single document, in an open format, that accounted for the whole consent collection process: a time-stamped consent status regarding each version of the protocol. This document cannot be corrupted and can be checked on any dedicated public website. It should be considered a robust proof of data. However, in a live clinical trial, the authentication system should be strengthened to remove the need for third parties, here trial stakeholders, and give participative control to the peer users. In the future, the complex data flow of a clinical trial could be tracked by using Blockchain, which core functionality, named Smart Contract, could help prevent clinical trial events not occurring in the correct chronological order, for example including patients before they consented or analysing case report form data before freezing the database. Globally, Blockchain could help with reliability, security, transparency and could be a consistent step toward reproducibility.

  20. Blockchain protocols in clinical trials: Transparency and traceability of consent

    PubMed Central

    Benchoufi, Mehdi; Porcher, Raphael; Ravaud, Philippe

    2018-01-01

    Clinical trial consent for protocols and their revisions should be transparent for patients and traceable for stakeholders. Our goal is to implement a process allowing for collection of patients’ informed consent, which is bound to protocol revisions, storing and tracking the consent in a secure, unfalsifiable and publicly verifiable way, and enabling the sharing of this information in real time. For that, we build a consent workflow using a trending technology called Blockchain. This is a distributed technology that brings a built-in layer of transparency and traceability. From a more general and prospective point of view, we believe Blockchain technology brings a paradigmatical shift to the entire clinical research field. We designed a Proof-of-Concept protocol consisting of time-stamping each step of the patient’s consent collection using Blockchain, thus archiving and historicising the consent through cryptographic validation in a securely unfalsifiable and transparent way. For each protocol revision, consent was sought again.  We obtained a single document, in an open format, that accounted for the whole consent collection process: a time-stamped consent status regarding each version of the protocol. This document cannot be corrupted and can be checked on any dedicated public website. It should be considered a robust proof of data. However, in a live clinical trial, the authentication system should be strengthened to remove the need for third parties, here trial stakeholders, and give participative control to the peer users. In the future, the complex data flow of a clinical trial could be tracked by using Blockchain, which core functionality, named Smart Contract, could help prevent clinical trial events not occurring in the correct chronological order, for example including patients before they consented or analysing case report form data before freezing the database. Globally, Blockchain could help with reliability, security, transparency and could be a consistent step toward reproducibility. PMID:29167732

  1. Quantum error correction assisted by two-way noisy communication

    PubMed Central

    Wang, Zhuo; Yu, Sixia; Fan, Heng; Oh, C. H.

    2014-01-01

    Pre-shared non-local entanglement dramatically simplifies and improves the performance of quantum error correction via entanglement-assisted quantum error-correcting codes (EAQECCs). However, even considering the noise in quantum communication only, the non-local sharing of a perfectly entangled pair is technically impossible unless additional resources are consumed, such as entanglement distillation, which actually compromises the efficiency of the codes. Here we propose an error-correcting protocol assisted by two-way noisy communication that is more easily realisable: all quantum communication is subjected to general noise and all entanglement is created locally without additional resources consumed. In our protocol the pre-shared noisy entangled pairs are purified simultaneously by the decoding process. For demonstration, we first present an easier implementation of the well-known EAQECC [[4, 1, 3; 1

  2. Quantum error correction assisted by two-way noisy communication.

    PubMed

    Wang, Zhuo; Yu, Sixia; Fan, Heng; Oh, C H

    2014-11-26

    Pre-shared non-local entanglement dramatically simplifies and improves the performance of quantum error correction via entanglement-assisted quantum error-correcting codes (EAQECCs). However, even considering the noise in quantum communication only, the non-local sharing of a perfectly entangled pair is technically impossible unless additional resources are consumed, such as entanglement distillation, which actually compromises the efficiency of the codes. Here we propose an error-correcting protocol assisted by two-way noisy communication that is more easily realisable: all quantum communication is subjected to general noise and all entanglement is created locally without additional resources consumed. In our protocol the pre-shared noisy entangled pairs are purified simultaneously by the decoding process. For demonstration, we first present an easier implementation of the well-known EAQECC [[4, 1, 3; 1

  3. Preserving differential privacy for similarity measurement in smart environments.

    PubMed

    Wong, Kok-Seng; Kim, Myung Ho

    2014-01-01

    Advances in both sensor technologies and network infrastructures have encouraged the development of smart environments to enhance people's life and living styles. However, collecting and storing user's data in the smart environments pose severe privacy concerns because these data may contain sensitive information about the subject. Hence, privacy protection is now an emerging issue that we need to consider especially when data sharing is essential for analysis purpose. In this paper, we consider the case where two agents in the smart environment want to measure the similarity of their collected or stored data. We use similarity coefficient function (F SC) as the measurement metric for the comparison with differential privacy model. Unlike the existing solutions, our protocol can facilitate more than one request to compute F SC without modifying the protocol. Our solution ensures privacy protection for both the inputs and the computed F SC results.

  4. Experimental measurement-device-independent quantum key distribution with uncharacterized encoding.

    PubMed

    Wang, Chao; Wang, Shuang; Yin, Zhen-Qiang; Chen, Wei; Li, Hong-Wei; Zhang, Chun-Mei; Ding, Yu-Yang; Guo, Guang-Can; Han, Zheng-Fu

    2016-12-01

    Measurement-device-independent quantum key distribution (MDI QKD) is an efficient way to share secrets using untrusted measurement devices. However, the assumption on the characterizations of encoding states is still necessary in this promising protocol, which may lead to unnecessary complexity and potential loopholes in realistic implementations. Here, by using the mismatched-basis statistics, we present the first proof-of-principle experiment of MDI QKD with uncharacterized encoding sources. In this demonstration, the encoded states are only required to be constrained in a two-dimensional Hilbert space, and two distant parties (Alice and Bob) are resistant to state preparation flaws even if they have no idea about the detailed information of their encoding states. The positive final secure key rates of our system exhibit the feasibility of this novel protocol, and demonstrate its value for the application of secure communication with uncharacterized devices.

  5. Implicitly Coordinated Detect and Avoid Capability for Safe Autonomous Operation of Small UAS

    NASA Technical Reports Server (NTRS)

    Balachandran, Swee; Munoz, Cesar A.; Consiglio, Maria C.

    2017-01-01

    As the airspace becomes increasingly shared by autonomous small Unmanned Aerial Systems (UAS), there would be a pressing need for coordination strategies so that aircraft can safely and independently maneuver around obstacles, geofences, and traffic aircraft. Explicitly coordinating resolution strategies for small UAS would require additional components such as a reliable vehicle-to-vehicle communication infrastructure and standardized protocols for information exchange that could significantly increase the cost of deploying small UAS in a shared airspace. This paper explores a novel approach that enables multiple aircraft to implicitly coordinate their resolution maneuvers. By requiring all aircraft to execute the proposed approach deterministically, it is possible for all of them to implicitly agree on the region of airspace each will be occupying in a given time interval. The proposed approach lends itself to the construction of a suitable feedback mechanism that enables the real-time execution of an implicitly conflict-free path in a closed-loop manner dealing with uncertainties in aircraft speed. If a network infrastructure is available, the proposed approach can also exploit the benefits of explicit information.

  6. Dynamic aftereffects in supplementary motor network following inhibitory transcranial magnetic stimulation protocols.

    PubMed

    Ji, Gong-Jun; Yu, Fengqiong; Liao, Wei; Wang, Kai

    2017-04-01

    The supplementary motor area (SMA) is a key node of the motor network. Inhibitory repetitive transcranial magnetic stimulation (rTMS) of the SMA can potentially improve movement disorders. However, the aftereffects of inhibitory rTMS on brain function remain largely unknown. Using a single-blind, crossover within-subject design, we investigated the role of aftereffects with two inhibitory rTMS protocols [1800 pulses of either 1-Hz repetitive stimulation or continuous theta burst stimulation (cTBS)] on the left SMA. A total of 19 healthy volunteers participated in the rTMS sessions on 2 separate days. Firstly, short-term aftereffects were estimated at three levels (functional connectivity, local activity, and network properties) by comparing the resting-state functional magnetic resonance imaging datasets (9min) acquired before and after each rTMS session. Local activity and network properties were not significantly altered by either protocol. Functional connectivity within the SMA network was increased (in the left paracentral gyrus) by 1-Hz stimulation and decreased (in the left inferior frontal gyrus and SMA/middle cingulate cortex) by cTBS. The subsequent three-way analysis of variance (site×time×protocol) did not show a significant interaction effect or "protocol" main effect, suggesting that the two protocols share an underlying mechanism. Secondly, sliding-window analysis was used to evaluate the dynamic features of aftereffects in the ~29min after the end of stimulation. Aftereffects were maintained for a maximum of 9.8 and 6.6min after the 1-Hz and cTBS protocols, respectively. In summary, this study revealed topographical and temporal aftereffects in the SMA network following inhibitory rTMS protocols, providing valuable information for their application in future neuroscience and clinical studies. Copyright © 2017 Elsevier Inc. All rights reserved.

  7. A School Passport as Part of a Protocol to Assist Educational Reintegration After Medulloblastoma Treatment in Childhood.

    PubMed

    Tresman, Rachel; Brown, Morven; Fraser, Faye; Skinner, Roderick; Bailey, Simon

    2016-09-01

    Medulloblastoma is the most common malignant brain tumour in children and is treated with a combination of surgery, radiotherapy and chemotherapy. These children frequently experience long-term cognitive, social and physical sequelae, which significantly affect school reintegration. This study aimed to explore school-return experiences to create a more structured school reintegration protocol for children postmedulloblastoma. A cohort of nine patients who had completed treatment and for whom full neuropsychometric data were available was included in the study (median time since diagnosis 8 years). Data were collected using qualitative parental questionnaires, semistructured interviews with teachers (n = 12) and healthcare professionals (HCPs) (n = 6) involved in their school reintegration. Thematic analysis was employed. A focus group with five HCPs was then used for data validation. This study uncovered the following four main subjects: (1) Information sharing; (2) education and empowerment (of educational professionals (EP) and parents); (3) communication between parents, HCPs and EPs; and (4) long-term difficulties. Implementation of a standardised protocol delivered within the structure of a school passport document would aid uniform follow-up. The proposed multistage protocol includes early communication and reintegration planning followed by meetings at school re-entry. Follow-up meetings are suggested to reduce information loss and reassess the child's needs. Hospital support at school transitions, inclusion of school data in long-term clinical follow-up and long-term rehabilitation are also recommended. Each stage would be supported by school passport documentation and would facilitate school and parental empowerment, paramount to the long-term sustainability of successful schooling. © 2016 Wiley Periodicals, Inc.

  8. Improvement of "Novel Multiparty Quantum Key Agreement Protocol with GHZ States"

    NASA Astrophysics Data System (ADS)

    Gu, Jun; Hwang, Tzonelih

    2017-10-01

    Quantum key agreement (QKA) protocol is a method for negotiating a fair and secure key among mutually untrusted participants. Recently, Xu et al. (Quantum Inf. Process. 13:2587-2594, 2014) proposed a multi-party QKA protocol based on Greenberger-Horne-Zeilinger (GHZ) states. However, this study points out that Xu et al.'s protocol cannot provide the fairness property. That is, the last involved participant in the protocol can manipulate the final shared secret key without being detected by the other participants. Moreover, according to Yu et al.'s research (2015), Xu et al.'s protocol cannot avoid the public discussion attack too. To avoid these weaknesses, an improved QKA protocol is proposed.

  9. Managing Emergency Situations in VANET Through Heterogeneous Technologies Cooperation.

    PubMed

    Santamaria, Amilcare Francesco; Tropea, Mauro; Fazio, Peppino; De Rango, Floriano

    2018-05-08

    Nowadays, the research on vehicular computing enhanced a very huge amount of services and protocols, aimed to vehicles security and comfort. The investigation of the IEEE802.11p, Wireless Access in Vehicular Environments (WAVE) and Dedicated Short Range Communication (DSRC) standards gave to the scientific world the chance to integrate new services, protocols, algorithms and devices inside vehicles. This opportunity attracted the attention of private/public organizations, which spent lot of resources and money to promote vehicular technologies. In this paper, the attention is focused on the design of a new approach for vehicular environments able to gather information during mobile node trips, for advising dangerous or emergency situations by exploiting on-board sensors. It is assumed that each vehicle has an integrated on-board unit composed of several sensors and Global Position System (GPS) device, able to spread alerting messages around the network, regarding warning and dangerous situations/conditions. On-board units, based on the standard communication protocols, share the collected information with the surrounding road-side units, while the sensing platform is able to recognize the environment that vehicles are passing through (obstacles, accidents, emergencies, dangerous situations, etc.). Finally, through the use of the GPS receiver, the exact location of the caught event is determined and spread along the network. In this way, if an accident occurs, the arriving cars will, probably, avoid delay and danger situations.

  10. Managing Emergency Situations in VANET Through Heterogeneous Technologies Cooperation

    PubMed Central

    Tropea, Mauro; De Rango, Floriano

    2018-01-01

    Nowadays, the research on vehicular computing enhanced a very huge amount of services and protocols, aimed to vehicles security and comfort. The investigation of the IEEE802.11p, Wireless Access in Vehicular Environments (WAVE) and Dedicated Short Range Communication (DSRC) standards gave to the scientific world the chance to integrate new services, protocols, algorithms and devices inside vehicles. This opportunity attracted the attention of private/public organizations, which spent lot of resources and money to promote vehicular technologies. In this paper, the attention is focused on the design of a new approach for vehicular environments able to gather information during mobile node trips, for advising dangerous or emergency situations by exploiting on-board sensors. It is assumed that each vehicle has an integrated on-board unit composed of several sensors and Global Position System (GPS) device, able to spread alerting messages around the network, regarding warning and dangerous situations/conditions. On-board units, based on the standard communication protocols, share the collected information with the surrounding road-side units, while the sensing platform is able to recognize the environment that vehicles are passing through (obstacles, accidents, emergencies, dangerous situations, etc.). Finally, through the use of the GPS receiver, the exact location of the caught event is determined and spread along the network. In this way, if an accident occurs, the arriving cars will, probably, avoid delay and danger situations. PMID:29738453

  11. Multi-party Quantum Key Agreement without Entanglement

    NASA Astrophysics Data System (ADS)

    Cai, Bin-Bin; Guo, Gong-De; Lin, Song

    2017-04-01

    A new efficient quantum key agreement protocol without entanglement is proposed. In this protocol, each user encodes his secret key into the traveling particles by performing one of four rotation operations that one cannot perfectly distinguish. In the end, all users can simultaneously obtain the final shared key. The security of the presented protocol against some common attacks is discussed. It is shown that this protocol can effectively protect the privacy of each user and satisfy the requirement of fairness in theory. Moreover, the quantum carriers and the encoding operations used in the protocol can be achieved in realistic physical devices. Therefore, the presented protocol is feasible with current technology.

  12. Reply to ``Comment II on `Quantum secret sharing based on reusable Greenberger-Horne-Zeilinger states as secure carriers' ''

    NASA Astrophysics Data System (ADS)

    Karimipour, V.

    2006-07-01

    In the preceding Comment [Jian-Zhong Du, Su-Juan Qin, Qiao-Yan Wen, and Fu-Chen Zhu, Phys. Rev. A 74, 016301 (2006)], it has been shown that in a quantum secret sharing protocol proposed in [S. Bagherinezhad and V. Karimipour, Phys. Rev. A 67, 044302 (2003)], one of the receivers can cheat by splitting the entanglement of the carrier and intercepting the secret, without being detected. In this reply we show that a simple modification of the protocol prevents the receivers from this kind of cheating.

  13. SVANET: A smart vehicular ad hoc network for efficient data transmission with wireless sensors.

    PubMed

    Sahoo, Prasan Kumar; Chiang, Ming-Jer; Wu, Shih-Lin

    2014-11-25

    Wireless sensors can sense any event, such as accidents, as well as icy roads, and can forward the rescue/warning messages through intermediate vehicles for any necessary help. In this paper, we propose a smart vehicular ad hoc network (SVANET) architecture that uses wireless sensors to detect events and vehicles to transmit the safety and non-safety messages efficiently by using different service channels and one control channel with different priorities. We have developed a data transmission protocol for the vehicles in the highway, in which data can be forwarded with the help of vehicles if they are connected with each other or data can be forwarded with the help of nearby wireless sensors. Our data transmission protocol is designed to increase the driving safety, to prevent accidents and to utilize channels efficiently by adjusting the control and service channel time intervals dynamically. Besides, our protocol can transmit information to vehicles in advance, so that drivers can decide an alternate route in case of traffic congestion. For various data sharing, we design a method that can select a few leader nodes among vehicles running along a highway to broadcast data efficiently. Simulation results show that our protocol can outperform the existing standard in terms of the end to end packet delivery ratio and latency.

  14. SVANET: A Smart Vehicular Ad Hoc Network for Efficient Data Transmission with Wireless Sensors

    PubMed Central

    Sahoo, Prasan Kumar; Chiang, Ming-Jer; Wu, Shih-Lin

    2014-01-01

    Wireless sensors can sense any event, such as accidents, as well as icy roads, and can forward the rescue/warning messages through intermediate vehicles for any necessary help. In this paper, we propose a smart vehicular ad hoc network (SVANET) architecture that uses wireless sensors to detect events and vehicles to transmit the safety and non-safety messages efficiently by using different service channels and one control channel with different priorities. We have developed a data transmission protocol for the vehicles in the highway, in which data can be forwarded with the help of vehicles if they are connected with each other or data can be forwarded with the help of nearby wireless sensors. Our data transmission protocol is designed to increase the driving safety, to prevent accidents and to utilize channels efficiently by adjusting the control and service channel time intervals dynamically. Besides, our protocol can transmit information to vehicles in advance, so that drivers can decide an alternate route in case of traffic congestion. For various data sharing, we design a method that can select a few leader nodes among vehicles running along a highway to broadcast data efficiently. Simulation results show that our protocol can outperform the existing standard in terms of the end to end packet delivery ratio and latency. PMID:25429409

  15. A shared-world conceptual model for integrating space station life sciences telescience operations

    NASA Technical Reports Server (NTRS)

    Johnson, Vicki; Bosley, John

    1988-01-01

    Mental models of the Space Station and its ancillary facilities will be employed by users of the Space Station as they draw upon past experiences, perform tasks, and collectively plan for future activities. The operational environment of the Space Station will incorporate telescience, a new set of operational modes. To investigate properties of the operational environment, distributed users, and the mental models they employ to manipulate resources while conducting telescience, an integrating shared-world conceptual model of Space Station telescience is proposed. The model comprises distributed users and resources (active elements); agents who mediate interactions among these elements on the basis of intelligent processing of shared information; and telescience protocols which structure the interactions of agents as they engage in cooperative, responsive interactions on behalf of users and resources distributed in space and time. Examples from the life sciences are used to instantiate and refine the model's principles. Implications for transaction management and autonomy are discussed. Experiments employing the model are described which the authors intend to conduct using the Space Station Life Sciences Telescience Testbed currently under development at Ames Research Center.

  16. Netest: A Tool to Measure the Maximum Burst Size, Available Bandwidth and Achievable Throughput

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jin, Guojun; Tierney, Brian

    2003-01-31

    Distinguishing available bandwidth and achievable throughput is essential for improving network applications' performance. Achievable throughput is the throughput considering a number of factors such as network protocol, host speed, network path, and TCP buffer space, where as available bandwidth only considers the network path. Without understanding this difference, trying to improve network applications' performance is like ''blind men feeling the elephant'' [4]. In this paper, we define and distinguish bandwidth and throughput, and debate which part of each is achievable and which is available. Also, we introduce and discuss a new concept - Maximum Burst Size that is crucial tomore » the network performance and bandwidth sharing. A tool, netest, is introduced to help users to determine the available bandwidth, and provides information to achieve better throughput with fairness of sharing the available bandwidth, thus reducing misuse of the network.« less

  17. Authentication Based on Non-Interactive Zero-Knowledge Proofs for the Internet of Things.

    PubMed

    Martín-Fernández, Francisco; Caballero-Gil, Pino; Caballero-Gil, Cándido

    2016-01-07

    This paper describes the design and analysis of a new scheme for the authenticated exchange of confidential information in insecure environments within the Internet of Things, which allows a receiver of a message to authenticate the sender and compute a secret key shared with it. The proposal is based on the concept of a non-interactive zero-knowledge proof, so that in a single communication, relevant data may be inferred to verify the legitimacy of the sender. Besides, the new scheme uses the idea under the Diffie-Hellman protocol for the establishment of a shared secret key. The proposal has been fully developed for platforms built on the Android Open Source Project, so it can be used in any device or sensor with this operating system. This work provides a performance study of the implementation and a comparison between its promising results and others obtained with similar schemes.

  18. Authentication Based on Non-Interactive Zero-Knowledge Proofs for the Internet of Things

    PubMed Central

    Martín-Fernández, Francisco; Caballero-Gil, Pino; Caballero-Gil, Cándido

    2016-01-01

    This paper describes the design and analysis of a new scheme for the authenticated exchange of confidential information in insecure environments within the Internet of Things, which allows a receiver of a message to authenticate the sender and compute a secret key shared with it. The proposal is based on the concept of a non-interactive zero-knowledge proof, so that in a single communication, relevant data may be inferred to verify the legitimacy of the sender. Besides, the new scheme uses the idea under the Diffie–Hellman protocol for the establishment of a shared secret key. The proposal has been fully developed for platforms built on the Android Open Source Project, so it can be used in any device or sensor with this operating system. This work provides a performance study of the implementation and a comparison between its promising results and others obtained with similar schemes. PMID:26751454

  19. A Distributed Simulation Facility to Support Human Factors Research in Advanced Air Transportation Technology

    NASA Technical Reports Server (NTRS)

    Amonlirdviman, Keith; Farley, Todd C.; Hansman, R. John, Jr.; Ladik, John F.; Sherer, Dana Z.

    1998-01-01

    A distributed real-time simulation of the civil air traffic environment developed to support human factors research in advanced air transportation technology is presented. The distributed environment is based on a custom simulation architecture designed for simplicity and flexibility in human experiments. Standard Internet protocols are used to create the distributed environment, linking all advanced cockpit simulator, all Air Traffic Control simulator, and a pseudo-aircraft control and simulation management station. The pseudo-aircraft control station also functions as a scenario design tool for coordinating human factors experiments. This station incorporates a pseudo-pilot interface designed to reduce workload for human operators piloting multiple aircraft simultaneously in real time. The application of this distributed simulation facility to support a study of the effect of shared information (via air-ground datalink) on pilot/controller shared situation awareness and re-route negotiation is also presented.

  20. Armenian Virtual Observatory: Services and Data Sharing

    NASA Astrophysics Data System (ADS)

    Knyazyan, A. V.; Astsatryan, H. V.; Mickaelian, A. M.

    2016-06-01

    The main aim of this article is to introduce the data management and services of the Armenian Virtual Observatory (ArVO), which consists of user friendly data management mechanisms, a new and productive cross-correlation service, and data sharing API based on international standards and protocols.

  1. Tag Content Access Control with Identity-based Key Exchange

    NASA Astrophysics Data System (ADS)

    Yan, Liang; Rong, Chunming

    2010-09-01

    Radio Frequency Identification (RFID) technology that used to identify objects and users has been applied to many applications such retail and supply chain recently. How to prevent tag content from unauthorized readout is a core problem of RFID privacy issues. Hash-lock access control protocol can make tag to release its content only to reader who knows the secret key shared between them. However, in order to get this shared secret key required by this protocol, reader needs to communicate with a back end database. In this paper, we propose to use identity-based secret key exchange approach to generate the secret key required for hash-lock access control protocol. With this approach, not only back end database connection is not needed anymore, but also tag cloning problem can be eliminated at the same time.

  2. Deterministic quantum state transfer and remote entanglement using microwave photons.

    PubMed

    Kurpiers, P; Magnard, P; Walter, T; Royer, B; Pechal, M; Heinsoo, J; Salathé, Y; Akin, A; Storz, S; Besse, J-C; Gasparinetti, S; Blais, A; Wallraff, A

    2018-06-01

    Sharing information coherently between nodes of a quantum network is fundamental to distributed quantum information processing. In this scheme, the computation is divided into subroutines and performed on several smaller quantum registers that are connected by classical and quantum channels 1 . A direct quantum channel, which connects nodes deterministically rather than probabilistically, achieves larger entanglement rates between nodes and is advantageous for distributed fault-tolerant quantum computation 2 . Here we implement deterministic state-transfer and entanglement protocols between two superconducting qubits fabricated on separate chips. Superconducting circuits 3 constitute a universal quantum node 4 that is capable of sending, receiving, storing and processing quantum information 5-8 . Our implementation is based on an all-microwave cavity-assisted Raman process 9 , which entangles or transfers the qubit state of a transmon-type artificial atom 10 with a time-symmetric itinerant single photon. We transfer qubit states by absorbing these itinerant photons at the receiving node, with a probability of 98.1 ± 0.1 per cent, achieving a transfer-process fidelity of 80.02 ± 0.07 per cent for a protocol duration of only 180 nanoseconds. We also prepare remote entanglement on demand with a fidelity as high as 78.9 ± 0.1 per cent at a rate of 50 kilohertz. Our results are in excellent agreement with numerical simulations based on a master-equation description of the system. This deterministic protocol has the potential to be used for quantum computing distributed across different nodes of a cryogenic network.

  3. Joint Remote State Preparation of a Single-Atom Qubit State via a GHZ Entangled State

    NASA Astrophysics Data System (ADS)

    Xiao, Xiao-Qi; Yao, Fengwei; Lin, Xiaochen; Gong, Lihua

    2018-04-01

    We proposed a physical protocol for the joint remote preparation of a single-atom qubit state via a three-atom entangled GHZ-type state previously shared by the two senders and one receiver. Only rotation operations of single-atom, which can be achieved though the resonant interaction between the two-level atom and the classical field, are required in the scheme. It shows that the splitting way of the classical information of the secret qubit not only determines the success of reconstruction of the secret qubit, but also influences the operations of the senders.

  4. Using Cryptography to Improve Conjunction Analysis

    NASA Astrophysics Data System (ADS)

    Hemenway, B.; Welser, B.; Baiocchi, D.

    2012-09-01

    Coordination of operations between satellite operators is becoming increasingly important to prevent collisions. Unfortunately, this coordination is often handicapped by a lack of trust. Coordination and cooperation between satellite operators can take many forms, however, one specific area where cooperation between operators would yield significant benefits is in the computation of conjunction analyses. Passively collected orbital are of generally of too low fidelity to be of use in conjunction analyses. Each operator, however, maintains high fidelity data about their own satellites. These high fidelity data are significantly more valuable in calculating conjunction analyses than the lower-fidelity data. If operators were to share their high fidelity data overall space situational awareness could be improved. At present, many operators do not share data and as a consequence space situational awareness suffers. Restrictive data sharing policies are primarily motivated by privacy concerns on the part of the satellite operators, as each operator is reluctant or unwilling to share data that might compromise its political or commercial interests. In order to perform the necessary conjunction analyses while still maintaining the privacy of their own data, a few operators have entered data sharing agreements. These operators provide their private data to a trusted outside party, who then performs the conjunction analyses and reports the results to the operators. These types of agreements are not an ideal solution as they require a degree of trust between the parties, and the cost of employing the trusted party can be large. In this work, we present and analyze cryptographic tools that would allow satellite operators to securely calculate conjunction analyses without the help of a trusted outside party, while provably maintaining the privacy of their own orbital information. For example, recent advances in cryptographic protocols, specifically in the area of secure Multiparty Computation (MPC) have the potential to allow satellite operators to perform the necessary conjunction analyses without the need to reveal their orbital information to anyone. This talk will describe how MPC works, and how we propose to use it to facilitate secure information sharing between satellite operators.

  5. Design of a RESTful web information system for drug prescription and administration.

    PubMed

    Bianchi, Lorenzo; Paganelli, Federica; Pettenati, Maria Chiara; Turchi, Stefano; Ciofi, Lucia; Iadanza, Ernesto; Giuli, Dino

    2014-05-01

    Drug prescription and administration processes strongly impact on the occurrence of risks in medical settings for they can be sources of adverse drug events (ADEs). A properly engineered use of information and communication technologies has proven to be a promising approach to reduce these risks. In this study, we propose PHARMA, a web information system which supports healthcare staff in the secure cooperative execution of drug prescription, transcription and registration tasks. PHARMA allows the easy sharing and management of documents containing drug-related information (i.e., drug prescriptions, medical reports, screening), which is often inconsistent and scattered across different information systems and heterogeneous organization domains (e.g., departments, other hospital facilities). PHARMA enables users to access such information in a consistent and secure way, through the adoption of REST and web-oriented design paradigms and protocols. We describe the implementation of the PHARMA prototype, and we discuss the results of the usability evaluation that we carried out with the staff of a hospital in Florence, Italy.

  6. Where-Fi: a dynamic energy-efficient multimedia distribution framework for MANETs

    NASA Astrophysics Data System (ADS)

    Mohapatra, Shivajit; Carbunar, Bogdan; Pearce, Michael; Chaudhri, Rohit; Vasudevan, Venu

    2008-01-01

    Next generation mobile ad-hoc applications will revolve around users' need for sharing content/presence information with co-located devices. However, keeping such information fresh requires frequent meta-data exchanges, which could result in significant energy overheads. To address this issue, we propose distributed algorithms for energy efficient dissemination of presence and content usage information between nodes in mobile ad-hoc networks. First, we introduce a content dissemination protocol (called CPMP) for effectively distributing frequent small meta-data updates between co-located devices using multicast. We then develop two distributed algorithms that use the CPMP protocol to achieve "phase locked" wake up cycles for all the participating nodes in the network. The first algorithm is designed for fully-connected networks and then extended in the second to handle hidden terminals. The "phase locked" schedules are then exploited to adaptively transition the network interface to a deep sleep state for energy savings. We have implemented a prototype system (called "Where-Fi") on several Motorola Linux-based cell phone models. Our experimental results show that for all network topologies our algorithms were able to achieve "phase locking" between nodes even in the presence of hidden terminals. Moreover, we achieved battery lifetime extensions of as much as 28% for fully connected networks and about 20% for partially connected networks.

  7. Digital information management: a progress report on the National Digital Mammography Archive

    NASA Astrophysics Data System (ADS)

    Beckerman, Barbara G.; Schnall, Mitchell D.

    2002-05-01

    Digital mammography creates very large images, which require new approaches to storage, retrieval, management, and security. The National Digital Mammography Archive (NDMA) project, funded by the National Library of Medicine (NLM), is developing a limited testbed that demonstrates the feasibility of a national breast imaging archive, with access to prior exams; patient information; computer aids for image processing, teaching, and testing tools; and security components to ensure confidentiality of patient information. There will be significant benefits to patients and clinicians in terms of accessible data with which to make a diagnosis and to researchers performing studies on breast cancer. Mammography was chosen for the project, because standards were already available for digital images, report formats, and structures. New standards have been created for communications protocols between devices, front- end portal and archive. NDMA is a distributed computing concept that provides for sharing and access across corporate entities. Privacy, auditing, and patient consent are all integrated into the system. Five sites, Universities of Pennsylvania, Chicago, North Carolina and Toronto, and BWXT Y12, are connected through high-speed networks to demonstrate functionality. We will review progress, including technical challenges, innovative research and development activities, standards and protocols being implemented, and potential benefits to healthcare systems.

  8. Ethical Considerations Related to Return of Results from Genomic Medicine Projects: The eMERGE Network (Phase III) Experience

    PubMed Central

    Fossey, Robyn; Kochan, David; Winkler, Erin; Pacyna, Joel E.; Olson, Janet; Thibodeau, Stephen; Connolly, John J.; Harr, Margaret; Behr, Meckenzie A.; Prows, Cynthia A.; Cobb, Beth; Myers, Melanie F.; Leslie, Nancy D.; Namjou-Khales, Bahram; Milo Rasouly, Hila; Wynn, Julia; Fedotov, Alexander; Chung, Wendy K.; Gharavi, Ali; Williams, Janet L.; Pais, Lynn; Holm, Ingrid; Aufox, Sharon; Smith, Maureen E.; Scrol, Aaron; Leppig, Kathleen; Jarvik, Gail P.; Wiesner, Georgia L.; Li, Rongling; Stroud, Mary; Smoller, Jordan W.; Sharp, Richard R.; Kullo, Iftikhar J.

    2018-01-01

    We examined the Institutional Review Board (IRB) process at 9 academic institutions in the electronic Medical Records and Genomics (eMERGE) Network, for proposed electronic health record-based genomic medicine studies, to identify common questions and concerns. Sequencing of 109 disease related genes and genotyping of 14 actionable variants is being performed in ~28,100 participants from the 9 sites. Pathogenic/likely pathogenic variants in actionable genes are being returned to study participants. We examined each site’s research protocols, informed-consent materials, and interactions with IRB staff. Research staff at each site completed questionnaires regarding their IRB interactions. The time to prepare protocols for IRB submission, number of revisions and time to approval ranged from 10–261 days, 0–11, and 11–90 days, respectively. IRB recommendations related to the readability of informed consent materials, specifying the full range of potential risks, providing options for receiving limited results or withdrawal, sharing of information with family members, and establishing the mechanisms to answer participant questions. IRBs reviewing studies that involve the return of results from genomic sequencing have a diverse array of concerns, and anticipating these concerns can help investigators to more effectively engage IRBs. PMID:29301385

  9. A secure RFID authentication protocol adopting error correction code.

    PubMed

    Chen, Chien-Ming; Chen, Shuai-Min; Zheng, Xinying; Chen, Pei-Yu; Sun, Hung-Min

    2014-01-01

    RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our protocol to provide key updating. Based on the secrecy of shared keys, the reader and the tag can establish a mutual authenticity relationship. Further analysis of the protocol showed that it also satisfies integrity, forward secrecy, anonymity, and untraceability. Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. We also compare our protocol with previous works in terms of performance.

  10. A Secure RFID Authentication Protocol Adopting Error Correction Code

    PubMed Central

    Zheng, Xinying; Chen, Pei-Yu

    2014-01-01

    RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our protocol to provide key updating. Based on the secrecy of shared keys, the reader and the tag can establish a mutual authenticity relationship. Further analysis of the protocol showed that it also satisfies integrity, forward secrecy, anonymity, and untraceability. Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. We also compare our protocol with previous works in terms of performance. PMID:24959619

  11. The EVER-EST portal as support for the Sea Monitoring Virtual Research Community, through the sharing of resources, enabling dynamic collaboration and promoting community engagement

    NASA Astrophysics Data System (ADS)

    Foglini, Federica; Grande, Valentina; De Leo, Francesco; Mantovani, Simone; Ferraresi, Sergio

    2017-04-01

    EVER-EST offers a framework based on advanced services delivered both at the e-infrastructure and domain-specific level, with the objective of supporting each phase of the Earth Science Research and Information Lifecycle. It provides innovative e-research services to Earth Science user communities for communication, cross-validation and the sharing of knowledge and science outputs. The project follows a user-centric approach: real use cases taken from pre-selected Virtual Research Communities (VRC) covering different Earth Science research scenarios drive the implementation of the Virtual Research Environment (VRE) services and capabilities. The Sea Monitoring community is involved in the evaluation of the EVER-EST infrastructure. The community of potential users is wide and heterogeneous including both multi-disciplinary scientists and national/international agencies and authorities (e.g. MPAs directors, technicians from regional agencies like ARPA in Italy, the technicians working for the Ministry of the Environment) dealing with the adoption of a better way of measuring the quality of the environment. The scientific community has the main role of assessing the best criteria and indicators for defining the Good Environmental Status (GES) in their own sub regions, and implementing methods, protocols and tools for monitoring the GES descriptors. According to the Marine Strategy Framework Directive (MSFD), the environmental status of marine waters is defined by 11 descriptors, and forms a proposed set of 29 associated criteria and 56 different indicators. The objective of the Sea Monitoring VRC is to provide useful and applicable contributions to the evaluation of the descriptors: D1.Biodiversity, D2.Non-indigenous species and D6.Seafloor Integrity (http://ec.europa.eu/environment/marine/good-environmental-status/index_en.htm). The main challenges for the community members are: 1. discovery of existing data and products distributed among different infrastructures; 2. sharing methodologies about the GES evaluation and monitoring; 3. working on the same workflows and data; 4. adopting shared powerful tools for data processing (e.g. software and servers). The Sea Monitoring portal provides the VRC users with tools and services aimed at enhancing their ability to interoperate and share knowledge, experience and methods for GES assessment and monitoring, such as: •digital information services for data management, exploitation and preservation (accessibility of heterogeneous data sources including associated documentation); •e-collaboration services to communicate and share knowledge, ideas, protocols and workflows; •e-learning services to facilitate the use of common workflows for assessing GES indicators; •e-research services for workflow management, validation and verification, as well as visualization and interactive services. The current study is co-financed by the European Union's Horizon 2020 research and innovation programme under the EVER-EST project (Grant Agreement No. 674907).

  12. Six-State Quantum Key Distribution Using Photons with Orbital Angular Momentum

    NASA Astrophysics Data System (ADS)

    Li, Jun-Lin; Wang, Chuan

    2010-11-01

    A new implementation of high-dimensional quantum key distribution (QKD) protocol is discussed. Using three mutual unbiased bases, we present a d-level six-state QKD protocol that exploits the orbital angular momentum with the spatial mode of the light beam. The protocol shows that the feature of a high capacity since keys are encoded using photon modes in d-level Hilbert space. The devices for state preparation and measurement are also discussed. This protocol has high security and the alignment of shared reference frames is not needed between sender and receiver.

  13. Multilateral Biomedical Data Sharing in the One-year Joint US-Russian Mission on the International Space Station

    NASA Technical Reports Server (NTRS)

    Charles, John B.; Haven, C.; Johnson-Throop, K.; Van Baalen, M.; McFather, J.

    2014-01-01

    The One Year Mission (1YM) by two astronauts on the International Space Station (ISS), starting in March 2015, offers a unique opportunity to expand multilateral collaboration by sharing data and resources among the partner agencies in preparation for planned space exploration missions beyond low Earth orbit. Agreements and protocols will be established for the collection, distribution, analysis and reporting of both research and clinical data. Data will be shared between the agencies sponsoring the investigators, and between the research and clinical medicine communities where common interests are identified. The assignment of only two astronauts, one Russian and the other American, to the 1YM necessitated creativity in bilateral efforts to maximize the biomedical return from the opportunity. Addition of Canadian, European and Japanese investigations make the effort even more integrative. There will be three types of investigations: joint, cross-participation and data-exchange. The joint investigations have US and Russian coprincipal investigators, and the data acquired will be their common responsibility. The other two types must develop data sharing agreements and processes specific to their needs. A multilateral panel of ISS partner space agencies will develop policies for international exchange of scientific information to meet their science objectives and priorities. They will promote archiving of space flight data and will inform each other and the scientific community at large about the results obtained from space life sciences studies. Integration tasks for the 1YM are based on current experience from the ISS and previous efforts on the Russian space station Mir. Closer coordination between international partners requires more common approaches to remove barriers to multilateral resource utilization on the ISS. Greater integration in implementation should increase utilization efficiency to benefit all participants in spaceflight human research. This presentation will describe the overarching principles for multilateral data collection, analysis and sharing and for data security for medical and research data shared between ISS partners prior to release in public forums.

  14. Sagnac secret sharing over telecom fiber networks.

    PubMed

    Bogdanski, Jan; Ahrens, Johan; Bourennane, Mohamed

    2009-01-19

    We report the first Sagnac quantum secret sharing (in three-and four-party implementations) over 1550 nm single mode fiber (SMF) networks, using a single qubit protocol with phase encoding. Our secret sharing experiment has been based on a single qubit protocol, which has opened the door to practical secret sharing implementation over fiber telecom channels and in free-space. The previous quantum secret sharing proposals were based on multiparticle entangled states, difficult in the practical implementation and not scalable. Our experimental data in the three-party implementation show stable (in regards to birefringence drift) quantum secret sharing transmissions at the total Sagnac transmission loop distances of 55-75 km with the quantum bit error rates (QBER) of 2.3-2.4% for the mean photon number micro?= 0.1 and 1.7-2.1% for micro= 0.3. In the four-party case we have achieved quantum secret sharing transmissions at the total Sagnac transmission loop distances of 45-55 km with the quantum bit error rates (QBER) of 3.0-3.7% for the mean photon number micro= 0.1 and 1.8-3.0% for micro?= 0.3. The stability of quantum transmission has been achieved thanks to our new concept for compensation of SMF birefringence effects in Sagnac, based on a polarization control system and a polarization insensitive phase modulator. The measurement results have showed feasibility of quantum secret sharing over telecom fiber networks in Sagnac configuration, using standard fiber telecom components.

  15. Q-Learning and p-persistent CSMA based rendezvous protocol for cognitive radio networks operating with shared spectrum activity

    NASA Astrophysics Data System (ADS)

    Watson, Clifton L.; Biswas, Subir

    2014-06-01

    With an increasing demand for spectrum, dynamic spectrum access (DSA) has been proposed as viable means for providing the flexibility and greater access to spectrum necessary to meet this demand. Within the DSA concept, unlicensed secondary users temporarily "borrow" or access licensed spectrum, while respecting the licensed primary user's rights to that spectrum. As key enablers for DSA, cognitive radios (CRs) are based on software-defined radios which allow them to sense, learn, and adapt to the spectrum environment. These radios can operate independently and rapidly switch channels. Thus, the initial setup and maintenance of cognitive radio networks are dependent upon the ability of CR nodes to find each other, in a process known as rendezvous, and create a link on a common channel for the exchange of data and control information. In this paper, we propose a novel rendezvous protocol, known as QLP, which is based on Q-learning and the p-persistent CSMA protocol. With the QLP protocol, CR nodes learn which channels are best for rendezvous and thus adapt their behavior to visit those channels more frequently. We demonstrate through simulation that the QLP protocol provides a rendevous capability for DSA environments with different dynamics of PU activity, while attempting to achieve the following performance goals: (1) minimize the average time-to-rendezvous, (2) maximize system throughput, (3) minimize primary user interference, and (4) minimize collisions among CR nodes.

  16. Protocols for distributive scheduling

    NASA Technical Reports Server (NTRS)

    Richards, Stephen F.; Fox, Barry

    1993-01-01

    The increasing complexity of space operations and the inclusion of interorganizational and international groups in the planning and control of space missions lead to requirements for greater communication, coordination, and cooperation among mission schedulers. These schedulers must jointly allocate scarce shared resources among the various operational and mission oriented activities while adhering to all constraints. This scheduling environment is complicated by such factors as the presence of varying perspectives and conflicting objectives among the schedulers, the need for different schedulers to work in parallel, and limited communication among schedulers. Smooth interaction among schedulers requires the use of protocols that govern such issues as resource sharing, authority to update the schedule, and communication of updates. This paper addresses the development and characteristics of such protocols and their use in a distributed scheduling environment that incorporates computer-aided scheduling tools. An example problem is drawn from the domain of space shuttle mission planning.

  17. Distributed project scheduling at NASA: Requirements for manual protocols and computer-based support

    NASA Technical Reports Server (NTRS)

    Richards, Stephen F.

    1992-01-01

    The increasing complexity of space operations and the inclusion of interorganizational and international groups in the planning and control of space missions lead to requirements for greater communication, coordination, and cooperation among mission schedulers. These schedulers must jointly allocate scarce shared resources among the various operational and mission oriented activities while adhering to all constraints. This scheduling environment is complicated by such factors as the presence of varying perspectives and conflicting objectives among the schedulers, the need for different schedulers to work in parallel, and limited communication among schedulers. Smooth interaction among schedulers requires the use of protocols that govern such issues as resource sharing, authority to update the schedule, and communication of updates. This paper addresses the development and characteristics of such protocols and their use in a distributed scheduling environment that incorporates computer-aided scheduling tools. An example problem is drawn from the domain of Space Shuttle mission planning.

  18. Network information security in a phase III Integrated Academic Information Management System (IAIMS).

    PubMed

    Shea, S; Sengupta, S; Crosswell, A; Clayton, P D

    1992-01-01

    The developing Integrated Academic Information System (IAIMS) at Columbia-Presbyterian Medical Center provides data sharing links between two separate corporate entities, namely Columbia University Medical School and The Presbyterian Hospital, using a network-based architecture. Multiple database servers with heterogeneous user authentication protocols are linked to this network. "One-stop information shopping" implies one log-on procedure per session, not separate log-on and log-off procedures for each server or application used during a session. These circumstances provide challenges at the policy and technical levels to data security at the network level and insuring smooth information access for end users of these network-based services. Five activities being conducted as part of our security project are described: (1) policy development; (2) an authentication server for the network; (3) Kerberos as a tool for providing mutual authentication, encryption, and time stamping of authentication messages; (4) a prototype interface using Kerberos services to authenticate users accessing a network database server; and (5) a Kerberized electronic signature.

  19. Canadian ENGOs in governance of water resources: information needs and monitoring practices.

    PubMed

    Kebo, Sasha; Bunch, Martin J

    2013-11-01

    Water quality monitoring involves a complex set of steps and a variety of approaches. Its goals include understanding of aquatic habitats, informing management and facilitating decision making, and educating citizens. Environmental nongovernmental organizations (ENGOs) are increasingly engaged in water quality monitoring and act as environmental watchdogs and stewards of water resources. These organizations exhibit different monitoring mandates. As government involvement in water quality monitoring continues to decline, it becomes essential that we understand their modi operandi. By doing so, we can enhance efficacy and encourage data sharing and communication. This research examined Canadian ENGOs that collect their own data on water quality with respect to water quality monitoring activities and information needs. This work had a twofold purpose: (1) to enhance knowledge about the Canadian ENGOs operating in the realm of water quality monitoring and (2) to guide and inform development of web-based geographic information systems (GIS) to support water quality monitoring, particularly using benthic macroinvertebrate protocols. A structured telephone survey was administered across 10 Canadian provinces to 21 ENGOs that undertake water quality monitoring. This generated information about barriers and challenges of data sharing, commonly collected metrics, human resources, and perceptions of volunteer-collected data. Results are presented on an aggregate level and among different groups of respondents. Use of geomatics technology was not consistent among respondents, and we found no noteworthy differences between organizations that did and did not use GIS tools. About one third of respondents did not employ computerized systems (including databases and spreadsheets) to support data management, analysis, and sharing. Despite their advantage as a holistic water quality indicator, benthic macroinvertebrates (BMIs) were not widely employed in stream monitoring. Although BMIs are particularly suitable for the purpose of citizen education, few organizations collected this metric, despite having public education and awareness as part of their mandate.

  20. A controlled, before-and-after trial of an urban sanitation intervention to reduce enteric infections in children: research protocol for the Maputo Sanitation (MapSan) study, Mozambique

    PubMed Central

    Brown, Joe; Cumming, Oliver; Bartram, Jamie; Cairncross, Sandy; Ensink, Jeroen; Holcomb, David; Knee, Jackie; Kolsky, Peter; Liang, Kaida; Liang, Song; Nala, Rassul; Norman, Guy; Rheingans, Richard; Stewart, Jill; Zavale, Olimpio; Zuin, Valentina; Schmidt, Wolf-Peter

    2015-01-01

    Introduction Access to safe sanitation in low-income, informal settlements of Sub-Saharan Africa has not significantly improved since 1990. The combination of a high faecal-related disease burden and inadequate infrastructure suggests that investment in expanding sanitation access in densely populated urban slums can yield important public health gains. No rigorous, controlled intervention studies have evaluated the health effects of decentralised (non-sewerage) sanitation in an informal urban setting, despite the role that such technologies will likely play in scaling up access. Methods and analysis We have designed a controlled, before-and-after (CBA) trial to estimate the health impacts of an urban sanitation intervention in informal neighbourhoods of Maputo, Mozambique, including an assessment of whether exposures and health outcomes vary by localised population density. The intervention consists of private pour-flush latrines (to septic tank) shared by multiple households in compounds or household clusters. We will measure objective health outcomes in approximately 760 children (380 children with household access to interventions, 380 matched controls using existing shared private latrines in poor sanitary conditions), at 2 time points: immediately before the intervention and at follow-up after 12 months. The primary outcome is combined prevalence of selected enteric infections among children under 5 years of age. Secondary outcome measures include soil-transmitted helminth (STH) reinfection in children following baseline deworming and prevalence of reported diarrhoeal disease. We will use exposure assessment, faecal source tracking, and microbial transmission modelling to examine whether and how routes of exposure for diarrhoeagenic pathogens and STHs change following introduction of effective sanitation. Ethics Study protocols have been reviewed and approved by human subjects review boards at the London School of Hygiene and Tropical Medicine, the Georgia Institute of Technology, the University of North Carolina at Chapel Hill, and the Ministry of Health, Republic of Mozambique. Trial registration number NCT02362932. PMID:26088809

  1. Topics in quantum cryptography, quantum error correction, and channel simulation

    NASA Astrophysics Data System (ADS)

    Luo, Zhicheng

    In this thesis, we mainly investigate four different topics: efficiently implementable codes for quantum key expansion [51], quantum error-correcting codes based on privacy amplification [48], private classical capacity of quantum channels [44], and classical channel simulation with quantum side information [49, 50]. For the first topic, we propose an efficiently implementable quantum key expansion protocol, capable of increasing the size of a pre-shared secret key by a constant factor. Previously, the Shor-Preskill proof [64] of the security of the Bennett-Brassard 1984 (BB84) [6] quantum key distribution protocol relied on the theoretical existence of good classical error-correcting codes with the "dual-containing" property. But the explicit and efficiently decodable construction of such codes is unknown. We show that we can lift the dual-containing constraint by employing the non-dual-containing codes with excellent performance and efficient decoding algorithms. For the second topic, we propose a construction of Calderbank-Shor-Steane (CSS) [19, 68] quantum error-correcting codes, which are originally based on pairs of mutually dual-containing classical codes, by combining a classical code with a two-universal hash function. We show, using the results of Renner and Koenig [57], that the communication rates of such codes approach the hashing bound on tensor powers of Pauli channels in the limit of large block-length. For the third topic, we prove a regularized formula for the secret key assisted capacity region of a quantum channel for transmitting private classical information. This result parallels the work of Devetak on entanglement assisted quantum communication capacity. This formula provides a new family protocol, the private father protocol, under the resource inequality framework that includes the private classical communication without the assisted secret keys as a child protocol. For the fourth topic, we study and solve the problem of classical channel simulation with quantum side information at the receiver. Our main theorem has two important corollaries: rate-distortion theory with quantum side information and common randomness distillation. Simple proofs of achievability of classical multi-terminal source coding problems can be made via a unified approach using the channel simulation theorem as building blocks. The fully quantum generalization of the problem is also conjectured with outer and inner bounds on the achievable rate pairs.

  2. The Perfect Neuroimaging-Genetics-Computation Storm: Collision of Petabytes of Data, Millions of Hardware Devices and Thousands of Software Tools

    PubMed Central

    Dinov, Ivo D.; Petrosyan, Petros; Liu, Zhizhong; Eggert, Paul; Zamanyan, Alen; Torri, Federica; Macciardi, Fabio; Hobel, Sam; Moon, Seok Woo; Sung, Young Hee; Jiang, Zhiguo; Labus, Jennifer; Kurth, Florian; Ashe-McNalley, Cody; Mayer, Emeran; Vespa, Paul M.; Van Horn, John D.; Toga, Arthur W.

    2013-01-01

    The volume, diversity and velocity of biomedical data are exponentially increasing providing petabytes of new neuroimaging and genetics data every year. At the same time, tens-of-thousands of computational algorithms are developed and reported in the literature along with thousands of software tools and services. Users demand intuitive, quick and platform-agnostic access to data, software tools, and infrastructure from millions of hardware devices. This explosion of information, scientific techniques, computational models, and technological advances leads to enormous challenges in data analysis, evidence-based biomedical inference and reproducibility of findings. The Pipeline workflow environment provides a crowd-based distributed solution for consistent management of these heterogeneous resources. The Pipeline allows multiple (local) clients and (remote) servers to connect, exchange protocols, control the execution, monitor the states of different tools or hardware, and share complete protocols as portable XML workflows. In this paper, we demonstrate several advanced computational neuroimaging and genetics case-studies, and end-to-end pipeline solutions. These are implemented as graphical workflow protocols in the context of analyzing imaging (sMRI, fMRI, DTI), phenotypic (demographic, clinical), and genetic (SNP) data. PMID:23975276

  3. An adaptive transmission protocol for managing dynamic shared states in collaborative surgical simulation.

    PubMed

    Qin, J; Choi, K S; Ho, Simon S M; Heng, P A

    2008-01-01

    A force prediction algorithm is proposed to facilitate virtual-reality (VR) based collaborative surgical simulation by reducing the effect of network latencies. State regeneration is used to correct the estimated prediction. This algorithm is incorporated into an adaptive transmission protocol in which auxiliary features such as view synchronization and coupling control are equipped to ensure the system consistency. We implemented this protocol using multi-threaded technique on a cluster-based network architecture.

  4. Dutch Protocols for Deliberately Ending the Life of Newborns: A Defence.

    PubMed

    Tedesco, Matthew

    2017-06-01

    The Groningen Protocol, introduced in the Netherlands in 2005 and accompanied by revised guidelines published in a report commissioned by the Royal Dutch Medical Association in 2014, specifies conditions under which the lives of severely ill newborns may be deliberately ended. Its publication came four years after the Netherlands became the first nation to legalize the voluntary active euthanasia of adults, and the Netherlands remains the only country to offer a pathway to protecting physicians who might engage in deliberately ending the life of a newborn (DELN). In this paper, I offer two lines of argument. The first is a positive argument for the Protocol, grounded in the good of the newborn as unanimously determined by those in a position to determine it. The second addresses the widely shared belief that the killing of newborns is morally prohibited, where I offer two arguments-one grounded in the fact that the kinds of cases the Protocol is meant to govern are very rare and highly unusual, and the other focused more broadly on the role of pre-theoretical beliefs in moral reasoning-meant to undermine the strong role that the critic of the Protocol affords this belief. I argue that, given this second line of argument, the beliefs underlying my positive argument for the Protocol are in fact more secure than the widely shared belief underlying the critic's position.

  5. Coexistence of WiFi and WiMAX systems based on PS-request protocols.

    PubMed

    Kim, Jongwoo; Park, Suwon; Rhee, Seung Hyong; Choi, Yong-Hoon; Chung, Young-uk; Hwang, Ho Young

    2011-01-01

    We introduce both the coexistence zone within the WiMAX frame structure and a PS-Request protocol for the coexistence of WiFi and WiMAX systems sharing a frequency band. Because we know that the PS-Request protocol has drawbacks, we propose a revised PS-Request protocol to improve the performance. Two PS-Request protocols are based on the time division operation (TDO) of WiFi system and WiMAX system to avoid the mutual interference, and use the vestigial power management (PwrMgt) bit within the Frame Control field of the frames transmitted by a WiFi AP. The performance of the revised PS-Request protocol is evaluated by computer simulation, and compared to those of the cases without a coexistence protocol and to the original PS-Request protocol.

  6. The WISECARE Project and the impact of information technology on nursing knowledge.

    PubMed

    Sermeus, W; Hoy, D; Jodrell, N; Hyslop, A; Gypen, T; Kinnunen, J; Mantas, J; Delesie, L; Tansley, J; Hofdijk, J

    1997-01-01

    The European Union retained the WISECARE project "Work flow Information Systems for European nursing CARE" for funding. The project focuses on the use of telematics technology for clinical and resource management in oncology care in hospitals. This paper outlines the impact of introducing this kind of advanced nursing informatics application on the management of nursing knowledge. Three shift in knowledge management that will get high attention in WISECARE, are identified. The first is the shift from knowledge dissemination to knowledge sharing. The second is the shift from individual knowledge to organisational knowledge. The third is the shift from deductive, prescriptive knowledge as seen in guidelines, protocols to more inductive, experience based knowledge. The paper emphasizes that the real impact of information technology is not in the automation of existing processes but on the discovery of new ways of organisation and living.

  7. Protocol for a pre-implementation and post-implementation study on shared decision-making in the surgical treatment of women with early-stage breast cancer.

    PubMed

    Savelberg, Wilma; Moser, Albine; Smidt, Marjolein; Boersma, Liesbeth; Haekens, Christel; van der Weijden, Trudy

    2015-03-31

    The majority of patients diagnosed with early-stage breast cancer are in a position to choose between having a mastectomy or lumpectomy with radiation therapy (breast-conserving therapy). Since the long-term survival rates for mastectomy and for lumpectomy with radiation therapy are comparable, patients' informed preferences are important for decision-making. Although most clinicians believe that they do include patients in the decision-making process, the information that women with breast cancer receive regarding the surgical options is often rather subjective, and does not invite patients to express their preferences. Shared decision-making (SDM) is meant to help patients clarify their preferences, resulting in greater satisfaction with their final choice. Patient decision aids can be very supportive in SDM. We present the protocol of a study to β test a patient decision aid and optimise strategies for the implementation of SDM regarding the treatment of early-stage breast cancer in the actual clinical setting. This paper concerns a pre-implementation and post-implementation study, lasting from October 2014 to June 2015. The intervention consists of implementing SDM using a patient decision aid. The intervention will be evaluated using qualitative and quantitative measures, acquired prior to, during and after the implementation of SDM. Outcome measures are knowledge about treatment, perceived SDM and decisional conflict. We will also conduct face-to-face interviews with a sample of these patients and their care providers, to assess their experiences with the implementation of SDM and the patient decision aid. This protocol was approved by the Maastricht University Medical Centre (MUMC) ethics committee. The findings will be disseminated through peer-reviewed journal articles and presentations at national conferences. Findings will be used to finalise a multi-faceted implementation strategy to test the implementation of SDM and a patient decision aid in terms of cost-effectiveness, in a multicentre cluster randomised controlled trial (RCT). NTR4879. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  8. Integrating biomedical and herbal medicine in Ghana - experiences from the Kumasi South Hospital: a qualitative study.

    PubMed

    Boateng, Millicent Addai; Danso-Appiah, Anthony; Turkson, Bernard Kofi; Tersbøl, Britt Pinkowski

    2016-07-07

    Over the past decade there has been growing interest in the use of herbal medicine both in developed and developing countries. Given the high proportion of patients using herbal medicine in Ghana, some health facilities have initiated implementation of herbal medicine as a component of their healthcare delivery. However, the extent to which herbal medicine has been integrated in Ghanaian health facilities, how integration is implemented and perceived by different stakeholders has not been documented. The study sought to explore these critical issues at the Kumasi South Hospital (KSH) and outline the challenges and motivations of the integration process. Qualitative phenomenological exploratory study design involving fieldwork observations, focus group discussion, in-depth interviews and key informants' interviews was employed to collect data. Policies and protocols outlining the definition, process and goals of integration were lacking, with respondents sharing different views about the purpose and value of integration of herbal medicine within public health facilities. Key informants were supportive of the initiative. Whilst biomedical health workers perceived the system to be parallel than integrated, health personnel providing herbal medicine perceived the system as integrated. Most patients were not aware of the herbal clinic in the hospital but those who had utilized services of the herbal clinic viewed the clinic as part of the hospital. The lack of a regulatory policy and protocol for the integration seemed to have led to the different perception of the integration. Policy and protocol to guide the integration are key recommendations.

  9. Access and benefit sharing: Best practices for the use and exchange of invertebrate biological control agents

    USDA-ARS?s Scientific Manuscript database

    The Convention on Biological Diversity (CBD) acknowledges the sovereign rights that countries have over their ‘genetic resources’. The Nagoya Protocol that came into force in 2014 provides a framework for implementation of and equitable process by which access to, and sharing of benefits between don...

  10. [Development of clinical trial education program for pharmaceutical science students through small group discussion and role-playing using protocol].

    PubMed

    Imakyure, Osamu; Shuto, Hideki; Nishikawa, Fumi; Hagiwara, Yoshifuka; Inoue, Sachiko; Koyanagi, Taeko; Hirakawa, Masaaki; Kataoka, Yasufumi

    2010-08-01

    The acquirement of basic knowledge of clinical trials and professional attitude in their practices is a general instructional objective in the Model Core Curriculum for Pharmaceutical Education. Unfortunately, the previous program of clinical trial education was not effective in the acquirement of a professional attitude in their practices. Then, we developed the new clinical trial education program using protocol through small group discussion (SGD) and roll-playing. Our program consists of 7 steps of practical training. In step 1, the students find some problems after presentation of the protocol including case and prescription. In step 2, they analyse the extracted problems and share the information obtained in SGD. In steps 3 and 5, five clinical case scenarios are presented to the students and they discuss which case is suitable for entry to the clinical trial or which case corresponds to the discontinuance criteria in the present designed protocol. In steps 4 and 6, the roll-playing is performed by teachers and students as doctors and clinical research coordinators (CRC) respectively. Further, we conducted a trial practice based on this program for the students. In the student's self-evaluation into five grades, the average score of the skill acquisition level in each step was 3.8-4.7 grade. Our clinical trial education program could be effective in educating the candidates for CRC or clinical pharmacists.

  11. Oceanotron, Scalable Server for Marine Observations

    NASA Astrophysics Data System (ADS)

    Loubrieu, T.; Bregent, S.; Blower, J. D.; Griffiths, G.

    2013-12-01

    Ifremer, French marine institute, is deeply involved in data management for different ocean in-situ observation programs (ARGO, OceanSites, GOSUD, ...) or other European programs aiming at networking ocean in-situ observation data repositories (myOcean, seaDataNet, Emodnet). To capitalize the effort for implementing advance data dissemination services (visualization, download with subsetting) for these programs and generally speaking water-column observations repositories, Ifremer decided to develop the oceanotron server (2010). Knowing the diversity of data repository formats (RDBMS, netCDF, ODV, ...) and the temperamental nature of the standard interoperability interface profiles (OGC/WMS, OGC/WFS, OGC/SOS, OpeNDAP, ...), the server is designed to manage plugins: - StorageUnits : which enable to read specific data repository formats (netCDF/OceanSites, RDBMS schema, ODV binary format). - FrontDesks : which get external requests and send results for interoperable protocols (OGC/WMS, OGC/SOS, OpenDAP). In between a third type of plugin may be inserted: - TransformationUnits : which enable ocean business related transformation of the features (for example conversion of vertical coordinates from pressure in dB to meters under sea surface). The server is released under open-source license so that partners can develop their own plugins. Within MyOcean project, University of Reading has plugged a WMS implementation as an oceanotron frontdesk. The modules are connected together by sharing the same information model for marine observations (or sampling features: vertical profiles, point series and trajectories), dataset metadata and queries. The shared information model is based on OGC/Observation & Measurement and Unidata/Common Data Model initiatives. The model is implemented in java (http://www.ifremer.fr/isi/oceanotron/javadoc/). This inner-interoperability level enables to capitalize ocean business expertise in software development without being indentured to specific data formats or protocols. Oceanotron is deployed at seven European data centres for marine in-situ observations within myOcean. While additional extensions are still being developed, to promote new collaborative initiatives, a work is now done on continuous and distributed integration (jenkins, maven), shared reference documentation (on alfresco) and code and release dissemination (sourceforge, github).

  12. Earth BioGenome Project: Sequencing life for the future of life.

    PubMed

    Lewin, Harris A; Robinson, Gene E; Kress, W John; Baker, William J; Coddington, Jonathan; Crandall, Keith A; Durbin, Richard; Edwards, Scott V; Forest, Félix; Gilbert, M Thomas P; Goldstein, Melissa M; Grigoriev, Igor V; Hackett, Kevin J; Haussler, David; Jarvis, Erich D; Johnson, Warren E; Patrinos, Aristides; Richards, Stephen; Castilla-Rubio, Juan Carlos; van Sluys, Marie-Anne; Soltis, Pamela S; Xu, Xun; Yang, Huanming; Zhang, Guojie

    2018-04-24

    Increasing our understanding of Earth's biodiversity and responsibly stewarding its resources are among the most crucial scientific and social challenges of the new millennium. These challenges require fundamental new knowledge of the organization, evolution, functions, and interactions among millions of the planet's organisms. Herein, we present a perspective on the Earth BioGenome Project (EBP), a moonshot for biology that aims to sequence, catalog, and characterize the genomes of all of Earth's eukaryotic biodiversity over a period of 10 years. The outcomes of the EBP will inform a broad range of major issues facing humanity, such as the impact of climate change on biodiversity, the conservation of endangered species and ecosystems, and the preservation and enhancement of ecosystem services. We describe hurdles that the project faces, including data-sharing policies that ensure a permanent, freely available resource for future scientific discovery while respecting access and benefit sharing guidelines of the Nagoya Protocol. We also describe scientific and organizational challenges in executing such an ambitious project, and the structure proposed to achieve the project's goals. The far-reaching potential benefits of creating an open digital repository of genomic information for life on Earth can be realized only by a coordinated international effort.

  13. Privacy-preserving public auditing for data integrity in cloud

    NASA Astrophysics Data System (ADS)

    Shaik Saleem, M.; Murali, M.

    2018-04-01

    Cloud computing which has collected extent concentration from communities of research and with industry research development, a large pool of computing resources using virtualized sharing method like storage, processing power, applications and services. The users of cloud are vend with on demand resources as they want in the cloud computing. Outsourced file of the cloud user can easily tampered as it is stored at the third party service providers databases, so there is no integrity of cloud users data as it has no control on their data, therefore providing security assurance to the users data has become one of the primary concern for the cloud service providers. Cloud servers are not responsible for any data loss as it doesn’t provide the security assurance to the cloud user data. Remote data integrity checking (RDIC) licenses an information to data storage server, to determine that it is really storing an owners data truthfully. RDIC is composed of security model and ID-based RDIC where it is responsible for the security of every server and make sure the data privacy of cloud user against the third party verifier. Generally, by running a two-party Remote data integrity checking (RDIC) protocol the clients would themselves be able to check the information trustworthiness of their cloud. Within the two party scenario the verifying result is given either from the information holder or the cloud server may be considered as one-sided. Public verifiability feature of RDIC gives the privilege to all its users to verify whether the original data is modified or not. To ensure the transparency of the publicly verifiable RDIC protocols, Let’s figure out there exists a TPA who is having knowledge and efficiency to verify the work to provide the condition clearly by publicly verifiable RDIC protocols.

  14. The general theory of three-party quantum secret sharing protocols over phase-damping channels

    NASA Astrophysics Data System (ADS)

    Song, Ting-Ting; Wen, Qiao-Yan; Qin, Su-Juan; Zhang, Wei-Wei; Sun, Ying

    2013-10-01

    The general theory of three-party QSS protocols with the noisy quantum channels is discussed. When the particles are transmitted through the noisy quantum channels, the initial pure three-qubit tripartite entangled states would be changed into mixed states. We analyze the security of QSS protocols with the different kinds of three-qubit tripartite entangled states under phase-damping channels and figure out, for different kinds of initial states, the successful probabilities that Alice's secret can be recovered by legal agents are different. Comparing with one recent QSS protocol based on GHZ states, our scheme is secure, and has a little smaller key rate than that of the recent protocol.

  15. Low-cost Cognitive Electronics Technology for Enhanced Communications and Situational Awareness for Networks of Small Unmanned Aerial Vehicles (UAV)

    DTIC Science & Technology

    2013-03-01

    series of checkpoints in a complex route network,” while observing standard traffic etiquette and regulations [17]. The rules for the 2012 RoboCup...structure or protocols above the PHY. To support AVEP operation, we developed a packet structure based on the transmission control protocol (TCP...Control Protocol .” 1981. [37] F. Ge, Q. Chen, Y. Wang, C. W. Bostian, T. W. Rondeau, and B. Le, “Cognitive radio: from spectrum sharing to adaptive

  16. Protocol evaluation for effective music therapy for persons with nonfluent aphasia.

    PubMed

    Kim, Mijin; Tomaino, Concetta M

    2008-01-01

    Although the notion of the language specificity of neural correlates has been widely accepted in the past (e.g., lefthemispheric dominance including Broca's and Wernike's area, N400 ERP component of semantic processing, and the P600 ERP component of syntactic processing, etc.), recent studies have shown that music and language share some important neurological aspects in their processing, both involving bilateral hemispheric activities. In line with this are the frequent behavioral clinical observations that persons with aphasia show improved articulation and prosody of speech in musically assisted phrases. Connecting recent neurological findings with clinical observations would not only inform clinical practice but would enhance understanding of the neurological mechanisms involved in the processing of speech/language and music. This article presents a music therapy treatment protocol study of 7 nonfluent patients with aphasia. The data and findings are discussed with regard to some of the recent focuses and issues addressed in the experimental studies using cognitive-behavioral, electrophysiological, and brain-imaging techniques.

  17. [Interface interconnection and data integration in implementing of digital operating room].

    PubMed

    Feng, Jingyi; Chen, Hua; Liu, Jiquan

    2011-10-01

    The digital operating-room, with highly integrated clinical information, is very important for rescuing lives of patients and improving quality of operations. Since equipments in domestic operating-rooms have diversified interface and nonstandard communication protocols, designing and implementing an integrated data sharing program for different kinds of diagnosing, monitoring, and treatment equipments become a key point in construction of digital operating room. This paper addresses interface interconnection and data integration for commonly used clinical equipments from aspects of hardware interface, interface connection and communication protocol, and offers a solution for interconnection and integration of clinical equipments in heterogeneous environment. Based on the solution, a case of an optimal digital operating-room is presented in this paper. Comparing with the international solution for digital operating-room, the solution proposed in this paper is more economical and effective. And finally, this paper provides a proposal for the platform construction of digital perating-room as well as a viewpoint for standardization of domestic clinical equipments.

  18. Coexistence of WiFi and WiMAX Systems Based on PS-Request Protocols†

    PubMed Central

    Kim, Jongwoo; Park, Suwon; Rhee, Seung Hyong; Choi, Yong-Hoon; Chung, Young-uk; Hwang, Ho Young

    2011-01-01

    We introduce both the coexistence zone within the WiMAX frame structure and a PS-Request protocol for the coexistence of WiFi and WiMAX systems sharing a frequency band. Because we know that the PS-Request protocol has drawbacks, we propose a revised PS-Request protocol to improve the performance. Two PS-Request protocols are based on the time division operation (TDO) of WiFi system and WiMAX system to avoid the mutual interference, and use the vestigial power management (PwrMgt) bit within the Frame Control field of the frames transmitted by a WiFi AP. The performance of the revised PS-Request protocol is evaluated by computer simulation, and compared to those of the cases without a coexistence protocol and to the original PS-Request protocol. PMID:22163721

  19. A survey of system architecture requirements for health care-based wireless sensor networks.

    PubMed

    Egbogah, Emeka E; Fapojuwo, Abraham O

    2011-01-01

    Wireless Sensor Networks (WSNs) have emerged as a viable technology for a vast number of applications, including health care applications. To best support these health care applications, WSN technology can be adopted for the design of practical Health Care WSNs (HCWSNs) that support the key system architecture requirements of reliable communication, node mobility support, multicast technology, energy efficiency, and the timely delivery of data. Work in the literature mostly focuses on the physical design of the HCWSNs (e.g., wearable sensors, in vivo embedded sensors, et cetera). However, work towards enhancing the communication layers (i.e., routing, medium access control, et cetera) to improve HCWSN performance is largely lacking. In this paper, the information gleaned from an extensive literature survey is shared in an effort to fortify the knowledge base for the communication aspect of HCWSNs. We highlight the major currently existing prototype HCWSNs and also provide the details of their routing protocol characteristics. We also explore the current state of the art in medium access control (MAC) protocols for WSNs, for the purpose of seeking an energy efficient solution that is robust to mobility and delivers data in a timely fashion. Furthermore, we review a number of reliable transport layer protocols, including a network coding based protocol from the literature, that are potentially suitable for delivering end-to-end reliability of data transmitted in HCWSNs. We identify the advantages and disadvantages of the reviewed MAC, routing, and transport layer protocols as they pertain to the design and implementation of a HCWSN. The findings from this literature survey will serve as a useful foundation for designing a reliable HCWSN and also contribute to the development and evaluation of protocols for improving the performance of future HCWSNs. Open issues that required further investigations are highlighted.

  20. CERN alerter—RSS based system for information broadcast to all CERN offices

    NASA Astrophysics Data System (ADS)

    Otto, R.

    2008-07-01

    Nearly every large organization uses a tool to broadcast messages and information across the internal campus (messages like alerts announcing interruption in services or just information about upcoming events). These tools typically allow administrators (operators) to send 'targeted' messages which are sent only to specific groups of users or computers, e/g only those located in a specified building or connected to a particular computing service. CERN has a long history of such tools: CERNVMS's SPM_quotMESSAGE command, Zephyr [2] and the most recent the NICE Alerter based on the NNTP protocol. The NICE Alerter used on all Windows-based computers had to be phased out as a consequence of phasing out NNTP at CERN. The new solution to broadcast information messages on the CERN campus continues to provide the service based on cross-platform technologies, hence minimizing custom developments and relying on commercial software as much as possible. The new system, called CERN Alerter, is based on RSS (Really Simple Syndication) [9] for the transport protocol and uses Microsoft SharePoint as the backend for database and posting interface. The windows-based client relies on Internet Explorer 7.0 with custom code to trigger the window pop-ups and the notifications for new events. Linux and Mac OS X clients could also rely on any RSS readers to subscribe to targeted notifications. The paper covers the architecture and implementation aspects of the new system.

  1. An evidence-based shared decision making programme on the prevention of myocardial infarction in type 2 diabetes: protocol of a randomised-controlled trial.

    PubMed

    Buhse, Susanne; Heller, Tabitha; Kasper, Jürgen; Mühlhauser, Ingrid; Müller, Ulrich Alfons; Lehmann, Thomas; Lenz, Matthias

    2013-10-19

    Lack of patient involvement in decision making has been suggested as one reason for limited treatment success. Concepts such as shared decision making may contribute to high quality healthcare by supporting patients to make informed decisions together with their physicians.A multi-component shared decision making programme on the prevention of heart attack in type 2 diabetes has been developed. It aims at improving the quality of decision-making by providing evidence-based patient information, enhancing patients' knowledge, and supporting them to actively participate in decision-making. In this study the efficacy of the programme is evaluated in the setting of a diabetes clinic. A single blinded randomised-controlled trial is conducted to compare the shared decision making programme with a control-intervention. The intervention consists of an evidence-based patient decision aid on the prevention of myocardial infarction and a corresponding counselling module provided by diabetes educators. Similar in duration and structure, the control-intervention targets nutrition, sports, and stress coping. A total of 154 patients between 40 and 69 years of age with type 2 diabetes and no previous diagnosis of ischaemic heart disease or stroke are enrolled and allocated either to the intervention or the control-intervention. Primary outcome measure is the patients' knowledge on benefits and harms of heart attack prevention captured by a standardised knowledge test. Key secondary outcome measure is the achievement of treatment goals prioritised by the individual patient. Treatment goals refer to statin taking, HbA1c-, blood pressure levels and smoking status. Outcomes are assessed directly after the counselling and at 6 months follow-up. Analyses will be carried out on intention-to-treat basis. Concurrent qualitative methods are used to explore intervention fidelity and to gain insight into implementation processes. Interventions to facilitate evidence-based shared decision making represent an innovative approach in diabetes care. The results of this study will provide information on the efficacy of such a concept in the setting of a diabetes clinic in Germany. ISRCTN84636255.

  2. Transitions of care from Child and Adolescent Mental Health Services to Adult Mental Health Services (TRACK Study): a study of protocols in Greater London.

    PubMed

    Singh, Swaran P; Paul, Moli; Ford, Tamsin; Kramer, Tami; Weaver, Tim

    2008-06-23

    Although young people's transition from Child and Adolescent Mental Health Services (CAMHS) to Adult Mental Health Services (AMHS) in England is a significant health issue for service users, commissioners and providers, there is little evidence available to guide service development. The TRACK study aims to identify factors which facilitate or impede effective transition from CAHMS to AMHS. This paper presents findings from a survey of transition protocols in Greater London. A questionnaire survey (Jan-April 2005) of Greater London CAMHS to identify transition protocols and collect data on team size, structure, transition protocols, population served and referral rates to AMHS. Identified transition protocols were subjected to content analysis. Forty two of the 65 teams contacted (65%) responded to the survey. Teams varied in type (generic/targeted/in-patient), catchment area (locality-based, wider or national) and transition boundaries with AMHS. Estimated annual average number of cases considered suitable for transfer to AMHS, per CAMHS team (mean 12.3, range 0-70, SD 14.5, n = 37) was greater than the annual average number of cases actually accepted by AMHS (mean 8.3, range 0-50, SD 9.5, n = 33). In April 2005, there were 13 active and 2 draft protocols in Greater London. Protocols were largely similar in stated aims and policies, but differed in key procedural details, such as joint working between CAHMS and AMHS and whether protocols were shared at Trust or locality level. While the centrality of service users' involvement in the transition process was identified, no protocol specified how users should be prepared for transition. A major omission from protocols was procedures to ensure continuity of care for patients not accepted by AMHS. At least 13 transition protocols were in operation in Greater London in April 2005. Not all protocols meet all requirements set by government policy. Variation in protocol-sharing organisational units and transition process suggest that practice may vary. There is discontinuity of care provision for some patients who 'graduate' from CAMHS services but are not accepted by adult services.

  3. Transitions of Care from Child and Adolescent Mental Health Services to Adult Mental Health Services (TRACK Study): A study of protocols in Greater London

    PubMed Central

    Singh, Swaran P; Paul, Moli; Ford, Tamsin; Kramer, Tami; Weaver, Tim

    2008-01-01

    Background Although young people's transition from Child and Adolescent Mental Health Services (CAMHS) to Adult Mental Health Services (AMHS) in England is a significant health issue for service users, commissioners and providers, there is little evidence available to guide service development. The TRACK study aims to identify factors which facilitate or impede effective transition from CAHMS to AMHS. This paper presents findings from a survey of transition protocols in Greater London. Methods A questionnaire survey (Jan-April 2005) of Greater London CAMHS to identify transition protocols and collect data on team size, structure, transition protocols, population served and referral rates to AMHS. Identified transition protocols were subjected to content analysis. Results Forty two of the 65 teams contacted (65%) responded to the survey. Teams varied in type (generic/targeted/in-patient), catchment area (locality-based, wider or national) and transition boundaries with AMHS. Estimated annual average number of cases considered suitable for transfer to AMHS, per CAMHS team (mean 12.3, range 0–70, SD 14.5, n = 37) was greater than the annual average number of cases actually accepted by AMHS (mean 8.3, range 0–50, SD 9.5, n = 33). In April 2005, there were 13 active and 2 draft protocols in Greater London. Protocols were largely similar in stated aims and policies, but differed in key procedural details, such as joint working between CAHMS and AMHS and whether protocols were shared at Trust or locality level. While the centrality of service users' involvement in the transition process was identified, no protocol specified how users should be prepared for transition. A major omission from protocols was procedures to ensure continuity of care for patients not accepted by AMHS. Conclusion At least 13 transition protocols were in operation in Greater London in April 2005. Not all protocols meet all requirements set by government policy. Variation in protocol-sharing organisational units and transition process suggest that practice may vary. There is discontinuity of care provision for some patients who 'graduate' from CAMHS services but are not accepted by adult services. PMID:18573214

  4. 3D-Lab: a collaborative web-based platform for molecular modeling.

    PubMed

    Grebner, Christoph; Norrby, Magnus; Enström, Jonatan; Nilsson, Ingemar; Hogner, Anders; Henriksson, Jonas; Westin, Johan; Faramarzi, Farzad; Werner, Philip; Boström, Jonas

    2016-09-01

    The use of 3D information has shown impact in numerous applications in drug design. However, it is often under-utilized and traditionally limited to specialists. We want to change that, and present an approach making 3D information and molecular modeling accessible and easy-to-use 'for the people'. A user-friendly and collaborative web-based platform (3D-Lab) for 3D modeling, including a blazingly fast virtual screening capability, was developed. 3D-Lab provides an interface to automatic molecular modeling, like conformer generation, ligand alignments, molecular dockings and simple quantum chemistry protocols. 3D-Lab is designed to be modular, and to facilitate sharing of 3D-information to promote interactions between drug designers. Recent enhancements to our open-source virtual reality tool Molecular Rift are described. The integrated drug-design platform allows drug designers to instantaneously access 3D information and readily apply advanced and automated 3D molecular modeling tasks, with the aim to improve decision-making in drug design projects.

  5. Burnet Project

    PubMed Central

    Masellis, A.; Atiyeh, B.

    2009-01-01

    Summary The BurNet project, a pilot project of the Eumedis initiative, has become true. The Eumedis (EUro MEDiterranean Information Society) initiative is part of the MEDA programme of the EU to develop the Information Society in the Mediterranean area. In the health care sector, the objective of Eumedis is: the deployment of network-based solutions to interconnect - using userfriendly and affordable solutions - the actors at all levels of the "health care system" of the Euro-Mediterranean region. The Bur Net project interconnects 17 Burn Centres (BC) in the Mediterranean Area through an information network both to standardize courses of action in the field of prevention, treatment, and functional and psychological rehabilitation of burn patients and to coordinate interactions between BC and emergency rooms in peripheral hospitals using training/information activities and telemedicine to optimize first aid provided to burn patients before referral to a BC. Shared procedure protocols for prevention and the care and rehabilitation of patients, both at individual and mass level, will help to create an international specialized database and a Webbased teleconsultation system. PMID:21991176

  6. Investigation into Practical Implementations of a Zero Knowledge Protocol.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Marleau, Peter; Krentz-Wee, Rebecca E.

    In recent years, the concept of Zero Knowledge Protocols (ZKP) as a useful approach to nuclear warhead verification has become increasingly popular. Several implementations of ZKP have been proposed, driving technology development toward proof of concept demonstrations. Whereas proposed implementations seem to fall within the general class of template-based techniques, all physical implementations of ZKPs proposed to date have a complication: once the instrumentation is prepared, it is no longer authenticatable; the instrument physically contains sensitive information. In this work we explore three different concepts that may offer more authenticatable and practical ZKP implementations and evaluate the sensitive information thatmore » may be at risk when doing so: sharing a subset of detector counts in a preloaded image (with spatial information removed), real-time image subtraction, and a new concept, CONfirmation using a Fast-neutron Imaging Detector with Anti-image NULL-positive Time Encoding (CONFIDANTE). CONFIDANTE promises to offer an almost ideal implementation of ZKP: a positive result is indicated by a constant rate at all times enabling the monitoring party the possibility of full access to the instrument before, during, and after confirmation. A prototype of CONFIDANTE was designed, built, and its performance evaluated in a series of measurements of several objects including a set of plutonium dioxide Hemispheres. Very encouraging results proving feasibility are presented. 1 Rebecca is currently a graduate student in Nuclear Engineering at UC Berkeley« less

  7. Secure data sharing in public cloud

    NASA Astrophysics Data System (ADS)

    Venkataramana, Kanaparti; Naveen Kumar, R.; Tatekalva, Sandhya; Padmavathamma, M.

    2012-04-01

    Secure multi-party protocols have been proposed for entities (organizations or individuals) that don't fully trust each other to share sensitive information. Many types of entities need to collect, analyze, and disseminate data rapidly and accurately, without exposing sensitive information to unauthorized or untrusted parties. Solutions based on secure multiparty computation guarantee privacy and correctness, at an extra communication (too costly in communication to be practical) and computation cost. The high overhead motivates us to extend this SMC to cloud environment which provides large computation and communication capacity which makes SMC to be used between multiple clouds (i.e., it may between private or public or hybrid clouds).Cloud may encompass many high capacity servers which acts as a hosts which participate in computation (IaaS and PaaS) for final result, which is controlled by Cloud Trusted Authority (CTA) for secret sharing within the cloud. The communication between two clouds is controlled by High Level Trusted Authority (HLTA) which is one of the hosts in a cloud which provides MgaaS (Management as a Service). Due to high risk for security in clouds, HLTA generates and distributes public keys and private keys by using Carmichael-R-Prime- RSA algorithm for exchange of private data in SMC between itself and clouds. In cloud, CTA creates Group key for Secure communication between the hosts in cloud based on keys sent by HLTA for exchange of Intermediate values and shares for computation of final result. Since this scheme is extended to be used in clouds( due to high availability and scalability to increase computation power) it is possible to implement SMC practically for privacy preserving in data mining at low cost for the clients.

  8. Health information and communication system for emergency management in a developing country, Iran.

    PubMed

    Seyedin, Seyed Hesam; Jamali, Hamid R

    2011-08-01

    Disasters are fortunately rare occurrences. However, accurate and timely information and communication are vital to adequately prepare individual health organizations for such events. The current article investigates the health related communication and information systems for emergency management in Iran. A mixed qualitative and quantitative methodology was used in this study. A sample of 230 health service managers was surveyed using a questionnaire and 65 semi-structured interviews were also conducted with public health and therapeutic affairs managers who were responsible for emergency management. A range of problems were identified including fragmentation of information, lack of local databases, lack of clear information strategy and lack of a formal system for logging disaster related information at regional or local level. Recommendations were made for improving the national emergency management information and communication system. The findings have implications for health organizations in developing and developed countries especially in the Middle East. Creating disaster related information databases, creating protocols and standards, setting an information strategy, training staff and hosting a center for information system in the Ministry of Health to centrally manage and share the data could improve the current information system.

  9. The expanding cognitive-behavioural therapy treatment umbrella for the anxiety disorders: disorder-specific and transdiagnostic approaches.

    PubMed

    Rector, Neil A; Man, Vincent; Lerman, Bethany

    2014-06-01

    Cognitive-behavioural therapy (CBT) is an empirically supported treatment for anxiety disorders. CBT treatments are based on disorder-specific protocols that have been developed to target individual anxiety disorders, despite that anxiety disorders frequently co-occur and are comorbid with depression. Given the high rates of diagnostic comorbidity, substantial overlap in dimensional symptom ratings, and extensive evidence that the mood and anxiety disorders share a common set of psychological and biological vulnerabilities, transdiagnostic CBT protocols have recently been developed to treat the commonalities among the mood and anxiety disorders. We conducted a selective review of empirical developments in the transdiagnostic CBT treatment of anxiety and depression (2008-2013). Preliminary evidence suggests that theoretically based transdiagnostic CBT approaches lead to large treatment effects on the primary anxiety disorder, considerable reduction of diagnostic comorbidity, and some preliminary effects regarding the impact on the putative, shared psychological mechanisms. However, the empirical literature remains tentative owing to relatively small samples, limited direct comparisons with disorder-specific CBT protocols, and the relative absence of the study of disorder-specific compared with shared mechanisms of action in treatment. We conclude with a treatment conceptualization of the new transdiagnostic interventions as complementary, rather than contradictory, to disorder-specific CBT.

  10. 77 FR 36281 - Solicitation of Information and Recommendations for Revising OIG's Provider Self-Disclosure Protocol

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-18

    ...] Solicitation of Information and Recommendations for Revising OIG's Provider Self-Disclosure Protocol AGENCY... Register notice informs the public that OIG: (1) Intends to update the Provider Self-Disclosure Protocol... Provider Self-Disclosure Protocol (the Protocol) to establish a process for health care providers to...

  11. Managing virtual machines with Vac and Vcycle

    NASA Astrophysics Data System (ADS)

    McNab, A.; Love, P.; MacMahon, E.

    2015-12-01

    We compare the Vac and Vcycle virtual machine lifecycle managers and our experiences in providing production job execution services for ATLAS, CMS, LHCb, and the GridPP VO at sites in the UK, France and at CERN. In both the Vac and Vcycle systems, the virtual machines are created outside of the experiment's job submission and pilot framework. In the case of Vac, a daemon runs on each physical host which manages a pool of virtual machines on that host, and a peer-to-peer UDP protocol is used to achieve the desired target shares between experiments across the site. In the case of Vcycle, a daemon manages a pool of virtual machines on an Infrastructure-as-a-Service cloud system such as OpenStack, and has within itself enough information to create the types of virtual machines to achieve the desired target shares. Both systems allow unused shares for one experiment to temporarily taken up by other experiements with work to be done. The virtual machine lifecycle is managed with a minimum of information, gathered from the virtual machine creation mechanism (such as libvirt or OpenStack) and using the proposed Machine/Job Features API from WLCG. We demonstrate that the same virtual machine designs can be used to run production jobs on Vac and Vcycle/OpenStack sites for ATLAS, CMS, LHCb, and GridPP, and that these technologies allow sites to be operated in a reliable and robust way.

  12. A Shared Infrastructure for Federated Search Across Distributed Scientific Metadata Catalogs

    NASA Astrophysics Data System (ADS)

    Reed, S. A.; Truslove, I.; Billingsley, B. W.; Grauch, A.; Harper, D.; Kovarik, J.; Lopez, L.; Liu, M.; Brandt, M.

    2013-12-01

    The vast amount of science metadata can be overwhelming and highly complex. Comprehensive analysis and sharing of metadata is difficult since institutions often publish to their own repositories. There are many disjoint standards used for publishing scientific data, making it difficult to discover and share information from different sources. Services that publish metadata catalogs often have different protocols, formats, and semantics. The research community is limited by the exclusivity of separate metadata catalogs and thus it is desirable to have federated search interfaces capable of unified search queries across multiple sources. Aggregation of metadata catalogs also enables users to critique metadata more rigorously. With these motivations in mind, the National Snow and Ice Data Center (NSIDC) and Advanced Cooperative Arctic Data and Information Service (ACADIS) implemented two search interfaces for the community. Both the NSIDC Search and ACADIS Arctic Data Explorer (ADE) use a common infrastructure which keeps maintenance costs low. The search clients are designed to make OpenSearch requests against Solr, an Open Source search platform. Solr applies indexes to specific fields of the metadata which in this instance optimizes queries containing keywords, spatial bounds and temporal ranges. NSIDC metadata is reused by both search interfaces but the ADE also brokers additional sources. Users can quickly find relevant metadata with minimal effort and ultimately lowers costs for research. This presentation will highlight the reuse of data and code between NSIDC and ACADIS, discuss challenges and milestones for each project, and will identify creation and use of Open Source libraries.

  13. Tasking and sharing sensing assets using controlled natural language

    NASA Astrophysics Data System (ADS)

    Preece, Alun; Pizzocaro, Diego; Braines, David; Mott, David

    2012-06-01

    We introduce an approach to representing intelligence, surveillance, and reconnaissance (ISR) tasks at a relatively high level in controlled natural language. We demonstrate that this facilitates both human interpretation and machine processing of tasks. More specically, it allows the automatic assignment of sensing assets to tasks, and the informed sharing of tasks between collaborating users in a coalition environment. To enable automatic matching of sensor types to tasks, we created a machine-processable knowledge representation based on the Military Missions and Means Framework (MMF), and implemented a semantic reasoner to match task types to sensor types. We combined this mechanism with a sensor-task assignment procedure based on a well-known distributed protocol for resource allocation. In this paper, we re-formulate the MMF ontology in Controlled English (CE), a type of controlled natural language designed to be readable by a native English speaker whilst representing information in a structured, unambiguous form to facilitate machine processing. We show how CE can be used to describe both ISR tasks (for example, detection, localization, or identication of particular kinds of object) and sensing assets (for example, acoustic, visual, or seismic sensors, mounted on motes or unmanned vehicles). We show how these representations enable an automatic sensor-task assignment process. Where a group of users are cooperating in a coalition, we show how CE task summaries give users in the eld a high-level picture of ISR coverage of an area of interest. This allows them to make ecient use of sensing resources by sharing tasks.

  14. Research on Information Sharing Mechanism of Network Organization Based on Evolutionary Game

    NASA Astrophysics Data System (ADS)

    Wang, Lin; Liu, Gaozhi

    2018-02-01

    This article first elaborates the concept and effect of network organization, and the ability to share information is analyzed, secondly introduces the evolutionary game theory, network organization for information sharing all kinds of limitations, establishes the evolutionary game model, analyzes the dynamic evolution of network organization of information sharing, through reasoning and evolution. The network information sharing by the initial state and two sides of the game payoff matrix of excess profits and information is the information sharing of cost and risk sharing are the influence of network organization node information sharing decision.

  15. Anonymity Versus Privacy: Selective Information Sharing in Online Cancer Communities

    PubMed Central

    Vermeulen, Ivar E; Beekers, Nienke

    2014-01-01

    Background Active sharing in online cancer communities benefits patients. However, many patients refrain from sharing health information online due to privacy concerns. Existing research on privacy emphasizes data security and confidentiality, largely focusing on electronic medical records. Patient preferences around information sharing in online communities remain poorly understood. Consistent with the privacy calculus perspective adopted from e-commerce research, we suggest that patients approach online information sharing instrumentally, weighing privacy costs against participation benefits when deciding whether to share certain information. Consequently, we argue that patients prefer sharing clinical information over daily life and identity information that potentially compromises anonymity. Furthermore, we explore whether patients’ prior experiences, age, health, and gender affect perceived privacy costs and thus willingness to share information. Objective The goal of the present study is to document patient preferences for sharing information within online health platforms. Methods A total of 115 cancer patients reported sharing intentions for 15 different types of information, demographics, health status, prior privacy experiences, expected community utility, and privacy concerns. Results Factor analysis on the 15 information types revealed 3 factors coinciding with 3 proposed information categories: clinical, daily life, and identity information. A within-subject ANOVA showed a strong preference for sharing clinical information compared to daily life and identity information (F 1,114=135.59, P=.001, η2=.93). Also, adverse online privacy experiences, age, and health status negatively affected information-sharing intentions. Female patients shared information less willingly. Conclusions Respondents’ information-sharing intentions depend on dispositional and situational factors. Patients share medical details more willingly than daily life or identity information. The results suggest the need to focus on anonymity rather than privacy in online communities. PMID:24828114

  16. Anonymity versus privacy: selective information sharing in online cancer communities.

    PubMed

    Frost, Jeana; Vermeulen, Ivar E; Beekers, Nienke

    2014-05-14

    Active sharing in online cancer communities benefits patients. However, many patients refrain from sharing health information online due to privacy concerns. Existing research on privacy emphasizes data security and confidentiality, largely focusing on electronic medical records. Patient preferences around information sharing in online communities remain poorly understood. Consistent with the privacy calculus perspective adopted from e-commerce research, we suggest that patients approach online information sharing instrumentally, weighing privacy costs against participation benefits when deciding whether to share certain information. Consequently, we argue that patients prefer sharing clinical information over daily life and identity information that potentially compromises anonymity. Furthermore, we explore whether patients' prior experiences, age, health, and gender affect perceived privacy costs and thus willingness to share information. The goal of the present study is to document patient preferences for sharing information within online health platforms. A total of 115 cancer patients reported sharing intentions for 15 different types of information, demographics, health status, prior privacy experiences, expected community utility, and privacy concerns. Factor analysis on the 15 information types revealed 3 factors coinciding with 3 proposed information categories: clinical, daily life, and identity information. A within-subject ANOVA showed a strong preference for sharing clinical information compared to daily life and identity information (F1,114=135.59, P=.001, η(2)=.93). Also, adverse online privacy experiences, age, and health status negatively affected information-sharing intentions. Female patients shared information less willingly. Respondents' information-sharing intentions depend on dispositional and situational factors. Patients share medical details more willingly than daily life or identity information. The results suggest the need to focus on anonymity rather than privacy in online communities.

  17. TH-E-209-00: Radiation Dose Monitoring and Protocol Management

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    Radiation dose monitoring solutions have opened up new opportunities for medical physicists to be more involved in modern clinical radiology practices. In particular, with the help of comprehensive radiation dose data, data-driven protocol management and informed case follow up are now feasible. Significant challenges remain however and the problems faced by medical physicists are highly heterogeneous. Imaging systems from multiple vendors and a wide range of vintages co-exist in the same department and employ data communication protocols that are not fully standardized or implemented making harmonization complex. Many different solutions for radiation dose monitoring have been implemented by imaging facilitiesmore » over the past few years. Such systems are based on commercial software, home-grown IT solutions, manual PACS data dumping, etc., and diverse pathways can be used to bring the data to impact clinical practice. The speakers will share their experiences with creating or tailoring radiation dose monitoring/management systems and procedures over the past few years, which vary significantly in design and scope. Topics to cover: (1) fluoroscopic dose monitoring and high radiation event handling from a large academic hospital; (2) dose monitoring and protocol optimization in pediatric radiology; and (3) development of a home-grown IT solution and dose data analysis framework. Learning Objectives: Describe the scope and range of radiation dose monitoring and protocol management in a modern radiology practice Review examples of data available from a variety of systems and how it managed and conveyed. Reflect on the role of the physicist in radiation dose awareness.« less

  18. Real-time distributed scheduling algorithm for supporting QoS over WDM networks

    NASA Astrophysics Data System (ADS)

    Kam, Anthony C.; Siu, Kai-Yeung

    1998-10-01

    Most existing or proposed WDM networks employ circuit switching, typically with one session having exclusive use of one entire wavelength. Consequently they are not suitable for data applications involving bursty traffic patterns. The MIT AON Consortium has developed an all-optical LAN/MAN testbed which provides time-slotted WDM service and employs fast-tunable transceivers in each optical terminal. In this paper, we explore extensions of this service to achieve fine-grained statistical multiplexing with different virtual circuits time-sharing the wavelengths in a fair manner. In particular, we develop a real-time distributed protocol for best-effort traffic over this time-slotted WDM service with near-optical fairness and throughput characteristics. As an additional design feature, our protocol supports the allocation of guaranteed bandwidths to selected connections. This feature acts as a first step towards supporting integrated services and quality-of-service guarantees over WDM networks. To achieve high throughput, our approach is based on scheduling transmissions, as opposed to collision- based schemes. Our distributed protocol involves one MAN scheduler and several LAN schedulers (one per LAN) in a master-slave arrangement. Because of propagation delays and limits on control channel capacities, all schedulers are designed to work with partial, delayed traffic information. Our distributed protocol is of the `greedy' type to ensure fast execution in real-time in response to dynamic traffic changes. It employs a hybrid form of rate and credit control for resource allocation. We have performed extensive simulations, which show that our protocol allocates resources (transmitters, receivers, wavelengths) fairly with high throughput, and supports bandwidth guarantees.

  19. TH-E-209-02: Dose Monitoring and Protocol Optimization: The Pediatric Perspective

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    MacDougall, R.

    Radiation dose monitoring solutions have opened up new opportunities for medical physicists to be more involved in modern clinical radiology practices. In particular, with the help of comprehensive radiation dose data, data-driven protocol management and informed case follow up are now feasible. Significant challenges remain however and the problems faced by medical physicists are highly heterogeneous. Imaging systems from multiple vendors and a wide range of vintages co-exist in the same department and employ data communication protocols that are not fully standardized or implemented making harmonization complex. Many different solutions for radiation dose monitoring have been implemented by imaging facilitiesmore » over the past few years. Such systems are based on commercial software, home-grown IT solutions, manual PACS data dumping, etc., and diverse pathways can be used to bring the data to impact clinical practice. The speakers will share their experiences with creating or tailoring radiation dose monitoring/management systems and procedures over the past few years, which vary significantly in design and scope. Topics to cover: (1) fluoroscopic dose monitoring and high radiation event handling from a large academic hospital; (2) dose monitoring and protocol optimization in pediatric radiology; and (3) development of a home-grown IT solution and dose data analysis framework. Learning Objectives: Describe the scope and range of radiation dose monitoring and protocol management in a modern radiology practice Review examples of data available from a variety of systems and how it managed and conveyed. Reflect on the role of the physicist in radiation dose awareness.« less

  20. Quantum Key Distribution

    NASA Astrophysics Data System (ADS)

    Hughes, Richard

    2004-05-01

    Quantum key distribution (QKD) uses single-photon communications to generate the shared, secret random number sequences that are used to encrypt and decrypt secret communications. The unconditional security of QKD is based on the interplay between fundamental principles of quantum physics and information theory. An adversary can neither successfully tap the transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). QKD could be particularly attractive for free-space optical communications, both ground-based and for satellites. I will describe a QKD experiment performed over multi-kilometer line-of-sight paths, which serves as a model for a satellite-to-ground key distribution system. The system uses single-photon polarization states, without active polarization switching, and for the first time implements the complete BB84 QKD protocol including, reconciliation, privacy amplification and the all-important authentication stage. It is capable of continuous operation throughout the day and night, achieving the self-sustaining production of error-free, shared, secret bits. I will also report on the results of satellite-to-ground QKD modeling.

  1. Threshold quantum cryptography

    NASA Astrophysics Data System (ADS)

    Tokunaga, Yuuki; Okamoto, Tatsuaki; Imoto, Nobuyuki

    2005-01-01

    We present the concept of threshold collaborative unitary transformation or threshold quantum cryptography, which is a kind of quantum version of threshold cryptography. Threshold quantum cryptography states that classical shared secrets are distributed to several parties and a subset of them, whose number is greater than a threshold, collaborates to compute a quantum cryptographic function, while keeping each share secretly inside each party. The shared secrets are reusable if no cheating is detected. As a concrete example of this concept, we show a distributed protocol (with threshold) of conjugate coding.

  2. Virtual memory support for distributed computing environments using a shared data object model

    NASA Astrophysics Data System (ADS)

    Huang, F.; Bacon, J.; Mapp, G.

    1995-12-01

    Conventional storage management systems provide one interface for accessing memory segments and another for accessing secondary storage objects. This hinders application programming and affects overall system performance due to mandatory data copying and user/kernel boundary crossings, which in the microkernel case may involve context switches. Memory-mapping techniques may be used to provide programmers with a unified view of the storage system. This paper extends such techniques to support a shared data object model for distributed computing environments in which good support for coherence and synchronization is essential. The approach is based on a microkernel, typed memory objects, and integrated coherence control. A microkernel architecture is used to support multiple coherence protocols and the addition of new protocols. Memory objects are typed and applications can choose the most suitable protocols for different types of object to avoid protocol mismatch. Low-level coherence control is integrated with high-level concurrency control so that the number of messages required to maintain memory coherence is reduced and system-wide synchronization is realized without severely impacting the system performance. These features together contribute a novel approach to the support for flexible coherence under application control.

  3. Communication pitfalls of traditional history and physical write-up documentation

    PubMed Central

    Brown, Jeffrey L

    2017-01-01

    Background An unofficial standardized “write-up” outline is commonly used for documenting history and physical examinations, giving oral presentations, and teaching clinical skills. Despite general acceptance, there is an apparent discrepancy between the way clinical encounters are conducted and how they are documented. Methods Fifteen medical school websites were randomly selected from search-engine generated lists. One example of a history and physical write-up from each of six sites, one teaching outline from each of nine additional sites, and recommendations for documentation made in two commonly used textbooks were compared for similarities and differences. Results Except for minor variations in documenting background information, all sampled materials utilized the same standardized format. When the examiners’ early perceptions of the patients’ degree of illness or level of distress were described, they were categorized as “general appearance” within the physical findings. Contrary to clinical practice, none of the examples or recommendations documented these early perceptions before chief concerns and history were presented. Discussion An examiner’s initial perceptions of a patient’s affect, degree of illness, and level of distress can influence the content of the history, triage decisions, and prioritization of likely diagnoses. When chief concerns and history are shared without benefit of this information, erroneous assumptions and miscommunications can result. Conclusion This survey confirms common use of a standardized outline for documenting, communicating, and teaching history-taking and physical examination protocol. The present outline shares early observations out of clinical sequence and may provide inadequate context for accurate interpretation of chief concerns and history. Corrective actions include modifying the documentation sequence to conform to clinical practice and teaching contextual methodology for sharing patient information. PMID:28096709

  4. Multimode entanglement in reconfigurable graph states using optical frequency combs

    PubMed Central

    Cai, Y.; Roslund, J.; Ferrini, G.; Arzani, F.; Xu, X.; Fabre, C.; Treps, N.

    2017-01-01

    Multimode entanglement is an essential resource for quantum information processing and quantum metrology. However, multimode entangled states are generally constructed by targeting a specific graph configuration. This yields to a fixed experimental setup that therefore exhibits reduced versatility and scalability. Here we demonstrate an optical on-demand, reconfigurable multimode entangled state, using an intrinsically multimode quantum resource and a homodyne detection apparatus. Without altering either the initial squeezing source or experimental architecture, we realize the construction of thirteen cluster states of various sizes and connectivities as well as the implementation of a secret sharing protocol. In particular, this system enables the interrogation of quantum correlations and fluctuations for any multimode Gaussian state. This initiates an avenue for implementing on-demand quantum information processing by only adapting the measurement process and not the experimental layout. PMID:28585530

  5. Satellite-based emergency mapping using optical imagery: experience and reflections from the 2015 Nepal earthquakes

    NASA Astrophysics Data System (ADS)

    Williams, Jack G.; Rosser, Nick J.; Kincey, Mark E.; Benjamin, Jessica; Oven, Katie J.; Densmore, Alexander L.; Milledge, David G.; Robinson, Tom R.; Jordan, Colm A.; Dijkstra, Tom A.

    2018-01-01

    Landslides triggered by large earthquakes in mountainous regions contribute significantly to overall earthquake losses and pose a major secondary hazard that can persist for months or years. While scientific investigations of coseismic landsliding are increasingly common, there is no protocol for rapid (hours-to-days) humanitarian-facing landslide assessment and no published recognition of what is possible and what is useful to compile immediately after the event. Drawing on the 2015 Mw 7.8 Gorkha earthquake in Nepal, we consider how quickly a landslide assessment based upon manual satellite-based emergency mapping (SEM) can be realistically achieved and review the decisions taken by analysts to ascertain the timeliness and type of useful information that can be generated. We find that, at present, many forms of landslide assessment are too slow to generate relative to the speed of a humanitarian response, despite increasingly rapid access to high-quality imagery. Importantly, the value of information on landslides evolves rapidly as a disaster response develops, so identifying the purpose, timescales, and end users of a post-earthquake landslide assessment is essential to inform the approach taken. It is clear that discussions are needed on the form and timing of landslide assessments, and how best to present and share this information, before rather than after an earthquake strikes. In this paper, we share the lessons learned from the Gorkha earthquake, with the aim of informing the approach taken by scientists to understand the evolving landslide hazard in future events and the expectations of the humanitarian community involved in disaster response.

  6. Quantitative assessment of interactions between hospitalized patients and portable medical equipment and other fomites.

    PubMed

    Suwantarat, Nuntra; Supple, Laura A; Cadnum, Jennifer L; Sankar, Thriveen; Donskey, Curtis J

    2017-11-01

    In an observational study, we demonstrated that hospitalized patients frequently had direct or indirect interactions with medical equipment and other fomites that are shared among patients, and these items were often contaminated with health care-associated pathogens. There is a need for protocols to ensure routine cleaning of shared portable equipment. Published by Elsevier Inc.

  7. Adapted Shared Storybook Reading: A Study of Its Application for Children with Autism Spectrum Disorders in Home Settings

    ERIC Educational Resources Information Center

    Golloher, Andrea N.

    2018-01-01

    This study investigated the use of an adapted shared reading protocol with three children with autism spectrum disorders (ASD) in home settings. Using a multiple baseline across participants design, this investigation replicated and extended a previous investigation by Browder et al. to children with ASD and home settings. In addition, this study…

  8. Sharing health information online in South Korea: motives, topics, and antecedents.

    PubMed

    Kye, S Y; Shim, M; Kim, Y C; Park, K

    2017-10-11

    This study aimed to examine the motives, topics and antecedents for sharing health information online among Korean Internet users. Eight hundred adults completed a web-based survey exploring the motives; topics; physical, cognitive, affective and environmental factors; and experiences relating to sharing health information online. The motives for not sharing information included information absence and inappropriateness. The most preferred topic was disease. Good subjective health was significantly associated with frequent information sharing while individuals with a history of disease involving themselves or family members were more likely to share health information than were those without such a history. Further, a higher level of depressed mood was related to a higher level of sharing. Internet-related self-efficacy and trust in information delivery channels were positively related to sharing. Future research could extend the factors related to information sharing to include the evaluation of shared information. © The Author 2017. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  9. Rethinking Traffic Management: Design of Optimizable Networks

    DTIC Science & Technology

    2008-06-01

    Though this paper used optimization theory to design and analyze DaVinci , op- timization theory is one of many possible tools to enable a grounded...dynamically allocate bandwidth shares. The distributed protocols can be implemented using DaVinci : Dynamically Adaptive VIrtual Networks for a Customized...Internet. In DaVinci , each virtual network runs traffic-management protocols optimized for a traffic class, and link bandwidth is dynamically allocated

  10. Development of risk reduction behavioral counseling for Ebola virus disease survivors enrolled in the Sierra Leone Ebola Virus Persistence Study, 2015-2016.

    PubMed

    Abad, Neetu; Malik, Tasneem; Ariyarajah, Archchun; Ongpin, Patricia; Hogben, Matthew; McDonald, Suzanna L R; Marrinan, Jaclyn; Massaquoi, Thomas; Thorson, Anna; Ervin, Elizabeth; Bernstein, Kyle; Ross, Christine; Liu, William J; Kroeger, Karen; Durski, Kara N; Broutet, Nathalie; Knust, Barbara; Deen, Gibrilla F

    2017-09-01

    During the 2014-2016 West Africa Ebola Virus Disease (EVD) epidemic, the public health community had concerns that sexual transmission of the Ebola virus (EBOV) from EVD survivors was a risk, due to EBOV persistence in body fluids of EVD survivors, particularly semen. The Sierra Leone Ebola Virus Persistence Study was initiated to investigate this risk by assessing EBOV persistence in numerous body fluids of EVD survivors and providing risk reduction counseling based on test results for semen, vaginal fluid, menstrual blood, urine, rectal fluid, sweat, tears, saliva, and breast milk. This publication describes implementation of the counseling protocol and the key lessons learned. The Ebola Virus Persistence Risk Reduction Behavioral Counseling Protocol was developed from a framework used to prevent transmission of HIV and other sexually transmitted infections. The framework helped to identify barriers to risk reduction and facilitated the development of a personalized risk-reduction plan, particularly around condom use and abstinence. Pre-test and post-test counseling sessions included risk reduction guidance, and post-test counseling was based on the participants' individual test results. The behavioral counseling protocol enabled study staff to translate the study's body fluid test results into individualized information for study participants. The Ebola Virus Persistence Risk Reduction Behavioral Counseling Protocol provided guidance to mitigate the risk of EBOV transmission from EVD survivors. It has since been shared with and adapted by other EVD survivor body fluid testing programs and studies in Ebola-affected countries.

  11. A shared-care model of obesity treatment for 3-10 year old children: protocol for the HopSCOTCH randomised controlled trial.

    PubMed

    Wake, Melissa; Lycett, Kate; Sabin, Matthew A; Gunn, Jane; Gibbons, Kay; Hutton, Cathy; McCallum, Zoe; York, Elissa; Stringer, Michael; Wittert, Gary

    2012-03-28

    Despite record rates of childhood obesity, effective evidence-based treatments remain elusive. While prolonged tertiary specialist clinical input has some individual impact, these services are only available to very few children. Effective treatments that are easily accessible for all overweight and obese children in the community are urgently required. General practitioners are logical care providers for obese children but high-quality trials indicate that, even with substantial training and support, general practitioner care alone will not suffice to improve body mass index (BMI) trajectories. HopSCOTCH (the Shared Care Obesity Trial in Children) will determine whether a shared-care model, in which paediatric obesity specialists co-manage obesity with general practitioners, can improve adiposity in obese children. Randomised controlled trial nested within a cross-sectional BMI survey conducted across 22 general practices in Melbourne, Australia. Children aged 3-10 years identified as obese by Centers for Disease Control criteria at their family practice, and randomised to either a shared-care intervention or usual care. A single multidisciplinary obesity clinic appointment at Melbourne's Royal Children's Hospital, followed by regular appointments with the child's general practitioner over a 12 month period. To support both specialist and general practice consultations, web-based shared-care software was developed to record assessment, set goals and actions, provide information to caregivers, facilitate communication between the two professional groups, and jointly track progress. Primary - change in BMI z-score. Secondary - change in percentage fat and waist circumference; health status, body satisfaction and global self-worth. This will be the first efficacy trial of a general-practitioner based, shared-care model of childhood obesity management. If effective, it could greatly improve access to care for obese children. Australian New Zealand Clinical Trials Registry ACTRN12608000055303.

  12. Simple Analysis of Deposited Gene Expression Datasets for the Non-Bioinformatician: How to Use GEO for Fibrosis Research.

    PubMed

    Guo, Yang; Townsend, Richard; Tsoi, Lam C

    2017-01-01

    In the past decade, high-throughput techniques have facilitated the "-omics" research. Transcriptomic study, for instance, has advanced our understanding on the expression landscape of different human diseases and cellular mechanisms. The National Center for Biotechnology Center (NCBI) initialized Genetic Expression Omnibus (GEO) to promote the sharing of transcriptomic data to facilitate biomedical research. In this chapter, we will illustrate how to use GEO to search and analyze the public available transcriptomic data, and we will provide easy to follow protocol for researchers to data mine the powerful resources in GEO to retrieve relevant information that can be valuable for fibrosis research.

  13. Perfect quantum multiple-unicast network coding protocol

    NASA Astrophysics Data System (ADS)

    Li, Dan-Dan; Gao, Fei; Qin, Su-Juan; Wen, Qiao-Yan

    2018-01-01

    In order to realize long-distance and large-scale quantum communication, it is natural to utilize quantum repeater. For a general quantum multiple-unicast network, it is still puzzling how to complete communication tasks perfectly with less resources such as registers. In this paper, we solve this problem. By applying quantum repeaters to multiple-unicast communication problem, we give encoding-decoding schemes for source nodes, internal ones and target ones, respectively. Source-target nodes share EPR pairs by using our encoding-decoding schemes over quantum multiple-unicast network. Furthermore, quantum communication can be accomplished perfectly via teleportation. Compared with existed schemes, our schemes can reduce resource consumption and realize long-distance transmission of quantum information.

  14. DARPA Internet Program. Internet and Transmission Control Specifications,

    DTIC Science & Technology

    1981-09-01

    Internet Program Protocol Specification", RFC 791, USC/ Information Sciences Institute, September 1981. [34] Postel, J., ed., "Transmission Control Protocol...DARPA Internet Program Protocol Specification", RFC 793, USC/ Information Sciences Institute, September 1981. [35] Postel, J., "Echo Process", RFC 347...Newman, March 1981. [53] Postel, J., " Internet Control Message Protocol - DARPA Internet Program Protocol Specification", RFC 792, USC/ Information

  15. Broken symmetry in a two-qubit quantum control landscape

    NASA Astrophysics Data System (ADS)

    Bukov, Marin; Day, Alexandre G. R.; Weinberg, Phillip; Polkovnikov, Anatoli; Mehta, Pankaj; Sels, Dries

    2018-05-01

    We analyze the physics of optimal protocols to prepare a target state with high fidelity in a symmetrically coupled two-qubit system. By varying the protocol duration, we find a discontinuous phase transition, which is characterized by a spontaneous breaking of a Z2 symmetry in the functional form of the optimal protocol, and occurs below the quantum speed limit. We study in detail this phase and demonstrate that even though high-fidelity protocols come degenerate with respect to their fidelity, they lead to final states of different entanglement entropy shared between the qubits. Consequently, while globally both optimal protocols are equally far away from the target state, one is locally closer than the other. An approximate variational mean-field theory which captures the physics of the different phases is developed.

  16. Virtual observatory tools and amateur radio observations supporting scientific analysis of Jupiter radio emissions

    NASA Astrophysics Data System (ADS)

    Cecconi, Baptiste; Hess, Sebastien; Le Sidaner, Pierre; Savalle, Renaud; Stéphane, Erard; Coffre, Andrée; Thétas, Emmanuel; André, Nicolas; Génot, Vincent; Thieman, Jim; Typinski, Dave; Sky, Jim; Higgins, Chuck; Imai, Masafumi

    2016-04-01

    In the frame of the preparation of the NASA/JUNO and ESA/JUICE (Jupiter Icy Moon Explorer) missions, and the development of a planetary sciences virtual observatory (VO), we are proposing a new set of tools directed to data providers as well as users, in order to ease data sharing and discovery. We will focus on ground based planetary radio observations (thus mainly Jupiter radio emissions), trying for instance to enhance the temporal coverage of jovian decametric emission. The data service we will be using is EPN-TAP, a planetary science data access protocol developed by Europlanet-VESPA (Virtual European Solar and Planetary Access). This protocol is derived from IVOA (International Virtual Observatory Alliance) standards. The Jupiter Routine Observations from the Nancay Decameter Array are already shared on the planetary science VO using this protocol, as well as data from the Iitate Low Frquency Radio Antenna, in Japan. Amateur radio data from the RadioJOVE project is also available. The attached figure shows data from those three providers. We will first introduce the VO tools and concepts of interest for the planetary radioastronomy community. We will then present the various data formats now used for such data services, as well as their associated metadata. We will finally show various prototypical tools that make use of this shared datasets.

  17. Improvements in Clinical Trials Information Will Improve the Reproductive Health and Fertility of Cancer Patients.

    PubMed

    Dauti, Angela; Gerstl, Brigitte; Chong, Serena; Chisholm, Orin; Anazodo, Antoinette

    2017-06-01

    There are a number of barriers that result in cancer patients not being referred for oncofertility care, which include knowledge about reproductive risks of antineoplastic agents. Without this information, clinicians do not always make recommendations for oncofertility care. The objective of this study was to describe the level of reproductive information and recommendations that clinicians have available in clinical trial protocols regarding oncofertility management and follow-up, and the information that patients may receive in clinical trials patient information sheets or consent forms. A literature review of the 71 antineoplastic drugs included in the 68 clinical trial protocols showed that 68% of the antineoplastic drugs had gonadotoxic animal data, 32% had gonadotoxic human data, 83% had teratogenic animal data, and 32% had teratogenic human data. When the clinical trial protocols were reviewed, only 22% of the protocols reported the teratogenic risks and 32% of the protocols reported the gonadotoxic risk. Only 56% of phase 3 protocols had gonadotoxic information and 13% of phase 3 protocols had teratogenic information. Nine percent of the protocols provided fertility preservation recommendations and 4% provided reproductive information in the follow-up and survivorship period. Twenty-six percent had a section in the clinical trials protocol, which identified oncofertility information easily. When gonadotoxic and teratogenic effects of treatment were known, they were not consistently included in the clinical trial protocols and the lack of data for new drugs was not reported. Very few protocols gave recommendations for oncofertility management and follow-up following the completion of cancer treatment. The research team proposes a number of recommendations that should be required for clinicians and pharmaceutical companies developing new trials.

  18. Informed shared decision making: An exploratory study in pharmacy

    PubMed Central

    Kassam, Rosemin; Volume-Smith, Carlyn; Albon, Simon P.

    2007-01-01

    Introduction A study was undertaken to examine the feasibility of using the physician-based Informed Shared Decision Making (ISDM) framework for teaching pharmacy students competencies to effectively develop therapeutic relationships with patients. Objectives To: (1) assess the relevance and importance of the physician-developed ISDM competencies for pharmacy practice, (2) determine which competencies would be easiest and hardest to practice, (3) identify barriers to implementing ISDM in pharmacy practice, and (4) identify typical situations in which ISDM is or could be practiced. Methods Twenty pharmacists representing 4 different practices were interviewed using a standardized interview protocol. Results Pharmacists acknowledged that majority of the physician-based competencies were relevant to pharmacy practice; although not all competencies were considered to be most important. Competency #1 (Develop a partnership with the patient) was found to be the most relevant, the most important and the easiest to practice of all the competencies. While no one competency was identified as being hard to practice, there were several barriers identified to practicing ISDM. Finally, pharmacists expressed that patients with chronic conditions would be the most ideal for engaging in ISDM. Conclusion While pharmacists believed that the ISDM model could provide a framework for pharmacists to develop therapeutic relationships with their patients, the group also identified obstacles to engaging successfully in this relationship. PMID:25157282

  19. Approaching a Sacred Song: Toward a Respectful Presentation of the Discourse we Study

    ERIC Educational Resources Information Center

    Palmer, Andie Diane

    2007-01-01

    Educators who focus on American Indian or First Nations languages often have the privilege of bringing tape recordings of songs and stories to their students in the classroom. Learning the protocols for such sharing of the treasured gifts of ancestors is made easier by the good examples of teachers in and out of the classroom, who share such gifts…

  20. Rating Parent-Child Interactions: Joint Engagement, Communication Dynamics, and Shared Topics in Autism, Down Syndrome, and Typical Development

    ERIC Educational Resources Information Center

    Adamson, Lauren B.; Bakeman, Roger; Deckner, Deborah F.; Nelson, P. Brooke

    2012-01-01

    A battery of 17 rating items were applied to video records of typically-developing toddlers and young children with autism and Down syndrome interacting with their parents during the Communication Play Protocol. This battery provided a reliable and broad view of the joint engagement triad of child, partner, and shared topic. Ratings of the child's…

  1. Development of new multilocus variable number of tandem repeat analysis (MLVA) for Listeria innocua and its application in a food processing plant.

    PubMed

    Takahashi, Hajime; Ohshima, Chihiro; Nakagawa, Miku; Thanatsang, Krittaporn; Phraephaisarn, Chirapiphat; Chaturongkasumrit, Yuphakhun; Keeratipibul, Suwimon; Kuda, Takashi; Kimura, Bon

    2014-01-01

    Listeria innocua is an important hygiene indicator bacterium in food industries because it behaves similar to Listeria monocytogenes, which is pathogenic to humans. PFGE is often used to characterize bacterial strains and to track contamination source. However, because PFGE is an expensive, complicated, time-consuming protocol, and poses difficulty in data sharing, development of a new typing method is necessary. MLVA is a technique that identifies bacterial strains on the basis of the number of tandem repeats present in the genome varies depending on the strains. MLVA has gained attention due to its high reproducibility and ease of data sharing. In this study, we developed a MLVA protocol to assess L. innocua and evaluated it by tracking the contamination source of L. innocua in an actual food manufacturing factory by typing the bacterial strains isolated from the factory. Three VNTR regions of the L. innocua genome were chosen for use in the MLVA. The number of repeat units in each VNTR region was calculated based on the results of PCR product analysis using capillary electrophoresis (CE). The calculated number of repetitions was compared with the results of the gene sequence analysis to demonstrate the accuracy of the CE repeat number analysis. The developed technique was evaluated using 60 L. innocua strains isolated from a food factory. These 60 strains were classified into 11 patterns using MLVA. Many of the strains were classified into ST-6, revealing that this MLVA strain type can contaminate each manufacturing process in the factory. The MLVA protocol developed in this study for L. innocua allowed rapid and easy analysis through the use of CE. This technique was found to be very useful in hygiene control in factories because it allowed us to track contamination sources and provided information regarding whether the bacteria were present in the factories.

  2. Agent-oriented privacy-based information brokering architecture for healthcare environments.

    PubMed

    Masaud-Wahaishi, Abdulmutalib; Ghenniwa, Hamada

    2009-01-01

    Healthcare industry is facing a major reform at all levels-locally, regionally, nationally, and internationally. Healthcare services and systems become very complex and comprise of a vast number of components (software systems, doctors, patients, etc.) that are characterized by shared, distributed and heterogeneous information sources with varieties of clinical and other settings. The challenge now faced with decision making, and management of care is to operate effectively in order to meet the information needs of healthcare personnel. Currently, researchers, developers, and systems engineers are working toward achieving better efficiency and quality of service in various sectors of healthcare, such as hospital management, patient care, and treatment. This paper presents a novel information brokering architecture that supports privacy-based information gathering in healthcare. Architecturally, the brokering is viewed as a layer of services where a brokering service is modeled as an agent with a specific architecture and interaction protocol that are appropriate to serve various requests. Within the context of brokering, we model privacy in terms of the entities ability to hide or reveal information related to its identities, requests, and/or capabilities. A prototype of the proposed architecture has been implemented to support information-gathering capabilities in healthcare environments using FIPA-complaint platform JADE.

  3. Biana: a software framework for compiling biological interactions and analyzing networks

    PubMed Central

    2010-01-01

    Background The analysis and usage of biological data is hindered by the spread of information across multiple repositories and the difficulties posed by different nomenclature systems and storage formats. In particular, there is an important need for data unification in the study and use of protein-protein interactions. Without good integration strategies, it is difficult to analyze the whole set of available data and its properties. Results We introduce BIANA (Biologic Interactions and Network Analysis), a tool for biological information integration and network management. BIANA is a Python framework designed to achieve two major goals: i) the integration of multiple sources of biological information, including biological entities and their relationships, and ii) the management of biological information as a network where entities are nodes and relationships are edges. Moreover, BIANA uses properties of proteins and genes to infer latent biomolecular relationships by transferring edges to entities sharing similar properties. BIANA is also provided as a plugin for Cytoscape, which allows users to visualize and interactively manage the data. A web interface to BIANA providing basic functionalities is also available. The software can be downloaded under GNU GPL license from http://sbi.imim.es/web/BIANA.php. Conclusions BIANA's approach to data unification solves many of the nomenclature issues common to systems dealing with biological data. BIANA can easily be extended to handle new specific data repositories and new specific data types. The unification protocol allows BIANA to be a flexible tool suitable for different user requirements: non-expert users can use a suggested unification protocol while expert users can define their own specific unification rules. PMID:20105306

  4. Biana: a software framework for compiling biological interactions and analyzing networks.

    PubMed

    Garcia-Garcia, Javier; Guney, Emre; Aragues, Ramon; Planas-Iglesias, Joan; Oliva, Baldo

    2010-01-27

    The analysis and usage of biological data is hindered by the spread of information across multiple repositories and the difficulties posed by different nomenclature systems and storage formats. In particular, there is an important need for data unification in the study and use of protein-protein interactions. Without good integration strategies, it is difficult to analyze the whole set of available data and its properties. We introduce BIANA (Biologic Interactions and Network Analysis), a tool for biological information integration and network management. BIANA is a Python framework designed to achieve two major goals: i) the integration of multiple sources of biological information, including biological entities and their relationships, and ii) the management of biological information as a network where entities are nodes and relationships are edges. Moreover, BIANA uses properties of proteins and genes to infer latent biomolecular relationships by transferring edges to entities sharing similar properties. BIANA is also provided as a plugin for Cytoscape, which allows users to visualize and interactively manage the data. A web interface to BIANA providing basic functionalities is also available. The software can be downloaded under GNU GPL license from http://sbi.imim.es/web/BIANA.php. BIANA's approach to data unification solves many of the nomenclature issues common to systems dealing with biological data. BIANA can easily be extended to handle new specific data repositories and new specific data types. The unification protocol allows BIANA to be a flexible tool suitable for different user requirements: non-expert users can use a suggested unification protocol while expert users can define their own specific unification rules.

  5. Structure and composition of a watershed-scale sediment information network

    USGS Publications Warehouse

    Osterkamp, W.R.; Gray, J.R.; Laronne, J.B.; Martin, J.R.

    2007-01-01

    A 'Watershed-Scale Sediment Information Network' (WaSSIN), designed to complement UNESCO's International Sedimentation Initiative, was endorsed as an initial project by the World Association for Sedimentation and Erosion Research. WaSSIN is to address global fluvial-sediment information needs through a network approach based on consistent protocols for the collection, analysis, and storage of fluvial-sediment and ancillary information at smaller spatial scales than those of the International Sedimentation Initiative. As a second step of implementation, it is proposed herein that the WaSSIN have a general structure of two components, (1) monitoring and data acquisition and (2) research. Monitoring is to be conducted in small watersheds, each of which has an established database for discharge of water and suspended sediment and possibly for bed load, bed material, and bed topography. Ideally, documented protocols have been used for collecting, analyzing, storing, and sharing the derivative data. The research component is to continue the collection and interpretation of data, to compare those data among candidate watersheds, and to determine gradients of fluxes and processes among the selected watersheds. To define gradients and evaluate processes, the initial watersheds will have several common attributes. Watersheds of the first group will be: (1) six to ten in number, (2) less than 1000 km2 in area, (3) generally in mid-latitudes of continents, and (4) of semiarid climate. Potential candidate watersheds presently include the Weany Creek Basin, northeastern Australia, the Zhi Fanggou catchment, northern China, the Eshtemoa Watershed, southern Israel, the Metsemotlhaba River Basin, Botswana, the Aiuaba Experimental Basin, Brazil, and the Walnut Gulch Experimental Watershed, southwestern United States.

  6. Quantifying non-Gaussianity for quantum information

    NASA Astrophysics Data System (ADS)

    Genoni, Marco G.; Paris, Matteo G. A.

    2010-11-01

    We address the quantification of non-Gaussianity (nG) of states and operations in continuous-variable systems and its use in quantum information. We start by illustrating in detail the properties and the relationships of two recently proposed measures of nG based on the Hilbert-Schmidt distance and the quantum relative entropy (QRE) between the state under examination and a reference Gaussian state. We then evaluate the non-Gaussianities of several families of non-Gaussian quantum states and show that the two measures have the same basic properties and also share the same qualitative behavior in most of the examples taken into account. However, we also show that they introduce a different relation of order; that is, they are not strictly monotone to each other. We exploit the nG measures for states in order to introduce a measure of nG for quantum operations, to assess Gaussification and de-Gaussification protocols, and to investigate in detail the role played by nG in entanglement-distillation protocols. Besides, we exploit the QRE-based nG measure to provide different insight on the extremality of Gaussian states for some entropic quantities such as conditional entropy, mutual information, and the Holevo bound. We also deal with parameter estimation and present a theorem connecting the QRE nG to the quantum Fisher information. Finally, since evaluation of the QRE nG measure requires the knowledge of the full density matrix, we derive some experimentally friendly lower bounds to nG for some classes of states and by considering the possibility of performing on the states only certain efficient or inefficient measurements.

  7. Semi-counterfactual cryptography

    NASA Astrophysics Data System (ADS)

    Akshata Shenoy, H.; Srikanth, R.; Srinivas, T.

    2013-09-01

    In counterfactual quantum key distribution (QKD), two remote parties can securely share random polarization-encoded bits through the blocking rather than the transmission of particles. We propose a semi-counterfactual QKD, i.e., one where the secret bit is shared, and also encoded, based on the blocking or non-blocking of a particle. The scheme is thus semi-counterfactual and not based on polarization encoding. As with other counterfactual schemes and the Goldenberg-Vaidman protocol, but unlike BB84, the encoding states are orthogonal and security arises ultimately from single-particle non-locality. Unlike any of them, however, the secret bit generated is maximally indeterminate until the joint action of Alice and Bob. We prove the general security of the protocol, and study the most general photon-number-preserving incoherent attack in detail.

  8. Integrating biodiversity management and indigenous biopiracy protection to promote environmental justice and global health.

    PubMed

    Mackey, Tim K; Liang, Bryan A

    2012-06-01

    Many potentially useful medicines arise from developing countries' biodiverse environments and indigenous knowledge. However, global intellectual property rules have resulted in biopiracy, raising serious ethical concerns of environmental justice, exploitation, and health disparities in these populations. Furthermore, state-based approaches have not led to adequate biodiversity protection, management, or resource sharing, which affect access to lifesaving drugs. In response, country delegates adopted the Nagoya Protocol, which aims at promoting biodiversity management, combating biopiracy, and encouraging equitable benefits sharing with indigenous communities. However, the effectiveness of this framework in meeting these objectives remains in question. To address these challenges, we propose a policy building on the Nagoya Protocol that employs a World Health Organization-World Trade Organization Joint Committee on Bioprospecting and Biopiracy.

  9. Practical quantum key distribution protocol without monitoring signal disturbance.

    PubMed

    Sasaki, Toshihiko; Yamamoto, Yoshihisa; Koashi, Masato

    2014-05-22

    Quantum cryptography exploits the fundamental laws of quantum mechanics to provide a secure way to exchange private information. Such an exchange requires a common random bit sequence, called a key, to be shared secretly between the sender and the receiver. The basic idea behind quantum key distribution (QKD) has widely been understood as the property that any attempt to distinguish encoded quantum states causes a disturbance in the signal. As a result, implementation of a QKD protocol involves an estimation of the experimental parameters influenced by the eavesdropper's intervention, which is achieved by randomly sampling the signal. If the estimation of many parameters with high precision is required, the portion of the signal that is sacrificed increases, thus decreasing the efficiency of the protocol. Here we propose a QKD protocol based on an entirely different principle. The sender encodes a bit sequence onto non-orthogonal quantum states and the receiver randomly dictates how a single bit should be calculated from the sequence. The eavesdropper, who is unable to learn the whole of the sequence, cannot guess the bit value correctly. An achievable rate of secure key distribution is calculated by considering complementary choices between quantum measurements of two conjugate observables. We found that a practical implementation using a laser pulse train achieves a key rate comparable to a decoy-state QKD protocol, an often-used technique for lasers. It also has a better tolerance of bit errors and of finite-sized-key effects. We anticipate that this finding will give new insight into how the probabilistic nature of quantum mechanics can be related to secure communication, and will facilitate the simple and efficient use of conventional lasers for QKD.

  10. Asian Network of Research Resource Centers.

    PubMed

    Lee, Sunhee; Nam, Seungjoo; Jung, Paul E; Kim, Ki-Jeong; Lee, Yeonhee

    2016-10-01

    With the enactment of the Nagoya Protocol, biological resources are now increasingly considered as assets of an individual country, instead of as the common property of mankind. As worldwide interest for securing biological resources intensifies, research resource centers (RRCs), which collect, preserve, and provide resources and their information to academia and industries, are gathering more attention. The Asian Network of Research Resource Centers (ANRRC) strives for conservation and effective use of bioresources and their data by connecting resource centers of Asia, a continent with the greatest diversity of life. Since its foundation in 2009, the Network has significantly expanded to encompass 103 RRCs of 14 countries. Through the Network, member countries discuss opportunities for resource exchange and research collaboration and share biobanking information and regulations of different countries for international harmonization of resource management. ANRRC also contributes to developing of International Standards of biobanks and biological resources as a liaison to the International Organization for Standardization technical committee 276 Biotechnology.

  11. The promise and challenge of high-throughput sequencing of the antibody repertoire

    PubMed Central

    Georgiou, George; Ippolito, Gregory C; Beausang, John; Busse, Christian E; Wardemann, Hedda; Quake, Stephen R

    2014-01-01

    Efforts to determine the antibody repertoire encoded by B cells in the blood or lymphoid organs using high-throughput DNA sequencing technologies have been advancing at an extremely rapid pace and are transforming our understanding of humoral immune responses. Information gained from high-throughput DNA sequencing of immunoglobulin genes (Ig-seq) can be applied to detect B-cell malignancies with high sensitivity, to discover antibodies specific for antigens of interest, to guide vaccine development and to understand autoimmunity. Rapid progress in the development of experimental protocols and informatics analysis tools is helping to reduce sequencing artifacts, to achieve more precise quantification of clonal diversity and to extract the most pertinent biological information. That said, broader application of Ig-seq, especially in clinical settings, will require the development of a standardized experimental design framework that will enable the sharing and meta-analysis of sequencing data generated by different laboratories. PMID:24441474

  12. Review and Synthesize Completed Research Through Systematic Review.

    PubMed

    Hopp, Lisa; Rittenmeyer, Leslie

    2015-10-01

    The evidence-based health care movement has generated new opportunity for scholars to generate synthesized sources of evidence. Systematic reviews are rigorous forms of synthesized evidence that scholars can conduct if they have requisite skills, time, and access to excellent library resources. Systematic reviews play an important role in synthesizing what is known and unknown about a particular health issue. Thus, they have a synergistic relationship with primary research. They can both inform clinical decisions when the evidence is adequate and identify gaps in knowledge to inform research priorities. Systematic reviews can be conducted of quantitative and qualitative evidence to answer many types of questions. They all share characteristics of rigor that arise from a priori protocol development, transparency, exhaustive searching, dual independent reviewers who critically appraise studies using standardized tools, rigor in synthesis, and peer review at multiple stages in the conduct and reporting of the systematic review. © The Author(s) 2015.

  13. Quantum Locality in Game Strategy

    NASA Astrophysics Data System (ADS)

    Melo-Luna, Carlos A.; Susa, Cristian E.; Ducuara, Andrés F.; Barreiro, Astrid; Reina, John H.

    2017-03-01

    Game theory is a well established branch of mathematics whose formalism has a vast range of applications from the social sciences, biology, to economics. Motivated by quantum information science, there has been a leap in the formulation of novel game strategies that lead to new (quantum Nash) equilibrium points whereby players in some classical games are always outperformed if sharing and processing joint information ruled by the laws of quantum physics is allowed. We show that, for a bipartite non zero-sum game, input local quantum correlations, and separable states in particular, suffice to achieve an advantage over any strategy that uses classical resources, thus dispensing with quantum nonlocality, entanglement, or even discord between the players’ input states. This highlights the remarkable key role played by pure quantum coherence at powering some protocols. Finally, we propose an experiment that uses separable states and basic photon interferometry to demonstrate the locally-correlated quantum advantage.

  14. Quantum Locality in Game Strategy

    PubMed Central

    Melo-Luna, Carlos A.; Susa, Cristian E.; Ducuara, Andrés F.; Barreiro, Astrid; Reina, John H.

    2017-01-01

    Game theory is a well established branch of mathematics whose formalism has a vast range of applications from the social sciences, biology, to economics. Motivated by quantum information science, there has been a leap in the formulation of novel game strategies that lead to new (quantum Nash) equilibrium points whereby players in some classical games are always outperformed if sharing and processing joint information ruled by the laws of quantum physics is allowed. We show that, for a bipartite non zero-sum game, input local quantum correlations, and separable states in particular, suffice to achieve an advantage over any strategy that uses classical resources, thus dispensing with quantum nonlocality, entanglement, or even discord between the players’ input states. This highlights the remarkable key role played by pure quantum coherence at powering some protocols. Finally, we propose an experiment that uses separable states and basic photon interferometry to demonstrate the locally-correlated quantum advantage. PMID:28327567

  15. Systematic Assessment of the Impact of User Roles on Network Flow Patterns

    DTIC Science & Technology

    2017-09-01

    Protocol SNMP Simple Network Management Protocol SQL Structured Query Language SSH Secure Shell SYN TCP Sync Flag SVDD Support Vector Data Description SVM...and evaluating users based on roles provide the best approach for defining normal digital behaviors? People are individuals, with different interests...activities on the network. We evaluate the assumption that users sharing similar roles exhibit similar network behaviors, and contrast the level of similarity

  16. Consistency and Change in Participatory Action Research: Reflections on a Focus Group Study about How Farmers Learn

    ERIC Educational Resources Information Center

    Piercy, Fred P.; Franz, Nancy; Donaldson, Joseph L.; Richard, Robert F.

    2011-01-01

    The purpose of this paper is to reflect on our efforts to balance consistency in our multi-year participatory action research study with the need to adapt our research protocol to what we are learning along the way. While both are important, we share several examples of how our flexibility and openness to adapt our protocol to our research…

  17. Report of the Interagency biological methods workshop

    USGS Publications Warehouse

    Gurtz, Martin E.; Muir, Thomas A.

    1994-01-01

    The U.S. Geological Survey hosted the Interagency Biological Methods Workshop in Reston, Virginia, during June 22-23, 1993. The purposes of the workshop were to (1) promote better communication among Federal agencies that are using or developing biological methods in water-quality assessment programs for streams and rivers, and (2) facilitate the sharing of data and interagency collaboration. The workshop was attended by 45 biologists representing numerous Federal agencies and programs, and a few regional and State programs that were selected to provide additional perspectives. The focus of the workshop was community assessment methods for fish, invertebrates, and algae; physical habitat characterization; and chemical analyses of biological tissues. Charts comparing program objectives, design features, and sampling methods were compiled from materials that were provided by participating agencies prior to the workshop and formed the basis for small workgroup discussions. Participants noted that differences in methods among programs were often necessitated by differences in program objectives. However, participants agreed that where programs have identified similar data needs, the use of common methods is beneficial. Opportunities discussed for improving data compatibility and information sharing included (1) modifying existing methods, (2) adding parameters, (3) improving access to data through shared databases (potentially with common database structures), and (4) future collaborative efforts that range from research on selected protocol questions to followup meetings and continued discussions.

  18. Expanding CERC beyond public health: sharing best practices with healthcare managers via virtual learning.

    PubMed

    Hewitt, Anne M; Spencer, Susan S; Ramloll, Rameshsharma; Trotta, Heidi

    2008-10-01

    Developed by the Center for Disease Control and Prevention in 2002, the Crisis Emergency and Risk Communication (CERC) training module is a nationally and internationally recognized communication model. With the looming threat of a pandemic and the potential for a protracted ongoing siege, a valuable opportunity exists to introduce crisis and emergency preparedness communication best practices to a new population--health care managers and administrators. The CERC toolkit and resources, provide an easy, turn-key solution and a validated template for educators who are not directly involved in public health education but desire to share this content. In this example, graduate students enrolled in an Master of Health Administration program, used a Play2Train scenario, located in the virtual learning environment of SecondLife (2007), to incorporate concepts from the CERC model. By applying the CERC best practices in a real-time virtual learning scenario, students learned collaboration and the leadership competencies necessary to help implement Joint Commission on Accreditation of Health Organizations emergency communication protocols and community collaboration requirements. By expanding the impact of the CERC model and developing unified risk communication responses and information sharing, all health professionals can enhance the effectiveness of their emergency preparedness plans so that the public can be better served.

  19. ISBP: Understanding the Security Rule of Users' Information-Sharing Behaviors in Partnership

    PubMed Central

    Wu, Hongchen; Wang, Xinjun

    2016-01-01

    The rapid growth of social network data has given rise to high security awareness among users, especially when they exchange and share their personal information. However, because users have different feelings about sharing their information, they are often puzzled about who their partners for exchanging information can be and what information they can share. Is it possible to assist users in forming a partnership network in which they can exchange and share information with little worry? We propose a modified information sharing behavior prediction (ISBP) model that can help in understanding the underlying rules by which users share their information with partners in light of three common aspects: what types of items users are likely to share, what characteristics of users make them likely to share information, and what features of users’ sharing behavior are easy to predict. This model is applied with machine learning techniques in WEKA to predict users’ decisions pertaining to information sharing behavior and form them into trustable partnership networks by learning their features. In the experiment section, by using two real-life datasets consisting of citizens’ sharing behavior, we identify the effect of highly sensitive requests on sharing behavior adjacent to individual variables: the younger participants’ partners are more difficult to predict than those of the older participants, whereas the partners of people who are not computer majors are easier to predict than those of people who are computer majors. Based on these findings, we believe that it is necessary and feasible to offer users personalized suggestions on information sharing decisions, and this is pioneering work that could benefit college researchers focusing on user-centric strategies and website owners who want to collect more user information without raising their privacy awareness or losing their trustworthiness. PMID:26950064

  20. ISBP: Understanding the Security Rule of Users' Information-Sharing Behaviors in Partnership.

    PubMed

    Wu, Hongchen; Wang, Xinjun

    2016-01-01

    The rapid growth of social network data has given rise to high security awareness among users, especially when they exchange and share their personal information. However, because users have different feelings about sharing their information, they are often puzzled about who their partners for exchanging information can be and what information they can share. Is it possible to assist users in forming a partnership network in which they can exchange and share information with little worry? We propose a modified information sharing behavior prediction (ISBP) model that can help in understanding the underlying rules by which users share their information with partners in light of three common aspects: what types of items users are likely to share, what characteristics of users make them likely to share information, and what features of users' sharing behavior are easy to predict. This model is applied with machine learning techniques in WEKA to predict users' decisions pertaining to information sharing behavior and form them into trustable partnership networks by learning their features. In the experiment section, by using two real-life datasets consisting of citizens' sharing behavior, we identify the effect of highly sensitive requests on sharing behavior adjacent to individual variables: the younger participants' partners are more difficult to predict than those of the older participants, whereas the partners of people who are not computer majors are easier to predict than those of people who are computer majors. Based on these findings, we believe that it is necessary and feasible to offer users personalized suggestions on information sharing decisions, and this is pioneering work that could benefit college researchers focusing on user-centric strategies and website owners who want to collect more user information without raising their privacy awareness or losing their trustworthiness.

  1. Bidirectional teleportation of a pure EPR state by using GHZ states

    NASA Astrophysics Data System (ADS)

    Hassanpour, Shima; Houshmand, Monireh

    2016-02-01

    In the present paper, a novel bidirectional quantum teleportation protocol is proposed. By using entanglement swapping technique, two GHZ states are shared as a quantum channel between Alice and Bob as legitimate users. In this scheme, based on controlled-not operation, single-qubit measurement, and appropriate unitary operations, two users can simultaneously transmit a pure EPR state to each other, While, in the previous protocols, the users can just teleport a single-qubit state to each other via more than four-qubit state. Therefore, the proposed scheme is economical compared with previous protocols.

  2. Internet Protocol Transition Workbook

    DTIC Science & Technology

    1982-03-01

    U N C-* INTERNET PROTOCOL TRANSITION WORKBOOK March 1982 Network Information Canter SRI International Menlo Park, CA 94025 t tv l...Feinler Network Information Center SRI International Menlo Park. California 94025 (415) 859-3695 FEINLEROSRI-NIC (Online mail) [Page ii] I.7 Internet ...31 Postel. J., " Internet Control Message Protocol - DARPA Internet Program Protocol Specification." RFC 792, USC/ Information Sciences Institute

  3. Digital Motion Imagery, Interoperability Challenges for Space Operations

    NASA Technical Reports Server (NTRS)

    Grubbs, Rodney

    2012-01-01

    With advances in available bandwidth from spacecraft and between terrestrial control centers, digital motion imagery and video is becoming more practical as a data gathering tool for science and engineering, as well as for sharing missions with the public. The digital motion imagery and video industry has done a good job of creating standards for compression, distribution, and physical interfaces. Compressed data streams can easily be transmitted or distributed over radio frequency, internet protocol, and other data networks. All of these standards, however, can make sharing video between spacecraft and terrestrial control centers a frustrating and complicated task when different standards and protocols are used by different agencies. This paper will explore the challenges presented by the abundance of motion imagery and video standards, interfaces and protocols with suggestions for common formats that could simplify interoperability between spacecraft and ground support systems. Real-world examples from the International Space Station will be examined. The paper will also discuss recent trends in the development of new video compression algorithms, as well likely expanded use of Delay (or Disruption) Tolerant Networking nodes.

  4. European health telematics networks for positron emission tomography

    NASA Astrophysics Data System (ADS)

    Kontaxakis, George; Pozo, Miguel Angel; Ohl, Roland; Visvikis, Dimitris; Sachpazidis, Ilias; Ortega, Fernando; Guerra, Pedro; Cheze-Le Rest, Catherine; Selby, Peter; Pan, Leyun; Diaz, Javier; Dimitrakopoulou-Strauss, Antonia; Santos, Andres; Strauss, Ludwig; Sakas, Georgios

    2006-12-01

    A pilot network of positron emission tomography centers across Europe has been setup employing telemedicine services. The primary aim is to bring all PET centers in Europe (and beyond) closer, by integrating advanced medical imaging technology and health telematics networks applications into a single, easy to operate health telematics platform, which allows secure transmission of medical data via a variety of telecommunications channels and fosters the cooperation between professionals in the field. The platform runs on PCs with Windows 2000/XP and incorporates advanced techniques for image visualization, analysis and fusion. The communication between two connected workstations is based on a TCP/IP connection secured by secure socket layers and virtual private network or jabber protocols. A teleconsultation can be online (with both physicians physically present) or offline (via transmission of messages which contain image data and other information). An interface sharing protocol enables online teleconsultations even over low bandwidth connections. This initiative promotes the cooperation and improved communication between nuclear medicine professionals, offering options for second opinion and training. It permits physicians to remotely consult patient data, even if they are away from the physical examination site.

  5. Constructing Benchmark Databases and Protocols for Medical Image Analysis: Diabetic Retinopathy

    PubMed Central

    Kauppi, Tomi; Kämäräinen, Joni-Kristian; Kalesnykiene, Valentina; Sorri, Iiris; Uusitalo, Hannu; Kälviäinen, Heikki

    2013-01-01

    We address the performance evaluation practices for developing medical image analysis methods, in particular, how to establish and share databases of medical images with verified ground truth and solid evaluation protocols. Such databases support the development of better algorithms, execution of profound method comparisons, and, consequently, technology transfer from research laboratories to clinical practice. For this purpose, we propose a framework consisting of reusable methods and tools for the laborious task of constructing a benchmark database. We provide a software tool for medical image annotation helping to collect class label, spatial span, and expert's confidence on lesions and a method to appropriately combine the manual segmentations from multiple experts. The tool and all necessary functionality for method evaluation are provided as public software packages. As a case study, we utilized the framework and tools to establish the DiaRetDB1 V2.1 database for benchmarking diabetic retinopathy detection algorithms. The database contains a set of retinal images, ground truth based on information from multiple experts, and a baseline algorithm for the detection of retinopathy lesions. PMID:23956787

  6. Research protocol for a digital intervention to reduce stigma among males with a personal experience of suicide in the Australian farming community.

    PubMed

    Kennedy, Alison J; Versace, Vincent Lawrence; Brumby, Susan A

    2016-11-29

    Australian farming communities have up to twice the suicide rate of the general population. Men, particularly, demonstrate debilitating self- and perceived-stigma associated with an experience of suicide. The Ripple Effect is aimed to reduce suicide stigma within the social, cultural, geographical and psychological contexts in which it occurs. A mixed-method design with multi-level evaluation will be effected following the development and delivery of a personalised website experience (combining shared stories, education, personal goal setting and links to resources) to farming men, aged 30-64 years, with an experience of suicide. Pre- and post-surveys will be used to assess changes in self- and perceived-stigma and suicide literacy. Online feedback from participants and semi-structured interviews during follow-up will be thematically analysed. This project will provide information about increasingly accessible, innovative approaches to reducing the debilitating health and wellbeing effects of suicide stigma on a population of Australia's farmers. This research protocol was registered with the Australian New Zealand Clinical Trials Registry (ANZCTR) (ACTRN: ACTRN12616000289415 ) on 7 th March, 2016.

  7. Life cycle assessment and grid electricity: what do we know and what can we know?

    PubMed

    Weber, Christopher L; Jiaramillo, Paulina; Marriott, Joe; Samaras, Constantine

    2010-03-15

    The generation and distribution of electricity comprises nearly 40% of U.S. CO(2), emissions, as well as large shares of SO(2), NO(x), small particulates, and other toxins. Thus, correctly accounting for these electricity-related environmental releases is of great importance in life cycle assessment of products and processes. Unfortunately, there is no agreed-upon protocol for accounting for the environmental emissions associated with electricity, as well as significant uncertainty in the estimates. Here, we explore the limits of current knowledge about grid electricity in LCA and carbon footprinting for the U.S. electrical grid, and show that differences in standards, protocols, and reporting organizations can lead to important differences in estimates of CO(2) SO(2), and NO(x) emissions factors. We find a considerable divergence in published values for grid emissions factor in the U.S. We discuss the implications of this divergence and list recommendations for a standardized approach to accounting for air pollution emissions in life cycle assessment and policy analyses in a world with incomplete and uncertain information.

  8. Protocols — EDRN Public Portal

    Cancer.gov

    EDRN investigators protocols. The following is a list of the EDRN protocols that have been captured and curated. Additional information will be added as it is available. Contact information is provided as part of the detail for each protocol.

  9. Can or can not? Electronic information sharing influence the participation behavior of the employees

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mohammed, M. A., E-mail: mhmdaldbag@yahoo.com; Eman, Y., E-mail: emaroof94@yahoo.com; Huda, I., E-mail: huda753@uum.edu.my

    Information sharing refers to information being shared between employees inside or outside an agency, or by providing accessibility of their information and data to other agencies so as to allow effective decision making. Electronic information sharing is a key to effective government. This study is conducted to investigate the factors of electronic information sharing that influence the participation behavior so as to augment it amongst the employees in public organizations. Eleven domains of factors that are considered in this study are benefits, risk, social network, Information stewardship, information quality, trust, privacy, reciprocity. The paper proposes electronic information sharing factors inmore » public sector to increase the participation.« less

  10. Information Sharing and Knowledge Sharing as Communicative Activities

    ERIC Educational Resources Information Center

    Savolainen, Reijo

    2017-01-01

    Introduction: This paper elaborates the picture of information sharing and knowledge sharing as forms of communicative activity. Method: A conceptual analysis was made to find out how researchers have approached information sharing and knowledge sharing from the perspectives of transmission and ritual. The findings are based on the analysis of one…

  11. A cache-aided multiprocessor rollback recovery scheme

    NASA Technical Reports Server (NTRS)

    Wu, Kun-Lung; Fuchs, W. Kent

    1989-01-01

    This paper demonstrates how previous uniprocessor cache-aided recovery schemes can be applied to multiprocessor architectures, for recovering from transient processor failures, utilizing private caches and a global shared memory. As with cache-aided uniprocessor recovery, the multiprocessor cache-aided recovery scheme of this paper can be easily integrated into standard bus-based snoopy cache coherence protocols. A consistent shared memory state is maintained without the necessity of global check-pointing.

  12. Online Information Sharing About Risks: The Case of Organic Food.

    PubMed

    Hilverda, Femke; Kuttschreuter, Margôt

    2018-03-23

    Individuals have to make sense of an abundance of information to decide whether or not to purchase certain food products. One of the means to sense-making is information sharing. This article reports on a quantitative study examining online information sharing behavior regarding the risks of organic food products. An online survey among 535 respondents was conducted in the Netherlands to examine the determinants of information sharing behavior, and their relationships. Structural equation modeling was applied to test both the measurement model and the structural model. Results showed that the intention to share information online about the risks of organic food was low. Conversations and email were the preferred channels to share information; of the social media Facebook stood out. The developed model was found to provide an adequate description of the data. It explained 41% of the variance in information sharing. Injunctive norms and outcome expectancies were most important in predicting online information sharing, followed by information-related determinants. Risk-perception-related determinants showed a significant, but weak, positive relationship with online information sharing. Implications for authorities communicating on risks associated with food are addressed. © 2018 The Authors Risk Analysis published by Wiley Periodicals, Inc. on behalf of Society for Risk Analysis.

  13. GUIdock-VNC: using a graphical desktop sharing system to provide a browser-based interface for containerized software

    PubMed Central

    Mittal, Varun; Hung, Ling-Hong; Keswani, Jayant; Kristiyanto, Daniel; Lee, Sung Bong

    2017-01-01

    Abstract Background: Software container technology such as Docker can be used to package and distribute bioinformatics workflows consisting of multiple software implementations and dependencies. However, Docker is a command line–based tool, and many bioinformatics pipelines consist of components that require a graphical user interface. Results: We present a container tool called GUIdock-VNC that uses a graphical desktop sharing system to provide a browser-based interface for containerized software. GUIdock-VNC uses the Virtual Network Computing protocol to render the graphics within most commonly used browsers. We also present a minimal image builder that can add our proposed graphical desktop sharing system to any Docker packages, with the end result that any Docker packages can be run using a graphical desktop within a browser. In addition, GUIdock-VNC uses the Oauth2 authentication protocols when deployed on the cloud. Conclusions: As a proof-of-concept, we demonstrated the utility of GUIdock-noVNC in gene network inference. We benchmarked our container implementation on various operating systems and showed that our solution creates minimal overhead. PMID:28327936

  14. GUIdock-VNC: using a graphical desktop sharing system to provide a browser-based interface for containerized software.

    PubMed

    Mittal, Varun; Hung, Ling-Hong; Keswani, Jayant; Kristiyanto, Daniel; Lee, Sung Bong; Yeung, Ka Yee

    2017-04-01

    Software container technology such as Docker can be used to package and distribute bioinformatics workflows consisting of multiple software implementations and dependencies. However, Docker is a command line-based tool, and many bioinformatics pipelines consist of components that require a graphical user interface. We present a container tool called GUIdock-VNC that uses a graphical desktop sharing system to provide a browser-based interface for containerized software. GUIdock-VNC uses the Virtual Network Computing protocol to render the graphics within most commonly used browsers. We also present a minimal image builder that can add our proposed graphical desktop sharing system to any Docker packages, with the end result that any Docker packages can be run using a graphical desktop within a browser. In addition, GUIdock-VNC uses the Oauth2 authentication protocols when deployed on the cloud. As a proof-of-concept, we demonstrated the utility of GUIdock-noVNC in gene network inference. We benchmarked our container implementation on various operating systems and showed that our solution creates minimal overhead. © The Authors 2017. Published by Oxford University Press.

  15. Entangled state quantum cryptography: eavesdropping on the ekert protocol

    PubMed

    Naik; Peterson; White; Berglund; Kwiat

    2000-05-15

    Using polarization-entangled photons from spontaneous parametric down-conversion, we have implemented Ekert's quantum cryptography protocol. The near-perfect correlations of the photons allow the sharing of a secret key between two parties. The presence of an eavesdropper is continually checked by measuring Bell's inequalities. We investigated several possible eavesdropper strategies, including pseudo-quantum-nondemolition measurements. In all cases, the eavesdropper's presence was readily apparent. We discuss a procedure to increase her detectability.

  16. The Impacts of Information-Sharing Mechanisms on Spatial Market Formation Based on Agent-Based Modeling

    PubMed Central

    Li, Qianqian; Yang, Tao; Zhao, Erbo; Xia, Xing’ang; Han, Zhangang

    2013-01-01

    There has been an increasing interest in the geographic aspects of economic development, exemplified by P. Krugman’s logical analysis. We show in this paper that the geographic aspects of economic development can be modeled using multi-agent systems that incorporate multiple underlying factors. The extent of information sharing is assumed to be a driving force that leads to economic geographic heterogeneity across locations without geographic advantages or disadvantages. We propose an agent-based market model that considers a spectrum of different information-sharing mechanisms: no information sharing, information sharing among friends and pheromone-like information sharing. Finally, we build a unified model that accommodates all three of these information-sharing mechanisms based on the number of friends who can share information. We find that the no information-sharing model does not yield large economic zones, and more information sharing can give rise to a power-law distribution of market size that corresponds to the stylized fact of city size and firm size distributions. The simulations show that this model is robust. This paper provides an alternative approach to studying economic geographic development, and this model could be used as a test bed to validate the detailed assumptions that regulate real economic agglomeration. PMID:23484007

  17. A systematic review of decision aids that facilitate elements of shared decision-making in chronic illnesses: a review protocol.

    PubMed

    Wieringa, Thomas H; Kunneman, Marleen; Rodriguez-Gutierrez, Rene; Montori, Victor M; de Wit, Maartje; Smets, Ellen M A; Schoonmade, Linda J; Spencer-Bonilla, Gabriela; Snoek, Frank J

    2017-08-07

    Shared decision-making (SDM) is a patient-centred approach in which clinicians and patients work side-by-side to decide together on the best course of action for each patient's particular situation. Six key elements of SDM can be distinguished: situation diagnosis, choice awareness, option clarification, discussion of harms and benefits, deliberation of patient preferences and making the decision. Decision aids (DAs) are tools that facilitate SDM. The impact of DAs for chronic illnesses on SDM, clinical and patient reported outcomes remains uncertain. We will perform a systematic review aiming to describe (a) which SDM elements are incorporated in DAs for adult patients with chronic conditions and (b) the effects of DA use on SDM, clinical and patient reported outcomes. This manuscript reports on the protocol for this systematic review. The following databases will be searched for relevant articles: PubMed, Embase, Web of Science, CINAHL and PsycINFO, from their inception to October 2016. We will ascertain ongoing research by querying experts and searching trial registries. To enhance feasibility, we will limit the review to randomized controlled trials (RCTs) including patients with chronic cardiovascular and/or respiratory diseases and/or diabetes. SDM elements incorporated in DAs, DA effects and DA itself will be described. This study will characterize DAs for chronic illness and will provide an overview of their effects on SDM, clinical and patient reported outcomes. We anticipate this review will bring to light knowledge gaps and inform further research into the design and use of DAs for patients with chronic conditions. PROSPERO registration number: CRD42016050320 .

  18. Space-Data Routers: Advanced data routing protocols for enhancing data exploitation for space weather applications

    NASA Astrophysics Data System (ADS)

    Anastasiadis, Anastasios; Daglis, Ioannis A.; Balasis, George; Papadimitriou, Constantinos; Tsaoussidis, Vassilios; Diamantopoulos, Sotirios

    2014-05-01

    Data sharing and access are major issues in space sciences, as they influence the degree of data exploitation. The availability of multi-spacecraft distributed observation methods and adaptive mission architectures require computationally intensive analysis methods. Moreover, accurate space weather forecasting and future space exploration far from Earth will be in need of real-time data distribution and assimilation technologies. The FP7-Space collaborative research project "Space-Data Routers" (SDR) relies on space internetworking and in particular on Delay Tolerant Networking (DTN), which marks the new era in space communications. SDR unifies space and earth communication infrastructures and delivers a set of tools and protocols for space-data exploitation. The main goal is to allow space agencies, academic institutes and research centers to share space-data generated by single or multiple missions, in an efficient, secure and automated manner. Here we are presenting the architecture and basic functionality of a DTN-based application specifically designed in the framework of the SDR project, for data query, retrieval and administration that will enable addressing outstanding science questions related to space weather, through the provision of simultaneous real-time data sampling at multiple points in space. The work leading to this paper has received funding from the European Union's Seventh Framework Programme (FP7-SPACE-2010-1) under grant agreement no. 263330 for the SDR (Space-Data Routers for Exploiting Space Data) collaborative research project. This paper reflects only the authors' views and the Union is not liable for any use that may be made of the information contained therein.

  19. Explanation of the Nagoya Protocol on Access and Benefit Sharing and its implication for microbiology.

    PubMed

    Smith, David; da Silva, Manuela; Jackson, Julian; Lyal, Christopher

    2017-03-01

    Working with genetic resources and associated data requires greater attention since the Nagoya Protocol on Access and Benefit Sharing (ABS) came into force in October 2014. Biologists must ensure that they have legal clarity in how they can and cannot use the genetic resources on which they carry out research. Not only must they work within the spirit in the Convention on Biological Diversity (https://www.cbd.int/convention/articles/default.shtml?a=cbd-02) but also they may have regulatory requirements to meet. Although the Nagoya Protocol was negotiated and agreed globally, it is the responsibility of each country that ratifies it to introduce their individual implementing procedures and practices. Many countries in Europe, such as the UK, have chosen not to put access controls in place at this time, but others already have laws enacted providing ABS measures under the Convention on Biological Diversity or specifically to implement the Nagoya Protocol. Access legislation is in place in many countries and information on this can be found at the ABS Clearing House (https://absch.cbd.int/). For example, Brazil, although not a Party to the Nagoya Protocol at the time of writing, has Law 13.123 which entered into force on 17 November 2015, regulated by Decree 8.772 which was published on 11 May 2016. In this case, export of Brazilian genetic resources is not allowed unless the collector is registered in the National System for Genetic Heritage and Associated Traditional Knowledge Management (SisGen). The process entails that a foreign scientist must first of all be registered working with someone in Brazil and have authorization to collect. The enactment of European Union Regulation po. 511/2014 implements Nagoya Protocol elements that govern compliance measures for users and offers the opportunity to demonstrate due diligence in sourcing their organisms by selecting from holdings of 'registered collections'. The UK has introduced a Statutory Instrument that puts in place enforcement measures within the UK to implement this European Union Regulation; this is regulated by Regulatory Delivery, Department for Business, Energy and Industrial Strategies. Scientific communities, including the private sector, individual institutions and organizations, have begun to design policy and best practices for compliance. Microbiologists and culture collections alike need to be aware of the legislation of the source country of the materials they use and put in place best practices for compliance; such best practice has been drafted by the Microbial Resource Research Infrastructure, and other research communities such as the Consortium of European Taxonomic Facilities, the Global Genome Biodiversity Network and the International Organisation for Biological Control have published best practice and/or codes of conduct to ensure legitimate exchange and use of genetic resources.

  20. Phase-Reference-Free Experiment of Measurement-Device-Independent Quantum Key Distribution

    NASA Astrophysics Data System (ADS)

    Wang, Chao; Song, Xiao-Tian; Yin, Zhen-Qiang; Wang, Shuang; Chen, Wei; Zhang, Chun-Mei; Guo, Guang-Can; Han, Zheng-Fu

    2015-10-01

    Measurement-device-independent quantum key distribution (MDI QKD) is a substantial step toward practical information-theoretic security for key sharing between remote legitimate users (Alice and Bob). As with other standard device-dependent quantum key distribution protocols, such as BB84, MDI QKD assumes that the reference frames have been shared between Alice and Bob. In practice, a nontrivial alignment procedure is often necessary, which requires system resources and may significantly reduce the secure key generation rate. Here, we propose a phase-coding reference-frame-independent MDI QKD scheme that requires no phase alignment between the interferometers of two distant legitimate parties. As a demonstration, a proof-of-principle experiment using Faraday-Michelson interferometers is presented. The experimental system worked at 1 MHz, and an average secure key rate of 8.309 bps was obtained at a fiber length of 20 km between Alice and Bob. The system can maintain a positive key generation rate without phase compensation under normal conditions. The results exhibit the feasibility of our system for use in mature MDI QKD devices and its value for network scenarios.

  1. Experimentally feasible security check for n-qubit quantum secret sharing

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schauer, Stefan; Huber, Marcus; Hiesmayr, Beatrix C.

    In this article we present a general security strategy for quantum secret sharing (QSS) protocols based on the scheme presented by Hillery, Buzek, and Berthiaume (HBB) [Phys. Rev. A 59, 1829 (1999)]. We focus on a generalization of the HBB protocol to n communication parties thus including n-partite Greenberger-Horne-Zeilinger states. We show that the multipartite version of the HBB scheme is insecure in certain settings and impractical when going to large n. To provide security for such QSS schemes in general we use the framework presented by some of the authors [M. Huber, F. Mintert, A. Gabriel, B. C. Hiesmayr,more » Phys. Rev. Lett. 104, 210501 (2010)] to detect certain genuine n-partite entanglement between the communication parties. In particular, we present a simple inequality which tests the security.« less

  2. Secure management of biomedical data with cryptographic hardware.

    PubMed

    Canim, Mustafa; Kantarcioglu, Murat; Malin, Bradley

    2012-01-01

    The biomedical community is increasingly migrating toward research endeavors that are dependent on large quantities of genomic and clinical data. At the same time, various regulations require that such data be shared beyond the initial collecting organization (e.g., an academic medical center). It is of critical importance to ensure that when such data are shared, as well as managed, it is done so in a manner that upholds the privacy of the corresponding individuals and the overall security of the system. In general, organizations have attempted to achieve these goals through deidentification methods that remove explicitly, and potentially, identifying features (e.g., names, dates, and geocodes). However, a growing number of studies demonstrate that deidentified data can be reidentified to named individuals using simple automated methods. As an alternative, it was shown that biomedical data could be shared, managed, and analyzed through practical cryptographic protocols without revealing the contents of any particular record. Yet, such protocols required the inclusion of multiple third parties, which may not always be feasible in the context of trust or bandwidth constraints. Thus, in this paper, we introduce a framework that removes the need for multiple third parties by collocating services to store and to process sensitive biomedical data through the integration of cryptographic hardware. Within this framework, we define a secure protocol to process genomic data and perform a series of experiments to demonstrate that such an approach can be run in an efficient manner for typical biomedical investigations.

  3. Application of visual cryptography for learning in optics and photonics

    NASA Astrophysics Data System (ADS)

    Mandal, Avikarsha; Wozniak, Peter; Vauderwange, Oliver; Curticapean, Dan

    2016-09-01

    In the age data digitalization, important applications of optics and photonics based sensors and technology lie in the field of biometrics and image processing. Protecting user data in a safe and secure way is an essential task in this area. However, traditional cryptographic protocols rely heavily on computer aided computation. Secure protocols which rely only on human interactions are usually simpler to understand. In many scenarios development of such protocols are also important for ease of implementation and deployment. Visual cryptography (VC) is an encryption technique on images (or text) in which decryption is done by human visual system. In this technique, an image is encrypted into number of pieces (known as shares). When the printed shares are physically superimposed together, the image can be decrypted with human vision. Modern digital watermarking technologies can be combined with VC for image copyright protection where the shares can be watermarks (small identification) embedded in the image. Similarly, VC can be used for improving security of biometric authentication. This paper presents about design and implementation of a practical laboratory experiment based on the concept of VC for a course in media engineering. Specifically, our contribution deals with integration of VC in different schemes for applications like digital watermarking and biometric authentication in the field of optics and photonics. We describe theoretical concepts and propose our infrastructure for the experiment. Finally, we will evaluate the learning outcome of the experiment, performed by the students.

  4. Secure Management of Biomedical Data With Cryptographic Hardware

    PubMed Central

    Canim, Mustafa; Kantarcioglu, Murat; Malin, Bradley

    2014-01-01

    The biomedical community is increasingly migrating toward research endeavors that are dependent on large quantities of genomic and clinical data. At the same time, various regulations require that such data be shared beyond the initial collecting organization (e.g., an academic medical center). It is of critical importance to ensure that when such data are shared, as well as managed, it is done so in a manner that upholds the privacy of the corresponding individuals and the overall security of the system. In general, organizations have attempted to achieve these goals through deidentification methods that remove explicitly, and potentially, identifying features (e.g., names, dates, and geocodes). However, a growing number of studies demonstrate that deidentified data can be reidentified to named individuals using simple automated methods. As an alternative, it was shown that biomedical data could be shared, managed, and analyzed through practical cryptographic protocols without revealing the contents of any particular record. Yet, such protocols required the inclusion of multiple third parties, which may not always be feasible in the context of trust or bandwidth constraints. Thus, in this paper, we introduce a framework that removes the need for multiple third parties by collocating services to store and to process sensitive biomedical data through the integration of cryptographic hardware. Within this framework, we define a secure protocol to process genomic data and perform a series of experiments to demonstrate that such an approach can be run in an efficient manner for typical biomedical investigations. PMID:22010157

  5. Using The GLOBE Program to address the Global Development Goals

    NASA Astrophysics Data System (ADS)

    Wegner, K.; Murphy, T.; Wigbels, L.; Mauriello, H.; Kucera, P. A.

    2016-12-01

    The GLOBE Program (globe.gov) is an international science and education program in more than 110 countries that provides students and the public worldwide the opportunity to participate in the scientific process through Earth observations and geospatial information. To address the Global Goals for Sustainable Development, The GLOBE Program has collaborated with with international organizations such as the UNEP, Peace Corps, USAID, UNESCO, Eco-Schools, and SciStarter to address the Goals for Sustainable Development. In this presentation, GLOBE will share the alignment materials that they have created to provide pathways to achieving the goals, as well as present case studies that demonstrate how the GLOBE community uses GLOBE protocols as Earth observations to monitor and communicate environmental indicators aligned to the Global Development Goals.

  6. PyPedia: using the wiki paradigm as crowd sourcing environment for bioinformatics protocols.

    PubMed

    Kanterakis, Alexandros; Kuiper, Joël; Potamias, George; Swertz, Morris A

    2015-01-01

    Today researchers can choose from many bioinformatics protocols for all types of life sciences research, computational environments and coding languages. Although the majority of these are open source, few of them possess all virtues to maximize reuse and promote reproducible science. Wikipedia has proven a great tool to disseminate information and enhance collaboration between users with varying expertise and background to author qualitative content via crowdsourcing. However, it remains an open question whether the wiki paradigm can be applied to bioinformatics protocols. We piloted PyPedia, a wiki where each article is both implementation and documentation of a bioinformatics computational protocol in the python language. Hyperlinks within the wiki can be used to compose complex workflows and induce reuse. A RESTful API enables code execution outside the wiki. Initial content of PyPedia contains articles for population statistics, bioinformatics format conversions and genotype imputation. Use of the easy to learn wiki syntax effectively lowers the barriers to bring expert programmers and less computer savvy researchers on the same page. PyPedia demonstrates how wiki can provide a collaborative development, sharing and even execution environment for biologists and bioinformaticians that complement existing resources, useful for local and multi-center research teams. PyPedia is available online at: http://www.pypedia.com. The source code and installation instructions are available at: https://github.com/kantale/PyPedia_server. The PyPedia python library is available at: https://github.com/kantale/pypedia. PyPedia is open-source, available under the BSD 2-Clause License.

  7. TH-E-209-01: Fluoroscopic Dose Monitoring and Patient Follow-Up Program at Massachusetts General Hospital

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Liu, B.

    2016-06-15

    Radiation dose monitoring solutions have opened up new opportunities for medical physicists to be more involved in modern clinical radiology practices. In particular, with the help of comprehensive radiation dose data, data-driven protocol management and informed case follow up are now feasible. Significant challenges remain however and the problems faced by medical physicists are highly heterogeneous. Imaging systems from multiple vendors and a wide range of vintages co-exist in the same department and employ data communication protocols that are not fully standardized or implemented making harmonization complex. Many different solutions for radiation dose monitoring have been implemented by imaging facilitiesmore » over the past few years. Such systems are based on commercial software, home-grown IT solutions, manual PACS data dumping, etc., and diverse pathways can be used to bring the data to impact clinical practice. The speakers will share their experiences with creating or tailoring radiation dose monitoring/management systems and procedures over the past few years, which vary significantly in design and scope. Topics to cover: (1) fluoroscopic dose monitoring and high radiation event handling from a large academic hospital; (2) dose monitoring and protocol optimization in pediatric radiology; and (3) development of a home-grown IT solution and dose data analysis framework. Learning Objectives: Describe the scope and range of radiation dose monitoring and protocol management in a modern radiology practice Review examples of data available from a variety of systems and how it managed and conveyed. Reflect on the role of the physicist in radiation dose awareness.« less

  8. Automation in an addiction treatment research clinic: computerised contingency management, ecological momentary assessment and a protocol workflow system.

    PubMed

    Vahabzadeh, Massoud; Lin, Jia-Ling; Mezghanni, Mustapha; Epstein, David H; Preston, Kenzie L

    2009-01-01

    A challenge in treatment research is the necessity of adhering to protocol and regulatory strictures while maintaining flexibility to meet patients' treatment needs and to accommodate variations among protocols. Another challenge is the acquisition of large amounts of data in an occasionally hectic environment, along with the provision of seamless methods for exporting, mining and querying the data. We have automated several major functions of our outpatient treatment research clinic for studies in drug abuse and dependence. Here we describe three such specialised applications: the Automated Contingency Management (ACM) system for the delivery of behavioural interventions, the transactional electronic diary (TED) system for the management of behavioural assessments and the Protocol Workflow System (PWS) for computerised workflow automation and guidance of each participant's daily clinic activities. These modules are integrated into our larger information system to enable data sharing in real time among authorised staff. ACM and the TED have each permitted us to conduct research that was not previously possible. In addition, the time to data analysis at the end of each study is substantially shorter. With the implementation of the PWS, we have been able to manage a research clinic with an 80 patient capacity, having an annual average of 18,000 patient visits and 7300 urine collections with a research staff of five. Finally, automated data management has considerably enhanced our ability to monitor and summarise participant safety data for research oversight. When developed in consultation with end users, automation in treatment research clinics can enable more efficient operations, better communication among staff and expansions in research methods.

  9. Barriers to implementing protocols for kidney paired donation and desensitization: survey of U.S. transplant programs.

    PubMed

    Clark, Emma; Hanto, Ruthanne; Rodrigue, James R

    2010-12-01

    Special types of kidney transplant exist for patients who have willing but incompatible donors. Two types of transplants that circumvent donor-recipient incompatibility are "kidney paired donation" and "desensitization." Lack of access to these protocols limits living donations and shortens the life span of patients with willing but incompatible donors. To understand potential barriers to implementing kidney paired donation and desensitization, as well as attitudes toward nondirected donation and compatible type O donation, which would maximize the number of kidney paired donation transplants performed via chains. We created a 56-question Web-based survey to elicit information from US transplant program directors about 24 potential barriers to implementing these protocols. Of 166 programs contacted, 96 responded, including 88 complete and 8 partial responses. After pediatric-only programs and multiple responses from the same program were removed, 84 total (78 complete) remained. Respondents were asked to designate each barrier as "major," "minor," or "not a barrier". Availability of dedicated nurse coordinators and the United Network for Organ Sharing's variance request process (although kidney paired donation does not actually require a variance) were significant barriers to kidney paired donation. Most respondents (54%, 42/78) would prefer to participate in a regional rather than a national protocol for kidney paired donation. Risk of complications was the most significant barrier to desensitization. University affiliation, region, and training (nephrologist vs surgeon) had little effect on perception of barriers. Most (92%, 71/78) would evaluate nondirected donations; 53% (41/78) would encourage compatible type O donors to enter kidney paired donation.

  10. Development of risk reduction behavioral counseling for Ebola virus disease survivors enrolled in the Sierra Leone Ebola Virus Persistence Study, 2015-2016

    PubMed Central

    Malik, Tasneem; Ariyarajah, Archchun; Ongpin, Patricia; Hogben, Matthew; McDonald, Suzanna L. R.; Marrinan, Jaclyn; Massaquoi, Thomas; Thorson, Anna; Ervin, Elizabeth; Bernstein, Kyle; Ross, Christine; Liu, William J.; Kroeger, Karen; Durski, Kara N.; Broutet, Nathalie; Knust, Barbara; Deen, Gibrilla F.

    2017-01-01

    Background During the 2014–2016 West Africa Ebola Virus Disease (EVD) epidemic, the public health community had concerns that sexual transmission of the Ebola virus (EBOV) from EVD survivors was a risk, due to EBOV persistence in body fluids of EVD survivors, particularly semen. The Sierra Leone Ebola Virus Persistence Study was initiated to investigate this risk by assessing EBOV persistence in numerous body fluids of EVD survivors and providing risk reduction counseling based on test results for semen, vaginal fluid, menstrual blood, urine, rectal fluid, sweat, tears, saliva, and breast milk. This publication describes implementation of the counseling protocol and the key lessons learned. Methodology/Principal findings The Ebola Virus Persistence Risk Reduction Behavioral Counseling Protocol was developed from a framework used to prevent transmission of HIV and other sexually transmitted infections. The framework helped to identify barriers to risk reduction and facilitated the development of a personalized risk-reduction plan, particularly around condom use and abstinence. Pre-test and post-test counseling sessions included risk reduction guidance, and post-test counseling was based on the participants’ individual test results. The behavioral counseling protocol enabled study staff to translate the study’s body fluid test results into individualized information for study participants. Conclusions/Significance The Ebola Virus Persistence Risk Reduction Behavioral Counseling Protocol provided guidance to mitigate the risk of EBOV transmission from EVD survivors. It has since been shared with and adapted by other EVD survivor body fluid testing programs and studies in Ebola-affected countries. PMID:28892490

  11. Patients want granular privacy control over health information in electronic medical records.

    PubMed

    Caine, Kelly; Hanania, Rima

    2013-01-01

    To assess patients' desire for granular level privacy control over which personal health information should be shared, with whom, and for what purpose; and whether these preferences vary based on sensitivity of health information. A card task for matching health information with providers, questionnaire, and interview with 30 patients whose health information is stored in an electronic medical record system. Most patients' records contained sensitive health information. No patients reported that they would prefer to share all information stored in an electronic medical record (EMR) with all potential recipients. Sharing preferences varied by type of information (EMR data element) and recipient (eg, primary care provider), and overall sharing preferences varied by participant. Patients with and without sensitive records preferred less sharing of sensitive versus less-sensitive information. Patients expressed sharing preferences consistent with a desire for granular privacy control over which health information should be shared with whom and expressed differences in sharing preferences for sensitive versus less-sensitive EMR data. The pattern of results may be used by designers to generate privacy-preserving EMR systems including interfaces for patients to express privacy and sharing preferences. To maintain the level of privacy afforded by medical records and to achieve alignment with patients' preferences, patients should have granular privacy control over information contained in their EMR.

  12. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols

    PubMed Central

    Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon

    2016-01-01

    Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network. PMID:27314351

  13. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols.

    PubMed

    Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon

    2016-06-14

    Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network.

  14. mREST Interface Specification

    NASA Technical Reports Server (NTRS)

    McCartney, Patrick; MacLean, John

    2012-01-01

    mREST is an implementation of the REST architecture specific to the management and sharing of data in a system of logical elements. The purpose of this document is to clearly define the mREST interface protocol. The interface protocol covers all of the interaction between mREST clients and mREST servers. System-level requirements are not specifically addressed. In an mREST system, there are typically some backend interfaces between a Logical System Element (LSE) and the associated hardware/software system. For example, a network camera LSE would have a backend interface to the camera itself. These interfaces are specific to each type of LSE and are not covered in this document. There are also frontend interfaces that may exist in certain mREST manager applications. For example, an electronic procedure execution application may have a specialized interface for configuring the procedures. This interface would be application specific and outside of this document scope. mREST is intended to be a generic protocol which can be used in a wide variety of applications. A few scenarios are discussed to provide additional clarity but, in general, application-specific implementations of mREST are not specifically addressed. In short, this document is intended to provide all of the information necessary for an application developer to create mREST interface agents. This includes both mREST clients (mREST manager applications) and mREST servers (logical system elements, or LSEs).

  15. Using Public Participation to Improve MELs Energy Data Collection

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kloss, Margarita; Cheung, Iris; Brown, Richard

    Miscellaneous and electronic loads (MELs) comprise an increasing share of building energy consumption. Large-scale data collection is needed to inform meaningful energy reduction strategies because of the diversity of MELs and our lack of understanding about how people use them. Traditional methods of data collection, however, usually incur high labor and metering equipment expenses. As an alternative, this paper investigates the feasibility of crowdsourcing data collection to satisfy at least part of the data collection needs with acceptable accuracy. We assessed the reliability and accuracy of crowd-sourced data by recruiting 18 volunteers and testing our crowdsourcing protocol. The protocol askedmore » volunteers to perform measurement tasks for three MELs devices of increasing complexity 1) record power meter and MELs product characteristics, 2) identify and measure all power modes available, and 3) report the measured power. Volunteers performed reasonably well for devices with functionalities with which they were familiar, but many could not correctly identify all available power modes in complex devices. Accuracy may improve when participants measure the power used by familiar devices in their home, or by providing more specific instructions, e.g. videos. Furthermore, crowdsourcing data collection from individual homeowners has the potential to generate valuable information about MELs energy use in homes when integrated with existing programs such as Home Energy Saver and Building America.« less

  16. Using Social Media and Mobile Devices to Discover and Share Disaster Data Products Derived From Satellites

    NASA Technical Reports Server (NTRS)

    Mandl, Daniel; Cappelaere, Patrice; Frye, Stuart; Evans, John; Moe, Karen

    2014-01-01

    Data products derived from Earth observing satellites are difficult to find and share without specialized software and often times a highly paid and specialized staff. For our research effort, we endeavored to prototype a distributed architecture that depends on a standardized communication protocol and applications program interface (API) that makes it easy for anyone to discover and access disaster related data. Providers can easily supply the public with their disaster related products by building an adapter for our API. Users can use the API to browse and find products that relate to the disaster at hand, without a centralized catalogue, for example floods, and then are able to share that data via social media. Furthermore, a longerterm goal for this architecture is to enable other users who see the shared disaster product to be able to generate the same product for other areas of interest via simple point and click actions on the API on their mobile device. Furthermore, the user will be able to edit the data with on the ground local observations and return the updated information to the original repository of this information if configured for this function. This architecture leverages SensorWeb functionality [1] presented at previous IGARSS conferences. The architecture is divided into two pieces, the frontend, which is the GeoSocial API, and the backend, which is a standardized disaster node that knows how to talk to other disaster nodes, and also can communicate with the GeoSocial API. The GeoSocial API, along with the disaster node basic functionality enables crowdsourcing and thus can leverage insitu observations by people external to a group to perform tasks such as improving water reference maps, which are maps of existing water before floods. This can lower the cost of generating precision water maps. Keywords-Data Discovery, Disaster Decision Support, Disaster Management, Interoperability, CEOS WGISS Disaster Architecture

  17. Balancing Benefits and Risks of Immortal Data: Participants' Views of Open Consent in the Personal Genome Project.

    PubMed

    Zarate, Oscar A; Brody, Julia Green; Brown, Phil; Ramirez-Andreotta, Mónica D; Perovich, Laura; Matz, Jacob

    2016-01-01

    An individual's health, genetic, or environmental-exposure data, placed in an online repository, creates a valuable shared resource that can accelerate biomedical research and even open opportunities for crowd-sourcing discoveries by members of the public. But these data become "immortalized" in ways that may create lasting risk as well as benefit. Once shared on the Internet, the data are difficult or impossible to redact, and identities may be revealed by a process called data linkage, in which online data sets are matched to each other. Reidentification (re-ID), the process of associating an individual's name with data that were considered deidentified, poses risks such as insurance or employment discrimination, social stigma, and breach of the promises often made in informed-consent documents. At the same time, re-ID poses risks to researchers and indeed to the future of science, should re-ID end up undermining the trust and participation of potential research participants. The ethical challenges of online data sharing are heightened as so-called big data becomes an increasingly important research tool and driver of new research structures. Big data is shifting research to include large numbers of researchers and institutions as well as large numbers of participants providing diverse types of data, so the participants' consent relationship is no longer with a person or even a research institution. In addition, consent is further transformed because big data analysis often begins with descriptive inquiry and generation of a hypothesis, and the research questions cannot be clearly defined at the outset and may be unforeseeable over the long term. In this article, we consider how expanded data sharing poses new challenges, illustrated by genomics and the transition to new models of consent. We draw on the experiences of participants in an open data platform-the Personal Genome Project-to allow study participants to contribute their voices to inform ethical consent practices and protocol reviews for big-data research. © 2015 The Hastings Center.

  18. Verifiable Secret Redistribution for Threshold Sharing Schemes

    DTIC Science & Technology

    2002-02-01

    complete verification in our protocol, old shareholders broadcast a commitment to the secret to the new shareholders. We prove that the new...of an m − 1 degree polynomial from m of n points yields a constant term in 1 the polynomial that corresponds to the secret . In Blakley’s scheme [Bla79...the intersection of m of n vector spaces yields a one-dimensional vector that corresponds to the secret . Desmedt surveys other sharing schemes

  19. Multiparty Quantum Secret Sharing of Key Using Practical Faint Laser Pulses

    NASA Astrophysics Data System (ADS)

    Zhang, Zhan-Jun; Man, Zhong-Xiao

    2005-07-01

    Based on a bidirectional quantum key distribution protocol [Phys. Rev. A 70 (2004) 012311], we propose a (m-1,m-1)-threshold scheme of m (m >= 3)-party quantum secret sharing of key by using practical faint laser pulses. In our scheme, if all the m-1 sharers collaborate, they can obtain the joint secret key from the message sender. Our scheme is more feasible according to the present-day technology.

  20. Exploring a social network for sharing information about pain.

    PubMed

    Alvarez, Ana Graziela; Dal Sasso, Grace T Marcon

    2012-01-01

    The purpose of study was to evaluate the opinion of users about the experience of sharing information about pain in a social network. An electronic survey study was conducted from September to November/2009. Nine participants assessed the social network through of an electronic questionnaire. positive aspects (easy access, organized information, interactivity, encourages the sharing of information, learning opportunity). The sharing of information contributes to the development of a collective intelligence based on exchanging experiences and knowledge sharing.

  1. Improving team information sharing with a structured call-out in anaesthetic emergencies: a randomized controlled trial.

    PubMed

    Weller, J M; Torrie, J; Boyd, M; Frengley, R; Garden, A; Ng, W L; Frampton, C

    2014-06-01

    Sharing information with the team is critical in developing a shared mental model in an emergency, and fundamental to effective teamwork. We developed a structured call-out tool, encapsulated in the acronym 'SNAPPI': Stop; Notify; Assessment; Plan; Priorities; Invite ideas. We explored whether a video-based intervention could improve structured call-outs during simulated crises and if this would improve information sharing and medical management. In a simulation-based randomized, blinded study, we evaluated the effect of the video-intervention teaching SNAPPI on scores for SNAPPI, information sharing, and medical management using baseline and follow-up crisis simulations. We assessed information sharing using a probe technique where nurses and technicians received unique, clinically relevant information probes before the simulation. Shared knowledge of probes was measured in a written, post-simulation test. We also scored sharing of diagnostic options with the team and medical management. Anaesthetists' scores for SNAPPI were significantly improved, as was the number of diagnostic options they shared. We found a non-significant trend to improve information-probe sharing and medical management in the intervention group, and across all simulations, a significant correlation between SNAPPI and information-probe sharing. Of note, only 27% of the clinically relevant information about the patient provided to the nurse and technician in the pre-simulation information probes was subsequently learnt by the anaesthetist. We developed a structured communication tool, SNAPPI, to improve information sharing between anaesthetists and their team, taught it using a video-based intervention, and provide initial evidence to support its value for improving communication in a crisis. © The Author [2014]. Published by Oxford University Press on behalf of the British Journal of Anaesthesia. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  2. Enhancing Group Decision Making: An Exercise to Reduce Shared Information Bias

    ERIC Educational Resources Information Center

    Baker, Diane F.

    2010-01-01

    Research on shared information bias has shown that group members involved in a decision-making task tend to undervalue information that a single member shares with the group, especially when that information conflicts with their prior conclusions. The group activity in this article is intended to heighten awareness of this shared information bias…

  3. Distributed reservation control protocols for random access broadcasting channels

    NASA Technical Reports Server (NTRS)

    Greene, E. P.; Ephremides, A.

    1981-01-01

    Attention is given to a communication network consisting of an arbitrary number of nodes which can communicate with each other via a time-division multiple access (TDMA) broadcast channel. The reported investigation is concerned with the development of efficient distributed multiple access protocols for traffic consisting primarily of single packet messages in a datagram mode of operation. The motivation for the design of the protocols came from the consideration of efficient multiple access utilization of moderate to high bandwidth (4-40 Mbit/s capacity) communication satellite channels used for the transmission of short (1000-10,000 bits) fixed length packets. Under these circumstances, the ratio of roundtrip propagation time to packet transmission time is between 100 to 10,000. It is shown how a TDMA channel can be adaptively shared by datagram traffic and constant bandwidth users such as in digital voice applications. The distributed reservation control protocols described are a hybrid between contention and reservation protocols.

  4. To Share or Not to Share: A Cross-Sectional Study on Health Information Sharing and Its Determinants Among Chinese Rural Chronic Patients.

    PubMed

    Fu, Hang; Dong, Dong; Feng, Da; He, Zhifei; Tang, Shangfeng; Fu, Qian; Feng, Zhanchun

    2017-10-01

    To examine the determinants of the health information sharing among rural Chinese chronic patients. Two large population-based surveys in rural China were carried out from July 2011 to April 2012. Data used in this study were second hand and sorted out from the two previous databases. A binary logistic regression analysis was employed to discover the impact of demographic characteristics, level of health literacy, and other factors on respondents' health information sharing behavior. Among the total 1,324 participants, 63.6% share health information with others. Among all significant predictors, those who acquire health information via family and friends are 6.0 times the odds of sharing health information than those who do not. Participants who have more than six household members, with middle and high levels of health knowledge, and who are moderately involved in discussions or settlements of village affairs are also more likely to share health information. The reliance on interpersonal communication channels for health information, household size, the patients' preexisting health knowledge, and their activity in village affairs are crucial determinants for health information sharing among rural chronic patients. A more sophisticated model needs to be established to reveal the complex processes of health information communication.

  5. 76 FR 79114 - Privacy Act of 1974: Implementation of Exemptions; DOT/ALL 23-Information Sharing Environment...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-21

    ...] Privacy Act of 1974: Implementation of Exemptions; DOT/ALL 23-- Information Sharing Environment (ISE... titled, ``DOT/ALL 23--Information Sharing Environment (ISE) Suspicious Activity Reporting (SAR... exempts portions of the ``DOT/ALL 23--Information Sharing Environment (ISE) Suspicious Activity Reporting...

  6. A Simulation System Based on the Actor Paradigm

    DTIC Science & Technology

    1988-02-01

    of the protocol. Shared memory communication requires the programmer to wait and signal semaphores explicitly to synchronize the communicating parties...wide range of possibilities within the same basic protocol. - The simplicity of the primitive operation set affords those creating new operations...more flexibility (Ada has a large and complicated primitive set). -3- II I I I B A I -I I I I I . 0 1 2 3 4 5 Time 0: Both processes A and B are

  7. Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue

    NASA Astrophysics Data System (ADS)

    Shukla, Chitra; Thapliyal, Kishore; Pathak, Anirban

    2017-12-01

    Semi-quantum protocols that allow some of the users to remain classical are proposed for a large class of problems associated with secure communication and secure multiparty computation. Specifically, first-time semi-quantum protocols are proposed for key agreement, controlled deterministic secure communication and dialogue, and it is shown that the semi-quantum protocols for controlled deterministic secure communication and dialogue can be reduced to semi-quantum protocols for e-commerce and private comparison (socialist millionaire problem), respectively. Complementing with the earlier proposed semi-quantum schemes for key distribution, secret sharing and deterministic secure communication, set of schemes proposed here and subsequent discussions have established that almost every secure communication and computation tasks that can be performed using fully quantum protocols can also be performed in semi-quantum manner. Some of the proposed schemes are completely orthogonal-state-based, and thus, fundamentally different from the existing semi-quantum schemes that are conjugate coding-based. Security, efficiency and applicability of the proposed schemes have been discussed with appropriate importance.

  8. Consensus definitions of 14 severe acute toxic effects for childhood lymphoblastic leukaemia treatment: a Delphi consensus.

    PubMed

    Schmiegelow, Kjeld; Attarbaschi, Andishe; Barzilai, Shlomit; Escherich, Gabriele; Frandsen, Thomas Leth; Halsey, Christina; Hough, Rachael; Jeha, Sima; Kato, Motohiro; Liang, Der-Cherng; Mikkelsen, Torben Stamm; Möricke, Anja; Niinimäki, Riitta; Piette, Caroline; Putti, Maria Caterina; Raetz, Elizabeth; Silverman, Lewis B; Skinner, Roderick; Tuckuviene, Ruta; van der Sluis, Inge; Zapotocka, Ester

    2016-06-01

    Although there are high survival rates for children with acute lymphoblastic leukaemia, their outcome is often counterbalanced by the burden of toxic effects. This is because reported frequencies vary widely across studies, partly because of diverse definitions of toxic effects. Using the Delphi method, 15 international childhood acute lymphoblastic leukaemia study groups assessed acute lymphoblastic leukaemia protocols to address toxic effects that were to be considered by the Ponte di Legno working group. 14 acute toxic effects (hypersensitivity to asparaginase, hyperlipidaemia, osteonecrosis, asparaginase-associated pancreatitis, arterial hypertension, posterior reversible encephalopathy syndrome, seizures, depressed level of consciousness, methotrexate-related stroke-like syndrome, peripheral neuropathy, high-dose methotrexate-related nephrotoxicity, sinusoidal obstructive syndrome, thromboembolism, and Pneumocystis jirovecii pneumonia) that are serious but too rare to be addressed comprehensively within any single group, or are deemed to need consensus definitions for reliable incidence comparisons, were selected for assessment. Our results showed that none of the protocols addressed all 14 toxic effects, that no two protocols shared identical definitions of all toxic effects, and that no toxic effect definition was shared by all protocols. Using the Delphi method over three face-to-face plenary meetings, consensus definitions were obtained for all 14 toxic effects. In the overall assessment of outcome of acute lymphoblastic leukaemia treatment, these expert opinion-based definitions will allow reliable comparisons of frequencies and severities of acute toxic effects across treatment protocols, and facilitate international research on cause, guidelines for treatment adaptation, preventive strategies, and development of consensus algorithms for reporting on acute lymphoblastic leukaemia treatment. Copyright © 2016 Elsevier Ltd. All rights reserved.

  9. Ginger as an antiemetic modality for chemotherapy-induced nausea and vomiting: a systematic review and meta-analysis.

    PubMed

    Lee, Jiyeon; Oh, Heeyoung

    2013-03-01

    To evaluate the effect of ginger as an antiemetic modality for the control of chemotherapy-induced nausea and vomiting (CINV). Databases searched included MEDLINE® (PubMed), Embase, CINAHL®, Cochrane Central Register of Controlled Trials, Korean Studies Information Service System, Research Information Sharing Service by the Korean Education and Research Information Service, and Dissertation Central. A systematic review was conducted of five randomized, controlled trials involving 872 patients with cancer. Ginger was compared with placebo or metoclopramide. The participant characteristics, chemotherapy regimen and antiemetic control, ginger preparation and protocol, measurements, results of the studies, adherence to the treatment protocol, and side effects were reviewed systematically. The incidence and severity of acute and delayed CINV were subject to meta-analysis. The incidence of acute nausea (p = 0.67), incidence of acute vomiting (p = 0.37), and severity of acute nausea (p = 0.12) did not differ significantly between the ginger and control groups. Current evidence does not support the use of ginger for the control of CINV. Ginger did not contribute to control of the incidence of acute nausea and vomiting or of the severity of acute nausea. Ginger has long been regarded as a traditional antiemetic modality, but its effectiveness remains to be established. The findings of this study could be incorporated into clinical guidelines, such as the Oncology Nursing Society's Putting Evidence Into Practice resources. Current evidence supports the need for more methodologically rigorous studies in this area. Although ginger is known as a traditional antiemetic, current evidence does not support the effect of ginger in CINV control. The findings of this study inform healthcare providers that its effectiveness remains to be established from methodologically rigorous future trials.

  10. Affording to exchange: social capital and online information sharing.

    PubMed

    Maksl, Adam; Young, Rachel

    2013-08-01

    The potential harm and benefit associated with sharing personal information online is a topic of debate and discussion. Using survey methods (n=872), we explore whether attainment of social capital online relates to greater comfort with sharing personal information. We found that perceptions of bridging and bonding social capital earned from using Facebook are significant predictors of overall comfort levels with sharing personal information. This research raises timely questions about how the perceived benefits of social networking sites influence how personal information is shared online.

  11. 76 FR 11447 - Agency Information Collection Activities; Proposed Collection; Comment Request; Protection of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-02

    ... Protection regulations, the science of ozone layer depletion, and related topics. SUPPLEMENTARY INFORMATION... compliance with the Montreal Protocol on Substances that Deplete the Ozone Layer (Protocol) and the CAA.... obligations under Article 2H of the Montreal Protocol on Substances that Deplete the Ozone Layer (Protocol...

  12. Use of the Blue Button Online Tool for Sharing Health Information: Qualitative Interviews With Patients and Providers.

    PubMed

    Klein, Dawn M; Fix, Gemmae M; Hogan, Timothy P; Simon, Steven R; Nazi, Kim M; Turvey, Carolyn L

    2015-08-18

    Information sharing between providers is critical for care coordination, especially in health systems such as the United States Department of Veterans Affairs (VA), where many patients also receive care from other health care organizations. Patients can facilitate this sharing by using the Blue Button, an online tool that promotes patients' ability to view, print, and download their health records. The aim of this study was to characterize (1) patients' use of Blue Button, an online information-sharing tool in VA's patient portal, My HealtheVet, (2) information-sharing practices between VA and non-VA providers, and (3) how providers and patients use a printed Blue Button report during a clinical visit. Semistructured qualitative interviews were conducted with 34 VA patients, 10 VA providers, and 9 non-VA providers. Interviews focused on patients' use of Blue Button, information-sharing practices between VA and non-VA providers, and how patients and providers use a printed Blue Button report during a clinical visit. Qualitative themes were identified through iterative rounds of coding starting with an a priori schema based on technology adoption theory. Information sharing between VA and non-VA providers relied primarily on the patient. Patients most commonly used Blue Button to access and share VA laboratory results. Providers recognized the need for improved information sharing, valued the Blue Button printout, and expressed interest in a way to share information electronically across settings. Consumer-oriented technologies such as Blue Button can facilitate patients sharing health information with providers in other health care systems; however, more education is needed to inform patients of this use to facilitate care coordination. Additional research is needed to explore how personal health record documents, such as Blue Button reports, can be easily shared and incorporated into the clinical workflow of providers.

  13. Methods for Monitoring Fish Communities of Buffalo National River and Ozark National Scenic Riverways in the Ozark Plateaus of Arkansas and Missouri: Version 1.0

    USGS Publications Warehouse

    Petersen, James C.; Justus, B.G.; Dodd, H.R.; Bowles, D.E.; Morrison, L.W.; Williams, M.H.; Rowell, G.A.

    2008-01-01

    Buffalo National River located in north-central Arkansas, and Ozark National Scenic Riverways, located in southeastern Missouri, are the two largest units of the National Park Service in the Ozark Plateaus physiographic province. The purpose of this report is to provide a protocol that will be used by the National Park Service to sample fish communities and collect related water-quality, habitat, and stream discharge data of Buffalo National River and Ozark National Scenic Riverways to meet inventory and long-term monitoring objectives. The protocol includes (1) a protocol narrative, (2) several standard operating procedures, and (3) supplemental information helpful for implementation of the protocol. The protocol narrative provides background information about the protocol such as the rationale of why a particular resource or resource issue was selected for monitoring, information concerning the resource or resource issue of interest, a description of how monitoring results will inform management decisions, and a discussion of the linkages between this and other monitoring projects. The standard operating procedures cover preparation, training, reach selection, water-quality sampling, fish community sampling, physical habitat collection, measuring stream discharge, equipment maintenance and storage, data management and analysis, reporting, and protocol revision procedures. Much of the information in the standard operating procedures was gathered from existing protocols of the U.S. Geological Survey National Water Quality Assessment program or other sources. Supplemental information that would be helpful for implementing the protocol is included. This information includes information on fish species known or suspected to occur in the parks, sample sites, sample design, fish species traits, index of biotic integrity metrics, sampling equipment, and field forms.

  14. Fuzzy-rule-based Adaptive Resource Control for Information Sharing in P2P Networks

    NASA Astrophysics Data System (ADS)

    Wu, Zhengping; Wu, Hao

    With more and more peer-to-peer (P2P) technologies available for online collaboration and information sharing, people can launch more and more collaborative work in online social networks with friends, colleagues, and even strangers. Without face-to-face interactions, the question of who can be trusted and then share information with becomes a big concern of a user in these online social networks. This paper introduces an adaptive control service using fuzzy logic in preference definition for P2P information sharing control, and designs a novel decision-making mechanism using formal fuzzy rules and reasoning mechanisms adjusting P2P information sharing status following individual users' preferences. Applications of this adaptive control service into different information sharing environments show that this service can provide a convenient and accurate P2P information sharing control for individual users in P2P networks.

  15. Optimizing tubal ligation service delivery: a prospective cohort study to measure the task-sharing experience of Marie Stopes International Ethiopia.

    PubMed

    Nuccio, Olivia; Sendek, Birhanu; Park, Min Hae; Mesele, Tesfaye; Okello, Francis Ogojo; Gordon-Maclean, Cristin

    2017-03-01

    The Ethiopian government implements a progressive task-sharing policy for health services as a strategy to address shortages of highly skilled providers and increase access to critical services, such as family planning. Since 2009, Marie Stopes International Ethiopia has trained health officers to provide tubal ligations, a permanent method of family planning, as part of its task-sharing strategy. The objectives of this research were to evaluate task-sharing tubal ligations to health officers at Marie Stopes International Ethiopia, specifically: (a) to investigate safety, as measured by the proportion of major adverse events; (b) to evaluate the feasibility, as measured by adherence to the standard tubal ligation procedure protocol and (c) to investigate acceptability to clients of the tubal ligation procedure provided by health officers. We established a prospective cohort of women aged  ≥18 years presenting for tubal ligation at Marie Stopes International Ethiopia sites in three regions in Ethiopia (March–May 2014). Data on adverse events (incomplete procedure, pain, bleeding, infection, perforation) were collected intra-operatively; peri-operatively (1-h post-procedure); and post-operatively (7 days post-procedure). To measure feasibility, 65% of procedures were selected for ‘audit’, where a nurse observed and scored health officers adherence to standard protocol using an 18-item checklist. To assess acceptability, women were asked about their satisfaction with the procedure. In total, 276 women were enrolled in the study. 97.5% of procedures took place in rural settings. All participants were followed up 7 days post-procedure (100% response rate). The overall proportion of major adverse events was 3% (95% CI 1–6%). The most frequent adverse event was ‘failure to complete the TL’ (2.2%, n = 6). The average score on protocol adherence was 96.9%. Overall, 98.2% (n = 271) of clients would recommend the procedure to a friend. Findings from this study, indicating safety, feasibility and acceptability, are consistent with the existing literature, which indicate safety and acceptability for task-sharing tubal ligations, and other methods of contraception with non-physician health providers. This study adds to scant literature on task-sharing tubal ligations in rural and low-resource settings.

  16. 32 CFR 806b.43 - Placing personal information on shared drives.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Placing personal information on shared drives... shared drives. Personal information should never be placed on shared drives for access by groups of... official purposes to reduce the number of people with access to such personal information. Commanders and...

  17. 32 CFR 806b.43 - Placing personal information on shared drives.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Placing personal information on shared drives... shared drives. Personal information should never be placed on shared drives for access by groups of... official purposes to reduce the number of people with access to such personal information. Commanders and...

  18. 32 CFR 806b.43 - Placing personal information on shared drives.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Placing personal information on shared drives... shared drives. Personal information should never be placed on shared drives for access by groups of... official purposes to reduce the number of people with access to such personal information. Commanders and...

  19. 32 CFR 806b.43 - Placing personal information on shared drives.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Placing personal information on shared drives... shared drives. Personal information should never be placed on shared drives for access by groups of... official purposes to reduce the number of people with access to such personal information. Commanders and...

  20. Integrated Air Surveillance Concept of Operations

    DTIC Science & Technology

    2011-11-01

    information, intelligence, weather data, and other situational awareness-related information. 4.2.4 Shared Services Automated processing of sensor and...other surveillance information will occur through shared services , accessible through an enterprise network infrastructure, that provide for collecting...also be provided, such as information discovery and translation. The IS architecture effort will identify specific shared services . Shared

  1. Privacy Risks from Genomic Data-Sharing Beacons

    PubMed Central

    Shringarpure, Suyash S.; Bustamante, Carlos D.

    2015-01-01

    The human genetics community needs robust protocols that enable secure sharing of genomic data from participants in genetic research. Beacons are web servers that answer allele-presence queries—such as “Do you have a genome that has a specific nucleotide (e.g., A) at a specific genomic position (e.g., position 11,272 on chromosome 1)?”—with either “yes” or “no.” Here, we show that individuals in a beacon are susceptible to re-identification even if the only data shared include presence or absence information about alleles in a beacon. Specifically, we propose a likelihood-ratio test of whether a given individual is present in a given genetic beacon. Our test is not dependent on allele frequencies and is the most powerful test for a specified false-positive rate. Through simulations, we showed that in a beacon with 1,000 individuals, re-identification is possible with just 5,000 queries. Relatives can also be identified in the beacon. Re-identification is possible even in the presence of sequencing errors and variant-calling differences. In a beacon constructed with 65 European individuals from the 1000 Genomes Project, we demonstrated that it is possible to detect membership in the beacon with just 250 SNPs. With just 1,000 SNP queries, we were able to detect the presence of an individual genome from the Personal Genome Project in an existing beacon. Our results show that beacons can disclose membership and implied phenotypic information about participants and do not protect privacy a priori. We discuss risk mitigation through policies and standards such as not allowing anonymous pings of genetic beacons and requiring minimum beacon sizes. PMID:26522470

  2. Privacy Risks from Genomic Data-Sharing Beacons.

    PubMed

    Shringarpure, Suyash S; Bustamante, Carlos D

    2015-11-05

    The human genetics community needs robust protocols that enable secure sharing of genomic data from participants in genetic research. Beacons are web servers that answer allele-presence queries--such as "Do you have a genome that has a specific nucleotide (e.g., A) at a specific genomic position (e.g., position 11,272 on chromosome 1)?"--with either "yes" or "no." Here, we show that individuals in a beacon are susceptible to re-identification even if the only data shared include presence or absence information about alleles in a beacon. Specifically, we propose a likelihood-ratio test of whether a given individual is present in a given genetic beacon. Our test is not dependent on allele frequencies and is the most powerful test for a specified false-positive rate. Through simulations, we showed that in a beacon with 1,000 individuals, re-identification is possible with just 5,000 queries. Relatives can also be identified in the beacon. Re-identification is possible even in the presence of sequencing errors and variant-calling differences. In a beacon constructed with 65 European individuals from the 1000 Genomes Project, we demonstrated that it is possible to detect membership in the beacon with just 250 SNPs. With just 1,000 SNP queries, we were able to detect the presence of an individual genome from the Personal Genome Project in an existing beacon. Our results show that beacons can disclose membership and implied phenotypic information about participants and do not protect privacy a priori. We discuss risk mitigation through policies and standards such as not allowing anonymous pings of genetic beacons and requiring minimum beacon sizes. Copyright © 2015 The Authors. Published by Elsevier Inc. All rights reserved.

  3. As good as it gets? Managing risks of cardiovascular disease in California's top-performing physician organizations.

    PubMed

    Rodriguez, Hector P; Ivey, Susan L; Raffetto, Brian J; Vaughn, Jennifer; Knox, Margae; Hanley, Hattie Rees; Mangione, Carol M; Shortell, Stephen M

    2014-04-01

    The California Right Care Initiative (RCI) accelerates the adoption of evidence-based guidelines and improved care management practices for conditions for which the gap between science and practice is significant, resulting in preventable disability and death. Medical directors and quality improvement leaders from 11 of the 12 physician organizations that met the 2010 national 90th percentile performance benchmarks for control of hyperlipidemia and glycated hemoglobin in 2011 were interviewed in 2012. Interviews, as well as surveys, assessed performance reporting and feedback to individual physicians; medication management protocols; team-based care management; primary care team huddles; coordination of care between primary care clinicians and specialists; implementation of shared medical appointments; and telephone visits for high-risk patients. All but 1 of 11 organizations implemented electronic health records. Electronic information exchange between primary care physicians and specialists, however, was uncommon. Few organizations routinely used interdisciplinary team approaches, shared medical appointments, or telephonic strategies for managing cardiovascular risks among patients. Implementation barriers included physicians' resistance to change, limited resources and reimbursement for team approaches, and limited organizational capacity for change. Implementation facilitators included routine use of reliable data to guide improvement, leadership facilitation of change, physician buy-in, health information technology use, and financial incentives. To accelerate improvements in managing cardiovascular risks, physician organizations may need to implement strategies involving extensive practice reorganization and work flow redesign.

  4. Ensuring Privacy When Integrating Patient-Based Datasets: New Methods and Developments in Record Linkage.

    PubMed

    Brown, Adrian P; Ferrante, Anna M; Randall, Sean M; Boyd, James H; Semmens, James B

    2017-01-01

    In an era where the volume of structured and unstructured digital data has exploded, there has been an enormous growth in the creation of data about individuals that can be used for understanding and treating disease. Joining these records together at an individual level provides a complete picture of a patient's interaction with health services and allows better assessment of patient outcomes and effectiveness of treatment and services. Record linkage techniques provide an efficient and cost-effective method to bring individual records together as patient profiles. These linkage procedures bring their own challenges, especially relating to the protection of privacy. The development and implementation of record linkage systems that do not require the release of personal information can reduce the risks associated with record linkage and overcome legal barriers to data sharing. Current conceptual and experimental privacy-preserving record linkage (PPRL) models show promise in addressing data integration challenges. Enhancing and operationalizing PPRL protocols can help address the dilemma faced by some custodians between using data to improve quality of life and dealing with the ethical, legal, and administrative issues associated with protecting an individual's privacy. These methods can reduce the risk to privacy, as they do not require personally identifying information to be shared. PPRL methods can improve the delivery of record linkage services to the health and broader research community.

  5. Ensuring Privacy When Integrating Patient-Based Datasets: New Methods and Developments in Record Linkage

    PubMed Central

    Brown, Adrian P.; Ferrante, Anna M.; Randall, Sean M.; Boyd, James H.; Semmens, James B.

    2017-01-01

    In an era where the volume of structured and unstructured digital data has exploded, there has been an enormous growth in the creation of data about individuals that can be used for understanding and treating disease. Joining these records together at an individual level provides a complete picture of a patient’s interaction with health services and allows better assessment of patient outcomes and effectiveness of treatment and services. Record linkage techniques provide an efficient and cost-effective method to bring individual records together as patient profiles. These linkage procedures bring their own challenges, especially relating to the protection of privacy. The development and implementation of record linkage systems that do not require the release of personal information can reduce the risks associated with record linkage and overcome legal barriers to data sharing. Current conceptual and experimental privacy-preserving record linkage (PPRL) models show promise in addressing data integration challenges. Enhancing and operationalizing PPRL protocols can help address the dilemma faced by some custodians between using data to improve quality of life and dealing with the ethical, legal, and administrative issues associated with protecting an individual’s privacy. These methods can reduce the risk to privacy, as they do not require personally identifying information to be shared. PPRL methods can improve the delivery of record linkage services to the health and broader research community. PMID:28303240

  6. A critical ethnography of communication processes involving the management of oral chemotherapeutic agents by patients with a primary diagnosis of colorectal cancer: study protocol.

    PubMed

    Mitchell, Gary; Porter, Sam; Manias, Elizabeth

    2015-04-01

    To describe the protocol used to examine the processes of communication between health professionals, patients and informal carers during the management of oral chemotherapeutic medicines to identify factors that promote or inhibit medicine concordance. Ideally communication practices about oral medicines should incorporate shared decision-making, two-way dialogue and an equality of role between practitioner and patient. While there is evidence that healthcare professionals are adopting these concordant elements in general practice there are still some patients who have a passive role during consultations. Considering oral chemotherapeutic medications, there is a paucity of research about communication practices which is surprising given the high risk of toxicity associated with chemotherapy. A critical ethnographic design will be used, incorporating non-participant observations, individual semi-structured and focus-group interviews as several collecting methods. Observations will be carried out on the interactions between healthcare professionals (physicians, nurses and pharmacists) and patients in the outpatient departments where prescriptions are explained and supplied and on follow-up consultations where treatment regimens are monitored. Interviews will be conducted with patients and their informal carers. Focus-groups will be carried out with healthcare professionals at the conclusion of the study. These several will be analysed using thematic analysis. This research is funded by the Department for Employment and Learning in Northern Ireland (Awarded February 2012). Dissemination of these findings will contribute to the understanding of issues involved when communicating with people about oral chemotherapy. It is anticipated that findings will inform education, practice and policy. © 2014 John Wiley & Sons Ltd.

  7. Strategic Roadmap for the U.S. Geoscience Information Network

    NASA Astrophysics Data System (ADS)

    Allison, M. L.; Gallagher, K. T.; Richard, S. M.; Hutchison, V. B.

    2012-04-01

    An external advisory working group has prepared a 5-year strategic roadmap for the U.S. Geoscience Information Network (USGIN). USGIN is a partnership of the Association of American State Geologists (AASG) and the U.S. Geological Survey (USGS), who formally agreed in 2007 to develop a national geoscience information framework that is distributed, interoperable, uses open source standards and common protocols, respects and acknowledges data ownership, fosters communities of practice to grow, and develops new Web services and clients. The intention of the USGIN is to benefit the geological surveys by reducing the cost of online data publication and access provision, and to benefit society through easier (lower cost) access to public domain geoscience data. This information supports environmental planning, resource-development, hazard mitigation design, and decision-making. USGIN supposes that sharing resources for system development and maintenance, standardizing data discovery and creating better access mechanisms, causes cost of data access and maintenance to be reduced. Standardization in a wide variety of business domains provides economic benefits that range between 0.2 and 0.9% of the gross national product. We suggest that the economic benefits of standardization also apply in the informatics domain. Standardized access to rich data resources will create collaborative opportunities in science and business. Development and use of shared protocols and interchange formats for data publication will create a market for user applications, facilitating geoscience data discovery and utility for the benefit of society. The USGIN Working Group envisions further development of tools and capabilities, in addition to extending the community of practice that currently involves geoinformatics practitioners from the USGS and AASG. Promoting engagement and participation of the state geological surveys, and increasing communication between the states, USGS, and other stakeholders are prerequisites for community development. A key element of community building is personal interaction. The USGIN community can establish an identity for geological survey informatics practitioners, can assist in prioritizing technical development that is specific to the geological survey community, and can leverage development taking place in the larger community. Policies, protocols, and procedures for developing, reviewing, and distributing specifications can be adopted from established practices developed by existing organizations, such as the OGC. Documenting and promoting best practices through demonstrations, education, and outreach within the geological survey community is paramount for fostering deployment of interoperable services for data discovery and distribution. Evolution of the current Balkanized geoinformatics practice into a more cohesive and effective community has been and will continue to be an incremental process. The role of USGIN as an entity in this larger community requires organization, planning, promotion, and funding. As a member of a community activity, the role of USGIN as a leader in the community must be organic and emergent. Essential implementation activities include: • Establish a long-term governance model • Develop a business model • Explore testbed opportunities • Develop marketing strategy

  8. Coevolution of Information Sharing and Implementation of Evidence-Based Practices Among North American Tobacco Cessation Quitlines

    PubMed Central

    Saul, Jessie E.; Lemaire, Robin H.; Valente, Thomas W.; Leischow, Scott J.

    2015-01-01

    Objectives. We examined the coevolution of information sharing and implementation of evidence-based practices among US and Canadian tobacco cessation quitlines within the North American Quitline Consortium (NAQC). Methods. Web-based surveys were used to collect data from key respondents representing each of 74 participating funders of NAQC quitlines during the summer and fall of 2009, 2010, and 2011. We used stochastic actor-based models to estimate changes in information sharing and practice implementation in the NAQC network. Results. Funders were more likely to share information within their own country and with funders that contracted with the same service provider. Funders contracting with larger service providers shared less information but implemented significantly more practices. Funders connected to larger numbers of tobacco control researchers more often received information from other funders. Intensity of ties to the NAQC network administrative organization did not influence funders’ decisions to share information or implement practices. Conclusions. Our findings show the importance of monitoring the NAQC network over time. We recommend increased cross-border information sharing and sharing of information between funders contracting with different and smaller service providers. PMID:26180993

  9. Random bipartite entanglement from W and W-like states.

    PubMed

    Fortescue, Ben; Lo, Hoi-Kwong

    2007-06-29

    We describe a protocol for distilling maximally entangled bipartite states between random pairs of parties from those sharing a tripartite W state |W=(1/sqrt[3])(|100+|010+|001)(ABC), and show that the total distillation rate E(t)(infinity) [the total number of Einstein-Podolsky-Rosen (EPR) pairs distilled per W, irrespective of who shares them] may be done at a higher rate than EPR distillation between specified pairs of parties. Specifically, the optimal rate for distillation to specified parties has been previously shown to be 0.92 EPR pairs per W, while our protocol can asymptotically distill 1 EPR pair per W between random pairs of parties, which we conjecture to be optimal. We thus demonstrate a tradeoff between overall distillation rate and final distribution of EPR pairs. We further show that there exist states with fixed lower-bounded E(t)(infinity), but arbitrarily small distillable entanglement for specified parties.

  10. Quantum-noise randomized data encryption for wavelength-division-multiplexed fiber-optic networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Corndorf, Eric; Liang Chuang; Kanter, Gregory S.

    2005-06-15

    We demonstrate high-rate randomized data-encryption through optical fibers using the inherent quantum-measurement noise of coherent states of light. Specifically, we demonstrate 650 Mbit/s data encryption through a 10 Gbit/s data-bearing, in-line amplified 200-km-long line. In our protocol, legitimate users (who share a short secret key) communicate using an M-ry signal set while an attacker (who does not share the secret key) is forced to contend with the fundamental and irreducible quantum-measurement noise of coherent states. Implementations of our protocol using both polarization-encoded signal sets as well as polarization-insensitive phase-keyed signal sets are experimentally and theoretically evaluated. Different from the performancemore » criteria for the cryptographic objective of key generation (quantum key-generation), one possible set of performance criteria for the cryptographic objective of data encryption is established and carefully considered.« less

  11. SEAODV: A Security Enhanced AODV Routing Protocol for Wireless Mesh Networks

    NASA Astrophysics Data System (ADS)

    Li, Celia; Wang, Zhuang; Yang, Cungang

    In this paper, we propose a Security Enhanced AODV routing protocol (SEAODV) for wireless mesh networks (WMN). SEAODV employs Blom's key pre-distribution scheme to compute the pairwise transient key (PTK) through the flooding of enhanced HELLO message and subsequently uses the established PTK to distribute the group transient key (GTK). PTK and GTK authenticate unicast and broadcast routing messages respectively. In WMN, a unique PTK is shared by each pair of nodes, while GTK is shared secretly between the node and all its one-hop neighbours. A message authentication code (MAC) is attached as the extension to the original AODV routing message to guarantee the message's authenticity and integrity in a hop-by-hop fashion. Security analysis and performance evaluation show that SEAODV is more effective in preventing identified routing attacks and outperforms ARAN and SAODV in terms of computation cost and route acquisition latency.

  12. Integrating sequence and structural biology with DAS

    PubMed Central

    Prlić, Andreas; Down, Thomas A; Kulesha, Eugene; Finn, Robert D; Kähäri, Andreas; Hubbard, Tim JP

    2007-01-01

    Background The Distributed Annotation System (DAS) is a network protocol for exchanging biological data. It is frequently used to share annotations of genomes and protein sequence. Results Here we present several extensions to the current DAS 1.5 protocol. These provide new commands to share alignments, three dimensional molecular structure data, add the possibility for registration and discovery of DAS servers, and provide a convention how to provide different types of data plots. We present examples of web sites and applications that use the new extensions. We operate a public registry of DAS sources, which now includes entries for more than 250 distinct sources. Conclusion Our DAS extensions are essential for the management of the growing number of services and exchange of diverse biological data sets. In addition the extensions allow new types of applications to be developed and scientific questions to be addressed. The registry of DAS sources is available at PMID:17850653

  13. Phase-encoded measurement device independent quantum key distribution without a shared reference frame

    NASA Astrophysics Data System (ADS)

    Zhuo-Dan, Zhu; Shang-Hong, Zhao; Chen, Dong; Ying, Sun

    2018-07-01

    In this paper, a phase-encoded measurement device independent quantum key distribution (MDI-QKD) protocol without a shared reference frame is presented, which can generate secure keys between two parties while the quantum channel or interferometer introduces an unknown and slowly time-varying phase. The corresponding secret key rate and single photons bit error rate is analysed, respectively, with single photons source (SPS) and weak coherent source (WCS), taking finite-key analysis into account. The numerical simulations show that the modified phase-encoded MDI-QKD protocol has apparent superiority both in maximal secure transmission distance and key generation rate while possessing the improved robustness and practical security in the high-speed case. Moreover, the rejection of the frame-calibrating part will intrinsically reduce the consumption of resources as well as the potential security flaws of practical MDI-QKD systems.

  14. Website Sharing in Online Health Communities: A Descriptive Analysis.

    PubMed

    Nath, Chinmoy; Huh, Jina; Adupa, Abhishek Kalyan; Jonnalagadda, Siddhartha R

    2016-01-13

    An increasing number of people visit online health communities to seek health information. In these communities, people share experiences and information with others, often complemented with links to different websites. Understanding how people share websites can help us understand patients' needs in online health communities and improve how peer patients share health information online. Our goal was to understand (1) what kinds of websites are shared, (2) information quality of the shared websites, (3) who shares websites, (4) community differences in website-sharing behavior, and (5) the contexts in which patients share websites. We aimed to find practical applications and implications of website-sharing practices in online health communities. We used regular expressions to extract URLs from 10 WebMD online health communities. We then categorized the URLs based on their top-level domains. We counted the number of trust codes (eg, accredited agencies' formal evaluation and PubMed authors' institutions) for each website to assess information quality. We used descriptive statistics to determine website-sharing activities. To understand the context of the URL being discussed, we conducted a simple random selection of 5 threads that contained at least one post with URLs from each community. Gathering all other posts in these threads resulted in 387 posts for open coding analysis with the goal of understanding motivations and situations in which website sharing occurred. We extracted a total of 25,448 websites. The majority of the shared websites were .com (59.16%, 15,056/25,448) and WebMD internal (23.2%, 5905/25,448) websites; the least shared websites were social media websites (0.15%, 39/25,448). High-posting community members and moderators posted more websites with trust codes than low-posting community members did. The heart disease community had the highest percentage of websites containing trust codes compared to other communities. Members used websites to disseminate information, supportive evidence, resources for social support, and other ways to communicate. Online health communities can be used as important health care information resources for patients and caregivers. Our findings inform patients' health information-sharing activities. This information assists health care providers, informaticians, and online health information entrepreneurs and developers in helping patients and caregivers make informed choices.

  15. System Dynamics Modeling for Supply Chain Information Sharing

    NASA Astrophysics Data System (ADS)

    Feng, Yang

    In this paper, we try to use the method of system dynamics to model supply chain information sharing. Firstly, we determine the model boundaries, establish system dynamics model of supply chain before information sharing, analyze the model's simulation results under different changed parameters and suggest improvement proposal. Then, we establish system dynamics model of supply chain information sharing and make comparison and analysis on the two model's simulation results, to show the importance of information sharing in supply chain management. We wish that all these simulations would provide scientific supports for enterprise decision-making.

  16. Pregnant Women Sharing Pregnancy-Related Information on Facebook: Web-Based Survey Study.

    PubMed

    Harpel, Tammy

    2018-03-22

    Research indicates expectant and new mothers use the Internet, specifically social media, to gain information and support during the transition to parenthood. Although parents regularly share information about and photos of their child or children on Facebook, researchers have neither explored the use of Facebook to share pregnancy-related information nor investigated factors that influence such sharing. The aim of this study was to address a gap in the literature by exploring the use of Facebook by pregnant women. Specifically, the study examined the use of Facebook to share pregnancy-related information, as well as any association between prenatal attachment and the aforementioned aspects of sharing pregnancy-related information on Facebook. Pregnant women who were at least 18 years of age were recruited for participation in the study through posts and paid advertisements on Facebook and posts to professional organization listservs. Individuals interested in participating were directed to a secure Web-based survey system where they completed the consent form and the survey that focused on their current pregnancy. Participants completed the Maternal Antenatal Attachment Scale and answered questions that assessed how often they shared pregnancy-related information on Facebook, who they shared it with, why they shared it, and what they shared. A total of 117 pregnant women completed the survey. Descriptive statistics indicated that the pregnancy announcement was most commonly shared (75/108, 69.4%), with most women sharing pregnancy-related information on Facebook less than monthly (52/117, 44.4%) with only family and friends (90/116, 77.6% and 91/116, 78.4%, respectively) and for the purpose of involving others or sharing the experience (62/107, 57.9%). Correlation and regression analyses showed that prenatal attachment, in general, was positively and significantly related to all aspects of sharing pregnancy-related information at the P<.05 level, with the exception of sharing because of expectations. Quality of attachment, which involves the positive feelings the woman has about her unborn child, was significantly associated with sharing to involve others or share the pregnancy (t 8,93 =2.654 , P=.009). In contrast, after controlling for other variables, the strength or preoccupation component of prenatal attachment was significantly associated with frequency of sharing (t 8,100 =2.554 , P=.01), number to types of information shared (t 8,97 =2.605 , P=.01), number of groups with whom shared (t 8,99 =3.467, P=.001), and sharing to get advice (χ 2 8 =5.339 , P=.02). Pregnant women in this study used Facebook for a variety of reasons, demonstrating the use of the social media platform during pregnancy for supportive and informational purposes. Overall, the results of this study are likely to be useful to professionals who are seeking alternative methods for providing intervention, information, and support to pregnant women via social media in our technology-driven society. ©Tammy Harpel. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 22.03.2018.

  17. Pregnant Women Sharing Pregnancy-Related Information on Facebook: Web-Based Survey Study

    PubMed Central

    2018-01-01

    Background Research indicates expectant and new mothers use the Internet, specifically social media, to gain information and support during the transition to parenthood. Although parents regularly share information about and photos of their child or children on Facebook, researchers have neither explored the use of Facebook to share pregnancy-related information nor investigated factors that influence such sharing. Objective The aim of this study was to address a gap in the literature by exploring the use of Facebook by pregnant women. Specifically, the study examined the use of Facebook to share pregnancy-related information, as well as any association between prenatal attachment and the aforementioned aspects of sharing pregnancy-related information on Facebook. Methods Pregnant women who were at least 18 years of age were recruited for participation in the study through posts and paid advertisements on Facebook and posts to professional organization listservs. Individuals interested in participating were directed to a secure Web-based survey system where they completed the consent form and the survey that focused on their current pregnancy. Participants completed the Maternal Antenatal Attachment Scale and answered questions that assessed how often they shared pregnancy-related information on Facebook, who they shared it with, why they shared it, and what they shared. Results A total of 117 pregnant women completed the survey. Descriptive statistics indicated that the pregnancy announcement was most commonly shared (75/108, 69.4%), with most women sharing pregnancy-related information on Facebook less than monthly (52/117, 44.4%) with only family and friends (90/116, 77.6% and 91/116, 78.4%, respectively) and for the purpose of involving others or sharing the experience (62/107, 57.9%). Correlation and regression analyses showed that prenatal attachment, in general, was positively and significantly related to all aspects of sharing pregnancy-related information at the P<.05 level, with the exception of sharing because of expectations. Quality of attachment, which involves the positive feelings the woman has about her unborn child, was significantly associated with sharing to involve others or share the pregnancy (t8,93=2.654 , P=.009). In contrast, after controlling for other variables, the strength or preoccupation component of prenatal attachment was significantly associated with frequency of sharing (t8,100=2.554 , P=.01), number to types of information shared (t8,97=2.605 , P=.01), number of groups with whom shared (t8,99=3.467, P=.001), and sharing to get advice (χ28=5.339 , P=.02). Conclusions Pregnant women in this study used Facebook for a variety of reasons, demonstrating the use of the social media platform during pregnancy for supportive and informational purposes. Overall, the results of this study are likely to be useful to professionals who are seeking alternative methods for providing intervention, information, and support to pregnant women via social media in our technology-driven society. PMID:29567636

  18. Sharing Water-related Information to Tackle Changes in the Hydrosphere - for Operational Needs (SWITCH-ON)

    NASA Astrophysics Data System (ADS)

    Arheimer, Berit

    2014-05-01

    A recently started EU project (FP7 project No 603587) called SWITCH-ON will establish new infrastructure for water research in Europe. The overall goal of the project is to make use of open data, and add value to society by repurposing and refining data from various sources. SWITCH-ON will establish new forms of water research and facilitate the development of new products and services based on principles of sharing and community building. The basic for this work is a virtual water-science laboratory, which consists of open data, dedicated software tools and a set of protocols, hosted at the "SWITCH-ON water information" portal at http://water-switch-on.eu/. The laboratory will seamlessly integrate the open data with harmonised modelling tools and facilities the performance of virtual experiments of comparative science. Comparative science is a new form of research, which will advance science by contrasting water related processes in different environments and help understand complex processes in a more holistic way than individual studies The SWITCH-ON objectives are to use open data for implementing: 1) an innovative spatial information platform with open data tailored for direct water assessments, 2) an entirely new form of collaborative research for water-related sciences, 3) fourteen new operational products and services dedicated to appointed end-users, 4) new business and knowledge to inform individual and collective decisions in line with the Europe's smart growth and environmental objectives. The SWITCH-ON project will be one trigger in a contemporary global movement to better address environmental and societal challenges through openness and collaboration. The poster will present the project visions and achievements so far, and invite more research groups to use the virtual water-science laboratory.

  19. Closed-Loop Lifecycle Management of Service and Product in the Internet of Things: Semantic Framework for Knowledge Integration.

    PubMed

    Yoo, Min-Jung; Grozel, Clément; Kiritsis, Dimitris

    2016-07-08

    This paper describes our conceptual framework of closed-loop lifecycle information sharing for product-service in the Internet of Things (IoT). The framework is based on the ontology model of product-service and a type of IoT message standard, Open Messaging Interface (O-MI) and Open Data Format (O-DF), which ensures data communication. (1) BACKGROUND: Based on an existing product lifecycle management (PLM) methodology, we enhanced the ontology model for the purpose of integrating efficiently the product-service ontology model that was newly developed; (2) METHODS: The IoT message transfer layer is vertically integrated into a semantic knowledge framework inside which a Semantic Info-Node Agent (SINA) uses the message format as a common protocol of product-service lifecycle data transfer; (3) RESULTS: The product-service ontology model facilitates information retrieval and knowledge extraction during the product lifecycle, while making more information available for the sake of service business creation. The vertical integration of IoT message transfer, encompassing all semantic layers, helps achieve a more flexible and modular approach to knowledge sharing in an IoT environment; (4) Contribution: A semantic data annotation applied to IoT can contribute to enhancing collected data types, which entails a richer knowledge extraction. The ontology-based PLM model enables as well the horizontal integration of heterogeneous PLM data while breaking traditional vertical information silos; (5) CONCLUSION: The framework was applied to a fictive case study with an electric car service for the purpose of demonstration. For the purpose of demonstrating the feasibility of the approach, the semantic model is implemented in Sesame APIs, which play the role of an Internet-connected Resource Description Framework (RDF) database.

  20. Closed-Loop Lifecycle Management of Service and Product in the Internet of Things: Semantic Framework for Knowledge Integration

    PubMed Central

    Yoo, Min-Jung; Grozel, Clément; Kiritsis, Dimitris

    2016-01-01

    This paper describes our conceptual framework of closed-loop lifecycle information sharing for product-service in the Internet of Things (IoT). The framework is based on the ontology model of product-service and a type of IoT message standard, Open Messaging Interface (O-MI) and Open Data Format (O-DF), which ensures data communication. (1) Background: Based on an existing product lifecycle management (PLM) methodology, we enhanced the ontology model for the purpose of integrating efficiently the product-service ontology model that was newly developed; (2) Methods: The IoT message transfer layer is vertically integrated into a semantic knowledge framework inside which a Semantic Info-Node Agent (SINA) uses the message format as a common protocol of product-service lifecycle data transfer; (3) Results: The product-service ontology model facilitates information retrieval and knowledge extraction during the product lifecycle, while making more information available for the sake of service business creation. The vertical integration of IoT message transfer, encompassing all semantic layers, helps achieve a more flexible and modular approach to knowledge sharing in an IoT environment; (4) Contribution: A semantic data annotation applied to IoT can contribute to enhancing collected data types, which entails a richer knowledge extraction. The ontology-based PLM model enables as well the horizontal integration of heterogeneous PLM data while breaking traditional vertical information silos; (5) Conclusion: The framework was applied to a fictive case study with an electric car service for the purpose of demonstration. For the purpose of demonstrating the feasibility of the approach, the semantic model is implemented in Sesame APIs, which play the role of an Internet-connected Resource Description Framework (RDF) database. PMID:27399717

  1. Assumptions, Trust, and Names in Computer Security Protocols

    DTIC Science & Technology

    2011-06-01

    sharing her banking credentials with a criminal, which is clearly bad . But PKI proto- cols like this one can be used in other, less risky ways. Suppose...Figure 4.5. This is similar to a failure of PKI-based protocols in which the authority signs a bad certificate. But the interesting thing is how the... Zoo Figure 4.6: Using AdultVerify. The run is as follows: 1. As the first step in Diffie-Hellman Key Exchange, Alice picks and sends the

  2. Entangled State Quantum Cryptography: Eavesdropping on the Ekert Protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Naik, D. S.; Peterson, C. G.; White, A. G.

    2000-05-15

    Using polarization-entangled photons from spontaneous parametric down-conversion, we have implemented Ekert's quantum cryptography protocol. The near-perfect correlations of the photons allow the sharing of a secret key between two parties. The presence of an eavesdropper is continually checked by measuring Bell's inequalities. We investigated several possible eavesdropper strategies, including pseudo-quantum-nondemolition measurements. In all cases, the eavesdropper's presence was readily apparent. We discuss a procedure to increase her detectability. (c) 2000 The American Physical Society.

  3. Semi-Structured Interview Protocol for Constructing Logic Models

    ERIC Educational Resources Information Center

    Gugiu, P. Cristian; Rodriguez-Campos, Liliana

    2007-01-01

    This paper details a semi-structured interview protocol that evaluators can use to develop a logic model of a program's services and outcomes. The protocol presents a series of questions, which evaluators can ask of specific program informants, that are designed to: (1) identify key informants basic background and contextual information, (2)…

  4. Can I help you? Information sharing in online discussion forums by people living with a long-term condition.

    PubMed

    Bond, Carol S; Ahmed, Osman Hassan

    2016-11-10

    Peer-to-peer health care is increasing, especially amongst people living with a long-term condition. How information is shared is, however, sometimes of concern to health care professionals. This study explored what information is being shared on health-related discussion boards and identified the approaches people used to signpost their peers to information. This study was conducted using a qualitative content analysis methodology to explore information shared on discussion boards for people living with diabetes. Whilst there is debate about the best ethical lens to view research carried out on data posted on online discussion boards, the researchers chose to adopt the stance of treating this type of information as "personal health text", a specific type of research data in its own right. Qualitative content analysis and basic descriptive statistics were used to analyse the selected posts. Two major themes were identified: 'Information Sharing from Experience' and 'Signposting Other Sources of Information'.Conclusions People were actively engaging in information sharing in online discussion forums, mainly through direct signposting. The quality of the information shared was important, with reasons for recommendations being given. Much of the information sharing was based on experience, which also brought in information from external sources such as health care professionals and other acknowledged experts in the field.With the rise in peer-to-peer support networks, the nature of health knowledge and expertise needs to be redefined. People online are combining external information with their own personal experiences and sharing that for others to take and develop as they wish.

  5. SynapticDB, effective web-based management and sharing of data from serial section electron microscopy.

    PubMed

    Shi, Bitao; Bourne, Jennifer; Harris, Kristen M

    2011-03-01

    Serial section electron microscopy (ssEM) is rapidly expanding as a primary tool to investigate synaptic circuitry and plasticity. The ultrastructural images collected through ssEM are content rich and their comprehensive analysis is beyond the capacity of an individual laboratory. Hence, sharing ultrastructural data is becoming crucial to visualize, analyze, and discover the structural basis of synaptic circuitry and function in the brain. We devised a web-based management system called SynapticDB (http://synapses.clm.utexas.edu/synapticdb/) that catalogues, extracts, analyzes, and shares experimental data from ssEM. The management strategy involves a library with check-in, checkout and experimental tracking mechanisms. We developed a series of spreadsheet templates (MS Excel, Open Office spreadsheet, etc) that guide users in methods of data collection, structural identification, and quantitative analysis through ssEM. SynapticDB provides flexible access to complete templates, or to individual columns with instructional headers that can be selected to create user-defined templates. New templates can also be generated and uploaded. Research progress is tracked via experimental note management and dynamic PDF forms that allow new investigators to follow standard protocols and experienced researchers to expand the range of data collected and shared. The combined use of templates and tracking notes ensures that the supporting experimental information is populated into the database and associated with the appropriate ssEM images and analyses. We anticipate that SynapticDB will serve future meta-analyses towards new discoveries about the composition and circuitry of neurons and glia, and new understanding about structural plasticity during development, behavior, learning, memory, and neuropathology.

  6. Analysis and Improvement of Large Payload Bidirectional Quantum Secure Direct Communication Without Information Leakage

    NASA Astrophysics Data System (ADS)

    Liu, Zhi-Hao; Chen, Han-Wu

    2018-02-01

    As we know, the information leakage problem should be avoided in a secure quantum communication protocol. Unfortunately, it is found that this problem does exist in the large payload bidirectional quantum secure direct communication (BQSDC) protocol (Ye Int. J. Quantum. Inf. 11(5), 1350051 2013) which is based on entanglement swapping between any two Greenberger-Horne-Zeilinger (GHZ) states. To be specific, one half of the information interchanged in this protocol is leaked out unconsciously without any active attack from an eavesdropper. Afterward, this BQSDC protocol is revised to the one without information leakage. It is shown that the improved BQSDC protocol is secure against the general individual attack and has some obvious features compared with the original one.

  7. Technology-mediated information sharing between patients and clinicians in primary care encounters.

    PubMed

    Asan, Onur; Montague, Enid

    The aim of this study was to identify and describe the use of electronic health records for information sharing between patients and clinicians in primary care encounters. This topic is particularly important as computers and other technologies are increasingly implemented in multi-user health care settings where interactions and communication between patients and clinicians are integral to interpersonal and organizational outcomes. An ethnographic approach was used to classify the encounters into distinct technology-use patterns based on clinicians` interactions with the technology and patients. Each technology-use pattern was quantitatively analysed to assist with comparison. Quantitative analysis was based on duration of patient and clinician gaze at EHR. Physicians employed three different styles to share information using EHRs: Active information-sharing, in which a clinician turns the monitor towards the patient and uses the computer to actively share information with the patient;Passive information-sharing, when a clinician does not move the monitor, but the patient might see the monitor by leaning in if they choose; andTechnology withdrawal, when a clinician does not share the monitor with the patient. A variety of technology-mediated information-sharing styles may be effective in providing patient-centred care. New EHR designs may be needed to facilitate information sharing between patients and clinicians.

  8. Is Cancer Information Exchanged on Social Media Scientifically Accurate?

    PubMed

    Gage-Bouchard, Elizabeth A; LaValley, Susan; Warunek, Molli; Beaupin, Lynda Kwon; Mollica, Michelle

    2017-07-19

    Cancer patients and their caregivers are increasingly using social media as a platform to share cancer experiences, connect with support, and exchange cancer-related information. Yet, little is known about the nature and scientific accuracy of cancer-related information exchanged on social media. We conducted a content analysis of 12 months of data from 18 publically available Facebook Pages hosted by parents of children with acute lymphoblastic leukemia (N = 15,852 posts) and extracted all exchanges of medically-oriented cancer information. We systematically coded for themes in the nature of cancer-related information exchanged on personal Facebook Pages and two oncology experts independently evaluated the scientific accuracy of each post. Of the 15,852 total posts, 171 posts contained medically-oriented cancer information. The most frequent type of cancer information exchanged was information related to treatment protocols and health services use (35%) followed by information related to side effects and late effects (26%), medication (16%), medical caregiving strategies (13%), alternative and complementary therapies (8%), and other (2%). Overall, 67% of all cancer information exchanged was deemed medically/scientifically accurate, 19% was not medically/scientifically accurate, and 14% described unproven treatment modalities. These findings highlight the potential utility of social media as a cancer-related resource, but also indicate that providers should focus on recommending reliable, evidence-based sources to patients and caregivers.

  9. Relevance of eHealth standards for big data interoperability in radiology and beyond.

    PubMed

    Marcheschi, Paolo

    2017-06-01

    The aim of this paper is to report on the implementation of radiology and related information technology standards to feed big data repositories and so to be able to create a solid substrate on which to operate with analysis software. Digital Imaging and Communications in Medicine (DICOM) and Health Level 7 (HL7) are the major standards for radiology and medical information technology. They define formats and protocols to transmit medical images, signals, and patient data inside and outside hospital facilities. These standards can be implemented but big data expectations are stimulating a new approach, simplifying data collection and interoperability, seeking reduction of time to full implementation inside health organizations. Virtual Medical Record, DICOM Structured Reporting and HL7 Fast Healthcare Interoperability Resources (FHIR) are changing the way medical data are shared among organization and they will be the keys to big data interoperability. Until we do not find simple and comprehensive methods to store and disseminate detailed information on the patient's health we will not be able to get optimum results from the analysis of those data.

  10. Department of Energy's Virtual Lab Infrastructure for Integrated Earth System Science Data

    NASA Astrophysics Data System (ADS)

    Williams, D. N.; Palanisamy, G.; Shipman, G.; Boden, T.; Voyles, J.

    2014-12-01

    The U.S. Department of Energy (DOE) Office of Biological and Environmental Research (BER) Climate and Environmental Sciences Division (CESD) produces a diversity of data, information, software, and model codes across its research and informatics programs and facilities. This information includes raw and reduced observational and instrumentation data, model codes, model-generated results, and integrated data products. Currently, most of this data and information are prepared and shared for program specific activities, corresponding to CESD organization research. A major challenge facing BER CESD is how best to inventory, integrate, and deliver these vast and diverse resources for the purpose of accelerating Earth system science research. This talk provides a concept for a CESD Integrated Data Ecosystem and an initial roadmap for its implementation to address this integration challenge in the "Big Data" domain. Towards this end, a new BER Virtual Laboratory Infrastructure will be presented, which will include services and software connecting the heterogeneous CESD data holdings, and constructed with open source software based on industry standards, protocols, and state-of-the-art technology.

  11. Anonymization of Longitudinal Electronic Medical Records

    PubMed Central

    Tamersoy, Acar; Loukides, Grigorios; Nergiz, Mehmet Ercan; Saygin, Yucel; Malin, Bradley

    2013-01-01

    Electronic medical record (EMR) systems have enabled healthcare providers to collect detailed patient information from the primary care domain. At the same time, longitudinal data from EMRs are increasingly combined with biorepositories to generate personalized clinical decision support protocols. Emerging policies encourage investigators to disseminate such data in a deidentified form for reuse and collaboration, but organizations are hesitant to do so because they fear such actions will jeopardize patient privacy. In particular, there are concerns that residual demographic and clinical features could be exploited for reidentification purposes. Various approaches have been developed to anonymize clinical data, but they neglect temporal information and are, thus, insufficient for emerging biomedical research paradigms. This paper proposes a novel approach to share patient-specific longitudinal data that offers robust privacy guarantees, while preserving data utility for many biomedical investigations. Our approach aggregates temporal and diagnostic information using heuristics inspired from sequence alignment and clustering methods. We demonstrate that the proposed approach can generate anonymized data that permit effective biomedical analysis using several patient cohorts derived from the EMR system of the Vanderbilt University Medical Center. PMID:22287248

  12. Do we need 3D tube current modulation information for accurate organ dosimetry in chest CT? Protocols dose comparisons.

    PubMed

    Lopez-Rendon, Xochitl; Zhang, Guozhi; Coudyzer, Walter; Develter, Wim; Bosmans, Hilde; Zanca, Federica

    2017-11-01

    To compare the lung and breast dose associated with three chest protocols: standard, organ-based tube current modulation (OBTCM) and fast-speed scanning; and to estimate the error associated with organ dose when modelling the longitudinal (z-) TCM versus the 3D-TCM in Monte Carlo simulations (MC) for these three protocols. Five adult and three paediatric cadavers with different BMI were scanned. The CTDI vol of the OBTCM and the fast-speed protocols were matched to the patient-specific CTDI vol of the standard protocol. Lung and breast doses were estimated using MC with both z- and 3D-TCM simulated and compared between protocols. The fast-speed scanning protocol delivered the highest doses. A slight reduction for breast dose (up to 5.1%) was observed for two of the three female cadavers with the OBTCM in comparison to the standard. For both adult and paediatric, the implementation of the z-TCM data only for organ dose estimation resulted in 10.0% accuracy for the standard and fast-speed protocols, while relative dose differences were up to 15.3% for the OBTCM protocol. At identical CTDI vol values, the standard protocol delivered the lowest overall doses. Only for the OBTCM protocol is the 3D-TCM needed if an accurate (<10.0%) organ dosimetry is desired. • The z-TCM information is sufficient for accurate dosimetry for standard protocols. • The z-TCM information is sufficient for accurate dosimetry for fast-speed scanning protocols. • For organ-based TCM schemes, the 3D-TCM information is necessary for accurate dosimetry. • At identical CTDI vol , the fast-speed scanning protocol delivered the highest doses. • Lung dose was higher in XCare than standard protocol at identical CTDI vol .

  13. An electronic specimen collection protocol schema (eSCPS). Document architecture for specimen management and the exchange of specimen collection protocols between biobanking information systems.

    PubMed

    Eminaga, O; Semjonow, A; Oezguer, E; Herden, J; Akbarov, I; Tok, A; Engelmann, U; Wille, S

    2014-01-01

    The integrity of collection protocols in biobanking is essential for a high-quality sample preparation process. However, there is not currently a well-defined universal method for integrating collection protocols in the biobanking information system (BIMS). Therefore, an electronic schema of the collection protocol that is based on Extensible Markup Language (XML) is required to maintain the integrity and enable the exchange of collection protocols. The development and implementation of an electronic specimen collection protocol schema (eSCPS) was performed at two institutions (Muenster and Cologne) in three stages. First, we analyzed the infrastructure that was already established at both the biorepository and the hospital information systems of these institutions and determined the requirements for the sufficient preparation of specimens and documentation. Second, we designed an eSCPS according to these requirements. Finally, a prospective study was conducted to implement and evaluate the novel schema in the current BIMS. We designed an eSCPS that provides all of the relevant information about collection protocols. Ten electronic collection protocols were generated using the supplementary Protocol Editor tool, and these protocols were successfully implemented in the existing BIMS. Moreover, an electronic list of collection protocols for the current studies being performed at each institution was included, new collection protocols were added, and the existing protocols were redesigned to be modifiable. The documentation time was significantly reduced after implementing the eSCPS (5 ± 2 min vs. 7 ± 3 min; p = 0.0002). The eSCPS improves the integrity and facilitates the exchange of specimen collection protocols in the existing open-source BIMS.

  14. Count Your Calories and Share Them: Health Benefits of Sharing mHealth Information on Social Networking Sites.

    PubMed

    Oeldorf-Hirsch, Anne; High, Andrew C; Christensen, John L

    2018-04-23

    This study investigates the relationship between sharing tracked mobile health (mHealth) information online, supportive communication, feedback, and health behavior. Based on the Integrated Theory of mHealth, our model asserts that sharing tracked health information on social networking sites benefits users' perceptions of their health because of the supportive communication they gain from members of their online social networks and that the amount of feedback people receive moderates these associations. Users of mHealth apps (N = 511) completed an online survey, and results revealed that both sharing tracked health information and receiving feedback from an online social network were positively associated with supportive communication. Network support both corresponded with improved health behavior and mediated the association between sharing health information and users' health behavior. As users received greater amounts of feedback from their online social networks, however, the association between sharing tracked health information and health behavior decreased. Theoretical implications for sharing tracked health information and practical implications for using mHealth apps are discussed.

  15. Revisiting control establishments for emerging energy hubs

    NASA Astrophysics Data System (ADS)

    Nasirian, Vahidreza

    Emerging small-scale energy systems, i.e., microgrids and smartgrids, rely on centralized controllers for voltage regulation, load sharing, and economic dispatch. However, the central controller is a single-point-of-failure in such a design as either the controller or attached communication links failure can render the entire system inoperable. This work seeks for alternative distributed control structures to improve system reliability and help to the scalability of the system. A cooperative distributed controller is proposed that uses a noise-resilient voltage estimator and handles global voltage regulation and load sharing across a DC microgrid. Distributed adaptive droop control is also investigated as an alternative solution. A droop-free distributed control is offered to handle voltage/frequency regulation and load sharing in AC systems. This solution does not require frequency measurement and, thus, features a fast frequency regulation. Distributed economic dispatch is also studied, where a distributed protocol is designed that controls generation units to merge their incremental costs into a consensus and, thus, push the entire system to generate with the minimum cost. Experimental verifications and Hardware-in-the-Loop (HIL) simulations are used to study efficacy of the proposed control protocols.

  16. Contextual information management: An example of independent-checking in the review of laboratory-based bloodstain pattern analysis.

    PubMed

    Osborne, Nikola K P; Taylor, Michael C

    2018-05-01

    This article describes a New Zealand forensic agency's contextual information management protocol for bloodstain pattern evidence examined in the laboratory. In an effort to create a protocol that would have minimal impact on current work-flow, while still effectively removing task-irrelevant contextual information, the protocol was designed following an in-depth consultation with management and forensic staff. The resulting design was for a protocol of independent-checking (i.e. blind peer-review) where the checker's interpretation of the evidence is conducted in the absence of case information and the original examiner's notes or interpretation(s). At the conclusion of a ten-case trial period, there was widespread agreement that the protocol had minimal impact on the number of people required, the cost, or the time to complete an item examination. The agency is now looking to adopt the protocol into standard operating procedures and in some cases the protocol has been extended to cover other laboratory-based examinations (e.g. fabric damage, shoeprint examination, and physical fits). The protocol developed during this trial provides a useful example for agencies seeking to adopt contextual information management into their workflow. Copyright © 2018 The Chartered Society of Forensic Sciences. Published by Elsevier B.V. All rights reserved.

  17. A Preliminary Investigation into the Information Sharing Behavior of Social Media Users after a Natural Disaster

    ERIC Educational Resources Information Center

    Maruyama, Yukiko

    2016-01-01

    The paper provides the results of a preliminary investigation into the information sharing behavior of social media users after a natural disaster. The results indicate that users shared information that they thought victims would find useful. On the other hand, they reported that they usually do not or never share information considered useful to…

  18. Website Sharing in Online Health Communities: A Descriptive Analysis

    PubMed Central

    Nath, Chinmoy; Huh, Jina; Adupa, Abhishek Kalyan

    2016-01-01

    Background An increasing number of people visit online health communities to seek health information. In these communities, people share experiences and information with others, often complemented with links to different websites. Understanding how people share websites can help us understand patients’ needs in online health communities and improve how peer patients share health information online. Objective Our goal was to understand (1) what kinds of websites are shared, (2) information quality of the shared websites, (3) who shares websites, (4) community differences in website-sharing behavior, and (5) the contexts in which patients share websites. We aimed to find practical applications and implications of website-sharing practices in online health communities. Methods We used regular expressions to extract URLs from 10 WebMD online health communities. We then categorized the URLs based on their top-level domains. We counted the number of trust codes (eg, accredited agencies’ formal evaluation and PubMed authors’ institutions) for each website to assess information quality. We used descriptive statistics to determine website-sharing activities. To understand the context of the URL being discussed, we conducted a simple random selection of 5 threads that contained at least one post with URLs from each community. Gathering all other posts in these threads resulted in 387 posts for open coding analysis with the goal of understanding motivations and situations in which website sharing occurred. Results We extracted a total of 25,448 websites. The majority of the shared websites were .com (59.16%, 15,056/25,448) and WebMD internal (23.2%, 5905/25,448) websites; the least shared websites were social media websites (0.15%, 39/25,448). High-posting community members and moderators posted more websites with trust codes than low-posting community members did. The heart disease community had the highest percentage of websites containing trust codes compared to other communities. Members used websites to disseminate information, supportive evidence, resources for social support, and other ways to communicate. Conclusions Online health communities can be used as important health care information resources for patients and caregivers. Our findings inform patients’ health information–sharing activities. This information assists health care providers, informaticians, and online health information entrepreneurs and developers in helping patients and caregivers make informed choices. PMID:26764193

  19. Advancing Proteomics Research through Collaboration | Office of Cancer Clinical Proteomics Research

    Cancer.gov

    The National Cancer Institute (NCI), through the Office of Cancer Clinical Proteomics Research (OCCPR), has signed two Memorandums of Understanding (MOUs) in the areas of sharing proteomics reagents and protocols and also in regulatory science.

  20. Multisites Coordination in Shared Multicast Trees

    DTIC Science & Technology

    1999-01-01

    conferencing, distributed interactive simulations, and collaborative systems. We de- scribe a novel protocol to coordinate multipoint groupwork in the IP...multicast framework. The pro- tocol supports Internet-wide coordination for large and highly-interactive groupwork , relying on trans- mission of

  1. E-Learning

    ERIC Educational Resources Information Center

    Buzzi, Marina, Ed.

    2010-01-01

    E-Learning is a vast and complex research topic that poses many challenges in every aspect: educational and pedagogical strategies and techniques and the tools for achieving them; usability, accessibility and user interface design; knowledge sharing and collaborative environments; technologies, architectures, and protocols; user activity…

  2. Advanced teleprocessing systems

    NASA Astrophysics Data System (ADS)

    Kleinrock, L.; Gerla, M.

    1982-09-01

    This Annual Technical Report covers research covering the period from October 1, 1981 to September 30, 1982. This contract has three primary designated research areas: packet radio systems, resource sharing and allocation, and distributed processing and control. This report contains abstracts of publications which summarize research results in these areas followed by the main body of the report which is devoted to a study of channel access protocols that are executed by the nodes of a network to schedule their transmissions on multi-access broadcast channel. In particular the main body consists of a Ph.D. dissertation, Channel Access Protocols for Multi-Hop Broadcast Packet Radio Networks. This work discusses some new channel access protocols useful for mobile radio networks. Included is an analysis of slotted ALOHA and some tight bounds on the performance of all possible protocols in a mobile environment.

  3. Strategies for research engagement of clinicians in allied health (STRETCH): a mixed methods research protocol.

    PubMed

    Mickan, Sharon; Wenke, Rachel; Weir, Kelly; Bialocerkowski, Andrea; Noble, Christy

    2017-09-11

    Allied health professionals (AHPs) report positive attitudes to using research evidence in clinical practice, yet often lack time, confidence and skills to use, participate in and conduct research. A range of multifaceted strategies including education, mentoring and guidance have been implemented to increase AHPs' use of and participation in research. Emerging evidence suggests that knowledge brokering activities have the potential to support research engagement, but it is not clear which knowledge brokering strategies are most effective and in what contexts they work best to support and maintain clinicians' research engagement. This protocol describes an exploratory concurrent mixed methods study that is designed to understand how allied health research fellows use knowledge brokering strategies within tailored evidence-based interventions, to facilitate research engagement by allied health clinicians. Simultaneously, a realist approach will guide a systematic process evaluation of the research fellows' pattern of use of knowledge brokering strategies within each case study to build a programme theory explaining which knowledge brokering strategies work best, in what contexts and why. Learning and behavioural theories will inform this critical explanation. An explanation of how locally tailored evidence-based interventions improve AHPs use of, participation in and leadership of research projects will be summarised and shared with all participating clinicians and within each case study. It is expected that local recommendations will be developed and shared with medical and nursing professionals in and beyond the health service, to facilitate building research capacity in a systematic and effective way. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  4. Enhancing Insights into Pulmonary Vascular Disease through a Precision Medicine Approach. A Joint NHLBI-Cardiovascular Medical Research and Education Fund Workshop Report.

    PubMed

    Newman, John H; Rich, Stuart; Abman, Steven H; Alexander, John H; Barnard, John; Beck, Gerald J; Benza, Raymond L; Bull, Todd M; Chan, Stephen Y; Chun, Hyung J; Doogan, Declan; Dupuis, Jocelyn; Erzurum, Serpil C; Frantz, Robert P; Geraci, Mark; Gillies, Hunter; Gladwin, Mark; Gray, Michael P; Hemnes, Anna R; Herbst, Roy S; Hernandez, Adrian F; Hill, Nicholas S; Horn, Evelyn M; Hunter, Kendall; Jing, Zhi-Cheng; Johns, Roger; Kaul, Sanjay; Kawut, Steven M; Lahm, Tim; Leopold, Jane A; Lewis, Greg D; Mathai, Stephen C; McLaughlin, Vallerie V; Michelakis, Evangelos D; Nathan, Steven D; Nichols, William; Page, Grier; Rabinovitch, Marlene; Rich, Jonathan; Rischard, Franz; Rounds, Sharon; Shah, Sanjiv J; Tapson, Victor F; Lowy, Naomi; Stockbridge, Norman; Weinmann, Gail; Xiao, Lei

    2017-06-15

    The Division of Lung Diseases of the NHLBI and the Cardiovascular Medical Education and Research Fund held a workshop to discuss how to leverage the anticipated scientific output from the recently launched "Redefining Pulmonary Hypertension through Pulmonary Vascular Disease Phenomics" (PVDOMICS) program to develop newer approaches to pulmonary vascular disease. PVDOMICS is a collaborative, protocol-driven network to analyze all patient populations with pulmonary hypertension to define novel pulmonary vascular disease (PVD) phenotypes. Stakeholders, including basic, translational, and clinical investigators; clinicians; patient advocacy organizations; regulatory agencies; and pharmaceutical industry experts, joined to discuss the application of precision medicine to PVD clinical trials. Recommendations were generated for discussion of research priorities in line with NHLBI Strategic Vision Goals that include: (1) A national effort, involving all the stakeholders, should seek to coordinate biosamples and biodata from all funded programs to a web-based repository so that information can be shared and correlated with other research projects. Example programs sponsored by NHLBI include PVDOMICS, Pulmonary Hypertension Breakthrough Initiative, the National Biological Sample and Data Repository for PAH, and the National Precision Medicine Initiative. (2) A task force to develop a master clinical trials protocol for PVD to apply precision medicine principles to future clinical trials. Specific features include: (a) adoption of smaller clinical trials that incorporate biomarker-guided enrichment strategies, using adaptive and innovative statistical designs; and (b) development of newer endpoints that reflect well-defined and clinically meaningful changes. (3) Development of updated and systematic variables in imaging, hemodynamic, cellular, genomic, and metabolic tests that will help precisely identify individual and shared features of PVD and serve as the basis of novel phenotypes for therapeutic interventions.

  5. Hybrid Collaborative Learning for Classification and Clustering in Sensor Networks

    NASA Technical Reports Server (NTRS)

    Wagstaff, Kiri L.; Sosnowski, Scott; Lane, Terran

    2012-01-01

    Traditionally, nodes in a sensor network simply collect data and then pass it on to a centralized node that archives, distributes, and possibly analyzes the data. However, analysis at the individual nodes could enable faster detection of anomalies or other interesting events as well as faster responses, such as sending out alerts or increasing the data collection rate. There is an additional opportunity for increased performance if learners at individual nodes can communicate with their neighbors. In previous work, methods were developed by which classification algorithms deployed at sensor nodes can communicate information about event labels to each other, building on prior work with co-training, self-training, and active learning. The idea of collaborative learning was extended to function for clustering algorithms as well, similar to ideas from penta-training and consensus clustering. However, collaboration between these learner types had not been explored. A new protocol was developed by which classifiers and clusterers can share key information about their observations and conclusions as they learn. This is an active collaboration in which learners of either type can query their neighbors for information that they then use to re-train or re-learn the concept they are studying. The protocol also supports broadcasts from the classifiers and clusterers to the rest of the network to announce new discoveries. Classifiers observe an event and assign it a label (type). Clusterers instead group observations into clusters without assigning them a label, and they collaborate in terms of pairwise constraints between two events [same-cluster (mustlink) or different-cluster (cannot-link)]. Fundamentally, these two learner types speak different languages. To bridge this gap, the new communication protocol provides four types of exchanges: hybrid queries for information, hybrid "broadcasts" of learned information, each specified for classifiers-to-clusterers, and clusterers-to-classifiers. The new capability has the potential to greatly expand the in situ analysis abilities of sensor networks. Classifiers seeking to categorize incoming data into different types of events can operate in tandem with clusterers that are sensitive to the occurrence of new kinds of events not known to the classifiers. In contrast to current approaches that treat these operations as independent components, a hybrid collaborative learning system can enable them to learn from each other.

  6. Use of the Blue Button Online Tool for Sharing Health Information: Qualitative Interviews With Patients and Providers

    PubMed Central

    Fix, Gemmae M; Hogan, Timothy P; Simon, Steven R; Nazi, Kim M; Turvey, Carolyn L

    2015-01-01

    Background Information sharing between providers is critical for care coordination, especially in health systems such as the United States Department of Veterans Affairs (VA), where many patients also receive care from other health care organizations. Patients can facilitate this sharing by using the Blue Button, an online tool that promotes patients’ ability to view, print, and download their health records. Objective The aim of this study was to characterize (1) patients’ use of Blue Button, an online information-sharing tool in VA’s patient portal, My HealtheVet, (2) information-sharing practices between VA and non-VA providers, and (3) how providers and patients use a printed Blue Button report during a clinical visit. Methods Semistructured qualitative interviews were conducted with 34 VA patients, 10 VA providers, and 9 non-VA providers. Interviews focused on patients’ use of Blue Button, information-sharing practices between VA and non-VA providers, and how patients and providers use a printed Blue Button report during a clinical visit. Qualitative themes were identified through iterative rounds of coding starting with an a priori schema based on technology adoption theory. Results Information sharing between VA and non-VA providers relied primarily on the patient. Patients most commonly used Blue Button to access and share VA laboratory results. Providers recognized the need for improved information sharing, valued the Blue Button printout, and expressed interest in a way to share information electronically across settings. Conclusions Consumer-oriented technologies such as Blue Button can facilitate patients sharing health information with providers in other health care systems; however, more education is needed to inform patients of this use to facilitate care coordination. Additional research is needed to explore how personal health record documents, such as Blue Button reports, can be easily shared and incorporated into the clinical workflow of providers. PMID:26286139

  7. Improving mental health service responses to domestic violence and abuse.

    PubMed

    Trevillion, Kylee; Corker, Elizabeth; Capron, Lauren E; Oram, Siân

    2016-10-01

    Domestic violence and abuse is a considerable international public health problem, which is associated with mental disorders in both women and men. Nevertheless, victimization and perpetration remain undetected by mental health services. This paper reviews the evidence on mental health service responses to domestic violence, including identifying, referring, and providing care for people experiencing or perpetrating violence. The review highlights the need for mental health services to improve rates of identification and responses to domestic violence and abuse, through the provision of specific training on domestic violence and abuse, the implementation of clear information sharing protocols and evidence-based interventions, and the establishment of care referral pathways. This review also highlights the need for further research into mental health service users who perpetrate domestic violence and abuse.

  8. Towards memory-aware services and browsing through lifelogging sensing.

    PubMed

    Arcega, Lorena; Font, Jaime; Cetina, Carlos

    2013-11-05

    Every day we receive lots of information through our senses that is lost forever, because it lacked the strength or the repetition needed to generate a lasting memory. Combining the emerging Internet of Things and lifelogging sensors, we believe it is possible to build up a Digital Memory (Dig-Mem) in order to complement the fallible memory of people. This work shows how to realize the Dig-Mem in terms of interactions, affinities, activities, goals and protocols. We also complement this Dig-Mem with memory-aware services and a Dig-Mem browser. Furthermore, we propose a RFID Tag-Sharing technique to speed up the adoption of Dig-Mem. Experimentation reveals an improvement of the user understanding of Dig-Mem as time passes, compared to natural memories where the level of detail decreases over time.

  9. A special attack on the multiparty quantum secret sharing of secure direct communication using single photons

    NASA Astrophysics Data System (ADS)

    Qin, Su-Juan; Gao, Fei; Wen, Qiao-Yan; Zhu, Fu-Chen

    2008-11-01

    The security of a multiparty quantum secret sharing protocol [L.F. Han, Y.M. Liu, J. Liu, Z.J. Zhang, Opt. Commun. 281 (2008) 2690] is reexamined. It is shown that any one dishonest participant can obtain all the transmitted secret bits by a special attack, where the controlled- (-iσy) gate is employed to invalidate the role of the random phase shift operation. Furthermore, a possible way to resist this attack is discussed.

  10. Experimental circular quantum secret sharing over telecom fiber network.

    PubMed

    Wei, Ke-Jin; Ma, Hai-Qiang; Yang, Jian-Hui

    2013-07-15

    We present a robust single photon circular quantum secret sharing (QSS) scheme with phase encoding over 50 km single mode fiber network using a circular QSS protocol. Our scheme can automatically provide a perfect compensation of birefringence and remain stable for a long time. A high visibility of 99.3% is obtained. Furthermore, our scheme realizes a polarization insensitive phase modulators. The visibility of this system can be maintained perpetually without any adjustment to the system every time we test the system.

  11. Carers' assessment, skills and information sharing: theoretical framework and trial protocol for a randomised controlled trial evaluating the efficacy of a complex intervention for carers of inpatients with anorexia nervosa.

    PubMed

    Goddard, Elizabeth; Raenker, Simone; Macdonald, Pamela; Todd, Gillian; Beecham, Jennifer; Naumann, Ulrike; Bonin, Eva-Maria; Schmidt, Ulrike; Landau, Sabine; Treasure, Janet

    2013-01-01

    Experienced Carers Helping Others (ECHO) is a guided self-help intervention for carers of people with eating disorders to reduce distress and ameliorate interpersonal maintaining factors to improve patient outcomes. The aim of this paper is to describe the theoretical background and protocol of a randomised controlled trial that will establish whether ECHO has a significant beneficial effect for carers and the person they care for. Individuals with anorexia nervosa and carers will be recruited from eating disorder inpatient/day patient hospital services in the UK. Primary outcomes are time until relapse post-discharge (patient) and distress (carer) at 12 months post-discharge. Secondary outcomes are body mass index, eating disorder symptoms, psychosocial measures and health economic data for patients and carers. Carers will be randomised (stratified by site and illness severity) to receive ECHO (in addition to treatment as usual) or treatment as usual only. Potential difficulties in participant recruitment and delivery of the intervention are discussed. Copyright © 2012 John Wiley & Sons, Ltd and Eating Disorders Association.

  12. TH-E-209-03: Development of An In-House CT Dose Monitoring and Management System Based On Open-Source Software Resources -- Pearls and Pitfalls

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhang, D.

    Radiation dose monitoring solutions have opened up new opportunities for medical physicists to be more involved in modern clinical radiology practices. In particular, with the help of comprehensive radiation dose data, data-driven protocol management and informed case follow up are now feasible. Significant challenges remain however and the problems faced by medical physicists are highly heterogeneous. Imaging systems from multiple vendors and a wide range of vintages co-exist in the same department and employ data communication protocols that are not fully standardized or implemented making harmonization complex. Many different solutions for radiation dose monitoring have been implemented by imaging facilitiesmore » over the past few years. Such systems are based on commercial software, home-grown IT solutions, manual PACS data dumping, etc., and diverse pathways can be used to bring the data to impact clinical practice. The speakers will share their experiences with creating or tailoring radiation dose monitoring/management systems and procedures over the past few years, which vary significantly in design and scope. Topics to cover: (1) fluoroscopic dose monitoring and high radiation event handling from a large academic hospital; (2) dose monitoring and protocol optimization in pediatric radiology; and (3) development of a home-grown IT solution and dose data analysis framework. Learning Objectives: Describe the scope and range of radiation dose monitoring and protocol management in a modern radiology practice Review examples of data available from a variety of systems and how it managed and conveyed. Reflect on the role of the physicist in radiation dose awareness.« less

  13. Automation in an Addiction Treatment Research Clinic: Computerized Contingency Management, Ecological Momentary Assessment, and a Protocol Workflow System

    PubMed Central

    Vahabzadeh, Massoud; Lin, Jia-Ling; Mezghanni, Mustapha; Epstein, David H.; Preston, Kenzie L.

    2009-01-01

    Issues A challenge in treatment research is the necessity of adhering to protocol and regulatory strictures while maintaining flexibility to meet patients’ treatment needs and accommodate variations among protocols. Another challenge is the acquisition of large amounts of data in an occasionally hectic environment, along with provision of seamless methods for exporting, mining, and querying the data. Approach We have automated several major functions of our outpatient treatment research clinic for studies in drug abuse and dependence. Here we describe three such specialized applications: the Automated Contingency Management (ACM) system for delivery of behavioral interventions, the Transactional Electronic Diary (TED) system for management of behavioral assessments, and the Protocol Workflow System (PWS) for computerized workflow automation and guidance of each participant’s daily clinic activities. These modules are integrated into our larger information system to enable data sharing in real time among authorized staff. Key Findings ACM and TED have each permitted us to conduct research that was not previously possible. In addition, the time to data analysis at the end of each study is substantially shorter. With the implementation of the PWS, we have been able to manage a research clinic with an 80-patient capacity having an annual average of 18,000 patient-visits and 7,300 urine collections with a research staff of five. Finally, automated data management has considerably enhanced our ability to monitor and summarize participant-safety data for research oversight. Implications and conclusion When developed in consultation with end users, automation in treatment-research clinics can enable more efficient operations, better communication among staff, and expansions in research methods. PMID:19320669

  14. Newly available technologies present expanding opportunities for scientific and technical information exchange

    NASA Astrophysics Data System (ADS)

    Tolzman, Jean M.

    1993-03-01

    The potential for expanded communication among researchers, scholars, and students is supported by growth in the capabilities for electronic communication as well as expanding access to various forms of electronic interchange and computing capabilities. Research supported by the National Aeronautics and Space Administration points to a future where workstations with audio and video monitors and screen-sharing protocols are used to support collaborations with colleagues located throughout the world. Instruments and sensors all over the world will produce data streams that will be brought together and analyzed to produce new findings, which in turn can be distributed electronically. New forms of electronic journals will emerge and provide opportunities for researchers and scientists to electronically and interactively exchange information in a wide range of structures and formats. Ultimately, the wide-scale use of these technologies in the dissemination of research results and the stimulation of collegial dialogue will change the way we represent and express our knowledge of the world. A new paradigm will evolve-perhaps a truly worldwide 'invisible college'.

  15. Newly available technologies present expanding opportunities for scientific and technical information exchange

    NASA Technical Reports Server (NTRS)

    Tolzman, Jean M.

    1993-01-01

    The potential for expanded communication among researchers, scholars, and students is supported by growth in the capabilities for electronic communication as well as expanding access to various forms of electronic interchange and computing capabilities. Research supported by the National Aeronautics and Space Administration points to a future where workstations with audio and video monitors and screen-sharing protocols are used to support collaborations with colleagues located throughout the world. Instruments and sensors all over the world will produce data streams that will be brought together and analyzed to produce new findings, which in turn can be distributed electronically. New forms of electronic journals will emerge and provide opportunities for researchers and scientists to electronically and interactively exchange information in a wide range of structures and formats. Ultimately, the wide-scale use of these technologies in the dissemination of research results and the stimulation of collegial dialogue will change the way we represent and express our knowledge of the world. A new paradigm will evolve-perhaps a truly worldwide 'invisible college'.

  16. 75 FR 75725 - Survey of Information Sharing Practices With Affiliates

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-06

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Survey of Information Sharing Practices... comments concerning the following information collection. Title of Proposal: Survey of Information Sharing...'') Public Law 108-159, 117 Stat. 1952. The OTS will gather information by means of a Survey to be completed...

  17. Quantum secret information equal exchange protocol based on dense coding

    NASA Astrophysics Data System (ADS)

    Jiang, Ying-Hua; Zhang, Shi-Bin; Dai, Jin-Qiao; Shi, Zhi-Ping

    2018-04-01

    In this paper, we design a novel quantum secret information equal exchange protocol, which implements the equal exchange of secret information between the two parties with the help of semi-trusted third party (TP). In the protocol, EPR pairs prepared by the TP are, respectively, distributed to both the communication parties. Then, the two parties perform Pauli operation on each particle and return the new particles to TP, respectively. TP measures each new pair with Bell basis and announces the measurement results. Both parties deduce the secret information of each other according to the result of announcement by TP. Finally, the security analysis shows that this protocol solves the problem about equal exchange of secret information between two parties and verifies the security of semi-trusted TPs. It proves that the protocol can effectively resist glitch attacks, intercept retransmission attacks and entanglement attack.

  18. Privacy Protection Standards for the Information Sharing Environment

    DTIC Science & Technology

    2009-09-01

    enable ISE participants to share information and data (see ISE Implementation Plan, p. 51, ISE Enterprise Architecture Framework, pp. 67, 73–74 and...of frontiers. This article shall not prevent States from requiring the licensing of broadcasting, television or cinema enterprises. 2. The exercise...5 U.S.C. § 552a, as amended. Program Manager-Information Sharing Environment. (2008). Information Sharing Enterprise Architecture Framework

  19. Health Information National Trends Survey in American Sign Language (HINTS-ASL): Protocol for the Cultural Adaptation and Linguistic Validation of a National Survey.

    PubMed

    Kushalnagar, Poorna; Harris, Raychelle; Paludneviciene, Raylene; Hoglind, TraciAnn

    2017-09-13

    The Health Information National Trends Survey (HINTS) collects nationally representative data about the American's public use of health-related information. This survey is available in English and Spanish, but not in American Sign Language (ASL). Thus, the exclusion of ASL users from these national health information survey studies has led to a significant gap in knowledge of Internet usage for health information access in this underserved and understudied population. The objectives of this study are (1) to culturally adapt and linguistically translate the HINTS items to ASL (HINTS-ASL); and (2) to gather information about deaf people's health information seeking behaviors across technology-mediated platforms. We modified the standard procedures developed at the US National Center for Health Statistics Cognitive Survey Laboratory to culturally adapt and translate HINTS items to ASL. Cognitive interviews were conducted to assess clarity and delivery of these HINTS-ASL items. Final ASL video items were uploaded to a protected online survey website. The HINTS-ASL online survey has been administered to over 1350 deaf adults (ages 18 to 90 and up) who use ASL. Data collection is ongoing and includes deaf adult signers across the United States. Some items from HINTS item bank required cultural adaptation for use with deaf people who use accessible services or technology. A separate item bank for deaf-related experiences was created, reflecting deaf-specific technology such as sharing health-related ASL videos through social network sites and using video remote interpreting services in health settings. After data collection is complete, we will conduct a series of analyses on deaf people's health information seeking behaviors across technology-mediated platforms. HINTS-ASL is an accessible health information national trends survey, which includes a culturally appropriate set of items that are relevant to the experiences of deaf people who use ASL. The final HINTS-ASL product will be available for public use upon completion of this study. ©Poorna Kushalnagar. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 13.09.2017.

  20. Cyber security: a critical examination of information sharing versus data sensitivity issues for organisations at risk of cyber attack.

    PubMed

    Mallinder, Jason; Drabwell, Peter

    Cyber threats are growing and evolving at an unprecedented rate.Consequently, it is becoming vitally important that organisations share information internally and externally before, during and after incidents they encounter so that lessons can be learned, good practice identified and new cyber resilience capabilities developed. Many organisations are reluctant to share such information for fear of divulging sensitive information or because it may be vague or incomplete. This provides organisations with a complex dilemma: how to share information as openly as possibly about cyber incidents, while protecting their confidentiality and focusing on service recovery from such incidents. This paper explores the dilemma of information sharing versus sensitivity and provides a practical overview of considerations every business continuity plan should address to plan effectively for information sharing in the event of a cyber incident.

  1. Shared virtual environments for aerospace training

    NASA Technical Reports Server (NTRS)

    Loftin, R. Bowen; Voss, Mark

    1994-01-01

    Virtual environments have the potential to significantly enhance the training of NASA astronauts and ground-based personnel for a variety of activities. A critical requirement is the need to share virtual environments, in real or near real time, between remote sites. It has been hypothesized that the training of international astronaut crews could be done more cheaply and effectively by utilizing such shared virtual environments in the early stages of mission preparation. The Software Technology Branch at NASA's Johnson Space Center has developed the capability for multiple users to simultaneously share the same virtual environment. Each user generates the graphics needed to create the virtual environment. All changes of object position and state are communicated to all users so that each virtual environment maintains its 'currency.' Examples of these shared environments will be discussed and plans for the utilization of the Department of Defense's Distributed Interactive Simulation (DIS) protocols for shared virtual environments will be presented. Finally, the impact of this technology on training and education in general will be explored.

  2. Africa and China Higher Education Cooperation: Establishing Knowledge Sharing Partnership between Students

    ERIC Educational Resources Information Center

    Gonondo, Jean

    2017-01-01

    Knowledge sharing should not be confused neither with data sharing nor with information sharing; the knowledge sharing includes data and information sharing, skills and expertise communication, ideas exchange. Since the fourth FOCAC held in Egypt in 2009, many policies have been added to reinforce Africa and China educational cooperation,…

  3. Privacy Policy Implementation on the Nation-Wide EHR in Japan for Hospitals and Patients.

    PubMed

    Kume, Naoto; Kobayashi, Shinji; Araki, Kenji; Yoshihara, Hiroyuki

    2017-01-01

    Shared clinical information is an important contribution to regional medicine. Clinical information sharing with patients is also recommended to motivate patients and promote health. On the other hand, the threat of information leaks, caused by internet connected records, is critical to hospitals. The traditional approach is complete isolation of hospital networks, instead of information sharing. The authors propose methods here to maximize information sharing by following hospital preferences for electronic health records.

  4. Mobile Sensor Technologies Being Developed

    NASA Technical Reports Server (NTRS)

    Greer, Lawrence C.; Oberle, Lawrence G.

    2003-01-01

    The NASA Glenn Research Center is developing small mobile platforms for sensor placement, as well as methods for communicating between roving platforms and a central command location. The first part of this project is to use commercially available equipment to miniaturize an existing sensor platform. We developed a five-circuit-board suite, with an average board size of 1.5 by 3 cm. Shown in the preceding photograph, this suite provides all motor control, direction finding, and communications capabilities for a 27- by 21- by 40-mm prototype mobile platform. The second part of the project is to provide communications between mobile platforms, and also between multiple platforms and a central command location. This is accomplished with a low-power network labeled "SPAN," Sensor Platform Area Network, a local area network made up of proximity elements. In practice, these proximity elements are composed of fixed- and mobile-sensor-laden science packages that communicate to each other via radiofrequency links. Data in the network will be shared by a central command location that will pass information into and out of the network through its access to a backbone element. The result will be a protocol portable to general purpose microcontrollers satisfying a host of sensor networking tasks. This network will enter the gap somewhere between television remotes and Bluetooth but, unlike 802.15.4, will not specify a physical layer, thus allowing for many data rates over optical, acoustical, radiofrequency, hardwire, or other media. Since the protocol will exist as portable C-code, developers may be able to embed it in a host of microcontrollers from commercial to space grade and, of course, to design it into ASICs. Unlike in 802.15.4, the nodes will relate to each other as peers. A demonstration of this protocol using the two test bed platforms was recently held. Two NASA modified, commercially available, mobile platforms communicated and shared data with each other and a central command location. Web-based control and interrogation of similar mobile sensor platforms have also been demonstrated. Expected applications of this technology include robotic planetary exploration, astronaut-to-equipment communication, and remote aerospace engine inspections.

  5. 31 CFR 1021.540 - Voluntary information sharing among financial institutions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... CASINOS AND CARD CLUBS Special Information Sharing Procedures To Deter Money Laundering and Terrorist Activity for Casinos and Card Clubs § 1021.540 Voluntary information sharing among financial institutions...

  6. 31 CFR 1021.540 - Voluntary information sharing among financial institutions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... CASINOS AND CARD CLUBS Special Information Sharing Procedures To Deter Money Laundering and Terrorist Activity for Casinos and Card Clubs § 1021.540 Voluntary information sharing among financial institutions...

  7. 31 CFR 1021.540 - Voluntary information sharing among financial institutions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... CASINOS AND CARD CLUBS Special Information Sharing Procedures To Deter Money Laundering and Terrorist Activity for Casinos and Card Clubs § 1021.540 Voluntary information sharing among financial institutions...

  8. 31 CFR 1021.540 - Voluntary information sharing among financial institutions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... CASINOS AND CARD CLUBS Special Information Sharing Procedures To Deter Money Laundering and Terrorist Activity for Casinos and Card Clubs § 1021.540 Voluntary information sharing among financial institutions...

  9. Technology Mediated Information Sharing (Monitor Sharing) in Primary Care Encounters

    ERIC Educational Resources Information Center

    Asan, Onur

    2013-01-01

    The aim of this dissertation study was to identify and describe the use of electronic health records (EHRs) for information sharing between patients and clinicians in primary-care encounters and to understand work system factors influencing information sharing. Ultimately, this will promote better design of EHR technologies and effective training…

  10. Challenges in Sharing Information Effectively: Examples from Command and Control

    ERIC Educational Resources Information Center

    Sonnenwald, Diane H.

    2006-01-01

    Introduction: The goal of information sharing is to change a person's image of the world and to develop a shared working understanding. It is an essential component of collaboration. This paper examines barriers to sharing information effectively in dynamic group work situations. Method: Three types of battlefield training simulations were…

  11. 32 CFR 806b.43 - Placing personal information on shared drives.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Placing personal information on shared drives... shared drives. Personal information should never be placed on shared drives for access by groups of... supervisors should give consideration to those individuals with unlisted phone numbers, who do not want their...

  12. Anti-Noise Bidirectional Quantum Steganography Protocol with Large Payload

    NASA Astrophysics Data System (ADS)

    Qu, Zhiguo; Chen, Siyi; Ji, Sai; Ma, Songya; Wang, Xiaojun

    2018-06-01

    An anti-noise bidirectional quantum steganography protocol with large payload protocol is proposed in this paper. In the new protocol, Alice and Bob enable to transmit classical information bits to each other while teleporting secret quantum states covertly. The new protocol introduces the bidirectional quantum remote state preparation into the bidirectional quantum secure communication, not only to expand secret information from classical bits to quantum state, but also extract the phase and amplitude values of secret quantum state for greatly enlarging the capacity of secret information. The new protocol can also achieve better imperceptibility, since the eavesdropper can hardly detect the hidden channel or even obtain effective secret quantum states. Comparing with the previous quantum steganography achievements, due to its unique bidirectional quantum steganography, the new protocol can obtain higher transmission efficiency and better availability. Furthermore, the new algorithm can effectively resist quantum noises through theoretical analysis. Finally, the performance analysis proves the conclusion that the new protocol not only has good imperceptibility, high security, but also large payload.

  13. Anti-Noise Bidirectional Quantum Steganography Protocol with Large Payload

    NASA Astrophysics Data System (ADS)

    Qu, Zhiguo; Chen, Siyi; Ji, Sai; Ma, Songya; Wang, Xiaojun

    2018-03-01

    An anti-noise bidirectional quantum steganography protocol with large payload protocol is proposed in this paper. In the new protocol, Alice and Bob enable to transmit classical information bits to each other while teleporting secret quantum states covertly. The new protocol introduces the bidirectional quantum remote state preparation into the bidirectional quantum secure communication, not only to expand secret information from classical bits to quantum state, but also extract the phase and amplitude values of secret quantum state for greatly enlarging the capacity of secret information. The new protocol can also achieve better imperceptibility, since the eavesdropper can hardly detect the hidden channel or even obtain effective secret quantum states. Comparing with the previous quantum steganography achievements, due to its unique bidirectional quantum steganography, the new protocol can obtain higher transmission efficiency and better availability. Furthermore, the new algorithm can effectively resist quantum noises through theoretical analysis. Finally, the performance analysis proves the conclusion that the new protocol not only has good imperceptibility, high security, but also large payload.

  14. Password-only authenticated three-party key exchange with provable security in the standard model.

    PubMed

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Kim, Junghwan; Kang, Hyun-Kyu; Kim, Jinsoo; Paik, Juryon; Won, Dongho

    2014-01-01

    Protocols for password-only authenticated key exchange (PAKE) in the three-party setting allow two clients registered with the same authentication server to derive a common secret key from their individual password shared with the server. Existing three-party PAKE protocols were proven secure under the assumption of the existence of random oracles or in a model that does not consider insider attacks. Therefore, these protocols may turn out to be insecure when the random oracle is instantiated with a particular hash function or an insider attack is mounted against the partner client. The contribution of this paper is to present the first three-party PAKE protocol whose security is proven without any idealized assumptions in a model that captures insider attacks. The proof model we use is a variant of the indistinguishability-based model of Bellare, Pointcheval, and Rogaway (2000), which is one of the most widely accepted models for security analysis of password-based key exchange protocols. We demonstrated that our protocol achieves not only the typical indistinguishability-based security of session keys but also the password security against undetectable online dictionary attacks.

  15. Interoperability In The New Planetary Science Archive (PSA)

    NASA Astrophysics Data System (ADS)

    Rios, C.; Barbarisi, I.; Docasal, R.; Macfarlane, A. J.; Gonzalez, J.; Arviset, C.; Grotheer, E.; Besse, S.; Martinez, S.; Heather, D.; De Marchi, G.; Lim, T.; Fraga, D.; Barthelemy, M.

    2015-12-01

    As the world becomes increasingly interconnected, there is a greater need to provide interoperability with software and applications that are commonly being used globally. For this purpose, the development of the new Planetary Science Archive (PSA), by the European Space Astronomy Centre (ESAC) Science Data Centre (ESDC), is focused on building a modern science archive that takes into account internationally recognised standards in order to provide access to the archive through tools from third parties, for example by the NASA Planetary Data System (PDS), the VESPA project from the Virtual Observatory of Paris as well as other international institutions. The protocols and standards currently being supported by the new Planetary Science Archive at this time are the Planetary Data Access Protocol (PDAP), the EuroPlanet-Table Access Protocol (EPN-TAP) and Open Geospatial Consortium (OGC) standards. The architecture of the PSA consists of a Geoserver (an open-source map server), the goal of which is to support use cases such as the distribution of search results, sharing and processing data through a OGC Web Feature Service (WFS) and a Web Map Service (WMS). This server also allows the retrieval of requested information in several standard output formats like Keyhole Markup Language (KML), Geography Markup Language (GML), shapefile, JavaScript Object Notation (JSON) and Comma Separated Values (CSV), among others. The provision of these various output formats enables end-users to be able to transfer retrieved data into popular applications such as Google Mars and NASA World Wind.

  16. A remote control console for the HHIRF 25-MV Tandem Accelerator

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hasanul Basher, A.M.

    The CAMAC-based control system for the 25-MV Tandem Accelerator at HHIRF uses two Perkin-Elmer, 32-bit minicomputers: a message-switching computer and a supervisory computer. Two operator consoles are located on one of the six serial highways. Operator control is provided by means of a console CRT, trackball, assignable shaft encoders, and meters. The message-switching computer transmits and receives control information on the serial highways. At present, the CRT pages with updated parameters can be displayed and parameters can be controlled only from the two existing consoles, one in the Tandem control room and the other in the ORIC control room. Itmore » has become necessary to expand the control capability to several other locations in the building. With the expansion of control and monitoring capability of accelerator parameters to other locations, the operators will be able to control and observe the result of the control action at the same time. This capability will be useful in the new Radioactive Ion Beam project of the division. Since the new control console will be PC-based, the existing page format will be changed. The PC will be communicating with the Perkin-Elmer through RS-232 with the aid of a communication protocol. Hardware configuration has been established, a software program that reads the pages from the shared memory, and a communication protocol have been developed. The following sections present the implementation strategy, work completed, future action plans, and the functional details of the communication protocol.« less

  17. Secret Sharing of a Quantum State.

    PubMed

    Lu, He; Zhang, Zhen; Chen, Luo-Kan; Li, Zheng-Da; Liu, Chang; Li, Li; Liu, Nai-Le; Ma, Xiongfeng; Chen, Yu-Ao; Pan, Jian-Wei

    2016-07-15

    Secret sharing of a quantum state, or quantum secret sharing, in which a dealer wants to share a certain amount of quantum information with a few players, has wide applications in quantum information. The critical criterion in a threshold secret sharing scheme is confidentiality: with less than the designated number of players, no information can be recovered. Furthermore, in a quantum scenario, one additional critical criterion exists: the capability of sharing entangled and unknown quantum information. Here, by employing a six-photon entangled state, we demonstrate a quantum threshold scheme, where the shared quantum secrecy can be efficiently reconstructed with a state fidelity as high as 93%. By observing that any one or two parties cannot recover the secrecy, we show that our scheme meets the confidentiality criterion. Meanwhile, we also demonstrate that entangled quantum information can be shared and recovered via our setting, which shows that our implemented scheme is fully quantum. Moreover, our experimental setup can be treated as a decoding circuit of the five-qubit quantum error-correcting code with two erasure errors.

  18. Report of the Project Research on Disaster Reduction using Disaster Mitigating Information Sharing Technology

    NASA Astrophysics Data System (ADS)

    Suzuki, Takeyasu

    For the purpose of reducing disaster damage by applying information sharing technologies, "the research on disaster reduction using crisis-adaptive information sharing technologies" was carried out from July, 2004 through March 2007, as a three year joint project composed of a government office and agency, national research institutes, universities, lifeline corporations, a NPO and a private company. In this project, the disaster mitigating information sharing platform which is effective to disaster response activities mainly for local governments was developed, as a framework which enables information sharing in disasters. A prototype of the platform was built by integrating an individual system and tool. Then, it was applied to actual local governments and proved to be effective to disaster responses. This paper summarizes the research project. It defines the platform as a framework of both information contents and information systems first and describes information sharing technologies developed for utilization of the platform. It also introduces fields tests in which a prototype of the platform was applied to local governments.

  19. The Simulation of Read-time Scalable Coherent Interface

    NASA Technical Reports Server (NTRS)

    Li, Qiang; Grant, Terry; Grover, Radhika S.

    1997-01-01

    Scalable Coherent Interface (SCI, IEEE/ANSI Std 1596-1992) (SCI1, SCI2) is a high performance interconnect for shared memory multiprocessor systems. In this project we investigate an SCI Real Time Protocols (RTSCI1) using Directed Flow Control Symbols. We studied the issues of efficient generation of control symbols, and created a simulation model of the protocol on a ring-based SCI system. This report presents the results of the study. The project has been implemented using SES/Workbench. The details that follow encompass aspects of both SCI and Flow Control Protocols, as well as the effect of realistic client/server processing delay. The report is organized as follows. Section 2 provides a description of the simulation model. Section 3 describes the protocol implementation details. The next three sections of the report elaborate on the workload, results and conclusions. Appended to the report is a description of the tool, SES/Workbench, used in our simulation, and internal details of our implementation of the protocol.

  20. A Simple XML Producer-Consumer Protocol

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy

    2000-01-01

    This document describes a simple XML-based protocol that can be used for producers of events to communicate with consumers of events. The protocol described here is not meant to be the most efficient protocol, the most logical protocol, or the best protocol in any way. This protocol was defined quickly and it's intent is to give us a reasonable protocol that we can implement relatively easily and then use to gain experience in distributed event services. This experience will help us evaluate proposals for event representations, XML-based encoding of information, and communication protocols. The next section of this document describes how we represent events in this protocol and then defines the two events that we choose to use for our initial experiments. These definitions are made by example so that they are informal and easy to understand. The following section then proceeds to define the producer-consumer protocol we have agreed upon for our initial experiments.

Top