A simple, effective media access protocol system for integrated, high data rate networks
NASA Technical Reports Server (NTRS)
Foudriat, E. C.; Maly, K.; Overstreet, C. M.; Khanna, S.; Zhang, L.
1992-01-01
The operation and performance of a dual media access protocol for integrated, gigabit networks are described. Unlike other dual protocols, each protocol supports a different class of traffic. The Carrier Sensed Multiple Access-Ring Network (CSMA/RN) protocol and the Circulating Reservation Packet (CRP) protocol support asynchronous and synchronous traffic, respectively. The two protocols operate with minimal impact upon each other. Performance information demonstrates that they support a complete range of integrated traffic loads, do not require call setup/termination or a special node for synchronous traffic control, and provide effective pre-use and recovery. The CRP also provides guaranteed access and fairness control for the asynchronous system. The paper demonstrates that the CSMA-CRP system fulfills many of the requirements for gigabit LAN-MAN networks most effectively and simply. To accomplish this, CSMA-CRP features are compared against similar ring and bus systems, such as Cambridge Fast Ring, Metaring, Cyclic Reservation Multiple Access, and Distributed Dual Queue Data Bus (DQDB).
NASA Technical Reports Server (NTRS)
Wallett, Thomas M.
2009-01-01
This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.
2002-09-01
Protocol LAN Local Area Network LDAP Lightweight Directory Access Protocol LLQ Low Latency Queuing MAC Media Access Control MarCorSysCom Marine...Description Protocol SIP Session Initiation Protocol SMTP Simple Mail Transfer Protocol SPAWAR Space and Naval Warfare Systems Center SS7 ...PSTN infrastructure previously required to carry the conversation. The cost of accessing the PSTN is thereby eliminated. In cases where Internet
NASA Technical Reports Server (NTRS)
Ivancic, William D.
2003-01-01
Traditional NASA missions, both near Earth and deep space, have been stovepipe in nature and point-to-point in architecture. Recently, NASA and others have conceptualized missions that required space-based networking. The notion of networks in space is a drastic shift in thinking and requires entirely new architectures, radio systems (antennas, modems, and media access), and possibly even new protocols. A full system engineering approach for some key mission architectures will occur that considers issues such as the science being performed, stationkeeping, antenna size, contact time, data rates, radio-link power requirements, media access techniques, and appropriate networking and transport protocols. This report highlights preliminary architecture concepts and key technologies that will be investigated.
Intrusion Detection for Defense at the MAC and Routing Layers of Wireless Networks
2007-01-01
Space DoS Denial of Service DSR Dynamic Source Routing IDS Intrusion Detection System LAR Location-Aided Routing MAC Media Access Control MACA Multiple...different mobility parameters. 10 They simulate interaction between three MAC protocols ( MACA , 802.11 and CSMA) and three routing protocols (AODV, DSR
Network support for turn-taking in multimedia collaboration
NASA Astrophysics Data System (ADS)
Dommel, Hans-Peter; Garcia-Luna-Aceves, Jose J.
1997-01-01
The effectiveness of collaborative multimedia systems depends on the regulation of access to their shared resources, such as continuous media or instruments used concurrently by multiple parties. Existing applications use only simple protocols to mediate such resource contention. Their cooperative rules follow a strict agenda and are largely application-specific. The inherent problem of floor control lacks a systematic methodology. This paper presents a general model on floor control for correct, scalable, fine-grained and fair resource sharing that integrates user interaction with network conditions, and adaptation to various media types. The motion of turn-taking known from psycholinguistics in studies on discourse structure is adapted for this framework. Viewed as a computational analogy to speech communication, online collaboration revolves around dynamically allocated access permissions called floors. The control semantics of floors derives from concurrently control methodology. An explicit specification and verification of a novel distributed Floor Control Protocol are presented. Hosts assume sharing roles that allow for efficient dissemination of control information, agreeing on a floor holder which is granted mutually exclusive access to a resource. Performance analytic aspects of floor control protocols are also briefly discussed.
Analyzing the effect of routing protocols on media access control protocols in radio networks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Barrett, C. L.; Drozda, M.; Marathe, A.
2002-01-01
We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i)more » number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.« less
Embedded with Facebook: DoD Faces Risks from Social Media
2011-06-01
appropriate conduct. Embedded with Social Media Today Facebook is the world’s dominant social network site . Facebook boasts over 600 million active users...billion minutes on the site each month [4]. Facebook is also the most popular social network site for DoD personnel. Using our techniques for correlating...media sites [6], directing that the Non-classified Internet Protocol Router Network (NIPRNET) be configured to allow access to social media, e-mail
A biometric access personal optical storage device
NASA Astrophysics Data System (ADS)
Davies, David H.; Ray, Steve; Gurkowski, Mark; Lee, Lane
2007-01-01
A portable USB2.0 personal storage device that uses built-in encryption and allows data access through biometric scanning of a finger print is described. Biometric image derived templates are stored on the removable 32 mm write once (WO) media. The encrypted templates travel with the disc and allow access to the data providing the biometric feature (e.g. the finger itself) is present. The device also allows for export and import of the templates under secure key exchange protocols. The storage system is built around the small form factor optical engine that uses a tilt arm rotary actuator and front surface media.
106-17 Telemetry Standards Chapter 7 Packet Telemetry Downlink
2017-07-31
Acronyms IP Internet Protocol IPv4 Internet Protocol, Version 4 IPv6 Internet Protocol, Version 6 LLP low-latency PTDP MAC media access control...o 4’b0101: PT Internet Protocol (IP) Packet o 4’b0110: PT Chapter 24 TmNSMessage Packet o 4’b0111 – 4’b1111: Reserved • Fragment (bits 17 – 16...packet is defined as a free -running 12-bit counter. The PT test counter packet shall consist of one 12-bit word and shall be encoded as one 24-bit
An energy-efficient rate adaptive media access protocol (RA-MAC) for long-lived sensor networks.
Hu, Wen; Chen, Quanjun; Corke, Peter; O'Rourke, Damien
2010-01-01
We introduce an energy-efficient Rate Adaptive Media Access Control (RA-MAC) algorithm for long-lived Wireless Sensor Networks (WSNs). Previous research shows that the dynamic and lossy nature of wireless communications is one of the major challenges to reliable data delivery in WSNs. RA-MAC achieves high link reliability in such situations by dynamically trading off data rate for channel gain. The extra gain that can be achieved reduces the packet loss rate which contributes to reduced energy expenditure through a reduced numbers of retransmissions. We achieve this at the expense of raw bit rate which generally far exceeds the application's link requirement. To minimize communication energy consumption, RA-MAC selects the optimal data rate based on the estimated link quality at each data rate and an analytical model of the energy consumption. Our model shows how the selected data rate depends on different channel conditions in order to minimize energy consumption. We have implemented RA-MAC in TinyOS for an off-the-shelf sensor platform (the TinyNode) on top of a state-of-the-art WSN Media Access Control Protocol, SCP-MAC, and evaluated its performance by comparing our implementation with the original SCP-MAC using both simulation and experiment.
High speed bus technology development
NASA Astrophysics Data System (ADS)
Modrow, Marlan B.; Hatfield, Donald W.
1989-09-01
The development and demonstration of the High Speed Data Bus system, a 50 Million bits per second (Mbps) local data network intended for avionics applications in advanced military aircraft is described. The Advanced System Avionics (ASA)/PAVE PILLAR program provided the avionics architecture concept and basic requirements. Designs for wire and fiber optic media were produced and hardware demonstrations were performed. An efficient, robust token-passing protocol was developed and partially demonstrated. The requirements specifications, the trade-offs made, and the resulting designs for both a coaxial wire media system and a fiber optics design are examined. Also, the development of a message-oriented media access protocol is described, from requirements definition through analysis, simulation and experimentation. Finally, the testing and demonstrations conducted on the breadboard and brassboard hardware is presented.
An Adaptive OFDMA-Based MAC Protocol for Underwater Acoustic Wireless Sensor Networks
Khalil, Issa M.; Gadallah, Yasser; Hayajneh, Mohammad; Khreishah, Abdallah
2012-01-01
Underwater acoustic wireless sensor networks (UAWSNs) have many applications across various civilian and military domains. However, they suffer from the limited available bandwidth of acoustic signals and harsh underwater conditions. In this work, we present an Orthogonal Frequency Division Multiple Access (OFDMA)-based Media Access Control (MAC) protocol that is configurable to suit the operating requirements of the underwater sensor network. The protocol has three modes of operation, namely random, equal opportunity and energy-conscious modes of operation. Our MAC design approach exploits the multi-path characteristics of a fading acoustic channel to convert it into parallel independent acoustic sub-channels that undergo flat fading. Communication between node pairs within the network is done using subsets of these sub-channels, depending on the configurations of the active mode of operation. Thus, the available limited bandwidth gets fully utilized while completely avoiding interference. We derive the mathematical model for optimal power loading and subcarrier selection, which is used as basis for all modes of operation of the protocol. We also conduct many simulation experiments to evaluate and compare our protocol with other Code Division Multiple Access (CDMA)-based MAC protocols. PMID:23012517
An adaptive OFDMA-based MAC protocol for underwater acoustic wireless sensor networks.
Khalil, Issa M; Gadallah, Yasser; Hayajneh, Mohammad; Khreishah, Abdallah
2012-01-01
Underwater acoustic wireless sensor networks (UAWSNs) have many applications across various civilian and military domains. However, they suffer from the limited available bandwidth of acoustic signals and harsh underwater conditions. In this work, we present an Orthogonal Frequency Division Multiple Access (OFDMA)-based Media Access Control (MAC) protocol that is configurable to suit the operating requirements of the underwater sensor network. The protocol has three modes of operation, namely random, equal opportunity and energy-conscious modes of operation. Our MAC design approach exploits the multi-path characteristics of a fading acoustic channel to convert it into parallel independent acoustic sub-channels that undergo flat fading. Communication between node pairs within the network is done using subsets of these sub-channels, depending on the configurations of the active mode of operation. Thus, the available limited bandwidth gets fully utilized while completely avoiding interference. We derive the mathematical model for optimal power loading and subcarrier selection, which is used as basis for all modes of operation of the protocol. We also conduct many simulation experiments to evaluate and compare our protocol with other Code Division Multiple Access (CDMA)-based MAC protocols.
Networks: A Review of Their Technology, Architecture, and Implementation.
ERIC Educational Resources Information Center
Learn, Larry L.
1988-01-01
This overview of network-related technologies covers network elements, analog and digital signals, transmission media and their characteristics, equipment certification, multiplexing, network types, access technologies, network architectures local-area network technologies and attributes, protocols, internetworking, fiber optics versus satellites,…
NASA Astrophysics Data System (ADS)
Glen, D. V.
1985-04-01
Local networks, related standards activities of the Institute of Electrical and Electronics Engineers the American National Standards Institute and other elements are presented. These elements include: (1) technology choices such as topology, transmission media, and access protocols; (2) descriptions of standards for the 802 local area networks (LAN's); high speed local networks (HSLN's) and military specification local networks; and (3) intra- and internetworking using bridges and gateways with protocols Interconnection (OSI) reference model. The convergence of LAN/PBX technology is also described.
Increased Content Knowledge of Students with Visual Impairments as a Result of Extended Descriptions
ERIC Educational Resources Information Center
Ely, Richard; Emerson, Robert Wall; Maggiore, Theresa; Rothberg, Madeleine; O'Connell, Trisha; Hudson, Laurel
2006-01-01
The National Center for Accessible Media has developed a technology and protocol for inserting extended, enhanced descriptions of visually based concepts into artificially paused digital video. These "eDescriptions" describe material not fully explained by a narrator and provide analogies and explanation specifically designed for…
Clock Synchronization for Multihop Wireless Sensor Networks
ERIC Educational Resources Information Center
Solis Robles, Roberto
2009-01-01
In wireless sensor networks, more so generally than in other types of distributed systems, clock synchronization is crucial since by having this service available, several applications such as media access protocols, object tracking, or data fusion, would improve their performance. In this dissertation, we propose a set of algorithms to achieve…
Design of SIP transformation server for efficient media negotiation
NASA Astrophysics Data System (ADS)
Pack, Sangheon; Paik, Eun Kyoung; Choi, Yanghee
2001-07-01
Voice over IP (VoIP) is one of the advanced services supported by the next generation mobile communication. VoIP should support various media formats and terminals existing together. This heterogeneous environment may prevent diverse users from establishing VoIP sessions among them. To solve the problem an efficient media negotiation mechanism is required. In this paper, we propose the efficient media negotiation architecture using the transformation server and the Intelligent Location Server (ILS). The transformation server is an extended Session Initiation Protocol (SIP) proxy server. It can modify an unacceptable session INVITE message into an acceptable one using the ILS. The ILS is a directory server based on the Lightweight Directory Access Protocol (LDAP) that keeps userí*s location information and available media information. The proposed architecture can eliminate an unnecessary response and re-INVITE messages of the standard SIP architecture. It takes only 1.5 round trip times to negotiate two different media types while the standard media negotiation mechanism takes 2.5 round trip times. The extra processing time in message handling is negligible in comparison to the reduced round trip time. The experimental results show that the session setup time in the proposed architecture is less than the setup time in the standard SIP. These results verify that the proposed media negotiation mechanism is more efficient in solving diversity problems.
Bringing the medical library to the office desktop.
Brown, S R; Decker, G; Pletzke, C J
1991-01-01
This demonstration illustrates LRC Remote Computer Services- a dual operating system, multi-protocol system for delivering medical library services to the medical professional's desktop. A working model draws resources from CD-ROM and magnetic media file services, Novell and AppleTalk network protocol suites and gating, LAN and asynchronous (dial-in) access strategies, commercial applications for MS-DOS and Macintosh workstations and custom user interfaces. The demonstration includes a discussion of issues relevant to the delivery of said services, particularly with respect to maintenance, security, training/support, staffing, software licensing and costs.
A carrier sensed multiple access protocol for high data base rate ring networks
NASA Technical Reports Server (NTRS)
Foudriat, E. C.; Maly, Kurt J.; Overstreet, C. Michael; Khanna, S.; Paterra, Frank
1990-01-01
The results of the study of a simple but effective media access protocol for high data rate networks are presented. The protocol is based on the fact that at high data rates networks can contain multiple messages simultaneously over their span, and that in a ring, nodes used to detect the presence of a message arriving from the immediate upstream neighbor. When an incoming signal is detected, the node must either abort or truncate a message it is presently sending. Thus, the protocol with local carrier sensing and multiple access is designated CSMA/RN. The performance of CSMA/RN with TTattempt and truncate is studied using analytic and simulation models. Three performance factors, wait or access time, service time and response or end-to-end travel time are presented. The service time is basically a function of the network rate, it changes by a factor of 1 between no load and full load. Wait time, which is zero for no load, remains small for load factors up to 70 percent of full load. Response time, which adds travel time while on the network to wait and service time, is mainly a function of network length, especially for longer distance networks. Simulation results are shown for CSMA/RN where messages are removed at the destination. A wide range of local and metropolitan area network parameters including variations in message size, network length, and node count are studied. Finally, a scaling factor based upon the ratio of message to network length demonstrates that the results, and hence, the CSMA/RN protocol, are applicable to wide area networks.
Storage quality-of-service in cloud-based scientific environments: a standardization approach
NASA Astrophysics Data System (ADS)
Millar, Paul; Fuhrmann, Patrick; Hardt, Marcus; Ertl, Benjamin; Brzezniak, Maciej
2017-10-01
When preparing the Data Management Plan for larger scientific endeavors, PIs have to balance between the most appropriate qualities of storage space along the line of the planned data life-cycle, its price and the available funding. Storage properties can be the media type, implicitly determining access latency and durability of stored data, the number and locality of replicas, as well as available access protocols or authentication mechanisms. Negotiations between the scientific community and the responsible infrastructures generally happen upfront, where the amount of storage space, media types, like: disk, tape and SSD and the foreseeable data life-cycles are negotiated. With the introduction of cloud management platforms, both in computing and storage, resources can be brokered to achieve the best price per unit of a given quality. However, in order to allow the platform orchestrator to programmatically negotiate the most appropriate resources, a standard vocabulary for different properties of resources and a commonly agreed protocol to communicate those, has to be available. In order to agree on a basic vocabulary for storage space properties, the storage infrastructure group in INDIGO-DataCloud together with INDIGO-associated and external scientific groups, created a working group under the umbrella of the Research Data Alliance (RDA). As communication protocol, to query and negotiate storage qualities, the Cloud Data Management Interface (CDMI) has been selected. Necessary extensions to CDMI are defined in regular meetings between INDIGO and the Storage Network Industry Association (SNIA). Furthermore, INDIGO is contributing to the SNIA CDMI reference implementation as the basis for interfacing the various storage systems in INDIGO to the agreed protocol and to provide an official Open-Source skeleton for systems not being maintained by INDIGO partners.
NASA Astrophysics Data System (ADS)
Yun, Changho; Kim, Kiseon
2006-04-01
For the passive star-coupled wavelength-division multiple-access (WDMA) network, a modified accelerative preallocation WDMA (MAP-WDMA) media access control (MAC) protocol is proposed, which is based on AP-WDMA. To show the advantages of MAP-WDMA as an adequate MAC protocol for the network over AP-WDMA, the channel utilization, the channel-access delay, and the latency of MAP-WDMA are investigated and compared with those of AP-WDMA under various data traffic patterns, including uniform, quasi-uniform type, disconnected type, mesh type, and ring type data traffics, as well as the assumption that a given number of network stations is equal to that of channels, in other words, without channel sharing. As a result, the channel utilization of MAP-WDMA can be competitive with respect to that of AP-WDMA at the expense of insignificantly higher latency. Namely, if the number of network stations is small, MAP-WDMA provides better channel utilization for uniform, quasi-uniform-type, and disconnected-type data traffics at all data traffic loads, as well as for mesh and ring-type data traffics at low data traffic loads. Otherwise, MAP-WDMA only outperforms AP-WDMA for the first three data traffics at higher data traffic loads. In the aspect of channel-access delay, MAP-WDMA gives better performance than AP-WDMA, regardless of data traffic patterns and the number of network stations.
LANES - LOCAL AREA NETWORK EXTENSIBLE SIMULATOR
NASA Technical Reports Server (NTRS)
Gibson, J.
1994-01-01
The Local Area Network Extensible Simulator (LANES) provides a method for simulating the performance of high speed local area network (LAN) technology. LANES was developed as a design and analysis tool for networking on board the Space Station. The load, network, link and physical layers of a layered network architecture are all modeled. LANES models to different lower-layer protocols, the Fiber Distributed Data Interface (FDDI) and the Star*Bus. The load and network layers are included in the model as a means of introducing upper-layer processing delays associated with message transmission; they do not model any particular protocols. FDDI is an American National Standard and an International Organization for Standardization (ISO) draft standard for a 100 megabit-per-second fiber-optic token ring. Specifications for the LANES model of FDDI are taken from the Draft Proposed American National Standard FDDI Token Ring Media Access Control (MAC), document number X3T9.5/83-16 Rev. 10, February 28, 1986. This is a mature document describing the FDDI media-access-control protocol. Star*Bus, also known as the Fiber Optic Demonstration System, is a protocol for a 100 megabit-per-second fiber-optic star-topology LAN. This protocol, along with a hardware prototype, was developed by Sperry Corporation under contract to NASA Goddard Space Flight Center as a candidate LAN protocol for the Space Station. LANES can be used to analyze performance of a networking system based on either FDDI or Star*Bus under a variety of loading conditions. Delays due to upper-layer processing can easily be nullified, allowing analysis of FDDI or Star*Bus as stand-alone protocols. LANES is a parameter-driven simulation; it provides considerable flexibility in specifying both protocol an run-time parameters. Code has been optimized for fast execution and detailed tracing facilities have been included. LANES was written in FORTRAN 77 for implementation on a DEC VAX under VMS 4.6. It consists of two programs, a simulation program and a user-interface program. The simulation program requires the SLAM II simulation library from Pritsker and Associates, W. Lafayette IN; the user interface is implemented using the Ingres database manager from Relational Technology, Inc. Information about running the simulation program without the user-interface program is contained in the documentation. The memory requirement is 129,024 bytes. LANES was developed in 1988.
Low contrast media volume in pre-TAVI CT examinations.
Kok, Madeleine; Turek, Jakub; Mihl, Casper; Reinartz, Sebastian D; Gohmann, Robin F; Nijssen, Estelle C; Kats, Suzanne; van Ommen, Vincent G; Kietselaer, Bas L J H; Wildberger, Joachim E; Das, Marco
2016-08-01
To evaluate image quality using reduced contrast media (CM) volume in pre-TAVI assessment. Forty-seven consecutive patients referred for pre-TAVI examination were evaluated. Patients were divided into two groups: group 1 BMI < 28 kg/m(2) (n = 29); and group 2 BMI > 28 kg/m(2) (n = 18). Patients received a combined scan protocol: retrospective ECG-gated helical CTA of the aortic root (80kVp) followed by a high-pitch spiral CTA (group 1: 70 kV; group 2: 80 kVp) from aortic arch to femoral arteries. All patients received one bolus of CM (300 mgI/ml): group 1: volume = 40 ml; flow rate = 3 ml/s, group 2: volume = 53 ml; flow rate = 4 ml/s. Attenuation values (HU) and contrast-to-noise ratio (CNR) were measured at the levels of the aortic root (helical) and peripheral arteries (high-pitch). Diagnostic image quality was considered sufficient at attenuation values > 250HU and CNR > 10. Diagnostic image quality for TAVI measurements was obtained in 46 patients. Mean attenuation values and CNR (HU ± SD) at the aortic root (helical) were: group 1: 381 ± 65HU and 13 ± 8; group 2: 442 ± 68HU and 10 ± 5. At the peripheral arteries (high-pitch), mean values were: group 1: 430 ± 117HU and 11 ± 6; group 2: 389 ± 102HU and 13 ± 6. CM volume can be substantially reduced using low kVp protocols, while maintaining sufficient image quality for the evaluation of aortic root and peripheral access sites. • Image quality could be maintained using low kVp scan protocols. • Low kVp protocols reduce contrast media volume by 34-67 %. • Less contrast media volume lowers the risk of contrast-induced nephropathy.
A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks
Wang, Jian; Jiang, Shuai; Fapojuwo, Abraham O.
2017-01-01
This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer considering the attacks initiated at different protocol layers will inevitably have impacts on the parameters of the corresponding protocol layers. For simplicity, the paper mainly considers three aspects of trustworthiness, namely physical layer trust, media access control layer trust and network layer trust. The per-layer trust metrics are then combined to determine the overall trust metric of a sensor node. The performance of the proposed intrusion detection mechanism is then analyzed using the t-distribution to derive analytical results of false positive and false negative probabilities. Numerical analytical results, validated by simulation results, are presented in different attack scenarios. It is shown that the proposed protocol layer trust-based intrusion detection scheme outperforms a state-of-the-art scheme in terms of detection probability and false probability, demonstrating its usefulness for detecting cross-layer attacks. PMID:28555023
A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks.
Wang, Jian; Jiang, Shuai; Fapojuwo, Abraham O
2017-05-27
This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer considering the attacks initiated at different protocol layers will inevitably have impacts on the parameters of the corresponding protocol layers. For simplicity, the paper mainly considers three aspects of trustworthiness, namely physical layer trust, media access control layer trust and network layer trust. The per-layer trust metrics are then combined to determine the overall trust metric of a sensor node. The performance of the proposed intrusion detection mechanism is then analyzed using the t-distribution to derive analytical results of false positive and false negative probabilities. Numerical analytical results, validated by simulation results, are presented in different attack scenarios. It is shown that the proposed protocol layer trust-based intrusion detection scheme outperforms a state-of-the-art scheme in terms of detection probability and false probability, demonstrating its usefulness for detecting cross-layer attacks.
A Scalable Architecture for Improving the Timeliness and Relevance of Cyber Incident Notifications
2011-04-01
the flow of communications is reasonably straight forward, but information often flows at the speed of human receipt and processing. Alberts & Hayes...these flows to the missions and people consuming them. Camus [30] can perform this through comparing logs to Lightweight Directory Access Protocol...publishing.af.mil/shared/media/epubs/AFI33- 138.pdf. [18] Alberts , D.S. and Hayes, R.E. (2003) “Power to the Edge: Command… Control… in the
Interactive browsing of 3D environment over the Internet
NASA Astrophysics Data System (ADS)
Zhang, Cha; Li, Jin
2000-12-01
In this paper, we describe a system for wandering in a realistic environment over the Internet. The environment is captured by the concentric mosaic, compressed via the reference block coder (RBC), and accessed and delivered over the Internet through the virtual media (Vmedia) access protocol. Capturing the environment through the concentric mosaic is easy. We mount a camera at the end of a level beam, and shoot images as the beam rotates. The huge dataset of the concentric mosaic is then compressed through the RBC, which is specifically designed for both high compression efficiency and just-in-time (JIT) rendering. Through the JIT rendering function, only a portion of the RBC bitstream is accessed, decoded and rendered for each virtual view. A multimedia communication protocol -- the Vmedia protocol, is then proposed to deliver the compressed concentric mosaic data over the Internet. Only the bitstream segments corresponding to the current view are streamed over the Internet. Moreover, the delivered bitstream segments are managed by a local Vmedia cache so that frequently used bitstream segments need not be streamed over the Internet repeatedly, and the Vmedia is able to handle a RBC bitstream larger than its memory capacity. A Vmedia concentric mosaic interactive browser is developed where the user can freely wander in a realistic environment, e.g., rotate around, walk forward/backward and sidestep, even under a tight bandwidth of 33.6 kbps.
Broadband set-top box using MAP-CA processor
NASA Astrophysics Data System (ADS)
Bush, John E.; Lee, Woobin; Basoglu, Chris
2001-12-01
Advances in broadband access are expected to exert a profound impact in our everyday life. It will be the key to the digital convergence of communication, computer and consumer equipment. A common thread that facilitates this convergence comprises digital media and Internet. To address this market, Equator Technologies, Inc., is developing the Dolphin broadband set-top box reference platform using its MAP-CA Broadband Signal ProcessorT chip. The Dolphin reference platform is a universal media platform for display and presentation of digital contents on end-user entertainment systems. The objective of the Dolphin reference platform is to provide a complete set-top box system based on the MAP-CA processor. It includes all the necessary hardware and software components for the emerging broadcast and the broadband digital media market based on IP protocols. Such reference design requires a broadband Internet access and high-performance digital signal processing. By using the MAP-CA processor, the Dolphin reference platform is completely programmable, allowing various codecs to be implemented in software, such as MPEG-2, MPEG-4, H.263 and proprietary codecs. The software implementation also enables field upgrades to keep pace with evolving technology and industry demands.
Akbar, Muhammad Sajjad; Yu, Hongnian; Cang, Shuang
2017-01-01
In wireless body area sensor networks (WBASNs), Quality of Service (QoS) provision for patient monitoring systems in terms of time-critical deadlines, high throughput and energy efficiency is a challenging task. The periodic data from these systems generates a large number of small packets in a short time period which needs an efficient channel access mechanism. The IEEE 802.15.4 standard is recommended for low power devices and widely used for many wireless sensor networks applications. It provides a hybrid channel access mechanism at the Media Access Control (MAC) layer which plays a key role in overall successful transmission in WBASNs. There are many WBASN’s MAC protocols that use this hybrid channel access mechanism in variety of sensor applications. However, these protocols are less efficient for patient monitoring systems where life critical data requires limited delay, high throughput and energy efficient communication simultaneously. To address these issues, this paper proposes a frame aggregation scheme by using the aggregated-MAC protocol data unit (A-MPDU) which works with the IEEE 802.15.4 MAC layer. To implement the scheme accurately, we develop a traffic patterns analysis mechanism to understand the requirements of the sensor nodes in patient monitoring systems, then model the channel access to find the performance gap on the basis of obtained requirements, finally propose the design based on the needs of patient monitoring systems. The mechanism is initially verified using numerical modelling and then simulation is conducted using NS2.29, Castalia 3.2 and OMNeT++. The proposed scheme provides the optimal performance considering the required QoS. PMID:28134853
Akbar, Muhammad Sajjad; Yu, Hongnian; Cang, Shuang
2017-01-28
In wireless body area sensor networks (WBASNs), Quality of Service (QoS) provision for patient monitoring systems in terms of time-critical deadlines, high throughput and energy efficiency is a challenging task. The periodic data from these systems generates a large number of small packets in a short time period which needs an efficient channel access mechanism. The IEEE 802.15.4 standard is recommended for low power devices and widely used for many wireless sensor networks applications. It provides a hybrid channel access mechanism at the Media Access Control (MAC) layer which plays a key role in overall successful transmission in WBASNs. There are many WBASN's MAC protocols that use this hybrid channel access mechanism in variety of sensor applications. However, these protocols are less efficient for patient monitoring systems where life critical data requires limited delay, high throughput and energy efficient communication simultaneously. To address these issues, this paper proposes a frame aggregation scheme by using the aggregated-MAC protocol data unit (A-MPDU) which works with the IEEE 802.15.4 MAC layer. To implement the scheme accurately, we develop a traffic patterns analysis mechanism to understand the requirements of the sensor nodes in patient monitoring systems, then model the channel access to find the performance gap on the basis of obtained requirements, finally propose the design based on the needs of patient monitoring systems. The mechanism is initially verified using numerical modelling and then simulation is conducted using NS2.29, Castalia 3.2 and OMNeT++. The proposed scheme provides the optimal performance considering the required QoS.
Di Salvo, Luciana P; Silva, Esdras; Teixeira, Kátia R S; Cote, Rosalba Esquivel; Pereyra, M Alejandra; García de Salamone, Inés E
2014-12-01
Azospirillum is a plant growth-promoting rhizobacteria (PGPR) genus vastly studied and utilized as agriculture inoculants. Isolation of new strains under different environmental conditions allows the access to the genetic diversity and improves the success of inoculation procedures. Historically, the isolation of this genus has been performed by the use of some traditional culture media. In this work we characterized the physiology and biochemistry of five different A. brasilense strains, commonly used as cereal inoculants. The aim of this work is to contribute to pose into revision some concepts concerning the most used protocols to isolate and characterize this bacterium. We characterized their growth in different traditional and non-traditional culture media, evaluated some PGPR mechanisms and characterized their profiles of fatty acid methyl esters and carbon-source utilization. This work shows, for the first time, differences in both profiles, and ACC deaminase activity of A. brasilense strains. Also, we show unexpected results obtained in some of the evaluated culture media. Results obtained here and an exhaustive knowledge revision revealed that it is not appropriate to conclude about bacterial species without analyzing several strains. Also, it is necessary to continue developing studies and laboratory techniques to improve the isolation and characterization protocols. © 2014 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
JavaScript Access to DICOM Network and Objects in Web Browser.
Drnasin, Ivan; Grgić, Mislav; Gogić, Goran
2017-10-01
Digital imaging and communications in medicine (DICOM) 3.0 standard provides the baseline for the picture archiving and communication systems (PACS). The development of Internet and various communication media initiated demand for non-DICOM access to PACS systems. Ever-increasing utilization of the web browsers, laptops and handheld devices, as opposed to desktop applications and static organizational computers, lead to development of different web technologies. The DICOM standard officials accepted those subsequently as tools of alternative access. This paper provides an overview of the current state of development of the web access technology to the DICOM repositories. It presents a different approach of using HTML5 features of the web browsers through the JavaScript language and the WebSocket protocol by enabling real-time communication with DICOM repositories. JavaScript DICOM network library, DICOM to WebSocket proxy and a proof-of-concept web application that qualifies as a DICOM 3.0 device were developed.
Photonics and other approaches to high speed communications
NASA Technical Reports Server (NTRS)
Maly, Kurt
1992-01-01
Our research group of 4 faculty and about 10-15 graduate students was actively involved (as a group) in the development of computer communication networks for the last five years. Many of its individuals have been involved in related research for a much longer period. The overall research goal is to extend network performance to higher data rates, to improve protocol performance at most ISO layers and to improve network operational performance. We briefly state our research goals, then discuss the research accomplishments and direct your attention to attached and/or published papers which cover the following topics: scalable parallel communications; high performance interconnection between high data rate networks; and a simple, effective media access protocol system for integrated, high data rate networks.
Regional South Australia Health (RESONATE) survey: study protocol
Jones, Martin; Gillam, Marianne; May, Esther
2018-01-01
Introduction Access to quality healthcare services is considered a moral right. However, for people living in regional locations, timely access to the services that they need may not always be possible because of structural and attitudinal barriers. This suggests that people living in regional areas may have unmet healthcare needs. The aim of this research will be to examine the healthcare needs, expectations and experiences of regional South Australians. Methods and analysis The Regional South Australia Health (RESONATE) survey is a cross-sectional study of adult health consumers living in any private or non-private dwelling, in any regional, rural, remote or very remote area of South Australia and with an understanding of written English. Data will be collected using a 45-item, multidimensional, self-administered instrument, designed to measure healthcare need, barriers to healthcare access and health service utilisation, attitudes, experiences and satisfaction. The instrument has demonstrated acceptable psychometric properties, including good content validity and internal reliability, good test–retest reliability and a high level of acceptability. The survey will be administered online and in hard-copy, with at least 1832 survey participants to be recruited over a 12-month period, using a comprehensive, multimodal recruitment campaign. Ethics and dissemination The study has been reviewed and approved by the Human Research Ethics Committee of the University of South Australia. The results will be actively disseminated through peer-reviewed journals, conference presentations, social media, broadcast media, print media, the internet and various community/stakeholder engagement activities. PMID:29654014
Jingu, Akiko; Fukuda, Junya; Taketomi-Takahashi, Ayako; Tsushima, Yoshito
2014-10-06
Adverse reactions to iodinated and gadolinium contrast media are an important clinical issue. Although some guidelines have proposed oral steroid premedication protocols to prevent adverse reactions, some patients may have reactions to contrast media in spite of premedication (breakthrough reaction; BTR).The purpose of this study was to assess the frequency, type and severity of BTR when following an oral steroid premedication protocol. All iodinated and gadolinium contrast-enhanced radiologic examinations between August 2011 and February 2013 for which the premedication protocol was applied in our institution were assessed for BTRs. The protocol was applied to a total of 252 examinations (153 patients, ages 15-87 years; 63 males, 90 females). Of these, 152 were for prior acute adverse reactions to contrast media, 85 were for a history of bronchial asthma, and 15 were for other reasons. There were 198 contrast enhanced CTs and 54 contrast enhanced MRIs. There were nine BTR (4.5%) for iodinated contrast media, and only one BTR (1.9%) for gadolinium contrast media: eight were mild and one was moderate. No patient who had a mild index reaction (IR) had a severe BTR. Incidence of BTRs when following the premedication protocol was low. This study by no means proves the efficacy of premedication, but provides some support for following a premedication protocol to improve safety of contrast-enhanced examinations when prior adverse reactions are mild, or when there is a history of asthma.
2014-01-01
Background Adverse reactions to iodinated and gadolinium contrast media are an important clinical issue. Although some guidelines have proposed oral steroid premedication protocols to prevent adverse reactions, some patients may have reactions to contrast media in spite of premedication (breakthrough reaction; BTR). The purpose of this study was to assess the frequency, type and severity of BTR when following an oral steroid premedication protocol. Methods All iodinated and gadolinium contrast-enhanced radiologic examinations between August 2011 and February 2013 for which the premedication protocol was applied in our institution were assessed for BTRs. Results The protocol was applied to a total of 252 examinations (153 patients, ages 15–87 years; 63 males, 90 females). Of these, 152 were for prior acute adverse reactions to contrast media, 85 were for a history of bronchial asthma, and 15 were for other reasons. There were 198 contrast enhanced CTs and 54 contrast enhanced MRIs. There were nine BTR (4.5%) for iodinated contrast media, and only one BTR (1.9%) for gadolinium contrast media: eight were mild and one was moderate. No patient who had a mild index reaction (IR) had a severe BTR. Conclusion Incidence of BTRs when following the premedication protocol was low. This study by no means proves the efficacy of premedication, but provides some support for following a premedication protocol to improve safety of contrast-enhanced examinations when prior adverse reactions are mild, or when there is a history of asthma. PMID:25287952
Denehy, Mel; Crawford, Gemma; Leavy, Justine; Nimmo, Lauren; Jancey, Jonine
2016-01-01
Introduction Worldwide, children under the age of 5 years are at particular risk of drowning. Responding to this need requires the development of evidence-informed drowning prevention strategies. Historically, drowning prevention strategies have included denying access, learning survival skills and providing supervision, as well as education and information which includes the use of mass media. Interventions underpinned by behavioural theory and formative evaluation tend to be more effective, yet few practical examples exist in the drowning and/or injury prevention literature. The Health Belief Model and Social Cognitive Theory will be used to explore participants' perspectives regarding proposed mass media messaging. This paper describes a qualitative protocol to undertake formative research to develop theory-based messages for a child drowning prevention campaign. Methods and analysis The primary data source will be focus group interviews with parents and caregivers of children under 5 years of age in metropolitan and regional Western Australia. Qualitative content analysis will be used to analyse the data. Ethics and dissemination This study will contribute to the drowning prevention literature to inform the development of future child drowning prevention mass media campaigns. Findings from the study will be disseminated to practitioners, policymakers and researchers via international conferences, peer and non-peer-reviewed journals and evidence summaries. The study was submitted and approved by the Curtin University Human Research Ethics Committee. PMID:27207621
Chen, Huifang; Fan, Guangyu; Xie, Lei; Cui, Jun-Hong
2013-01-01
Due to the characteristics of underwater acoustic channel, media access control (MAC) protocols designed for underwater acoustic sensor networks (UWASNs) are quite different from those for terrestrial wireless sensor networks. Moreover, in a sink-oriented network with event information generation in a sensor field and message forwarding to the sink hop-by-hop, the sensors near the sink have to transmit more packets than those far from the sink, and then a funneling effect occurs, which leads to packet congestion, collisions and losses, especially in UWASNs with long propagation delays. An improved CDMA-based MAC protocol, named path-oriented code assignment (POCA) CDMA MAC (POCA-CDMA-MAC), is proposed for UWASNs in this paper. In the proposed MAC protocol, both the round-robin method and CDMA technology are adopted to make the sink receive packets from multiple paths simultaneously. Since the number of paths for information gathering is much less than that of nodes, the length of the spreading code used in the POCA-CDMA-MAC protocol is shorter greatly than that used in the CDMA-based protocols with transmitter-oriented code assignment (TOCA) or receiver-oriented code assignment (ROCA). Simulation results show that the proposed POCA-CDMA-MAC protocol achieves a higher network throughput and a lower end-to-end delay compared to other CDMA-based MAC protocols. PMID:24193100
Chen, Huifang; Fan, Guangyu; Xie, Lei; Cui, Jun-Hong
2013-11-04
Due to the characteristics of underwater acoustic channel, media access control (MAC) protocols designed for underwater acoustic sensor networks (UWASNs) are quite different from those for terrestrial wireless sensor networks. Moreover, in a sink-oriented network with event information generation in a sensor field and message forwarding to the sink hop-by-hop, the sensors near the sink have to transmit more packets than those far from the sink, and then a funneling effect occurs, which leads to packet congestion, collisions and losses, especially in UWASNs with long propagation delays. An improved CDMA-based MAC protocol, named path-oriented code assignment (POCA) CDMA MAC (POCA-CDMA-MAC), is proposed for UWASNs in this paper. In the proposed MAC protocol, both the round-robin method and CDMA technology are adopted to make the sink receive packets from multiple paths simultaneously. Since the number of paths for information gathering is much less than that of nodes, the length of the spreading code used in the POCA-CDMA-MAC protocol is shorter greatly than that used in the CDMA-based protocols with transmitter-oriented code assignment (TOCA) or receiver-oriented code assignment (ROCA). Simulation results show that the proposed POCA-CDMA-MAC protocol achieves a higher network throughput and a lower end-to-end delay compared to other CDMA-based MAC protocols.
Saade, Charbel; Mohamad, May; Kerek, Racha; Hamieh, Nadine; Alsheikh Deeb, Ibrahim; El-Achkar, Bassam; Tamim, Hani; Abdul Razzak, Farah; Haddad, Maurice; Abi-Ghanem, Alain S; El-Merhi, Fadi
The aim of this article was to investigate the opacification of the renal vasculature and the urogenital system during computed tomography urography by using a quadruple-phase contrast media in a triphasic scan protocol. A total of 200 patients with possible urinary tract abnormalities were equally divided between 2 protocols. Protocol A used the conventional single bolus and quadruple-phase scan protocol (pre, arterial, venous, and delayed), retrospectively. Protocol B included a quadruple-phase contrast media injection with a triphasic scan protocol (pre, arterial and combined venous, and delayed), prospectively. Each protocol used 100 mL contrast and saline at a flow rate of 4.5 mL. Attenuation profiles and contrast-to-noise ratio of the renal arteries, veins, and urogenital tract were measured. Effective radiation dose calculation, data analysis by independent sample t test, receiver operating characteristic, and visual grading characteristic analyses were performed. In arterial circulation, only the inferior interlobular arteries in both protocols showed a statistical significance (P < 0.05). Venously, the inferior vena cava, proximal and distal renal veins demonstrated a significant opacification reduction in protocol B than in protocol A (P < 0.001). Protocol B showed a significantly higher mean contrast-to-noise ratio than protocol A (protocol B: 22.68 ± 13.72; protocol A: 14.75 ± 5.76; P < 0.001). Radiation dose was significantly reduced in protocol B (7.38 ± 2.22 mSv) than in protocol A (12.28 ± 2.72 mSv) (P < 0.001). Visual grading characteristic (P < 0.027) and receiver operating characteristic (P < 0.0001) analyses demonstrated a significant preference for protocol B. In computed tomography urography, augmented quadruple-phase contrast media and triphasic scan protocol usage increases the image quality at a reduced radiation dose.
Carter, Ben; Rees, Philippa; Hale, Lauren; Bhattacharjee, Darsharna; Paradkar, Mandar S
2016-12-01
Sleep is vital to children's biopsychosocial development. Inadequate sleep quantity and quality is a public health concern with an array of detrimental health outcomes. Portable mobile and media devices have become a ubiquitous part of children's lives and may affect their sleep duration and quality. To conduct a systematic review and meta-analysis to examine whether there is an association between portable screen-based media device (eg, cell phones and tablet devices) access or use in the sleep environment and sleep outcomes. A search strategy consisting of gray literature and 24 Medical Subject Headings was developed in Ovid MEDLINE and adapted for other databases between January 1, 2011, and June 15, 2015. Searches of the published literature were conducted across 12 databases. No language restriction was applied. The analysis included randomized clinical trials, cohort studies, and cross-sectional study designs. Inclusion criteria were studies of school-age children between 6 and 19 years. Exclusion criteria were studies of stationary exposures, such as televisions or desktop or personal computers, or studies investigating electromagnetic radiation. Of 467 studies identified, 20 cross-sectional studies were assessed for methodological quality. Two reviewers independently extracted data. The primary outcomes were inadequate sleep quantity, poor sleep quality, and excessive daytime sleepiness, studied according to an a priori protocol. Twenty studies were included, and their quality was assessed. The studies involved 125 198 children (mean [SD] age, 14.5 [2.2] years; 50.1% male). There was a strong and consistent association between bedtime media device use and inadequate sleep quantity (odds ratio [OR], 2.17; 95% CI, 1.42-3.32) (P < .001, I2 = 90%), poor sleep quality (OR, 1.46; 95% CI, 1.14-1.88) (P = .003, I2 = 76%), and excessive daytime sleepiness (OR, 2.72; 95% CI, 1.32-5.61) (P = .007, I2 = 50%). In addition, children who had access to (but did not use) media devices at night were more likely to have inadequate sleep quantity (OR, 1.79; 95% CI, 1.39-2.31) (P < .001, I2 = 64%), poor sleep quality (OR, 1.53; 95% CI, 1.11-2.10) (P = .009, I2 = 74%), and excessive daytime sleepiness (OR, 2.27; 95% CI, 1.54-3.35) (P < .001, I2 = 24%). To date, this study is the first systematic review and meta-analysis of the association of access to and the use of media devices with sleep outcomes. Bedtime access to and use of a media device were significantly associated with the following: inadequate sleep quantity, poor sleep quality, and excessive daytime sleepiness. An integrated approach among teachers, health care professionals, and parents is required to minimize device access at bedtime, and future research is needed to evaluate the influence of the devices on sleep hygiene and outcomes.
A meta-analysis of the effect of media devices on sleep outcomes
Carter, Ben; Rees, Philippa; Hale, Lauren; Bhattacharjee, Darsharna; Paradkar, Mandar
2017-01-01
Importance Sleep is vital to children’s bio-psycho-social development. Inadequate sleep quantity and quality is a public health concern with an array of detrimental health outcomes. Portable mobile and media device have become a ubiquitous part of children’s lives and may impact children’s sleep duration and quality. Objective This systematic review was conducted to examine the effect of portable media devices (e.g. mobile phones, and tablet devices) on sleep outcomes Data Sources A search strategy was developed and searches of the published and grey literature were conducted across 12 databases from January 1st 2011 to June 15th, 2015. No language restriction was applied. Study Selection We included randomized controlled trials; cohort; and cross sectional study designs. Of 467 studies identified, 20 cross-sectional studies were assessed for quality Data Extraction and Synthesis Data extraction and quality assessment was independently carried out by two reviewers and disagreements resolved by a third. Data was pooled in a random-effects meta-analysis, and an individual participant meta-analysis was carried out where possible. Main Outcomes and Measures The primary outcomes were: inadequate sleep quantity; poor sleep quality; and excessive daytime sleepiness, carried out following an a priori protocol. Results Twenty studies were included and quality assessed, involving 125,198 children, 50.1% were male. There was a strong and consistent association between bedtime media device use and: inadequate sleep quantity (OR =2.17; 95%CI 1.42-3.32); poor sleep quality (OR=1.46; 95%CI 1.14-1.88); and excessive daytime sleepiness (OR=2.72; 95%CI 1.32-5.61). Additionally, children who had access to (but did not use) media devices at night were more likely to have inadequate: sleep quantity (OR=1.79; 95%CI 1.39-2.31); sleep quality (OR=1.53; 95%CI 1.11-2.10); and daytime sleepiness (OR=2.27; 95%CI 1.54-3.35). Conclusions and relevance This was the first meta-analysis of the effect of access and use of media device on sleep outcomes. Bedtime access and use of media devices was significantly associated with inadequate sleep quantity; poor sleep quality; and excessive daytime sleepiness. An integrated approach between teachers, healthcare providers and parents is needed to minimize device access at bedtime, and future research is needed to evaluate the impact on sleep hygiene and outcomes. PMID:27802500
Construction of a multimedia application on public network
NASA Astrophysics Data System (ADS)
Liu, Jang; Wang, Chwan-Huei; Tseng, Ming-Yu; Hsiao, Sun-Lang; Luo, Wen-Hen; Tseng, Yung-Mean; Hung, Feng-Yue
1994-04-01
This paper describes our perception of current developments in networking, telecommunication and technology of multimedia. As such, we have taken a constructive view. From this standpoint, we devised a client server architecture that veils servers from their customers. It adheres to our conviction that network and location independence for serve access is a future trend. We have constructed an on-line KARAOKE on an existing CVS (Chinese Videotex System) to test the workability of this architecture and it works well. We are working on a prototype multimedia service network which is a miniature client server structure of our proposal. A specially designed protocol is described. Through this protocol, an one-to-many connection can be set up and to provide for multimedia applications, new connections can be established within a basic connection. So continuous media may have their own connections without being interrupted by other media, at least from the view of an application. We have advanced a constructive view which is not a framework itself. But it is tantamount to a framework, in building systems as assembly of methods, technics, designs, and ideas. This is what a framework does with more flexibility and availability.
Rosser, B. R. Simon; Kilian, Gunna; West, William G.
2012-01-01
Certain research topics - including studies of sexual behavior, substance use, and HIV risk -- are more likely to be scrutinized by the media and groups opposed to this area of research. When studying topics that others might deem controversial, it is critical that researchers anticipate potential negative media events prior to their occurrence. By developing an Emergency Public Relations Protocol at the genesis of a study, researchers can identify and plan for events that might result in higher scrutiny. For each identified risk, a good protocol details procedures to enact before, during and after a media event. This manuscript offers recommendations for developing a protocol based on both Situational Crisis Communication Theory and our experience as an HIV prevention research group who recently experienced such an event. The need to have procedures in place to monitor and address social media is highlighted. PMID:23565067
Rosser, B R Simon; Kilian, Gunna; West, William G
2013-03-01
Certain research topics - including studies of sexual behavior, substance use, and HIV risk -- are more likely to be scrutinized by the media and groups opposed to this area of research. When studying topics that others might deem controversial, it is critical that researchers anticipate potential negative media events prior to their occurrence. By developing an Emergency Public Relations Protocol at the genesis of a study, researchers can identify and plan for events that might result in higher scrutiny. For each identified risk, a good protocol details procedures to enact before, during and after a media event. This manuscript offers recommendations for developing a protocol based on both Situational Crisis Communication Theory and our experience as an HIV prevention research group who recently experienced such an event. The need to have procedures in place to monitor and address social media is highlighted.
#FoundThem-21st Century pre-search and post-detection seti protocols for social and digital media
NASA Astrophysics Data System (ADS)
Forgan, Duncan; Scholz, Alexander
2016-09-01
The transmission of news stories in global culture has changed fundamentally in the last three decades. The general public are alerted to breaking stories on increasingly rapid timescales, and the discussion/distortion of facts by writers, bloggers, commenters and Internet users can also be extremely fast. The narrative of a news item no longer belongs to a small cadre of conventional media outlets, but is instead synthesised to some level by the public as they select where and how they consume news. The IAA Search for Extraterrestrial Intelligence (SETI) post-detection protocols, initially drafted in 1989 and updated in 2010, were written to guide SETI scientists in the event of detecting evidence of extraterrestrial intelligence, but do not give guidance as to how scientists should prepare to navigate this media maelstrom. The protocols assume communication channels between scientists and the public still resemble those of 1989, which were specifically one-way with a narrative controlled by a select few media outlets. Modern SETI researchers must consider this modern paradigm for consumption of news by the public, using social media and other non-traditional outlets, when planning and executing searches for extraterrestrial intelligence. We propose additions to the post detection protocols as they pertain to the use of the Internet and social media, as well as pre-search protocols. It is our belief that such protocols are necessary if there is to be a well-informed, sane global conversation amongst the world's citizens following the discovery of intelligent life beyond the Earth.
NASA Astrophysics Data System (ADS)
Yu, Si-Ming; Laromaine, Anna; Roig, Anna
2014-07-01
Superparamagnetic iron oxide nanoparticles (SPIONs) are widely used for biological applications due to their unique properties compared to their bulk counterparts, simplified SPIONs stabilization protocols applicable for a wide spectra of biological media remains a challenging issue. In this work, SPIONs with different surface coatings, tetramethylammonium hydroxide-coated SPIONs (T-SPIONs), and citrate-coated SPIONs (C-SPIONs) were synthesized by a facile, rapid and cost effective microwave-assisted method. C-SPIONs show robust stability in biological media of phosphate buffered saline and Roswell Park Memorial Institute Medium, while destabilize in DMEM. T-SPIONs were found to aggregate rapidly and significantly in all tested media. Then, a modified pH adjusted-BSA adsorption protocol and an addition of excess trisodium citrate dihydrate (Na3Cit) were used to enhance their stability in the media. The BSA adsorption protocol showed great efficiency in stabilizing the dispersed state of both SPIONs in the tested media, while the addition of excess Na3Cit showed limited effect, and it was only applicable for C-SPIONs. The formed BSA layer on SPIONs could be imaged by negative staining TEM, and revealed by Cryo-TEM, FTIR, DLS, and the zeta potential measurements. Results indicated that BSA forms a monolayer of a thickness of about 3 ± 1 nm and BSA interacts with C-SPIONs and T-SPIONs through their coating, rather than by replacing them. This synthetic method and stabilization protocol offer a general methodology to obtain SPIONs with a variety of surfactants, stable in different biological media in few minutes.
Social Media Use and Access to Digital Technology in US Young Adults in 2016.
Villanti, Andrea C; Johnson, Amanda L; Ilakkuvan, Vinu; Jacobs, Megan A; Graham, Amanda L; Rath, Jessica M
2017-06-07
In 2015, 90% of US young adults with Internet access used social media. Digital and social media are highly prevalent modalities through which young adults explore identity formation, and by extension, learn and transmit norms about health and risk behaviors during this developmental life stage. The purpose of this study was to provide updated estimates of social media use from 2014 to 2016 and correlates of social media use and access to digital technology in data collected from a national sample of US young adults in 2016. Young adult participants aged 18-24 years in Wave 7 (October 2014, N=1259) and Wave 9 (February 2016, N=989) of the Truth Initiative Young Adult Cohort Study were asked about use frequency for 11 social media sites and access to digital devices, in addition to sociodemographic characteristics. Regular use was defined as using a given social media site at least weekly. Weighted analyses estimated the prevalence of use of each social media site, overlap between regular use of specific sites, and correlates of using a greater number of social media sites regularly. Bivariate analyses identified sociodemographic correlates of access to specific digital devices. In 2014, 89.42% (weighted n, 1126/1298) of young adults reported regular use of at least one social media site. This increased to 97.5% (weighted n, 965/989) of young adults in 2016. Among regular users of social media sites in 2016, the top five sites were Tumblr (85.5%), Vine (84.7%), Snapchat (81.7%), Instagram (80.7%), and LinkedIn (78.9%). Respondents reported regularly using an average of 7.6 social media sites, with 85% using 6 or more sites regularly. Overall, 87% of young adults reported access or use of a smartphone with Internet access, 74% a desktop or laptop computer with Internet access, 41% a tablet with Internet access, 29% a smart TV or video game console with Internet access, 11% a cell phone without Internet access, and 3% none of these. Access to all digital devices with Internet was lower in those reporting a lower subjective financial situation; there were also significant differences in access to specific digital devices with Internet by race, ethnicity, and education. The high mean number of social media sites used regularly and the substantial overlap in use of multiple social media sites reflect the rapidly changing social media environment. Mobile devices are a primary channel for social media, and our study highlights disparities in access to digital technologies with Internet access among US young adults by race/ethnicity, education, and subjective financial status. Findings from this study may guide the development and implementation of future health interventions for young adults delivered via the Internet or social media sites. ©Andrea C Villanti, Amanda L Johnson, Vinu Ilakkuvan, Megan A Jacobs, Amanda L Graham, Jessica M Rath. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 07.06.2017.
Social Media Use and Access to Digital Technology in US Young Adults in 2016
Johnson, Amanda L; Ilakkuvan, Vinu; Jacobs, Megan A; Graham, Amanda L; Rath, Jessica M
2017-01-01
Background In 2015, 90% of US young adults with Internet access used social media. Digital and social media are highly prevalent modalities through which young adults explore identity formation, and by extension, learn and transmit norms about health and risk behaviors during this developmental life stage. Objective The purpose of this study was to provide updated estimates of social media use from 2014 to 2016 and correlates of social media use and access to digital technology in data collected from a national sample of US young adults in 2016. Methods Young adult participants aged 18-24 years in Wave 7 (October 2014, N=1259) and Wave 9 (February 2016, N=989) of the Truth Initiative Young Adult Cohort Study were asked about use frequency for 11 social media sites and access to digital devices, in addition to sociodemographic characteristics. Regular use was defined as using a given social media site at least weekly. Weighted analyses estimated the prevalence of use of each social media site, overlap between regular use of specific sites, and correlates of using a greater number of social media sites regularly. Bivariate analyses identified sociodemographic correlates of access to specific digital devices. Results In 2014, 89.42% (weighted n, 1126/1298) of young adults reported regular use of at least one social media site. This increased to 97.5% (weighted n, 965/989) of young adults in 2016. Among regular users of social media sites in 2016, the top five sites were Tumblr (85.5%), Vine (84.7%), Snapchat (81.7%), Instagram (80.7%), and LinkedIn (78.9%). Respondents reported regularly using an average of 7.6 social media sites, with 85% using 6 or more sites regularly. Overall, 87% of young adults reported access or use of a smartphone with Internet access, 74% a desktop or laptop computer with Internet access, 41% a tablet with Internet access, 29% a smart TV or video game console with Internet access, 11% a cell phone without Internet access, and 3% none of these. Access to all digital devices with Internet was lower in those reporting a lower subjective financial situation; there were also significant differences in access to specific digital devices with Internet by race, ethnicity, and education. Conclusions The high mean number of social media sites used regularly and the substantial overlap in use of multiple social media sites reflect the rapidly changing social media environment. Mobile devices are a primary channel for social media, and our study highlights disparities in access to digital technologies with Internet access among US young adults by race/ethnicity, education, and subjective financial status. Findings from this study may guide the development and implementation of future health interventions for young adults delivered via the Internet or social media sites. PMID:28592394
Media perspective - new opportunities for reaching audiences
NASA Astrophysics Data System (ADS)
Haswell, Katy
2007-08-01
The world of media is experiencing a period of extreme and rapid change with the rise of internet television and the download generation. Many young people no longer watch standard TV. Instead, they go on-line, talking to friends and downloading pictures, videos, music clips to put on their own websites and watch/ listen to on their laptops and mobile phones. Gone are the days when TV controllers determined what you watched and when you watched it. Now the buzzword is IPTV, Internet Protocol Television, with companies such as JOOST offering hundreds of channels on a wide range of subjects, all of which you can choose to watch when and where you wish, on your high-def widescreen with stereo surround sound at home or on your mobile phone on the train. This media revolution is changing the way organisations get their message out. And it is encouraging companies such as advertising agencies to be creative about new ways of accessing audiences. The good news is that we have fresh opportunities to reach young people through internet-based media and material downloaded through tools such as games machines, as well as through the traditional media. And it is important for Europlanet to make the most of these new and exciting developments.
Castro, Luis A; Favela, Jesus; Garcia-Peña, Carmen
2014-11-01
The transition from paper to electronic-based records in the healthcare industry has posed several challenges to conventional medical practices. The introduction of technology in day-to-day medical and nursing practices deserves careful consideration. In this work, we report the results of a controlled experiment to compare nurses' consultation in emergency calls in six different conditions. We studied the effect that the type of communication media (face-to-face, telephone, videoconference) and type of nursing protocol media (paper-based, electronic-based) can have on consultation time, mistakes made, pauses during consultation, eye contact, and efficacy of the consultation. We found that the type of communication media has an effect on consultation time; on average, fewer mistakes were made during telephone-based consultations; for eye contact, there were significantly fewer eye contacts during face-to-face than during videoconference consultations; finally, the type of communication media or protocol media did not have any effect in the efficacy of the consultation.
Ross, Sue; Magee, Laura; Walker, Mark; Wood, Stephen
2012-12-27
Intellectual property is associated with the creative work needed to design clinical trials. Two approaches have developed to protect the intellectual property associated with multicentre trial protocols prior to site initiation. The 'open access' approach involves publishing the protocol, permitting easy access to the complete protocol. The main advantages of the open access approach are that the protocol is freely available to all stakeholders, permitting them to discuss the protocol widely with colleagues, assess the quality and rigour of the protocol, determine the feasibility of conducting the trial at their centre, and after trial completion, to evaluate the reported findings based on a full understanding of the protocol. The main potential disadvantage of this approach is the potential for plagiarism; however if that occurred, it should be easy to identify because of the open access to the original trial protocol, as well as ensure that appropriate sanctions are used to deal with plagiarism. The 'restricted access' approach involves the use of non-disclosure agreements, legal documents that must be signed between the trial lead centre and collaborative sites. Potential sites must guarantee they will not disclose any details of the study before they are permitted to access the protocol. The main advantages of the restricted access approach are for the lead institution and nominated principal investigator, who protect their intellectual property associated with the trial. The main disadvantages are that ownership of the protocol and intellectual property is assigned to the lead institution; defining who 'needs to know' about the study protocol is difficult; and the use of non-disclosure agreements involves review by lawyers and institutional representatives at each site before access is permitted to the protocol, significantly delaying study implementation and adding substantial indirect costs to research institutes. This extra step may discourage sites from joining a trial. It is possible that the restricted access approach may contribute to the failure of well-designed trials without any significant benefit in protecting intellectual property. Funding agencies should formalize rules around open versus restricted access to the study protocol just as they have around open access to results.
Fault recovery in the reliable multicast protocol
NASA Technical Reports Server (NTRS)
Callahan, John R.; Montgomery, Todd L.; Whetten, Brian
1995-01-01
The Reliable Multicast Protocol (RMP) provides a unique, group-based model for distributed programs that need to handle reconfiguration events at the application layer. This model, called membership views, provides an abstraction in which events such as site failures, network partitions, and normal join-leave events are viewed as group reformations. RMP provides access to this model through an application programming interface (API) that notifies an application when a group is reformed as the result of a some event. RMP provides applications with reliable delivery of messages using an underlying IP Multicast (12, 5) media to other group members in a distributed environment even in the case of reformations. A distributed application can use various Quality of Service (QoS) levels provided by RMP to tolerate group reformations. This paper explores the implementation details of the mechanisms in RMP that provide distributed applications with membership view information and fault recovery capabilities.
Specification and Design of a Fault Recovery Model for the Reliable Multicast Protocol
NASA Technical Reports Server (NTRS)
Montgomery, Todd; Callahan, John R.; Whetten, Brian
1996-01-01
The Reliable Multicast Protocol (RMP) provides a unique, group-based model for distributed programs that need to handle reconfiguration events at the application layer. This model, called membership views, provides an abstraction in which events such as site failures, network partitions, and normal join-leave events are viewed as group reformations. RMP provides access to this model through an application programming interface (API) that notifies an application when a group is reformed as the result of a some event. RMP provides applications with reliable delivery of messages using an underlying IP Multicast media to other group members in a distributed environment even in the case of reformations. A distributed application can use various Quality of Service (QoS) levels provided by RMP to tolerate group reformations. This paper explores the implementation details of the mechanisms in RMP that provide distributed applications with membership view information and fault recovery capabilities.
van Rensburg, Samuel H; Klingensmith, Katherine; McLaughlin, Paige; Qayyum, Zheala; van Schalkwyk, Gerrit I
2016-02-01
Social media is an increasingly dominant platform for communication, especially among adolescents. Statements from professional bodies and a growing body of empirical evidence support a role for social media in improving provider-patient interactions. In psychiatry, particular concerns exist about the suitability of this style of communication. Very limited data are available exploring how patients would like to incorporate social media into their communication with their psychiatric providers. We conducted a qualitative study with 20 adolescents attending the Yale Psychiatric Hospital Intensive Outpatient Programme. Interviews were analysed using inductive thematic analysis. Participants highlighted how social media could allow for constant access to a mental health provider, provide a less anxiety-provoking mode of communication, and allow for them to be monitored in a more on-going fashion. However, participants also identified many potential risks associated with these applications, including the potential for anxiety if a provider was not able to respond immediately, and a sense that online interactions would be less rich overall. Our findings suggest that adolescents are open to the idea of communicating with mental health providers over social media and are able to describe a number of instances where this could be of value. The risks participants described, as well as concerns raised by existing literature, indicate the need for further work and protocol development in order for social media to be a feasible tool for communication between providers and adolescents with psychiatric illness. © 2015 John Wiley & Sons Ltd.
Access and accounting schemes of wireless broadband
NASA Astrophysics Data System (ADS)
Zhang, Jian; Huang, Benxiong; Wang, Yan; Yu, Xing
2004-04-01
In this paper, two wireless broadband access and accounting schemes were introduced. There are some differences in the client and the access router module between them. In one scheme, Secure Shell (SSH) protocol is used in the access system. The SSH server makes the authentication based on private key cryptography. The advantage of this scheme is the security of the user's information, and we have sophisticated access control. In the other scheme, Secure Sockets Layer (SSL) protocol is used the access system. It uses the technology of public privacy key. Nowadays, web browser generally combines HTTP and SSL protocol and we use the SSL protocol to implement the encryption of the data between the clients and the access route. The schemes are same in the radius sever part. Remote Authentication Dial in User Service (RADIUS), as a security protocol in the form of Client/Sever, is becoming an authentication/accounting protocol for standard access to the Internet. It will be explained in a flow chart. In our scheme, the access router serves as the client to the radius server.
Code of Federal Regulations, 2012 CFR
2012-10-01
... identification media that one or more airports accepts as airport-approved media for unescorted access authority... identification media that one or more airports accepts as airport-approved media for unescorted access authority... aircraft operator identification medium to that individual; (3) Authorizing that individual to perform...
Code of Federal Regulations, 2013 CFR
2013-10-01
... identification media that one or more airports accepts as airport-approved media for unescorted access authority... identification media that one or more airports accepts as airport-approved media for unescorted access authority... aircraft operator identification medium to that individual; (3) Authorizing that individual to perform...
Code of Federal Regulations, 2014 CFR
2014-10-01
... identification media that one or more airports accepts as airport-approved media for unescorted access authority... identification media that one or more airports accepts as airport-approved media for unescorted access authority... aircraft operator identification medium to that individual; (3) Authorizing that individual to perform...
Code of Federal Regulations, 2010 CFR
2010-10-01
... identification media that one or more airports accepts as airport-approved media for unescorted access authority... identification media that one or more airports accepts as airport-approved media for unescorted access authority... aircraft operator identification medium to that individual; (3) Authorizing that individual to perform...
Code of Federal Regulations, 2011 CFR
2011-10-01
... identification media that one or more airports accepts as airport-approved media for unescorted access authority... identification media that one or more airports accepts as airport-approved media for unescorted access authority... aircraft operator identification medium to that individual; (3) Authorizing that individual to perform...
Quiroz, Karla A; Berríos, Miguel; Carrasco, Basilio; Retamales, Jorge B; Caligari, Peter D S; García-Gonzáles, Rolando
2017-06-02
Vegetative propagation of Fragaria sp. is traditionally carried out using stolons. This system of propagation, in addition to being slow, can spread plant diseases, particularly serious being viral. In vitro culture of meristems and the establishment of micropropagation protocols are important tools for solving these problems. In recent years, considerable effort has been made to develop in vitro propagation of the commercial strawberry in order to produce virus-free plants of high quality. These previous results can serve as the basis for developing in vitro-based propagation technologies in the less studied species Fragaria chiloensis. In this context, we studied the cultivation of meristems and establishment of a micropropagation protocol for F. chiloensis. The addition of polyvinylpyrrolidone (PVP) improved the meristem regeneration efficiency of F. chiloensis accessions. Similarly, the use of 6-benzylaminopurine (BAP) in the culture media increased the average rate of multiplication to 3-6 shoots per plant. In addition, the use of 6-benzylaminopurine (BAP), had low levels (near zero) of explant losses due to oxidation. However, plant height as well as number of leaves and roots were higher in media without growth regulators, with average values of 0.5 cm, 9 leaves and 4 roots per plant. For the first time in Chilean strawberry, meristem culture demonstrated to be an efficient tool for eliminating virus from infected plants, giving the possibility to produce disease free propagation material. Also, the addition of PVP into the basal MS medium improved the efficiency of plant recovery from isolated meristems. Farmers can now access to high quality plant material produced by biotech tools which will improve their technological practices.
The SHIP: A SIP to HTTP Interaction Protocol
NASA Astrophysics Data System (ADS)
Zeiß, Joachim; Gabner, Rene; Bessler, Sandford; Happenhofer, Marco
IMS is capable of providing a wide range of services. As a result, terminal software becomes more and more complex to deliver network intelligence to user applications. Currently mobile terminal software needs to be permanently updated so that the latest network services and functionality can be delivered to the user. In the Internet, browser based user interfaces assure that an interface is made available to the user which offers the latest services in the net immediately. Our approach combines the benefits of the Session Initiation Protocol (SIP) and those of the HTTP protocol to bring the same type of user interfacing to IMS. SIP (IMS) realizes authentication, session management, charging and Quality of Service (QoS), HTTP provides access to Internet services and allows the user interface of an application to run on a mobile terminal while processing and orchestration is done on the server. A SHIP enabled IMS client only needs to handle data transport and session management via SIP, HTTP and RTP and render streaming media, HTML and Javascript. SHIP allows new kinds of applications, which combine audio, video and data within a single multimedia session.
High-Throughput Screening Assay for Embryoid Body Differentiation of Human Embryonic Stem Cells
Outten, Joel T.; Gadue, Paul; French, Deborah L.; Diamond, Scott L.
2012-01-01
Serum-free human pluripotent stem cell media offer the potential to develop reproducible clinically applicable differentiation strategies and protocols. The vast array of possible growth factor and cytokine combinations for media formulations makes differentiation protocol optimization both labor and cost-intensive. This unit describes a 96-well plate, 4-color flow cytometry-based screening assay to optimize pluripotent stem cell differentiation protocols. We provide conditions both to differentiate human embryonic stem cells (hESCs) to the three primary germ layers, ectoderm, endoderm, and mesoderm, and to utilize flow cytometry to distinguish between them. This assay exhibits low inter-well variability and can be utilized to efficiently screen a variety of media formulations, reducing cost, incubator space, and labor. Protocols can be adapted to a variety of differentiation stages and lineages. PMID:22415836
Simple algorithm for improved security in the FDDI protocol
NASA Astrophysics Data System (ADS)
Lundy, G. M.; Jones, Benjamin
1993-02-01
We propose a modification to the Fiber Distributed Data Interface (FDDI) protocol based on a simple algorithm which will improve confidential communication capability. This proposed modification provides a simple and reliable system which exploits some of the inherent security properties in a fiber optic ring network. This method differs from conventional methods in that end to end encryption can be facilitated at the media access control sublayer of the data link layer in the OSI network model. Our method is based on a variation of the bit stream cipher method. The transmitting station takes the intended confidential message and uses a simple modulo two addition operation against an initialization vector. The encrypted message is virtually unbreakable without the initialization vector. None of the stations on the ring will have access to both the encrypted message and the initialization vector except the transmitting and receiving stations. The generation of the initialization vector is unique for each confidential transmission and thus provides a unique approach to the key distribution problem. The FDDI protocol is of particular interest to the military in terms of LAN/MAN implementations. Both the Army and the Navy are considering the standard as the basis for future network systems. A simple and reliable security mechanism with the potential to support realtime communications is a necessary consideration in the implementation of these systems. The proposed method offers several advantages over traditional methods in terms of speed, reliability, and standardization.
2012-01-01
Intellectual property is associated with the creative work needed to design clinical trials. Two approaches have developed to protect the intellectual property associated with multicentre trial protocols prior to site initiation. The ‘open access’ approach involves publishing the protocol, permitting easy access to the complete protocol. The main advantages of the open access approach are that the protocol is freely available to all stakeholders, permitting them to discuss the protocol widely with colleagues, assess the quality and rigour of the protocol, determine the feasibility of conducting the trial at their centre, and after trial completion, to evaluate the reported findings based on a full understanding of the protocol. The main potential disadvantage of this approach is the potential for plagiarism; however if that occurred, it should be easy to identify because of the open access to the original trial protocol, as well as ensure that appropriate sanctions are used to deal with plagiarism. The ‘restricted access’ approach involves the use of non-disclosure agreements, legal documents that must be signed between the trial lead centre and collaborative sites. Potential sites must guarantee they will not disclose any details of the study before they are permitted to access the protocol. The main advantages of the restricted access approach are for the lead institution and nominated principal investigator, who protect their intellectual property associated with the trial. The main disadvantages are that ownership of the protocol and intellectual property is assigned to the lead institution; defining who ‘needs to know’ about the study protocol is difficult; and the use of non-disclosure agreements involves review by lawyers and institutional representatives at each site before access is permitted to the protocol, significantly delaying study implementation and adding substantial indirect costs to research institutes. This extra step may discourage sites from joining a trial. It is possible that the restricted access approach may contribute to the failure of well-designed trials without any significant benefit in protecting intellectual property. Funding agencies should formalize rules around open versus restricted access to the study protocol just as they have around open access to results. PMID:23270486
Denehy, Mel; Crawford, Gemma; Leavy, Justine; Nimmo, Lauren; Jancey, Jonine
2016-05-20
Worldwide, children under the age of 5 years are at particular risk of drowning. Responding to this need requires the development of evidence-informed drowning prevention strategies. Historically, drowning prevention strategies have included denying access, learning survival skills and providing supervision, as well as education and information which includes the use of mass media. Interventions underpinned by behavioural theory and formative evaluation tend to be more effective, yet few practical examples exist in the drowning and/or injury prevention literature. The Health Belief Model and Social Cognitive Theory will be used to explore participants' perspectives regarding proposed mass media messaging. This paper describes a qualitative protocol to undertake formative research to develop theory-based messages for a child drowning prevention campaign. The primary data source will be focus group interviews with parents and caregivers of children under 5 years of age in metropolitan and regional Western Australia. Qualitative content analysis will be used to analyse the data. This study will contribute to the drowning prevention literature to inform the development of future child drowning prevention mass media campaigns. Findings from the study will be disseminated to practitioners, policymakers and researchers via international conferences, peer and non-peer-reviewed journals and evidence summaries. The study was submitted and approved by the Curtin University Human Research Ethics Committee. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/
Medium Access Control Protocols for Cognitive Radio Ad Hoc Networks: A Survey
Islam, A. K. M. Muzahidul; Baharun, Sabariah; Mansoor, Nafees
2017-01-01
New wireless network paradigms will demand higher spectrum use and availability to cope with emerging data-hungry devices. Traditional static spectrum allocation policies cause spectrum scarcity, and new paradigms such as Cognitive Radio (CR) and new protocols and techniques need to be developed in order to have efficient spectrum usage. Medium Access Control (MAC) protocols are accountable for recognizing free spectrum, scheduling available resources and coordinating the coexistence of heterogeneous systems and users. This paper provides an ample review of the state-of-the-art MAC protocols, which mainly focuses on Cognitive Radio Ad Hoc Networks (CRAHN). First, a description of the cognitive radio fundamental functions is presented. Next, MAC protocols are divided into three groups, which are based on their channel access mechanism, namely time-slotted protocol, random access protocol and hybrid protocol. In each group, a detailed and comprehensive explanation of the latest MAC protocols is presented, as well as the pros and cons of each protocol. A discussion on future challenges for CRAHN MAC protocols is included with a comparison of the protocols from a functional perspective. PMID:28926952
Determination of pore-scale hydrate phase equilibria in sediments using lab-on-a-chip technology.
Almenningen, Stian; Flatlandsmo, Josef; Kovscek, Anthony R; Ersland, Geir; Fernø, Martin A
2017-11-21
We present an experimental protocol for fast determination of hydrate stability in porous media for a range of pressure and temperature (P, T) conditions. Using a lab-on-a-chip approach, we gain direct optical access to dynamic pore-scale hydrate formation and dissociation events to study the hydrate phase equilibria in sediments. Optical pore-scale observations of phase behavior reproduce the theoretical hydrate stability line with methane gas and distilled water, and demonstrate the accuracy of the new method. The procedure is applicable for any kind of hydrate transitions in sediments, and may be used to map gas hydrate stability zones in nature.
Rice, Simon; Robinson, Jo; Bendall, Sarah; Hetrick, Sarah; Cox, Georgina; Bailey, Eleanor; Gleeson, John; Alvarez-Jimenez, Mario
2016-01-01
Objective: Suicide remains a major global public health issue for young people. The reach and accessibility of online and social media-based interventions herald a unique opportunity for suicide prevention. To date, the large body of research into suicide prevention has been undertaken atheoretically. This paper provides a rationale and theoretical framework (based on the interpersonal theory of suicide), and draws on our experiences of developing and testing online and social media-based interventions. Method: The implementation of three distinct online and social media-based intervention studies, undertaken with young people at risk of suicide, are discussed. We highlight the ways that these interventions can serve to bolster social connectedness in young people, and outline key aspects of intervention implementation and moderation. Results: Insights regarding the implementation of these studies include careful protocol development mindful of risk and ethical issues, establishment of suitably qualified teams to oversee development and delivery of the intervention, and utilisation of key aspects of human support (i.e., moderation) to encourage longer-term intervention engagement. Conclusions: Online and social media-based interventions provide an opportunity to enhance feelings of connectedness in young people, a key component of the interpersonal theory of suicide. Our experience has shown that such interventions can be feasibly and safely conducted with young people at risk of suicide. Further studies, with controlled designs, are required to demonstrate intervention efficacy. PMID:27274743
Rice, Simon; Robinson, Jo; Bendall, Sarah; Hetrick, Sarah; Cox, Georgina; Bailey, Eleanor; Gleeson, John; Alvarez-Jimenez, Mario
2016-01-01
Suicide remains a major global public health issue for young people. The reach and accessibility of online and social media-based interventions herald a unique opportunity for suicide prevention. To date, the large body of research into suicide prevention has been undertaken atheoretically. This paper provides a rationale and theoretical framework (based on the interpersonal theory of suicide), and draws on our experiences of developing and testing online and social media-based interventions. The implementation of three distinct online and social media-based intervention studies, undertaken with young people at risk of suicide, are discussed. We highlight the ways that these interventions can serve to bolster social connectedness in young people, and outline key aspects of intervention implementation and moderation. Insights regarding the implementation of these studies include careful protocol development mindful of risk and ethical issues, establishment of suitably qualified teams to oversee development and delivery of the intervention, and utilisation of key aspects of human support (i.e., moderation) to encourage longer-term intervention engagement. Online and social media-based interventions provide an opportunity to enhance feelings of connectedness in young people, a key component of the interpersonal theory of suicide. Our experience has shown that such interventions can be feasibly and safely conducted with young people at risk of suicide. Further studies, with controlled designs, are required to demonstrate intervention efficacy.
Research in DRM architecture based on watermarking and PKI
NASA Astrophysics Data System (ADS)
Liu, Ligang; Chen, Xiaosu; Xiao, Dao-ju; Yi, Miao
2005-02-01
Analyze the virtue and disadvantage of the present digital copyright protecting system, design a kind of security protocol model of digital copyright protection, which equilibrium consider the digital media"s use validity, integrality, security of transmission, and trade equity, make a detailed formalize description to the protocol model, analyze the relationship of the entities involved in the digital work copyright protection. The analysis of the security and capability of the protocol model shows that the model is good at security and practicability.
Rachul, Christen; Caulfield, Timothy
2015-08-25
Previous studies have demonstrated how the media has an influence on policy decisions and healthcare coverage. Studies of Canadian media have shown that news coverage often emphasizes and hypes certain aspects of high profile health debates. We hypothesized that in Canadian media coverage of access to healthcare issues about therapies and technologies including for rare diseases, the media would be largely sympathetic towards patients, thus adding to public debate that largely favors increased access to healthcare-even in the face of equivocal evidence regarding efficacy. In order to test this hypothesis, we conducted a content analysis of 530 news articles about access to health therapies and technologies from 15 major Canadian newspapers over a 10-year period. Articles were analyzed for the perspectives presented in the articles and the types of reasons or arguments presented either for or against the particular access issue portrayed in the news articles. We found that news media coverage was largely sympathetic towards increasing healthcare funding and ease of access to healthcare (77.4 %). Rare diseases and orphan drugs were the most common issues raised (22.6 %). Patients perspectives were often highlighted in articles (42.3 %). 96.8 % of articles discussed why access to healthcare needs to increase, and discussion that questioned increased access was only included in 33.6 % articles. We found that news media favors a patient access ethos, which may contribute to a difficult policy-making environment.
Synthesizing Existing CSMA and TDMA Based MAC Protocols for VANETs
Huang, Jiawei; Li, Qi; Zhong, Shaohua; Liu, Lianhai; Zhong, Ping; Wang, Jianxin; Ye, Jin
2017-01-01
Many Carrier Sense Multiple Access (CSMA) and Time Division Multiple Access (TDMA) based medium access control (MAC) protocols for vehicular ad hoc networks (VANETs) have been proposed recently. Contrary to the common perception that they are competitors, we argue that the underlying strategies used in these MAC protocols are complementary. Based on this insight, we design CTMAC, a MAC protocol that synthesizes existing strategies; namely, random accessing channel (used in CSMA-style protocols) and arbitral reserving channel (used in TDMA-based protocols). CTMAC swiftly changes its strategy according to the vehicle density, and its performance is better than the state-of-the-art protocols. We evaluate CTMAC using at-scale simulations. Our results show that CTMAC reduces the channel completion time and increases the network goodput by 45% for a wide range of application workloads and network settings. PMID:28208590
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-12
... Connection testing [using current Nasdaq access protocols] during the normal operating hours of the NTF; No Charge--For Idle Connection testing [using current Nasdaq access protocols]; $333/hour--For Active Connection testing [using current Nasdaq access protocols] at all times other than the normal operating hours...
Media use and sleep among boys with autism spectrum disorder, ADHD, or typical development.
Engelhardt, Christopher R; Mazurek, Micah O; Sohl, Kristin
2013-12-01
The current study examined the relationships between media use (television, computer, and video games) and sleep among boys with autism spectrum disorder (ASD) compared with those with attention-deficit/hyperactivity disorder (ADHD) or with typical development (TD). Participants included parents of boys with ASD (n = 49), ADHD (n = 38), or TD (n = 41) (ages 8-17 years). Questionnaires assessed daily hours of media use, bedroom access to media, and average sleep hours per night. Bedroom media access was associated with less time spent sleeping per night, irrespective of diagnostic group. Bedroom access to a television or a computer was more strongly associated with reduced sleep among boys with ASD compared with boys with ADHD or TD. Multivariate models showed that, in addition to bedroom access, the amount of time spent playing video games was uniquely associated with less sleep among boys with ASD. In the ASD group only, the relationship between bedroom access to video games and reduced sleep was mediated by hours of video game play. The current results suggest that media-related variables may be an important consideration in understanding sleep disturbances in children with ASD. Further research is needed to better characterize the processes by which media use may affect sleep among individuals with ASD. Overall, the current findings suggest that screen-based media time and bedroom media access should be routinely assessed and may be important intervention targets when addressing sleep problems in children with ASD.
FD/DAMA Scheme For Mobile/Satellite Communications
NASA Technical Reports Server (NTRS)
Yan, Tsun-Yee; Wang, Charles C.; Cheng, Unjeng; Rafferty, William; Dessouky, Khaled I.
1992-01-01
Integrated-Adaptive Mobile Access Protocol (I-AMAP) proposed to allocate communication channels to subscribers in first-generation MSAT-X mobile/satellite communication network. Based on concept of frequency-division/demand-assigned multiple access (FD/DAMA) where partition of available spectrum adapted to subscribers' demands for service. Requests processed, and competing requests resolved according to channel-access protocol, or free-access tree algorithm described in "Connection Protocol for Mobile/Satellite Communications" (NPO-17735). Assigned spectrum utilized efficiently.
A Low-Cost and Energy-Efficient Multiprocessor System-on-Chip for UWB MAC Layer
NASA Astrophysics Data System (ADS)
Xiao, Hao; Isshiki, Tsuyoshi; Khan, Arif Ullah; Li, Dongju; Kunieda, Hiroaki; Nakase, Yuko; Kimura, Sadahiro
Ultra-wideband (UWB) technology has attracted much attention recently due to its high data rate and low emission power. Its media access control (MAC) protocol, WiMedia MAC, promises a lot of facilities for high-speed and high-quality wireless communication. However, these benefits in turn involve a large amount of computational load, which challenges the traditional uniprocessor architecture based implementation method to provide the required performance. However, the constrained cost and power budget, on the other hand, makes using commercial multiprocessor solutions unrealistic. In this paper, a low-cost and energy-efficient multiprocessor system-on-chip (MPSoC), which tackles at once the aspects of system design, software migration and hardware architecture, is presented for the implementation of UWB MAC layer. Experimental results show that the proposed MPSoC, based on four simple RISC processors and shared-memory infrastructure, achieves up to 45% performance improvement and 65% power saving, but takes 15% less area than the uniprocessor implementation.
Wireless optical network for a home network
NASA Astrophysics Data System (ADS)
Bouchet, Olivier; Porcon, Pascal; Walewski, Joachim W.; Nerreter, Stefan; Langer, Klaus-Dieter; Fernández, Luz; Vucic, Jelena; Kamalakis, Thomas; Ntogari, Georgia; Neokosmidis, Ioannis; Gueutier, Eric
2010-08-01
During the European collaborative project OMEGA, two optical-wireless prototypes have been developed. The first prototype operates in the near-infrared spectral region and features Giga Ethernet connectivity, a simple transceiver architecture due to the use of on-off keying, a multi-sector transceiver, and an ultra-fast switch for sector-to-sector hand over. This full-duplex system, composed by one base station and one module, transmits data on three meters. The second prototype is a visible-light-communications system based on DMT signal processing and an adapted MAC sublayer. Data rates around to 100 Mb/s at the physical layer are achieved. This broadcast system, composed also by one base station and one module, transmits data up to two meters. In this paper we present the adapted optical wireless media-access-control sublayer protocol for visible-light communications. This protocol accommodates link adaptation from 128 Mb/s to 1024 Mb/s with multi-sector coverage, and half-duplex or full-duplex transmission.
Interfaces to PeptideAtlas: a case study of standard data access systems
Handcock, Jeremy; Robinson, Thomas; Deutsch, Eric W.; Boyle, John
2012-01-01
Access to public data sets is important to the scientific community as a resource to develop new experiments or validate new data. Projects such as the PeptideAtlas, Ensembl and The Cancer Genome Atlas (TCGA) offer both access to public data and a repository to share their own data. Access to these data sets is often provided through a web page form and a web service API. Access technologies based on web protocols (e.g. http) have been in use for over a decade and are widely adopted across the industry for a variety of functions (e.g. search, commercial transactions, and social media). Each architecture adapts these technologies to provide users with tools to access and share data. Both commonly used web service technologies (e.g. REST and SOAP), and custom-built solutions over HTTP are utilized in providing access to research data. Providing multiple access points ensures that the community can access the data in the simplest and most effective manner for their particular needs. This article examines three common access mechanisms for web accessible data: BioMart, caBIG, and Google Data Sources. These are illustrated by implementing each over the PeptideAtlas repository and reviewed for their suitability based on specific usages common to research. BioMart, Google Data Sources, and caBIG are each suitable for certain uses. The tradeoffs made in the development of the technology are dependent on the uses each was designed for (e.g. security versus speed). This means that an understanding of specific requirements and tradeoffs is necessary before selecting the access technology. PMID:22941959
Ethics of Social Media Research: Common Concerns and Practical Considerations
Goniu, Natalie; Moreno, Peter S.; Diekema, Douglas
2013-01-01
Abstract Social media Websites (SMWs) are increasingly popular research tools. These sites provide new opportunities for researchers, but raise new challenges for Institutional Review Boards (IRBs) that review these research protocols. As of yet, there is little-to-no guidance regarding how an IRB should review the studies involving SMWs. The purpose of this article was to review the common risks inherent in social media research and consider how researchers can consider these risks when writing research protocols. We focused this article on three common research approaches: observational research, interactive research, and survey/interview research. Concomitant with these research approaches, we gave particular attention to the issues pertinent to SMW research, including privacy, consent, and confidentiality. After considering these challenges, we outlined key considerations for both researchers and reviewers when creating or reviewing SMW IRB protocols. Our goal in this article was to provide a detailed examination of relevant ethics and regulatory issues for both researchers and those who review their protocols. PMID:23679571
Ethics of social media research: common concerns and practical considerations.
Moreno, Megan A; Goniu, Natalie; Moreno, Peter S; Diekema, Douglas
2013-09-01
Social media Websites (SMWs) are increasingly popular research tools. These sites provide new opportunities for researchers, but raise new challenges for Institutional Review Boards (IRBs) that review these research protocols. As of yet, there is little-to-no guidance regarding how an IRB should review the studies involving SMWs. The purpose of this article was to review the common risks inherent in social media research and consider how researchers can consider these risks when writing research protocols. We focused this article on three common research approaches: observational research, interactive research, and survey/interview research. Concomitant with these research approaches, we gave particular attention to the issues pertinent to SMW research, including privacy, consent, and confidentiality. After considering these challenges, we outlined key considerations for both researchers and reviewers when creating or reviewing SMW IRB protocols. Our goal in this article was to provide a detailed examination of relevant ethics and regulatory issues for both researchers and those who review their protocols.
On Ramps: Options and Issues in Accessing the Internet.
ERIC Educational Resources Information Center
Bocher, Bob
1995-01-01
Outlines the basic options that schools and libraries have for accessing the Internet, focusing on four models: direct connection; dial access using SLIP/PPP (Serial Line Internet Protocol/Point-to-Point Protocol); dial-up using terminal emulation mode; and dial access through commercial online services. Discusses access option issues such as…
Validity of Assessments of Youth Access to Tobacco: The Familiarity Effect
Landrine, Hope; Klonoff, Elizabeth A.
2003-01-01
Objectives. We examined the standard compliance protocol and its validity as a measure of youth access to tobacco. Methods. In Study 1, youth smokers reported buying cigarettes in stores where they are regular customers. In Study 2, youths attempted to purchase cigarettes by using the Standard Protocol, in which they appeared at stores once for cigarettes, and by using the Familiarity Protocol, in which they were rendered regular customers by purchasing nontobacco items 4 times and then requested cigarettes during their fifth visit. Results. Sales to youths aged 17 years in the Familiarity Protocol were significantly higher than sales to the same age group in the Standard Protocols (62.5% vs. 6%, respectively). Conclusions. The Standard Protocol does not match how youths obtain cigarettes. Access is low for stranger youths within compliance studies, but access is high for familiar youths outside of compliance studies. PMID:14600057
A slotted access control protocol for metropolitan WDM ring networks
NASA Astrophysics Data System (ADS)
Baziana, P. A.; Pountourakis, I. E.
2009-03-01
In this study we focus on the serious scalability problems that many access protocols for WDM ring networks introduce due to the use of a dedicated wavelength per access node for either transmission or reception. We propose an efficient slotted MAC protocol suitable for WDM ring metropolitan area networks. The proposed network architecture employs a separate wavelength for control information exchange prior to the data packet transmission. Each access node is equipped with a pair of tunable transceivers for data communication and a pair of fixed tuned transceivers for control information exchange. Also, each access node includes a set of fixed delay lines for synchronization reasons; to keep the data packets, while the control information is processed. An efficient access algorithm is applied to avoid both the data wavelengths and the receiver collisions. In our protocol, each access node is capable of transmitting and receiving over any of the data wavelengths, facing the scalability issues. Two different slot reuse schemes are assumed: the source and the destination stripping schemes. For both schemes, performance measures evaluation is provided via an analytic model. The analytical results are validated by a discrete event simulation model that uses Poisson traffic sources. Simulation results show that the proposed protocol manages efficient bandwidth utilization, especially under high load. Also, comparative simulation results prove that our protocol achieves significant performance improvement as compared with other WDMA protocols which restrict transmission over a dedicated data wavelength. Finally, performance measures evaluation is explored for diverse numbers of buffer size, access nodes and data wavelengths.
Hwang, Inpyeong; Cho, Jeong Yeon; Kim, Sang Youn; Oh, Seung-June; Ku, Ja Hyeon; Lee, Joongyup; Kim, Seung Hyup
2015-12-01
The aim of the present study was to investigate the feasibility and image quality of excretory CT urography performed using low iodine-concentration contrast media and low tube voltage. This prospective study enrolled 63 patients who undergoing CT urography. The subjects were randomized into two groups of an excretory phase CT urography protocol and received either 240 mg I/mL of contrast media and 80 kVp of tube voltage (low-concentration protocol, n=32) or 350 mg I/mL and 120 kVp (conventional protocol, n=31). Two readers qualitatively evaluated images for sharpness of the urinary tract, image noise, streak artifact and overall diagnostic acceptability. The mean attenuation, signal-to-noise ratio, contrast-to-noise ratio and figure of merit were measured in the urinary tract. The non-inferiority test assessed the diagnostic acceptability between the two protocol groups. The low-concentration protocol showed a significantly lower effective radiation dose (3.44 vs. 5.70 mSv, P<.001). The diagnostic acceptability was significantly lower in the low-concentration protocol with iterative reconstruction algorithm than in the conventional protocol (4.06±0.45 vs. 4.50±0.37, P<.001), however, all subjects showed at least more than standard diagnostic acceptability and the difference resided in the predefined non-inferiority margin. The signal-to-noise ratio, contrast-to-noise ratio and figure of merit were significantly higher in the low-concentration protocol along the entire urinary tract (P<.001). CT urography using 240 mg I/mL iodine contrast media, 80 kVp tube voltage and an iterative reconstruction algorithm is beneficial to reduce radiation dose and iodine load, and its objective image quality and subjective diagnostic acceptability is not inferior to that of conventional CT urography. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.
NASA Technical Reports Server (NTRS)
Ingels, Frank; Owens, John; Daniel, Steven
1989-01-01
The protocol definition and terminal hardware for the modified free access protocol, a communications protocol similar to Ethernet, are developed. A MFA protocol simulator and a CSMA/CD math model are also developed. The protocol is tailored to communication systems where the total traffic may be divided into scheduled traffic and Poisson traffic. The scheduled traffic should occur on a periodic basis but may occur after a given event such as a request for data from a large number of stations. The Poisson traffic will include alarms and other random traffic. The purpose of the protocol is to guarantee that scheduled packets will be delivered without collision. This is required in many control and data collection systems. The protocol uses standard Ethernet hardware and software requiring minimum modifications to an existing system. The modification to the protocol only affects the Ethernet transmission privileges and does not effect the Ethernet receiver.
Della, Lindsay J; Eroglu, Dogan; Bernhardt, Jay M; Edgerton, Erin; Nall, Janice
2008-01-01
Market trend data show that the media marketplace continues to rapidly evolve. Recent research shows that substantial portions of the U.S. media population are "new media" users. Today, more than ever before, media consumers are exposed to multiple media at the same point in time, encouraged to participate in media content generation, and challenged to learn, access, and use the new media that are continually entering the market. These media trends have strong implications for how consumers of health information access, process, and retain health-related knowledge. In this article we review traditional information processing models and theories of interpersonal and mass media access and consumption. We make several theory-based propositions for how traditional information processing and media consumption concepts will function as new media usage continues to increase. These propositions are supported by new media usage data from the Centers for Disease Control and Prevention's entry into the new media market (e.g., podcasting, virtual events, blogging, and webinars). Based on these propositions, we conclude by presenting both opportunities and challenges that public health communicators and marketers will face in the future.
Beyond Access and Exposure: Implications of Sneaky Media Use for Preschoolers' Sleep Behavior.
Moorman, Jessica D; Harrison, Kristen
2018-01-09
Greater consumption of and access to screen media are known correlates of unhealthy sleep behavior in preschoolers. What remains unknown, however, is the role a child's media use plays in this association. Parents and guardians of U.S. preschoolers (N = 278, average child age 56 months) provided information about their child's nightly duration of sleep, daily duration of nap, quantity of screen media use, sneaky media use, and the presence of a screen media device in the bedroom. We assessed four media: television, DVD/VCRs, video games, and computer/Internet. Based on rationales of sleep displacement, the forbidden fruit hypothesis, and social cognitive theory, we predicted that increased consumption of and access to media, along with sneaky media use, would predict a shorter duration of nightly sleep and longer duration of daily nap across the four screen media. In correlational analyses, a clear pattern emerged with quantity of media use, screen media in the bedroom, and sneaky media use associated with shorter nightly duration of sleep and longer duration of daily nap. In regression analyses, only weekday evening television viewing and sneaky media use predicted shorter nightly sleep duration; weekend morning and evening DVD use predicted longer naps.
Scalable Lunar Surface Networks and Adaptive Orbit Access
NASA Technical Reports Server (NTRS)
Wang, Xudong
2015-01-01
Teranovi Technologies, Inc., has developed innovative network architecture, protocols, and algorithms for both lunar surface and orbit access networks. A key component of the overall architecture is a medium access control (MAC) protocol that includes a novel mechanism of overlaying time division multiple access (TDMA) and carrier sense multiple access with collision avoidance (CSMA/CA), ensuring scalable throughput and quality of service. The new MAC protocol is compatible with legacy Institute of Electrical and Electronics Engineers (IEEE) 802.11 networks. Advanced features include efficiency power management, adaptive channel width adjustment, and error control capability. A hybrid routing protocol combines the advantages of ad hoc on-demand distance vector (AODV) routing and disruption/delay-tolerant network (DTN) routing. Performance is significantly better than AODV or DTN and will be particularly effective for wireless networks with intermittent links, such as lunar and planetary surface networks and orbit access networks.
Interoperability in the Planetary Science Archive (PSA)
NASA Astrophysics Data System (ADS)
Rios Diaz, C.
2017-09-01
The protocols and standards currently being supported by the recently released new version of the Planetary Science Archive at this time are the Planetary Data Access Protocol (PDAP), the EuroPlanet- Table Access Protocol (EPN-TAP) and Open Geospatial Consortium (OGC) standards. We explore these protocols in more detail providing scientifically useful examples of their usage within the PSA.
dCache, Sync-and-Share for Big Data
NASA Astrophysics Data System (ADS)
Millar, AP; Fuhrmann, P.; Mkrtchyan, T.; Behrmann, G.; Bernardt, C.; Buchholz, Q.; Guelzow, V.; Litvintsev, D.; Schwank, K.; Rossi, A.; van der Reest, P.
2015-12-01
The availability of cheap, easy-to-use sync-and-share cloud services has split the scientific storage world into the traditional big data management systems and the very attractive sync-and-share services. With the former, the location of data is well understood while the latter is mostly operated in the Cloud, resulting in a rather complex legal situation. Beside legal issues, those two worlds have little overlap in user authentication and access protocols. While traditional storage technologies, popular in HEP, are based on X.509, cloud services and sync-and-share software technologies are generally based on username/password authentication or mechanisms like SAML or Open ID Connect. Similarly, data access models offered by both are somewhat different, with sync-and-share services often using proprietary protocols. As both approaches are very attractive, dCache.org developed a hybrid system, providing the best of both worlds. To avoid reinventing the wheel, dCache.org decided to embed another Open Source project: OwnCloud. This offers the required modern access capabilities but does not support the managed data functionality needed for large capacity data storage. With this hybrid system, scientists can share files and synchronize their data with laptops or mobile devices as easy as with any other cloud storage service. On top of this, the same data can be accessed via established mechanisms, like GridFTP to serve the Globus Transfer Service or the WLCG FTS3 tool, or the data can be made available to worker nodes or HPC applications via a mounted filesystem. As dCache provides a flexible authentication module, the same user can access its storage via different authentication mechanisms; e.g., X.509 and SAML. Additionally, users can specify the desired quality of service or trigger media transitions as necessary, thus tuning data access latency to the planned access profile. Such features are a natural consequence of using dCache. We will describe the design of the hybrid dCache/OwnCloud system, report on several months of operations experience running it at DESY, and elucidate the future road-map.
Experiences with http/WebDAV protocols for data access in high throughput computing
NASA Astrophysics Data System (ADS)
Bernabeu, Gerard; Martinez, Francisco; Acción, Esther; Bria, Arnau; Caubet, Marc; Delfino, Manuel; Espinal, Xavier
2011-12-01
In the past, access to remote storage was considered to be at least one order of magnitude slower than local disk access. Improvement on network technologies provide the alternative of using remote disk. For those accesses one can today reach levels of throughput similar or exceeding those of local disks. Common choices as access protocols in the WLCG collaboration are RFIO, [GSI]DCAP, GRIDFTP, XROOTD and NFS. HTTP protocol shows a promising alternative as it is a simple, lightweight protocol. It also enables the use of standard technologies such as http caching or load balancing which can be used to improve service resilience and scalability or to boost performance for some use cases seen in HEP such as the "hot files". WebDAV extensions allow writing data, giving it enough functionality to work as a remote access protocol. This paper will show our experiences with the WebDAV door for dCache, in terms of functionality and performance, applied to some of the HEP work flows in the LHC Tier1 at PIC.
Freedom of the Press vs. Public Access.
ERIC Educational Resources Information Center
Schmidt, Benno C., Jr.
This book surveys the implications of freedom of the press for a constitutionally rooted public right of access to electronic and print media. Part one provides general perspectives on access to the media, including discussions of access in relation to the Supreme Court, to First Amendment history and theory, to current perceptions of the press,…
Coron, Noémie; Pihet, Marc; Fréalle, Emilie; Lemeille, Yolande; Pinel, Claudine; Pelloux, Hervé; Gargala, Gilles; Favennec, Loic; Accoceberry, Isabelle; Durand-Joly, Isabelle; Dalle, Frédéric; Huet, Frédéric; Fanton, Annlyse; Boldron, Amale; Loeuille, Guy-André; Domblides, Philippe; Coltey, Bérengère; Pin, Isabelle; Llerena, Catherine; Troussier, Françoise; Person, Christine; Marguet, Christophe; Wizla, Nathalie; Thumerelle, Caroline; Turck, Dominique; Bui, Stéphanie; Fayon, Michael; Duhamel, Alain; Prévotat, Anne; Wallaert, Benoit; Leroy, Sylvie; Bouchara, Jean-Philippe; Delhaes, Laurence
2018-02-01
Fungal respiratory colonization of cystic fibrosis (CF) patients emerges as a new concern; however, the heterogeneity of mycological protocols limits investigations. We first aimed at setting up an efficient standardized protocol for mycological analysis of CF sputa that was assessed during a prospective, multicenter study: "MucoFong" program (PHRC-06/1902). Sputa from 243 CF patients from seven centers in France were collected over a 15-month period and submitted to a standardized protocol based on 6 semi-selective media. After mucolytic pretreatment, sputa were plated in parallel on cycloheximide-enriched (ACT37), erythritol-enriched (ERY37), benomyl dichloran-rose bengal (BENO37) and chromogenic (CAN37) media incubated at 37 °C and on Sabouraud-chloramphenicol (SAB27) and erythritol-enriched (ERY27) media incubated at 20-27 °C. Each plate was checked twice a week during 3 weeks. Fungi were conventionally identified; time for detection of fungal growth was noted for each species. Fungal prevalences and media performances were assessed; an optimal combination of media was determined using the Chi-squared automatic interaction detector method. At least one fungal species was isolated from 81% of sputa. Candida albicans was the most prevalent species (58.8%), followed by Aspergillus fumigatus (35.4%). Cultivation on CAN37, SAB27, ACT37 and ERY27 during 16 days provided an optimal combination, detecting C. albicans, A. fumigatus, Scedosporium apiospermum complex and Exophiala spp. with sensitivities of 96.5, 98.8, 100 and 100%. Combination of these four culture media is recommended to ensure the growth of key fungal pathogens in CF respiratory specimens. The use of such consensual protocol is of major interest for merging results from future epidemiological studies.
Seo, Eunhui; Kang, Hwansu; Lim, Oh-Kyung; Jun, Hee-Sook
2018-05-24
Mature skeletal muscle cells cannot be expanded in culture systems. Therefore, it is difficult to construct an in vitro model for muscle diseases. To establish an efficient protocol for myogenic differentiation of human adipose tissue-derived stem cells (hADSCs), we investigated whether addition of IL-6 and/or myocyte-conditioned media (CM) to conventional differentiation media can shorten the differentiation period. hADSCs were differentiated to myocytes using the conventional protocol or modified with the addition of 25 pg/mL IL-6 and/or C2C12 CM (25% v / v ). The expression of MyoD and myogenine mRNA was significantly higher at 5⁻6 days after differentiation using the modified protocol than with the conventional protocol. mRNA and protein expression of myosin heavy chain, a marker of myotubes, was significantly upregulated at 28 and 42 days of differentiation using the modified protocol, and the level achieved after a 4-week differentiation period was similar to that achieved at 6 weeks using the conventional protocol. The expression of p-STAT3 was significantly increased when the modified protocol was used. Similarly, addition of colivelin, a STAT3 activator, instead of IL-6 and C2C12 CM, promoted the myogenic differentiation of ADSCs. The modified protocol improved differentiation efficiency and reduced the time required for differentiation of myocytes. It might be helpful to save cost and time when preparing myocytes for cell therapies and drug discovery.
Performance of TCP variants over LTE network
NASA Astrophysics Data System (ADS)
Nor, Shahrudin Awang; Maulana, Ade Novia
2016-08-01
One of the implementation of a wireless network is based on mobile broadband technology Long Term Evolution (LTE). LTE offers a variety of advantages, especially in terms of access speed, capacity, architectural simplicity and ease of implementation, as well as the breadth of choice of the type of user equipment (UE) that can establish the access. The majority of the Internet connections in the world happen using the TCP (Transmission Control Protocol) due to the TCP's reliability in transmitting packets in the network. TCP reliability lies in the ability to control the congestion. TCP was originally designed for wired media, but LTE connected through a wireless medium that is not stable in comparison to wired media. A wide variety of TCP has been made to produce a better performance than its predecessor. In this study, we simulate the performance provided by the TCP NewReno and TCP Vegas based on simulation using network simulator version 2 (ns2). The TCP performance is analyzed in terms of throughput, packet loss and end-to-end delay. In comparing the performance of TCP NewReno and TCP Vegas, the simulation result shows that the throughput of TCP NewReno is slightly higher than TCP Vegas, while TCP Vegas gives significantly better end-to-end delay and packet loss. The analysis of throughput, packet loss and end-to-end delay are made to evaluate the simulation.
Austin, Erica Weintraub; Pinkleton, Bruce E; Austin, Bruce W; Van de Vord, Rebecca
2012-01-01
To compare the extent to which information efficacy (confidence for acquiring useful information) and media literacy skills predict knowledge and self-efficacy for preventing or treating the health threat of influenza. A random-sample survey of 1,379 residential students enrolled at a northwestern public university was conducted in fall 2009. Students accessed an Internet survey through a link provided in an e-mail. Students who self-diagnosed correctly demonstrated higher levels of media literacy skills than those who self-diagnosed incorrectly. Among those who self-diagnosed incorrectly, the only predictor of knowledge was accessibility of information sources; low accessibility was associated with reduced knowledge. Information efficacy predicted self-efficacy for both groups. The results illustrate the limitations of information efficacy in the absence of media literacy skills. To decrease health risks, college health practitioners should promote media literacy while also ensuring easy access to high-quality information.
NASA Technical Reports Server (NTRS)
Kleis, Stanley J.; Truong, Tuan; Goodwin, Thomas J,
2004-01-01
This report is a documentation of a fluid dynamic analysis of the proposed Automated Static Culture System (ASCS) cell module mixing protocol. The report consists of a review of some basic fluid dynamics principles appropriate for the mixing of a patch of high oxygen content media into the surrounding media which is initially depleted of oxygen, followed by a computational fluid dynamics (CFD) study of this process for the proposed protocol over a range of the governing parameters. The time histories of oxygen concentration distributions and mechanical shear levels generated are used to characterize the mixing process for different parameter values.
The Role of Social Media Tools: Accessible Tourism for Disabled Citizens
ERIC Educational Resources Information Center
Altinay, Zehra; Saner, Tulen; Bahçelerli, Nesrin M.; Altinay, Fahriye
2016-01-01
Knowledge sharing becomes important to accomplish digital citizenship. Social media tools become popular to share and diffuse the knowledge in the digitalization. This social media learning and knowledge sharing platforms provides accessibility to the services within societies especially for disabled citizens. This research study aims to evaluate…
77 FR 67203 - Privacy Act of 1974; Republication of Systems of Records Notices
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-08
... file folders and on electronic media. RETRIEVABILITY: Accessed by name, tag number, and/or permit... DISPOSING OF RECORDS IN THE SYSTEM: STORAGE: Records are maintained on electronic media. RETRIEVABILITY... electronic media. RETRIEVABILITY: Records are accessed by individual action file number or by the name of the...
Distributed reservation control protocols for random access broadcasting channels
NASA Technical Reports Server (NTRS)
Greene, E. P.; Ephremides, A.
1981-01-01
Attention is given to a communication network consisting of an arbitrary number of nodes which can communicate with each other via a time-division multiple access (TDMA) broadcast channel. The reported investigation is concerned with the development of efficient distributed multiple access protocols for traffic consisting primarily of single packet messages in a datagram mode of operation. The motivation for the design of the protocols came from the consideration of efficient multiple access utilization of moderate to high bandwidth (4-40 Mbit/s capacity) communication satellite channels used for the transmission of short (1000-10,000 bits) fixed length packets. Under these circumstances, the ratio of roundtrip propagation time to packet transmission time is between 100 to 10,000. It is shown how a TDMA channel can be adaptively shared by datagram traffic and constant bandwidth users such as in digital voice applications. The distributed reservation control protocols described are a hybrid between contention and reservation protocols.
Saade, Charbel; Deeb, Ibrahim Alsheikh; Mohamad, Maha; Al-Mohiy, Hussain; El-Merhi, Fadi
2016-01-01
Over the last decade, exponential advances in computed tomography (CT) technology have resulted in improved spatial and temporal resolution. Faster image acquisition enabled renal CT angiography to become a viable and effective noninvasive alternative in diagnosing renal vascular pathologies. However, with these advances, new challenges in contrast media administration have emerged. Poor synchronization between scanner and contrast media administration have reduced the consistency in image quality with poor spatial and contrast resolution. Comprehensive understanding of contrast media dynamics is essential in the design and implementation of contrast administration and image acquisition protocols. This review includes an overview of the parameters affecting renal artery opacification and current protocol strategies to achieve optimal image quality during renal CT angiography with iodinated contrast media, with current safety issues highlighted.
You, Ilsun; Kwon, Soonhyun; Choudhary, Gaurav; Sharma, Vishal; Seo, Jung Taek
2018-06-08
The Internet of Things (IoT) utilizes algorithms to facilitate intelligent applications across cities in the form of smart-urban projects. As the majority of devices in IoT are battery operated, their applications should be facilitated with a low-power communication setup. Such facility is possible through the Low-Power Wide-Area Network (LPWAN), but at a constrained bit rate. For long-range communication over LPWAN, several approaches and protocols are adopted. One such protocol is the Long-Range Wide Area Network (LoRaWAN), which is a media access layer protocol for long-range communication between the devices and the application servers via LPWAN gateways. However, LoRaWAN comes with fewer security features as a much-secured protocol consumes more battery because of the exorbitant computational overheads. The standard protocol fails to support end-to-end security and perfect forward secrecy while being vulnerable to the replay attack that makes LoRaWAN limited in supporting applications where security (especially end-to-end security) is important. Motivated by this, an enhanced LoRaWAN security protocol is proposed, which not only provides the basic functions of connectivity between the application server and the end device, but additionally averts these listed security issues. The proposed protocol is developed with two options, the Default Option (DO) and the Security-Enhanced Option (SEO). The protocol is validated through Burrows⁻Abadi⁻Needham (BAN) logic and the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The proposed protocol is also analyzed for overheads through system-based and low-power device-based evaluations. Further, a case study on a smart factory-enabled parking system is considered for its practical application. The results, in terms of network latency with reliability fitting and signaling overheads, show paramount improvements and better performance for the proposed protocol compared with the two handshake options, Pre-Shared Key (PSK) and Elliptic Curve Cryptography (ECC), of Datagram Transport Layer Security (DTLS).
Wideband, mobile networking technologies
NASA Astrophysics Data System (ADS)
Hyer, Kevin L.; Bowen, Douglas G.; Pulsipher, Dennis C.
2005-05-01
Ubiquitous communications will be the next era in the evolving communications revolution. From the human perspective, access to information will be instantaneous and provide a revolution in services available to both the consumer and the warfighter. Services will be from the mundane - anytime, anywhere access to any movie ever made - to the vital - reliable and immediate access to the analyzed real-time video from the multi-spectral sensors scanning for snipers in the next block. In the former example, the services rely on a fixed infrastructure of networking devices housed in controlled environments and coupled to fixed terrestrial fiber backbones - in the latter, the services are derived from an agile and highly mobile ad-hoc backbone established in a matter of minutes by size, weight, and power-constrained platforms. This network must mitigate significant changes in the transmission media caused by millisecond-scale atmospheric temperature variations, the deployment of smoke, or the drifting of a cloud. It must mitigate against structural obscurations, jet wash, or incapacitation of a node. To maintain vital connectivity, the mobile backbone must be predictive and self-healing on both near-real-time and real-time time scales. The nodes of this network must be reconfigurable to mitigate intentional and environmental jammers, block attackers, and alleviate interoperability concerns caused by changing standards. The nodes must support multi-access of disparate waveform and protocols.
NASA Astrophysics Data System (ADS)
Jian, Wei; Estevez, Claudio; Chowdhury, Arshad; Jia, Zhensheng; Wang, Jianxin; Yu, Jianguo; Chang, Gee-Kung
2010-12-01
This paper presents an energy-efficient Medium Access Control (MAC) protocol for very-high-throughput millimeter-wave (mm-wave) wireless sensor communication networks (VHT-MSCNs) based on hybrid multiple access techniques of frequency division multiplexing access (FDMA) and time division multiplexing access (TDMA). An energy-efficient Superframe for wireless sensor communication network employing directional mm-wave wireless access technologies is proposed for systems that require very high throughput, such as high definition video signals, for sensing, processing, transmitting, and actuating functions. Energy consumption modeling for each network element and comparisons among various multi-access technologies in term of power and MAC layer operations are investigated for evaluating the energy-efficient improvement of proposed MAC protocol.
Congressional and Media Protocols
The OIG's Office of Congressional and Public Affairs is the primary point of contact for all media and congressional inquiries on matters related to the OIG, which ensures that they are handled expeditiously.
Cryopreservation of Human Mucosal Leukocytes.
Hughes, Sean M; Shu, Zhiquan; Levy, Claire N; Ferre, April L; Hartig, Heather; Fang, Cifeng; Lentz, Gretchen; Fialkow, Michael; Kirby, Anna C; Adams Waldorf, Kristina M; Veazey, Ronald S; Germann, Anja; von Briesen, Hagen; McElrath, M Juliana; Dezzutti, Charlene S; Sinclair, Elizabeth; Baker, Chris A R; Shacklett, Barbara L; Gao, Dayong; Hladik, Florian
2016-01-01
Understanding how leukocytes in the cervicovaginal and colorectal mucosae respond to pathogens, and how medical interventions affect these responses, is important for developing better tools to prevent HIV and other sexually transmitted infections. An effective cryopreservation protocol for these cells following their isolation will make studying them more feasible. To find an optimal cryopreservation protocol for mucosal mononuclear leukocytes, we compared cryopreservation media and procedures using human vaginal leukocytes and confirmed our results with endocervical and colorectal leukocytes. Specifically, we measured the recovery of viable vaginal T cells and macrophages after cryopreservation with different cryopreservation media and handling procedures. We found several cryopreservation media that led to recoveries above 75%. Limiting the number and volume of washes increased the fraction of cells recovered by 10-15%, possibly due to the small cell numbers in mucosal samples. We confirmed that our cryopreservation protocol also works well for both endocervical and colorectal leukocytes. Cryopreserved leukocytes had slightly increased cytokine responses to antigenic stimulation relative to the same cells tested fresh. Additionally, we tested whether it is better to cryopreserve endocervical cells on the cytobrush or in suspension. Leukocytes from cervicovaginal and colorectal tissues can be cryopreserved with good recovery of functional, viable cells using several different cryopreservation media. The number and volume of washes has an experimentally meaningful effect on the percentage of cells recovered. We provide a detailed, step-by-step protocol with best practices for cryopreservation of mucosal leukocytes.
Enabling Science Integration through the Marine Geoscience Data System Media Bank
NASA Astrophysics Data System (ADS)
Leung, A.; Ferrini, V.; Arko, R.; Carbotte, S. M.; Goehring, L.; Simms, E.
2008-12-01
The Marine Geoscience Data System Media Bank (http://media.marine-geo.org) was constructed to enable the sharing of high quality images, illustrations and animations among members of the science community and to provide a new forum for education and public outreach (EPO). The initial focus of Media Bank was to serve Ridge 2000 research and EPO efforts, but it was constructed as a flexible system that could accommodate media from other multidisciplinary marine geoscience research initiatives. Media Bank currently contains digital photographs, maps, 3-D visualizations, and video clips from the Ridge 2000 and MARGINS focus sites as well as the Antarctic and Southern Ocean. We actively seek contributions of other high quality marine geoscience media for inclusion in Media Bank. Media Bank is driven by a relational database backend, enabling image browsing, sorting by category, keyword search functionality, and the creation of media galleries. All media are accompanied by a descriptive figure caption that provides easy access to expert knowledge to help foster data integration across disciplines as well as EPO efforts. In addition to access to high quality media, Media Bank also provides basic metadata including geographic position, investigator name and affiliation, as well as copyright information, and links to references and relevant data sets. Since media are tied to geospatial coordinates, a map-based interface is also provided for access to media.
Jinzaki, Masahiro; Kitagawa, Kakuya; Tsai, I-Chen; Chan, Carmen; Yu, Wei; Yong, Hwan Seok; Choi, Byoung Wook
2010-12-01
The use of contrast media for cardiac imaging becomes increasing as the widespread of cardiac CT and cardiac MR. A radiologist needs to carefully consider the indication and the injection protocol of contrast media to be used as well as the possibility of adverse effect. There are several guidelines for contrast media in western countries. However, these are focusing the adverse effect of contrast media. The Asian Society of Cardiovascular Imaging, the only society dedicated to cardiovascular imaging in Asia, formed a Working Group and created a guideline, which summarizes the integrated knowledge of contrast media for cardiac imaging. In cardiac imaging, coronary artery evaluation is feasible by non-contrast MR angiography, which can be an alternative examination in high risk patients for the use of iodine contrast media. Furthermore, the body habitus of Asian patients is usually smaller than that of their western counterparts. This necessitates modifications in the injection protocol and in the formula for calculation of estimated glomerular filtration rate. This guideline provided fundamental information for the use of contrast media for Asian patients in cardiac imaging.
Kitagawa, Kakuya; Tsai, I-Chen; Chan, Carmen; Yu, Wei; Yong, Hwan Seok; Choi, Byoung Wook
2010-01-01
The use of contrast media for cardiac imaging becomes increasing as the widespread of cardiac CT and cardiac MR. A radiologist needs to carefully consider the indication and the injection protocol of contrast media to be used as well as the possibility of adverse effect. There are several guidelines for contrast media in western countries. However, these are focusing the adverse effect of contrast media. The Asian Society of Cardiovascular Imaging, the only society dedicated to cardiovascular imaging in Asia, formed a Working Group and created a guideline, which summarizes the integrated knowledge of contrast media for cardiac imaging. In cardiac imaging, coronary artery evaluation is feasible by non-contrast MR angiography, which can be an alternative examination in high risk patients for the use of iodine contrast media. Furthermore, the body habitus of Asian patients is usually smaller than that of their western counterparts. This necessitates modifications in the injection protocol and in the formula for calculation of estimated glomerular filtration rate. This guideline provided fundamental information for the use of contrast media for Asian patients in cardiac imaging. PMID:20931289
22 CFR 9b.1 - Press access to the Department of State.
Code of Federal Regulations, 2012 CFR
2012-04-01
... BUILDING PASSES § 9b.1 Press access to the Department of State. (a) Media correspondents without valid... enjoyed by members of the public. (b) Media correspondents holding valid Department of State press... the Department of State building. (c) Media correspondents, with or without a Department of State...
22 CFR 9b.1 - Press access to the Department of State.
Code of Federal Regulations, 2013 CFR
2013-04-01
... BUILDING PASSES § 9b.1 Press access to the Department of State. (a) Media correspondents without valid... enjoyed by members of the public. (b) Media correspondents holding valid Department of State press... the Department of State building. (c) Media correspondents, with or without a Department of State...
22 CFR 9b.1 - Press access to the Department of State.
Code of Federal Regulations, 2011 CFR
2011-04-01
... BUILDING PASSES § 9b.1 Press access to the Department of State. (a) Media correspondents without valid... enjoyed by members of the public. (b) Media correspondents holding valid Department of State press... the Department of State building. (c) Media correspondents, with or without a Department of State...
22 CFR 9b.1 - Press access to the Department of State.
Code of Federal Regulations, 2014 CFR
2014-04-01
... BUILDING PASSES § 9b.1 Press access to the Department of State. (a) Media correspondents without valid... enjoyed by members of the public. (b) Media correspondents holding valid Department of State press... the Department of State building. (c) Media correspondents, with or without a Department of State...
22 CFR 9b.1 - Press access to the Department of State.
Code of Federal Regulations, 2010 CFR
2010-04-01
... BUILDING PASSES § 9b.1 Press access to the Department of State. (a) Media correspondents without valid... enjoyed by members of the public. (b) Media correspondents holding valid Department of State press... the Department of State building. (c) Media correspondents, with or without a Department of State...
Media reporting of tenofovir trials in Cambodia and Cameroon
Mills, Edward; Rachlis, Beth; Wu, Ping; Wong, Elaine; Wilson, Kumanan; Singh, Sonal
2005-01-01
Background Two planned trials of pre-exposure prophylaxis tenofovir in Cambodia and Cameroon to prevent HIV infection in high-risk populations were closed due to activist pressure on host country governments. The international news media contributed substantially as the primary source of knowledge transfer regarding the trials. We aimed to characterize the nature of reporting, specifically focusing on the issues identified by media reports regarding each trial. Methods With the aid of an information specialist, we searched 3 electronic media databases, 5 electronic medical databases and extensively searched the Internet. In addition we contacted stakeholder groups. We included media reports addressing the trial closures, the reasons for the trial closures, and who was interviewed. We extracted data using content analysis independently, in duplicate. Results We included 24 reports on the Cambodian trial closure and 13 reports on the Cameroon trial closure. One academic news account incorrectly reported that it was an HIV vaccine trial that closed early. The primary reasons cited for the Cambodian trial closure were: a lack of medical insurance for trial related injuries (71%); human rights considerations (71%); study protocol concerns (46%); general suspicions regarding trial location (37%) and inadequate prevention counseling (29%). The primary reasons cited for the Cameroon trial closure were: inadequate access to care for seroconverters (69%); participants not sufficiently informed of risks (69%); inadequate number of staff (46%); participants being exploited (46%) and an unethical study design (38%). Only 3/23 (13%) reports acknowledged interviewing research personnel regarding the Cambodian trial, while 4/13 (30.8%) reports interviewed researchers involved in the Cameroon trial. Conclusion Our review indicates that the issues addressed and validity of the media reports of these trials is highly variable. Given the potential impact of the media in formulation of health policy related to HIV, efforts are needed to effectively engage the media during periods of controversy in the HIV/AIDS epidemic. PMID:16120208
NASA Astrophysics Data System (ADS)
Civera Lorenzo, Tamara
2017-10-01
Brief presentation about the J-PLUS EDR data access web portal (http://archive.cefca.es/catalogues/jplus-edr) where the different services available to retrieve images and catalogues data have been presented.J-PLUS Early Data Release (EDR) archive includes two types of data: images and dual and single catalogue data which include parameters measured from images. J-PLUS web portal offers catalogue data and images through several different online data access tools or services each suited to a particular need. The different services offered are: Coverage map Sky navigator Object visualization Image search Cone search Object list search Virtual observatory services: Simple Cone Search Simple Image Access Protocol Simple Spectral Access Protocol Table Access Protocol
NASA Astrophysics Data System (ADS)
Lugmayr, Artur R.; Mailaparampil, Anurag; Tico, Florina; Kalli, Seppo; Creutzburg, Reiner
2003-01-01
Digital television (digiTV) is an additional multimedia environment, where metadata is one key element for the description of arbitrary content. This implies adequate structures for content description, which is provided by XML metadata schemes (e.g. MPEG-7, MPEG-21). Content and metadata management is the task of a multimedia repository, from which digiTV clients - equipped with an Internet connection - can access rich additional multimedia types over an "All-HTTP" protocol layer. Within this research work, we focus on conceptual design issues of a metadata repository for the storage of metadata, accessible from the feedback channel of a local set-top box. Our concept describes the whole heterogeneous life-cycle chain of XML metadata from the service provider to the digiTV equipment, device independent representation of content, accessing and querying the metadata repository, management of metadata related to digiTV, and interconnection of basic system components (http front-end, relational database system, and servlet container). We present our conceptual test configuration of a metadata repository that is aimed at a real-world deployment, done within the scope of the future interaction (fiTV) project at the Digital Media Institute (DMI) Tampere (www.futureinteraction.tv).
Microprocessor-controlled, wide-range streak camera
DOE Office of Scientific and Technical Information (OSTI.GOV)
Amy E. Lewis, Craig Hollabaugh
Bechtel Nevada/NSTec recently announced deployment of their fifth generation streak camera. This camera incorporates many advanced features beyond those currently available for streak cameras. The arc-resistant driver includes a trigger lockout mechanism, actively monitors input trigger levels, and incorporates a high-voltage fault interrupter for user safety and tube protection. The camera is completely modular and may deflect over a variable full-sweep time of 15 nanoseconds to 500 microseconds. The camera design is compatible with both large- and small-format commercial tubes from several vendors. The embedded microprocessor offers Ethernet connectivity, and XML [extensible markup language]-based configuration management with non-volatile parameter storagemore » using flash-based storage media. The camera’s user interface is platform-independent (Microsoft Windows, Unix, Linux, Macintosh OSX) and is accessible using an AJAX [asynchronous Javascript and XML]-equipped modem browser, such as Internet Explorer 6, Firefox, or Safari. User interface operation requires no installation of client software or browser plug-in technology. Automation software can also access the camera configuration and control using HTTP [hypertext transfer protocol]. The software architecture supports multiple-simultaneous clients, multiple cameras, and multiple module access with a standard browser. The entire user interface can be customized.« less
Design and FPGA implementation for MAC layer of Ethernet PON
NASA Astrophysics Data System (ADS)
Zhu, Zengxi; Lin, Rujian; Chen, Jian; Ye, Jiajun; Chen, Xinqiao
2004-04-01
Ethernet passive optical network (EPON), which represents the convergence of low-cost, high-bandwidth and supporting multiple services, appears to be one of the best candidates for the next-generation access network. The work of standardizing EPON as a solution for access network is still underway in the IEEE802.3ah Ethernet in the first mile (EFM) task force. The final release is expected in 2004. Up to now, there has been no standard application specific integrated circuit (ASIC) chip available which fulfills the functions of media access control (MAC) layer of EPON. The MAC layer in EPON system has many functions, such as point-to-point emulation (P2PE), Ethernet MAC functionality, multi-point control protocol (MPCP), network operation, administration and maintenance (OAM) and link security. To implement those functions mentioned above, an embedded real-time operating system (RTOS) and a flexible programmable logic device (PLD) with an embedded processor are used. The software and hardware functions in MAC layer are realized through programming embedded microprocessor and field programmable gate array(FPGA). Finally, some experimental results are given in this paper. The method stated here can provide a valuable reference for developing EPON MAC layer ASIC.
Microprocessor-controlled wide-range streak camera
NASA Astrophysics Data System (ADS)
Lewis, Amy E.; Hollabaugh, Craig
2006-08-01
Bechtel Nevada/NSTec recently announced deployment of their fifth generation streak camera. This camera incorporates many advanced features beyond those currently available for streak cameras. The arc-resistant driver includes a trigger lockout mechanism, actively monitors input trigger levels, and incorporates a high-voltage fault interrupter for user safety and tube protection. The camera is completely modular and may deflect over a variable full-sweep time of 15 nanoseconds to 500 microseconds. The camera design is compatible with both large- and small-format commercial tubes from several vendors. The embedded microprocessor offers Ethernet connectivity, and XML [extensible markup language]-based configuration management with non-volatile parameter storage using flash-based storage media. The camera's user interface is platform-independent (Microsoft Windows, Unix, Linux, Macintosh OSX) and is accessible using an AJAX [asynchronous Javascript and XML]-equipped modem browser, such as Internet Explorer 6, Firefox, or Safari. User interface operation requires no installation of client software or browser plug-in technology. Automation software can also access the camera configuration and control using HTTP [hypertext transfer protocol]. The software architecture supports multiple-simultaneous clients, multiple cameras, and multiple module access with a standard browser. The entire user interface can be customized.
Kelleher, Erin; Moreno, Megan; Wilt, Megan Pumper
2018-04-12
Adolescents and young adults frequently post depression symptom references on social media; previous studies show positive associations between depression posts and self-reported depression symptoms. Depression is common among young people and this population often experiences many barriers to mental health care. Thus, social media may be a new resource to identify, recruit, and intervene with young people at risk for depression. The purpose of this pilot study was to test a social media intervention on Tumblr. We used social media to identify and recruit participants and to deliver the intervention of online depression resources. This randomized pilot intervention identified Tumblr users age 15-23 who posted about depression using the search term "#depress". Eligible participants were recruited via Tumblr messages; consented participants completed depression surveys and were then randomized to an intervention of online mental health resources delivered via a Tumblr message, while control participants did not receive resources. Postintervention online surveys assessed resource access and usefulness and control groups were asked whether they would have liked to receive resources. Analyses included t tests. A total of 25 participants met eligibility criteria. The mean age of the participants was 17.5 (SD 1.9) and 65% were female with average score on the Patient Health Questionnaire-9 of 17.5 (SD 5.9). Among the 11 intervention participants, 36% (4/11) reported accessing intervention resources and 64% (7/11) felt the intervention was acceptable. Among the 14 control participants, only 29% (4/14) of reported that receiving resources online would be acceptable (P=.02). Participants suggested anonymity and ease of use as important characteristics in an online depression resource. The intervention was appropriately targeted to young people at risk for depression, and recruitment via Tumblr was feasible. Most participants in the intervention group felt the social media approach was acceptable, and about a third utilized the online resources. Participants who had not experienced the intervention were less likely to find it acceptable. Future studies should explore this approach in larger samples. Social media may be an appropriate platform for online depression interventions for young people. ©Erin Kelleher, Megan Moreno, Megan Pumper Wilt. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 12.04.2018.
Characterization of tissue-simulating phantom materials for ultrasound-guided needle procedures
NASA Astrophysics Data System (ADS)
Buchanan, Susan; Moore, John; Lammers, Deanna; Baxter, John; Peters, Terry
2012-02-01
Needle biopsies are standard protocols that are commonly performed under ultrasound (US) guidance or computed tomography (CT)1. Vascular access such as central line insertions, and many spinal needle therapies also rely on US guidance. Phantoms for these procedures are crucial as both training tools for clinicians and research tools for developing new guidance systems. Realistic imaging properties and material longevity are critical qualities for needle guidance phantoms. However, current commercially available phantoms for use with US guidance have many limitations, the most detrimental of which include harsh needle tracks obfuscating US images and a membrane comparable to human skin that does not allow seepage of inner media. To overcome these difficulties, we tested a variety of readily available media and membranes to evaluate optimal materials to fit our current needs. It was concluded that liquid hand soap was the best medium, as it instantly left no needle tracks, had an acceptable depth of US penetration and portrayed realistic imaging conditions, while because of its low leakage, low cost, acceptable durability and transparency, the optimal membrane was 10 gauge vinyl.
A study of topologies and protocols for fiber optic local area network
NASA Technical Reports Server (NTRS)
Yeh, C.; Gerla, M.; Rodrigues, P.
1985-01-01
The emergence of new applications requiring high data traffic necessitates the development of high speed local area networks. Optical fiber is selected as the transmission medium due to its inherent advantages over other possible media and the dual optical bus architecture is shown to be the most suitable topology. Asynchronous access protocols, including token, random, hybrid random/token, and virtual token schemes, are developed and analyzed. Exact expressions for insertion delay and utilization at light and heavy load are derived, and intermediate load behavior is investigated by simulation. A new tokenless adaptive scheme whose control depends only on the detection of activity on the channel is shown to outperform round-robin schemes under uneven loads and multipacket traffic and to perform optimally at light load. An approximate solution to the queueing delay for an oscillating polling scheme under chaining is obtained and results are compared with simulation. Solutions to the problem of building systems with a large number of stations are presented, including maximization of the number of optical couplers, and the use of passive star/bus topologies, bridges and gateways.
Saade, Charbel; Deeb, Ibrahim Alsheikh; Mohamad, Maha; Al-Mohiy, Hussain; El-Merhi, Fadi
2016-01-01
Over the last decade, exponential advances in computed tomography (CT) technology have resulted in improved spatial and temporal resolution. Faster image acquisition enabled renal CT angiography to become a viable and effective noninvasive alternative in diagnosing renal vascular pathologies. However, with these advances, new challenges in contrast media administration have emerged. Poor synchronization between scanner and contrast media administration have reduced the consistency in image quality with poor spatial and contrast resolution. Comprehensive understanding of contrast media dynamics is essential in the design and implementation of contrast administration and image acquisition protocols. This review includes an overview of the parameters affecting renal artery opacification and current protocol strategies to achieve optimal image quality during renal CT angiography with iodinated contrast media, with current safety issues highlighted. PMID:26728701
Goicolea, Isabel; Carson, Dean; San Sebastian, Miguel; Christianson, Monica; Wiklund, Maria; Hurtig, Anna-Karin
2018-01-11
The purpose of this paper is to propose a protocol for researching the impact of rural youth health service strategies on health care access. There has been no published comprehensive assessment of the effectiveness of youth health strategies in rural areas, and there is no clearly articulated model of how such assessments might be conducted. The protocol described here aims to gather information to; i) Assess rural youth access to health care according to their needs, ii) Identify and understand the strategies developed in rural areas to promote youth access to health care, and iii) Propose actions for further improvement. The protocol is described with particular reference to research being undertaken in the four northernmost counties of Sweden, which contain a widely dispersed and diverse youth population. The protocol proposes qualitative and quantitative methodologies sequentially in four phases. First, to map youth access to health care according to their health care needs, including assessing horizontal equity (equal use of health care for equivalent health needs,) and vertical equity (people with greater health needs should receive more health care than those with lesser needs). Second, a multiple case study design investigates strategies developed across the region (youth clinics, internet applications, public health programs) to improve youth access to health care. Third, qualitative comparative analysis of the 24 rural municipalities in the region identifies the best combination of conditions leading to high youth access to health care. Fourth, a concept mapping study involving rural stakeholders, care providers and youth provides recommended actions to improve rural youth access to health care. The implementation of this research protocol will contribute to 1) generating knowledge that could contribute to strengthening rural youth access to health care, as well as to 2) advancing the application of mixed methods to explore access to health care.
Laflamme, Simon; Roggero, Pascal; Southcott, Chris
2010-08-01
This article examines the link between the domain and level of occupation, on the one hand, and use of media, including internet, on the other. It adds to this investigation an analysis of identity in its relation to media use and accessibility. It challenges the hypothesis of a strong correlation between level of occupation and use and accessibility to media. It reveals complex phenomena of social homogenization and differentiation. Data is extracted from a sample of workers who completed a questionnaire which focused on use of media.
Al-Majid, Abdullah M.; Barakat, Assem; AL-Najjar, Hany J.; Mabkhot, Yahia N.; Ghabbour, Hazem A.; Fun, Hoong-Kun
2013-01-01
A simple protocol, involving the green synthesis for the construction of novel bis-pyrimidine derivatives, 3a–i and 4a–e are accomplished by the aqueous diethylamine media promoted tandem Aldol-Michael reaction between two molecules of barbituric acid derivatives 1a,b with various aldehydes. This efficient synthetic protocol using an economic and environmentally friendly reaction media with versatility and shorter reaction time provides bis-pyrimidine derivatives with high yields (88%–99%). PMID:24317435
Ajaero, Chukwuedozie K; Odimegwu, Clifford; Ajaero, Ijeoma D; Nwachukwu, Chidiebere A
2016-05-24
Nigeria has the highest population in sub-Saharan Africa with high birth and growth rates. There is therefore need for family planning to regulate and stabilize this population. This study examined the relationship between access to mass media messages on family planning and use of family planning in Nigeria. It also investigated the impacts of spatio-demographic variables on the relationship between access to mass media messages and use of family planning. Data from the 2013 demographic and health survey of Nigeria which was conducted in all the 36 states of Nigeria, and Abuja were used for the study. The sample was weighted to ensure representativeness. Univariate, bivariate and binary logistic regressions were conducted. The relationship between each of the access to mass media messages, and the family planning variables were determined with Pearson correlation analysis. The correlation results showed significant but weak direct relationships between the access to mass media messages and use of family planning at p < 0.0001 with access to television messages (r = 0.239) being associated with highest use of family planning. Some of the results of the adjusted regression analysis showed that access to television messages (OR = 1.2.225; p < 0.0001), and radio messages (OR = 1.945; p < 0.0001) increase the likelihood of the use of family planning. The adjusted regression model also indicated increased likelihood in the use of family planning by respondents with secondary education (OR = 2.709; p < 0.0001), the married (OR = 1.274; p < 0.001), and respondents within the highest wealth quintiles (OR = 3.442; p < 0.0001). There exist significant variations within spatio-demographic groups with regards to having access to mass media messages on family planning, and on the use of family planning. The results showed that access to mass media messages increases the likelihood of the use of family planning. Also people with higher socioeconomic status and those from the Southern part of the country make more use of family planning. There is need to improve the socioeconomic status of the populations. Also, the quality and regularity of mass media messages should be improved, while other communication avenues such as traditional institutions, blogs, and seminars for youths should be used to make family planning messages more acceptable.
Library Media Center Design Considerations for Physically Disabled Students.
ERIC Educational Resources Information Center
Moy, Patricia J.
Federal legislation ensures that children with physical disabilities should not be denied access to the school library. These children have the same information needs as their peers, and they want equal access to information in the school library media center. To create an accessible and functional school library, many requirements and…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sandoval, D. M.; Strittmatter, R. B.; Abeyta, J. D.
2004-01-01
The initial objectives of this effort were to provide a hardware and software platform that can address the requirements for the accountability of classified removable electronic media and vault access logging. The Media Tracker system software assists classified media custodian in managing vault access logging and Media Tracking to prevent the inadvertent violation of rules or policies for the access to a restricted area and the movement and use of tracked items. The MediaTracker system includes the software tools to track and account for high consequence security assets and high value items. The overall benefits include: (1) real-time access tomore » the disposition of all Classified Removable Electronic Media (CREM), (2) streamlined security procedures and requirements, (3) removal of ambiguity and managerial inconsistencies, (4) prevention of incidents that can and should be prevented, (5) alignment with the DOE's initiative to achieve improvements in security and facility operations through technology deployment, and (6) enhanced individual responsibility by providing a consistent method of dealing with daily responsibilities. In response to initiatives to enhance the control of classified removable electronic media (CREM), the Media Tracker software suite was developed, piloted and implemented at the Los Alamos National Laboratory beginning in July 2000. The Media Tracker software suite assists in the accountability and tracking of CREM and other high-value assets. One component of the MediaTracker software suite provides a Laboratory-approved media tracking system. Using commercial touch screen and bar code technology, the MediaTracker (MT) component of the MediaTracker software suite provides an efficient and effective means to meet current Laboratory requirements and provides new-engineered controls to help assure compliance with those requirements. It also establishes a computer infrastructure at vault entrances for vault access logging, and can accommodate several methods of positive identification including smart cards and biometrics. Currently, we have three mechanisms that provide added security for accountability and tracking purposes. One mechanism consists of a portable, hand-held inventory scanner, which allows the custodian to physically track the items that are not accessible within a particular area. The second mechanism is a radio frequency identification (RFID) consisting of a monitoring portal, which tracks and logs in a database all activity tagged of items that pass through the portals. The third mechanism consists of an electronic tagging of a flash memory device for automated inventory of CREM in storage. By modifying this USB device the user is provided with added assurance, limiting the data from being obtained from any other computer.« less
Dewitt, James; Capistrant, Benjamin; Kohli, Nidhi; Mitteldorf, Darryl; Merengwa, Enyinnaya; West, William
2018-01-01
Background While deduplication and cross-validation protocols have been recommended for large Web-based studies, protocols for survey response validation of smaller studies have not been published. Objective This paper reports the challenges of survey validation inherent in a small Web-based health survey research. Methods The subject population was North American, gay and bisexual, prostate cancer survivors, who represent an under-researched, hidden, difficult-to-recruit, minority-within-a-minority population. In 2015-2016, advertising on a large Web-based cancer survivor support network, using email and social media, yielded 478 completed surveys. Results Our manual deduplication and cross-validation protocol identified 289 survey submissions (289/478, 60.4%) as likely spam, most stemming from advertising on social media. The basic components of this deduplication and validation protocol are detailed. An unexpected challenge encountered was invalid survey responses evolving across the study period. This necessitated the static detection protocol be augmented with a dynamic one. Conclusions Five recommendations for validation of Web-based samples, especially with smaller difficult-to-recruit populations, are detailed. PMID:29691203
Structural barriers in access to medical marijuana in the USA-a systematic review protocol.
Valencia, Celina I; Asaolu, Ibitola O; Ehiri, John E; Rosales, Cecilia
2017-08-07
There are 43 state medical marijuana programs in the USA, yet limited evidence is available on the demographic characteristics of the patient population accessing these programs. Moreover, insights into the social and structural barriers that inform patients' success in accessing medical marijuana are limited. A current gap in the scientific literature exists regarding generalizable data on the social, cultural, and structural mechanisms that hinder access to medical marijuana among qualifying patients. The goal of this systematic review, therefore, is to identify the aforementioned mechanisms that inform disparities in access to medical marijuana in the USA. This scoping review protocol outlines the proposed study design for the systematic review and evaluation of peer-reviewed scientific literature on structural barriers to medical marijuana access. The protocol follows the guidelines set forth by the Preferred Reporting Items for Systematic review and Meta-Analysis Protocols (PRISMA-P) checklist. The overarching goal of this study is to rigorously evaluate the existing peer-reviewed data on access to medical marijuana in the USA. Income, ethnic background, stigma, and physician preferences have been posited as the primary structural barriers influencing medical marijuana patient population demographics in the USA. Identification of structural barriers to accessing medical marijuana provides a framework for future policies and programs. Evidence-based policies and programs for increasing medical marijuana access help minimize the disparity of access among qualifying patients.
Advanced teleprocessing systems
NASA Astrophysics Data System (ADS)
Kleinrock, L.; Gerla, M.
1982-09-01
This Annual Technical Report covers research covering the period from October 1, 1981 to September 30, 1982. This contract has three primary designated research areas: packet radio systems, resource sharing and allocation, and distributed processing and control. This report contains abstracts of publications which summarize research results in these areas followed by the main body of the report which is devoted to a study of channel access protocols that are executed by the nodes of a network to schedule their transmissions on multi-access broadcast channel. In particular the main body consists of a Ph.D. dissertation, Channel Access Protocols for Multi-Hop Broadcast Packet Radio Networks. This work discusses some new channel access protocols useful for mobile radio networks. Included is an analysis of slotted ALOHA and some tight bounds on the performance of all possible protocols in a mobile environment.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-12
... month.[the following charges: $285/hour--For Active Connection testing using current Exchange access... using current Exchange access protocols; $333/hour--For Active Connection testing using current Exchange... a fee of $285 per hour for active connection testing using current BX access protocols during the...
A news media analysis of economic sanction effects on access to medicine in Iran.
Kheirandish, Mehrnaz; Rashidian, Arash; Bigdeli, Maryam
2015-01-01
In the past decades economic sanctions have been used by different countries or international organizations in order to deprive target countries of some transactions. While the sanctions do not target health care systems or public health structures, they may, in fact, affect the availability of health care in target countries. In this study, we used media analysis to assess the impacts of recent sanctions imposed by the Central Bank of Iran in 2012 on access to medicines in Iran. We searched different sources of written news media including a database of nonspecialized weeklies and magazines, online news sources, web pages of daily newspapers and healthcare oriented weeklies from 2011 to 2013. We searched the sources using the general term "medicine" to reduce the chances of missing relevant items. The identified news media were read, and categorized under three groups of items announcing "shortage of medicines," "medicines related issues" and "no shortage." We conducted trend analyzes to see whether the news media related to access to medicines were affected by the economic sanctions. A total number of 371 relevant news media were collected. The number of news media related to medicines substantially increased in the study period: 30 (8%), 161 (43%) and 180 (49%) were published in 2011, 2012 and 2013, respectively. While 145 (39%) of media items referred to the shortage of medicines, 97 (26%) reported no shortage or alleviating of concerns. Media analysis suggests a clear increase in the number of news media reporting a shortage in Iran after the sanctions. In 2013, there were accompanying increases in the number of news media reporting alleviation of the shortages of medicines. Our analysis provides evidence of negative effects of the sanctions on access to medicines in Iran.
Adaptive Code Division Multiple Access Protocol for Wireless Network-on-Chip Architectures
NASA Astrophysics Data System (ADS)
Vijayakumaran, Vineeth
Massive levels of integration following Moore's Law ushered in a paradigm shift in the way on-chip interconnections were designed. With higher and higher number of cores on the same die traditional bus based interconnections are no longer a scalable communication infrastructure. On-chip networks were proposed enabled a scalable plug-and-play mechanism for interconnecting hundreds of cores on the same chip. Wired interconnects between the cores in a traditional Network-on-Chip (NoC) system, becomes a bottleneck with increase in the number of cores thereby increasing the latency and energy to transmit signals over them. Hence, there has been many alternative emerging interconnect technologies proposed, namely, 3D, photonic and multi-band RF interconnects. Although they provide better connectivity, higher speed and higher bandwidth compared to wired interconnects; they also face challenges with heat dissipation and manufacturing difficulties. On-chip wireless interconnects is one other alternative proposed which doesn't need physical interconnection layout as data travels over the wireless medium. They are integrated into a hybrid NOC architecture consisting of both wired and wireless links, which provides higher bandwidth, lower latency, lesser area overhead and reduced energy dissipation in communication. However, as the bandwidth of the wireless channels is limited, an efficient media access control (MAC) scheme is required to enhance the utilization of the available bandwidth. This thesis proposes using a multiple access mechanism such as Code Division Multiple Access (CDMA) to enable multiple transmitter-receiver pairs to send data over the wireless channel simultaneously. It will be shown that such a hybrid wireless NoC with an efficient CDMA based MAC protocol can significantly increase the performance of the system while lowering the energy dissipation in data transfer. In this work it is shown that the wireless NoC with the proposed CDMA based MAC protocol outperformed the wired counterparts and several other wireless architectures proposed in literature in terms of bandwidth and packet energy dissipation. Significant gains were observed in packet energy dissipation and bandwidth even with scaling the system to higher number of cores. Non-uniform traffic simulations showed that the proposed CDMA-WiNoC was consistent in bandwidth across all traffic patterns. It is also shown that the CDMA based MAC scheme does not introduce additional reliability concerns in data transfer over the on-chip wireless interconnects.
Research on a Queue Scheduling Algorithm in Wireless Communications Network
NASA Astrophysics Data System (ADS)
Yang, Wenchuan; Hu, Yuanmei; Zhou, Qiancai
This paper proposes a protocol QS-CT, Queue Scheduling Mechanism based on Multiple Access in Ad hoc net work, which adds queue scheduling mechanism to RTS-CTS-DATA using multiple access protocol. By endowing different queues different scheduling mechanisms, it makes networks access to the channel much more fairly and effectively, and greatly enhances the performance. In order to observe the final performance of the network with QS-CT protocol, we simulate it and compare it with MACA/C-T without QS-CT protocol. Contrast to MACA/C-T, the simulation result shows that QS-CT has greatly improved the throughput, delay, rate of packets' loss and other key indicators.
Freedom of the Press For Whom? The Right of Access to Mass Media.
ERIC Educational Resources Information Center
Barron, Jerome A.
Freedom of the press has always meant freedom from government control and censorship, but now the communications industry itself is the major censor, with control of access to the media resting in a very few hands. The new effort throughout the country to open up the media by applying citizen group pressure, by bringing court action, and by…
Snap, Tweet and Post: College Student Social Media Perceptions and Heutagogic Practices and Uses
ERIC Educational Resources Information Center
Nadelson, Louis S.; Berg, William; Fox, Brandon; Grandbouche, Preston; Harris, Michael; Kroschel, Tia L.; Sandoval, Sean
2017-01-01
The nearly ubiquitous access to technology and the diversity of social media sites has provided students with easy access to a wide range of information and opportunities for interaction with other individuals. The nature of social media creates a context in which students can determine when they view information, the duration of the viewing,…
Restrictive Access to Books in School Library Media Centers in Georgia. Research Study.
ERIC Educational Resources Information Center
DuPree, Vi
This study sought to determine the extent of restrictive access to books in Georgia school library media centers and to discover by whose authority and for what reason these books might be placed on restrictive shelves. Questionnaires were completed and received from a stratified random sampling of 119 media specialists in high schools, middle or…
Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon
2016-01-01
Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network. PMID:27314351
Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon
2016-06-14
Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network.
Cryopreservation of Human Mucosal Leukocytes
Shu, Zhiquan; Levy, Claire N.; Ferre, April L.; Hartig, Heather; Fang, Cifeng; Lentz, Gretchen; Fialkow, Michael; Kirby, Anna C.; Adams Waldorf, Kristina M.; Veazey, Ronald S.; Germann, Anja; von Briesen, Hagen; McElrath, M. Juliana; Dezzutti, Charlene S.; Sinclair, Elizabeth; Baker, Chris A. R.; Shacklett, Barbara L.; Gao, Dayong; Hladik, Florian
2016-01-01
Background Understanding how leukocytes in the cervicovaginal and colorectal mucosae respond to pathogens, and how medical interventions affect these responses, is important for developing better tools to prevent HIV and other sexually transmitted infections. An effective cryopreservation protocol for these cells following their isolation will make studying them more feasible. Methods and Findings To find an optimal cryopreservation protocol for mucosal mononuclear leukocytes, we compared cryopreservation media and procedures using human vaginal leukocytes and confirmed our results with endocervical and colorectal leukocytes. Specifically, we measured the recovery of viable vaginal T cells and macrophages after cryopreservation with different cryopreservation media and handling procedures. We found several cryopreservation media that led to recoveries above 75%. Limiting the number and volume of washes increased the fraction of cells recovered by 10–15%, possibly due to the small cell numbers in mucosal samples. We confirmed that our cryopreservation protocol also works well for both endocervical and colorectal leukocytes. Cryopreserved leukocytes had slightly increased cytokine responses to antigenic stimulation relative to the same cells tested fresh. Additionally, we tested whether it is better to cryopreserve endocervical cells on the cytobrush or in suspension. Conclusions Leukocytes from cervicovaginal and colorectal tissues can be cryopreserved with good recovery of functional, viable cells using several different cryopreservation media. The number and volume of washes has an experimentally meaningful effect on the percentage of cells recovered. We provide a detailed, step-by-step protocol with best practices for cryopreservation of mucosal leukocytes. PMID:27232996
Alternative Fuels Data Center: U.S. Truck Stop Electrification Locations
bays) Media: Internet, Wireless Payment: American Express, Cash, MasterCard, VISA Access: Public - see : Internet, Wireless Payment: American Express, Cash, MasterCard, VISA Access: Public - see hours Hours: 24 bays) Media: Internet Payment: Gift Card, MasterCard, VISA Access: Public - see hours Hours: 24 hours
Elbing, Karen; Brent, Roger
2002-08-01
Detailed protocols are provided for titering and isolating bacterial colonies by serial dilutions, or alternatively by streaking or spreading a plate. Support protocols describe replica plating as well as methods for storing strains as agar stabs or frozen glycerol stocks.
[Security aspects on the Internet].
Seibel, R M; Kocher, K; Landsberg, P
2000-04-01
Is it possible to use the Internet as a secure media for transport of telemedicine? Which risks exist for routine use? In this article state of the art methods of security were analysed. Telemedicine in the Internet has severe risks, because patient data and hospital data of a secure Intranet can be manipulated by connecting it to the Web. Establishing of a firewall and the introduction of HPC (Health Professional Card) are minimizing the risk of un-authorized access to the hospital server. HPC allows good safety with digital signature and authentication of host and client of medical data. For secure e-mail PGP (Pretty Good Privacy) is easy to use as a standard protocol. Planning all activities exactly as well as following legal regulations are important requisites for reduction of safety risks in Internet.
An improved ATAC-seq protocol reduces background and enables interrogation of frozen tissues.
Corces, M Ryan; Trevino, Alexandro E; Hamilton, Emily G; Greenside, Peyton G; Sinnott-Armstrong, Nicholas A; Vesuna, Sam; Satpathy, Ansuman T; Rubin, Adam J; Montine, Kathleen S; Wu, Beijing; Kathiria, Arwa; Cho, Seung Woo; Mumbach, Maxwell R; Carter, Ava C; Kasowski, Maya; Orloff, Lisa A; Risca, Viviana I; Kundaje, Anshul; Khavari, Paul A; Montine, Thomas J; Greenleaf, William J; Chang, Howard Y
2017-10-01
We present Omni-ATAC, an improved ATAC-seq protocol for chromatin accessibility profiling that works across multiple applications with substantial improvement of signal-to-background ratio and information content. The Omni-ATAC protocol generates chromatin accessibility profiles from archival frozen tissue samples and 50-μm sections, revealing the activities of disease-associated DNA elements in distinct human brain structures. The Omni-ATAC protocol enables the interrogation of personal regulomes in tissue context and translational studies.
Abbreviated MRI Protocols: Wave of the Future for Breast Cancer Screening.
Chhor, Chloe M; Mercado, Cecilia L
2017-02-01
The purpose of this article is to describe the use of abbreviated breast MRI protocols for improving access to screening for women at intermediate risk. Breast MRI is not a cost-effective modality for screening women at intermediate risk, including those with dense breast tissue as the only risk. Abbreviated breast MRI protocols have been proposed as a way of achieving efficiency and rapid throughput. Use of these abbreviated protocols may increase availability and provide women with greater access to breast MRI.
Xrootd in dCache - design and experiences
NASA Astrophysics Data System (ADS)
Behrmann, Gerd; Ozerov, Dmitry; Zangerl, Thomas
2011-12-01
dCache is a well established distributed storage solution used in both high energy physics computing and other disciplines. An overview of the implementation of the xrootd data access protocol within dCache is presented. The performance of various access mechanisms is studied and compared and it is concluded that our implementation is as perfomant as other protocols. This makes dCache a compelling alternative to the Scalla software suite implementation of xrootd, with added value from broad protocol support, including the IETF approved NFS 4.1 protocol.
Design of the frame structure for a multiservice interactive system using ATM-PON
NASA Astrophysics Data System (ADS)
Nam, Jae-Hyun; Jang, Jongwook; Lee, Jung-Tae
1998-10-01
The MAC (Medium Access Control) protocol controls B-NT1s' (Optical Network Unit) access to the shared capacity on the PON, this protocol is very important if TDMA (Time Division Multiple Access) multiplexing is used on the upstream. To control the upstream traffic some kind of access protocol has to be implemented. There are roughly two different approaches to use request cells: in a collision free way or such that collisions in a request slot are allowed. It is the objective of this paper to describe a MAC-protocol structure that supports both approaches and hybrids of it. In our paper we grantee the QoS (Quality of Service) of each B-NT1 through LOC, LOV, LOA field that are the length field of the transmitted cell at each B-NT1. Each B-NT1 transmits its status of request on request cell.
Topaz, Maxim; Lai, Kenneth; Dhopeshwarkar, Neil; Seger, Diane L; Sa'adon, Roee; Goss, Foster; Rozenblum, Ronen; Zhou, Li
2016-03-01
Large databases of clinician reported (e.g., allergy repositories) and patient reported (e.g., social media) adverse drug reactions (ADRs) exist; however, whether patients and clinicians report the same concerns is not clear. Our objective was to compare electronic health record data and social media data to better understand differences and similarities between clinician-reported ADRs and patients' concerns regarding aspirin and atorvastatin. This pilot study explored a large repository of electronic health record data and social media data for clinician-reported ADRs and patients concerns for two common medications: aspirin (n = 31,817 ADRs accessible in clinical data; n = 19,186 potential ADRs accessible in social media data) and atorvastatin (n = 15,047 ADRs accessible in clinical data; n = 23,408 potential ADRs accessible in social media data). We found that the most frequently reported ADRs matched the most frequent patients' concerns. However, several less frequently reported reactions were more prevalent on social media (i.e., aspirin-induced hypoglycemia was discussed only on social media). Overall, we found a relatively strong positive and statistically significant correlation between the frequency ranking of reactions and patients' concerns for atorvastatin (Pearson's r = 0.61, p < 0.001) but not for aspirin (Pearson's r = 0.1, p = 0.69). Future studies should develop further natural language methods for a more detailed data analysis (i.e., identifying causality and temporal aspects in the social media data).
Social media use in the United States: implications for health communication.
Chou, Wen-ying Sylvia; Hunt, Yvonne M; Beckjord, Ellen Burke; Moser, Richard P; Hesse, Bradford W
2009-11-27
Given the rapid changes in the communication landscape brought about by participative Internet use and social media, it is important to develop a better understanding of these technologies and their impact on health communication. The first step in this effort is to identify the characteristics of current social media users. Up-to-date reporting of current social media use will help monitor the growth of social media and inform health promotion/communication efforts aiming to effectively utilize social media. The purpose of the study is to identify the sociodemographic and health-related factors associated with current adult social media users in the United States. Data came from the 2007 iteration of the Health Information National Trends Study (HINTS, N = 7674). HINTS is a nationally representative cross-sectional survey on health-related communication trends and practices. Survey respondents who reported having accessed the Internet (N = 5078) were asked whether, over the past year, they had (1) participated in an online support group, (2) written in a blog, (3) visited a social networking site. Bivariate and multivariate logistic regression analyses were conducted to identify predictors of each type of social media use. Approximately 69% of US adults reported having access to the Internet in 2007. Among Internet users, 5% participated in an online support group, 7% reported blogging, and 23% used a social networking site. Multivariate analysis found that younger age was the only significant predictor of blogging and social networking site participation; a statistically significant linear relationship was observed, with younger categories reporting more frequent use. Younger age, poorer subjective health, and a personal cancer experience predicted support group participation. In general, social media are penetrating the US population independent of education, race/ethnicity, or health care access. Recent growth of social media is not uniformly distributed across age groups; therefore, health communication programs utilizing social media must first consider the age of the targeted population to help ensure that messages reach the intended audience. While racial/ethnic and health status-related disparities exist in Internet access, among those with Internet access, these characteristics do not affect social media use. This finding suggests that the new technologies, represented by social media, may be changing the communication pattern throughout the United States.
Moretti, Rocco; Lyskov, Sergey; Das, Rhiju; Meiler, Jens; Gray, Jeffrey J
2018-01-01
The Rosetta molecular modeling software package provides a large number of experimentally validated tools for modeling and designing proteins, nucleic acids, and other biopolymers, with new protocols being added continually. While freely available to academic users, external usage is limited by the need for expertise in the Unix command line environment. To make Rosetta protocols available to a wider audience, we previously created a web server called Rosetta Online Server that Includes Everyone (ROSIE), which provides a common environment for hosting web-accessible Rosetta protocols. Here we describe a simplification of the ROSIE protocol specification format, one that permits easier implementation of Rosetta protocols. Whereas the previous format required creating multiple separate files in different locations, the new format allows specification of the protocol in a single file. This new, simplified protocol specification has more than doubled the number of Rosetta protocols available under ROSIE. These new applications include pK a determination, lipid accessibility calculation, ribonucleic acid redesign, protein-protein docking, protein-small molecule docking, symmetric docking, antibody docking, cyclic toxin docking, critical binding peptide determination, and mapping small molecule binding sites. ROSIE is freely available to academic users at http://rosie.rosettacommons.org. © 2017 The Protein Society.
Redactions in protocols for drug trials: what industry sponsors concealed.
Marquardsen, Mikkel; Ogden, Michelle; Gøtzsche, Peter C
2018-04-01
Objective To describe the redactions in contemporary protocols for industry-sponsored randomised drug trials with patient relevant outcomes and to evaluate whether there was a legitimate rationale for the redactions. Design Cohort study. Under the Freedom of Information Act, we requested access to trial protocols approved by a research ethics committee in Denmark from October 2012 to March 2013. We received 17 consecutive protocols, which had been redacted before we got them, and nine protocols without redactions. In five additional cases, the companies refused to let the committees give us access, and in three other cases, documents were missing. Participants Not applicable. Setting Not applicable. Main outcome measure Amount and nature of redactions in 22 predefined key protocol variables. Results The redactions were most widespread in those sections of the protocol where there is empirical evidence of substantial problems with the trustworthiness of published drug trials: data analysis, handling of missing data, detection and analysis of adverse events, definition of the outcomes, interim analyses and premature termination of the study, sponsor's access to incoming data while the study is running, ownership to the data and investigators' publication rights. The parts of the text that were redacted differed widely, both between companies and within the same company. Conclusions We could not identify any legitimate rationale for the redactions. The current mistrust in industry-sponsored drug trials can only change if the industry offers unconditional access to its trial protocols and other relevant documents and data.
Interactive real-time media streaming with reliable communication
NASA Astrophysics Data System (ADS)
Pan, Xunyu; Free, Kevin M.
2014-02-01
Streaming media is a recent technique for delivering multimedia information from a source provider to an end- user over the Internet. The major advantage of this technique is that the media player can start playing a multimedia file even before the entire file is transmitted. Most streaming media applications are currently implemented based on the client-server architecture, where a server system hosts the media file and a client system connects to this server system to download the file. Although the client-server architecture is successful in many situations, it may not be ideal to rely on such a system to provide the streaming service as users may be required to register an account using personal information in order to use the service. This is troublesome if a user wishes to watch a movie simultaneously while interacting with a friend in another part of the world over the Internet. In this paper, we describe a new real-time media streaming application implemented on a peer-to-peer (P2P) architecture in order to overcome these challenges within a mobile environment. When using the peer-to-peer architecture, streaming media is shared directly between end-users, called peers, with minimal or no reliance on a dedicated server. Based on the proposed software pɛvμa (pronounced [revma]), named for the Greek word meaning stream, we can host a media file on any computer and directly stream it to a connected partner. To accomplish this, pɛvμa utilizes the Microsoft .NET Framework and Windows Presentation Framework, which are widely available on various types of windows-compatible personal computers and mobile devices. With specially designed multi-threaded algorithms, the application can stream HD video at speeds upwards of 20 Mbps using the User Datagram Protocol (UDP). Streaming and playback are handled using synchronized threads that communicate with one another once a connection is established. Alteration of playback, such as pausing playback or tracking to a different spot in the media file, will be reflected in all media streams. These techniques are designed to allow users at different locations to simultaneously view a full length HD video and interactively control the media streaming session. To create a sustainable media stream with high quality, our system supports UDP packet loss recovery at high transmission speed using custom File- Buffers. Traditional real-time streaming protocols such as Real-time Transport Protocol/RTP Control Protocol (RTP/RTCP) provide no such error recovery mechanism. Finally, the system also features an Instant Messenger that allows users to perform social interactions with one another while they enjoy a media file. The ultimate goal of the application is to offer users a hassle free way to watch a media file over long distances without having to upload any personal information into a third party database. Moreover, the users can communicate with each other and stream media directly from one mobile device to another while maintaining an independence from traditional sign up required by most streaming services.
Bharate, Sonali S; Vishwakarma, Ram A
2015-04-01
An early prediction of solubility in physiological media (PBS, SGF and SIF) is useful to predict qualitatively bioavailability and absorption of lead candidates. Despite of the availability of multiple solubility estimation methods, none of the reported method involves simplified fixed protocol for diverse set of compounds. Therefore, a simple and medium-throughput solubility estimation protocol is highly desirable during lead optimization stage. The present work introduces a rapid method for assessment of thermodynamic equilibrium solubility of compounds in aqueous media using 96-well microplate. The developed protocol is straightforward to set up and takes advantage of the sensitivity of UV spectroscopy. The compound, in stock solution in methanol, is introduced in microgram quantities into microplate wells followed by drying at an ambient temperature. Microplates were shaken upon addition of test media and the supernatant was analyzed by UV method. A plot of absorbance versus concentration of a sample provides saturation point, which is thermodynamic equilibrium solubility of a sample. The established protocol was validated using a large panel of commercially available drugs and with conventional miniaturized shake flask method (r(2)>0.84). Additionally, the statistically significant QSPR models were established using experimental solubility values of 52 compounds. Copyright © 2015 Elsevier Ltd. All rights reserved.
Scharf, Deborah M.; Martino, Steven C.; Setodji, Claude M.; Staplefoote, B. Lynette; Shadel, William G.
2013-01-01
The goals of this study were to assess the feasibility of using Ecological Momentary Assessment (EMA) to measure adolescents’ exposure to alcohol and smoking-related media. A sample of 20 middle and high school students completed a two-week EMA protocol in which they monitored exposures to alcohol and smoking-related media. Results showed that adolescents were highly compliant with the study protocol. A total of 255 exposures to alcohol (67%) and smoking (33%) were captured, representing an average of 8.50 (5.82) alcohol-related media exposures and 4.25 (SD = 3.67) smoking-related media exposures and an average of per participant during the study period. Exposures tended to occur in the afternoon (52% alcohol; 54% smoking), at point of sale (44% alcohol; 65% smoking) and on days leading up to the weekend (57% alcohol; 57% smoking). Exposures were also likely in the presence of family (69% alcohol; 56% smoking). Overall, results of this small pilot provide preliminary evidence that EMA is a useful tool for tracking and characterizing middle and high school students’ real-world exposures to alcohol and smoking-related media. Future studies may suggest mechanisms by which media exposures lead to youth uptake of drinking and smoking behaviors. PMID:23772763
Annoni, Andrea Daniele; Mancini, Maria E; Andreini, Daniele; Formenti, Alberto; Mushtaq, Saima; Nobili, Enrica; Guglielmo, Marco; Baggiano, Andrea; Conte, Edoardo; Pepi, Mauro
2017-10-01
Multidetector Computed Tomography Angiography (MDCTA) is presently the imaging modality of choice for aortic disease. However, the effective radiation dose and the risk related to the use of contrast agents associated with MDCTA is an issue of concern. Aim of this study was to assess image quality of a low dose ECG-gated MDCTA of thoracic aorta using different concentration contrast media without tailored injection protocol. Two-hundred patients were randomised into four different scan protocols: Group A (Iodixanol 320 and 80 Kvp tube voltage), Group B (Iodixanol 320 and 100 Kvp tube voltage), Group C (Iomeprol 400 and 80 Kvp tube voltage) and Group D (Iomeprol 400 and 100 Kvp tube voltage). Image quality, noise, signal-to-noise ratio (SNR), contrast-to-noise ratio (CNR) and effective dose (ED) were compared among groups. No significant differences in image noise, SNR and CNR between groups with the same tube voltage. Significant differences in SNR and CNR were found among groups with 80 kV versus groups using 100 kV but without differences in terms of image quality. ED was significantly lower in groups with 80 kV. Multidetector Computed Tomography Angiography protocols using 80 kV and low concentration contrast media are feasible without need of tailored injection protocols. © 2017 The Royal Australian and New Zealand College of Radiologists.
Dewitt, James; Capistrant, Benjamin; Kohli, Nidhi; Rosser, B R Simon; Mitteldorf, Darryl; Merengwa, Enyinnaya; West, William
2018-04-24
While deduplication and cross-validation protocols have been recommended for large Web-based studies, protocols for survey response validation of smaller studies have not been published. This paper reports the challenges of survey validation inherent in a small Web-based health survey research. The subject population was North American, gay and bisexual, prostate cancer survivors, who represent an under-researched, hidden, difficult-to-recruit, minority-within-a-minority population. In 2015-2016, advertising on a large Web-based cancer survivor support network, using email and social media, yielded 478 completed surveys. Our manual deduplication and cross-validation protocol identified 289 survey submissions (289/478, 60.4%) as likely spam, most stemming from advertising on social media. The basic components of this deduplication and validation protocol are detailed. An unexpected challenge encountered was invalid survey responses evolving across the study period. This necessitated the static detection protocol be augmented with a dynamic one. Five recommendations for validation of Web-based samples, especially with smaller difficult-to-recruit populations, are detailed. ©James Dewitt, Benjamin Capistrant, Nidhi Kohli, B R Simon Rosser, Darryl Mitteldorf, Enyinnaya Merengwa, William West. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 24.04.2018.
Esmail, Laura C; Phillips, Kaye; Kuek, Victoria; Cosio, Andrea Perez; Kohler, Jillian Clare
2010-01-04
In September 2003, the Canadian government committed to developing legislation that would facilitate greater access to affordable medicines for developing countries. Over the course of eight months, the legislation, now known as Canada's Access to Medicines Regime (CAMR), went through a controversial policy development process and the newspaper media was one of the major venues in which the policy debates took place. The purpose of this study was to examine how the media framed CAMR to determine how policy goals were conceptualized, which stakeholder interests controlled the public debate and how these variables related to the public policy process. We conducted a qualitative content analysis of newspaper coverage of the CAMR policy and implementation process from 2003-2008. The primary theoretical framework for this study was framing theory. A total of 90 articles from 11 Canadian newspapers were selected for inclusion in our analysis. A team of four researchers coded the articles for themes relating to access to medicines and which stakeholders' voice figured more prominently on each issue. Stakeholders examined included: the research-based industry, the generic industry, civil society, the Canadian government, and developing country representatives. The most frequently mentioned themes across all documents were the issues of drug affordability, intellectual property, trade agreements and obligations, and development. Issues such as human rights, pharmaceutical innovation, and economic competitiveness got little media representation. Civil society dominated the media contents, followed far behind by the Canadian government, the research-based and generic pharmaceutical industries. Developing country representatives were hardly represented in the media. Media framing obscured the discussion of some of the underlying policy goals in this case and failed to highlight issues which are now significant barriers to the use of the legislation. Using the media to engage the public in more in-depth exploration of the policy issues at stake may contribute to a more informed policy development process. The media can be an effective channel for those stakeholders with a weaker voice in policy deliberations to raise public attention to particular issues; however, the political and institutional context must be taken into account as it may outweigh media framing effects.
ATM over hybrid fiber-coaxial cable networks: practical issues in deploying residential ATM services
NASA Astrophysics Data System (ADS)
Laubach, Mark
1996-11-01
Residential broadband access network technology based on asynchronous transfer modem (ATM) will soon reach commercial availability. The capabilities provided by ATM access network promise integrated services bandwidth available in excess of those provided by traditional twisted pair copper wire public telephone networks. ATM to the side of the home placed need quality of service capability closest to the subscriber allowing immediate support for Internet services and traditional voice telephony. Other services such as desktop video teleconferencing and enhanced server-based application support can be added as part of future evolution of the network. Additionally, advanced subscriber home networks can be supported easily. This paper presents an updated summary of the standardization efforts for the ATM over HFC definition work currently taking place in the ATM forum's residential broadband working group and the standards progress in the IEEE 802.14 cable TV media access control and physical protocol working group. This update is fundamental for establishing the foundation for delivering ATM-based integrated services via a cable TV network. An economic model for deploying multi-tiered services is presenting showing that a single-tier service is insufficient for a viable cable operator business. Finally, the use of an ATM based system lends itself well to various deployment scenarios of synchronous optical networks (SONET).
Satellite-Friendly Protocols and Standards
NASA Astrophysics Data System (ADS)
Koudelka, O.; Schmidt, M.; Ebert, J.; Schlemmer, H.; Kastner, S.; Riedler, W.
2002-01-01
We are currently observing a development unprecedented with other services, the enormous growth of the Internet. Video, voice and data applications can be supported via this network in high quality. Multi-media applications require high bandwidth which may not be available in many areas. When making proper use of the broadcast feature of a communications satellite, the performance of the satellite-based system can compare favourably to terrestrial solutions. Internet applications are in many cases highly asymmetric, making them very well suited to applications using small and inexpensive terminals. Data from one source may be used simultaneously by a large number of users. The Internet protocol suite has become the de-facto standard. But this protocol family in its original form has not been designed to support guaranteed quality of service, a prerequisite for real-time, high quality traffic. The Internet Protocol has to be adapted for the satellite environment, because long roundtrip delays and the error behaviour of the channel could make it inefficient over a GEO satellite. Another requirement is to utilise the satellite bandwidth as efficiently as possible. This can be achieved by adapting the access system to the nature of IP frames, which are variable in length. In the framework of ESA's ARTES project a novel satellite multimedia system was developed which utilises Multi-Frequency TDMA in a meshed network topology. The system supports Quality of Service (QoS) by reserving capacity with different QoS requirements. The system is centrally controlled by a master station with the implementation of a demand assignment (DAMA) system. A lean internal signalling system has been adopted. Network management is based on the SNMP protocol and industry-standard network management platforms, making interfaces to standard accounting and billing systems easy. Modern communication systems will have to be compliant to different standards in a very flexible manner. The developed system is based on a hardware architecture using FPGAs (Field-Programmable Gate Arrays). This provides means to configure the satellite gateway for different standards and to optimise the transmission parameters for varying user traffic, thus increasing the efficiency significantly. The paper describes the flexible system architecture and focuses particularly on the DAMA access scheme and the chosen quality-of-service implementation. Emphasis has been put on the support of IP Version 6. Different standards (e.g. RCS and possible follow-ups) and the possibility to support them are discussed.
A news media analysis of economic sanction effects on access to medicine in Iran
Kheirandish, Mehrnaz; Rashidian, Arash; Bigdeli, Maryam
2015-01-01
Objective: In the past decades economic sanctions have been used by different countries or international organizations in order to deprive target countries of some transactions. While the sanctions do not target health care systems or public health structures, they may, in fact, affect the availability of health care in target countries. In this study, we used media analysis to assess the impacts of recent sanctions imposed by the Central Bank of Iran in 2012 on access to medicines in Iran. Methods: We searched different sources of written news media including a database of nonspecialized weeklies and magazines, online news sources, web pages of daily newspapers and healthcare oriented weeklies from 2011 to 2013. We searched the sources using the general term “medicine” to reduce the chances of missing relevant items. The identified news media were read, and categorized under three groups of items announcing “shortage of medicines,” “medicines related issues” and “no shortage.” We conducted trend analyzes to see whether the news media related to access to medicines were affected by the economic sanctions. Findings: A total number of 371 relevant news media were collected. The number of news media related to medicines substantially increased in the study period: 30 (8%), 161 (43%) and 180 (49%) were published in 2011, 2012 and 2013, respectively. While 145 (39%) of media items referred to the shortage of medicines, 97 (26%) reported no shortage or alleviating of concerns. Conclusion: Media analysis suggests a clear increase in the number of news media reporting a shortage in Iran after the sanctions. In 2013, there were accompanying increases in the number of news media reporting alleviation of the shortages of medicines. Our analysis provides evidence of negative effects of the sanctions on access to medicines in Iran. PMID:26645026
Introduction to Media Literacy Education and Media Literacy Education Bibliography.
ERIC Educational Resources Information Center
Robinson, Julia
Noting that media literacy education is mandated in almost every developed country in the world except the United States, this paper introduces the concept of media literacy education and presents a 32-item annotated bibliography on media literacy education. The paper defines media literacy as the ability to access, decode, analyze, evaluate, and…
Khan, A; Jayanthi, M; Gantasala, Nagavara Prasad; Bhooshan, N; Rao, Uma
2016-07-01
Stevia rebaudiana (Bertoni), commonly called candy leaf or sweet leaf, endemic to South America, is an important medicinal plant. As a source of low calorie natural sweetener 'stevoside', it is used in obesity, diabetes, treatment of heartburn and tooth decay, and also serves as a food supplement. Large scale commercial propagation of S. rebaudiana demands a suitable protocol. Here, we propose an improved protocol for in vitro multiplication of S. rebaudiana from nodal explants. In this protocol, the effect of laboratory grade urea on multiple shoot induction from nodal explants was studied. The nodal explants were initially cultured on Murashige and Skoog (MS) basal media for 2 weeks which facilitated the axillary bud break. Further, culturing of these explants on MS medium fortified with 6 benzyl amninopurine (BAP) (2 mg/L) and Naphthalene acetic acid (NAA) (1 mg/L) with and .without urea (5 mg/L) for a period of 40 days revealed maximum shoot production of 44.56 from a single nodal explant in media supplemented with urea as compared to 22.44 without urea. The differences in the number of shoots produced were significant and these shoots readily rooted in MS media with NAA (4 mg/L). Primary and secondary hardening was successful in these plants. There were no visible morphological abnormalities observed in the micropropagated plantlets. Genetic analysis from random samples also revealed that these plants are genetically uniform. The advantage of the present protocol is that the complete process of multiple shoot induction, rooting and hardening could be completed within a period of 6 months as compared to the existing protocols.
Performance factors of mobile rich media job aids for community health workers
Florez-Arango, Jose F; Dunn, Kim; Zhang, Jiajie
2011-01-01
Objective To study and analyze the possible benefits on performance of community health workers using point-of-care clinical guidelines implemented as interactive rich media job aids on small-format mobile platforms. Design A crossover study with one intervention (rich media job aids) and one control (traditional job aids), two periods, with 50 community health workers, each subject solving a total 15 standardized cases per period per period (30 cases in total per subject). Measurements Error rate per case and task, protocol compliance. Results A total of 1394 cases were evaluated. Intervention reduces errors by an average of 33.15% (p=0.001) and increases protocol compliance 30.18% (p<0.001). Limitations Medical cases were presented on human patient simulators in a laboratory setting, not on real patients. Conclusion These results indicate encouraging prospects for mHealth technologies in general, and the use of rich media clinical guidelines on cell phones in particular, for the improvement of community health worker performance in developing countries. PMID:21292702
Performance factors of mobile rich media job aids for community health workers.
Florez-Arango, Jose F; Iyengar, M Sriram; Dunn, Kim; Zhang, Jiajie
2011-01-01
To study and analyze the possible benefits on performance of community health workers using point-of-care clinical guidelines implemented as interactive rich media job aids on small-format mobile platforms. A crossover study with one intervention (rich media job aids) and one control (traditional job aids), two periods, with 50 community health workers, each subject solving a total 15 standardized cases per period per period (30 cases in total per subject). Error rate per case and task, protocol compliance. A total of 1394 cases were evaluated. Intervention reduces errors by an average of 33.15% (p = 0.001) and increases protocol compliance 30.18% (p < 0.001). Limitations Medical cases were presented on human patient simulators in a laboratory setting, not on real patients. These results indicate encouraging prospects for mHealth technologies in general, and the use of rich media clinical guidelines on cell phones in particular, for the improvement of community health worker performance in developing countries.
A universal data access and protocol integration mechanism for smart home
NASA Astrophysics Data System (ADS)
Shao, Pengfei; Yang, Qi; Zhang, Xuan
2013-03-01
With the lack of standardized or completely missing communication interfaces in home electronics, there is no perfect solution to address every aspect in smart homes based on existing protocols and technologies. In addition, the central control unit (CCU) of smart home system working point-to-point between the multiple application interfaces and the underlying hardware interfaces leads to its complicated architecture and unpleasant performance. A flexible data access and protocol integration mechanism is required. The current paper offers a universal, comprehensive data access and protocol integration mechanism for a smart home. The universal mechanism works as a middleware adapter with unified agreements of the communication interfaces and protocols, offers an abstraction of the application level from the hardware specific and decoupling the hardware interface modules from the application level. Further abstraction for the application interfaces and the underlying hardware interfaces are executed based on adaption layer to provide unified interfaces for more flexible user applications and hardware protocol integration. This new universal mechanism fundamentally changes the architecture of the smart home and in some way meets the practical requirement of smart homes more flexible and desirable.
Heuvelink, Annet; Hassan, Abdulwahed Ahmed; van Weering, Hilmar; van Engelen, Erik; Bülte, Michael; Akineden, Ömer
2017-05-01
Mycobacterium avium subsp. paratuberculosis (MAP) is a vigorous microorganism which causes incurable chronic enteritis, Johne's disease (JD) in cattle. A target of control programmes for JD is to accurately detect MAP-infected cattle early to reduce disease transmission. The present study evaluated the efficacy of two different cultural procedures and a TaqMan real-time PCR assay for detection of subclinical paratuberculosis in dairy herds. Therefore, sixty-one faecal samples were collected from two Dutch dairy herds (n = 40 and n = 21, respectively) which were known to be MAP-ELISA positive. All individual samples were assessed using two different cultural protocols in two different laboratories. The first cultural protocol (first laboratory) included a decontamination step with 0.75% hexadecylpyridinium chloride (HPC) followed by inoculation on Herrold's egg yolk media (HEYM). The second protocol (second laboratory) comprised of a decontamination step using 4% NaOH and malachite green-oxalic acid followed by inoculation on two media, HEYM and in parallel on modified Löwenstein-Jensen media (mLJ). For the TaqMan real-time PCR assay, all faecal samples were tested in two different laboratories using TaqMan® MAP (Johne's) reagents (Life Technologies). The cultural procedures revealed positive reactions in 1.64% of the samples for cultivation protocol 1 and 6.56 and 8.20% of the samples for cultivation protocol 2, respectively. The results of the TaqMan real-time PCR performed in two different laboratories yielded 13.11 and 19.76% positive reaction. The kappa test showed proportional agreement 0.54 between the mLJ media (second laboratory) and TaqMan® real-time PCR method (second laboratory). In conclusion, the TaqMan real-time PCR could be a strongly useful and efficient assay for the detection of subclinical paratuberculosis in dairy cattle leading to an improvement in the efficiency of MAP control strategies.
NASA Technical Reports Server (NTRS)
Rybczynski, Fred
1993-01-01
A major challenge facing data processing centers today is data management. This includes the storage of large volumes of data and access to it. Current media storage for large data volumes is typically off line and frequently off site in warehouses. Access to data archived in this fashion can be subject to long delays, errors in media selection and retrieval, and even loss of data through misplacement or damage to the media. Similarly, designers responsible for architecting systems capable of continuous high-speed recording of large volumes of digital data are faced with the challenge of identifying technologies and configurations that meet their requirements. Past approaches have tended to evaluate the combination of the fastest tape recorders with the highest capacity tape media and then to compromise technology selection as a consequence of cost. This paper discusses an architecture that addresses both of these challenges and proposes a cost effective solution based on robots, high speed helical scan tape drives, and large-capacity media.
Cross-layer model design in wireless ad hoc networks for the Internet of Things.
Yang, Xin; Wang, Ling; Xie, Jian; Zhang, Zhaolin
2018-01-01
Wireless ad hoc networks can experience extreme fluctuations in transmission traffic in the Internet of Things, which is widely used today. Currently, the most crucial issues requiring attention for wireless ad hoc networks are making the best use of low traffic periods, reducing congestion during high traffic periods, and improving transmission performance. To solve these problems, the present paper proposes a novel cross-layer transmission model based on decentralized coded caching in the physical layer and a content division multiplexing scheme in the media access control layer. Simulation results demonstrate that the proposed model effectively addresses these issues by substantially increasing the throughput and successful transmission rate compared to existing protocols without a negative influence on delay, particularly for large scale networks under conditions of highly contrasting high and low traffic periods.
Cross-layer model design in wireless ad hoc networks for the Internet of Things
Wang, Ling; Xie, Jian; Zhang, Zhaolin
2018-01-01
Wireless ad hoc networks can experience extreme fluctuations in transmission traffic in the Internet of Things, which is widely used today. Currently, the most crucial issues requiring attention for wireless ad hoc networks are making the best use of low traffic periods, reducing congestion during high traffic periods, and improving transmission performance. To solve these problems, the present paper proposes a novel cross-layer transmission model based on decentralized coded caching in the physical layer and a content division multiplexing scheme in the media access control layer. Simulation results demonstrate that the proposed model effectively addresses these issues by substantially increasing the throughput and successful transmission rate compared to existing protocols without a negative influence on delay, particularly for large scale networks under conditions of highly contrasting high and low traffic periods. PMID:29734355
Pace: Privacy-Protection for Access Control Enforcement in P2P Networks
NASA Astrophysics Data System (ADS)
Sánchez-Artigas, Marc; García-López, Pedro
In open environments such as peer-to-peer (P2P) systems, the decision to collaborate with multiple users — e.g., by granting access to a resource — is hard to achieve in practice due to extreme decentralization and the lack of trusted third parties. The literature contains a plethora of applications in which a scalable solution for distributed access control is crucial. This fact motivates us to propose a protocol to enforce access control, applicable to networks consisting entirely of untrusted nodes. The main feature of our protocol is that it protects both sensitive permissions and sensitive policies, and does not rely on any centralized authority. We analyze the efficiency (computational effort and communication overhead) as well as the security of our protocol.
Research of Ad Hoc Networks Access Algorithm
NASA Astrophysics Data System (ADS)
Xiang, Ma
With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. When the ad hoc network is the access network of the internet, the gateway discovery protocol is very important to choose the most appropriate gateway to guarantee the connectivity between ad hoc network and IP based fixed networks. The paper proposes a QoS gateway discovery protocol which uses the time delay and stable route to the gateway selection conditions. And according to the gateway discovery protocol, it also proposes a fast handover scheme which can decrease the handover time and improve the handover efficiency.
NASA Astrophysics Data System (ADS)
Lahinta, A.; Haris, I.; Abdillah, T.
2017-03-01
The aim of this paper is to describe a developed application of Simple Object Access Protocol (SOAP) as a model for improving libraries’ digital content findability on the library web. The study applies XML text-based protocol tools in the collection of data about libraries’ visibility performance in the search results of the book. Model from the integrated Web Service Document Language (WSDL) and Universal Description, Discovery and Integration (UDDI) are applied to analyse SOAP as element within the system. The results showed that the developed application of SOAP with multi-tier architecture can help people simply access the website in the library server Gorontalo Province and support access to digital collections, subscription databases, and library catalogs in each library in Regency or City in Gorontalo Province.
Browsing for the Best Internet Access Provider?
ERIC Educational Resources Information Center
Weil, Marty
1996-01-01
Highlights points to consider when choosing an Internet Service Provider. Serial Line Internet Protocol (SLIP) and Point to Point Protocol (PPP) are compared regarding price, performance, bandwidth, speed, and technical support. Obtaining access via local, national, consumer online, and telephone-company providers is discussed. A pricing chart and…
Direct data access protocols benchmarking on DPM
NASA Astrophysics Data System (ADS)
Furano, Fabrizio; Devresse, Adrien; Keeble, Oliver; Mancinelli, Valentina
2015-12-01
The Disk Pool Manager is an example of a multi-protocol, multi-VO system for data access on the Grid that went though a considerable technical evolution in the last years. Among other features, its architecture offers the opportunity of testing its different data access frontends under exactly the same conditions, including hardware and backend software. This characteristic inspired the idea of collecting monitoring information from various testbeds in order to benchmark the behaviour of the HTTP and Xrootd protocols for the use case of data analysis, batch or interactive. A source of information is the set of continuous tests that are run towards the worldwide endpoints belonging to the DPM Collaboration, which accumulated relevant statistics in its first year of activity. On top of that, the DPM releases are based on multiple levels of automated testing that include performance benchmarks of various kinds, executed regularly every day. At the same time, the recent releases of DPM can report monitoring information about any data access protocol to the same monitoring infrastructure that is used to monitor the Xrootd deployments. Our goal is to evaluate under which circumstances the HTTP-based protocols can be good enough for batch or interactive data access. In this contribution we show and discuss the results that our test systems have collected under the circumstances that include ROOT analyses using TTreeCache and stress tests on the metadata performance.
Affective Support for Intellectual Access: Preventing Accidents on the On-Ramp.
ERIC Educational Resources Information Center
Havener, W. Michael; Latrobe, Kathy
1995-01-01
Discussion of how students can successfully enter the information highway focuses on the role of the school media specialist. Topics include information-seeking behavior; missions and goals of library media programs; affective access, including interpersonal communication, physical and affective ergonomics, and social interaction; and global…
TESOL and Media Education: Navigating Our Screen-Saturated Worlds
ERIC Educational Resources Information Center
Chamberlin-Quinlisk, Carla
2012-01-01
Much has changed for today's language learners. The people, artifacts, and popular culture of a target language are often highly accessible to language learners and teachers, despite geographical barriers. This accessibility, of course, is possible through mass media and electronic forms of communication. This is phenomenal. But with this…
Is Maternal PTSD Associated with Greater Exposure of Very Young Children to Violent Media?
Schechter, Daniel S.; Gross, Anna; Willheim, Erica; McCaw, Jaime; Turner, J. Blake; Myers, Michael M.; Zeanah, Charles H.; Gleason, Mary Margaret
2009-01-01
This study examined media-viewing by mothers with violence-related posttraumatic stress disorder (PTSD) and related media exposure of their preschool-age children. Mothers (N = 67) recruited from community pediatric clinics participated in a protocol involving a media-preference survey. Severity of maternal PTSD and dissociation were significantly associated with child exposure to violent media. Family poverty and maternal viewing-behavior were also associated. Maternal viewing-behavior mediated the effects specifically of maternal PTSD severity on child exposure. Clinicians should assess maternal and child media viewing practices in families with histories of violent trauma exposure and related psychopathology. PMID:19924819
Is maternal PTSD associated with greater exposure of very young children to violent media?
Schechter, Daniel S; Gross, Anna; Willheim, Erica; McCaw, Jaime; Turner, J Blake; Myers, Michael M; Zeanah, Charles H; Gleason, Mary Margaret
2009-12-01
This study examined media viewing by mothers with violence-related posttraumatic stress disorder (PTSD) and related media exposure of their preschool-age children. Mothers (N = 67) recruited from community pediatric clinics participated in a protocol involving a media-preference survey. Severity of maternal PTSD and dissociation were significantly associated with child exposure to violent media. Family poverty and maternal viewing behavior were also associated. Maternal viewing behavior mediated the effects specifically of maternal PTSD severity on child exposure. Clinicians should assess maternal and child media viewing practices in families with histories of violent trauma exposure and related psychopathology.
Media and youth: access, exposure, and privatization.
Roberts, D F
2000-08-01
To describe U.S. youth's access and exposure to the full array of media, as well as the social contexts in which media exposure occurs. A cross-sectional national random sample of 2065 adolescents aged 8 through 18 years, including oversamples of African-American and Hispanic youth, completed questionnaires about use of television, videotapes, movies, computers, video games, radio, compact discs, tape players, books, newspapers, and magazines. U.S. youngsters are immersed in media. Most households contain most media (computers and video game systems are the exception); the majority of youth have their own personal media. The average youth devotes 6 3/4 h to media; simultaneous use of multiple media increases exposure to 8 h of media messages daily. Overall, media exposure and exposure to individual media vary as a function of age, gender, race/ethnicity, and family socioeconomic level. Television remains the dominant medium. About one-half of the youth sampled uses a computer daily. A substantial proportion of children's and adolescents' media use occurs in the absence of parents. American youth devote more time to media than to any other waking activity, as much as one-third of each day. This demands increased parental attention and research into the effects of such extensive exposure.
Internet for Library Media Specialists.
ERIC Educational Resources Information Center
Simpson, Carol Mann
This guide introduces the library media specialist to the Internet, its history and features, and provides information on specific uses of the Internet in school libraries and specific areas. Section 1, "What is the Internet?" introduces the reader to the Internet; electronic mail; telnet; file transfer protocol (FTP); wide area…
Bhalla, Vandana; Gupta, Ankush; Kumar, Manoj
2012-06-15
Novel pentacenequinone derivative 3 has been synthesized using the Suzuki-Miyaura coupling protocol which forms fluorescent nanoaggregates in aqueous media due to its aggregation-induced emission enhancement attributes and selectively senses picric acid with a detection limit of 500 ppb.
Making Microbiology Even Smaller!
ERIC Educational Resources Information Center
Young, Linda Mull; Motz, Vicki Abrams
2013-01-01
We outline protocols for producing slant-minis (SLINIs) and mini-deeps (MEEPs) and examples of their use in simple microbiology experiments suitable for high school students. The principal benefits of these protocols are decreased cost associated with significantly reduced media use; easier, less expensive disposal of waste; and increased safety…
Performance comparison of token ring protocols for hard-real-time communication
NASA Technical Reports Server (NTRS)
Kamat, Sanjay; Zhao, Wei
1992-01-01
The ability to guarantee the deadlines of synchronous messages while maintaining a good aggregate throughput is an important consideration in the design of distributed real-time systems. In this paper, we study two token ring protocols, the priority driven protocol and the timed token protocol, for their suitability for hard real-time systems. Both these protocols use a token to control access to the transmission medium. In a priority driven protocol, messages are assigned priorities and the protocol ensures that messages are transmitted in the order of their priorities. Timed token protocols do not provide for priority arbitration but ensure that the maximum access delay for a station is bounded. For both protocols, we first derive the schedulability conditions under which the transmission deadlines of a given set of synchronous messages can be guaranteed. Subsequently, we use these schedulability conditions to quantitatively compare the average case behavior of the protocols. This comparison demonstrates that each of the protocols has its domain of superior performance and neither dominates the other for the entire range of operating conditions.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-03
... Collection; Comment Request; Protocol for Access to Tissue Specimen Samples From the National Marine Mammal Tissue Bank AGENCY: National Oceanic and Atmospheric Administration (NOAA), Commerce. ACTION: Notice... National Marine Mammal Tissue Bank (NMMTB) was established by the National Marine Fisheries Service (NMFS...
Securing TCP/IP and Dial-up Access to Administrative Data.
ERIC Educational Resources Information Center
Conrad, L. Dean
1992-01-01
This article describes Arizona State University's solution to security risk inherent in general access systems such as TCP/IP (Transmission Control Protocol/INTERNET Protocol). Advantages and disadvantages of various options are compared, and the process of selecting a log-on authentication approach involving generation of a different password at…
Measles, social media and surveillance in Baltimore City.
Warren, Katherine E; Wen, Leana S
2017-09-01
Baltimore City was faced with two potential measles outbreaks in 2015. Both cases occurred in the wake of national media attention paid to the Disneyland outbreaks of the same year. A comparative case study approach was used applying qualitative data to elicit best practices in infectious disease protocols in the age of social media. The research also used search engine data from Google Trends to track constituent engagement over time. Across the two case studies, the Baltimore City Health Department identified a number of best practices to inform the public via social media and minimize levels of misinformation and panic. These practices included clarity in messaging across platforms and public health jurisdictions; pre-emptor alerts of potential measles cases to control and shape the media messaging; and targeted, in-person outreach to engage groups in a culturally competent manner. The Baltimore City Health Department's response drew out a critical need for re-examining infectious disease protocols in the age of social media (e.g. contact notification, quarantine, media sensitivity) and anti-vaccination movements that pose new obstacles to government intervention. The benefits and challenges of greater connectivity between providers, patients, and public health officers are discussed. © The Author 2016. Published by Oxford University Press on behalf of Faculty of Public Health. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
Karády, Júlia; Panajotu, Alexisz; Kolossváry, Márton; Szilveszter, Bálint; Jermendy, Ádám L; Bartykowszki, Andrea; Károlyi, Mihály; Celeng, Csilla; Merkely, Béla; Maurovich-Horvat, Pál
2017-11-01
Contrast media (CM) extravasation is a well-known complication of CT angiography (CTA). Our prospective randomized control study aimed to assess whether a four-phasic CM administration protocol reduces the risk of extravasation compared to the routinely used three-phasic protocol in coronary CTA. Patients referred to coronary CTA due to suspected coronary artery disease were included in the study. All patients received 400 mg/ml iomeprol CM injected with dual-syringe automated injector. Patients were randomized into a three-phasic injection-protocol group, with a CM bolus of 85 ml followed by 40 ml of 75%:25% saline/CM mixture and 30 ml saline chaser bolus; and a four-phasic injection-protocol group, with a saline pacer bolus of 10 ml injected at a lower flow rate before the three-phasic protocol. 2,445 consecutive patients were enrolled (mean age 60.6 ± 12.1 years; females 43.6%). Overall rate of extravasation was 0.9% (23/2,445): 1.4% (17/1,229) in the three-phasic group and 0.5% (6/1,216) in the four-phasic group (p = 0.034). Four-phasic CM administration protocol is easy to implement in the clinical routine at no extra cost. The extravasation rate is reduced by 65% with the application of the four-phasic protocol compared to the three-phasic protocol in coronary CTA. • Four-phasic CM injection-protocol reduces extravasation rate by 65% compared to three-phasic. • The saline pacer bolus substantially reduces the risk of CM extravasation. • The implementation of four-phasic injection-protocol is at no cost.
Accessible virtual reality therapy using portable media devices.
Bruck, Susan; Watters, Paul A
2010-01-01
Simulated immersive environments displayed on large screens are a valuable therapeutic asset in the treatment of a range of psychological disorders. Permanent environments are expensive to build and maintain, require specialized clinician training and technical support and often have limited accessibility for clients. Ideally, virtual reality exposure therapy (VRET) could be accessible to the broader community if we could use inexpensive hardware with specifically designed software. This study tested whether watching a handheld non-immersive media device causes nausea and other cybersickness responses. Using a repeated measure design we found that nausea, general discomfort, eyestrain, blurred vision and an increase in salivation significantly increased in response to handheld non-immersive media device exposure.
Teaching Students about Violent Media Effects
ERIC Educational Resources Information Center
Bushman, Brad J.
2018-01-01
Although violent entertainment has existed for centuries, the media have made it more accessible than ever before. In modern societies, people are immersed in media, like fish in water. Using hand-held devices, people can consume media just about anywhere they want, anytime they want. Moreover, violence is a common theme in the media, and research…
Leisure time activities in space: A survey of astronauts and cosmonauts
NASA Astrophysics Data System (ADS)
Kelly, Alan D.; Kanas, Nick
Questionnaires were returned from 54 astronauts and cosmonauts which addressed preferences for media and media-generated subjects that could be used to occupy leisure time in space. Ninety-three percent of the respondents had access to records or audio cassettes, and cosmonauts had greater access than astronauts to multiple media. Cosmonauts and long-duration space travelers reported that they missed various media more than their astronaut and short-duration counterparts. Media subjects that related to international events, national events and historical topics were rated as most preferable by all respondents and by several of the respondent groups. The findings are discussed in terms of their relevance for occupying free time during future long-duration manned space missions.
ERIC Educational Resources Information Center
Kuter-Luks, Theresa; Heuvelman, Ard; Peters, Oscar
2011-01-01
Despite clear European and Dutch policies about media education, there is currently no media education curriculum in Dutch schools. A survey among preadolescents (n = 257) in six primary schools in the Netherlands included questions regarding media access, fears, risks, parental mediation of television and the internet, and the need for media…
The association between internet and television access and disordered eating in a Chinese sample.
Peat, Christine M; Von Holle, Ann; Watson, Hunna; Huang, Lu; Thornton, Laura M; Zhang, Bing; Du, Shufa; Kleiman, Susan C; Bulik, Cynthia M
2015-09-01
China has historically reported a low prevalence of eating disorders. However, the rapid social and economic development of this country as well as Western ideals widely disseminated by television and the Internet have led to distinct patterns of behavioral choices that could affect eating disorder risk. Thus, the current study explored the relation between disordered eating and media use. Participants were females from the 2009 wave of the China Health and Nutrition Survey (N = 1,053). Descriptive statistics were obtained and logistic regression models, stratified by age (adolescents ages 12-17 years and adults ages 18-35 years), were used to evaluate the association of media use with disordered eating. In adolescents, 46.8% had access to the Internet and those with access averaged one hour per day each of Internet and television use. In adults, 41.4% had access to the Internet, and those with access averaged 1 h per day of Internet use and 2 h per day of television use. Internet access was significantly associated with a subjective belief of fatness (OR = 2.8, 95% CI: 1.6, 4.9) and worry over losing control over eating (OR = 4.8, 95% CI: 2.3, 9.8) only in adults. These findings help characterize the overall pattern of media use and report of eating disorder symptoms in a large sample of female Chinese adolescents and adults. That Internet access in adults was significantly associated with disordered eating cognitions might suggest that media access negatively influences these domains; however, more granular investigations are warranted. © 2014 Wiley Periodicals, Inc.
The Association Between Internet and Television Access and Disordered Eating in a Chinese Sample
Peat, Christine M.; Von Holle, Ann; Watson, Hunna; Huang, Lu; Thornton, Laura M.; Zhang, Bing; Du, Shufa; Kleiman, Susan C.; Bulik, Cynthia M.
2014-01-01
Objective China has historically reported a low prevalence of eating disorders. However, the rapid social and economic development of this country as well as Western ideals widely disseminated by television and the Internet have led to distinct patterns of behavioral choices that could affect eating disorder risk. Thus, the current study explored the relation between disordered eating and media use. Method Participants were females from the 2009 wave of the China Health and Nutrition Survey (N = 1,053). Descriptive statistics were obtained and logistic regression models, stratified by age (adolescents ages 12-17 and adults ages 18-35), were used to evaluate the association of media use with disordered eating. Results In adolescents, 46.8% had access to the Internet and those with access averaged one hour per day each of Internet and television use. In adults, 41.4% had access to the Internet, and those with access averaged one hour per day of Internet use and two hours per day of television use. Internet access was significantly associated with a subjective belief of fatness (OR = 2.8, 95% CI: 1.6, 4.9) and worry over losing control over eating (OR = 4.8, 95% CI: 2.3, 9.8) only in adults. Discussion These findings help characterize the overall pattern of media use and report of eating disorder symptoms in a large sample of female Chinese adolescents and adults. That Internet access in adults was significantly associated with disordered eating cognitions might suggest that media access negatively influences these domains;however,more granular investigations are warranted. PMID:25346164
Big6 Stage 3 - Location and Access Treasure Hunting
ERIC Educational Resources Information Center
Darrow, Rob
2005-01-01
Locating sources and accessing the information they contain is part of the Big6 approach to information problem solving. In this stage of knowing where to look and how to find the required source, library media specialists train students in the use of the card catalog in the library media center.
Preserving Long-Term Access to United States Government Documents in Legacy Digital Formats
ERIC Educational Resources Information Center
Woods, Kam A.
2010-01-01
Over the past several decades, millions of digital objects of significant scientific, economic, cultural, and historic value have been published and distributed to libraries and archives on removable media. Providing long-term access to these documents, media files, and software executables is an increasingly complex task because of dependencies…
Sex, Pornography, and the Mass Media: How Should Social Studies Teachers Respond?
ERIC Educational Resources Information Center
Martinson, David L.
2007-01-01
Many people fear that the current explosion in mass media technology is negatively affecting individuals and society via-a-vis considerations related to the accessibility of pornographic materials. The way this accessibility affects young people is of particular concern. In this article, the author addresses these concerns from the legal and…
Zhang, Sheng; Liang, Fei; Li, Wenfeng
2017-11-01
The decision to make protocols of phase III randomized controlled trials (RCTs) publicly accessible by leading journals was a landmark event in clinical trial reporting. Here, we compared primary outcomes defined in protocols with those in publications describing the trials and in trial registration. We identified phase III RCTs published between January 1, 2012, and June 30, 2015, in The New England Journal of Medicine, The Lancet, The Journal of the American Medical Association, and The BMJ with available protocols. Consistency in primary outcomes between protocols and registries (articles) was evaluated. We identified 299 phase III RCTs with available protocols in this analysis. Out of them, 25 trials (8.4%) had some discrepancy for primary outcomes between publications and protocols. Types of discrepancies included protocol-defined primary outcome reported as nonprimary outcome in publication (11 trials, 3.7%), protocol-defined primary outcome omitted in publication (10 trials, 3.3%), new primary outcome introduced in publication (8 trials, 2.7%), protocol-defined nonprimary outcome reported as primary outcome in publication (4 trials, 1.3%), and different timing of assessment of primary outcome (4 trials, 1.3%). Out of trials with discrepancies in primary outcome, 15 trials (60.0%) had discrepancies that favored statistically significant results. Registration could be seen as a valid surrogate of protocol in 237 of 299 trials (79.3%) with regard to primary outcome. Despite unrestricted public access to protocols, selective outcome reporting persists in a small fraction of phase III RCTs. Only studies from four leading journals were included, which may cause selection bias and limit the generalizability of this finding. Copyright © 2017 Elsevier Inc. All rights reserved.
Production, concentration and titration of pseudotyped HIV-1-based lentiviral vectors.
Kutner, Robert H; Zhang, Xian-Yang; Reiser, Jakob
2009-01-01
Over the past decade, lentiviral vectors have emerged as powerful tools for transgene delivery. The use of lentiviral vectors has become commonplace and applications in the fields of neuroscience, hematology, developmental biology, stem cell biology and transgenesis are rapidly emerging. Also, lentiviral vectors are at present being explored in the context of human clinical trials. Here we describe improved protocols to generate highly concentrated lentiviral vector pseudotypes involving different envelope glycoproteins. In this protocol, vector stocks are prepared by transient transfection using standard cell culture media or serum-free media. Such stocks are then concentrated by ultracentrifugation and/or ion exchange chromatography, or by precipitation using polyethylene glycol 6000, resulting in vector titers of up to 10(10) transducing units per milliliter and above. We also provide reliable real-time PCR protocols to titrate lentiviral vectors based on proviral DNA copies present in genomic DNA extracted from transduced cells or on vector RNA. These production/concentration methods result in high-titer vector preparations that show reduced toxicity compared with lentiviral vectors produced using standard protocols involving ultracentrifugation-based methods. The vector production and titration protocol described here can be completed within 8 d.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nicklaus, Dennis J.
2013-10-13
We have developed an Erlang language implementation of the Channel Access protocol. Included are low-level functions for encoding and decoding Channel Access protocol network packets as well as higher level functions for monitoring or setting EPICS process variables. This provides access to EPICS process variables for the Fermilab Acnet control system via our Erlang-based front-end architecture without having to interface to C/C++ programs and libraries. Erlang is a functional programming language originally developed for real-time telecommunications applications. Its network programming features and list management functions make it particularly well-suited for the task of managing multiple Channel Access circuits and PVmore » monitors.« less
2010-01-01
Background In September 2003, the Canadian government committed to developing legislation that would facilitate greater access to affordable medicines for developing countries. Over the course of eight months, the legislation, now known as Canada's Access to Medicines Regime (CAMR), went through a controversial policy development process and the newspaper media was one of the major venues in which the policy debates took place. The purpose of this study was to examine how the media framed CAMR to determine how policy goals were conceptualized, which stakeholder interests controlled the public debate and how these variables related to the public policy process. Methods We conducted a qualitative content analysis of newspaper coverage of the CAMR policy and implementation process from 2003-2008. The primary theoretical framework for this study was framing theory. A total of 90 articles from 11 Canadian newspapers were selected for inclusion in our analysis. A team of four researchers coded the articles for themes relating to access to medicines and which stakeholders' voice figured more prominently on each issue. Stakeholders examined included: the research-based industry, the generic industry, civil society, the Canadian government, and developing country representatives. Results The most frequently mentioned themes across all documents were the issues of drug affordability, intellectual property, trade agreements and obligations, and development. Issues such as human rights, pharmaceutical innovation, and economic competitiveness got little media representation. Civil society dominated the media contents, followed far behind by the Canadian government, the research-based and generic pharmaceutical industries. Developing country representatives were hardly represented in the media. Conclusions Media framing obscured the discussion of some of the underlying policy goals in this case and failed to highlight issues which are now significant barriers to the use of the legislation. Using the media to engage the public in more in-depth exploration of the policy issues at stake may contribute to a more informed policy development process. The media can be an effective channel for those stakeholders with a weaker voice in policy deliberations to raise public attention to particular issues; however, the political and institutional context must be taken into account as it may outweigh media framing effects. PMID:20044940
Ackerman, Ilana N; Bucknill, Andrew; Page, Richard S; Broughton, Nigel S; Roberts, Carol; Cavka, Bernarda; Schoch, Peter; Brand, Caroline A
2017-04-01
To explore the usefulness and accessibility of different delivery modes of disease-related education and support, as perceived by younger people with osteoarthritis (OA). People ages 20-55 years with hip or knee OA were recruited from 3 major Australian public hospitals and the community (n = 147). Data were collected on use of disease-related education and support services, as well as perceived usefulness and accessibility of delivery modes including group-based programs, online resources, telephone helplines, mailed information, social media, and mobile applications (rated on visual analog scales from 1-10; higher scores indicate greater usefulness or accessibility). Very few participants had used social media (5%), group self-management programs (3%), or telephone helplines (2%) to obtain OA information. Mailed information packs and online education programs were considered the most useful (median usefulness scores 8.0 and 7.0, respectively) and accessible methods (median accessibility scores 10.0 and 9.0, respectively) for providing OA education and support. Social media was perceived as least useful (median usefulness score 2.0) and least accessible; 45% of participants considered it "not at all useful," while 35% reported it would be "very difficult" to access OA education and support by this means. Less educational attainment was associated with greater perceived difficulty in accessing online/electronic delivery modes, while people in paid work perceived easier access. These data highlight the value of mailed information and online education to younger people with OA and can be used to develop targeted resources for individuals of working age. Social media was not a highly valued source of disease-related education and support. © 2016, American College of Rheumatology.
Mathieson, Kathleen; Leafman, Joan S; Horton, Mark B
2017-01-01
Health care access for medically underserved patients managing chronic conditions is challenging. While telemedicine can support patient education and engagement, the "digital divide" may be particularly problematic among the medically underserved. This study evaluated physical access to digital devices, use of e-mail and social media tools, and perceptions of telemedicine among American Indian (AI) patients with diabetes mellitus (DM). Survey data were collected from AI patients with DM during teleophthalmology exams. Eighty-eight percent of patients had access to digital device(s), 70% used e-mail, and 56% used social media. Younger age and greater education were positively associated with e-mail and social media use (p < .05). Most (60%) considered telemedicine an excellent medium for health-related patient education. American Indian patients with DM had access enabling patient education via telemedicine. Future work should examine patient technology preferences and effectiveness of technology-based education in improving outcomes among medically underserved populations.
The Intersystem - Internetworking for space systems
NASA Astrophysics Data System (ADS)
Landauer, C.
This paper is a description of the Intersystem, which is a mechanism for internetworking among existing and planned military satellite communication systems. The communication systems interconnected with this mechanism are called member systems, and the interconnected set of communication systems is called the Intersystem. The Intersystem is implemented with higher layer protocols that impose a common organization on the different signaling conventions, so that end users of different systems can communicate with each other. The Intersystem provides its coordination of member system access and resource requests with Intersystem Resource Controllers (IRCs), which are processors that implement the Intersystem protocols and have interfaces to the member systems' own access and resource control mechanisms. The IRCs are connected to each other to form the IRC Subnetwork. Terminals request services from the IRC Subnetwork using the Intersystem Access Control Protocols, and the IRC Subnetwork responses to the requests are coordinated using the RCRC (Resource Controller to Resource Controller) Protocols.
On the designing of a tamper resistant prescription RFID access control system.
Safkhani, Masoumeh; Bagheri, Nasour; Naderi, Majid
2012-12-01
Recently, Chen et al. have proposed a novel tamper resistant prescription RFID access control system, published in the Journal of Medical Systems. In this paper we consider the security of the proposed protocol and identify some existing weaknesses. The main attack is a reader impersonation attack which allows an active adversary to impersonate a legitimate doctor, e.g. the patient's doctor, to access the patient's tag and change the patient prescription. The presented attack is quite efficient. To impersonate a doctor, the adversary should eavesdrop one session between the doctor and the patient's tag and then she can impersonate the doctor with the success probability of '1'. In addition, we present efficient reader-tag to back-end database impersonation, de-synchronization and traceability attacks against the protocol. Finally, we propose an improved version of protocol which is more efficient compared to the original protocol while provides the desired security against the presented attacks.
Teaching Students to Think Critically about Social Media
ERIC Educational Resources Information Center
Brookfield, Stephen D.
2015-01-01
Instructors can incorporate social media and the immediacy and accessibility to information these offer in ways that support student learning, while simultaneously encouraging students to be critical of these same media systems and platforms.
A Fair Contention Access Scheme for Low-Priority Traffic in Wireless Body Area Networks
Sajeel, Muhammad; Bashir, Faisal; Asfand-e-yar, Muhammad; Tauqir, Muhammad
2017-01-01
Recently, wireless body area networks (WBANs) have attracted significant consideration in ubiquitous healthcare. A number of medium access control (MAC) protocols, primarily derived from the superframe structure of the IEEE 802.15.4, have been proposed in literature. These MAC protocols aim to provide quality of service (QoS) by prioritizing different traffic types in WBANs. A contention access period (CAP)with high contention in priority-based MAC protocols can result in higher number of collisions and retransmissions. During CAP, traffic classes with higher priority are dominant over low-priority traffic; this has led to starvation of low-priority traffic, thus adversely affecting WBAN throughput, delay, and energy consumption. Hence, this paper proposes a traffic-adaptive priority-based superframe structure that is able to reduce contention in the CAP period, and provides a fair chance for low-priority traffic. Simulation results in ns-3 demonstrate that the proposed MAC protocol, called traffic- adaptive priority-based MAC (TAP-MAC), achieves low energy consumption, high throughput, and low latency compared to the IEEE 802.15.4 standard, and the most recent priority-based MAC protocol, called priority-based MAC protocol (PA-MAC). PMID:28832495
Sarma, D; Sarma, S; Baruah, A
1999-04-01
A simple protocol for in vitro mass multiplication of Rauvolfia tetraphylla (Apocynaceae) has been developed. The endophytic microflora was controlled by adopting integrated measures. Multiple shoot development was achieved on MS + Kin (0.1-0.2 mg/l) + BAP (0.4-0.5 mg/l) media. Rooting from in vitro shoots occurred on NAA containing media. In vitro flowering was induced in shoot multiplication media.
Media Use in School-Aged Children and Adolescents.
2016-11-01
This policy statement focuses on children and adolescents 5 through 18 years of age. Research suggests both benefits and risks of media use for the health of children and teenagers. Benefits include exposure to new ideas and knowledge acquisition, increased opportunities for social contact and support, and new opportunities to access health-promotion messages and information. Risks include negative health effects on weight and sleep; exposure to inaccurate, inappropriate, or unsafe content and contacts; and compromised privacy and confidentiality. Parents face challenges in monitoring their children's and their own media use and in serving as positive role models. In this new era, evidence regarding healthy media use does not support a one-size-fits-all approach. Parents and pediatricians can work together to develop a Family Media Use Plan (www.healthychildren.org/MediaUsePlan) that considers their children's developmental stages to individualize an appropriate balance for media time and consistent rules about media use, to mentor their children, to set boundaries for accessing content and displaying personal information, and to implement open family communication about media. Copyright © 2016 by the American Academy of Pediatrics.
Social Media Tools for Teaching and Learning
ERIC Educational Resources Information Center
Wagner, Ronald
2011-01-01
According to Wikipedia, "social media is the media designed to be disseminated through social interaction, created using highly accessible scalable techniques. Social media is the use of web-based and mobile technologies to turn communication into interactive dialogue." Social networks, such as Facebook and Twitter, contain millions of members who…
45 CFR 702.16 - Attendance of news media at public sessions.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 45 Public Welfare 3 2010-10-01 2010-10-01 false Attendance of news media at public sessions. 702... Attendance of news media at public sessions. Reasonable access for coverage of public sessions shall be provided to the various communications media, including newspapers, magazines, radio, newsreels, and...
45 CFR 702.16 - Attendance of news media at public sessions.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 45 Public Welfare 3 2011-10-01 2011-10-01 false Attendance of news media at public sessions. 702... Attendance of news media at public sessions. Reasonable access for coverage of public sessions shall be provided to the various communications media, including newspapers, magazines, radio, newsreels, and...
45 CFR 702.16 - Attendance of news media at public sessions.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 45 Public Welfare 3 2012-10-01 2012-10-01 false Attendance of news media at public sessions. 702... Attendance of news media at public sessions. Reasonable access for coverage of public sessions shall be provided to the various communications media, including newspapers, magazines, radio, newsreels, and...
45 CFR 702.16 - Attendance of news media at public sessions.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 45 Public Welfare 3 2014-10-01 2014-10-01 false Attendance of news media at public sessions. 702... Attendance of news media at public sessions. Reasonable access for coverage of public sessions shall be provided to the various communications media, including newspapers, magazines, radio, newsreels, and...
45 CFR 702.16 - Attendance of news media at public sessions.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 45 Public Welfare 3 2013-10-01 2013-10-01 false Attendance of news media at public sessions. 702... Attendance of news media at public sessions. Reasonable access for coverage of public sessions shall be provided to the various communications media, including newspapers, magazines, radio, newsreels, and...
From Gutenberg to Gates: Media Matters
ERIC Educational Resources Information Center
Considine, David M.
2009-01-01
Media consolidation and convergence have increasingly changed the way individuals as both consumers and citizens access, process, and communicate information at the local, national, and global levels. Media industries and institutions influence public perception and occupy our time at work and at home more and more. Media literacy has become…
Fourth Annual International Acquisitions Workshop: Access to Multiple Media Worldwide
NASA Technical Reports Server (NTRS)
1994-01-01
Topics discussed during the workshop include: (1) Multinational-Multiple media collections and activities spanning many countries; (2) Multiple media in North American trade and commerce; (3) African spotlight; (4) Europe-Multiple media in national libraries and services; (5) Scandinavian spotlight; (6) Internet update; (7) Multiple media in US federal agencies; (8) Open-source multiple media in US federal agencies; and (9) Multiple media at US federal technical agencies-NIST and NOAA.
Guided Note Taking and Student Achievement in a Media Law Course
ERIC Educational Resources Information Center
Blom, Robin
2017-01-01
In a quasi-experimental setting, a group of U.S. college students in an introductory media law course had higher test scores when the instructor provided access to guided worksheets than a group of students without access to guided worksheets. It also allows educators in journalism and mass communication to cover more materials during courses…
Library Media Centers: Accessibility Issues in Rural Missouri
ERIC Educational Resources Information Center
Cox, John E.; Lynch, Debra M.
2006-01-01
Based on a study by Cox (2004), this article deals with the needs of students with visual, hearing, and orthopedic impairments in terms of full access to school library media centers. Fictitious vignettes of student concerns as well as possible answers and thought-provoking questions expand Cox's rural Missouri-based study to a much wider audience…
75 FR 57333 - Privacy Act of 1974; Republication of Systems of Records Notices
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-20
... file folders and on electronic media. RETRIEVABILITY: Accessed by name, tag number, and/or permit... file folders and on electronic media. RETRIEVABILITY: Records are accessed by name. SAFEGUARDS: Records... SYSTEM: 5 CFR 2634-2641, 5801; 5 U.S.C. 7351, 7353; Ethics in Government Act of 1978, as amended (5 U.S.C...
Channel MAC Protocol for Opportunistic Communication in Ad Hoc Wireless Networks
NASA Astrophysics Data System (ADS)
Ashraf, Manzur; Jayasuriya, Aruna; Perreau, Sylvie
2008-12-01
Despite significant research effort, the performance of distributed medium access control methods has failed to meet theoretical expectations. This paper proposes a protocol named "Channel MAC" performing a fully distributed medium access control based on opportunistic communication principles. In this protocol, nodes access the channel when the channel quality increases beyond a threshold, while neighbouring nodes are deemed to be silent. Once a node starts transmitting, it will keep transmitting until the channel becomes "bad." We derive an analytical throughput limit for Channel MAC in a shared multiple access environment. Furthermore, three performance metrics of Channel MAC—throughput, fairness, and delay—are analysed in single hop and multihop scenarios using NS2 simulations. The simulation results show throughput performance improvement of up to 130% with Channel MAC over IEEE 802.11. We also show that the severe resource starvation problem (unfairness) of IEEE 802.11 in some network scenarios is reduced by the Channel MAC mechanism.
Traffic Adaptive Energy Efficient and Low Latency Medium Access Control for Wireless Sensor Networks
NASA Astrophysics Data System (ADS)
Yadav, Rajesh; Varma, Shirshu; Malaviya, N.
2008-05-01
Medium access control for wireless sensor networks has been a very active research area in the recent years. The traditional wireless medium access control protocol such as IEEE 802.11 is not suitable for the sensor network application because these are battery powered. The recharging of these sensor nodes is expensive and also not possible. The most of the literature in the medium access for the sensor network focuses on the energy efficiency. The proposed MAC protocol solves the energy inefficiency caused by idle listening, control packet overhead and overhearing taking nodes latency into consideration based on the network traffic. Simulation experiments have been performed to demonstrate the effectiveness of the proposed approach. The validation of the simulation results of the proposed MAC has been done by comparing it with the analytical model. This protocol has been simulated in Network Simulator ns-2.
Simple Spectral Lines Data Model Version 1.0
NASA Astrophysics Data System (ADS)
Osuna, Pedro; Salgado, Jesus; Guainazzi, Matteo; Dubernet, Marie-Lise; Roueff, Evelyne; Osuna, Pedro; Salgado, Jesus
2010-12-01
This document presents a Data Model to describe Spectral Line Transitions in the context of the Simple Line Access Protocol defined by the IVOA (c.f. Ref[13] IVOA Simple Line Access protocol) The main objective of the model is to integrate with and support the Simple Line Access Protocol, with which it forms a compact unit. This integration allows seamless access to Spectral Line Transitions available worldwide in the VO context. This model does not provide a complete description of Atomic and Molecular Physics, which scope is outside of this document. In the astrophysical sense, a line is considered as the result of a transition between two energy levels. Under the basis of this assumption, a whole set of objects and attributes have been derived to define properly the necessary information to describe lines appearing in astrophysical contexts. The document has been written taking into account available information from many different Line data providers (see acknowledgments section).
Reductive amination with zinc powder in aqueous media
Imperio, Daniela; Penoni, Andrea; Palmisano, Giovanni
2011-01-01
Summary Zinc powder in aqueous alkaline media was employed to perform reductive amination of aldehydes with primary amines. The corresponding secondary amines were obtained in good yields along with minor amounts of hydrodimerization byproducts. The protocol is a green alternative to the use of complex hydrides in chlorinated or highly flammable solvents. PMID:21915212
Laboratory maintenance of Treponema denticola.
Fenno, J Christopher
2005-10-01
This unit describes the methods, media, and equipment necessary for routine laboratory culture and handling of the anaerobic oral spirochete Treponema denticola. Topics discussed include nutrient requirements, recommended media formulations, and expected growth kinetics, as well as methods and equipment necessary to maintain anaerobic conditions. An additional protocol on isolation of T. denticola from clinical samples is included.
Efficient ultrafiltration-based protocol to deplete extracellular vesicles from fetal bovine serum
Kornilov, Roman; Puhka, Maija; Mannerström, Bettina; Hiidenmaa, Hanna; Peltoniemi, Hilkka; Siljander, Pia; Seppänen-Kaijansinkko, Riitta; Kaur, Sippy
2018-01-01
ABSTRACT Fetal bovine serum (FBS) is the most commonly used supplement in studies involving cell-culture experiments. However, FBS contains large numbers of bovine extracellular vesicles (EVs), which hamper the analyses of secreted EVs from the cell type of preference and, thus, also the downstream analyses. Therefore, a prior elimination of EVs from FBS is crucial. However, the current methods of EV depletion by ultracentrifugation are cumbersome and the commercial alternatives expensive. In this study, our aim was to develop a protocol to completely deplete EVs from FBS, which may have wide applicability in cell-culture applications. We investigated different EV-depleted FBS prepared by our novel ultrafiltration-based protocol, by conventionally used overnight ultracentrifugation, or commercially available depleted FBS, and compared them with regular FBS. All sera were characterized by nanoparticle tracking analysis, electron microscopy, Western blotting and RNA quantification. Next, adipose-tissue mesenchymal stem cells (AT-MSCs) and cancer cells were grown in the media supplemented with the three different EV-depleted FBS and compared with cells grown in regular FBS media to assess the effects on cell proliferation, stress, differentiation and EV production. The novel ultrafiltration-based protocol depleted EVs from FBS clearly more efficiently than ultracentrifugation and commercial methods. Cell proliferation, stress, differentiation and EV production of AT-MSCs and cancer cell lines were similarly maintained in all three EV-depleted FBS media up to 96 h. In summary, our ultrafiltration protocol efficiently depletes EVs, is easy to use and maintains cell growth and metabolism. Since the method is also cost-effective and easy to standardize, it could be used in a wide range of cell-culture applications helping to increase comparability of EV research results between laboratories. PMID:29410778
Optimizing the NASA Technical Report Server
NASA Technical Reports Server (NTRS)
Nelson, Michael L.; Maa, Ming-Hokng
1996-01-01
The NASA Technical Report Server (NTRS), a World Wide Web report distribution NASA technical publications service, is modified for performance enhancement, greater protocol support, and human interface optimization. Results include: Parallel database queries, significantly decreasing user access times by an average factor of 2.3; access from clients behind firewalls and/ or proxies which truncate excessively long Uniform Resource Locators (URLs); access to non-Wide Area Information Server (WAIS) databases and compatibility with the 239-50.3 protocol; and a streamlined user interface.
USDA-ARS?s Scientific Manuscript database
The US Culture Collection Network held a meeting to share information about how collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Bio...
Patient Participation in Chronic Pain Management Through Social Media: A Clinical Study.
Merolli, Mark; Gray, Kathleen; Martin-Sanchez, Fernando
2016-01-01
Chronic pain places a significant burden on individuals as well as health services. Long wait lists to access public clinical pain management services can result, and health outcomes deteriorate. Innovative technologies, such as social media provide opportunities to support self-management within the participatory health framework. This paper aims to investigate patients' perceptions towards using social media while waiting for clinic access, with a particular focus on therapeutic affordances. Seventeen wait-listed patients underwent intervention using various social media resources as part of self-management. Thematic content analysis of semi-structured interviews examined patients' perceptions about social media use and participation. Three therapeutic affordances were most evident in the qualitative data: exploration, connection and narration. Barriers to participation were also identified, such as 'specificity of the resources'. Findings suggest social media are perceived positively. However, there is also the need to balance a desire to deliver evidence-based practice with patient-preferences in shared-decision making about social media use.
ERIC Educational Resources Information Center
Cubbage, Jayne
2017-01-01
As the acceptance of media literacy increases among educators, media producers and consumers, one group is often missing from the dialogue--persons with disabilities. This absence is witnessed in the marginalized media depictions of the disabled. To gain entry into the media professions, some form of higher education is required. Using muted group…
ERIC Educational Resources Information Center
Greenhow, Christine, Ed.; Sonnevend, Julia, Ed.; Agur, Colin, Ed.
2016-01-01
How are widely popular social media such as Facebook, Twitter, and Instagram transforming how teachers teach, how kids learn, and the very foundations of education? What controversies surround the integration of social media in students' lives? The past decade has brought increased access to new media, and with this new opportunities and…
Rossi, C; Reginelli, A; D'Amora, M; Di Grezia, G; Mandato, Y; D'Andrea, A; Brunese, L; Grassi, R; Rotondi, A
2014-01-01
The purpose of the study is to examine the incidence of adverse reactions caused by non-ionic contrast media in selected patients after desensitization treatment and to evaluate the safety profile of organ iodine contrast media (i.c.m.) in a multistep prevention protocol. In a population of 2000 patients that had received a CT scan, 100 patients with moderate/high risk for adverse reactions against iodinated contrast agents followed a premedication protocol and all adverse reactions are reported and classified as mild, moderate or severe. 1.7 percent of the pre-treated patients reported a mild, immediate type reaction to iodine contrast; of these five patients with allergy 0.71 percent had received iomeprol, 0.35 percent received ioversol and 0.71 percent received iopromide. The incidence of adverse reactions was reported to be higher (4 out of 5 patients) among those that referred a history of hypersensitivity against iodinated i.c.m. Although intravenous contrast materials have greatly improved, especially in terms of their safety profile, they should not be administered if there isn't a clear or justified indication. In conclusion, even if we know that the majority of these reactions are idiosyncratic and unpredictable we propose, with the aim of improving our knowledge on this subject, a multicenter study, based on skin allergy tests (prick test, patch test, intradermal reaction) in selected patients that have had previous experiences of hypersensitivity against parenteral organ iodine contrast media.
Hyden, Christel; Cohall, Alwyn
2011-12-01
Over the past decade, new technology and media have changed the way we communicate, access information, and share content with one another. Most 12- to 17-year-olds now own cell phones, and most adolescents and young adults spend several hours per day on computers and cell phones. The American Academy of Pediatrics now encourages all pediatricians to increase their knowledge of new media and technology. This article details technology access among adolescents and young adults, highlights several current and potential innovative applications for new technology and social networking in health promotion, and discusses issues to consider as practitioners move toward integrating new media into clinical and health education settings.
Allergic reactions to iodinated contrast media: premedication considerations for patients at risk.
Schopp, Jennifer G; Iyer, Ramesh S; Wang, Carolyn L; Petscavage, Jonelle M; Paladin, Angelisa M; Bush, William H; Dighe, Manjiri K
2013-08-01
The objectives of this article are to review allergy-type reactions to iodinated contrast media and the protocols utilized to prevent or reduce the occurrence of these adverse reactions in high-risk patients. We will begin by discussing the types or classifications of the adverse reactions to iodinated contrast media. We will then discuss reaction mechanisms, identify the patients at highest risk for adverse reactions, and clarify common misperceptions about the risk. Finally, we will discuss the actions of the medications used to help reduce or prevent allergy-type reactions to iodinated contrast media, the protocols used to help reduce or prevent contrast reactions in high-risk patients, and the potential side effects of these medications. We will also discuss the high-risk patient who has received premedication due to a prior index reaction and discuss the risk of having a subsequent reaction, termed "breakthrough reaction." Identifying patient at high risk for an "allergy-type" reaction to contrast media is an essential task of the radiologist. Prevention of or reduction of the risk of an adverse reaction is critical to patient safety. If an examination can be performed without contrast in a patient at high risk for an allergy-type reaction, it may be appropriate to avoid contrast. However, there are situations where contrast media is necessary, and the radiologist plays a vital role in preventing or mitigating an allergy-type reaction.
How Health Care Professionals Use Social Media to Create Virtual Communities: An Integrative Review
2016-01-01
Background Prevailing health care structures and cultures restrict intraprofessional communication, inhibiting knowledge dissemination and impacting the translation of research into practice. Virtual communities may facilitate professional networking and knowledge sharing in and between health care disciplines. Objectives This study aimed to review the literature on the use of social media by health care professionals in developing virtual communities that facilitate professional networking, knowledge sharing, and evidence-informed practice. Methods An integrative literature review was conducted to identify research published between 1990 and 2015. Search strategies sourced electronic databases (PubMed, CINAHL), snowball references, and tables of contents of 3 journals. Papers that evaluated social media use by health care professionals (unless within an education framework) using any research design (except for research protocols or narrative reviews) were included. Standardized data extraction and quality assessment tools were used. Results Overall, 72 studies were included: 44 qualitative (including 2 ethnographies, 26 qualitative descriptive, and 1 Q-sort) and 20 mixed-methods studies, and 8 literature reviews. The most common methods of data collection were Web-based observation (n=39), surveys (n=23), interviews (n=11), focus groups (n=2), and diaries (n=1). Study quality was mixed. Social media studied included Listservs (n=22), Twitter (n=18), general social media (n=17), discussion forums (n=7), Web 2.0 (n=3), virtual community of practice (n=3), wiki (n=1), and Facebook (n=1). A range of health care professionals were sampled in the studies, including physicians (n=24), nurses (n=15), allied health professionals (n=14), followed by health care professionals in general (n=8), a multidisciplinary clinical specialty area (n=9), and midwives (n=2). Of 36 virtual communities, 31 were monodiscipline for a discrete clinical specialty. Population uptake by the target group ranged from 1.6% to 29% (n=4). Evaluation using related theories of “planned behavior” and the “technology acceptance model” (n=3) suggests that social media use is mediated by an individual’s positive attitude toward and accessibility of the media, which is reinforced by credible peers. The most common reason to establish a virtual community was to create a forum where relevant specialty knowledge could be shared and professional issues discussed (n=17). Most members demonstrated low posting behaviors but more frequent reading or accessing behaviors. The most common Web-based activity was request for and supply of specialty-specific clinical information. This knowledge sharing is facilitated by a Web-based culture of collectivism, reciprocity, and a respectful noncompetitive environment. Findings suggest that health care professionals view virtual communities as valuable knowledge portals for sourcing clinically relevant and quality information that enables them to make more informed practice decisions. Conclusions There is emerging evidence that health care professionals use social media to develop virtual communities to share domain knowledge. These virtual communities, however, currently reflect tribal behaviors of clinicians that may continue to limit knowledge sharing. Further research is required to evaluate the effects of social media on knowledge distribution in clinical practice and importantly whether patient outcomes are significantly improved. PMID:27328967
How Health Care Professionals Use Social Media to Create Virtual Communities: An Integrative Review.
Rolls, Kaye; Hansen, Margaret; Jackson, Debra; Elliott, Doug
2016-06-16
Prevailing health care structures and cultures restrict intraprofessional communication, inhibiting knowledge dissemination and impacting the translation of research into practice. Virtual communities may facilitate professional networking and knowledge sharing in and between health care disciplines. This study aimed to review the literature on the use of social media by health care professionals in developing virtual communities that facilitate professional networking, knowledge sharing, and evidence-informed practice. An integrative literature review was conducted to identify research published between 1990 and 2015. Search strategies sourced electronic databases (PubMed, CINAHL), snowball references, and tables of contents of 3 journals. Papers that evaluated social media use by health care professionals (unless within an education framework) using any research design (except for research protocols or narrative reviews) were included. Standardized data extraction and quality assessment tools were used. Overall, 72 studies were included: 44 qualitative (including 2 ethnographies, 26 qualitative descriptive, and 1 Q-sort) and 20 mixed-methods studies, and 8 literature reviews. The most common methods of data collection were Web-based observation (n=39), surveys (n=23), interviews (n=11), focus groups (n=2), and diaries (n=1). Study quality was mixed. Social media studied included Listservs (n=22), Twitter (n=18), general social media (n=17), discussion forums (n=7), Web 2.0 (n=3), virtual community of practice (n=3), wiki (n=1), and Facebook (n=1). A range of health care professionals were sampled in the studies, including physicians (n=24), nurses (n=15), allied health professionals (n=14), followed by health care professionals in general (n=8), a multidisciplinary clinical specialty area (n=9), and midwives (n=2). Of 36 virtual communities, 31 were monodiscipline for a discrete clinical specialty. Population uptake by the target group ranged from 1.6% to 29% (n=4). Evaluation using related theories of "planned behavior" and the "technology acceptance model" (n=3) suggests that social media use is mediated by an individual's positive attitude toward and accessibility of the media, which is reinforced by credible peers. The most common reason to establish a virtual community was to create a forum where relevant specialty knowledge could be shared and professional issues discussed (n=17). Most members demonstrated low posting behaviors but more frequent reading or accessing behaviors. The most common Web-based activity was request for and supply of specialty-specific clinical information. This knowledge sharing is facilitated by a Web-based culture of collectivism, reciprocity, and a respectful noncompetitive environment. Findings suggest that health care professionals view virtual communities as valuable knowledge portals for sourcing clinically relevant and quality information that enables them to make more informed practice decisions. There is emerging evidence that health care professionals use social media to develop virtual communities to share domain knowledge. These virtual communities, however, currently reflect tribal behaviors of clinicians that may continue to limit knowledge sharing. Further research is required to evaluate the effects of social media on knowledge distribution in clinical practice and importantly whether patient outcomes are significantly improved.
NASA Astrophysics Data System (ADS)
Zhang, Yichen; Li, Zhengyu; Zhao, Yijia; Yu, Song; Guo, Hong
2017-02-01
We analyze the security of the two-way continuous-variable quantum key distribution protocol in reverse reconciliation against general two-mode attacks, which represent all accessible attacks at fixed channel parameters. Rather than against one specific attack model, the expression of secret key rates of the two-way protocol are derived against all accessible attack models. It is found that there is an optimal two-mode attack to minimize the performance of the protocol in terms of both secret key rates and maximal transmission distances. We identify the optimal two-mode attack, give the specific attack model of the optimal two-mode attack and show the performance of the two-way protocol against the optimal two-mode attack. Even under the optimal two-mode attack, the performances of two-way protocol are still better than the corresponding one-way protocol, which shows the advantage of making double use of the quantum channel and the potential of long-distance secure communication using a two-way protocol.
Mojica, Cynthia M; Parra-Medina, Deborah; Yin, Zenong; Akopian, David; Esparza, Laura A
2014-07-01
Increasing physical activity (PA) during preadolescence and adolescence is critical to reversing the obesity epidemic. A recent report described the promising role of eHealth--the use of new media for purposes of health promotion--in reducing and preventing childhood obesity. This study assessed access/use of various media (cell phones, computers, gaming systems, Internet) among adolescent Latino girls and examined the relationship between PA and media access/use. A convenience sample of 110 Latino girls ages 11 to 14 was recruited from Girl Scouts of Southwest Texas and other groups. The media survey was self-administered (April-July 2010) on personal digital assistants. Of the girls, 55% reported owning a cell phone and spending 40 (SD = 4.2) hours per week talking, texting, listening to music, and browsing the Internet. Cell phone access increased significantly with age (p = .029). Compared to those with no cell phone, girls with a cell phone have greater odds of reporting more than 5 days of PA in the past week (odds ratio = 5.5, 95% confidence interval [CI] = 2.1, 14) and engaging in daily physical education classes (odds ratio = 2.6, 95% CI = 1.1, 5.9). Since girls with cell phones report greater PA, cell phones may be an effective strategy for communicating with girls about engaging in PA. © 2013 Society for Public Health Education.
Data aggregation in wireless sensor networks using the SOAP protocol
NASA Astrophysics Data System (ADS)
Al-Yasiri, A.; Sunley, A.
2007-07-01
Wireless sensor networks (WSN) offer an increasingly attractive method of data gathering in distributed system architectures and dynamic access via wireless connectivity. Wireless sensor networks have physical and resource limitations, this leads to increased complexity for application developers and often results in applications that are closely coupled with network protocols. In this paper, a data aggregation framework using SOAP (Simple Object Access Protocol) on wireless sensor networks is presented. The framework works as a middleware for aggregating data measured by a number of nodes within a network. The aim of the study is to assess the suitability of the protocol in such environments where resources are limited compared to traditional networks.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-04
... educational media in early learning programs and elementary and secondary schools that are not accessible to... account the media most commonly used in school districts and early learning programs across the nation... DEPARTMENT OF EDUCATION Applications for New Awards; Technology and Media Services for Individuals...
Logsdon, M Cynthia; Bennett, Gary; Crutzen, Rik; Martin, LuAnn; Eckert, Diane; Robertson, Ashley; Myers, John; Tomasulo, Roselyn; Gregg, Jennifer; Barone, Michael; Lynch, Tania; Flamini, Laura
2014-11-01
Little is known about how adolescent mothers use social media and the Internet, especially to access health information. In this cross-sectional, descriptive study, adolescent mothers were recruited from an academic medical center after the birth of their child (n = 94) or from a state-funded, home visitation program during the first year after birth (n = 91). They completed the Pew Internet Survey: 37 questions related to use of social media and Internet, particularly in regard to obtaining health information. All adolescent mothers used a computer and almost all went online. Most accessed the Internet by cell phone (67.4%) and used social media. The health topics searched most frequently were pregnancy/birth control (85.8%), sexually transmitted diseases (n = 134, 72.6%) and HIV (66.3%). Response to survey questions differed between the two groups (adolescent mothers surveyed after birth from academic medical center and adolescent mothers surveyed in the first postpartum year in the community). Adolescent mothers spend significant time on the Internet including searching for health information. Cell phones are their preferred methods for accessing the Internet, and they use social media. Thus, social media and the Internet are potentially feasible and acceptable vehicles to deliver health interventions to adolescent mothers. © 2014 Wiley Periodicals, Inc.
Schacht Hansen, M; Dørup, J
2001-01-01
The Wireless Application Protocol technology implemented in newer mobile phones has built-in facilities for handling much of the information processing needed in clinical work. To test a practical approach we ported a relational database of the Danish pharmaceutical catalogue to Wireless Application Protocol using open source freeware at all steps. We used Apache 1.3 web software on a Linux server. Data containing the Danish pharmaceutical catalogue were imported from an ASCII file into a MySQL 3.22.32 database using a Practical Extraction and Report Language script for easy update of the database. Data were distributed in 35 interrelated tables. Each pharmaceutical brand name was given its own card with links to general information about the drug, active substances, contraindications etc. Access was available through 1) browsing therapeutic groups and 2) searching for a brand name. The database interface was programmed in the server-side scripting language PHP3. A free, open source Wireless Application Protocol gateway to a pharmaceutical catalogue was established to allow dial-in access independent of commercial Wireless Application Protocol service providers. The application was tested on the Nokia 7110 and Ericsson R320s cellular phones. We have demonstrated that Wireless Application Protocol-based access to a dynamic clinical database can be established using open source freeware. The project opens perspectives for a further integration of Wireless Application Protocol phone functions in clinical information processing: Global System for Mobile communication telephony for bilateral communication, asynchronous unilateral communication via e-mail and Short Message Service, built-in calculator, calendar, personal organizer, phone number catalogue and Dictaphone function via answering machine technology. An independent Wireless Application Protocol gateway may be placed within hospital firewalls, which may be an advantage with respect to security. However, if Wireless Application Protocol phones are to become effective tools for physicians, special attention must be paid to the limitations of the devices. Input tools of Wireless Application Protocol phones should be improved, for instance by increased use of speech control.
Hansen, Michael Schacht
2001-01-01
Background The Wireless Application Protocol technology implemented in newer mobile phones has built-in facilities for handling much of the information processing needed in clinical work. Objectives To test a practical approach we ported a relational database of the Danish pharmaceutical catalogue to Wireless Application Protocol using open source freeware at all steps. Methods We used Apache 1.3 web software on a Linux server. Data containing the Danish pharmaceutical catalogue were imported from an ASCII file into a MySQL 3.22.32 database using a Practical Extraction and Report Language script for easy update of the database. Data were distributed in 35 interrelated tables. Each pharmaceutical brand name was given its own card with links to general information about the drug, active substances, contraindications etc. Access was available through 1) browsing therapeutic groups and 2) searching for a brand name. The database interface was programmed in the server-side scripting language PHP3. Results A free, open source Wireless Application Protocol gateway to a pharmaceutical catalogue was established to allow dial-in access independent of commercial Wireless Application Protocol service providers. The application was tested on the Nokia 7110 and Ericsson R320s cellular phones. Conclusions We have demonstrated that Wireless Application Protocol-based access to a dynamic clinical database can be established using open source freeware. The project opens perspectives for a further integration of Wireless Application Protocol phone functions in clinical information processing: Global System for Mobile communication telephony for bilateral communication, asynchronous unilateral communication via e-mail and Short Message Service, built-in calculator, calendar, personal organizer, phone number catalogue and Dictaphone function via answering machine technology. An independent Wireless Application Protocol gateway may be placed within hospital firewalls, which may be an advantage with respect to security. However, if Wireless Application Protocol phones are to become effective tools for physicians, special attention must be paid to the limitations of the devices. Input tools of Wireless Application Protocol phones should be improved, for instance by increased use of speech control. PMID:11720946
Wireless Distribution Systems To Support Medical Response to Disasters
Arisoylu, Mustafa; Mishra, Rajesh; Rao, Ramesh; Lenert, Leslie A.
2005-01-01
We discuss the design of multi-hop access networks with multiple gateways that supports medical response to disasters. We examine and implement protocols to ensure high bandwidth, robust, self-healing and secure wireless multi-hop access networks for extreme conditions. Address management, path setup, gateway discovery and selection protocols are described. Future directions and plans are also considered. PMID:16779171
Impact of a Social Media Group Page on Undergraduate Medical Physiology Learning.
Shakoori, Tania Ahmed; Mahboob, Usman; Strivens, Janet; Willis, Ian
2017-07-01
To investigate the impact of associating classroom learning of medical physiology with a Facebook group page in an all-women medical college of a conservative small city in Pakistan. Qualitative interpretivist study using semi-structured interviews. Women Medical College Abbottabad, Pakistan, from March to December 2014. Aclosed Facebook study group was established at a local medical college in Pakistan. It was used to upload learning resources and initiate discussions, coordinated with classroom lectures of physiology. Thirteen semistructured interviews were conducted with volunteer students according to a standard protocol. Five major themes were identified. Facebook group is something new and exciting; it motivated self-study, research, collaborative learning and improved class attendance. Convenience of easily accessible resources allowed the students to concentrate on the lecture rather than note taking. It was easier to communicate with the instructor through Facebook than face to face. Lurkers were also learning. High achievers who had adapted to the current didactic system of teaching were less receptive of the collaborative learning and favored teaching geared towards exam preparation. Using social media for e-learning in undergraduate medical education can enhance the student learning experience, especially in resource-limited regions where Information and communication technology is not an integrated part of the teaching process.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-26
... Seeks Comment on Application of the IP Closed Captioning Rules to Video Clips AGENCY: Federal... captioning of video clips delivered by Internet protocol (``IP''), including the extent to which industry has voluntarily captioned IP- delivered video clips. The Commission directed the Media Bureau to issue this...
NASA Astrophysics Data System (ADS)
Capell, Joyce; Deeth, David
1996-01-01
This paper describes why encryption was selected by Lockheed Martin Missiles & Space as the means for securing ATM networks. The ATM encryption testing program is part of an ATM network trial provided by Pacific Bell under the California Research Education Network (CalREN). The problem being addressed is the threat to data security which results when changing from a packet switched network infrastructure to a circuit switched ATM network backbone. As organizations move to high speed cell-based networks, there is a break down in the traditional security model which is designed to protect packet switched data networks from external attacks. This is due to the fact that most data security firewalls filter IP packets, restricting inbound and outbound protocols, e.g. ftp. ATM networks, based on cell-switching over virtual circuits, does not support this method for restricting access since the protocol information is not carried by each cell. ATM switches set up multiple virtual connections, thus there is no longer a single point of entry into the internal network. The problem is further complicated by the fact that ATM networks support high speed multi-media applications, including real time video and video teleconferencing which are incompatible with packet switched networks. The ability to restrict access to Lockheed Martin networks in support of both unclassified and classified communications is required before ATM network technology can be fully deployed. The Lockheed Martin CalREN ATM testbed provides the opportunity to test ATM encryption prototypes with actual applications to assess the viability of ATM encryption methodologies prior to installing large scale ATM networks. Two prototype ATM encryptors are being tested: (1) `MILKBUSH' a prototype encryptor developed by NSA for transmission of government classified data over ATM networks, and (2) a prototype ATM encryptor developed by Sandia National Labs in New Mexico, for the encryption of proprietary data.
1999-09-01
application, a complete specification will require one or more companion documents, as follows. 1. Profile Specification Documents A Profile...Rio de Janeiro - RJ - Brazil 21. Diretoria de Sistemas de Armas da Marinha Rua Primeiro de Marco, 118 Rio de Janeiro - RJ - Brazil CEP 20010 22
Mat Kiah, M L; Al-Bakri, S H; Zaidan, A A; Zaidan, B B; Hussain, Muzammil
2014-10-01
One of the applications of modern technology in telemedicine is video conferencing. An alternative to traveling to attend a conference or meeting, video conferencing is becoming increasingly popular among hospitals. By using this technology, doctors can help patients who are unable to physically visit hospitals. Video conferencing particularly benefits patients from rural areas, where good doctors are not always available. Telemedicine has proven to be a blessing to patients who have no access to the best treatment. A telemedicine system consists of customized hardware and software at two locations, namely, at the patient's and the doctor's end. In such cases, the video streams of the conferencing parties may contain highly sensitive information. Thus, real-time data security is one of the most important requirements when designing video conferencing systems. This study proposes a secure framework for video conferencing systems and a complete management solution for secure video conferencing groups. Java Media Framework Application Programming Interface classes are used to design and test the proposed secure framework. Real-time Transport Protocol over User Datagram Protocol is used to transmit the encrypted audio and video streams, and RSA and AES algorithms are used to provide the required security services. Results show that the encryption algorithm insignificantly increases the video conferencing computation time.
Formal analysis and evaluation of the back-off procedure in IEEE802.11P VANET
NASA Astrophysics Data System (ADS)
Jin, Li; Zhang, Guoan; Zhu, Xiaojun
2017-07-01
The back-off procedure is one of the media access control technologies in 802.11P communication protocol. It plays an important role in avoiding message collisions and allocating channel resources. Formal methods are effective approaches for studying the performances of communication systems. In this paper, we establish a discrete time model for the back-off procedure. We use Markov Decision Processes (MDPs) to model the non-deterministic and probabilistic behaviors of the procedure, and use the probabilistic computation tree logic (PCTL) language to express different properties, which ensure that the discrete time model performs their basic functionality. Based on the model and PCTL specifications, we study the effect of contention window length on the number of senders in the neighborhood of given receivers, and that on the station’s expected cost required by the back-off procedure to successfully send packets. The variation of the window length may increase or decrease the maximum probability of correct transmissions within a time contention unit. We propose to use PRISM model checker to describe our proposed back-off procedure for IEEE802.11P protocol in vehicle network, and define different probability properties formulas to automatically verify the model and derive numerical results. The obtained results are helpful for justifying the values of the time contention unit.
Social Media: Developing an Acceptable Use Policy. Research Brief
ERIC Educational Resources Information Center
Williamson, Ronald
2010-01-01
The growing use of social media by students and staff has led many schools to consider developing acceptable use policies. There is tremendous opportunity for improving education through the use of social media. There is also potential risk because social media can be used to access age inappropriate information and to engage in aggressive online…
A Queer Critical Media Literacies Framework in a Digital Age
ERIC Educational Resources Information Center
Leent, Lisa; Mills, Kathy
2018-01-01
Media literacy skills are focal for many educators across the globe in an age of ubiquitous access to the Internet and the rapid circulation of digital texts. A critical media literacies perspective is often a key element in teaching adolescents to read a range of texts. A queer critical media literacies pedagogy supports a social justice agenda…
ERIC Educational Resources Information Center
Krywosa, Jessica
2008-01-01
With so much interest around the use of new media, many people concerned with improving college access are striving to master this emerging set of resources in order to better reach students, who without encouragement, are unlikely to pursue higher education. But, how much do individuals understand about the way low-income, first-generation, and…
[Accessible health information: a question of age?].
Loos, E F
2012-04-01
Aging and digitalisation are important trends which have their impact on information accessibility. Accessible information about products and services is of crucial importance to ensure that all citizens can participate fully as active members of society. Senior citizens who have difficulties using new media run the risk of exclusion in today's information society. Not all senior citizens, however, encounter problems with new media. Not by a long shot. There is much to be said for 'aged heterogeneity', the concept that individual differences increase as people age. In two explorative qualitative case studies related to accessible health information--an important issue for senior citizens--that were conducted in the Netherlands, variables such as gender, education level and frequency of internet use were therefore included in the research design. In this paper, the most important results of these case studies will be discussed. Attention will be also paid to complementary theories (socialisation, life stages) which could explain differences in information search behaviour when using old or new media.
ERIC Educational Resources Information Center
Bach, Amy Jane
2010-01-01
Drawn from more than two years of ethnographic data collection, this dissertation study explores the literacy practices enacted in a youth media organization (the Youth Media Group) that is a branch of a public access television station (Manhattan Media) in New York City. Rooted in New Literacy Studies, a branch of scholarship which explores…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-02
... Information; Technology and Media Services for Individuals With Disabilities--Television Access; Notice.... Funding Opportunity Description Purpose of Program: The purposes of the Technology and Media Services for... the development, demonstration, and use of technology; (2) support educational media services...
School Media Centers: A Handbook for Elementary Librarians.
ERIC Educational Resources Information Center
Baer, Eleanora A.
Standard procedures for organizing and operating elementary school media centers are presented in simplified form in this handbook for librarians. Topics covered include media selection, supplies, acquisition procedure, accessioning, classification, cataloging (both books and non-book printed materials), printed catalog cards, filing rules,…
Kevin McCluskey; Katharine B. Barker; Hazel A. Barton; Kyria Boundy-Mills; Daniel R. Brown; Jonathan A. Coddington; Kevin Cook; Philippe Desmeth; David Geiser; Jessie A. Glaeser; Stephanie Greene; Seogchan Kang; Michael W. Lomas; Ulrich Melcher; Scott E. Miller; David R. Nobles; Kristina J. Owens; Jerome H. Reichman; Manuela da Silva; John Wertz; Cale Whitworth; David Smith; Steven E. Lindow
2017-01-01
The U.S. Culture Collection Network held a meeting to share information about how culture collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity (CBD). The meeting included representatives...
Development and validation of a remote home safety protocol.
Romero, Sergio; Lee, Mi Jung; Simic, Ivana; Levy, Charles; Sanford, Jon
2018-02-01
Environmental assessments and subsequent modifications conducted by healthcare professionals can enhance home safety and promote independent living. However, travel time, expense and the availability of qualified professionals can limit the broad application of this intervention. Remote technology has the potential to increase access to home safety evaluations. This study describes the development and validation of a remote home safety protocol that can be used by a caregiver of an elderly person to video-record their home environment for later viewing and evaluation by a trained professional. The protocol was developed based on literature reviews and evaluations from clinical and content experts. Cognitive interviews were conducted with a group of six caregivers to validate the protocol. The final protocol included step-by-step directions to record indoor and outdoor areas of the home. The validation process resulted in modifications related to safety, clarity of the protocol, readability, visual appearance, technical descriptions and usability. Our final protocol includes detailed instructions that a caregiver should be able to follow to record a home environment for subsequent evaluation by a home safety professional. Implications for Rehabilitation The results of this study have several implications for rehabilitation practice The remote home safety evaluation protocol can potentially improve access to rehabilitation services for clients in remote areas and prevent unnecessary delays for needed care. Using our protocol, a patient's caregiver can partner with therapists to quickly and efficiently evaluate a patient's home before they are released from the hospital. Caregiver narration, which reflects a caregiver's own perspective, is critical to evaluating home safety. In-home safety evaluations, currently not available to all who need them due to access barriers, can enhance a patient's independence and provide a safer home environment.
NASA Astrophysics Data System (ADS)
Purwati, F. G.; Ekawanti, N.; Luthfiandari; Premadi, P. W.
2016-11-01
The Total Solar Eclipse (TSE) on the 9th March 2016 received a huge attention from the mass media. Some of them intensively write articles about it even months before the TSE day. As we know media plays strategic role not only in raising public awareness but also interest. The aim of this project is to study the relation between the number of accesses to the media information and how well public learned the information delivered by the media. We prepared questionnaire consisting of seven semi-multiple choices on how public got information about TSE. We gave them choices of what they had heard to measure their basic understanding of TSE. Furthermore we add two “wrong” choices in the last questions to identify less serious respondents. We analyze 60 respondents of Palembang who visited Ampera bridge area. Our result shows no correlation between the number of information access and the level of understanding about TSE. We also found that local media did not provide the scientific content of TSE as well as the national media.
High throughput film dosimetry in homogeneous and heterogeneous media for a small animal irradiator
Wack, L.; Ngwa, W.; Tryggestad, E.; Tsiamas, P.; Berbeco, R.; Ng, S.K.; Hesser, J.
2013-01-01
Purpose We have established a high-throughput Gafchromic film dosimetry protocol for narrow kilo-voltage beams in homogeneous and heterogeneous media for small-animal radiotherapy applications. The kV beam characterization is based on extensive Gafchromic film dosimetry data acquired in homogeneous and heterogeneous media. An empirical model is used for parameterization of depth and off-axis dependence of measured data. Methods We have modified previously published methods of film dosimetry to suit the specific tasks of the study. Unlike film protocols used in previous studies, our protocol employs simultaneous multichannel scanning and analysis of up to nine Gafchromic films per scan. A scanner and background correction were implemented to improve accuracy of the measurements. Measurements were taken in homogeneous and inhomogeneous phantoms at 220 kVp and a field size of 5 × 5 mm2. The results were compared against Monte Carlo simulations. Results Dose differences caused by variations in background signal were effectively removed by the corrections applied. Measurements in homogeneous phantoms were used to empirically characterize beam data in homogeneous and heterogeneous media. Film measurements in inhomogeneous phantoms and their empirical parameterization differed by about 2%–3%. The model differed from MC by about 1% (water, lung) to 7% (bone). Good agreement was found for measured and modelled off-axis ratios. Conclusions EBT2 films are a valuable tool for characterization of narrow kV beams, though care must be taken to eliminate disturbances caused by varying background signals. The usefulness of the empirical beam model in interpretation and parameterization of film data was demonstrated. PMID:23510532
Saade, Charbel; Mayat, Ahmad; El-Merhi, Fadi
2016-01-01
Matching contrast injection timing with vessel dynamics significantly improves vessel opacification and reduces contrast dose in the assessment of pulmonary embolism during computed tomography (CT) pulmonary angiography. The aim of this study was to investigate opacification of the pulmonary vasculature (PV) during CT pulmonary angiography using a patient-specific contrast formula (PSCF) and exponentially decelerated contrast media (EDCM) injection rate. Institutional review board approved this retrospective study. Computed tomography pulmonary angiography was performed on 200 patients with suspected pulmonary embolism using a 64-channel CT scanner. Patient demographics were equally distributed. Patients were randomly assigned to 2 equal protocol groups: protocol A used a PSCF, and protocol B involved the use of a PSCF combined with EDCM. The mean cross-sectional opacification profile of 8 central and 11 peripheral PVs were measured for each patient, and arteriovenous contrast ratio was calculated. Protocols were compared using Mann-Whitney U nonparametric statistics. Jackknife alternative free-response receiver operating characteristic analyses were used to assess diagnostic efficacy. Interobserver variations were investigated using kappa methods. A number of pulmonary arteries demonstrated increases in opacification (P < 0.02) for protocol B compared with A, whereas opacification in all veins was reduced in protocol B (P < 0.03). Subsequently, increased arteriovenous contrast ratio in protocol B compared with A was observed at all anatomic locations (P < 0.0002). An increase in jackknife alternative free-response receiver operating characteristic figure of merit (P < 0.0002) and interobserver variation was observed with protocol B compared with protocol A (κ = 0.3-0.73). Mean contrast volume was reduced in protocol B (29 [4] mL) compared with protocol A (33 [9] mL). Mean effective radiation dose in protocol B (1.2 [0.4] mSv) was reduced by 14% compared with protocol A (1.4 [0.6] mSv). Significant improvements in visualization of the PV can be achieved with a low contrast volume using an EDCM and PSCF. The reduced risk of cancer induction is highlighted.
Social media use and cybercivility guidelines in U.S. nursing schools: A review of websites.
De Gagne, Jennie C; Yamane, Sandra S; Conklin, Jamie L; Chang, Jianhong; Kang, Hee Sun
This research analyzes to what extent U.S. nursing schools use social media, their policies or guidelines on cybercivility in social media, online classrooms, and email correspondence, and whether these protocols are readily available to students. This website-based study employs a descriptive, cross-sectional, non-experimental search design. Data were collected in nursing schools offering master's programs (n=197) and online graduate programs in master's degree (n=110) listed in the 2017 edition of U.S. News and World Report. School ranking was positively correlated with the total number of social networking sites being used in the schools, but not with the presence of cybercivility guidelines. About a third of the nursing schools in the sample had policies/guidelines concerning social media, while fewer than 10% had policies/guidelines about online classroom conduct (n=14) or email use (n=16). Key features of these protocols were professionalism, expected behaviors, and consequences. Establishing and implementing policies and guidelines regarding cybercivility is a vital step to promote a culture of civility online. It is especially important to do so in nursing schools where standards should reflect the values of the profession. Copyright © 2017 Elsevier Inc. All rights reserved.
Design of a Software Configuration for Real-Time Multimedia Group Communication; HNUMTP
NASA Astrophysics Data System (ADS)
Park, Gil-Cheol
This paper designs transport protocol of multi-session/channel method for real time multimedia group telecommunication and realizes it. The special features of the designed and realized protocol are first, that it solved the sync problem which is the specific character of multimedia telecommunication by using multi-channel method protocol. Usual multimedia telecommunication is assigned one channel by each media data. This paper shortened the phenomenon that waits data for sync of receiving part by assigning more than one channel for the channel that has a lot of data per hour as video data. The problem of intermedia synchronization that happens then could be solved by sending temporal/spacial related data among data assigning extra control channel. Second, that it does integrated management for sessions. Each session is one group telecommunication unit which supports mutual working environment that is independent. Each session communicates the participants in the group independently, the session manager manages all the communication among groups and lets media sources connected with all network be operated efficiently.
Architectural constructs of Ampex DST
NASA Technical Reports Server (NTRS)
Johnson, Clay
1993-01-01
The DST 800 automated library is a high performance, automated tape storage system, developed by AMPEX, providing mass storage to host systems. Physical Volume Manager (PVM) is a volume server which supports either a DST 800, DST 600 stand alone tape drive, or a combination of DST 800 and DST 600 subsystems. The objective of the PVM is to provide the foundation support to allow automated and operator assisted access to the DST cartridges with continuous operation. A second objective is to create a data base about the media, its location, and its usage so that the quality and utilization of the media on which specific data is recorded and the performance of the storage system may be managed. The DST tape drive architecture and media provides several unique functions that enhance the ability to achieve high media space utilization and fast access. Access times are enhanced through the implementation of multiple areas (called system zones) on the media where the media may be unloaded. This reduces positioning time in loading and unloading the cartridge. Access times are also reduced through high speed positioning in excess of 800 megabytes per second. A DST cartridge can be partitioned into fixed size units which can be reclaimed for rewriting without invalidating other recorded data on the tape cartridge. Most tape management systems achieve space reclamation by deleting an entire tape volume, then allowing users to request a 'scratch tape' or 'nonspecific' volume when they wish to record data to tape. Physical cartridge sizes of 25, 75, or 165 gigabytes will make this existing process inefficient or unusable. The DST cartridge partitioning capability provides an efficient mechanism for addressing the tape space utilization problem.
In Vitro Culturing and Live Imaging of Drosophila Egg Chambers: A History and Adaptable Method.
Peters, Nathaniel C; Berg, Celeste A
2016-01-01
The development of the Drosophila egg chamber encompasses a myriad of diverse germline and somatic events, and as such, the egg chamber has become a widely used and influential developmental model. Advantages of this system include physical accessibility, genetic tractability, and amenability to microscopy and live culturing, the last of which is the focus of this chapter. To provide adequate context, we summarize the structure of the Drosophila ovary and egg chamber, the morphogenetic events of oogenesis, the history of egg-chamber live culturing, and many of the important discoveries that this culturing has afforded. Subsequently, we discuss various culturing methods that have facilitated analyses of different stages of egg-chamber development and different types of cells within the egg chamber, and we present an optimized protocol for live culturing Drosophila egg chambers.We designed this protocol for culturing late-stage Drosophila egg chambers and live imaging epithelial tube morphogenesis, but with appropriate modifications, it can be used to culture egg chambers of any stage. The protocol employs a liquid-permeable, weighted "blanket" to gently hold egg chambers against the coverslip in a glass-bottomed culture dish so the egg chambers can be imaged on an inverted microscope. This setup provides a more buffered, stable, culturing environment than previously published methods by using a larger volume of culture media, but the setup is also compatible with small volumes. This chapter should aid researchers in their efforts to culture and live-image Drosophila egg chambers, further augmenting the impressive power of this model system.
In vitro culturing and live imaging of Drosophila egg chambers: A history and adaptable method
Peters, Nathaniel C.; Berg, Celeste A.
2017-01-01
Summary/Abstract The development of the Drosophila egg chamber encompasses a myriad of diverse germline and somatic events, and as such, the egg chamber has become a widely used and influential developmental model. Advantages of this system include physical accessibility, genetic tractability, and amenability to microscopy and live culturing, the last of which is the focus of this chapter. To provide adequate context, we summarize the structure of the Drosophila ovary and egg chamber, the morphogenetic events of oogenesis, the history of egg-chamber live culturing, and many of the important discoveries that this culturing has afforded. Subsequently, we discuss various culturing methods that have facilitated analyses of different stages of egg-chamber development and different types of cells within the egg chamber, and we present an optimized protocol for live culturing Drosophila egg chambers. We designed this protocol for culturing late-stage Drosophila egg chambers and live imaging epithelial tube morphogenesis, but with appropriate modifications it can be used to culture egg chambers of any stage. The protocol employs a liquid-permeable, weighted, “blanket” to gently hold egg chambers against the coverslip in a glass-bottomed culture dish so the egg chambers can be imaged on an inverted microscope. This setup provides a more buffered, stable culturing environment than previously published methods by using a larger volume of culture media, but the setup is also compatible with small volumes. This chapter should aid researchers in their efforts to culture and live image Drosophila egg chambers, further augmenting the impressive power of this model system. PMID:27557572
Barker, Katharine B.; Barton, Hazel A.; Boundy-Mills, Kyria; Brown, Daniel R.; Coddington, Jonathan A.; Cook, Kevin; Desmeth, Philippe; Geiser, David; Glaeser, Jessie A.; Greene, Stephanie; Kang, Seogchan; Lomas, Michael W.; Melcher, Ulrich; Miller, Scott E.; Nobles, David R.; Owens, Kristina J.; Reichman, Jerome H.; da Silva, Manuela; Wertz, John; Whitworth, Cale; Smith, David
2017-01-01
ABSTRACT The U.S. Culture Collection Network held a meeting to share information about how culture collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity (CBD). The meeting included representatives of many culture collections and other biological collections, the U.S. Department of State, U.S. Department of Agriculture, Secretariat of the CBD, interested scientific societies, and collection groups, including Scientific Collections International and the Global Genome Biodiversity Network. The participants learned about the policies of the United States and other countries regarding access to genetic resources, the definition of genetic resources, and the status of historical materials and genetic sequence information. Key topics included what constitutes access and how the CBD Access and Benefit-Sharing Clearing-House can help guide researchers through the process of obtaining Prior Informed Consent on Mutually Agreed Terms. U.S. scientists and their international collaborators are required to follow the regulations of other countries when working with microbes originally isolated outside the United States, and the local regulations required by the Nagoya Protocol vary by the country of origin of the genetic resource. Managers of diverse living collections in the United States described their holdings and their efforts to provide access to genetic resources. This meeting laid the foundation for cooperation in establishing a set of standard operating procedures for U.S. and international culture collections in response to the Nagoya Protocol. PMID:28811341
McCluskey, Kevin; Barker, Katharine B; Barton, Hazel A; Boundy-Mills, Kyria; Brown, Daniel R; Coddington, Jonathan A; Cook, Kevin; Desmeth, Philippe; Geiser, David; Glaeser, Jessie A; Greene, Stephanie; Kang, Seogchan; Lomas, Michael W; Melcher, Ulrich; Miller, Scott E; Nobles, David R; Owens, Kristina J; Reichman, Jerome H; da Silva, Manuela; Wertz, John; Whitworth, Cale; Smith, David
2017-08-15
The U.S. Culture Collection Network held a meeting to share information about how culture collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity (CBD). The meeting included representatives of many culture collections and other biological collections, the U.S. Department of State, U.S. Department of Agriculture, Secretariat of the CBD, interested scientific societies, and collection groups, including Scientific Collections International and the Global Genome Biodiversity Network. The participants learned about the policies of the United States and other countries regarding access to genetic resources, the definition of genetic resources, and the status of historical materials and genetic sequence information. Key topics included what constitutes access and how the CBD Access and Benefit-Sharing Clearing-House can help guide researchers through the process of obtaining Prior Informed Consent on Mutually Agreed Terms. U.S. scientists and their international collaborators are required to follow the regulations of other countries when working with microbes originally isolated outside the United States, and the local regulations required by the Nagoya Protocol vary by the country of origin of the genetic resource. Managers of diverse living collections in the United States described their holdings and their efforts to provide access to genetic resources. This meeting laid the foundation for cooperation in establishing a set of standard operating procedures for U.S. and international culture collections in response to the Nagoya Protocol.
Citizen journalism in a time of crisis: lessons from a large-scale California wildfire
S. Gillette; J. Taylor; D.J. Chavez; R. Hodgson; J. Downing
2007-01-01
The accessibility of news production tools through consumer communication technology has made it possible for media consumers to become media producers. The evolution of media consumer to media producer has important implications for the shape of public discourse during a time of crisis. Citizen journalists cover crisis events using camera cell phones and digital...
Social Media and Student Outcomes: Teacher, Student and Employer Views. Research Report
ERIC Educational Resources Information Center
Callan, Victor J.; Johnston, Margaret A.
2017-01-01
Accessing and posting on social media has become a daily habit for many Australians. Social media is used by individuals to keep in touch with friends and family, by groups to inform their members of relevant information, and by organisations to market their services and products. However, is there a role for social media in vocational education…
Readings in Mass Communication; Concepts and Issues in the Mass Media.
ERIC Educational Resources Information Center
Emery, Michael C.; Smythe, Ted Curtis
The aim of this book of readings is to provide college students with a wide variety of articles on the rapid changes and problems of today's mass media. The problems of access, control, protection of sources, and relevance are considered crucial to the changing role of the media. Changes in the structure of both traditional media and new…
ERIC Educational Resources Information Center
Guzzetti, Barbara; Elliot, Kate; Welsch, Diana
2010-01-01
This book shows teachers how to bring students' Do-It-Yourself media practices into the classroom (Grades 6-12). In one accessible resource, the authors explain DIY media, identify their appealing features for content area instruction, and describe the literacy skills and strategies they promote. Chapters address: Adolescents' DIY Media as New…
Valentine, Alissa; Kurczek, Jake
2016-01-01
Neuroscience is young and still developing. It is quickly adapting to a number of emerging changes in science and education. Not only have neuroscientists been at the forefront of the open access publishing movement, but many prominent neuroscientists continue to push towards making science more accessible and understandable to the broader public. Social media is a global phenomenon that is changing the way that we talk about research and education. Researchers, students, and the public alike can leverage social media to find updates in research and higher education. Social media also provides pathways to connect with experts and non-experts in a way never been seen before. Two major trends are appearing in education and social media: 1) providing more engaging teaching activities, and 2) providing opportunities for community engagement using teaching activities that leverage social media. In this article, we describe a semester long teaching activity that challenged students to use social media in their learning process. We provide initial evaluation and feedback from the students on their social media experience in class, and suggestions for how to improve the project in future implementations. PMID:27980477
A Mobile Satellite Experiment (MSAT-X) network definition
NASA Technical Reports Server (NTRS)
Wang, Charles C.; Yan, Tsun-Yee
1990-01-01
The network architecture development of the Mobile Satellite Experiment (MSAT-X) project for the past few years is described. The results and findings of the network research activities carried out under the MSAT-X project are summarized. A framework is presented upon which the Mobile Satellite Systems (MSSs) operator can design a commercial network. A sample network configuration and its capability are also included under the projected scenario. The Communication Interconnection aspect of the MSAT-X network is discussed. In the MSAT-X network structure two basic protocols are presented: the channel access protocol, and the link connection protocol. The error-control techniques used in the MSAT-X project and the packet structure are also discussed. A description of two testbeds developed for experimentally simulating the channel access protocol and link control protocol, respectively, is presented. A sample network configuration and some future network activities of the MSAT-X project are also presented.
The Decision to Access Patient Information from a Social Media Site: What Would You Do?
Jent, Jason F.; Eaton, Cyd K.; Merrick, Melissa T.; Englebert, Nicole E.; Dandes, Susan K.; Chapman, Ana V.; Hershorin, Eugene R.
2011-01-01
Purpose The current study examined the prevalence with which healthcare providers use a social media site account (e.g., Facebook), the extent to which they utilize social media sites in clinical practice, and their decision-making process after accessing patient information from a social media site. Methods Pediatric faculty and trainees from a medical school campus were provided a social media site history form and seven fictional social media site adolescent profile vignettes that depicted concerning information. Participants were instructed to rate their personal use and beliefs about social media sites and to report how they would respond if they obtained concerning information about an adolescent patient from their public social media site profile. Results Healthcare providers generally believed it not to be an invasion of privacy to conduct an Internet/social media site search of someone they know. A small percentage of trainees reported a personal history of conducting an Internet search (18%) or a social media site search (14%) for a patient. However, no faculty endorsed a history of conducting searches for patients. Faculty and trainees also differed in how they would respond to concerning social media site adolescent profile information. Conclusions The findings that trainees are conducting Internet/social media site searches of patients and that faculty and trainees differ in how they would respond to concerning profile information suggest the need for specific guidelines regarding the role of social media sites in clinical practice. Practice, policy, and training implications are discussed. PMID:21939873
Distributed reservation-based code division multiple access
NASA Astrophysics Data System (ADS)
Wieselthier, J. E.; Ephremides, A.
1984-11-01
The use of spread spectrum signaling, motivated primarily by its antijamming capabilities in military applications, leads naturally to the use of Code Division Multiple Access (CDMA) techniques that permit the successful simultaneous transmission by a number of users over a wideband channel. In this paper we address some of the major issues that are associated with the design of multiple access protocols for spread spectrum networks. We then propose, analyze, and evaluate a distributed reservation-based multiple access protocol that does in fact exploit CDMA properties. Especially significant is the fact that no acknowledgment or feedback information from the destination is required (thus facilitating communication with a radio-silent mode), nor is any form of coordination among the users necessary.
Comparing architectural solutions of IPT application SDKs utilizing H.323 and SIP
NASA Astrophysics Data System (ADS)
Keskinarkaus, Anja; Korhonen, Jani; Ohtonen, Timo; Kilpelanaho, Vesa; Koskinen, Esa; Sauvola, Jaakko J.
2001-07-01
This paper presents two approaches to efficient service development for Internet Telephony. In first approach we consider services ranging from core call signaling features and media control as stated in ITU-T's H.323 to end user services that supports user interaction. The second approach supports IETF's SIP protocol. We compare these from differing architectural perspectives, economy of network and terminal development, and propose efficient architecture models for both protocols. In their design, the main criteria were component independence, lightweight operation and portability in heterogeneous end-to-end environments. In proposed architecture, the vertical division of call signaling and streaming media control logic allows for using the components either individually or combined, depending on the level of functionality required by an application.
CSMA/RN: A universal protocol for gigabit networks
NASA Technical Reports Server (NTRS)
Foudriat, E. C.; Maly, Kurt J.; Overstreet, C. Michael; Khanna, S.; Paterra, Frank
1990-01-01
Networks must provide intelligent access for nodes to share the communications resources. In the range of 100 Mbps to 1 Gbps, the demand access class of protocols were studied extensively. Many use some form of slot or reservation system and many the concept of attempt and defer to determine the presence or absence of incoming information. The random access class of protocols like shared channel systems (Ethernet), also use the concept of attempt and defer in the form of carrier sensing to alleviate the damaging effects of collisions. In CSMA/CD, the sensing of interference is on a global basis. All systems discussed above have one aspect in common, they examine activity on the network either locally or globally and react in an attempt and whatever mechanism. Of the attempt + mechanisms discussed, one is obviously missing; that is attempt and truncate. Attempt and truncate was studied in a ring configuration called the Carrier Sensed Multiple Access Ring Network (CSMA/RN). The system features of CSMA/RN are described including a discussion of the node operations for inserting and removing messages and for handling integrated traffic. The performance and operational features based on analytical and simulation studies which indicate that CSMA/RN is a useful and adaptable protocol over a wide range of network conditions are discussed. Finally, the research and development activities necessary to demonstrate and realize the potential of CSMA/RN as a universal, gigabit network protocol is outlined.
Tag Content Access Control with Identity-based Key Exchange
NASA Astrophysics Data System (ADS)
Yan, Liang; Rong, Chunming
2010-09-01
Radio Frequency Identification (RFID) technology that used to identify objects and users has been applied to many applications such retail and supply chain recently. How to prevent tag content from unauthorized readout is a core problem of RFID privacy issues. Hash-lock access control protocol can make tag to release its content only to reader who knows the secret key shared between them. However, in order to get this shared secret key required by this protocol, reader needs to communicate with a back end database. In this paper, we propose to use identity-based secret key exchange approach to generate the secret key required for hash-lock access control protocol. With this approach, not only back end database connection is not needed anymore, but also tag cloning problem can be eliminated at the same time.
... Career Center DC&R Journal Access Member Directory Mentor Match Educational Resources American Board of Colon and ... Media Policy Corporate Partners Contact Us Media Center Mentor Match Disclaimer ASCRS Product Store Donate to ASCRS ...
Scott, Katherine K; Errett, Nicole A
Social media is becoming increasingly integrated into disaster response communication strategies of public health and emergency response agencies. We sought to assess the content, accessibility, and dissemination of social media communications made by government agencies during a disaster response. A cross-sectional analysis of social media posts made by federal, state, and local government, public health and emergency management agencies before, during, and after the 2016 Louisiana floods was conducted to determine their content, accessibility, and dissemination by level of government and time relative to disaster onset. Facebook and/or Twitter posts made by public agencies involved in the response to the 2016 Louisiana Flooding events (FEMA Disaster Declaration [DR-4277]) published between August 4 and September 16, 2016, publicly available online between February 21 and March 31, 2017, were included in the analysis. Content: The text of each post was assessed to determine whether it contained information on provision of situational awareness; addressing misconception, actionable requests; mental, behavioral, and emotional support; and/or recovery and rebuilding resources. Accessibility: A Flesh-Kincaid grade level of each post was calculated, and information on post language, originality, hyperlinks, visuals, videos, or hash tag was recorded. Dissemination: The average number of reacts/likes, shares/retweets, and comments per post was calculated. Most posts contained information related to situational awareness and recovery resources. There was an increase in messages during the first week of the disaster at all levels. Few posts were made in languages other than English. Compared with state and federal posts, local Facebook posts averaged fewer reacts, comments, and shares throughout the analysis period. Government agencies may maximize the use of social media platforms for disaster communications by establishing their social media network in advance of a disaster and by applying established guidelines on disaster social media use.
NASA Astrophysics Data System (ADS)
Sundjaja, A. M.; LumanGaol, F.; Budiarti, T.; Abbas, B. S.; Abdinagoro, S. B.; Ongowarsito, H.
2017-01-01
Social media has changed the interaction between the customer and the business, social media has proven to provide new opportunities in facilitating access to information, efficiency and ease of interaction between customers and businesses that are distributed geographically dispersed. Ease of interaction to improve access to information about products, services, and prices have proven to have a positive impact for consumers. The purpose of this article is to develop a conceptual model to test the effect of user motivation, user expectations, and online community involvement to the intention of behavior that is mediated by the use of social media museum experience. This article is a literature study on exploration of social media user experiences museum in Indonesia. Authors searched and examined 85 articles from google scholar with the following keywords: motivation, expectations, online communities, user experience, social media, Technology Acceptance Model, Experiential Marketing, Uses and Gratification Theory. Proposed data collection techniques are literature study, survey and observation. The sample used in this research is 400 respondents of social media users that follow the social media managed by Indonesia’s museum. The sampling technique are systematic sampling. We use Structural Equation Model with AMOS for analyze the data.
Securing the AliEn File Catalogue - Enforcing authorization with accountable file operations
NASA Astrophysics Data System (ADS)
Schreiner, Steffen; Bagnasco, Stefano; Sankar Banerjee, Subho; Betev, Latchezar; Carminati, Federico; Vladimirovna Datskova, Olga; Furano, Fabrizio; Grigoras, Alina; Grigoras, Costin; Mendez Lorenzo, Patricia; Peters, Andreas Joachim; Saiz, Pablo; Zhu, Jianlin
2011-12-01
The AliEn Grid Services, as operated by the ALICE Collaboration in its global physics analysis grid framework, is based on a central File Catalogue together with a distributed set of storage systems and the possibility to register links to external data resources. This paper describes several identified vulnerabilities in the AliEn File Catalogue access protocol regarding fraud and unauthorized file alteration and presents a more secure and revised design: a new mechanism, called LFN Booking Table, is introduced in order to keep track of access authorization in the transient state of files entering or leaving the File Catalogue. Due to a simplification of the original Access Envelope mechanism for xrootd-protocol-based storage systems, fundamental computational improvements of the mechanism were achieved as well as an up to 50% reduction of the credential's size. By extending the access protocol with signed status messages from the underlying storage system, the File Catalogue receives trusted information about a file's size and checksum and the protocol is no longer dependent on client trust. Altogether, the revised design complies with atomic and consistent transactions and allows for accountable, authentic, and traceable file operations. This paper describes these changes as part and beyond the development of AliEn version 2.19.
Freedom and Responsibility in First Amendment Theory: Defamation Law and Media Credibility.
ERIC Educational Resources Information Center
Hunsaker, David M.
1979-01-01
Explores the concepts of freedom and responsibility in the context of First Amendment theory through an examination of the interrelationships between defamation law, access to media, and media credibility. Calls for a reassessment of the importance of defamation law in First Amendment theory. (JMF)
49 CFR 1549.3 - TSA inspection authority.
Code of Federal Regulations, 2010 CFR
2010-10-01
... transportation facilities; (vi) Review security plans; and (vii) Carry out such other duties, and exercise such... access media or identification media issued or approved by a certified cargo screening facility or other person, except that the TSA and DHS officials will have identification media issued by TSA or DHS. ...
Planning for the Automation of School Library Media Centers.
ERIC Educational Resources Information Center
Caffarella, Edward P.
1996-01-01
Geared for school library media specialists whose centers are in the early stages of automation or conversion to a new system, this article focuses on major components of media center automation: circulation control; online public access catalogs; machine readable cataloging; retrospective conversion of print catalog cards; and computer networks…
Sociotechnical Stewardship in Higher Education: A Field Study of Social Media Policy Documents
ERIC Educational Resources Information Center
Pasquini, Laura A.; Evangelopoulos, Nicholas
2017-01-01
Social media use has risen in higher education, as campus stakeholders frequently access these technologies for teaching, learning, research, communication, and information sharing. With these connected, digital technologies, our colleges and universities understand there are both opportunities and threats that social media affords. Higher…
Who Runs Presidential Campaigns?
ERIC Educational Resources Information Center
Kindsvatter, Peter S.
Presidential campaigns in the last decade have provided evidence of the rising influence of the mass media campaign and of campaign consultants. The media, through their power of access to the people, manipulate the public's recognition of a candidate by the amount of coverage given. Newspaper endorsements and the reporting of media-conducted…
Parent and child screen-viewing time and home media environment.
Jago, Russell; Stamatakis, Emmanuel; Gama, Augusta; Carvalhal, Isabel Mourão; Nogueira, Helena; Rosado, Vítor; Padez, Cristina
2012-08-01
Screen-viewing time has been associated with adverse health outcomes. Data on the predictors of youth screen-viewing time is predominately from older children in North America. Parental and home media environment factors that are associated with screen-viewing time could be targeted in interventions. Examine if parental screen-viewing time and electronic media (access to game equipment, TVs, PCs, and laptops) environment factors were associated with Portuguese children's screen-viewing time and if associations differed by child age (<7 vs ≥7 years); gender; or type of screen viewing. Data are reported for 2965 families with children aged 3-10 years. Data were collected in 2009-2010 and analyzed in 2011. Outcomes were child spending ≥2 hours watching TV and ≥1 hour per day playing with combined other media. Exposures were mothers and fathers watching ≥2 hours of TV and electronic media variables. Parental TV-viewing time was strongly associated with child weekday and weekend TV-viewing time across all four gender and age subgroups. Maternal TV-viewing time was a stronger predictor of child TV-viewing time than paternal TV-viewing time. There was very limited evidence that parental TV-viewing time was associated with combined other media time among boys or girls. Access to electronic game equipment increased the likelihood that children spent >1 hour using combined other media on weekdays and weekend days. Parental TV-viewing time was associated with Portuguese children's TV-viewing time. The numbers of TVs in the household and electronic games equipment access were also associated with TV- and combined other media-viewing/usage time. Copyright © 2012 American Journal of Preventive Medicine. Published by Elsevier Inc. All rights reserved.
Hashtags and How to Use Them on Social Media.
Knapp, Laura; Baum, Neil
2015-01-01
A paradigm shift is taking place in American healthcare. We are moving from word-of-mouth marketing to word-of-mouse. Patients and potential patients are accessing the Internet in increasing numbers, and the Yellow Pages is becoming obsolete as fewer patients are using traditional methods of accessing medical practices. Just a few years ago, having a Web site was all that was required to communicate with patients. However, most practices will need to embrace a so- cial media component. This article discusses the role of hashtags in social media and how they enable practices to enhance communications with both existing patients and potential new patients.
Accessing Multi-Dimensional Images and Data Cubes in the Virtual Observatory
NASA Astrophysics Data System (ADS)
Tody, Douglas; Plante, R. L.; Berriman, G. B.; Cresitello-Dittmar, M.; Good, J.; Graham, M.; Greene, G.; Hanisch, R. J.; Jenness, T.; Lazio, J.; Norris, P.; Pevunova, O.; Rots, A. H.
2014-01-01
Telescopes across the spectrum are routinely producing multi-dimensional images and datasets, such as Doppler velocity cubes, polarization datasets, and time-resolved “movies.” Examples of current telescopes producing such multi-dimensional images include the JVLA, ALMA, and the IFU instruments on large optical and near-infrared wavelength telescopes. In the near future, both the LSST and JWST will also produce such multi-dimensional images routinely. High-energy instruments such as Chandra produce event datasets that are also a form of multi-dimensional data, in effect being a very sparse multi-dimensional image. Ensuring that the data sets produced by these telescopes can be both discovered and accessed by the community is essential and is part of the mission of the Virtual Observatory (VO). The Virtual Astronomical Observatory (VAO, http://www.usvao.org/), in conjunction with its international partners in the International Virtual Observatory Alliance (IVOA), has developed a protocol and an initial demonstration service designed for the publication, discovery, and access of arbitrarily large multi-dimensional images. The protocol describing multi-dimensional images is the Simple Image Access Protocol, version 2, which provides the minimal set of metadata required to characterize a multi-dimensional image for its discovery and access. A companion Image Data Model formally defines the semantics and structure of multi-dimensional images independently of how they are serialized, while providing capabilities such as support for sparse data that are essential to deal effectively with large cubes. A prototype data access service has been deployed and tested, using a suite of multi-dimensional images from a variety of telescopes. The prototype has demonstrated the capability to discover and remotely access multi-dimensional data via standard VO protocols. The prototype informs the specification of a protocol that will be submitted to the IVOA for approval, with an operational data cube service to be delivered in mid-2014. An associated user-installable VO data service framework will provide the capabilities required to publish VO-compatible multi-dimensional images or data cubes.
An Ultra-low-power Medium Access Control Protocol for Body Sensor Network.
Li, Huaming; Tan, Jindong
2005-01-01
In this paper, a medium access control (MAC) protocol designed for Body Sensor Network (BSN-MAC) is proposed. BSN-MAC is an adaptive, feedback-based and IEEE 802.15.4-compatible MAC protocol. Due to the traffic coupling and sensor diversity characteristics of BSNs, common MAC protocols can not satisfy the unique requirements of the biomedical sensors in BSN. BSN-MAC exploits the feedback information from the deployed sensors to form a closed-loop control of the MAC parameters. A control algorithm is proposed to enable the BSN coordinator to adjust parameters of the IEEE 802.15.4 superframe to achieve both energy efficiency and low latency on energy critical nodes. We evaluate the performance of BSN-MAC using energy efficiency as the primary metric.
NASA Technical Reports Server (NTRS)
Israel, David J.
2005-01-01
The NASA Space Network (SN) supports a variety of missions using the Tracking and Data Relay Satellite System (TDRSS), which includes ground stations in White Sands, New Mexico and Guam. A Space Network IP Services (SNIS) architecture is being developed to support future users with requirements for end-to-end Internet Protocol (IP) communications. This architecture will support all IP protocols, including Mobile IP, over TDRSS Single Access, Multiple Access, and Demand Access Radio Frequency (RF) links. This paper will describe this architecture and how it can enable Low Earth Orbiting IP satellite missions.
Mumford, Leslie; Lam, Rachel; Wright, Virginia; Chau, Tom
2014-08-01
This study applied response efficiency theory to create the Access Technology Delivery Protocol (ATDP), a child and family-centred collaborative approach to the implementation of access technologies. We conducted a descriptive, mixed methods case study to demonstrate the ATDP method with a 12-year-old boy with no reliable means of access to an external device. Evaluations of response efficiency, satisfaction, goal attainment, technology use and participation were made after 8 and 16 weeks of training with a custom smile-based access technology. At the 16 week mark, the new access technology offered better response quality; teacher satisfaction was high; average technology usage was 3-4 times per week for up to 1 h each time; switch sensitivity and specificity reached 78% and 64%, respectively, and participation scores increased by 38%. This case supports further development and testing of the ATDP with additional children with multiple or severe disabilities.
Application of an access technology delivery protocol to two children with cerebral palsy.
Mumford, Leslie; Chau, Tom
2015-07-14
This study further delineates the merits and limitations of the Access Technology Delivery Protocol (ATDP) through its application to two children with severe disabilities. We conducted mixed methods case studies to demonstrate the ATDP with two children with no reliable means of access to an external device. Evaluations of response efficiency, satisfaction, goal attainment, technology use and participation were made after 8 and 16 weeks of training with custom access technologies. After 16 weeks, one child's switch offered improved response efficiency, high teacher satisfaction and increased participation. The other child's switch resulted in improved satisfaction and switch effectiveness but lower overall efficiency. The latter child was no longer using his switch by the end of the study. These contrasting findings indicate that changes to any contextual factors that may impact the user's switch performance should mandate a reassessment of the access pathway. Secondly, it is important to ensure that individuals who will be responsible for switch training be identified at the outset and engaged throughout the ATDP. Finally, the ATDP should continue to be tested with individuals with severe disabilities to build an evidence base for the delivery of response efficient access solutions. Implications for Rehabilitation A data-driven, comprehensive access technology delivery protocol for children with complex communication needs could help to mitigate technology abandonment. Successful adoption of an access technology requires personalized design, training of the technology user, the teaching staff, the caregivers and other communication partners, and integration with functional activities.
ERIC Educational Resources Information Center
Jenkins, Henry
2006-01-01
Educators must work together to ensure that every American young person has access to the skills and experiences needed to become a full participant, can articulate their understanding of how media shapes perceptions, and has been socialized into the emerging ethical standards that should shape their practices as media makers and participants in…
Faculty Usage of Social Media and Mobile Devices: Analysis of Advantages and Concerns
ERIC Educational Resources Information Center
Roebuck, Deborah Britt; Siha, Samia; Bell, Reginald L.
2013-01-01
This study seeks to understand the perceptions of professors using social media (also called Web 2.0 tools) in the classroom, what kinds of mobile devices are used to access the social media used, and what drives individuals to use them. In addition, it seeks to identify the advantages and concerns faculty has with the use of social media for…
Honest broker protocol streamlines research access to data while safeguarding patient privacy.
Silvey, Scott A; Silvey, Scott Andrew; Schulte, Janet; Smaltz, Detlev H; Smaltz, Detlev Herb; Kamal, Jyoti
2008-11-06
At Ohio State University Medical Center, The Honest Broker Protocol provides a streamlined mechanism whereby investigators can obtain de-identified clinical data for non-FDA research without having to invest the significant time and effort necessary to craft a formalized protocol for IRB approval.
28 CFR 115.221 - Evidence protocol and forensic medical examinations.
Code of Federal Regulations, 2013 CFR
2013-07-01
.... Department of Justice's Office on Violence Against Women publication, “A National Protocol for Sexual Assault... for investigating allegations of sexual abuse, the agency shall follow a uniform evidence protocol... developed after 2011. (c) The agency shall offer all victims of sexual abuse access to forensic medical...
28 CFR 115.21 - Evidence protocol and forensic medical examinations.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Office on Violence Against Women publication, “A National Protocol for Sexual Assault Medical Forensic... allegations of sexual abuse, the agency shall follow a uniform evidence protocol that maximizes the potential.... (c) The agency shall offer all victims of sexual abuse access to forensic medical examinations...
28 CFR 115.221 - Evidence protocol and forensic medical examinations.
Code of Federal Regulations, 2014 CFR
2014-07-01
.... Department of Justice's Office on Violence Against Women publication, “A National Protocol for Sexual Assault... for investigating allegations of sexual abuse, the agency shall follow a uniform evidence protocol... developed after 2011. (c) The agency shall offer all victims of sexual abuse access to forensic medical...
28 CFR 115.221 - Evidence protocol and forensic medical examinations.
Code of Federal Regulations, 2012 CFR
2012-07-01
.... Department of Justice's Office on Violence Against Women publication, “A National Protocol for Sexual Assault... for investigating allegations of sexual abuse, the agency shall follow a uniform evidence protocol... developed after 2011. (c) The agency shall offer all victims of sexual abuse access to forensic medical...
28 CFR 115.21 - Evidence protocol and forensic medical examinations.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Office on Violence Against Women publication, “A National Protocol for Sexual Assault Medical Forensic... allegations of sexual abuse, the agency shall follow a uniform evidence protocol that maximizes the potential.... (c) The agency shall offer all victims of sexual abuse access to forensic medical examinations...
28 CFR 115.21 - Evidence protocol and forensic medical examinations.
Code of Federal Regulations, 2012 CFR
2012-07-01
... Office on Violence Against Women publication, “A National Protocol for Sexual Assault Medical Forensic... allegations of sexual abuse, the agency shall follow a uniform evidence protocol that maximizes the potential.... (c) The agency shall offer all victims of sexual abuse access to forensic medical examinations...
Machen, Alexandra; Kobayashi, Miwako; Connelly, Mary Robin
2013-01-01
Two novel protocols for inactivation and extraction were developed and used to identify 107 Mycobacterium clinical isolates, including Mycobacterium tuberculosis complex, from solid cultures using Vitek matrix-assisted laser desorption ionization–time of flight (MALDI-TOF) mass spectrometry. The protocol using heat inactivation with sonication and cell disruption with glass beads resulted in 82.2% and 88.8% species and genus level identifications, respectively. PMID:24068013
MAC Protocol for Ad Hoc Networks Using a Genetic Algorithm
Elizarraras, Omar; Panduro, Marco; Méndez, Aldo L.
2014-01-01
The problem of obtaining the transmission rate in an ad hoc network consists in adjusting the power of each node to ensure the signal to interference ratio (SIR) and the energy required to transmit from one node to another is obtained at the same time. Therefore, an optimal transmission rate for each node in a medium access control (MAC) protocol based on CSMA-CDMA (carrier sense multiple access-code division multiple access) for ad hoc networks can be obtained using evolutionary optimization. This work proposes a genetic algorithm for the transmission rate election considering a perfect power control, and our proposition achieves improvement of 10% compared with the scheme that handles the handshaking phase to adjust the transmission rate. Furthermore, this paper proposes a genetic algorithm that solves the problem of power combining, interference, data rate, and energy ensuring the signal to interference ratio in an ad hoc network. The result of the proposed genetic algorithm has a better performance (15%) compared to the CSMA-CDMA protocol without optimizing. Therefore, we show by simulation the effectiveness of the proposed protocol in terms of the throughput. PMID:25140339
Chaveiro, A; Machado, L; Frijters, A; Engel, B; Woelders, H
2006-06-01
The aim of this study was to improve the freezing protocol of bull sperm, by investigating the influence on sperm viability after freeze/thawing of different freezing medium components, as well as the effect of cooling rates in the different stages of the cooling protocol, in single factor experiments. The experimental variables were: (1) salt-based versus a sugar-based medium (Tris versus sucrose); (2) glycerol concentration; (3) detergent (Equex) concentration; (4) presence of bicarbonate; (5) rate of cooling from 22 degrees C to holding temperature (CR1); (6) holding temperature (HT); (7) rate of cooling from holding temperature to -6 degrees C (CR2); (8) rate of cooling from -10 to -100 degrees C (CR3). All experiments were performed using five bulls per experiment (three ejaculates per bull). Sperm motility after freezing and thawing was assessed by CASA system, and sperm membrane integrity was assessed by flow cytometry. Sucrose-based medium did not offer a clear significant benefit compared to Tris medium. The concentration of Equex that gave the best results in Tris-based media group and sucrose-based media group was in a range between 2-7 and 4-7 g/l, respectively. In both media groups, a glycerol concentration of 800 mM was the best in any post-thaw viability parameters. In the Tris media group, the presence of bicarbonate had a negative effect on sperm viability. CR1 and CR2 had no significant effect on any of the post-thaw sperm viability parameters, but a CR1=0.2 degrees C/min and CR2=4 degrees C/min appeared to give better results in both media. The holding temperature (HT) that gave the best results was found to be in the range of 5-9 degrees C. There was a significant disadvantage of using a low CR3 of 10 degrees C/min, while 150 degrees C/min appeared to be the best cooling rate for either medium.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Thor, Daniel; Brismar, Torkel B., E-mail: torkel.brismar@gmail.com; Fischer, Michael A.
Purpose: To evaluate the potential of low tube voltage dual source (DS) single energy (SE) and dual energy (DE) computed tomography (CT) to reduce contrast media (CM) dose in adult abdominal examinations of various sizes while maintaining soft tissue and iodine contrast-to-noise ratio (CNR). Methods: Four abdominal phantoms simulating a body mass index of 16 to 35 kg/m{sup 2} with four inserted syringes of 0, 2, 4, and 8 mgI/ml CM were scanned using a 64-slice DS-CT scanner. Six imaging protocols were used; one single source (SS) reference protocol (120 kV, 180 reference mAs), four low kV SE protocols (70more » and 80 kV using both SS and DS), and one DE protocol at 80/140 kV. Potential CM reduction with unchanged CNRs relative to the 120 kV protocol was calculated along with the corresponding increase in radiation dose. Results: The potential contrast media reductions were determined to be approximately 53% for DS 70 kV, 51% for SS 70 kV, 44% for DS 80 kV, 40% for SS 80 kV, and 20% for DE (all differences were significant, P < 0.05). Constant CNR could be achieved by using DS 70 kV for small to medium phantom sizes (16–26 kg/m{sup 2}) and for all sizes (16–35 kg/m{sup 2}) when using DS 80 kV and DE. Corresponding radiation doses increased by 60%–107%, 23%–83%, and 6%–12%, respectively. Conclusions: DS single energy CT can be used to reduce CM dose by 44%–53% with maintained CNR in adult abdominal examinations at the cost of an increased radiation dose. DS dual-energy CT allows reduction of CM dose by 20% at similar radiation dose as compared to a standard 120 kV single source.« less
Security Analysis and Improvements of Authentication and Access Control in the Internet of Things
Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon
2014-01-01
Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18–21 June 2012, pp. 588–592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464
Security analysis and improvements of authentication and access control in the Internet of Things.
Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon
2014-08-13
Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.
47 CFR 79.109 - Activating accessibility features.
Code of Federal Regulations, 2014 CFR
2014-10-01
... ACCESSIBILITY OF VIDEO PROGRAMMING Apparatus § 79.109 Activating accessibility features. (a) Requirements... video programming transmitted in digital format simultaneously with sound, including apparatus designed to receive or display video programming transmitted in digital format using Internet protocol, with...
ERIC Educational Resources Information Center
Packer, Jaclyn; Reuschel, William
2018-01-01
Introduction: Accessibility of Voice over Internet Protocol (VoIP) systems was tested with a hands-on usability study and an online survey of VoIP users who are visually impaired. The survey examined the importance of common VoIP features, and both methods assessed difficulty in using those features. Methods: The usability test included four paid…
Comparison of two MAC protocols based on LEO satellite networks
NASA Astrophysics Data System (ADS)
Guan, Mingxiang; Wang, Ruichun
2009-12-01
With the development of LEO satellite communication, it is the basic requirement that various kinds of services will be provided. Considering that weak channel collision detection ability, long propagation delay and heavy load in LEO satellite communication system, a valid adaptive access control protocol APRMA is proposed. Different access probability functions for different services are obtained and appropriate access probabilities for voice and data users are updated slot by slot based on the estimation of the voice traffic and the channel status. Finally simulation results demonstrate that the performance of system is improved by the APRMA compared with the conventional PRMA, with an acceptable trade-off between QoS of voice and delay of data. Also the APRMA protocol will be suitable for HAPS (high altitude platform station) with the characters of weak channel collision detection ability, long propagation delay and heavy load.
Peer Review and Publication of Research Protocols and Proposals: A Role for Open Access Journals
2004-01-01
Peer-review and publication of research protocols offer several advantages to all parties involved. Among these are the following opportunities for authors: external expert opinion on the methods, demonstration to funding agencies of prior expert review of the protocol, proof of priority of ideas and methods, and solicitation of potential collaborators. We think that review and publication of protocols is an important role for Open Access journals. Because of their electronic form, openness for readers, and author-pays business model, they are better suited than traditional journals to ensure the sustainability and quality of protocol reviews and publications. In this editorial, we describe the workflow for investigators in eHealth research, from protocol submission to a funding agency, to protocol review and (optionally) publication at JMIR, to registration of trials at the International eHealth Study Registry (IESR), and to publication of the report. One innovation at JMIR is that protocol peer reviewers will be paid a honorarium, which will be drawn partly from a new submission fee for protocol reviews. Separating the article processing fee into a submission and a publishing fee will allow authors to opt for “peer-review only” (without subsequent publication) at reduced costs, if they wish to await a funding decision or for other reasons decide not to make the protocol public. PMID:15471763
Peer-review and publication of research protocols and proposals: a role for open access journals.
Eysenbach, Gunther
2004-09-30
Peer-review and publication of research protocols offer several advantages to all parties involved. Among these are the following opportunities for authors: external expert opinion on the methods, demonstration to funding agencies of prior expert review of the protocol, proof of priority of ideas and methods, and solicitation of potential collaborators. We think that review and publication of protocols is an important role for Open Access journals. Because of their electronic form, openness for readers, and author-pays business model, they are better suited than traditional journals to ensure the sustainability and quality of protocol reviews and publications. In this editorial, we describe the workflow for investigators in eHealth research, from protocol submission to a funding agency, to protocol review and (optionally) publication at JMIR, to registration of trials at the International eHealth Study Registry (IESR), and to publication of the report. One innovation at JMIR is that protocol peer reviewers will be paid a honorarium, which will be drawn partly from a new submission fee for protocol reviews. Separating the article processing fee into a submission and a publishing fee will allow authors to opt for "peer-review only" (without subsequent publication) at reduced costs, if they wish to await a funding decision or for other reasons decide not to make the protocol public.
McMillan-Cottom, Tressie
2014-08-01
Injury prevention programs can use social media to disseminate information and recruit participants. Non-profit organizations have also used social media for fundraising and donor relationship management. Non-profit organizations (NPOs) with injury prevention missions often serve vulnerable populations. Social media platforms have varied levels of access and control of shared content. This variability can present privacy and outreach challenges that are of particular concern for injury prevention NPOs. This case report of social media workshops for injury prevention NPOs presents concerns and strategies for successfully implementing social media campaigns.
Storage and retrieval of digital images in dermatology.
Bittorf, A; Krejci-Papa, N C; Diepgen, T L
1995-11-01
Differential diagnosis in dermatology relies on the interpretation of visual information in the form of clinical and histopathological images. Up until now, reference images have had to be retrieved from textbooks and/or appropriate journals. To overcome inherent limitations of those storage media with respect to the number of images stored, display, and search parameters available, we designed a computer-based database of digitized dermatologic images. Images were taken from the photo archive of the Dermatological Clinic of the University of Erlangen. A database was designed using the Entity-Relationship approach. It was implemented on a PC-Windows platform using MS Access* and MS Visual Basic®. As WWW-server a Sparc 10 workstation was used with the CERN Hypertext-Transfer-Protocol-Daemon (httpd) 3.0 pre 6 software running. For compressed storage on a hard drive, a quality factor of 60 allowed on-screen differential diagnosis and corresponded to a compression factor of 1:35 for clinical images and 1:40 for histopathological images. Hierarchical keys of clinical or histopathological criteria permitted multi-criteria searches. A script using the Common Gateway Interface (CGI) enabled remote search and image retrieval via the World-Wide-Web (W3). A dermatologic image database, featurig clinical and histopathological images was constructed which allows for multi-parameter searches and world-wide remote access.
An on-time power-aware scheduling scheme for medical sensor SoC-based WBAN systems.
Hwang, Tae-Ho; Kim, Dong-Sun; Kim, Jung-Guk
2012-12-27
The focus of many leading technologies in the field of medical sensor systems is on low power consumption and robust data transmission. For example, the implantable cardioverter-defibrillator (ICD), which is used to maintain the heart in a healthy state, requires a reliable wireless communication scheme with an extremely low duty-cycle, high bit rate, and energy-efficient media access protocols. Because such devices must be sustained for over 5 years without access to battery replacement, they must be designed to have extremely low power consumption in sleep mode. Here, an on-time, energy-efficient scheduling scheme is proposed that performs power adjustments to minimize the sleep-mode current. The novelty of this scheduler is that it increases the determinacy of power adjustment and the predictability of scheduling by employing non-pre-emptible dual priority scheduling. This predictable scheduling also guarantees the punctuality of important periodic tasks based on their serialization, by using their worst case execution time) and the power consumption optimization. The scheduler was embedded into a system on chip (SoC) developed to support the wireless body area network-a wakeup-radio and wakeup-timer for implantable medical devices. This scheduling system is validated by the experimental results of its performance when used with life-time extensions of ICD devices.
An On-Time Power-Aware Scheduling Scheme for Medical Sensor SoC-Based WBAN Systems
Hwang, Tae-Ho; Kim, Dong-Sun; Kim, Jung-Guk
2013-01-01
The focus of many leading technologies in the field of medical sensor systems is on low power consumption and robust data transmission. For example, the implantable cardioverter-defibrillator (ICD), which is used to maintain the heart in a healthy state, requires a reliable wireless communication scheme with an extremely low duty-cycle, high bit rate, and energy-efficient media access protocols. Because such devices must be sustained for over 5 years without access to battery replacement, they must be designed to have extremely low power consumption in sleep mode. Here, an on-time, energy-efficient scheduling scheme is proposed that performs power adjustments to minimize the sleep-mode current. The novelty of this scheduler is that it increases the determinacy of power adjustment and the predictability of scheduling by employing non-pre-emptible dual priority scheduling. This predictable scheduling also guarantees the punctuality of important periodic tasks based on their serialization, by using their worst case execution time) and the power consumption optimization. The scheduler was embedded into a system on chip (SoC) developed to support the wireless body area network—a wakeup-radio and wakeup-timer for implantable medical devices. This scheduling system is validated by the experimental results of its performance when used with life-time extensions of ICD devices. PMID:23271602
Language Planning and Media in Minority Language and Plurilingual Contexts
ERIC Educational Resources Information Center
Hogan-Brun, Gabrielle
2011-01-01
The proliferation of media and their associated platforms is creating radical changes in the way we interact with the world. Social media in particular have increased the manner of communication between people, with on-demand access to content any time, anywhere. With virtual communities being established online through a growing range of…
The Relationship between Screen Time and Sexual Behaviors among Middle School Students
ERIC Educational Resources Information Center
Barr, Elissa M.; Moore, Michele J.; Johnson, Tammie; Merten, Julie; Stewart, William P.
2014-01-01
Reducing risky sexual behaviors and their negative health outcomes in youth remains a priority for health educators. Years of research have documented media's effect on various adolescent health risks, including sexual behaviors. As technology evolves and youth access to media increases, understanding the role of media in adolescent health risk…
Critical Media Pedagogy: Teaching for Achievement in City Schools. Language & Literacy
ERIC Educational Resources Information Center
Morrell, Ernest; Duenas, Rudy; Garcia, Veronica; Lopez, Jorge
2013-01-01
This practical book examines how teaching media in high school English and social studies classrooms can address major challenges in our educational system. The authors argue that, in addition to providing underserved youth with access to 21st century learning technologies, critical media education will help improve academic literacy achievement…
Media Education: The Limits of a Discourse.
ERIC Educational Resources Information Center
Buckingham, David
What is the value and what are the consequences of students gaining access to "critical" academic discourses about the media? Ideally, the acquisition of an academic discourse should make it possible for students to reflect on their own experience in a systematic and rigorous way. Nevertheless, a critical discourse about the media may…
History and Development of Instructional Technology and Media in Social Work Education
ERIC Educational Resources Information Center
Shorkey, Clayton T.; Uebel, Michael
2014-01-01
Since the mid-20th century, instructional technologies and educational media in social work education have undergone significant development with the goals of improving learning and performance and enhancing access. This growth has been marked by technical advances in hardware and by innovations in media, or so-called soft formats. Current…
Media Services: Program Evaluation.
ERIC Educational Resources Information Center
Richardson, Edwin W.
The program for school media services in the Des Moines Independent Community School District is a combination of individual building media center programs and the district support services for these PK-12 programs, and its purpose is to ensure that students and staff have access to and are effective users of information. The district or central…
Library Media Specialists: Premier Information Specialists for the Information Age
ERIC Educational Resources Information Center
Neuman, Delia
2011-01-01
The information age has given library media specialists an unprecedented opportunity to play a leading role in helping teachers, administrators, and especially students access and use information intelligently. As the school's premier information specialist; the library media specialist has a unique role to play in helping everyone in the school…
Censorship of Library Books in School Library Media Centers Today.
ERIC Educational Resources Information Center
Saykanic, Donna
For many years, there has been pressure on American schools to restrict or deny students access to books or periodicals deemed objectionable by some individual or group on moral, political, religious, ethnic, racial, or philosophical grounds. Censorship of library books in school media centers is present today. The library media specialist is…
#Cleft: The use of Social Media Amongst Parents of Infants with Clefts.
Khouri, Joseph S; McCheyne, Melisande J; Morrison, Clinton S
2018-01-01
Introduction Many societies and organizations are using social media to reach their target audience. The extent to which parents of patients with craniofacial anomalies use social media has yet to be determined. The goal of this study is to characterize and describe the use of social media by the parents of children with cleft lip and palate as it pertains to the care of their child. Materials and Methods Parents or guardian of all patients presenting for initial consultation regarding a child's congenital cleft anomaly were contacted by phone or mail to complete a survey regarding their use of social media vis-à-vis their child's cleft anomaly. Participants were asked to answer a 19-question survey. Results Thirty-two families were contacted and 25 surveys were completed. Ninety-two percent of respondents used social media to learn about their child's diagnosis. Facebook (76%) and blogs (24%) were the most commonly accessed social media outlets, followed by Instagram (8%). Education about the diagnosis and treatment of cleft pathology (87%) was the most common reason for accessing social media, followed by companionship and support (56%), and advice about perioperative care (52%). Almost half (43%) of parents used social media to obtain information on their caregiver and treatment team, and 26% of parents used information gained on social media to guide their decision on where to seek care. Conclusion Social media is a readily available resource, one that will certainly shape the experiences of our patients and families for years to come.
ERIC Educational Resources Information Center
Walling, Linda Lucas
1992-01-01
Summarizes federal legislation regarding equal access for students with disabilities and discusses environmental barriers to accessibility in the library media center. Solutions to these design problems are suggested in the following areas: material formats and space requirements; the physical setting, including furniture, floor coverings,…
The Emerging Neuroscience of Social Media.
Meshi, Dar; Tamir, Diana I; Heekeren, Hauke R
2015-12-01
Social media use is a global phenomenon, with almost two billion people worldwide regularly using these websites. As Internet access around the world increases, so will the number of social media users. Neuroscientists can capitalize on the ubiquity of social media use to gain novel insights about social cognitive processes and the neural systems that support them. This review outlines social motives that drive people to use social media, proposes neural systems supporting social media use, and describes approaches neuroscientists can use to conduct research with social media. We close by noting important directions and ethical considerations of future research with social media. Copyright © 2015 Elsevier Ltd. All rights reserved.
Social media in dermatology: moving to Web 2.0.
Travers, Robin L
2012-09-01
Patient use of social media platforms for accessing medical information has accelerated in parallel with overall use of the Internet. Dermatologists must keep pace with our patients' use of these media through either passive or active means are outlined in detail for 4 specific social media outlets. A 5-step plan for active engagement in social media applications is presented. Implications for medical professionalism, Health Insurance Portability and Accountability Act compliance, and crisis management are discussed. Copyright © 2012. Published by Elsevier Inc.
Review and publication of protocol submissions to Trials - what have we learned in 10 years?
Li, Tianjing; Boutron, Isabelle; Al-Shahi Salman, Rustam; Cobo, Erik; Flemyng, Ella; Grimshaw, Jeremy M; Altman, Douglas G
2016-12-16
Trials has 10 years of experience in providing open access publication of protocols for randomised controlled trials. In this editorial, the senior editors and editors-in-chief of Trials discuss editorial issues regarding managing trial protocol submissions, including the content and format of the protocol, timing of submission, approaches to tracking protocol amendments, and the purpose of peer reviewing a protocol submission. With the clarification and guidance provided, we hope we can make the process of publishing trial protocols more efficient and useful to trial investigators and readers.
The Future of the New Media in the Communication of Science
NASA Astrophysics Data System (ADS)
Hanson, Joseph
2014-03-01
New media, that which is based around social networks, ubiquitous consumer technology, and today's near-universal access to information, has transformed the way that science is communicated to the scientist and non-scientist alike. We may be in the midst of mankind's greatest shift in information consumption and distribution since the invention of the printing press. Or maybe not. The problem with predicting the future is that it's very hard, and unless you're Isaac Asimov, it's very easy to be wrong. When one predicts the future regarding the internet, that risk becomes almost a certainty. Still, we can apply lessons learned from the near and distant history of science communication to put today's new media evolution into perspective, and to give us clues as to where social media, digital journalism, open access, and online education will lead science communication in years to come. Most importantly, it remains to be seen whether this new media evolution will translate into a shift in how science is viewed by citizens and their policymakers.
ERIC Educational Resources Information Center
Buchanan, Larry
1998-01-01
Addresses the use of e-mail for communication and collaborative projects in schools. Discusses the effectiveness of an e-mail system based on a UNIX host; problems with POP (post office protocol) client programs; and the new Internet Mail Access Protocol (IMAP) which addresses most of the shortcomings of the POP protocol while keeping advantages…
Countering Strategic Preclusion: The Requirement for Truly Global Reach in the 21st Century
2012-06-01
Website, http://www.618tacc. amc.af.mil/shared/ media /document/AFD-110602-022.pdf (accessed 24 May 2012). The inter-theater airlift support to Operation...Crisis,” Pacific Air Forces Official Website, http://www.pacaf. af.mil/shared/ media /document/AFD-110330-077.pdf [accessed 24 May 2012...Reconnaissance Office (NRO), which lists as one of its key functions providing targeting and BDA support to military operations. These are
Sefuba, Maria; Walingo, Tom; Takawira, Fambirai
2015-09-18
This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols.
Sefuba, Maria; Walingo, Tom; Takawira, Fambirai
2015-01-01
This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols. PMID:26393608
Evolution of the Data Access Protocol in Response to Community Needs
NASA Astrophysics Data System (ADS)
Gallagher, J.; Caron, J. L.; Davis, E.; Fulker, D.; Heimbigner, D.; Holloway, D.; Howe, B.; Moe, S.; Potter, N.
2012-12-01
Under the aegis of the OPULS (OPeNDAP-Unidata Linked Servers) Project, funded by NOAA, version 2 of OPeNDAP's Data Access Protocol (DAP2) is being updated to version 4. DAP4 is the first major upgrade in almost two decades and will embody three main areas of advancement. First, the data-model extensions developed by the OPULS team focus on three areas: Better support for coverages, access to HDF5 files and access to relational databases. DAP2 support for coverages (defined as a sampled functions) was limited to simple rectangular coverages that work well for (some) model outputs and processed satellite data but that cannot represent trajectories or satellite swath data, for example. We have extended the coverage concept in DAP4 to remove these limitations. These changes are informed by work at Unidata on the Common Data Model and also by the OGC's abstract coverages specification. In a similar vein, we have extended DAP2's support for relations by including the concept of foreign keys, so that tables can be explicitly related to one another. Second, the web interfaces - web services - that provides access to data using via DAP will be more clearly defined and use other (, orthogonal), standards where they are appropriate. An important case is the XML interface, which provides a cleaner way to build other response media types such as JSON and RDF (for metadata) and to build support for Atom, thus simplify the integration of DAP servers with tools that support OpenSearch. Input from the ESIP federation and work performed with IOOS have informed our choices here. Last, DAP4-compliant servers will support richer data-processing capabilities than DAP2, enabling a wider array of server functions that manipulate data before returning values. Two projects currently are exploring just what can be done even with DAP2's server-function model: The MIIC project at LARC and OPULS itself (with work performed at the University of Washington). Both projects have demonstrated that server functions can be used to perform operations on large volumes of data and return results that are far smaller than would be required to achieve the same outcomes via client-side processing. We are using information from these efforts to inform the design of server functions in DAP4. Each of the three areas of DAP4 advancement is being guided by input from a number of community members, including an OPULS Advisory Committee.
NASA Technical Reports Server (NTRS)
Burleigh, Scott C.
2011-01-01
Zero-Copy Objects System software enables application data to be encapsulated in layers of communication protocol without being copied. Indirect referencing enables application source data, either in memory or in a file, to be encapsulated in place within an unlimited number of protocol headers and/or trailers. Zero-copy objects (ZCOs) are abstract data access representations designed to minimize I/O (input/output) in the encapsulation of application source data within one or more layers of communication protocol structure. They are constructed within the heap space of a Simple Data Recorder (SDR) data store to which all participating layers of the stack must have access. Each ZCO contains general information enabling access to the core source data object (an item of application data), together with (a) a linked list of zero or more specific extents that reference portions of this source data object, and (b) linked lists of protocol header and trailer capsules. The concatenation of the headers (in ascending stack sequence), the source data object extents, and the trailers (in descending stack sequence) constitute the transmitted data object constructed from the ZCO. This scheme enables a source data object to be encapsulated in a succession of protocol layers without ever having to be copied from a buffer at one layer of the protocol stack to an encapsulating buffer at a lower layer of the stack. For large source data objects, the savings in copy time and reduction in memory consumption may be considerable.
Quantum Tomography Protocols with Positivity are Compressed Sensing Protocols (Open Access)
2015-12-08
ARTICLE OPEN Quantum tomography protocols with positivity are compressed sensing protocols Amir Kalev1, Robert L Kosut2 and Ivan H Deutsch1...Characterising complex quantum systems is a vital task in quantum information science. Quantum tomography, the standard tool used for this purpose, uses a well...designed measurement record to reconstruct quantum states and processes. It is, however, notoriously inefficient. Recently, the classical signal
Mackey, Tim K; Schoenfeld, Virginia J
2016-02-02
Social media is fundamentally altering how we access health information and make decisions about medical treatment, including for terminally ill patients. This specifically includes the growing phenomenon of patients who use online petitions and social media campaigns in an attempt to gain access to experimental drugs through expanded access pathways. Importantly, controversy surrounding expanded access and "compassionate use" involves several disparate stakeholders, including patients, manufacturers, policymakers, and regulatory agencies-all with competing interests and priorities, leading to confusion, frustration, and ultimately advocacy. In order to explore this issue in detail, this correspondence article first conducts a literature review to describe how the expanded access policy and regulatory environment in the United States has evolved over time and how it currently impacts access to experimental drugs. We then conducted structured web searches to identify patient use of online petitions and social media campaigns aimed at compelling access to experimental drugs. This was carried out in order to characterize the types of communication strategies utilized, the diseases and drugs subject to expanded access petitions, and the prevalent themes associated with this form of "digital" patient advocacy. We find that patients and their families experience mixed results, but still gravitate towards the use of online campaigns out of desperation, lack of reliable information about treatment access options, and in direct response to limitations of the current fragmented structure of expanded access regulation and policy currently in place. In response, we discuss potential policy reforms to improve expanded access processes, including advocating greater transparency for expanded access programs, exploring use of targeted economic incentives for manufacturers, and developing systems to facilitate patient information about existing treatment options. This includes leveraging recent legislative attention to reform expanded access through the CURE Act Provisions contained in the proposed U.S. 21st Century Cures Act. While expanded access may not be the best option for the majority of individuals, terminally ill patients and their families nevertheless deserve better processes, policies, and availability to potentially life-changing information, before they decide to pursue an online campaign in the desperate hope of gaining access to experimental drugs.
A method for deriving homogenous population of oligodendrocytes from mouse embryonic stem cells.
Neman, J; de Vellis, J
2012-06-01
There is a pressing need for new therapeutics for the generation and transplantation of oligodendrocyte to the white matter to help replace and render injured cells that are lost in demyelinating disease. There are a few protocols describing a homogenous derivation of non-manipulated mouse embryonic stem cells to oligodendrocytes (ES-OL). Moreover, protocols that are successful in producing ES-OL do so with low efficiency. Therefore, we describe clear methodology for differentiation of mouse ES cells to oligodendrocyte to a high degree of homogenity and reproducibility in vitro. In addition, taking advantage of three defined media, we can generate a defined ES to oligodendrocyte lineage while selecting against neurons and astrocytes. More specifically, (1) Glial stem cell defining media (GSCDM), supplemented with appropriate combination of SHH and RA support pro-oligodendrocyte developing neural spheres from ES cells, (2) Oligodendrocyte differentiating media, induces lineage selection of oligodendrocytes progenitors from neural stem cells, and (3) Oligodendrocyte maturation media, supports oligodendrocytes progenitor maturation. Moreover, the ES cell derived oligodendrocytes display mature properites in the prescence of rat dorsal root gangila in vitro. Thus confirming thier potential for use to invesitgate developmental pathways and future potential use of cells in transplantation towards myelin repair. Copyright © 2012 Wiley Periodicals, Inc.
Clulow, J R; Buss, H; Evans, G; Sieme, H; Rath, D; Morris, L H A; Maxwell, W M C
2012-02-01
Sex-sorted, frozen-thawed stallion spermatozoa remain out of reach of commercial horse breeders because of the low efficiency of the sex-sorting process and unacceptable fertility rates after insemination. Two experiments were designed to test the effects of alternative staining and freezing media to improve the viability of sex-sorted frozen-thawed stallion spermatozoa. Experiment 1 compared two freezing media, INRA 82(®) and a modified lactose-ethylenediaminetetraacetic acid (EDTA), for the cryopreservation of sex-sorted stallion spermatozoa. No significant differences between the two freezing media could be identified, suggesting that both cryodiluents would be suitable for incorporation into a sex-preselection protocol for stallion spermatozoa. Experiment 2 compared Kenney's modified Tyrode's (KMT) and Sperm TALP (Sp-TALP) as the staining and incubation medium for stallion spermatozoa prior to sex-sorting. A significant increase in the percentage of acrosome-reacted spermatozoa occurred after staining and incubation in the clarified Sp-TALP compared with KMT. As no improvements in sorting rates were achieved using Sp-TALP, it was concluded that stallion sorting protocols could include KMT as the staining and incubation medium while either INRA 82(®) or lactose-EDTA could be employed as a cryodiluents. © 2011 Blackwell Verlag GmbH.
An On-Demand Emergency Packet Transmission Scheme for Wireless Body Area Networks.
Al Ameen, Moshaddique; Hong, Choong Seon
2015-12-04
The rapid developments of sensor devices that can actively monitor human activities have given rise to a new field called wireless body area network (BAN). A BAN can manage devices in, on and around the human body. Major requirements of such a network are energy efficiency, long lifetime, low delay, security, etc. Traffic in a BAN can be scheduled (normal) or event-driven (emergency). Traditional media access control (MAC) protocols use duty cycling to improve performance. A sleep-wake up cycle is employed to save energy. However, this mechanism lacks features to handle emergency traffic in a prompt and immediate manner. To deliver an emergency packet, a node has to wait until the receiver is awake. It also suffers from overheads, such as idle listening, overhearing and control packet handshakes. An external radio-triggered wake up mechanism is proposed to handle prompt communication. It can reduce the overheads and improve the performance through an on-demand scheme. In this work, we present a simple-to-implement on-demand packet transmission scheme by taking into considerations the requirements of a BAN. The major concern is handling the event-based emergency traffic. The performance analysis of the proposed scheme is presented. The results showed significant improvements in the overall performance of a BAN compared to state-of-the-art protocols in terms of energy consumption, delay and lifetime.
Barreiro-Pérez, Manuel; Tundidor-Sanz, Elena; Martín-García, Ana; Díaz-Peláez, Elena; Íscar-Galán, Alberto; Merchán-Gómez, Soraya; Gallego-Delgado, María; Jiménez-Candil, Javier; Cruz-González, Ignacio; Sánchez, Pedro L
2018-05-01
Magnetic resonance (MR) is considered the gold standard in the assessment of myocardial morphology, function, perfusion, and viability. However, its main limitation is its scarce availability. In 2014, we installed the first MR scanner exclusively managed by a cardiology department within the publicly-funded Spanish healthcare system with the aim of improving patient-care, training and research in the department. In the time interval analyzed, July 2014 to May 2017, 3422 cardiac MR scans were performed (32minutes used per study; 96% with good quality; 75% with contrast media administration). The most prevalent clinical indications were cardiomyopathy (29%) and ischemic heart disease (12%). Twenty-five percent of studies were conducted in the context of research protocols. Follow-up studies predominated among outpatients, while pretherapeutic assessment was more common in hospitalized patients. The presumptive diagnosis was changed by cardiac MR scanning in up to 20% of patients investigated for ischemic heart disease. The installation and operative management of an MR scanner in our cardiology department has allowed us to integrate this technique into daily clinical practice, modify our clinical protocols, optimize access to this technology among cardiac patients, improve training, and conduct clinical research. Copyright © 2017 Sociedad Española de Cardiología. Published by Elsevier España, S.L.U. All rights reserved.
An On-Demand Emergency Packet Transmission Scheme for Wireless Body Area Networks
Al Ameen, Moshaddique; Hong, Choong Seon
2015-01-01
The rapid developments of sensor devices that can actively monitor human activities have given rise to a new field called wireless body area network (BAN). A BAN can manage devices in, on and around the human body. Major requirements of such a network are energy efficiency, long lifetime, low delay, security, etc. Traffic in a BAN can be scheduled (normal) or event-driven (emergency). Traditional media access control (MAC) protocols use duty cycling to improve performance. A sleep-wake up cycle is employed to save energy. However, this mechanism lacks features to handle emergency traffic in a prompt and immediate manner. To deliver an emergency packet, a node has to wait until the receiver is awake. It also suffers from overheads, such as idle listening, overhearing and control packet handshakes. An external radio-triggered wake up mechanism is proposed to handle prompt communication. It can reduce the overheads and improve the performance through an on-demand scheme. In this work, we present a simple-to-implement on-demand packet transmission scheme by taking into considerations the requirements of a BAN. The major concern is handling the event-based emergency traffic. The performance analysis of the proposed scheme is presented. The results showed significant improvements in the overall performance of a BAN compared to state-of-the-art protocols in terms of energy consumption, delay and lifetime. PMID:26690161
47 CFR 9.7 - Access to 911 and E911 service capabilities.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 47 Telecommunication 1 2013-10-01 2013-10-01 false Access to 911 and E911 service capabilities. 9.7 Section 9.7 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.7 Access to 911 and E911 service capabilities. (a) Access. Subject to the...
47 CFR 9.7 - Access to 911 and E911 service capabilities.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 47 Telecommunication 1 2014-10-01 2014-10-01 false Access to 911 and E911 service capabilities. 9.7 Section 9.7 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.7 Access to 911 and E911 service capabilities. (a) Access. Subject to the...
47 CFR 9.7 - Access to 911 and E911 service capabilities.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 47 Telecommunication 1 2012-10-01 2012-10-01 false Access to 911 and E911 service capabilities. 9.7 Section 9.7 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.7 Access to 911 and E911 service capabilities. (a) Access. Subject to the...
NASA Astrophysics Data System (ADS)
Jin, Yi; Zhai, Chao; Gu, Yonggang; Zhou, Zengxiang; Gai, Xiaofeng
2010-07-01
4,000 fiber positioning units need to be positioned precisely in LAMOST(Large Sky Area Multi-object Optical Spectroscopic Telescope) optical fiber positioning & control system, and every fiber positioning unit needs two stepper motors for its driven, so 8,000 stepper motors need to be controlled in the entire system. Wireless communication mode is adopted to save the installing space on the back of the focal panel, and can save more than 95% external wires compared to the traditional cable control mode. This paper studies how to use the ZigBee technology to group these 8000 nodes, explores the pros and cons of star network and tree network in order to search the stars quickly and efficiently. ZigBee technology is a short distance, low-complexity, low power, low data rate, low-cost two-way wireless communication technology based on the IEEE 802.15.4 protocol. It based on standard Open Systems Interconnection (OSI): The 802.15.4 standard specifies the lower protocol layers-the physical layer (PHY), and the media access control (MAC). ZigBee Alliance defined on this basis, the rest layers such as the network layer and application layer, and is responsible for high-level applications, testing and marketing. The network layer used here, based on ad hoc network protocols, includes the following functions: construction and maintenance of the topological structure, nomenclature and associated businesses which involves addressing, routing and security and a self-organizing-self-maintenance functions which will minimize consumer spending and maintenance costs. In this paper, freescale's 802.15.4 protocol was used to configure the network layer. A star network and a tree network topology is realized, which can build network, maintenance network and create a routing function automatically. A concise tree network address allocate algorithm is present to assign the network ID automatically.
Joint Cross-Layer Design for Wireless QoS Content Delivery
NASA Astrophysics Data System (ADS)
Chen, Jie; Lv, Tiejun; Zheng, Haitao
2005-12-01
In this paper, we propose a joint cross-layer design for wireless quality-of-service (QoS) content delivery. Central to our proposed cross-layer design is the concept of adaptation. Adaptation represents the ability to adjust protocol stacks and applications to respond to channel variations. We focus our cross-layer design especially on the application, media access control (MAC), and physical layers. The network is designed based on our proposed fast frequency-hopping orthogonal frequency division multiplex (OFDM) technique. We also propose a QoS-awareness scheduler and a power adaptation transmission scheme operating at both the base station and mobile sides. The proposed MAC scheduler coordinates the transmissions of an IP base station and mobile nodes. The scheduler also selects appropriate transmission formats and packet priorities for individual users based on current channel conditions and the users' QoS requirements. The test results show that our cross-layer design provides an excellent framework for wireless QoS content delivery.
Guidelines for Outsourcing Remote Access.
ERIC Educational Resources Information Center
Hassler, Ardoth; Neuman, Michael
1996-01-01
Discusses the advantages and disadvantages of outsourcing remote access to campus computer networks and the Internet, focusing on improved service, cost-sharing, partnerships with vendors, supported protocols, bandwidth, scope of access, implementation, support, network security, and pricing. Includes a checklist for a request for proposals on…
Ahlin, Catharina; Klang-Söderkvist, Birgitta; Brundin, Seija; Hellström, Birgitta; Pettersson, Karin; Johansson, Eva
2006-01-01
The objectives of this study were to evaluate registered nurses' (RN) compliance with a local clinical central venous access device (CVAD) protocol after completing an educational program and to determine RNs' perception of the program. Seventy-five RNs working in hematology participated in the educational part of the program. Sixty-eight RNs were examined while changing CVAD dressings or placing a Huber needle into a port on actual patients. Sixty percent of the RNs passed the examination and reported that the program increased their knowledge. The results indicated that the educational program could be recommended for use when implementing a new clinical protocol.
Communicating Science from the Inside Out
NASA Astrophysics Data System (ADS)
Clark, C.
2006-12-01
Communicating relevant science to the outside world is becoming more critical to the science research community. Now part of many institution's mission statements, communicating the broader impacts of scientific exploration and discovery has become increasingly important in informing the public, providing information to policy makers, and obtaining research funding. Although some critics say traditional coverage of science news is shrinking, media coverage of newsworthy science will always exist in today's news-hungry world. The key is access, access to media outlets by scientists and access to scientists by media representatives. Getting the word out through traditional and new media in a timely and effective manner can be daunting and time consuming to many scientists. Yet, these are the challenges being tackled on a daily basis by science communicators residing in most research and academic organizations, universities, and institutions. Professional science communicators are valuable resources who can provide crucial input on dealing with, and coping with, the media. In return, effective science communicators serve as important liaisons who efficiently connect science media with appropriate researchers. Wise use of internal science communicators can make the difference in getting news out and getting it right. For more than a decade, a national network of science communicators from institutions, organizations, and funding agencies has existed to collaborate on science news in a concerted effort to improve science coverage at all levels. This network provides collaborative resources to improve the efficiency in getting science news disseminated to the broader public. Although the media is only one audience scientists must interface with today, it is still the most far- reaching outlet for reaching and impacting the broad public by conveying the excitement, importance, and value of today's scientific research. And science communications specialists are the most valuable tool a scientist can utilize in getting relevant science communicated to the outside world.
The Use of Online Strategies and Social Media for Research Dissemination in Education
ERIC Educational Resources Information Center
Cooper, Amanda
2014-01-01
Alongside a growing interest in knowledge mobilization (trying to increase the connection between research, policy and practice) there has been a transformation of how knowledge is produced, accessed and disseminated in light of the internet and social media strategies. Few studies have explored the use of social media for research dissemination.…
Student Media Usage Patterns and Non-Traditional Learning in Higher Education
ERIC Educational Resources Information Center
Zawacki-Richter, Olaf; Müskens, Wolfgang; Krause, Ulrike; Alturki, Uthman; Aldraiweesh, Ahmed
2015-01-01
A total of 2,338 students at German universities participated in a survey, which investigated media usage patterns of so-called traditional and non-traditional students (Schuetze & Wolter, 2003). The students provided information on the digital devices that they own or have access to, and on their usage of media and e-learning tools and…
ERIC Educational Resources Information Center
Chang, Chi-Cheng; Lei, Hao; Tseng, Ju-Shih
2014-01-01
Although ubiquitous learning enhances students' access to learning materials, it is crucial to find out which media delivery modes produce the best results for English listening comprehension. The present study examined the effect of media delivery mode (sound and text vs. sound) on English listening comprehension and cognitive load. Participants…
ERIC Educational Resources Information Center
Aybek, Birsel
2016-01-01
Problem Statement: Teachers play a significant role in shaping students on media literacy and critical thinking. Hence, prospective teachers are required to gain knowledge about media literacy and critical thinking during pre-service training. Provided that prospective teachers who will shape the next generation possess such skills as accessing to…
Military Engagement with Social Media
2011-05-06
20091120/ADOP06/911200310/ 1040ADOP06 (accessed on March 27, 2011). 5 Lon Safko and David K. Brake, The Social Media Bible (Hoboken, New Jersey: John...March 31, 2011). 19 Lon Safko and David K. Brake, The Social Media Bible (Hoboken, New Jersey: John Wiley & Sons, Inc., 2009), 200. 20...March 27, 2011). 23 Ibid. 24 Lon Safko and David K. Brake, The Social Media Bible (Hoboken, New Jersey: John Wiley & Sons, Inc., 2009), 731
The Who, What and How of Social Media Exploitation for a Combatant Commander
2013-05-20
intelligence information. Social media platforms such as Facebook, Twitter and YouTube provide users with the ability to create, disseminate, share... users with the ability to create, disseminate, share and access information from almost anywhere in the world in real time, on any subject one may...media in translating words into actions. First, users of social media are not uniform from country to country or even within a specific country
Fontaine, Guillaume; Lavallée, Andréane; Maheu-Cadotte, Marc-André; Bouix-Picasso, Julien; Bourbonnais, Anne
2018-01-30
The optimisation of health science communication (HSC) between researchers and the public is crucial. In the last decade, the rise of the digital and social media ecosystem allowed for the disintermediation of HSC. Disintermediation refers to the public's direct access to information from researchers about health science-related topics through the digital and social media ecosystem, a process that would otherwise require a human mediator, such as a journalist. Therefore, the primary aim of this scoping review is to describe the nature and the extent of the literature regarding HSC strategies involving disintermediation used by researchers with the public in the digital and social media ecosystem. The secondary aim is to describe the HSC strategies used by researchers, and the communication channels associated with these strategies. We will conduct a scoping review based on the Joanna Briggs Institute's methodology and perform a systematic search of six bibliographical databases (CINAHL, EMBASE, IBSS, PubMed, Sociological Abstracts and Web of Science), four trial registries and relevant sources of grey literature. Relevant journals and reference lists of included records will be hand-searched. Data will be managed using the EndNote software and the Rayyan web application. Two review team members will perform independently the screening process as well as the full-text assessment of included records. Descriptive data will be synthesised in a tabular format. Data regarding the nature and the extent of the literature, the HSC strategies and the associated communication channels will be presented narratively. This review does not require institutional review board approval as we will use only collected and published data. Results will allow the mapping of the literature about HSC between researchers and the public in the digital and social media ecosystem, and will be published in a peer-reviewed journal. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.
A Narrative Review of Social Media and Game-Based Nutrition Interventions Targeted at Young Adults.
Nour, Monica; Yeung, Sin Hang; Partridge, Stephanie; Allman-Farinelli, Margaret
2017-05-01
The increased popularity of social media and mobile gaming among young adults provides an opportunity for innovative nutrition programs. This review evaluated the efficacy of these strategies in interventions targeted at 18- to 35-year-olds. The protocol was guided by the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA). Ten scientific databases, information technology conference proceedings, and gray literature were searched. Two reviewers conducted screening, data extraction, and quality assessments. Interventions were included if they used social media or electronic games. Comparisons were made pre- to post-intervention, or between intervention and control arms. Outcomes of interest included change in nutrition knowledge, attitudes, behavior, or weight and/or body composition. Eleven social media-based (randomized controlled trials [RCT] n=7) and six game-based [RCT n=1]) interventions were included. Overall quality of studies was low. Social media-based strategies included forum/blogs (n=5), Facebook (n=5), Twitter (n=1), YouTube (n=1), and chat rooms (n=1). Eight (RCT n=6) of 11 social media-based studies demonstrated improvements in outcomes. Findings suggested that social media may be more effective when combined with other strategies. Virtual reality games (n=3), web-based games (n=2), and a mobile application (n=1) were used in the gaming interventions. While a significant increase in knowledge was reported by three gaming studies (RCT=1), two used nonvalidated tools and longer-term measures of weight and behavioral outcomes were limited. The use of social media and gaming for nutrition promotion is in its infancy. Preliminary evidence suggests that these strategies have some utility for intervening with young adults. Further research using high-quality study designs is required, with measurement of outcomes over longer time periods. The systematic review protocol is registered with PROSPERO (registration number: CRD42015025427). Copyright © 2017 Academy of Nutrition and Dietetics. Published by Elsevier Inc. All rights reserved.
Perrin, E; Jackson, M; Grant, R; Lloyd, C; Chinaka, F; Goh, V
2018-02-01
In many centres, a fixed method of contrast-media administration is used for CT regardless of patient body habitus. The aim of this trial was to assess contrast enhancement of the aorta, portal vein, liver and spleen during abdomino-pelvic CT imaging using a weight-adapted contrast media protocol compared to the current fixed dose method. Thirty-nine oncology patients, who had previously undergone CT abdomino-pelvic imaging at the institution using a fixed contrast media dose, were prospectively imaged using a weight-adapted contrast media dose (1.4 ml/kg). The two sets of images were assessed for contrast enhancement levels (HU) at locations in the liver, aorta, portal vein and spleen during portal-venous enhancement phase. The t-test was used to compare the difference in results using a non-inferiority margin of 10 HU. When the contrast dose was tailored to patient weight, contrast enhancement levels were shown to be non-inferior to the fixed dose method (liver p < 0.001; portal vein p = 0.003; aorta p = 0.001; spleen p = 0.001). As a group, patients received a total contrast dose reduction of 165 ml using the weight-adapted method compared to the fixed dose method, with a mean cost per patient of £6.81 and £7.19 respectively. Using a weight-adapted method of contrast media administration was shown to be non-inferior to a fixed dose method of contrast media administration. Patients weighing 76 kg, or less, received a lower contrast dose which may have associated cost savings. A weight-adapted contrast media protocol should be implemented for portal-venous phase abdomino-pelvic CT for oncology patients with adequate renal function (>70 ml/min/1.73 m 2 ). Crown Copyright © 2017. Published by Elsevier Ltd. All rights reserved.
Ovnat Tamir, Sharon; Shemesh, Shay; Oron, Yahav; Marom, Tal
2017-05-01
Acute otitis media (AOM) is a common childhood disease, with an enormous economic and healthcare-related burden. Guidelines and consensus papers for AOM diagnosis and management were published in many countries. Our objective was to study the differences and similarities between these protocols in developing and developed countries. The keywords: 'acute otitis media' AND 'children' AND ['treatment' or 'management'] AND ['guideline' or 'consensus'] were used in various electronic databases between 1 January 1989 through 31 December 2015. Overall, 99 sources from 62 countries were retrieved: 53 from 22 developed countries, and 46 from 40 developing countries. Representative guidelines from America (the USA, Argentina), Europe (Italy, Moldova), Africa (South Africa, Tanzania, Ethiopia), Asia (Japan, Afghanistan, Sri Lanka),and Oceania (South Australia, Fiji) were compared. Paediatric societies publish guidelines in most developed countries; in developing countries, the Ministry of Health usually initiates guideline formulation. Most guidelines use the same diagnostic criteria and offer watchful waiting in mild-moderate scenarios. Amoxicillin is the suggested first-line antibiotic, whereas options for second-line and third-line therapies vary. Duration of therapy varies and is usually age dependent: 5-7 days for children <2 years and 10 days for children >2 years in developed countries, while duration and age groups vary greatly in developing countries. Reduction of AOM risk factors is encouraged in developed countries, but rarely in developing countries. Guidelines for AOM from developing and developed countries are similar in many aspects, with variation in specific recommendations, due to local epidemiology and healthcare accessibility. Formulation of regional guidelines may help reduce AOM burden. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.
Watermarking protocols for authentication and ownership protection based on timestamps and holograms
NASA Astrophysics Data System (ADS)
Dittmann, Jana; Steinebach, Martin; Croce Ferri, Lucilla
2002-04-01
Digital watermarking has become an accepted technology for enabling multimedia protection schemes. One problem here is the security of these schemes. Without a suitable framework, watermarks can be replaced and manipulated. We discuss different protocols providing security against rightful ownership attacks and other fraud attempts. We compare the characteristics of existing protocols for different media like direct embedding or seed based and required attributes of the watermarking technology like robustness or payload. We introduce two new media independent protocol schemes for rightful ownership authentication. With the first scheme we ensure security of digital watermarks used for ownership protection with a combination of two watermarks: first watermark of the copyright holder and a second watermark from a Trusted Third Party (TTP). It is based on hologram embedding and the watermark consists of e.g. a company logo. As an example we use digital images and specify the properties of the embedded additional security information. We identify components necessary for the security protocol like timestamp, PKI and cryptographic algorithms. The second scheme is used for authentication. It is designed for invertible watermarking applications which require high data integrity. We combine digital signature schemes and digital watermarking to provide a public verifiable integrity. The original data can only be reproduced with a secret key. Both approaches provide solutions for copyright and authentication watermarking and are introduced for image data but can be easily adopted for video and audio data as well.
Public opinion on media presence in the courthouse.
Fusco, Nina Marie; Sabourin, Michel
2012-01-01
Very little attention has been devoted to the public's opinion of media coverage of court cases despite extensive research on pretrial publicity (PTP). Following a provincial judgment to restrict media access in Quebec courthouses, a preliminary unpublished study found that the public was largely in support of these restrictions. The present study sought to expand on this finding in a more widely generalizable sample. Subjects were recruited from continuing education classes and completed a questionnaire that assessed their support for restricting journalists in courthouses. Nearly 80% of the 243 participants supported media restrictions. Although participants in the four experimental conditions and one of the control groups were largely in favor of the restrictions, one control group was opposed to the restrictions. The results suggest that the public prefers that journalists have restricted access to courtroom participants, resonating research on PTP and the Supreme Court's decision on the case. Copyright © 2011 Elsevier Ltd. All rights reserved.
Gaining insights from social media language: Methodologies and challenges.
Kern, Margaret L; Park, Gregory; Eichstaedt, Johannes C; Schwartz, H Andrew; Sap, Maarten; Smith, Laura K; Ungar, Lyle H
2016-12-01
Language data available through social media provide opportunities to study people at an unprecedented scale. However, little guidance is available to psychologists who want to enter this area of research. Drawing on tools and techniques developed in natural language processing, we first introduce psychologists to social media language research, identifying descriptive and predictive analyses that language data allow. Second, we describe how raw language data can be accessed and quantified for inclusion in subsequent analyses, exploring personality as expressed on Facebook to illustrate. Third, we highlight challenges and issues to be considered, including accessing and processing the data, interpreting effects, and ethical issues. Social media has become a valuable part of social life, and there is much we can learn by bringing together the tools of computer science with the theories and insights of psychology. (PsycINFO Database Record (c) 2016 APA, all rights reserved).
McMillan-Cottom, Tressie
2014-01-01
Injury prevention programs can use social media to disseminate information and recruit participants. Non-profit organizations have also used social media for fundraising and donor relationship management. Non-profit organizations (NPOs) with injury prevention missions often serve vulnerable populations. Social media platforms have varied levels of access and control of shared content. This variability can present privacy and outreach challenges that are of particular concern for injury prevention NPOs. This case report of social media workshops for injury prevention NPOs presents concerns and strategies for successfully implementing social media campaigns. PMID:25157305
Nasirudeen, A M A; Lee Chin Adeline, Lau; Wat Neo Josephine, Koh; Lay Seng, Lim; Wenjie, Li
2017-01-01
Many tertiary students access social networking sites on a daily basis. With the increased usage of smartphones, accessing social networking sites while commuting, in schools, waiting for friends, television commercial breaks has become prevalent among tertiary students. What started as a lifestyle choice has now become a daily necessity. Such behavior among tertiary students raises an important question for educators: how does social media usage affect tertiary students' sleep patterns and daytime sleepiness, their attention difficulties, especially in school? Thus, the aim of this study was to examine the relationships between tertiary students' self-reports of social media usage and daytime sleepiness. The design was a cross-sectional, quantitative research study. We used a survey that contained questions concerning demographic data, daytime sleepiness, total sleep time and social media usage and a version of the Cleveland Adolescent Sleepiness Questionnaire, modified for use in tertiary students, were used for data collection ( n = 969). The most preferred tool for accessing social networking sites was smartphones and WhatsApp was the most accessed site. Results indicated that nocturnal technology use has a weak, negative impact on tertiary students' quantity of sleep that may lead to daytime sleepiness. Local Singapore students spent significantly more time on social networking sites at night compared to foreign students. As a result, local students experienced more daytime sleepiness compared to foreign students. Prolonged social media usage, especially in bed, has a negative impact on tertiary students' daytime sleepiness. Since the technology is such an integral part of most tertiary students' lives, it is important to understand the impact it has on their sleep and daytime sleepiness.
Bearer channel control protocol for the dynamic VB5.2 interface in ATM access networks
NASA Astrophysics Data System (ADS)
Fragoulopoulos, Stratos K.; Mavrommatis, K. I.; Venieris, Iakovos S.
1996-12-01
In the multi-vendor systems, a customer connected to an Access network (AN) must be capable of selecting a specific Service Node (SN) according to the services the SN provides. The multiplicity of technologically varying AN calls for the definition of a standard reference point between the AN and the SN widely known as the VB interface. Two versions are currently offered. The VB5.1 is simpler to implement but is not as flexible as the VB5.2, which supports switched connections. The VB5.2 functionality is closely coupled to the Broadband Bearer Channel Connection Protocol (B-BCCP). The B-BCCP is used for conveying the necessary information for dynamic resource allocation, traffic policing and routing in the AN as well as for information exchange concerning the status of the AN before a new call is established by the SN. By relying on such a protocol for the exchange of information instead of intercepting and interpreting signalling messages in the AN, the architecture of the AN is simplified because the functionality related to processing is not duplicated. In this paper a prominent B- BCCP candidate is defined, called the Service node Access network Interaction Protocol.
The deployment of a large scale object store at the RAL Tier-1
NASA Astrophysics Data System (ADS)
Dewhurst, A.; Johnson, I.; Adams, J.; Canning, B.; Vasilakakos, G.; Packer, A.
2017-10-01
Since 2014, the RAL Tier-1 has been working on deploying a Ceph backed object store. The aim is to replace Castor for disk-only storage. This new service must be scalable to meet the data demands of the LHC to 2020 and beyond. As well as offering access protocols the LHC experiments currently use, it must also provide industry standard access protocols. In order to keep costs down the service must use erasure coding rather than replication to ensure data reliability. This paper will present details of the storage service setup, which has been named Echo, as well as the experience gained from running it. The RAL Tier-1 has also been developing XrootD and GridFTP plugins for Ceph. Both plugins are built on top of the same libraries that write striped data into Ceph and therefore data written by one protocol will be accessible by the other. In the long term we hope the LHC experiments will migrate to industry standard protocols, therefore these plugins will only provide the features needed by the LHC experiments. This paper will report on the development and testing of these plugins.
Increasing the Accessibility of Science for All Students
ERIC Educational Resources Information Center
Langley-Turnbaugh, S. J.; Wilson, G.; Lovewell, L.
2009-01-01
This paper evaluates the accessibility of selected field and laboratory high school science activities, and provides suggestions for increasing accessibility for students with disabilities. We focused on GLOBE (Global Learning Observations to Benefit the Environment) protocols, specifically the new Seasons and Biomes investigation currently being…
Children and Adolescents and Digital Media.
Reid Chassiakos, Yolanda Linda; Radesky, Jenny; Christakis, Dimitri; Moreno, Megan A; Cross, Corinn
2016-11-01
Today's children and adolescents are immersed in both traditional and new forms of digital media. Research on traditional media, such as television, has identified health concerns and negative outcomes that correlate with the duration and content of viewing. Over the past decade, the use of digital media, including interactive and social media, has grown, and research evidence suggests that these newer media offer both benefits and risks to the health of children and teenagers. Evidence-based benefits identified from the use of digital and social media include early learning, exposure to new ideas and knowledge, increased opportunities for social contact and support, and new opportunities to access health promotion messages and information. Risks of such media include negative health effects on sleep, attention, and learning; a higher incidence of obesity and depression; exposure to inaccurate, inappropriate, or unsafe content and contacts; and compromised privacy and confidentiality. This technical report reviews the literature regarding these opportunities and risks, framed around clinical questions, for children from birth to adulthood. To promote health and wellness in children and adolescents, it is important to maintain adequate physical activity, healthy nutrition, good sleep hygiene, and a nurturing social environment. A healthy Family Media Use Plan (www.healthychildren.org/MediaUsePlan) that is individualized for a specific child, teenager, or family can identify an appropriate balance between screen time/online time and other activities, set boundaries for accessing content, guide displays of personal information, encourage age-appropriate critical thinking and digital literacy, and support open family communication and implementation of consistent rules about media use. Copyright © 2016 by the American Academy of Pediatrics.
Report #2006-P-00005, December 14, 2005. Controls needed to be improved in areas such as visitor access to facilities, use of contractor access badges, and general physical access to the NCC, computer rooms outside the NCC, and media storage rooms.
Traffic placement policies for a multi-band network
NASA Technical Reports Server (NTRS)
Maly, Kurt J.; Foudriat, E. C.; Game, David; Mukkamala, R.; Overstreet, C. Michael
1990-01-01
Recently protocols were introduced that enable the integration of synchronous traffic (voice or video) and asynchronous traffic (data) and extend the size of local area networks without loss in speed or capacity. One of these is DRAMA, a multiband protocol based on broadband technology. It provides dynamic allocation of bandwidth among clusters of nodes in the total network. A number of traffic placement policies for such networks are proposed and evaluated. Metrics used for performance evaluation include average network access delay, degree of fairness of access among the nodes, and network throughput. The feasibility of the DRAMA protocol is established through simulation studies. DRAMA provides effective integration of synchronous and asychronous traffic due to its ability to separate traffic types. Under the suggested traffic placement policies, the DRAMA protocol is shown to handle diverse loads, mixes of traffic types, and numbers of nodes, as well as modifications to the network structure and momentary traffic overloads.
A MAC Protocol for Medical Monitoring Applications of Wireless Body Area Networks
Shu, Minglei; Yuan, Dongfeng; Zhang, Chongqing; Wang, Yinglong; Chen, Changfang
2015-01-01
Targeting the medical monitoring applications of wireless body area networks (WBANs), a hybrid medium access control protocol using an interrupt mechanism (I-MAC) is proposed to improve the energy and time slot utilization efficiency and to meet the data delivery delay requirement at the same time. Unlike existing hybrid MAC protocols, a superframe structure with a longer length is adopted to avoid unnecessary beacons. The time slots are mostly allocated to nodes with periodic data sources. Short interruption slots are inserted into the superframe to convey the urgent data and to guarantee the real-time requirements of these data. During these interruption slots, the coordinator can break the running superframe and start a new superframe. A contention access period (CAP) is only activated when there are more data that need to be delivered. Experimental results show the effectiveness of the proposed MAC protocol in WBANs with low urgent traffic. PMID:26046596
Kasenda, Benjamin; von Elm, Erik; You, John J; Blümle, Anette; Tomonaga, Yuki; Saccilotto, Ramon; Amstutz, Alain; Bengough, Theresa; Meerpohl, Joerg J; Stegert, Mihaela; Olu, Kelechi K; Tikkinen, Kari A O; Neumann, Ignacio; Carrasco-Labra, Alonso; Faulhaber, Markus; Mulla, Sohail M; Mertz, Dominik; Akl, Elie A; Bassler, Dirk; Busse, Jason W; Ferreira-González, Ignacio; Lamontagne, Francois; Nordmann, Alain; Gloy, Viktoria; Raatz, Heike; Moja, Lorenzo; Ebrahim, Shanil; Schandelmaier, Stefan; Sun, Xin; Vandvik, Per O; Johnston, Bradley C; Walter, Martin A; Burnand, Bernard; Schwenkglenks, Matthias; Hemkens, Lars G; Bucher, Heiner C; Guyatt, Gordon H; Briel, Matthias
2016-06-01
Little is known about publication agreements between industry and academic investigators in trial protocols and the consistency of these agreements with corresponding statements in publications. We aimed to investigate (i) the existence and types of publication agreements in trial protocols, (ii) the completeness and consistency of the reporting of these agreements in subsequent publications, and (iii) the frequency of co-authorship by industry employees. We used a retrospective cohort of randomized clinical trials (RCTs) based on archived protocols approved by six research ethics committees between 13 January 2000 and 25 November 2003. Only RCTs with industry involvement were eligible. We investigated the documentation of publication agreements in RCT protocols and statements in corresponding journal publications. Of 647 eligible RCT protocols, 456 (70.5%) mentioned an agreement regarding publication of results. Of these 456, 393 (86.2%) documented an industry partner's right to disapprove or at least review proposed manuscripts; 39 (8.6%) agreements were without constraints of publication. The remaining 24 (5.3%) protocols referred to separate agreement documents not accessible to us. Of those 432 protocols with an accessible publication agreement, 268 (62.0%) trials were published. Most agreements documented in the protocol were not reported in the subsequent publication (197/268 [73.5%]). Of 71 agreements reported in publications, 52 (73.2%) were concordant with those documented in the protocol. In 14 of 37 (37.8%) publications in which statements suggested unrestricted publication rights, at least one co-author was an industry employee. In 25 protocol-publication pairs, author statements in publications suggested no constraints, but 18 corresponding protocols documented restricting agreements. Publication agreements constraining academic authors' independence are common. Journal articles seldom report on publication agreements, and, if they do, statements can be discrepant with the trial protocol.
PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices
Sanchez, Pedro Moreno; Lopez, Rafa Marin; Gomez Skarmeta, Antonio F.
2013-01-01
Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices. PMID:24189332
PANATIKI: a network access control implementation based on PANA for IoT devices.
Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F
2013-11-01
Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.
NASA Technical Reports Server (NTRS)
Todd, P.
1985-01-01
Materials and procedures for microgravity electrophoresis of living human embryonic kidney cells were evaluated, ground support in the form of analytical cell electrophoresis and flow cytometry was provided and cells returned from space flight were analyzed. Preflight culture media, electrophoresis buffer, fraction collection media, temperature profiles, and urokinase assay procedures were tested prior to flight. Electrophoretic mobility distributions of aliquots of the cell population to be fractionated in flight were obtained. The protocol established and utilized is given.
Young people's comfort receiving sexual health information via social media and other sources.
Lim, Megan Sc; Vella, Alyce; Sacks-Davis, Rachel; Hellard, Margaret E
2014-12-01
Social media are growing in popularity and will play a key role in future sexual health promotion initiatives. We asked 620 survey participants aged 16 to 29 years about their time spent using social media and their comfort in receiving information about sexual health via different channels. Median hours per day spent using social network sites was two; 36% spent more than 2 hours per day using social network sites. In multivariable logistic regression, being aged less than 20 years and living in a major city (compared to rural/regional Australia) were associated with use of social media more than 2 hours per day. Most participants reported being comfortable or very comfortable accessing sexual health information from websites (85%), followed by a doctor (81%), school (73%), and the mainstream media (67%). Fewer reported being comfortable getting information from social media; Facebook (52%), apps (51%), SMS (44%), and Twitter (36%). Several health promotion programmes via social media have demonstrated efficacy; however, we have shown that many young people are not comfortable with accessing sexual health information through these channels. Further research is needed to determine how to best take advantage of these novel opportunities for health promotion. © The Author(s) 2014 Reprints and permissions: sagepub.co.uk/journalsPermissions.nav.
Mukherjee, Joyeeta; Gupta, Munishwar N
2017-01-01
Protein-coated microcrystals (PCMC) are a high-activity preparation of enzymes for use in low-water media. The protocols for the preparation of PCMCs of Subtilisin Carlsberg and Candida antarctica lipase B (CAL B) are described. The combi-PCMC concept is useful both for cascade and non-cascade reactions. It can also be beneficial to combine two different specificities of a lipase when the substrate requires it. Combi-PCMC of CALB and Palatase used for the conversion of coffee oil present in spent coffee grounds to biodiesel is described. Cross-linked protein-coated microcrystals (CL-PCMC) in some cases can give better results than PCMC. Protocols for the CLPCMC of Subtilisin Carlsberg and Candida antarctica lipase B (CAL B) are described. A discussion of their applications is also provided.
Current Trends in Social Media and the Department of Defense’s Social Media Policy
2014-09-23
environment in which these interactions occur. Facebook, Twitter, YouTube , and Instagram are social media websites that allow users to create and/or...post photographs, while YouTube specializes in user-generated videos. The accessibility of social media on mobile technology, such as smartphones...websites. • Evernote Video A video-sharing website that allows users to upload, share, view and comment on videos. • Vimeo • YouTube • Twitter Music
ERIC Educational Resources Information Center
Crow, Deserai Anderson
2011-01-01
Local news media help shape the agendas from which new policies emerge. Furthermore, local media help determine public understanding of complex issues. Media should inform citizens and policymakers on important policy issues. This study uses a content analysis of 11 newspapers to understand the manner in which reporters covered a specific…
Library Media Facilities Access: Do You Really Want Your Library Media Center Used?
ERIC Educational Resources Information Center
Hart, Thomas L.
2005-01-01
In this article, the author discusses and provides some examples on how students and teachers should use library media centers. He also discusses the common problems with facilities design as it changes along with other aspects of society. He states that flexibility in design ensures that the physical facility will meet future program needs.…
Library/Media Centers in U.S. Public Schools: Growth, Staffing, and Resources. Full Report
ERIC Educational Resources Information Center
Tuck, Kathy D.; Holmes, Dwight R.
2016-01-01
At the request of New Business Item: 89 (NBI: 89) adopted at the 2015 NEA Representative Assembly, this study examines the extent to which students have access to public school library/media centers with qualified staff and up-to-date resources. The study explores trends in library/media center openings and closings as well as staffing patterns…
Strategic Communication Joint Integrating Concept. Version 1.0
2009-10-07
information and knowledge on complex social communication systems, to include the characteristics of various media channels and the intentions... social or media networks. Including strategic communication instructions as an integral part of the main body of an operation order or plan...information and knowledge on complex social communication systems, to include the characteristics of various media SC-004.2T Access
Inside the Digital Wild West: How School Leaders Both Access and Avoid Social Media
ERIC Educational Resources Information Center
Corrigan, Laurie; Robertson, Lorayne
2015-01-01
This study examines the roles of Canadian school leaders in response to the rising phenomenon of student use of social media which impacts school climate and safety. The use of social media has resulted in more online text and image-based communication to multiple users and less face-to-face communication with single users. Adolescent…
Lessons in Media Literacy and Students' Comprehension of Television and Text Advertisements.
ERIC Educational Resources Information Center
Verkaik, Nan; Gathercoal, Paul
A Media Studies program enhances the goals of formal schooling by providing every student with knowledge and skills to wisely select, access and use the communications and information tools they will need to be responsible citizens in a free society. All students deserve a good media education. This paper provides a model to address this need…
Mining Adverse Drug Reactions in Social Media with Named Entity Recognition and Semantic Methods.
Chen, Xiaoyi; Deldossi, Myrtille; Aboukhamis, Rim; Faviez, Carole; Dahamna, Badisse; Karapetiantz, Pierre; Guenegou-Arnoux, Armelle; Girardeau, Yannick; Guillemin-Lanne, Sylvie; Lillo-Le-Louët, Agnès; Texier, Nathalie; Burgun, Anita; Katsahian, Sandrine
2017-01-01
Suspected adverse drug reactions (ADR) reported by patients through social media can be a complementary source to current pharmacovigilance systems. However, the performance of text mining tools applied to social media text data to discover ADRs needs to be evaluated. In this paper, we introduce the approach developed to mine ADR from French social media. A protocol of evaluation is highlighted, which includes a detailed sample size determination and evaluation corpus constitution. Our text mining approach provided very encouraging preliminary results with F-measures of 0.94 and 0.81 for recognition of drugs and symptoms respectively, and with F-measure of 0.70 for ADR detection. Therefore, this approach is promising for downstream pharmacovigilance analysis.
Research Collaboration in a Communication Rights Campaign: Lessons Learned.
Ryan, Charlotte
2018-01-01
In building public support for social change, activists in communities of color routinely approach broader audiences via news media. Communities of color, however, routinely face disparities that limit their access to media including local news media outlets. This lack of access mirrors inequalities in political, social, and economic arenas and can slow public awareness campaigns to address disparities in health, environmental, and other quality-of-life issues. I describe two community-based collaborative action research studies that documented and challenged how local television newscasts underrepresented and misrepresented three communities of color in Boston. The linkage between communication rights and campaigns to address quality-of-life issues is presented, as well as unresolved challenges in the collaborative research process. The study has implications for environmental health campaigns.
Using Internet Audio to Enhance Online Accessibility
ERIC Educational Resources Information Center
Schwartz, Linda Matula
2004-01-01
Accessibility to online education programs is an important factor that requires continued research, improvement, and regulation. Particularly valuable in the enhancement of online accessibility is the Voice-over Internet Protocol (VOIP) medium. VOIP compresses analog voice data and converts it into digital packets for transmission over the…
Stuyt, Elizabeth B; Voyles, Claudia A; Bursac, Sara
2018-02-07
Background: The National Acupuncture Detoxification Association (NADA) protocol, a simple standardized auricular treatment has the potential to provide vast public health relief on issues currently challenging our world. This includes but is not limited to addiction, such as the opioid epidemic, but also encompasses mental health, trauma, PTSD, chronic stress, and the symptoms associated with these conditions. Simple accessible tools that improve outcomes can make profound differences. We assert that the NADA protocol can have greatest impact when broadly applied by behavioral health professionals, Auricular Detoxification Specialists (ADSes). Methods: The concept of ADS is described and how current laws vary from state to state. Using available national data, a survey of practitioners in three selected states with vastly different laws regarding ADSes, and interviews of publicly funded programs which are successfully incorporating the NADA protocol, we consider possible effects of ADS-friendly conditions. Results: Data presented supports the idea that conditions conducive to ADS practice lead to greater implementation. Program interviews reflect settings in which adding ADSes can in turn lead to improved outcomes. Discussion: The primary purpose of non-acupuncturist ADSes is to expand the access of this simple but effective treatment to all who are suffering from addictions, stress, or trauma and to allow programs to incorporate acupuncture in the form of the NADA protocol at minimal cost, when and where it is needed. States that have changed laws to allow ADS practice for this standardized ear acupuncture protocol have seen increased access to this treatment, benefiting both patients and the programs.
Lee, Suh-Young; Yang, Min Suk; Choi, Young-Hoon; Park, Chang Min; Park, Heung-Woo; Cho, Sang Heon; Kang, Hye-Ryun
2017-03-01
Although the severity of hypersensitivity reactions to iodinated contrast media varies, it is well correlated with the severity of recurrent reactions; however, prophylaxis protocols are not severity-stratified. To assess the outcomes of tailored prophylaxis according to the severity of hypersensitivity reactions to iodinated contrast media. Our premedication protocols were stratified based on the severity of previous reactions: (1) 4 mg of chlorpheniramine for mild reactions, (2) adding 40 mg of methylprednisolone for moderate reactions, and (3) adding multiple doses of 40 mg of methylprednisolone for severe index reactions. Cases of reexposure in patients with a history of hypersensitivity reactions were routinely monitored and mandatorily recorded. Among a total of 850 patients who underwent enhanced computed tomography after severity-tailored prophylaxis, breakthrough reactions occurred in 17.1%, but most breakthrough reactions (89.0%) were mild and did not require medical treatment. Additional corticosteroid use did not reduce the breakthrough reaction rate in cases with a mild index reaction (16.8% vs 17.2%, P = .70). However, underpremedication with a single dose of corticosteroid revealed significantly higher rates of breakthrough reaction than did double doses of corticosteroid in cases with a severe index reaction (55.6% vs 17.4%, P = .02). Changing the iodinated contrast media resulted in an additional reduction of the breakthrough reaction rate overall (14.9% vs 32.1%, P = .001). In a total severity-based stratified prophylaxis regimens and changing iodinated contrast media can be considered in patients with a history of previous hypersensitivity reaction to iodinated contrast media to reduce the risk of breakthrough reactions. Copyright © 2016 American College of Allergy, Asthma & Immunology. Published by Elsevier Inc. All rights reserved.
Protocol dependence of mechanical properties in granular systems.
Inagaki, S; Otsuki, M; Sasa, S
2011-11-01
We study the protocol dependence of the mechanical properties of granular media by means of computer simulations. We control a protocol of realizing disk packings in a systematic manner. In 2D, by keeping material properties of the constituents identical, we carry out compaction with various strain rates. The disk packings exhibit the strain rate dependence of the critical packing fraction above which the pressure becomes non-zero. The observed behavior contrasts with the well-studied jamming transitions for frictionless disk packings. We also observe that the elastic moduli of the disk packings depend on the strain rate logarithmically. Our results suggest that there exists a time-dependent state variable to describe macroscopic material properties of disk packings, which depend on its protocol.
Comparative recovery of uninjured and heat-injured Listeria monocytogenes cells from bovine milk.
Crawford, R G; Beliveau, C M; Peeler, J T; Donnelly, C W; Bunning, V K
1989-01-01
The standard selective enrichment protocols of the Food and Drug Administration (FDA) and U.S. Department of Agriculture (USDA) were compared with an experimental nonselective broth enrichment (NSB) protocol and variations of the standard cold-enrichment (CE) protocol for the recovery of heat-injured Listeria monocytogenes. Bacterial cells (10(7)/ml) were suspended in sterile milk and heated at 71.7 degrees C in a slug-flow heat exchanger for holding times ranging from 1 to 30 s. Surviving cells were determined (50% endpoint) by the given protocols, and the following D values were obtained: NSB, D = 2.0 +/- 0.5 s; FDA, D = 1.4 +/- 0.3 s; USDA, D = 0.6 +/- 0.2 s; CE, D less than or equal to 1.2 s. The respective direct-plating media used in these enrichments were also analyzed for recovery, and the following D values were calculated from the enumeration of surviving cells; NSB, D = 2.7 +/- 0.8 s; FDA, D = 1.3 +/- 0.4 s; USDA, D = 0.7 +/- 0.2 s. The low levels of heat-injured L. monocytogenes cells which were detected at inactivation endpoints on the optimal nonselective media (25 degrees C for 7 days) failed to recover and multiply during experimental CEs (4 degrees C for 28 days). Initial inactivation experiments in which raw whole milk was used as the heating menstruum gave much lower recoveries with all protocols. The detectable limits for uninjured cells that were suspended in raw milk were similar (0.35 to 3.2 cells per ml) for the standard CE, FDA, and USDA protocols.(ABSTRACT TRUNCATED AT 250 WORDS) PMID:2504109
Boehm, Markus; Wu, Tong-Ying; Claussen, Holger; Lemmen, Christian
2008-04-24
Large collections of combinatorial libraries are an integral element in today's pharmaceutical industry. It is of great interest to perform similarity searches against all virtual compounds that are synthetically accessible by any such library. Here we describe the successful application of a new software tool CoLibri on 358 combinatorial libraries based on validated reaction protocols to create a single chemistry space containing over 10 (12) possible products. Similarity searching with FTrees-FS allows the systematic exploration of this space without the need to enumerate all product structures. The search result is a set of virtual hits which are synthetically accessible by one or more of the existing reaction protocols. Grouping these virtual hits by their synthetic protocols allows the rapid design and synthesis of multiple follow-up libraries. Such library ideas support hit-to-lead design efforts for tasks like follow-up from high-throughput screening hits or scaffold hopping from one hit to another attractive series.
Geospatial Brokering - Challenges and Future Directions
NASA Astrophysics Data System (ADS)
White, C. E.
2012-12-01
An important feature of many brokers is to facilitate straightforward human access to scientific data while maintaining programmatic access to it for system solutions. Standards-based protocols are critical for this, and there are a number of protocols to choose from. In this discussion, we will present a web application solution that leverages certain protocols - e.g., OGC CSW, REST, and OpenSearch - to provide programmatic as well as human access to geospatial resources. We will also discuss managing resources to reduce duplication yet increase discoverability, federated search solutions, and architectures that combine human-friendly interfaces with powerful underlying data management. The changing requirements witnessed in brokering solutions over time, our recent experience participating in the EarthCube brokering hack-a-thon, and evolving interoperability standards provide insight to future technological and philosophical directions planned for geospatial broker solutions. There has been much change over the past decade, but with the unprecedented data collaboration of recent years, in many ways the challenges and opportunities are just beginning.
Accessible solitons of fractional dimension
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhong, Wei-Ping, E-mail: zhongwp6@126.com; Texas A&M University at Qatar, P.O. Box 23874, Doha; Belić, Milivoj
We demonstrate that accessible solitons described by an extended Schrödinger equation with the Laplacian of fractional dimension can exist in strongly nonlocal nonlinear media. The soliton solutions of the model are constructed by two special functions, the associated Legendre polynomials and the Laguerre polynomials in the fraction-dimensional space. Our results show that these fractional accessible solitons form a soliton family which includes crescent solitons, and asymmetric single-layer and multi-layer necklace solitons. -- Highlights: •Analytic solutions of a fractional Schrödinger equation are obtained. •The solutions are produced by means of self-similar method applied to the fractional Schrödinger equation with parabolic potential.more » •The fractional accessible solitons form crescent, asymmetric single-layer and multilayer necklace profiles. •The model applies to the propagation of optical pulses in strongly nonlocal nonlinear media.« less
Calvert, Melanie; Kyte, Derek; Duffy, Helen; Gheorghe, Adrian; Mercieca-Bebber, Rebecca; Ives, Jonathan; Draper, Heather; Brundage, Michael; Blazeby, Jane; King, Madeleine
2014-01-01
Background Evidence suggests there are inconsistencies in patient-reported outcome (PRO) assessment and reporting in clinical trials, which may limit the use of these data to inform patient care. For trials with a PRO endpoint, routine inclusion of key PRO information in the protocol may help improve trial conduct and the reporting and appraisal of PRO results; however, it is currently unclear exactly what PRO-specific information should be included. The aim of this review was to summarize the current PRO-specific guidance for clinical trial protocol developers. Methods and Findings We searched the MEDLINE, EMBASE, CINHAL and Cochrane Library databases (inception to February 2013) for PRO-specific guidance regarding trial protocol development. Further guidance documents were identified via Google, Google scholar, requests to members of the UK Clinical Research Collaboration registered clinical trials units and international experts. Two independent investigators undertook title/abstract screening, full text review and data extraction, with a third involved in the event of disagreement. 21,175 citations were screened and 54 met the inclusion criteria. Guidance documents were difficult to access: electronic database searches identified just 8 documents, with the remaining 46 sourced elsewhere (5 from citation tracking, 27 from hand searching, 7 from the grey literature review and 7 from experts). 162 unique PRO-specific protocol recommendations were extracted from included documents. A further 10 PRO recommendations were identified relating to supporting trial documentation. Only 5/162 (3%) recommendations appeared in ≥50% of guidance documents reviewed, indicating a lack of consistency. Conclusions PRO-specific protocol guidelines were difficult to access, lacked consistency and may be challenging to implement in practice. There is a need to develop easily accessible consensus-driven PRO protocol guidance. Guidance should be aimed at ensuring key PRO information is routinely included in appropriate trial protocols, in order to facilitate rigorous collection/reporting of PRO data, to effectively inform patient care. PMID:25333995
Strategies for Optimal MAC Parameters Tuning in IEEE 802.15.6 Wearable Wireless Sensor Networks.
Alam, Muhammad Mahtab; Ben Hamida, Elyes
2015-09-01
Wireless body area networks (WBAN) has penetrated immensely in revolutionizing the classical heath-care system. Recently, number of WBAN applications has emerged which introduce potential limits to existing solutions. In particular, IEEE 802.15.6 standard has provided great flexibility, provisions and capabilities to deal emerging applications. In this paper, we investigate the application-specific throughput analysis by fine-tuning the physical (PHY) and medium access control (MAC) parameters of the IEEE 802.15.6 standard. Based on PHY characterizations in narrow band, at the MAC layer, carrier sense multiple access collision avoidance (CSMA/CA) and scheduled access protocols are extensively analyzed. It is concluded that, IEEE 802.15.6 standard can satisfy most of the WBANs applications throughput requirements by maximum achieving 680 Kbps. However, those emerging applications which require high quality audio or video transmissions, standard is not able to meet their constraints. Moreover, delay, energy efficiency and successful packet reception are considered as key performance metrics for comparing the MAC protocols. CSMA/CA protocol provides the best results to meet the delay constraints of medical and non-medical WBAN applications. Whereas, the scheduled access approach, performs very well both in energy efficiency and packet reception ratio.
ERIC Educational Resources Information Center
Nieuwenhuysen, Paul
1997-01-01
Explores data transfer speeds obtained with various combinations of hardware and software components through a study of access to the Internet from a notebook computer connected to a local area network based on Ethernet and TCP/IP (transmission control protocol/Internet protocol) network protocols. Upgrading is recommended for higher transfer…
Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks.
Chen, Young-Long; Liau, Ren-Hau; Chang, Liang-Yu
2016-01-01
People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communication channel. The content of the message number is not considered in a multiple secure authentication protocol. The more excessive transmission of messages would be easier to collect and decode by hackers. In this paper, we propose two schemes which allow the server to validate the user and reduce the number of messages using the XOR operation. Our schemes can improve the security of the authentication protocol. The experimental results show that our proposed authentication protocols are more secure and effective. In regard to applications of second authentication communication channels for a smart access control system, identity identification and E-wallet, our proposed authentication protocols can ensure the safety of person and property, and achieve more effective security management mechanisms.
Questioning reliability assessments of health information on social media.
Dalmer, Nicole K
2017-01-01
This narrative review examines assessments of the reliability of online health information retrieved through social media to ascertain whether health information accessed or disseminated through social media should be evaluated differently than other online health information. Several medical, library and information science, and interdisciplinary databases were searched using terms relating to social media, reliability, and health information. While social media's increasing role in health information consumption is recognized, studies are dominated by investigations of traditional (i.e., non-social media) sites. To more richly assess constructions of reliability when using social media for health information, future research must focus on health consumers' unique contexts, virtual relationships, and degrees of trust within their social networks.
Potential of social media as a tool to combat foodborne illness.
Chapman, Benjamin; Raymond, Benjamin; Powell, Douglas
2014-07-01
The use of social media platforms, such as Facebook and Twitter, has been increasing substantially in recent years and has affected the way that people access information online. Social media rely on high levels of interaction and user-generated context shared through established and evolving social networks. Health information providers must know how to successfully participate through social media in order to meet the needs of these online audiences. This article reviews the current research on the use of social media for public health communication and suggests potential frameworks for developing social media strategies. The extension to food safety risk communication is explored, considering the potential of social media as a tool to combat foodborne illness.
21 CFR 1311.130 - Requirements for establishing logical access control-Institutional practitioner.
Code of Federal Regulations, 2010 CFR
2010-04-01
... practitioner's hard token or any other authentication factor required by the practitioner's two-factor authentication protocol is lost, stolen, or compromised. Such access must be terminated immediately upon...
NASA Astrophysics Data System (ADS)
Macfarlane, A. J.; Docasal, R.; Rios, C.; Barbarisi, I.; Saiz, J.; Vallejo, F.; Besse, S.; Arviset, C.; Barthelemy, M.; De Marchi, G.; Fraga, D.; Grotheer, E.; Heather, D.; Lim, T.; Martinez, S.; Vallat, C.
2018-01-01
The Planetary Science Archive (PSA) is the European Space Agency's (ESA) repository of science data from all planetary science and exploration missions. The PSA provides access to scientific data sets through various interfaces at http://psa.esa.int. Mostly driven by the evolution of the PDS standards which all new ESA planetary missions shall follow and the need to update the interfaces to the archive, the PSA has undergone an important re-engineering. In order to maximise the scientific exploitation of ESA's planetary data holdings, significant improvements have been made by utilising the latest technologies and implementing widely recognised open standards. To facilitate users in handling and visualising the many products stored in the archive which have spatial data associated, the new PSA supports Geographical Information Systems (GIS) by implementing the standards approved by the Open Geospatial Consortium (OGC). The modernised PSA also attempts to increase interoperability with the international community by implementing recognised planetary science specific protocols such as the PDAP (Planetary Data Access Protocol) and EPN-TAP (EuroPlanet-Table Access Protocol). In this paper we describe some of the methods by which the archive may be accessed and present the challenges that are being faced in consolidating data sets of the older PDS3 version of the standards with the new PDS4 deliveries into a single data model mapping to ensure transparent access to the data for users and services whilst maintaining a high performance.
OAS :: Secretariat for Strengthening Democracy (SSD)
Structure Our Locations Contact Us Access to Information Offices in the Member States Our History Logo Authorities Services Legal Protocol Topics A Access to Information Access to Rights Actions against Corruption Management Public Security R Racism and Intolerance Refugees S Scholarships School of Governance Science and
The Many Faces of the Economic Bulletin Board.
ERIC Educational Resources Information Center
Boettcher, Jennifer
1996-01-01
The Economic Bulletin Board (EBB), a one-stop site for economic statistics and government-sponsored business information, can be accessed on the World Wide Web, gopher, telnet, file transfer protocol, dial-up, and fax. Each access method has advantages and disadvantages related to connections, pricing, depth of access, retrieval, and system…
Bousquet, Cedric; Dahamna, Badisse; Guillemin-Lanne, Sylvie; Darmoni, Stefan J; Faviez, Carole; Huot, Charles; Katsahian, Sandrine; Leroux, Vincent; Pereira, Suzanne; Richard, Christophe; Schück, Stéphane; Souvignet, Julien; Lillo-Le Louët, Agnès; Texier, Nathalie
2017-09-21
Adverse drug reactions (ADRs) are an important cause of morbidity and mortality. Classical Pharmacovigilance process is limited by underreporting which justifies the current interest in new knowledge sources such as social media. The Adverse Drug Reactions from Patient Reports in Social Media (ADR-PRISM) project aims to extract ADRs reported by patients in these media. We identified 5 major challenges to overcome to operationalize the analysis of patient posts: (1) variable quality of information on social media, (2) guarantee of data privacy, (3) response to pharmacovigilance expert expectations, (4) identification of relevant information within Web pages, and (5) robust and evolutive architecture. This article aims to describe the current state of advancement of the ADR-PRISM project by focusing on the solutions we have chosen to address these 5 major challenges. In this article, we propose methods and describe the advancement of this project on several aspects: (1) a quality driven approach for selecting relevant social media for the extraction of knowledge on potential ADRs, (2) an assessment of ethical issues and French regulation for the analysis of data on social media, (3) an analysis of pharmacovigilance expert requirements when reviewing patient posts on the Internet, (4) an extraction method based on natural language processing, pattern based matching, and selection of relevant medical concepts in reference terminologies, and (5) specifications of a component-based architecture for the monitoring system. Considering the 5 major challenges, we (1) selected a set of 21 validated criteria for selecting social media to support the extraction of potential ADRs, (2) proposed solutions to guarantee data privacy of patients posting on Internet, (3) took into account pharmacovigilance expert requirements with use case diagrams and scenarios, (4) built domain-specific knowledge resources embeding a lexicon, morphological rules, context rules, semantic rules, syntactic rules, and post-analysis processing, and (5) proposed a component-based architecture that allows storage of big data and accessibility to third-party applications through Web services. We demonstrated the feasibility of implementing a component-based architecture that allows collection of patient posts on the Internet, near real-time processing of those posts including annotation, and storage in big data structures. In the next steps, we will evaluate the posts identified by the system in social media to clarify the interest and relevance of such approach to improve conventional pharmacovigilance processes based on spontaneous reporting. ©Cedric Bousquet, Badisse Dahamna, Sylvie Guillemin-Lanne, Stefan J Darmoni, Carole Faviez, Charles Huot, Sandrine Katsahian, Vincent Leroux, Suzanne Pereira, Christophe Richard, Stéphane Schück, Julien Souvignet, Agnès Lillo-Le Louët, Nathalie Texier. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 21.09.2017.
Method 1200: Analytical Protocol for Non-Typhoidal Salmonella in Drinking Water and Surface Water
Method 1200 is used for identification, confirmation and quantitation of non-typhoidal Salmonella in water samples, using selective and non-selective media followed by biochemical and serological confirmation.
Improved osteochondral allograft preservation using serum-free media at body temperature.
Garrity, Joseph T; Stoker, Aaron M; Sims, Hannah J; Cook, James L
2012-11-01
Osteochondral allografts (OCAs) are currently preserved at 4°C and used within 28 days of donor harvest. The window of opportunity for implantation is limited to 14 days due to a 2-week disease testing protocol. Osteochondral allograft tissues stored at 37°C will have significantly higher chondrocyte viability, as well as superior biochemical and biomechanical properties, than those stored at 4°C. Controlled laboratory study. Osteochondral allografts from 15 adult canine cadavers were aseptically harvested within 4 hours of death. Medial and lateral femoral condyles were stored in Media 1, similar to the current standard, or Media 2, an anti-inflammatory and chondrogenic media containing dexamethasone and transforming growth factor-β3, at 4°C or 37°C for up to 56 days. Chondrocyte viability, glycosaminoglycan (GAG) and collagen (hydroxyproline [HP]) content, biomechanical properties, and collagen II and aggrecan content were assessed at days 28 and 56. Five femoral condyles were stored overnight and assessed the next day to serve as controls. Storage in Media 1 at 37°C maintained chondrocyte viability at significantly higher levels than in any other media-temperature combination and at levels not significantly different from controls. Osteochondral allografts stored in either media at 4°C showed a significant decrease in chondrocyte viability throughout storage. Glycosaminoglycan and HP content were maintained through 56 days of storage in OCAs in Media 1 at 37°C. There were no significant differences in elastic or dynamic moduli among groups at day 56. Qualitative immunohistochemistry demonstrated the presence of collagen II and aggrecan throughout all layers of cartilage. Osteochondral allograft viability, matrix content and composition, and biomechanical properties were maintained at "fresh" levels through 56 days of storage in Media 1 at 37°C. Osteochondral allografts stored at 4°C were unable to maintain viability or matrix integrity through 28 days of storage. These findings suggest that storage of OCAs in a defined media at 37°C is superior to current protocols (4°C) for tissue preservation prior to transplantation. Storage of OCAs in serum-free chemically defined media at 37°C can increase the "window of opportunity" for implantation of optimal tissue from 14 days to 42 days after disease testing clearance.
An Efficient and QoS Supported Multichannel MAC Protocol for Vehicular Ad Hoc Networks
Tan, Guozhen; Yu, Chao
2017-01-01
Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety (transport efficiency and infotainment) applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. Different types of applications require different levels Quality-of-Service (QoS) support. Recently, transport efficiency and infotainment applications (e.g., electronic map download and Internet access) have received more and more attention, and this kind of applications is expected to become a big market driver in a near future. In this paper, we propose an Efficient and QoS supported Multichannel Medium Access Control (EQM-MAC) protocol for VANETs in a highway environment. The EQM-MAC protocol utilizes the service channel resources for non-safety message transmissions during the whole synchronization interval, and it dynamically adjusts minimum contention window size for different non-safety services according to the traffic conditions. Theoretical model analysis and extensive simulation results show that the EQM-MAC protocol can support QoS services, while ensuring the high saturation throughput and low transmission delay for non-safety applications. PMID:28991217
Pagoto, Sherry L; Baker, Katie; Griffith, Julia; Oleski, Jessica L; Palumbo, Ashley; Walkosz, Barbara J; Hillhouse, Joel; Henry, Kimberly L; Buller, David B
2016-11-29
Indoor tanning elevates the risk for melanoma, which is now the most common cancer in US women aged 25-29. Public policies restricting access to indoor tanning by minors to reduce melanoma morbidity and mortality in teens are emerging. In the United States, the most common policy restricting indoor tanning in minors involves parents providing either written or in person consent for the minor to purchase a tanning visit. The effectiveness of this policy relies on parents being properly educated about the harms of indoor tanning to their children. This randomized controlled trial will test the efficacy of a Facebook-delivered health communication intervention targeting mothers of teenage girls. The intervention will use health communication and behavioral modification strategies to reduce mothers' permissiveness regarding their teenage daughters' use of indoor tanning relative to an attention-control condition with the ultimate goal of reducing indoor tanning in both daughters and mothers. The study is a 12-month randomized controlled trial comparing 2 conditions: an attention control Facebook private group where content will be relevant to teen health with 25% focused on prescription drug abuse, a topic unrelated to tanning; and the intervention condition will enter participants into a Facebook private group where 25% of the teen health content will be focused on indoor tanning. A cohort of 2000 mother-teen daughter dyads will be recruited to participate in this study. Only mothers will participate in the Facebook groups. Both mothers and daughters will complete measures at baseline, end of intervention (1-year) and 6 months post-intervention. Primary outcomes include mothers' permissiveness regarding their teenage daughters' use of indoor tanning, teenage daughters' perception of their mothers' permissiveness, and indoor tanning by both mothers and daughters. The first dyad was enrolled on March 31, 2016, and we anticipate completing this study by October 2019. This trial will deliver social media content grounded in theory and will test it in a randomized design with state-of-the-art measures. This will contribute much needed insights on how to employ social media for health behavior change and disease prevention both for indoor tanning and other health risk behaviors and inform future social media efforts by public health and health care organizations. Clinicaltrials.gov NCT02835807; https://clinicaltrials.gov/ct2/show/NCT02835807 (Archived by WebCite at http://www.webcitation.org/6mDMICcCE). ©Sherry L Pagoto, Katie Baker, Julia Griffith, Jessica L Oleski, Ashley Palumbo, Barbara J Walkosz, Joel Hillhouse, Kimberly L Henry, David B Buller. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 29.11.2016.
Naslund, John A; Aschbrenner, Kelly A; McHugo, Gregory J; Unützer, Jürgen; Marsch, Lisa A; Bartels, Stephen J
2017-10-20
Social media holds promise for expanding the reach of mental health services, especially for young people who frequently use these popular platforms. We surveyed social media users who self-identified as having a mental illness to learn about their use of social media for mental health and to identify opportunities to augment existing mental health services. We asked 240 Twitter users who self-identified in their profile as having a mental illness to participate in an online survey. The survey was in English and inquired about participants' mental health condition, use of social media for mental health and interest in accessing mental health programs delivered through social media. Respondents from 10 countries completed 135 surveys. Most respondents were from the United States (54%), Canada (22%) and the United Kingdom (17%) and reported a psychiatric diagnosis of either schizophrenia spectrum disorder (27%), bipolar disorder (25%), major depressive disorder (16%) or depression (20%). Young adults age ≤35 (46%) were more likely to use Instagram (P = .002), Snapchat (P < .001) and their mobile phone for accessing social media (P < .001) compared to adults age 36 and older (53%). Most participants (85%) expressed interest in mental health programs delivered through social media, especially to promote overall health and wellbeing (72%) and for coping with mental health symptoms (90%). This exploratory study demonstrates the feasibility of reaching social media users with mental illness and can inform efforts to leverage social media to make evidence-based mental health services more widely available to those in need. © 2017 John Wiley & Sons Australia, Ltd.
ERIC Educational Resources Information Center
Gruzd, Anatoliy; Paulin, Drew; Haythornthwaite, Caroline
2016-01-01
In just a short period, social media have altered many aspects of our daily lives, from how we form and maintain social relationships to how we discover, access, and share information online. Now social media are also affecting how we teach and learn. In this paper, we discuss methods that can help researchers and educators evaluate and understand…
ERIC Educational Resources Information Center
Hallaq, Thomas G.
2013-01-01
While new technology continues to develop and become increasingly affordable, and students have increased access to electronic media, one might wonder if requiring such technology in the classroom is akin to throwing the car keys to a teen-ager who has not completed a driver's education course. Currently, no validated survey has been created…
ERIC Educational Resources Information Center
Hallaq, Tom
2016-01-01
While new technology continues to develop and become increasingly affordable, and students have increased access to digital media, one might wonder if requiring such technology in the classroom is akin to throwing the car keys to a teenager who has not completed a driver's education course. The purpose of this study was to develop a valid and…
Fleischmann, Ulrike; Pietsch, Hubertus; Korporaal, Johannes G; Flohr, Thomas G; Uder, Michael; Jost, Gregor; Lell, Michael M
2018-05-01
Low peak kilovoltage (kVp) protocols in computed tomography angiography (CTA) demand a review of contrast media (CM) administration practices. The aim of this study was to systematically evaluate different iodine concentrations of CM in a porcine model. Dynamic 70 kVp CTA was performed on 7 pigs using a third-generation dual-source CT system. Three CM injection protocols (A-C) with an identical total iodine dose and iodine delivery rate (150 mg I/kg, 12 s, 0.75 g I/s) differed in iodine concentration and flow rate (protocol A: 400 mg I/mL, 1.9 mL/s; B: 300 mg I/mL, 2.5 mL/s; C: 150 mg I/mL, 5 mL/s). All protocols were applied in a randomized order and compared intraindividually. Arterial enhancement at different locations in the pulmonary artery, the aorta, and aortic branches was measured over time. Time attenuation curves, peak enhancement, time to peak, and bolus tracking delay times needed for static CTA were calculated. The reproducibility of optimal parameters was tested in single-phase CTA. The heart rates of the pigs were comparable for all protocols (P > 0.7). The injection pressure was significantly higher for protocol A (64 ± 5 psi) and protocol C (55 ± 3 psi) compared with protocol B (39 ± 2 psi) (P < 0.001). Average arterial peak enhancement in the dynamic scans was 359 ± 51 HU (protocol A), 382 ± 36 HU (B), and 382 ± 60 HU (C) (A compared with B and C: P < 0.01; B compared with C: P = 0.995). Time to peak enhancement decreased with increasing injection rate. The delay time for bolus tracking depended on the injection rate as well and was highest for protocol A (4.7 seconds) and lowest for protocol C (3.9 seconds) (P = 0.038). The peak enhancement values of the dynamic scans highly correlated with those of the single-phase CTA scans. In 70 kVp CTA, 300 mg I/mL iodine concentrations showed to be superior to high-concentration CM when keeping the iodine delivery rate constant. Besides, iodine concentrations as low as 150 mg I/mL can be administered without compromising vascular enhancement. This opens up new possibilities in CM administration.
Lupton, Deborah
2016-07-19
Many women in countries in the global North access digital media information sources during pregnancy and the early years of motherhood. These include websites, blogs, online discussion forums, apps and social media platforms. Little previous research has sought to investigate in detail how women use the diverse range of digital media now available to them and what types of information they value. A qualitative study using focus groups was conducted to address these issues. Four focus groups were held in Sydney, Australia, including a total of 36 women who were either pregnant or had given birth in the previous three years. The participants were asked to talk about the types of digital media they used for pregnancy and parenting purposes, why they used them and in what ways they found them useful or helpful (or not). Group discussions were transcribed and thematically analysed, identifying the dominant information characteristics identified by women as valuable and useful. Nine characteristics emerged from the focus group discussions as most important to women: information that was: 1) immediate; 2) regular; 3) detailed; 4) entertaining; 5) customised; 6) practical; 7) professional; 8) reassuring; and 9) unbiased. These characteristics were valued for different purposes and needs. Digital media provided women with details when they most needed them or at times when they had opportunities to access them. The study showed that women value apps or digital platforms that are multi-functional. The findings revealed the importance of using digital information for establishing and maintaining social connections and intimate relationships with other mothers. However, participants also highly valued expert advice and expressed the desire for greater and more ready access to information and support offered by healthcare professionals. Pregnant women and those with young children place a high value on the information and support they receive from and sharing using online sources and apps. They are accustomed to ready and immediate access to information using digital technologies and want better access to that offered by professionals. Recognising and finding ways to meet these needs should be included in planning healthcare provision and support for this group. Further research with women from socioeconomically disadvantaged backgrounds and non-urban locations is required to identify whether they have different information needs and values from the women who were included in the study reported here.
Osteogenic differentiation of immature osteoblasts: Interplay of cell culture media and supplements.
Brauer, A; Pohlemann, T; Metzger, W
2016-01-01
Differentiation of immature osteoblasts to mature osteoblasts in vitro initially was induced by supplementing the medium with β-gylcerophosphate and dexamethasone. Later, ascorbic acid, vitamin D3, vitamin K3 and TGFβ1 were used in varying concentrations as supplements to generate a mature osteoblast phenotype. We tested the effects of several combinations of cell culture media, seeding protocols and osteogenic supplements on osteogenic differentiation of human primary osteoblasts. Osteogenic differentiation was analyzed by staining alkaline phosphatase (ALP) with 5-bromo-4-chloro-3-indolyl-phosphate/nitro blue tetrazolium (BCIP/NBT) and by von Kossa staining of deposited calcium phosphate. The combinations of culture media and supplements significantly influenced osteogenic differentiation, but the seeding protocol did not. Staining of ALP and calcium phosphate could be achieved only if our own mix of osteogenic supplements was used in combination with Dulbecco's modified Eagle medium or if a commercial mix of osteogenic supplements was used in combination with osteoblast growth medium. Especially for von Kossa, we observed great variations in the staining intensity. Because osteogenic differentiation is a complex process, the origin of the osteoblasts, cell culture media and osteogenic supplements should be established by preliminary experiments to achieve optimal differentiation. Staining of ALP or deposited calcium phosphate should be supplemented with qRT-PCR studies to learn more about the influence of specific supplements on osteogenic markers.
NASA Astrophysics Data System (ADS)
Tsuchida, Akihiro; Shimamura, Takeshi; Sawada, Seiya; Sato, Susumu; Serpone, Nick; Horikoshi, Satoshi
2018-06-01
A microwave-inspired device that generates stable in-liquid plasma (LP) in aqueous media and emits narrow light emission lines at 280-320 nm, 660 nm and 780 nm is examined as a light source capable of driving photochemical reactions and advanced oxidation processes in wastewater treatments. The microwave-driven lighting efficiency was improved by decompressing the inside of the reaction vessel, which resulted in lowering the incident power of the microwaves and suppressed the deterioration of the microwave irradiation antenna. This protocol made it possible to generate continuous stable plasma in water. Evaluation of the LP device was carried out by revisiting the decomposition of 1,4-dioxane in aqueous media against the use of such other conventional water treatment processes as (i) UV irradiation alone, (ii) TiO2-assisted photocatalysis with UV irradiation (UV/TiO2), (iii) oxidation with sodium hypochlorite (NaClO), and (iv) UV-assisted decomposition in the presence of NaClO (UV/NaClO). The in-liquid plasma technique proved superior to these four other methods. The influence of pH on the LP protocol was ascertained through experiments in acidified (HCl and H2SO4) and alkaline (NaOH and KOH) aqueous media. Except for H2SO4, decomposition of 1,4-dioxane was enhanced in both acidic and alkaline media.
Viviani, R; Fischer, J; Spitzer, M; Freudenmann, R W
2004-04-01
We present a security protocol for the exchange of medical data via the Internet, based on the type/domain model. We discuss two applications of the protocol: in a system for the exchange of data for quality assurance, and in an on-line database of adverse reactions to drug use. We state that a type/domain security protocol can successfully comply with the complex requirements for data privacy and accessibility typical of such applications.
Becker, Joshua; Babb, James; Serrano, Manuel
2013-04-01
The purpose of this study was to use measured glomerular filtration rate (GFR), the reference standard of renal function, to assess the deleterious effect of iodinated contrast media on renal function. Such an effect has been traditionally defined as a greater than 0.5-mg/dL increase in serum creatinine concentration or a 25% or greater increase 24-72 hours after the injection of iodinated contrast medium. This pilot investigation was focused on the consequences of clinically indicated IV injection of iodinated contrast media; intraarterial injection was excluded. One hundred thirteen patients with normal serum creatinine concentrations were enrolled in an approved protocol. At random, as chosen by one of the investigators, patients underwent imaging with one of three monomeric agents (iopamidol 300, iopromide 300, iohexol 300) and one dimeric agent (iodixanol 320). Measured GFR was determined immediately before CT and approximately 3 and 72 hours after the contrast injection for the CT examination. Iodinated contrast medium, a glomerular filtrate with no tubular excretion or reabsorption, was the GFR marker. Measured GFR was determined by x-ray fluorescence analysis with nonisotopic iodinated contrast media. Monomeric and dimeric contrast agents in diagnostic CT volumes (based on bodyweight and imaging protocol) did not induce a significant change in measured GFR (95% confidence by Wilcoxon test), suggesting that use of the evaluated contrast media will not lead to more than a 12% variation. The three monomeric agents studied and the one dimeric agent were equivalent in terms of lack of a significant effect on measured GFR when administered to patients with a normal GFR.
Telezhkin, Vsevolod; Schnell, Christian; Yarova, Polina; Yung, Sun; Cope, Emma; Hughes, Alis; Thompson, Belinda A; Sanders, Philip; Geater, Charlene; Hancock, Jane M; Joy, Shona; Badder, Luned; Connor-Robson, Natalie; Comella, Andrea; Straccia, Marco; Bombau, Georgina; Brown, Jon T; Canals, Josep M; Randall, Andrew D; Allen, Nicholas D; Kemp, Paul J
2016-04-01
Although numerous protocols have been developed for differentiation of neurons from a variety of pluripotent stem cells, most have concentrated on being able to specify effectively appropriate neuronal subtypes and few have been designed to enhance or accelerate functional maturity. Of those that have, most employ time courses of functional maturation that are rather protracted, and none have fully characterized all aspects of neuronal function, from spontaneous action potential generation through to postsynaptic receptor maturation. Here, we describe a simple protocol that employs the sequential addition of just two supplemented media that have been formulated to separate the two key phases of neural differentiation, the neurogenesis and synaptogenesis, each characterized by different signaling requirements. Employing these media, this new protocol synchronized neurogenesis and enhanced the rate of maturation of pluripotent stem cell-derived neural precursors. Neurons differentiated using this protocol exhibited large cell capacitance with relatively hyperpolarized resting membrane potentials; moreover, they exhibited augmented: 1) spontaneous electrical activity; 2) regenerative induced action potential train activity; 3) Na(+) current availability, and 4) synaptic currents. This was accomplished by rapid and uniform development of a mature, inhibitory GABAAreceptor phenotype that was demonstrated by Ca(2+) imaging and the ability of GABAAreceptor blockers to evoke seizurogenic network activity in multielectrode array recordings. Furthermore, since this protocol can exploit expanded and frozen prepatterned neural progenitors to deliver mature neurons within 21 days, it is both scalable and transferable to high-throughput platforms for the use in functional screens. Copyright © 2016 the American Physiological Society.
Information campaign and advocacy efforts to promote access to emergency contraception in Mexico.
Ellertson, Charlotte; Heimburger, Angela; Acevedo-Garcia, Dolores; Schiavon, Raffaela; Mejia, Guillermina; Corona, Georgina; del Castillo, Eduardo; Langer, Ana
2002-11-01
Emergency contraception (EC) has the potential to reduce unwanted pregnancy significantly, in Mexico as elsewhere. Recent years have seen tremendous growth in programs and research devoted to expanding access to emergency methods worldwide. In Mexico we developed a comprehensive model introduction effort that included four components: provider training, public information (through a dedicated hotline and website, free media, paid radio and TV spots, participation in talk shows, and alternative media channels), collaboration with the public sector to include EC in the official family planning norms, and assistance to partner with commercial firms to register a dedicated EC product. Ongoing efforts to combat misperceptions and overcome opposition are crucial to informing the public and ensuring greater access to the method.
Distribution of Information in Ad Hoc Networks
2007-09-01
2.4. MACA Protocol...................................20 Figure 2.5. Route discovery in AODV (From [32]).............28 Figure 2.6. Creation of a...19 Figure 2.3. Exposed terminal Problem (From [20]) (3) MACA and MACAW Protocols. One of the first protocols conceived for wireless local area...networks is MACA [21] (Multiple Accesses with Collision Avoidance). The transmitter sends a small packet, or RTS (Request To Send), which has little
Receiver Statistics for Cognitive Radios in Dynamic Spectrum Access Networks
2012-02-28
SNR) are employed by many protocols and processes in direct-sequence ( DS ) spread-spectrum packet radio networks, including soft-decision decoding...adaptive modulation protocols, and power adjustment protocols. For DS spread spectrum, we have introduced and evaluated SNR estimators that employ...obtained during demodulation in a binary CDMA receiver. We investigated several methods to apply the proposed metric to the demodulator’s soft-decision
NASA Astrophysics Data System (ADS)
Watson, Clifton L.; Biswas, Subir
2014-06-01
With an increasing demand for spectrum, dynamic spectrum access (DSA) has been proposed as viable means for providing the flexibility and greater access to spectrum necessary to meet this demand. Within the DSA concept, unlicensed secondary users temporarily "borrow" or access licensed spectrum, while respecting the licensed primary user's rights to that spectrum. As key enablers for DSA, cognitive radios (CRs) are based on software-defined radios which allow them to sense, learn, and adapt to the spectrum environment. These radios can operate independently and rapidly switch channels. Thus, the initial setup and maintenance of cognitive radio networks are dependent upon the ability of CR nodes to find each other, in a process known as rendezvous, and create a link on a common channel for the exchange of data and control information. In this paper, we propose a novel rendezvous protocol, known as QLP, which is based on Q-learning and the p-persistent CSMA protocol. With the QLP protocol, CR nodes learn which channels are best for rendezvous and thus adapt their behavior to visit those channels more frequently. We demonstrate through simulation that the QLP protocol provides a rendevous capability for DSA environments with different dynamics of PU activity, while attempting to achieve the following performance goals: (1) minimize the average time-to-rendezvous, (2) maximize system throughput, (3) minimize primary user interference, and (4) minimize collisions among CR nodes.
McCane, Aqilah M; Czachowski, Cristine L; Lapish, Christopher C
2014-09-01
Dopamine (DA) has been shown to play a central role in regulating motivated behavior and encoding reward. Chronic drug abuse elicits a state of hypodopaminergia in the mesocorticolimbic (MCL) system in both humans and preclinical rodent models of addiction, including those modeling alcohol use disorders (AUD). Working under the hypothesis that reductions in the bioavailability of DA play an integral role in the expression of the excessive drinking phenotype, the catechol-O-methyltransferase (COMT) inhibitor tolcapone was used as a means to amplify cortical DA concentration and drinking behaviors were then assessed. Sucrose and ethanol (EtOH) consumption were measured in P and Wistar rats in both a free choice drinking protocol and a novel cued access protocol. Tolcapone attenuated the consumption of EtOH, and to a lesser extent sucrose, in P rats in the cued access protocol, while no effect was observed in the free choice drinking protocol. Tolcapone also decreased EtOH consumption in high drinking Wistar rats. A follow-up experiment using the indirect DA agonist d-amphetamine showed no change in EtOH consumption. Collectively, these data suggest that COMT inhibitors may be capable of alleviating the extremely motivating or salient nature of stimuli associated with alcohol. The hypothesis is put forth that the relative specificity of tolcapone for cortical DA systems may mediate the suppression of the high seeking/drinking phenotype. Copyright © 2014 by the Research Society on Alcoholism.
Keeping Current: The Digital Divide: Can School Library Media Specialists Help Build the Bridge?
ERIC Educational Resources Information Center
Barron, Daniel D.
2000-01-01
Discusses the growth of electronic commerce as well as electronic education and suggests ways that schools and public libraries can help overcome inequity of access. Highlights include access to the Internet and computers; educational levels; Blacks; race and ethnic origin; rural access; use of the Internet; and income. (LRW)
Technology for People, Not Disabilities: Ensuring Access and Inclusion
ERIC Educational Resources Information Center
Foley, Alan; Ferri, Beth A.
2012-01-01
The potential of technology to connect people and provide access to education, commerce, employment and entertainment has never been greater or more rapidly changing. Communication technologies and new media promise to "revolutionize our lives" by breaking down barriers and expanding access for disabled people. Yet, it is also true that technology…
Change in Computer Access and the Academic Achievement of Immigrant Children
ERIC Educational Resources Information Center
Moon, Ui Jeong; Hofferth, Sandra
2018-01-01
Background/Context: Increased interest in the correlates of media devices available to children has led to research indicating that access to and use of technology are positively associated with children's academic achievement. However, the digital divide remains; not all children have access to digital technologies, and not all children can…
Characteristics of Cable Access Centers in the Top 100 Media Markets.
ERIC Educational Resources Information Center
Ledingham, John A.
A study examined cable access centers--studios established by cable television systems for the use of community groups, institutions, and individuals--in order to identify the characteristics of those used frequently. Data were gathered from 119 respondents concerning 34 access centers in major metropolitan areas in the United States. The findings…
Energy-efficient boarder node medium access control protocol for wireless sensor networks.
Razaque, Abdul; Elleithy, Khaled M
2014-03-12
This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi-synchronous feature with a low duty cycle, which is advantageous for reducing the latency and energy consumption for several WSN application areas to improve the throughput. BN-MAC uses a unique window slot size to enhance the contention resolution issue for improved throughput. BN-MAC also prefers to communicate within a one-hop destination using Anycast, which maintains load balancing to maintain network reliability. BN-MAC is introduced with the goal of supporting four major application areas: monitoring and behavioral areas, controlling natural disasters, human-centric applications, and tracking mobility and static home automation devices from remote places. These application areas require a congestion-free mobility-supported MAC protocol to guarantee reliable data delivery. BN-MAC was evaluated using network simulator-2 (ns2) and compared with other hybrid MAC protocols, such as Zebra medium access control (Z-MAC), advertisement-based MAC (A-MAC), Speck-MAC, adaptive duty cycle SMAC (ADC-SMAC), and low-power real-time medium access control (LPR-MAC). The simulation results indicate that BN-MAC is a robust and energy-efficient protocol that outperforms other hybrid MAC protocols in the context of quality of service (QoS) parameters, such as energy consumption, latency, throughput, channel access time, successful delivery rate, coverage efficiency, and average duty cycle.
Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks
Razaque, Abdul; Elleithy, Khaled M.
2014-01-01
This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi-synchronous feature with a low duty cycle, which is advantageous for reducing the latency and energy consumption for several WSN application areas to improve the throughput. BN-MAC uses a unique window slot size to enhance the contention resolution issue for improved throughput. BN-MAC also prefers to communicate within a one-hop destination using Anycast, which maintains load balancing to maintain network reliability. BN-MAC is introduced with the goal of supporting four major application areas: monitoring and behavioral areas, controlling natural disasters, human-centric applications, and tracking mobility and static home automation devices from remote places. These application areas require a congestion-free mobility-supported MAC protocol to guarantee reliable data delivery. BN-MAC was evaluated using network simulator-2 (ns2) and compared with other hybrid MAC protocols, such as Zebra medium access control (Z-MAC), advertisement-based MAC (A-MAC), Speck-MAC, adaptive duty cycle SMAC (ADC-SMAC), and low-power real-time medium access control (LPR-MAC). The simulation results indicate that BN-MAC is a robust and energy-efficient protocol that outperforms other hybrid MAC protocols in the context of quality of service (QoS) parameters, such as energy consumption, latency, throughput, channel access time, successful delivery rate, coverage efficiency, and average duty cycle. PMID:24625737
Almaiman, Sarah; Bahkali, Salwa; Alabdulatif, Norah; Bahkaly, Ahlam; Al-Surimi, Khaled; Househ, Mowafa
2016-01-01
Access to oral health care services around the world is limited by a lack of universal coverage. The internet and social media can be an important source for patients to access supplementary oral health related information (OHRI). Online OHRI presents an opportunity to enhance dental public health education about innumerable oral health issues and promote dental self-care. The aim of this study is to estimate the prevalence of social media users among the Saudi population and identify the preferred social media platform for seeking Arabic OHRI and its impact on seekers' knowledge, attitude, and behavior. A total of 2652 Twitter followers were surveyed, using a web-based self-administered questionnaire to collect data on demographic characteristics and online OHRI seeking behavior More than two thirds, 67.7% (n= 1796), of the participants reported they were seeking Arabic online OHRI, while 41.1% of the participants reported they had no preference for using a specific social media platform. These results emphasize the need and importance of supporting the content of social media with trusted and high quality online OHRI resources to promote a high level of public awareness about oral health and dental health services. Further studies in this regard are highly recommended on a larger scale of nationalities to explore the role of social media platform preference in promoting health promotion and dental public health awareness.
A Secure and Efficient Handover Authentication Protocol for Wireless Networks
Wang, Weijia; Hu, Lei
2014-01-01
Handover authentication protocol is a promising access control technology in the fields of WLANs and mobile wireless sensor networks. In this paper, we firstly review an efficient handover authentication protocol, named PairHand, and its existing security attacks and improvements. Then, we present an improved key recovery attack by using the linearly combining method and reanalyze its feasibility on the improved PairHand protocol. Finally, we present a new handover authentication protocol, which not only achieves the same desirable efficiency features of PairHand, but enjoys the provable security in the random oracle model. PMID:24971471
User Procedures Standardization for Network Access. NBS Technical Note 799.
ERIC Educational Resources Information Center
Neumann, A. J.
User access procedures to information systems have become of crucial importance with the advent of computer networks, which have opened new types of resources to a broad spectrum of users. This report surveys user access protocols of six representative systems: BASIC, GE MK II, INFONET, MEDLINE, NIC/ARPANET and SPIRES. Functional access…
Tools to Ease Your Internet Adventures: Part I.
ERIC Educational Resources Information Center
Descy, Don E.
1993-01-01
This first of a two-part series highlights three tools that improve accessibility to Internet resources: (1) Alex, a database that accesses files in FTP (file transfer protocol) sites; (2) Archie, software that searches for file names with a user's search term; and (3) Gopher, a menu-driven program to access Internet sites. (LRW)
Code of Federal Regulations, 2010 CFR
2010-01-01
... may be conducted, on a selective basis, to verify the absence of undeclared nuclear material and nuclear related activities at reportable uranium hard-rock mines and ore beneficiation plants (see § 783.1... OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE ADDITIONAL PROTOCOL REGULATIONS COMPLEMENTARY ACCESS...
Recruitment Strategies of Methamphetamine-Using Men Who Have Sex with Men into an Online Survey
Wilkerson, J. Michael; Shenk, Jared E.; Grey, Jeremy A.; Simon Rosser, B. R.; Noor, Syed W.
2014-01-01
Recruiting hidden populations into online research remains challenging. In this manuscript, we report lessons learned from our efforts to recruit methamphetamine-using men who have sex with men. Between July and October 2012, we implemented a four-phase recruitment strategy to enroll a total of 343 methamphetamine-using MSM into an online survey about recent substance use, sexual behavior, and various psychosocial measures. The four phases were implemented sequentially. During phase one, we placed advertisements on mobile applications, and during phase two, we placed advertisements on traditional websites formatted for browsers. During phase three, we used e-mail to initiate snowball recruitment, and during phase four, we used social media for snowball recruitment. Advertisements on mobile devices and websites formatted for browsers proved to be expensive options and resulted in few eligible participants. Our attempts to initiate a snowball through e-mail also proved unsuccessful. The majority (n=320) of observations in our final dataset came from our use of social media. However, participant fraud was a concern, requiring us to implement a strong participant verification protocol. For maximum recruitment and cost-effectiveness, researchers should use social media for recruitment provided they employ strong participant verification protocols. PMID:25642143
Recruitment Strategies of Methamphetamine-Using Men Who Have Sex with Men into an Online Survey.
Wilkerson, J Michael; Shenk, Jared E; Grey, Jeremy A; Simon Rosser, B R; Noor, Syed W
Recruiting hidden populations into online research remains challenging. In this manuscript, we report lessons learned from our efforts to recruit methamphetamine-using men who have sex with men. Between July and October 2012, we implemented a four-phase recruitment strategy to enroll a total of 343 methamphetamine-using MSM into an online survey about recent substance use, sexual behavior, and various psychosocial measures. The four phases were implemented sequentially. During phase one, we placed advertisements on mobile applications, and during phase two, we placed advertisements on traditional websites formatted for browsers. During phase three, we used e-mail to initiate snowball recruitment, and during phase four, we used social media for snowball recruitment. Advertisements on mobile devices and websites formatted for browsers proved to be expensive options and resulted in few eligible participants. Our attempts to initiate a snowball through e-mail also proved unsuccessful. The majority (n=320) of observations in our final dataset came from our use of social media. However, participant fraud was a concern, requiring us to implement a strong participant verification protocol. For maximum recruitment and cost-effectiveness, researchers should use social media for recruitment provided they employ strong participant verification protocols.
Kovera, Margaret Bull
2002-02-01
Two studies examined three moderators (gender, attitudes, and media slant) and four mediators (accessibility, evidence importance, evidence plausibility, and standards of guilt) of general pretrial publicity's influence on juror decisions. In Study 1, participants who watched a prodefense rape story were more likely to report that they would need more inculpatory evidence to convict a defendant of rape than were participants who watched a proprosecution rape story. In Study 2, participants watched news stories, one of which was a proprosecution rape story, a prodefense rape story, or a nonrape story. In an ostensibly unrelated study, participants indicated their attitudes toward rape, watched a rape trial, and provided trial and witness ratings. Accessibility did not mediate the media effects on participants' judgments of rape importance; however, attitudes moderated media effects. Rape news influenced juror ratings of the importance of evidence about the complainant's behavior. Finally, media altered the standards participants used to determine defendant guilt. Implications for understanding the mechanisms responsible for pretrial publicity effects are discussed.
Borzekowski, Dina L G; Robinson, Thomas N
2005-07-01
Media can influence aspects of a child's physical, social, and cognitive development; however, the associations between a child's household media environment, media use, and academic achievement have yet to be determined. To examine relationships among a child's household media environment, media use, and academic achievement. During a single academic year, data were collected through classroom surveys and telephone interviews from an ethnically diverse sample of third grade students and their parents from 6 northern California public elementary schools. The majority of our analyses derive from spring 2000 data, including academic achievement assessed through the mathematics, reading, and language arts sections of the Stanford Achievement Test. We fit linear regression models to determine the associations between variations in household media and performance on the standardized tests, adjusting for demographic and media use variables. The household media environment is significantly associated with students' performance on the standardized tests. It was found that having a bedroom television set was significantly and negatively associated with students' test scores, while home computer access and use were positively associated with the scores. Regression models significantly predicted up to 24% of the variation in the scores. Absence of a bedroom television combined with access to a home computer was consistently associated with the highest standardized test scores. This study adds to the growing literature reporting that having a bedroom television set may be detrimental to young elementary school children. It also suggests that having and using a home computer may be associated with better academic achievement.
Health effects of media on children and adolescents.
Strasburger, Victor C; Jordan, Amy B; Donnerstein, Ed
2010-04-01
Youth spend an average of >7 hours/day using media, and the vast majority of them have access to a bedroom television, computer, the Internet, a video-game console, and a cell phone. In this article we review the most recent research on the effects of media on the health and well-being of children and adolescents. Studies have shown that media can provide information about safe health practices and can foster social connectedness. However, recent evidence raises concerns about media's effects on aggression, sexual behavior, substance use, disordered eating, and academic difficulties. We provide recommendations for parents, practitioners, the media, and policy makers, among others, for ways to increase the benefits and reduce the harm that media can have for the developing child and for adolescents.
Semiquantum key distribution with secure delegated quantum computation
Li, Qin; Chan, Wai Hong; Zhang, Shengyu
2016-01-01
Semiquantum key distribution allows a quantum party to share a random key with a “classical” party who only can prepare and measure qubits in the computational basis or reorder some qubits when he has access to a quantum channel. In this work, we present a protocol where a secret key can be established between a quantum user and an almost classical user who only needs the quantum ability to access quantum channels, by securely delegating quantum computation to a quantum server. We show the proposed protocol is robust even when the delegated quantum server is a powerful adversary, and is experimentally feasible with current technology. As one party of our protocol is the most quantum-resource efficient, it can be more practical and significantly widen the applicability scope of quantum key distribution. PMID:26813384
Two Mechanisms to Avoid Control Conflicts Resulting from Uncoordinated Intent
NASA Technical Reports Server (NTRS)
Mishkin, Andrew H.; Dvorak, Daniel L.; Wagner, David A.; Bennett, Matthew B.
2013-01-01
This software implements a real-time access control protocol that is intended to make all connected users aware of the presence of other connected users, and which of them is currently in control of the system. Here, "in control" means that a single user is authorized and enabled to issue instructions to the system. The software The software also implements a goal scheduling mechanism that can detect situations where plans for the operation of a target system proposed by different users overlap and interact in conflicting ways. In such situations, the system can either simply report the conflict (rejecting one goal or the entire plan), or reschedule the goals in a way that does not conflict. The access control mechanism (and associated control protocol) is unique. Other access control mechanisms are generally intended to authenticate users, or exclude unauthorized access. This software does neither, and would likely depend on having some other mechanism to support those requirements.
An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application
Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo
2014-01-01
This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical. PMID:25136651
An action-based fine-grained access control mechanism for structured documents and its application.
Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo
2014-01-01
This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical.
Golkar-Narenji, Afsaneh; Gourabi, Hamid; Eimani, Hussein; Barekati, Zeinab; Akhlaghi, Aliasghar
2012-10-01
To study assisted reproductive technology (ART) protocols including superovulation, in vitro fertilization (IVF) and in vitro development (IVD) for BALB/cJ mice in comparison with a common ART protocol for NMRI mice. Adult NMRI and BALB/cJ mice were superovulated using a 48 h G-interval. In order to find a more suitable G-interval for the BALB/cJ strain, G-intervals including 44, 46 and 50 h were also examined. Superovulation rates were recorded in all groups. IVF rate of BALB/c oocytes in T6 and mHTF media were compared. IVD rates of BALB/cJ zygotes in mHTF, T6 and G1V 5 /G2V 5 media were compared. In addition, IVF and IVD rates of BALB/cJ and NMRI oocytes were compared in T6 medium during IVF-IVD procedures. In BALB/cJ mice the highest superovulation rates were observed with 44-46 h G-intervals. However, with a 48 h G-interval, superovulation rates were significantly lower in BALB/cJ compared to NMRI mice ( p < 0.05). mHTF medium significantly increased in vitro fertilization of BALB/cJ oocytes compared to T6 medium ( p < 0.05). Fertilization rate of NMRI oocytes was significantly higher than BALB/cJ oocytes in T6 medium ( p < 0.05). The BALB/cJ embryo IVD was significantly higher in G1/G2 medium compared to mHTF and T6 media ( p < 0.01). Superovulation with 48 h G-interval and using T6 during all in vitro procedures produces embryos more efficiently for NMRI mice than for BALB/cJ mice. For BALB/cJ mice, a protocol including superovulation with a 44-46 h G-interval, using mHTF during IVF and G1V 5 /G2V 5 medium during IVD, may improve in vitro embryo production.
NASA Astrophysics Data System (ADS)
Yu, Dong-Su; Cho, Jae-Hwan; Park, Cheol-Soo; Yoo, Heung-Joon; Choi, Cheon-Woong; Kim, Dae-Hyun
2013-10-01
The purpose of this study is to obtain a good quality image and to minimize patient doses and re-examination rates through an optimization of the protocol for coronary computed tomography angiography (CCTA) examination based on a comparison and an analysis of the heart rates (HRs) of patients who had left ventricular ejection fraction (LVEF) values of less than 40% and the HRs of ordinary patients. This study targeted 16 patients who received thallium single-photon emission computed tomography (SPECT) or echocardiography simultaneously among the patients who took the CCTA examinations. Depending on the LVEF value (30 ˜ 39, 40 ˜ 49, 50 ˜ 59, and 60% or above), the patients were divided into groups of four based on HR (50 ˜ 59, 60 ˜ 69, 70 ˜ 79, and 80 or above). DynEva software was used to set the region of interest (ROI) on the ascending aorta and for a measurement of the threshold value. Comparisons and analyses were made based on the LVEF values and the HRs, after which the results were compared with the ones from the existing examination protocols and contrast medium protocols. According to the study results, the relation between the HR and the LVEF demonstrated that it took a long time to reach the true 100 hounsfield unit (HU) when the LVEF was 40% or below. Contrasting media showed significant differences, except in the case where the HR was 80 or above, and/or the LVEF was less than 40%. Moreover, for an LVEF of less than 40%, time differences were significant when contrasting media reached the true 100 HU to begin the scanning process. Therefore, it was possible to predict that the contrasting media were already being washed out from the left ventricle.
ERIC Educational Resources Information Center
Council of Europe, Strasbourg (France). Committee for Out-of-School Education and Cultural Development.
This 2-part report summarizes the Council of Europe's 1977 colloquy on cable television, local radio, and video, and presents the chairman's report on media and public usefulness. Problem areas addressed in the section on public service applications of the media include ensuring public access to the media, financing local radio and television,…
ERIC Educational Resources Information Center
Firat, Mehmet; Altinpulluk, Hakan; Kilinç, Hakan; Büyük, Köksal
2017-01-01
The aim of this study is to reveal Open Education related social media usage in Turkey through social network analyses. To this end, the most widely used social media network in Turkey, Facebook, was chosen. All the pages and groups created on Facebook related to Open Education were found. A total of 207 groups and 521 pages were accessed and…
Storage media pipelining: Making good use of fine-grained media
NASA Technical Reports Server (NTRS)
Vanmeter, Rodney
1993-01-01
This paper proposes a new high-performance paradigm for accessing removable media such as tapes and especially magneto-optical disks. In high-performance computing the striping of data across multiple devices is a common means of improving data transfer rates. Striping has been used very successfully for fixed magnetic disks improving overall system reliability as well as throughput. It has also been proposed as a solution for providing improved bandwidth for tape and magneto-optical subsystems. However, striping of removable media has shortcomings, particularly in the areas of latency to data and restricted system configurations, and is suitable primarily for very large I/Os. We propose that for fine-grained media, an alternative access method, media pipelining, may be used to provide high bandwidth for large requests while retaining the flexibility to support concurrent small requests and different system configurations. Its principal drawback is high buffering requirements in the host computer or file server. This paper discusses the possible organization of such a system including the hardware conditions under which it may be effective, and the flexibility of configuration. Its expected performance is discussed under varying workloads including large single I/O's and numerous smaller ones. Finally, a specific system incorporating a high-transfer-rate magneto-optical disk drive and autochanger is discussed.
Parental modelling, media equipment and screen-viewing among young children: cross-sectional study
Jago, Russell; Sebire, Simon J; Lucas, Patricia J; Turner, Katrina M; Bentley, Georgina F; Goodred, Joanna K; Stewart-Brown, Sarah; Fox, Kenneth R
2013-01-01
Objective To examine whether parental screen-viewing, parental attitudes or access to media equipment were associated with the screen-viewing of 6-year-old to 8-year-old children. Design Cross-sectional survey. Setting Online survey. Main outcome Parental report of the number of hours per weekday that they and, separately, their 6-year-old to 8-year-old child spent watching TV, using a games console, a smart-phone and multiscreen viewing. Parental screen-viewing, parental attitudes and pieces of media equipment were exposures. Results Over 75% of the parents and 62% of the children spent more than 2 h/weekday watching TV. Over two-thirds of the parents and almost 40% of the children spent more than an hour per day multiscreen viewing. The mean number of pieces of media equipment in the home was 5.9 items, with 1.3 items in the child's bedroom. Children who had parents who spent more than 2 h/day watching TV were over 7.8 times more likely to exceed the 2 h threshold. Girls and boys who had a parent who spent an hour or more multiscreen viewing were 34 times more likely to also spend more than an hour per day multiscreen viewing. Media equipment in the child's bedroom was associated with higher TV viewing, computer time and multiscreen viewing. Each increment in the parental agreement that watching TV was relaxing for their child was associated with a 49% increase in the likelihood that the child spent more than 2 h/day watching TV. Conclusions Children who have parents who engage in high levels of screen-viewing are more likely to engage in high levels of screen-viewing. Access to media equipment, particularly in the child's bedroom, was associated with higher levels of screen-viewing. Family-based strategies to reduce screen-viewing and limit media equipment access may be important ways to reduce child screen-viewing. PMID:23619088
A prototype of Virtual Observatory access for planetary data in the framework of Europlanet-RI/IDIS
NASA Astrophysics Data System (ADS)
Gangloff, M.; Cecconi, B.; Bourrel, N.; Jacquey, C.; Le Sidaner, P.; Berthier, J.; André, N.; Pallier, E.; Erard, S.; Aboudarham, J.; Chanteur, G. M.; Capria, M. T.; Khodachenko, M.; Manaud, N.; Schmidt, W.; Schmitt, B.; Topf, F.; Trautan, F.; Sarkissian, A.
2011-12-01
Europlanet RI is a four-year project supported by the European Union under the Seventh Framework Programme. Launched in January 2009, it is an Integrated Infrastructure Initiative, ie. A combination of Networking Activities, Transnational Access Activities and Joint Research Activities. The Networking Activities aim at further fostering a culture of cooperation in the field of Planetary Sciences. The objective of the Transnational Access Activities is to provide transnational access to a range of laboratory and field site facilities tailored to the needs of planetary research and on-line access to the available planetary science data, information and software tools, through the IDIS e-service. The overall aim of the Joint Research Activities (JRA) is to improve the services provided by the ensemble of Transnational Access Activities. In EuroPlaNet-RI, JRA4 must prepare essential tools for IDIS (Integrated and Distributed Information Service) allowing the planetary science community to interrogate some selected data centres, access and process data and visualize the results. This is the first step towards a Planetary Virtual Observatory. The first requirement for different data centres to be able to operate together collectively is adequate standardization. In particular a common description of data and services is essential. This is why the major part of JRA4/Task2 activity is focussing on data models, associated dictionnaries, and protocols to exchange queries. A specific data model is being developed for IDIS, associated with the PDAP protocol, a standard defined by the IPDA (International Planetary Data Alliance) The scope of this prototype is to demonstrate the capabilities of the IDIS Data Model, and the PDAP protocol to search and retrieve data in the wide topical planetology context.
Recommendations for a service framework to access astronomical archives
NASA Technical Reports Server (NTRS)
Travisano, J. J.; Pollizzi, J.
1992-01-01
There are a large number of astronomical archives and catalogs on-line for network access, with many different user interfaces and features. Some systems are moving towards distributed access, supplying users with client software for their home sites which connects to servers at the archive site. Many of the issues involved in defining a standard framework of services that archive/catalog suppliers can use to achieve a basic level of interoperability are described. Such a framework would simplify the development of client and server programs to access the wide variety of astronomical archive systems. The primary services that are supplied by current systems include: catalog browsing, dataset retrieval, name resolution, and data analysis. The following issues (and probably more) need to be considered in establishing a standard set of client/server interfaces and protocols: Archive Access - dataset retrieval, delivery, file formats, data browsing, analysis, etc.; Catalog Access - database management systems, query languages, data formats, synchronous/asynchronous mode of operation, etc.; Interoperability - transaction/message protocols, distributed processing mechanisms (DCE, ONC/SunRPC, etc), networking protocols, etc.; Security - user registration, authorization/authentication mechanisms, etc.; Service Directory - service registration, lookup, port/task mapping, parameters, etc.; Software - public vs proprietary, client/server software, standard interfaces to client/server functions, software distribution, operating system portability, data portability, etc. Several archive/catalog groups, notably the Astrophysics Data System (ADS), are already working in many of these areas. In the process of developing StarView, which is the user interface to the Space Telescope Data Archive and Distribution Service (ST-DADS), these issues and the work of others were analyzed. A framework of standard interfaces for accessing services on any archive system which would benefit archive user and supplier alike is proposed.
Suntharalingam, Saravanabavaan; Mikat, Christian; Stenzel, Elena; Erfanian, Youssef; Wetter, Axel; Schlosser, Thomas; Forsting, Michael; Nassenstein, Kai
2017-01-01
To evaluate the image quality and radiation dose of submillisievert standard-pitch CT pulmonary angiography (CTPA) with ultra-low dose contrast media administration in comparison to standard CTPA. Hundred patients (56 females, 44 males, mean age 69.6±15.4 years; median BMI: 26.6, IQR: 5.9) with suspected pulmonary embolism were examined with two different protocols (n = 50 each, group A: 80 kVp, ref. mAs 115, 25 ml of contrast medium; group B: 100 kVp, ref. mAs 150, 60 ml of contrast medium) using a dual-source CT equipped with automated exposure control. Objective and subjective image qualities, radiation exposure as well as the frequency of pulmonary embolism were evaluated. There was no significant difference in subjective image quality scores between two groups regarding pulmonary arteries (p = 0.776), whereby the interobserver agreement was excellent (group A: k = 0.9; group B k = 1.0). Objective image analysis revealed that signal intensities (SI), signal-to-noise ratio (SNR) and contrast-to-noise ratio (CNR) of the pulmonary arteries were equal or significantly higher in group B. There was no significant difference in the frequency of pulmonary embolism (p = 0.65). Using the low dose and low contrast media protocol resulted in a radiation dose reduction by 71.8% (2.4 vs. 0.7 mSv; p<0.001). This 80 kVp standard pitch CTPA protocol with 25 ml contrast agent volume can obtain sufficient image quality to exclude or diagnose pulmonary emboli while reducing radiation dose by approximately 71%.
Myers, Dennis R; Sykes, Catherine; Myers, Scott
2008-01-01
This article offers practical guidance for educators as they prepare specialists to enhance the lives and communities of older persons through the strategic use of visual media in age-related courses. Advantages and disadvantages of this learning innovation are provided as well as seven approaches for enriching instruction. Resources are included for locating effective visual media, matching course content with video resources, determining fair use of copyrighted media, and inserting video clips into PowerPoint presentations. Strategies for accessing assistive services for implementing visual media in the classroom are also addressed. This article promotes the use of visual media for the purpose of enriching gerontological and geriatrics instruction for the adult learner.
Teacher perceptions of usefulness of mobile learning devices in rural secondary science classrooms
NASA Astrophysics Data System (ADS)
Tighe, Lisa
The internet and easy accessibility to a wide range of digital content has created the necessity for teachers to embrace and integrate digitial media in their curriculums. Although there is a call for digital media integration in curriculum by current learning standards, rural schools continue to have access to fewer resources due to limited budgets, potentially preventing teachers from having access to the most current technology and science instructional materials. This dissertation identifies the perceptions rural secondary science teachers have on the usefulness of mobile learning devices in the science classroom. The successes and challenges in using mobile learning devices in the secondary classroom were also explored. Throughout this research, teachers generally supported the integration of mobile devices in the classroom, while harboring some concerns relating to student distractability and the time required for integrating mobile devices in exisiting curriculum. Quantitative and qualitative data collected through surveys, interviews, and classroom observations revealed that teachers perceive that mobile devices bring benefits such as ease of communication and easy access to digitial information. However, there are perceived challenges with the ability to effectively communicate complex scientific information via mobile devices, distractibility of students, and the time required to develop effective curriculum to integrate digital media into the secondary science classroom.
The virtual library: Coming of age
NASA Technical Reports Server (NTRS)
Hunter, Judy F.; Cotter, Gladys A.
1994-01-01
With the high speed networking capabilities, multiple media options, and massive amounts of information that exist in electronic format today, the concept of a 'virtual' library or 'library without walls' is becoming viable. In virtual library environment, the information processed goes beyond the traditional definition of documents to include the results of scientific and technical research and development (reports, software, data) recorded in any format or media: electronic, audio, video, or scanned images. Network access to information must include tools to help locate information sources and navigate the networks to connect to the sources, as well as methods to extract the relevant information. Graphical User Interfaces (GUI's) that are intuitive and navigational tools such as Intelligent Gateway Processors (IGP) will provide users with seamless and transparent use of high speed networks to access, organize, and manage information. Traditional libraries will become points of electronic access to information on multiple medias. The emphasis will be towards unique collections of information at each library rather than entire collections at every library. It is no longer a question of whether there is enough information available; it is more a question of how to manage the vast volumes of information. The future equation will involve being able to organize knowledge, manage information, and provide access at the point of origin.
Internet Connections: Understanding Your Access Options.
ERIC Educational Resources Information Center
Notess, Greg R.
1994-01-01
Describes levels of Internet connectivity, physical connections, and connection speeds. Compares options for connecting to the Internet, including terminal accounts, dial-up terminal accounts, direct connections through a local area network, and direct connections using SLIP (Serial Line Internet Protocol) or PPP (Point-to-Point Protocol). (eight…
O'Kelly, F; Nason, G J; Manecksha, R P; Cascio, S; Quinn, F J; Leonard, M; Koyle, M A; Farhat, W; Leveridge, M J
2017-10-01
Social media (SoMe) comprises a number of internet-based applications that have the capability to disseminate multimodal media and allow for unprecedented inter-user connectivity. The role of Twitter has been studied in conferences and education; moreover, there is increasing evidence that patients are more likely to use social media for their own health education. The aim of this study was to assess the impact of social media platforms on the impact factor of both urological and paediatric journals that publish on paediatric urology, and to assess parental awareness of social media in paediatric urology. A filtered Journal of Citation Reports (JCR) search was performed for the period 2012-16 for journals that published articles on paediatric urology. Journals were ranked according to impact factor, and each individual journal website was accessed to assess for the presence of social media. Parents in paediatric urology clinics and non-paediatric urology patients also filled out a questionnaire to assess for awareness and attitudes to social media. All statistical analysis was performed using Prism 6 software (Prism 6, GraphPad Software, California, USA). Overall, there were 50 urological journals and 39 paediatric journals with a mean impact factor of 2.303 and 1.766, respectively. There was an overall average increase in impact factor across all urological journals between 2012 and 16. The presence of a Twitter feed was statistically significant for a rise in impact factor over the 4 years (P = 0.017). The cohort of parents was statistically more likely to have completed post-secondary education, to have and access to a social media profile, use it for health education, and use it to access journal/physician/hospital social media accounts. This study examined, for the first time, the role of social media in paediatric urology, and demonstrated that SoMe use is associated with a positive influence in impact factor, but also a parental appetite for it. Limitations included a non-externally validated questionnaire. There may also have been bias in larger journals that generate and maintain social media platforms such as Twitter, which may then in turn have an influence on impact factor. Social media use within paediatric urology was associated with a higher impact factor, which remained significant after 4 years of analysis. Parents were more likely to use a wide variety of social media to search for conditions and physicians/healthcare providers; therefore, journals and institutions need to embrace and endorse SoMe as a potential source of important clinical information. Copyright © 2017. Published by Elsevier Ltd.
Telemetry Standards, IRIG Standard 106-17, Chapter 22, Network Based Protocol Suite
2017-07-01
ER Fiber media connections using 10 Gigabit Ethernet shall comply with IEEE 802.3-2012, Section 5, Clause 52. 22.2.1.1.4 Auto- Negotiation ...22.2.1.1.4.1 Copper Auto- Negotiation Copper media connections, as described in the preceding sections, shall support auto- negotiation of speed, duplex, and...flow control in the manner specified in IEEE 802.3-2012, Section 2, Clause 28. 22.2.1.1.4.2 Fiber Auto- Negotiation Gigabit and 10 Gigabit fiber
Extravasation of radiographic contrast media: prevention, diagnosis, and treatment.
Tonolini, Massimo; Campari, Alessandro; Bianco, Roberto
2012-01-01
Contrast media extravasation represents a not unusual problem in radiological practice. Incidence, patient-, and procedure-related risk factors, pathogenesis, and clinical manifestations of extravasation injuries are discussed with a review of recent literature, and a practical preventive approach is proposed. A diagnostic and therapeutic protocol, to be applied whenever contrast extravasation is detected, includes radiographic assessment of compartmentalization, antidote application, local care, and clinical follow-up; indications for surgical consultation and adverse event reporting are provided. Copyright © 2012 Mosby, Inc. All rights reserved.
Relieving the Confusion: Location and Access Made (Relatively) Easy
ERIC Educational Resources Information Center
Jansen, Barbara A.
2005-01-01
Students need much assistance if they are to successfully use the Location and Access procedure of problem-solving. Guidelines are presented on how classroom teachers and library media specialists can help elementary students manage this Big6 stage.
Bioconvective Assay As Alternative To Draize Test
NASA Technical Reports Server (NTRS)
Noever, David A.; Matsos, Helen C.
1993-01-01
Protocol to determine toxicities of chemicals implemented relatively cheaply by use of equipment and materials packaged in convenient kit form. Tests involve observation of macroscopic patterns formed at high concentrations of free-swimming protozoan species Tetrahymena pyriformis in liquid media. Provides more-sensitive indication of toxicity and costs less. Given that there are no data on toxicities of 70 to 80 percent of commercial chemicals, high cost of, and current opposition to, testing on higher animals, new protocol helps meet pressing need.
Gage-Bouchard, Elizabeth A; LaValley, Susan; Mollica, Michelle; Beaupin, Lynda Kwon
2017-10-01
Social support is an important factor that shapes how people cope with illness, and health-related communication among peers managing the same illness (network ties with experiential similarity) offers specialized information, resources, and emotional support. Facebook has become a ubiquitous part of many Americans' lives, and may offer a way for patients and caregivers experiencing a similar illness to exchange specialized health-related support. However, little is known about the content of communication among people who have coped with the same illness on personal Facebook pages. We conducted a content analysis of 12 months of data from 18 publicly available Facebook pages hosted by parents of children with acute lymphoblastic leukemia, focusing on communication between users who self-identified as parents of pediatric cancer patients. Support exchanges between users with experiential similarity contained highly specialized health-related information, including information about health services use, symptom recognition, compliance, medication use, treatment protocols, and medical procedures. Parents also exchanged tailored emotional support through comparison, empathy, encouragement, and hope. Building upon previous research documenting that social media use can widen and diversify support networks, our findings show that cancer caregivers access specialized health-related informational and emotional support through communication with others who have experienced the same illness on personal Facebook pages. These findings have implications for health communication practice and offer evidence to tailor M-Health interventions that leverage existing social media platforms to enhance peer support for patients and caregivers.
Wireless Network Security Vulnerabilities and Concerns
NASA Astrophysics Data System (ADS)
Mushtaq, Ahmad
The dilemma of cyber communications insecurity has existed all the times since the beginning of the network communications. The problems and concerns of unauthorized access and hacking has existed form the time of introduction of world wide web communication and Internet's expansion for popular use in 1990s, and has remained till present time as one of the most important issues. The wireless network security is no exception. Serious and continuous efforts of investigation, research and development has been going on for the last several decades to achieve the goal of provision of 100 percent or full proof security for all the protocols of networking architectures including the wireless networking. Some very reliable and robust strategies have been developed and deployed which has made network communications more and more secure. However, the most desired goal of complete security has yet to see the light of the day. The latest Cyber War scenario, reported in the media of intrusion and hacking of each other's defense and secret agencies between the two super powers USA and China has further aggravated the situation. This sort of intrusion by hackers between other countries such as India and Pakistan, Israel and Middle East countries has also been going on and reported in the media frequently. The paper reviews and critically examines the strategies already in place, for wired network. Wireless Network Security and also suggests some directions and strategies for more robust aspects to be researched and deployed.
Satellite Communications Using Commercial Protocols
NASA Technical Reports Server (NTRS)
Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan
2000-01-01
NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.
Electronic Reference Service: A Teen's Eye View.
ERIC Educational Resources Information Center
Farmer, Lesley S.
2003-01-01
Discusses electronic reference service from a teen's point of view and from the school library media specialist's view. Considers traits that attract teens, including anonymity, speed, and convenience; and explains concerns of media specialists, including quality of electronic resources, how to provide access, library instruction options, and…
Principled Libraries: Finding Stability in Changing Times.
ERIC Educational Resources Information Center
Crawford, Walt
2000-01-01
Discusses the transition that libraries are currently experiencing between physical resources and electronic access. Topics include technology as tools rather than solutions; media and technology; desktop publishing; electronic books; Web commerce; instant books, or books printed on demand; new types of media; and serving the users. (LRW)
Merchants of Death: Media Violence and American Empire.
ERIC Educational Resources Information Center
Trend, David
2003-01-01
Research has done little to advance understanding of who accesses the violent imagery in popular culture. The narrow perspective provided by mass-produced media violence must be broadened by critical viewpoints that provide information people need to participate in the democratic process. (Contains 85 reference notes.) (SK)
The Adventure of the Deceitful Numbers
ERIC Educational Resources Information Center
Andrade-Molina, Melissa
2017-01-01
This article addresses access to high-quality education under a neoliberal mentality. It engages at both the discursive and material levels, by mapping how taken-for-granted truths about neoliberal policies circulate through the media. The media--newspapers, network channels, and news websites--have correlated quality education with socioeconomic…
Focus on Library Media Skills for the Young Reader.
ERIC Educational Resources Information Center
School Library Media Activities Monthly, 1989
1989-01-01
Offers suggestions relating to the general characteristics of young readers to aid library media specialists in effective teaching and communication. Topics discussed include physical access, dependence, and activity levels; the use of games and dramatic play; children's interests; conceptual development; and emotional needs and behaviors. (CLB)
Kasenda, Benjamin; von Elm, Erik; You, John J.; Tomonaga, Yuki; Saccilotto, Ramon; Amstutz, Alain; Bengough, Theresa; Meerpohl, Joerg J.; Stegert, Mihaela; Olu, Kelechi K.; Tikkinen, Kari A. O.; Neumann, Ignacio; Carrasco-Labra, Alonso; Faulhaber, Markus; Mulla, Sohail M.; Mertz, Dominik; Akl, Elie A.; Bassler, Dirk; Busse, Jason W.; Nordmann, Alain; Gloy, Viktoria; Ebrahim, Shanil; Schandelmaier, Stefan; Sun, Xin; Vandvik, Per O.; Johnston, Bradley C.; Walter, Martin A.; Burnand, Bernard; Hemkens, Lars G.; Bucher, Heiner C.; Guyatt, Gordon H.; Briel, Matthias
2016-01-01
Background Little is known about publication agreements between industry and academic investigators in trial protocols and the consistency of these agreements with corresponding statements in publications. We aimed to investigate (i) the existence and types of publication agreements in trial protocols, (ii) the completeness and consistency of the reporting of these agreements in subsequent publications, and (iii) the frequency of co-authorship by industry employees. Methods and Findings We used a retrospective cohort of randomized clinical trials (RCTs) based on archived protocols approved by six research ethics committees between 13 January 2000 and 25 November 2003. Only RCTs with industry involvement were eligible. We investigated the documentation of publication agreements in RCT protocols and statements in corresponding journal publications. Of 647 eligible RCT protocols, 456 (70.5%) mentioned an agreement regarding publication of results. Of these 456, 393 (86.2%) documented an industry partner’s right to disapprove or at least review proposed manuscripts; 39 (8.6%) agreements were without constraints of publication. The remaining 24 (5.3%) protocols referred to separate agreement documents not accessible to us. Of those 432 protocols with an accessible publication agreement, 268 (62.0%) trials were published. Most agreements documented in the protocol were not reported in the subsequent publication (197/268 [73.5%]). Of 71 agreements reported in publications, 52 (73.2%) were concordant with those documented in the protocol. In 14 of 37 (37.8%) publications in which statements suggested unrestricted publication rights, at least one co-author was an industry employee. In 25 protocol-publication pairs, author statements in publications suggested no constraints, but 18 corresponding protocols documented restricting agreements. Conclusions Publication agreements constraining academic authors’ independence are common. Journal articles seldom report on publication agreements, and, if they do, statements can be discrepant with the trial protocol. PMID:27352244
Bertone, I; Bellino, C; Alborali, G L; Cagnasso, A; Cagnotti, G; Dappiano, E; Lizzi, M; Miciletta, M; Ramacciotti, A; Gianella, P; D'Angelo, A
2015-12-03
The aims of this field trial were to describe the clinical-pathologic findings in calves with otitis media (OM) and media-interna (OMI), to evaluate, through the development of a scoring system, the effectiveness of a standardized therapeutic protocol, and to identify the causative pathogens and their possible correlation with concurrent respiratory disease. All animals underwent physical and neurological examinations at three experimental time points: at diagnosis/beginning of treatment (T0), 1 week (T1) and 2 weeks (T2) after therapy was started, respectively. Follow-up telephone interviews with animal owners were conducted 1 month later. The therapeutic protocol consisted of tulathromycin (Draxxin®; Zoetis), oxytetracycline hydrochloride (Terramicina 100®; Zoetis), and carprofen (Rimadyl®; Zoetis). Twenty-two calves were enrolled. Physical and otoscopic examination at T0 revealed monolateral and bilateral otorrhea in 16 and 6 calves, respectively, with peripheral vestibular system involvement in calves presenting with neurological signs (n = 17; 77 %). A significant improvement of clinical and neurological scores was observed in 20 (90 %) calves, a full recovery in only 1 (5 %). One calf worsened between T0 and T1 and it was removed from the study. None of the other animals showed a worsening of clinical conditions and/or required further treatments at one month follow up. Mycoplasma bovis was isolated in 89 % of the affected ears either alone or together with P. multocida (n = 5), Streptococcus spp. (n = 1), Staphylococcus spp. (n = 1), and Pseudomonas spp. (n = 1). M. bovis either alone or together with these bacteria was also isolated from the upper and/or lower respiratory tract in 19 (86 %) calves. This is the first prospective study to evaluate the effectiveness of a standardized therapeutic protocol for the treatment of OM/OMI in calves. The therapy led to clinical improvement in the majority of the calves. Persistence of mild clinical-neurological signs did not compromise productive performance. The numerical scoring system for clinical and neurological signs permitted objective evaluation of response to therapy. M. bovis was the pathogen most often isolated. This finding should be considered in the treatment of OM/OMI in calves. Moreover, respiratory tract infection should not be underrated, since it is one of the major risk factors for the development of OM/OMI.
The Access Gap: Poverty and Characteristics of School Library Media Centers
ERIC Educational Resources Information Center
Pribesh, Shana; Gavigan, Karen; Dickinson, Gail
2011-01-01
Stephen Krashen believes that schools can counter the effects of poverty in at least one area: access to books. However, little research has been done to determine whether students living in poverty have access to school library services comparable to those attending schools with low concentrations of students living in poverty. We examined the…
ERIC Educational Resources Information Center
Einsiedel, Edna F.
Despite a tradition of government secrecy, Canada recently adopted freedom of information legislation. Reflecting greater public and media interest in the issue of public access to information and government secrecy, Bill C-34, the Access to Information Act, received royal assent in 1982, as did a privacy act, enacted to protect the complementary…
Advertisement-Based Energy Efficient Medium Access Protocols for Wireless Sensor Networks
NASA Astrophysics Data System (ADS)
Ray, Surjya Sarathi
One of the main challenges that prevents the large-scale deployment of Wireless Sensor Networks (WSNs) is providing the applications with the required quality of service (QoS) given the sensor nodes' limited energy supplies. WSNs are an important tool in supporting applications ranging from environmental and industrial monitoring, to battlefield surveillance and traffic control, among others. Most of these applications require sensors to function for long periods of time without human intervention and without battery replacement. Therefore, energy conservation is one of the main goals for protocols for WSNs. Energy conservation can be performed in different layers of the protocol stack. In particular, as the medium access control (MAC) layer can access and control the radio directly, large energy savings is possible through intelligent MAC protocol design. To maximize the network lifetime, MAC protocols for WSNs aim to minimize idle listening of the sensor nodes, packet collisions, and overhearing. Several approaches such as duty cycling and low power listening have been proposed at the MAC layer to achieve energy efficiency. In this thesis, I explore the possibility of further energy savings through the advertisement of data packets in the MAC layer. In the first part of my research, I propose Advertisement-MAC or ADV-MAC, a new MAC protocol for WSNs that utilizes the concept of advertising for data contention. This technique lets nodes listen dynamically to any desired transmission and sleep during transmissions not of interest. This minimizes the energy lost in idle listening and overhearing while maintaining an adaptive duty cycle to handle variable loads. Additionally, ADV-MAC enables energy efficient MAC-level multicasting. An analytical model for the packet delivery ratio and the energy consumption of the protocol is also proposed. The analytical model is verified with simulations and is used to choose an optimal value of the advertisement period. Simulations show that the optimized ADV-MAC provides substantial energy gains (50% to 70% less than other MAC protocols for WSNs such as T-MAC and S-MAC for the scenarios investigated) while faring as well as T-MAC in terms of packet delivery ratio and latency. Although ADV-MAC provides substantial energy gains over S-MAC and T-MAC, it is not optimal in terms of energy savings because contention is done twice -- once in the Advertisement Period and once in the Data Period. In the next part of my research, the second contention in the Data Period is eliminated and the advantages of contention-based and TDMA-based protocols are combined to form Advertisement based Time-division Multiple Access (ATMA), a distributed TDMA-based MAC protocol for WSNs. ATMA utilizes the bursty nature of the traffic to prevent energy waste through advertisements and reservations for data slots. Extensive simulations and qualitative analysis show that with bursty traffic, ATMA outperforms contention-based protocols (S-MAC, T-MAC and ADV-MAC), a TDMA based protocol (TRAMA) and hybrid protocols (Z-MAC and IEEE 802.15.4). ATMA provides energy reductions of up to 80%, while providing the best packet delivery ratio (close to 100%) and latency among all the investigated protocols. Simulations alone cannot reflect many of the challenges faced by real implementations of MAC protocols, such as clock-drift, synchronization, imperfect physical layers, and irregular interference from other transmissions. Such issues may cripple a protocol that otherwise performs very well in software simulations. Hence, to validate my research, I conclude with a hardware implementation of the ATMA protocol on SORA (Software Radio), developed by Microsoft Research Asia. SORA is a reprogrammable Software Defined Radio (SDR) platform that satisfies the throughput and timing requirements of modern wireless protocols while utilizing the rich general purpose PC development environment. Experimental results obtained from the hardware implementation of ATMA closely mirror the simulation results obtained for a single hop network with 4 nodes.
Chart Card: feasibility of a tool for improving emergency department care in sickle cell disease.
Neumayr, Lynne; Pringle, Steven; Giles, Stephen; Quirolo, Keith C; Paulukonis, Susan; Vichinsky, Elliott P; Treadwell, Marsha J
2010-11-01
Patients with sickle cell disease (SCD) are concerned with emergency department care, including time to treatment and staff attitudes and knowledge. Providers are concerned about rapid access to patient information and SCD treatment protocols. A software application that stores and retrieves encrypted personal medical information on a plastic credit card-sized Chart Card was designed. To determine the applicability and feasibility of the Chart Card on patient satisfaction with emergency department care and provider accessibility to patient information and care protocols. One-half of 44 adults (aged -18 years) and 50 children with SCD were randomized to either the Chart Card or usual care. Patient satisfaction was surveyed pre and post implementation of the Chart Card program, and emergency department staff was surveyed about familiarity with SCD treatment protocols. Patient satisfaction with emergency department care and efficacy in health care increased post Chart Card implementation. Providers valued immediate access to patient information and SCD treatment guidelines. The technology has potential for application in the treatment of other illnesses in other settings.
[Impacts of computer- and media usage on the personality development of children and young people].
Süss, D
2007-02-01
The psychosocial development of children and the youth today is embedded in a media society. Socialization is understood as an interaction between the individual and its environment. Media are used to accomplish developmental tasks and media literacy has become a developmental task in itself. The presence of media in all social subsystems of every day life alters the general socialization processes, like the integration into peergroups or the detaching from the parents. Media can play the role of resources or the role of risk factors for the development. Empirical research shows that children's access to media is more and more enhanced and an increasing amount of time is spent with screen media. Media socialization of the young people takes on the mode of self education, but children are dependent on adults to prevent negative media effects such as Internet addiction. If media usage is part of an environment which is adequat for children's wellbeeing, the psychosocial development will not be affected negatively by the media.
An Educators' Guide to Information Access across the Internet.
ERIC Educational Resources Information Center
Hazari, Sunil
1994-01-01
A discussion of tools available for use of the Internet, particularly by college and university educators and students, offers information on use of various services, including electronic mailing list servers, data communications protocols for networking, inter-host connections, file transfer protocol, gopher software, bibliographic searching,…
47 CFR 79.4 - Closed captioning of video programming delivered using Internet protocol.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 47 Telecommunication 4 2014-10-01 2014-10-01 false Closed captioning of video programming... (CONTINUED) BROADCAST RADIO SERVICES ACCESSIBILITY OF VIDEO PROGRAMMING Video Programming Owners, Providers, and Distributors § 79.4 Closed captioning of video programming delivered using Internet protocol. (a...
77 FR 6094 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-07
....-International Atomic Energy Agency Additional Protocol. Under the U.S.-International Atomic Energy Agency (IAEA...-related activities to the IAEA and potentially provide access to IAEA inspectors for verification purposes. The U.S.-IAEA Additional Protocol permits the United States unilaterally to declare exclusions from...
Park, Hyojung; Rodgers, Shelly; McElroy, Jane A; Everett, Kevin
2018-01-01
The authors examined the influence of social media involvement on health issues in sexual and gender minorities (SGMs). Demographic and technological characteristics of social media users and nonusers were identified, and the influence of social media involvement on these factors was assessed for its potential to influence health information needs and preferences. A survey of 2,274 SGM individuals revealed that age, sexual orientation, number of Internet access points, and use of smartphones predicted levels of social media involvement. Results suggest that a broader range of traditional and nontraditional communication channels is needed to meet a diversity of health information needs in SGMs.
Social Media as Catalyzer for Connected Health: Hype or Hope? Perspectives from IMIA Working Groups.
Fernandez-Luque, Luis; Vilmarlund, Vivian; Borycki, Elizabeth; Schulz, Stefan; Kuziemsky, Craig; Marschollek, Michael; Kulikowski, Casimir A
2016-01-01
The Internet and social media are becoming ubiquitous technologies that are transforming the health sector. Social media has become an avenue for accessing, creating and sharing health information among patients and healthcare professionals. Furthermore, social media has become a key feature in many eHealth solutions, including wearable technologies, Big Data solutions, eLearning systems, Serious Games, Medical imaging, etc. These hyper-connected technologies are facilitating a paradigm shift towards more connected health. In this panel, representatives of different IMIA Working Groups will explore how both hope and hype contribute to social media's catalyzing role in creating connected health solutions.
Roy-Chaudhury, P; Lee, T; Duncan, H; El-Khatib, M
2009-01-01
Hemodialysis (HD) vascular access dysfunction is currently a huge clinical problem for which there are no effective therapies. There are, however, a number of promising technologies that are currently at the experimental or clinical trial stage. We believe that the application of these novel technologies in combination with better clinical protocols for vascular access care could significantly reduce the current problems associated with HD vascular access.
ERIC Educational Resources Information Center
Chen, Ching-chih
1996-01-01
Summarizes how the Library of Congress' digital library collections can be accessed globally via the Internet and World Wide Web. Outlines the resources found in each of the various access points: gopher, online catalog, library and legislative Web sites, legal and copyright databases, and FTP (file transfer protocol) sites. (LAM)
Social Media, Power, and the Future of VBAC.
Romano, Amy M; Gerber, Hilary; Andrews, Desirre
2010-01-01
The Internet has been called a disruptive technology because it has shifted power and altered the economics of doing business, whether that business is selling books or providing health care. Social media have accelerated the pace of disruption by enabling interactive information sharing and blurring the lines between the "producers" and "consumers" of knowledge, goods, and services. In the wake of the National Institutes of Health Consensus Development Conference on Vaginal Birth After Cesarean (VBAC) and major national recommendations for maternity care reform, activated, engaged consumers face an unprecedented opportunity to drive meaningful changes in VBAC access and safety. This article examines the role of social networks in informing women about VBAC, producing low-cost, accessible decision aids, and enabling multi-stakeholder collaborations toward workable solutions that remove barriers women face in accessing VBAC.
NASA Astrophysics Data System (ADS)
Hortos, William S.
2003-07-01
Mobile ad hoc networking (MANET) supports self-organizing, mobile infrastructures and enables an autonomous network of mobile nodes that can operate without a wired backbone. Ad hoc networks are characterized by multihop, wireless connectivity via packet radios and by the need for efficient dynamic protocols. All routers are mobile and can establish connectivity with other nodes only when they are within transmission range. Importantly, ad hoc wireless nodes are resource-constrained, having limited processing, memory, and battery capacity. Delivery of high quality-ofservice (QoS), real-time multimedia services from Internet-based applications over a MANET is a challenge not yet achieved by proposed Internet Engineering Task Force (IETF) ad hoc network protocols in terms of standard performance metrics such as end-to-end throughput, packet error rate, and delay. In the distributed operations of route discovery and maintenance, strong interaction occurs across MANET protocol layers, in particular, the physical, media access control (MAC), network, and application layers. The QoS requirements are specified for the service classes by the application layer. The cross-layer design must also satisfy the battery-limited energy constraints, by minimizing the distributed power consumption at the nodes and of selected routes. Interactions across the layers are modeled in terms of the set of concatenated design parameters including associated energy costs. Functional dependencies of the QoS metrics are described in terms of the concatenated control parameters. New cross-layer designs are sought that optimize layer interdependencies to achieve the "best" QoS available in an energy-constrained, time-varying network. The protocol design, based on a reactive MANET protocol, adapts the provisioned QoS to dynamic network conditions and residual energy capacities. The cross-layer optimization is based on stochastic dynamic programming conditions derived from time-dependent models of MANET packet flows. Regulation of network behavior is modeled by the optimal control of the conditional rates of multivariate point processes (MVPPs); these rates depend on the concatenated control parameters through a change of probability measure. The MVPP models capture behavior of many service applications, e.g., voice, video and the self-similar behavior of Internet data sessions. Performance verification of the cross-layer protocols, derived from the dynamic programming conditions, can be achieved by embedding the conditions in a reactive routing protocol for MANETs, in a simulation environment, such as the wireless extension of ns-2. A canonical MANET scenario consists of a distributed collection of battery-powered laptops or hand-held terminals, capable of hosting multimedia applications. Simulation details and performance tradeoffs, not presented, remain for a sequel to the paper.
Saade, Charbel; Al-Hamra, Salam; Al-Mohiy, Hussain; El-Merhi, Fadi
2016-05-01
A patient with a history of mitral valve prolapse and regurgitation that was corrected with a mitral ring repair 15 years earlier received a diagnosis of anomalous left coronary artery arising from the pulmonary artery and underwent repair. Coronary computed tomography angiography (CTA) was employed to image the patient before surgical intervention. Synchronizing contrast media administration to opacify the right coronary artery in the arterial phase and the left coronary artery in the venous phase required a test-bolus approach. Matching compromised cardiovascular dynamics with patient-specific contrast media administration protocols was improved considerably with the use of a test-bolus technique during electrocardiography-gated coronary CTA.