Sample records for medium access protocol

  1. Traffic Adaptive Energy Efficient and Low Latency Medium Access Control for Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Yadav, Rajesh; Varma, Shirshu; Malaviya, N.

    2008-05-01

    Medium access control for wireless sensor networks has been a very active research area in the recent years. The traditional wireless medium access control protocol such as IEEE 802.11 is not suitable for the sensor network application because these are battery powered. The recharging of these sensor nodes is expensive and also not possible. The most of the literature in the medium access for the sensor network focuses on the energy efficiency. The proposed MAC protocol solves the energy inefficiency caused by idle listening, control packet overhead and overhearing taking nodes latency into consideration based on the network traffic. Simulation experiments have been performed to demonstrate the effectiveness of the proposed approach. The validation of the simulation results of the proposed MAC has been done by comparing it with the analytical model. This protocol has been simulated in Network Simulator ns-2.

  2. Medium Access Control Protocols for Cognitive Radio Ad Hoc Networks: A Survey

    PubMed Central

    Islam, A. K. M. Muzahidul; Baharun, Sabariah; Mansoor, Nafees

    2017-01-01

    New wireless network paradigms will demand higher spectrum use and availability to cope with emerging data-hungry devices. Traditional static spectrum allocation policies cause spectrum scarcity, and new paradigms such as Cognitive Radio (CR) and new protocols and techniques need to be developed in order to have efficient spectrum usage. Medium Access Control (MAC) protocols are accountable for recognizing free spectrum, scheduling available resources and coordinating the coexistence of heterogeneous systems and users. This paper provides an ample review of the state-of-the-art MAC protocols, which mainly focuses on Cognitive Radio Ad Hoc Networks (CRAHN). First, a description of the cognitive radio fundamental functions is presented. Next, MAC protocols are divided into three groups, which are based on their channel access mechanism, namely time-slotted protocol, random access protocol and hybrid protocol. In each group, a detailed and comprehensive explanation of the latest MAC protocols is presented, as well as the pros and cons of each protocol. A discussion on future challenges for CRAHN MAC protocols is included with a comparison of the protocols from a functional perspective. PMID:28926952

  3. Channel MAC Protocol for Opportunistic Communication in Ad Hoc Wireless Networks

    NASA Astrophysics Data System (ADS)

    Ashraf, Manzur; Jayasuriya, Aruna; Perreau, Sylvie

    2008-12-01

    Despite significant research effort, the performance of distributed medium access control methods has failed to meet theoretical expectations. This paper proposes a protocol named "Channel MAC" performing a fully distributed medium access control based on opportunistic communication principles. In this protocol, nodes access the channel when the channel quality increases beyond a threshold, while neighbouring nodes are deemed to be silent. Once a node starts transmitting, it will keep transmitting until the channel becomes "bad." We derive an analytical throughput limit for Channel MAC in a shared multiple access environment. Furthermore, three performance metrics of Channel MAC—throughput, fairness, and delay—are analysed in single hop and multihop scenarios using NS2 simulations. The simulation results show throughput performance improvement of up to 130% with Channel MAC over IEEE 802.11. We also show that the severe resource starvation problem (unfairness) of IEEE 802.11 in some network scenarios is reduced by the Channel MAC mechanism.

  4. An Ultra-low-power Medium Access Control Protocol for Body Sensor Network.

    PubMed

    Li, Huaming; Tan, Jindong

    2005-01-01

    In this paper, a medium access control (MAC) protocol designed for Body Sensor Network (BSN-MAC) is proposed. BSN-MAC is an adaptive, feedback-based and IEEE 802.15.4-compatible MAC protocol. Due to the traffic coupling and sensor diversity characteristics of BSNs, common MAC protocols can not satisfy the unique requirements of the biomedical sensors in BSN. BSN-MAC exploits the feedback information from the deployed sensors to form a closed-loop control of the MAC parameters. A control algorithm is proposed to enable the BSN coordinator to adjust parameters of the IEEE 802.15.4 superframe to achieve both energy efficiency and low latency on energy critical nodes. We evaluate the performance of BSN-MAC using energy efficiency as the primary metric.

  5. Synthesizing Existing CSMA and TDMA Based MAC Protocols for VANETs

    PubMed Central

    Huang, Jiawei; Li, Qi; Zhong, Shaohua; Liu, Lianhai; Zhong, Ping; Wang, Jianxin; Ye, Jin

    2017-01-01

    Many Carrier Sense Multiple Access (CSMA) and Time Division Multiple Access (TDMA) based medium access control (MAC) protocols for vehicular ad hoc networks (VANETs) have been proposed recently. Contrary to the common perception that they are competitors, we argue that the underlying strategies used in these MAC protocols are complementary. Based on this insight, we design CTMAC, a MAC protocol that synthesizes existing strategies; namely, random accessing channel (used in CSMA-style protocols) and arbitral reserving channel (used in TDMA-based protocols). CTMAC swiftly changes its strategy according to the vehicle density, and its performance is better than the state-of-the-art protocols. We evaluate CTMAC using at-scale simulations. Our results show that CTMAC reduces the channel completion time and increases the network goodput by 45% for a wide range of application workloads and network settings. PMID:28208590

  6. A hybrid MAC protocol design for energy-efficient very-high-throughput millimeter wave, wireless sensor communication networks

    NASA Astrophysics Data System (ADS)

    Jian, Wei; Estevez, Claudio; Chowdhury, Arshad; Jia, Zhensheng; Wang, Jianxin; Yu, Jianguo; Chang, Gee-Kung

    2010-12-01

    This paper presents an energy-efficient Medium Access Control (MAC) protocol for very-high-throughput millimeter-wave (mm-wave) wireless sensor communication networks (VHT-MSCNs) based on hybrid multiple access techniques of frequency division multiplexing access (FDMA) and time division multiplexing access (TDMA). An energy-efficient Superframe for wireless sensor communication network employing directional mm-wave wireless access technologies is proposed for systems that require very high throughput, such as high definition video signals, for sensing, processing, transmitting, and actuating functions. Energy consumption modeling for each network element and comparisons among various multi-access technologies in term of power and MAC layer operations are investigated for evaluating the energy-efficient improvement of proposed MAC protocol.

  7. Scalable Lunar Surface Networks and Adaptive Orbit Access

    NASA Technical Reports Server (NTRS)

    Wang, Xudong

    2015-01-01

    Teranovi Technologies, Inc., has developed innovative network architecture, protocols, and algorithms for both lunar surface and orbit access networks. A key component of the overall architecture is a medium access control (MAC) protocol that includes a novel mechanism of overlaying time division multiple access (TDMA) and carrier sense multiple access with collision avoidance (CSMA/CA), ensuring scalable throughput and quality of service. The new MAC protocol is compatible with legacy Institute of Electrical and Electronics Engineers (IEEE) 802.11 networks. Advanced features include efficiency power management, adaptive channel width adjustment, and error control capability. A hybrid routing protocol combines the advantages of ad hoc on-demand distance vector (AODV) routing and disruption/delay-tolerant network (DTN) routing. Performance is significantly better than AODV or DTN and will be particularly effective for wireless networks with intermittent links, such as lunar and planetary surface networks and orbit access networks.

  8. Using Internet Audio to Enhance Online Accessibility

    ERIC Educational Resources Information Center

    Schwartz, Linda Matula

    2004-01-01

    Accessibility to online education programs is an important factor that requires continued research, improvement, and regulation. Particularly valuable in the enhancement of online accessibility is the Voice-over Internet Protocol (VOIP) medium. VOIP compresses analog voice data and converts it into digital packets for transmission over the…

  9. Energy Efficient Medium Access Control Protocol for Clustered Wireless Sensor Networks with Adaptive Cross-Layer Scheduling.

    PubMed

    Sefuba, Maria; Walingo, Tom; Takawira, Fambirai

    2015-09-18

    This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols.

  10. Energy Efficient Medium Access Control Protocol for Clustered Wireless Sensor Networks with Adaptive Cross-Layer Scheduling

    PubMed Central

    Sefuba, Maria; Walingo, Tom; Takawira, Fambirai

    2015-01-01

    This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols. PMID:26393608

  11. Design of the frame structure for a multiservice interactive system using ATM-PON

    NASA Astrophysics Data System (ADS)

    Nam, Jae-Hyun; Jang, Jongwook; Lee, Jung-Tae

    1998-10-01

    The MAC (Medium Access Control) protocol controls B-NT1s' (Optical Network Unit) access to the shared capacity on the PON, this protocol is very important if TDMA (Time Division Multiple Access) multiplexing is used on the upstream. To control the upstream traffic some kind of access protocol has to be implemented. There are roughly two different approaches to use request cells: in a collision free way or such that collisions in a request slot are allowed. It is the objective of this paper to describe a MAC-protocol structure that supports both approaches and hybrids of it. In our paper we grantee the QoS (Quality of Service) of each B-NT1 through LOC, LOV, LOA field that are the length field of the transmitted cell at each B-NT1. Each B-NT1 transmits its status of request on request cell.

  12. The Historian and Electronic Research: File Transfer Protocol (FTP).

    ERIC Educational Resources Information Center

    McCarthy, Michael J.

    1993-01-01

    Asserts that the Internet will become the academic communication medium for historians in the 1990s. Describes the "file transfer protocol" (FTP) access approach to the Internet and discusses its significant for historical research. Includes instructions for using FTP and a list of history-related FTP sites. (CFR)

  13. Performance Analysis of IEEE 802.15.3 MAC Protocol with Different ACK Polices

    NASA Astrophysics Data System (ADS)

    Mehta, S.; Kwak, K. S.

    The wireless personal area network (WPAN) is an emerging wireless technology for future short range indoor and outdoor communication applications. The IEEE 802.15.3 medium access control (MAC) is proposed, specially, for short range high data rates applications, to coordinate the access to the wireless medium among the competing devices. This paper uses analytical model to study the performance analysis of WPAN (IEEE 802.15.3) MAC in terms of throughput, efficient bandwidth utilization, and delay with various acknowledgment schemes under different parameters. Also, some important observations are obtained, which can be very useful to the protocol architectures. Finally, we come up with some important research issues to further investigate the possible improvements in the WPAN MAC.

  14. Energy-efficient boarder node medium access control protocol for wireless sensor networks.

    PubMed

    Razaque, Abdul; Elleithy, Khaled M

    2014-03-12

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi-synchronous feature with a low duty cycle, which is advantageous for reducing the latency and energy consumption for several WSN application areas to improve the throughput. BN-MAC uses a unique window slot size to enhance the contention resolution issue for improved throughput. BN-MAC also prefers to communicate within a one-hop destination using Anycast, which maintains load balancing to maintain network reliability. BN-MAC is introduced with the goal of supporting four major application areas: monitoring and behavioral areas, controlling natural disasters, human-centric applications, and tracking mobility and static home automation devices from remote places. These application areas require a congestion-free mobility-supported MAC protocol to guarantee reliable data delivery. BN-MAC was evaluated using network simulator-2 (ns2) and compared with other hybrid MAC protocols, such as Zebra medium access control (Z-MAC), advertisement-based MAC (A-MAC), Speck-MAC, adaptive duty cycle SMAC (ADC-SMAC), and low-power real-time medium access control (LPR-MAC). The simulation results indicate that BN-MAC is a robust and energy-efficient protocol that outperforms other hybrid MAC protocols in the context of quality of service (QoS) parameters, such as energy consumption, latency, throughput, channel access time, successful delivery rate, coverage efficiency, and average duty cycle.

  15. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    PubMed Central

    Razaque, Abdul; Elleithy, Khaled M.

    2014-01-01

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi-synchronous feature with a low duty cycle, which is advantageous for reducing the latency and energy consumption for several WSN application areas to improve the throughput. BN-MAC uses a unique window slot size to enhance the contention resolution issue for improved throughput. BN-MAC also prefers to communicate within a one-hop destination using Anycast, which maintains load balancing to maintain network reliability. BN-MAC is introduced with the goal of supporting four major application areas: monitoring and behavioral areas, controlling natural disasters, human-centric applications, and tracking mobility and static home automation devices from remote places. These application areas require a congestion-free mobility-supported MAC protocol to guarantee reliable data delivery. BN-MAC was evaluated using network simulator-2 (ns2) and compared with other hybrid MAC protocols, such as Zebra medium access control (Z-MAC), advertisement-based MAC (A-MAC), Speck-MAC, adaptive duty cycle SMAC (ADC-SMAC), and low-power real-time medium access control (LPR-MAC). The simulation results indicate that BN-MAC is a robust and energy-efficient protocol that outperforms other hybrid MAC protocols in the context of quality of service (QoS) parameters, such as energy consumption, latency, throughput, channel access time, successful delivery rate, coverage efficiency, and average duty cycle. PMID:24625737

  16. OCP: Opportunistic Carrier Prediction for Wireless Networks

    DTIC Science & Technology

    2008-08-01

    Many protocols have been proposed for medium access control in wireless networks. MACA [13], MACAW [3], and FAMA [8] are the earlier proposals for...world performance of carrier sense. In Proceedings of ACM SIGCOMM E-WIND Workshop, 2005. [13] P. Karn. MACA : A new channel access method for packet radio

  17. Underwater acoustic wireless sensor networks: advances and future trends in physical, MAC and routing layers.

    PubMed

    Climent, Salvador; Sanchez, Antonio; Capella, Juan Vicente; Meratnia, Nirvana; Serrano, Juan Jose

    2014-01-06

    This survey aims to provide a comprehensive overview of the current research on underwater wireless sensor networks, focusing on the lower layers of the communication stack, and envisions future trends and challenges. It analyzes the current state-of-the-art on the physical, medium access control and routing layers. It summarizes their security threads and surveys the currently proposed studies. Current envisioned niches for further advances in underwater networks research range from efficient, low-power algorithms and modulations to intelligent, energy-aware routing and medium access control protocols.

  18. Performance comparison of token ring protocols for hard-real-time communication

    NASA Technical Reports Server (NTRS)

    Kamat, Sanjay; Zhao, Wei

    1992-01-01

    The ability to guarantee the deadlines of synchronous messages while maintaining a good aggregate throughput is an important consideration in the design of distributed real-time systems. In this paper, we study two token ring protocols, the priority driven protocol and the timed token protocol, for their suitability for hard real-time systems. Both these protocols use a token to control access to the transmission medium. In a priority driven protocol, messages are assigned priorities and the protocol ensures that messages are transmitted in the order of their priorities. Timed token protocols do not provide for priority arbitration but ensure that the maximum access delay for a station is bounded. For both protocols, we first derive the schedulability conditions under which the transmission deadlines of a given set of synchronous messages can be guaranteed. Subsequently, we use these schedulability conditions to quantitatively compare the average case behavior of the protocols. This comparison demonstrates that each of the protocols has its domain of superior performance and neither dominates the other for the entire range of operating conditions.

  19. A low power medium access control protocol for wireless medical sensor networks.

    PubMed

    Lamprinos, I; Prentza, A; Sakka, E; Koutsouris, D

    2004-01-01

    The concept of a wireless integrated network of sensors, already applied in several sectors of our everyday life, such as security, transportation and environment monitoring, can as well provide an advanced monitor and control resource for healthcare services. By networking medical sensors wirelessly, attaching them in patient's body, we create the appropriate infrastructure for continuous and real-time monitoring of patient without discomforting him. This infrastructure can improve healthcare by providing the means for flexible acquisition of vital signs, while at the same time it provides more convenience to the patient. Given the type of wireless network, traditional medium access control (MAC) protocols cannot take advantage of the application specific requirements and information characteristics occurring in medical sensor networks, such as the demand for low power consumption and the rather limited and asymmetric data traffic. In this paper, we present the architecture of a low power MAC protocol, designated to support wireless networks of medical sensors. This protocol aims to improve energy efficiency by exploiting the inherent application features and requirements. It is oriented towards the avoidance of main energy wastage sources, such as idle listening, collision and power outspending.

  20. High-Bandwidth Tactical-Network Data Analysis in a High-Performance-Computing (HPC) Environment: Transport Protocol (Transmission Control Protocol/User Datagram Protocol [TCP/UDP]) Analysis

    DTIC Science & Technology

    2015-09-01

    the network Mac8 Medium Access Control ( Mac ) (Ethernet) address observed as destination for outgoing packets subsessionid8 Zero-based index of...15. SUBJECT TERMS tactical networks, data reduction, high-performance computing, data analysis, big data 16. SECURITY CLASSIFICATION OF: 17...Integer index of row cts_deid Device (instrument) Identifier where observation took place cts_collpt Collection point or logical observation point on

  1. An extended smart utilization medium access control (ESU-MAC) protocol for ad hoc wireless systems

    NASA Astrophysics Data System (ADS)

    Vashishtha, Jyoti; Sinha, Aakash

    2006-05-01

    The demand for spontaneous setup of a wireless communication system has increased in recent years for areas like battlefield, disaster relief operations etc., where a pre-deployment of network infrastructure is difficult or unavailable. A mobile ad-hoc network (MANET) is a promising solution, but poses a lot of challenges for all the design layers, specifically medium access control (MAC) layer. Recent existing works have used the concepts of multi-channel and power control in designing MAC layer protocols. SU-MAC developed by the same authors, efficiently uses the 'available' data and control bandwidth to send control information and results in increased throughput via decreasing contention on the control channel. However, SU-MAC protocol was limited for static ad-hoc network and also faced the busy-receiver node problem. We present the Extended SU-MAC (ESU-MAC) protocol which works mobile nodes. Also, we significantly improve the scheme of control information exchange in ESU-MAC to overcome the busy-receiver node problem and thus, further avoid the blockage of control channel for longer periods of time. A power control scheme is used as before to reduce interference and to effectively re-use the available bandwidth. Simulation results show that ESU-MAC protocol is promising for mobile, ad-hoc network in terms of reduced contention at the control channel and improved throughput because of channel re-use. Results show a considerable increase in throughput compared to SU-MAC which could be attributed to increased accessibility of control channel and improved utilization of data channels due to superior control information exchange scheme.

  2. Underwater Acoustic Wireless Sensor Networks: Advances and Future Trends in Physical, MAC and Routing Layers

    PubMed Central

    Climent, Salvador; Sanchez, Antonio; Capella, Juan Vicente; Meratnia, Nirvana; Serrano, Juan Jose

    2014-01-01

    This survey aims to provide a comprehensive overview of the current research on underwater wireless sensor networks, focusing on the lower layers of the communication stack, and envisions future trends and challenges. It analyzes the current state-of-the-art on the physical, medium access control and routing layers. It summarizes their security threads and surveys the currently proposed studies. Current envisioned niches for further advances in underwater networks research range from efficient, low-power algorithms and modulations to intelligent, energy-aware routing and medium access control protocols. PMID:24399155

  3. Integrated multi-channel vehicle-vehicle and vehicle-roadside communications for ITS

    DOT National Transportation Integrated Search

    2008-12-01

    This research describes a medium access control (MAC) protocol to Enable multi-channel operation for dedicated short-range communication (DSRC). In particular, we focus on the challenge of supporting potentially high-bandwidth commercial or infotainm...

  4. A Fair Contention Access Scheme for Low-Priority Traffic in Wireless Body Area Networks

    PubMed Central

    Sajeel, Muhammad; Bashir, Faisal; Asfand-e-yar, Muhammad; Tauqir, Muhammad

    2017-01-01

    Recently, wireless body area networks (WBANs) have attracted significant consideration in ubiquitous healthcare. A number of medium access control (MAC) protocols, primarily derived from the superframe structure of the IEEE 802.15.4, have been proposed in literature. These MAC protocols aim to provide quality of service (QoS) by prioritizing different traffic types in WBANs. A contention access period (CAP)with high contention in priority-based MAC protocols can result in higher number of collisions and retransmissions. During CAP, traffic classes with higher priority are dominant over low-priority traffic; this has led to starvation of low-priority traffic, thus adversely affecting WBAN throughput, delay, and energy consumption. Hence, this paper proposes a traffic-adaptive priority-based superframe structure that is able to reduce contention in the CAP period, and provides a fair chance for low-priority traffic. Simulation results in ns-3 demonstrate that the proposed MAC protocol, called traffic- adaptive priority-based MAC (TAP-MAC), achieves low energy consumption, high throughput, and low latency compared to the IEEE 802.15.4 standard, and the most recent priority-based MAC protocol, called priority-based MAC protocol (PA-MAC). PMID:28832495

  5. A MAC Protocol for Medical Monitoring Applications of Wireless Body Area Networks

    PubMed Central

    Shu, Minglei; Yuan, Dongfeng; Zhang, Chongqing; Wang, Yinglong; Chen, Changfang

    2015-01-01

    Targeting the medical monitoring applications of wireless body area networks (WBANs), a hybrid medium access control protocol using an interrupt mechanism (I-MAC) is proposed to improve the energy and time slot utilization efficiency and to meet the data delivery delay requirement at the same time. Unlike existing hybrid MAC protocols, a superframe structure with a longer length is adopted to avoid unnecessary beacons. The time slots are mostly allocated to nodes with periodic data sources. Short interruption slots are inserted into the superframe to convey the urgent data and to guarantee the real-time requirements of these data. During these interruption slots, the coordinator can break the running superframe and start a new superframe. A contention access period (CAP) is only activated when there are more data that need to be delivered. Experimental results show the effectiveness of the proposed MAC protocol in WBANs with low urgent traffic. PMID:26046596

  6. MAC Protocol for Ad Hoc Networks Using a Genetic Algorithm

    PubMed Central

    Elizarraras, Omar; Panduro, Marco; Méndez, Aldo L.

    2014-01-01

    The problem of obtaining the transmission rate in an ad hoc network consists in adjusting the power of each node to ensure the signal to interference ratio (SIR) and the energy required to transmit from one node to another is obtained at the same time. Therefore, an optimal transmission rate for each node in a medium access control (MAC) protocol based on CSMA-CDMA (carrier sense multiple access-code division multiple access) for ad hoc networks can be obtained using evolutionary optimization. This work proposes a genetic algorithm for the transmission rate election considering a perfect power control, and our proposition achieves improvement of 10% compared with the scheme that handles the handshaking phase to adjust the transmission rate. Furthermore, this paper proposes a genetic algorithm that solves the problem of power combining, interference, data rate, and energy ensuring the signal to interference ratio in an ad hoc network. The result of the proposed genetic algorithm has a better performance (15%) compared to the CSMA-CDMA protocol without optimizing. Therefore, we show by simulation the effectiveness of the proposed protocol in terms of the throughput. PMID:25140339

  7. Cooperative Energy Harvesting-Adaptive MAC Protocol for WBANs

    PubMed Central

    Esteves, Volker; Antonopoulos, Angelos; Kartsakli, Elli; Puig-Vidal, Manel; Miribel-Català, Pere; Verikoukis, Christos

    2015-01-01

    In this paper, we introduce a cooperative medium access control (MAC) protocol, named cooperative energy harvesting (CEH)-MAC, that adapts its operation to the energy harvesting (EH) conditions in wireless body area networks (WBANs). In particular, the proposed protocol exploits the EH information in order to set an idle time that allows the relay nodes to charge their batteries and complete the cooperation phase successfully. Extensive simulations have shown that CEH-MAC significantly improves the network performance in terms of throughput, delay and energy efficiency compared to the cooperative operation of the baseline IEEE 802.15.6 standard. PMID:26029950

  8. Approximate Synchrony: An Abstraction for Distributed Almost Synchronous Systems

    DTIC Science & Technology

    2015-05-29

    finding bugs. Verification of the TSCH Protocol. Time Synchronized Channel Hopping (TSCH) is a Medium Access Control scheme that enables low power...allotted by the schedule and remain in sleep mode otherwise. In the ab- sence of precise time-synchronization, the time-slots across nodes would not be

  9. GREENER AND RAPID ACCESS TO BIO-ACTIVE HETEROCYCLES: ROOM TEMPERATURE SYNTHESIS OF PYRAZOLES AND DIAZEPINES IN AQUEOUS MEDIUM

    EPA Science Inventory

    An expeditious room temperature synthesis of pyrazoles and diazepines by condensation of hydrazines/hydrazides and diamines with various 1,3-diketones is described. This greener protocol was catalyzed by polystyrene supported sulfonic acid (PSSA) and proceeded efficiently in wate...

  10. A survey of system architecture requirements for health care-based wireless sensor networks.

    PubMed

    Egbogah, Emeka E; Fapojuwo, Abraham O

    2011-01-01

    Wireless Sensor Networks (WSNs) have emerged as a viable technology for a vast number of applications, including health care applications. To best support these health care applications, WSN technology can be adopted for the design of practical Health Care WSNs (HCWSNs) that support the key system architecture requirements of reliable communication, node mobility support, multicast technology, energy efficiency, and the timely delivery of data. Work in the literature mostly focuses on the physical design of the HCWSNs (e.g., wearable sensors, in vivo embedded sensors, et cetera). However, work towards enhancing the communication layers (i.e., routing, medium access control, et cetera) to improve HCWSN performance is largely lacking. In this paper, the information gleaned from an extensive literature survey is shared in an effort to fortify the knowledge base for the communication aspect of HCWSNs. We highlight the major currently existing prototype HCWSNs and also provide the details of their routing protocol characteristics. We also explore the current state of the art in medium access control (MAC) protocols for WSNs, for the purpose of seeking an energy efficient solution that is robust to mobility and delivers data in a timely fashion. Furthermore, we review a number of reliable transport layer protocols, including a network coding based protocol from the literature, that are potentially suitable for delivering end-to-end reliability of data transmitted in HCWSNs. We identify the advantages and disadvantages of the reviewed MAC, routing, and transport layer protocols as they pertain to the design and implementation of a HCWSN. The findings from this literature survey will serve as a useful foundation for designing a reliable HCWSN and also contribute to the development and evaluation of protocols for improving the performance of future HCWSNs. Open issues that required further investigations are highlighted.

  11. Optimizing the MAC Protocol in Localization Systems Based on IEEE 802.15.4 Networks

    PubMed Central

    Claver, Jose M.; Ezpeleta, Santiago

    2017-01-01

    Radio frequency signals are commonly used in the development of indoor localization systems. The infrastructure of these systems includes some beacons placed at known positions that exchange radio packets with users to be located. When the system is implemented using wireless sensor networks, the wireless transceivers integrated in the network motes are usually based on the IEEE 802.15.4 standard. But, the CSMA-CA, which is the basis for the medium access protocols in this category of communication systems, is not suitable when several users want to exchange bursts of radio packets with the same beacon to acquire the radio signal strength indicator (RSSI) values needed in the location process. Therefore, new protocols are necessary to avoid the packet collisions that appear when multiple users try to communicate with the same beacons. On the other hand, the RSSI sampling process should be carried out very quickly because some systems cannot tolerate a large delay in the location process. This is even more important when the RSSI sampling process includes measures with different signal power levels or frequency channels. The principal objective of this work is to speed up the RSSI sampling process in indoor localization systems. To achieve this objective, the main contribution is the proposal of a new MAC protocol that eliminates the medium access contention periods and decreases the number of packet collisions to accelerate the RSSI collection process. Moreover, the protocol increases the overall network throughput taking advantage of the frequency channel diversity. The presented results show the suitability of this protocol for reducing the RSSI gathering delay and increasing the network throughput in simulated and real environments. PMID:28684666

  12. Optimizing the MAC Protocol in Localization Systems Based on IEEE 802.15.4 Networks.

    PubMed

    Pérez-Solano, Juan J; Claver, Jose M; Ezpeleta, Santiago

    2017-07-06

    Radio frequency signals are commonly used in the development of indoor localization systems. The infrastructure of these systems includes some beacons placed at known positions that exchange radio packets with users to be located. When the system is implemented using wireless sensor networks, the wireless transceivers integrated in the network motes are usually based on the IEEE 802.15.4 standard. But, the CSMA-CA, which is the basis for the medium access protocols in this category of communication systems, is not suitable when several users want to exchange bursts of radio packets with the same beacon to acquire the radio signal strength indicator (RSSI) values needed in the location process. Therefore, new protocols are necessary to avoid the packet collisions that appear when multiple users try to communicate with the same beacons. On the other hand, the RSSI sampling process should be carried out very quickly because some systems cannot tolerate a large delay in the location process. This is even more important when the RSSI sampling process includes measures with different signal power levels or frequency channels. The principal objective of this work is to speed up the RSSI sampling process in indoor localization systems. To achieve this objective, the main contribution is the proposal of a new MAC protocol that eliminates the medium access contention periods and decreases the number of packet collisions to accelerate the RSSI collection process. Moreover, the protocol increases the overall network throughput taking advantage of the frequency channel diversity. The presented results show the suitability of this protocol for reducing the RSSI gathering delay and increasing the network throughput in simulated and real environments.

  13. An Efficient and QoS Supported Multichannel MAC Protocol for Vehicular Ad Hoc Networks

    PubMed Central

    Tan, Guozhen; Yu, Chao

    2017-01-01

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety (transport efficiency and infotainment) applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. Different types of applications require different levels Quality-of-Service (QoS) support. Recently, transport efficiency and infotainment applications (e.g., electronic map download and Internet access) have received more and more attention, and this kind of applications is expected to become a big market driver in a near future. In this paper, we propose an Efficient and QoS supported Multichannel Medium Access Control (EQM-MAC) protocol for VANETs in a highway environment. The EQM-MAC protocol utilizes the service channel resources for non-safety message transmissions during the whole synchronization interval, and it dynamically adjusts minimum contention window size for different non-safety services according to the traffic conditions. Theoretical model analysis and extensive simulation results show that the EQM-MAC protocol can support QoS services, while ensuring the high saturation throughput and low transmission delay for non-safety applications. PMID:28991217

  14. Access Protocol For An Industrial Optical Fibre LAN

    NASA Astrophysics Data System (ADS)

    Senior, John M.; Walker, William M.; Ryley, Alan

    1987-09-01

    A structure for OSI levels 1 and 2 of a local area network suitable for use in a variety of industrial environments is reported. It is intended that the LAN will utilise optical fibre technology at the physical level and a hybrid of dynamically optimisable token passing and CSMA/CD techniques at the data link (IEEE 802 medium access control - logical link control) level. An intelligent token passing algorithm is employed which dynamically allocates tokens according to the known upper limits on the requirements of each device. In addition a system of stochastic tokens is used to increase efficiency when the stochastic traffic is significant. The protocol also allows user-defined priority systems to be employed and is suitable for distributed or centralised implementation. The results of computer simulated performance characteristics for the protocol using a star-ring topology are reported which demonstrate its ability to perform efficiently with the device and traffic loads anticipated within an industrial environment.

  15. Strategies for Optimal MAC Parameters Tuning in IEEE 802.15.6 Wearable Wireless Sensor Networks.

    PubMed

    Alam, Muhammad Mahtab; Ben Hamida, Elyes

    2015-09-01

    Wireless body area networks (WBAN) has penetrated immensely in revolutionizing the classical heath-care system. Recently, number of WBAN applications has emerged which introduce potential limits to existing solutions. In particular, IEEE 802.15.6 standard has provided great flexibility, provisions and capabilities to deal emerging applications. In this paper, we investigate the application-specific throughput analysis by fine-tuning the physical (PHY) and medium access control (MAC) parameters of the IEEE 802.15.6 standard. Based on PHY characterizations in narrow band, at the MAC layer, carrier sense multiple access collision avoidance (CSMA/CA) and scheduled access protocols are extensively analyzed. It is concluded that, IEEE 802.15.6 standard can satisfy most of the WBANs applications throughput requirements by maximum achieving 680 Kbps. However, those emerging applications which require high quality audio or video transmissions, standard is not able to meet their constraints. Moreover, delay, energy efficiency and successful packet reception are considered as key performance metrics for comparing the MAC protocols. CSMA/CA protocol provides the best results to meet the delay constraints of medical and non-medical WBAN applications. Whereas, the scheduled access approach, performs very well both in energy efficiency and packet reception ratio.

  16. Baby Steps: Starting Out on the World Wide Web.

    ERIC Educational Resources Information Center

    Simpson, Carol; McElmeel, Sharron L.

    1997-01-01

    While the Internet is the physical medium used to transport data, the World Wide Web is the collection of protocols and standards used to access the information. This article provides a basic explanation of what the Web is and describes common browser commands. Discusses graphic Web browsers; universal resource locators (URLs); file, message,…

  17. Vehicle Density Based Forwarding Protocol for Safety Message Broadcast in VANET

    PubMed Central

    Huang, Jiawei; Wang, Jianxin

    2014-01-01

    In vehicular ad hoc networks (VANETs), the medium access control (MAC) protocol is of great importance to provide time-critical safety applications. Contemporary multihop broadcast protocols in VANETs usually choose the farthest node in broadcast range as the forwarder to reduce the number of forwarding hops. However, in this paper, we demonstrate that the farthest forwarder may experience large contention delay in case of high vehicle density. We propose an IEEE 802.11-based multihop broadcast protocol VDF to address the issue of emergency message dissemination. To achieve the tradeoff between contention delay and forwarding hops, VDF adaptably chooses the forwarder according to the vehicle density. Simulation results show that, due to its ability to decrease the transmission collisions, the proposed protocol can provide significantly lower broadcast delay. PMID:25121125

  18. A metal-free general procedure for oxidation of secondary amines to nitrones.

    PubMed

    Gella, Carolina; Ferrer, Eric; Alibés, Ramon; Busqué, Félíx; de March, Pedro; Figueredo, Marta; Font, Josep

    2009-08-21

    An efficient and metal-free protocol for direct oxidation of secondary amines to nitrones has been developed, using Oxone in a biphasic basic medium as the sole oxidant. The method is general and tolerant with other functional groups or existing stereogenic centers, providing rapid access to enantiomerically pure compounds in good yields.

  19. Some Protocols For Optical-Fiber Digital Communications

    NASA Technical Reports Server (NTRS)

    Yeh, Cavour; Gerla, Mario

    1989-01-01

    One works best in heavy traffic, another, in light traffic. Three protocols proposed for digital communications among stations connected by passive taps to pair of uni-directional optical-fiber buses. Mediate round-robin, bounded-delay access to buses by all stations and particularly suited to fast transmission. Partly because transmission medium passive (no relay stations) and partly because protocols distribute control of network among all stations with provision for addition and deletion of stations (no control stations), communication network able to resist and recover from failures. Implicit token propagates in one direction on one bus and in opposite direction on other bus, minimizing interval of silence between end of one round and beginning of next.

  20. Common Submarine Radio Room: A Case Study of a System of Systems Approach

    DTIC Science & Technology

    2014-09-01

    38 a. Military Strategic and Tactical Relay System / Navy Extremely High Frequency Program / Navy Multiband Terminal...sigma MCAP medium data rate channel access protocol MILSATCOM military satellite communications MILSTAR military strategic and tactical relay system...challenges between the various communications systems throughout the U.S. military place additional burdens and vulnerabilities on the warfighter. While

  1. High-throughput and low-latency 60GHz small-cell network architectures over radio-over-fiber technologies

    NASA Astrophysics Data System (ADS)

    Pleros, N.; Kalfas, G.; Mitsolidou, C.; Vagionas, C.; Tsiokos, D.; Miliou, A.

    2017-01-01

    Future broadband access networks in the 5G framework will need to be bilateral, exploiting both optical and wireless technologies. This paper deals with new approaches and synergies on radio-over-fiber (RoF) technologies and how those can be leveraged to seamlessly converge wireless technology for agility and mobility with passive optical networks (PON)-based backhauling. The proposed convergence paradigm is based upon a holistic network architecture mixing mm-wave wireless access with photonic integration, dynamic capacity allocation and network coding schemes to enable high bandwidth and low-latency fixed and 60GHz wireless personal area communications for gigabit rate per user, proposing and deploying on top a Medium-Transparent MAC (MT-MAC) protocol as a low-latency bandwidth allocation mechanism. We have evaluated alternative network topologies between the central office (CO) and the access point module (APM) for data rates up to 2.5 Gb/s and SC frequencies up to 60 GHz. Optical network coding is demonstrated for SCM-based signaling to enhance bandwidth utilization and facilitate optical-wireless convergence in 5G applications, reporting medium-transparent network coding directly at the physical layer between end-users communicating over a RoF infrastructure. Towards equipping the physical layer with the appropriate agility to support MT-MAC protocols, a monolithic InP-based Remote Antenna Unit optoelectronic PIC interface is shown that ensures control over the optical resource allocation assisting at the same time broadband wireless service. Finally, the MT-MAC protocol is analysed and simulation and analytical theoretical results are presented that are found to be in good agreement confirming latency values lower than 1msec for small- to mid-load conditions.

  2. Protocol to Exploit Waiting Resources for UASNs.

    PubMed

    Hung, Li-Ling; Luo, Yung-Jeng

    2016-03-08

    The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN) is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  3. A review on transport layer protocol performance for delivering video on an adhoc network

    NASA Astrophysics Data System (ADS)

    Suherman; Suwendri; Al-Akaidi, Marwan

    2017-09-01

    The transport layer protocol is responsible for the end to end data transmission. Transmission control protocol (TCP) provides a reliable connection and user datagram protocol (UDP) offers fast but unguaranteed data transfer. Meanwhile, the 802.11 (wireless fidelity/WiFi) networks have been widely used as internet hotspots. This paper evaluates TCP, TCP variants and UDP performances for video transmission on an adhoc network. The transport protocol - medium access cross-layer is proposed by prioritizing TCP acknowledgement to reduce delay. The NS-2 evaluations show that the average delays increase linearly for all the evaluated protocols and the average packet losses grow logarithmically. UDP produces the lowest transmission delay; 5.4% and 5.8% lower than TCP and TCP variant, but experiences the highest packet loss. Both TCP and TCP Vegas maintain packet loss as low as possible. The proposed cross-layer successfully decreases TCP and TCP Vegas delay about 0.12 % and 0.15%, although losses remain similar.

  4. Advertisement-Based Energy Efficient Medium Access Protocols for Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Ray, Surjya Sarathi

    One of the main challenges that prevents the large-scale deployment of Wireless Sensor Networks (WSNs) is providing the applications with the required quality of service (QoS) given the sensor nodes' limited energy supplies. WSNs are an important tool in supporting applications ranging from environmental and industrial monitoring, to battlefield surveillance and traffic control, among others. Most of these applications require sensors to function for long periods of time without human intervention and without battery replacement. Therefore, energy conservation is one of the main goals for protocols for WSNs. Energy conservation can be performed in different layers of the protocol stack. In particular, as the medium access control (MAC) layer can access and control the radio directly, large energy savings is possible through intelligent MAC protocol design. To maximize the network lifetime, MAC protocols for WSNs aim to minimize idle listening of the sensor nodes, packet collisions, and overhearing. Several approaches such as duty cycling and low power listening have been proposed at the MAC layer to achieve energy efficiency. In this thesis, I explore the possibility of further energy savings through the advertisement of data packets in the MAC layer. In the first part of my research, I propose Advertisement-MAC or ADV-MAC, a new MAC protocol for WSNs that utilizes the concept of advertising for data contention. This technique lets nodes listen dynamically to any desired transmission and sleep during transmissions not of interest. This minimizes the energy lost in idle listening and overhearing while maintaining an adaptive duty cycle to handle variable loads. Additionally, ADV-MAC enables energy efficient MAC-level multicasting. An analytical model for the packet delivery ratio and the energy consumption of the protocol is also proposed. The analytical model is verified with simulations and is used to choose an optimal value of the advertisement period. Simulations show that the optimized ADV-MAC provides substantial energy gains (50% to 70% less than other MAC protocols for WSNs such as T-MAC and S-MAC for the scenarios investigated) while faring as well as T-MAC in terms of packet delivery ratio and latency. Although ADV-MAC provides substantial energy gains over S-MAC and T-MAC, it is not optimal in terms of energy savings because contention is done twice -- once in the Advertisement Period and once in the Data Period. In the next part of my research, the second contention in the Data Period is eliminated and the advantages of contention-based and TDMA-based protocols are combined to form Advertisement based Time-division Multiple Access (ATMA), a distributed TDMA-based MAC protocol for WSNs. ATMA utilizes the bursty nature of the traffic to prevent energy waste through advertisements and reservations for data slots. Extensive simulations and qualitative analysis show that with bursty traffic, ATMA outperforms contention-based protocols (S-MAC, T-MAC and ADV-MAC), a TDMA based protocol (TRAMA) and hybrid protocols (Z-MAC and IEEE 802.15.4). ATMA provides energy reductions of up to 80%, while providing the best packet delivery ratio (close to 100%) and latency among all the investigated protocols. Simulations alone cannot reflect many of the challenges faced by real implementations of MAC protocols, such as clock-drift, synchronization, imperfect physical layers, and irregular interference from other transmissions. Such issues may cripple a protocol that otherwise performs very well in software simulations. Hence, to validate my research, I conclude with a hardware implementation of the ATMA protocol on SORA (Software Radio), developed by Microsoft Research Asia. SORA is a reprogrammable Software Defined Radio (SDR) platform that satisfies the throughput and timing requirements of modern wireless protocols while utilizing the rich general purpose PC development environment. Experimental results obtained from the hardware implementation of ATMA closely mirror the simulation results obtained for a single hop network with 4 nodes.

  5. TraPy-MAC: Traffic Priority Aware Medium Access Control Protocol for Wireless Body Area Network.

    PubMed

    Ullah, Fasee; Abdullah, Abdul Hanan; Kaiwartya, Omprakash; Cao, Yue

    2017-06-01

    Recently, Wireless Body Area Network (WBAN) has witnessed significant attentions in research and product development due to the growing number of sensor-based applications in healthcare domain. Design of efficient and effective Medium Access Control (MAC) protocol is one of the fundamental research themes in WBAN. Static on-demand slot allocation to patient data is the main approach adopted in the design of MAC protocol in literature, without considering the type of patient data specifically the level of severity on patient data. This leads to the degradation of the performance of MAC protocols considering effectiveness and traffic adjustability in realistic medical environments. In this context, this paper proposes a Traffic Priority-Aware MAC (TraPy-MAC) protocol for WBAN. It classifies patient data into emergency and non-emergency categories based on the severity of patient data. The threshold value aided classification considers a number of parameters including type of sensor, body placement location, and data transmission time for allocating dedicated slots patient data. Emergency data are not required to carry out contention and slots are allocated by giving the due importance to threshold value of vital sign data. The contention for slots is made efficient in case of non-emergency data considering threshold value in slot allocation. Moreover, the slot allocation to emergency and non-emergency data are performed parallel resulting in performance gain in channel assignment. Two algorithms namely, Detection of Severity on Vital Sign data (DSVS), and ETS Slots allocation based on the Severity on Vital Sign (ETS-SVS) are developed for calculating threshold value and resolving the conflicts of channel assignment, respectively. Simulations are performed in ns2 and results are compared with the state-of-the-art MAC techniques. Analysis of results attests the benefit of TraPy-MAC in comparison with the state-of-the-art MAC in channel assignment in realistic medical environments.

  6. Performance analysis and improvement of WPAN MAC for home networks.

    PubMed

    Mehta, Saurabh; Kwak, Kyung Sup

    2010-01-01

    The wireless personal area network (WPAN) is an emerging wireless technology for future short range indoor and outdoor communication applications. The IEEE 802.15.3 medium access control (MAC) is proposed to coordinate the access to the wireless medium among the competing devices, especially for short range and high data rate applications in home networks. In this paper we use analytical modeling to study the performance analysis of WPAN (IEEE 802.15.3) MAC in terms of throughput, efficient bandwidth utilization, and delay with various ACK policies under error channel condition. This allows us to introduce a K-Dly-ACK-AGG policy, payload size adjustment mechanism, and Improved Backoff algorithm to improve the performance of the WPAN MAC. Performance evaluation results demonstrate the impact of our improvements on network capacity. Moreover, these results can be very useful to WPAN application designers and protocol architects to easily and correctly implement WPAN for home networking.

  7. Performance Analysis and Improvement of WPAN MAC for Home Networks

    PubMed Central

    Mehta, Saurabh; Kwak, Kyung Sup

    2010-01-01

    The wireless personal area network (WPAN) is an emerging wireless technology for future short range indoor and outdoor communication applications. The IEEE 802.15.3 medium access control (MAC) is proposed to coordinate the access to the wireless medium among the competing devices, especially for short range and high data rate applications in home networks. In this paper we use analytical modeling to study the performance analysis of WPAN (IEEE 802.15.3) MAC in terms of throughput, efficient bandwidth utilization, and delay with various ACK policies under error channel condition. This allows us to introduce a K-Dly-ACK-AGG policy, payload size adjustment mechanism, and Improved Backoff algorithm to improve the performance of the WPAN MAC. Performance evaluation results demonstrate the impact of our improvements on network capacity. Moreover, these results can be very useful to WPAN application designers and protocol architects to easily and correctly implement WPAN for home networking. PMID:22319274

  8. Scalability enhancement of AODV using local link repairing

    NASA Astrophysics Data System (ADS)

    Jain, Jyoti; Gupta, Roopam; Bandhopadhyay, T. K.

    2014-09-01

    Dynamic change in the topology of an ad hoc network makes it difficult to design an efficient routing protocol. Scalability of an ad hoc network is also one of the important criteria of research in this field. Most of the research works in ad hoc network focus on routing and medium access protocols and produce simulation results for limited-size networks. Ad hoc on-demand distance vector (AODV) is one of the best reactive routing protocols. In this article, modified routing protocols based on local link repairing of AODV are proposed. Method of finding alternate routes for next-to-next node is proposed in case of link failure. These protocols are beacon-less, means periodic hello message is removed from the basic AODV to improve scalability. Few control packet formats have been changed to accommodate suggested modification. Proposed protocols are simulated to investigate scalability performance and compared with basic AODV protocol. This also proves that local link repairing of proposed protocol improves scalability of the network. From simulation results, it is clear that scalability performance of routing protocol is improved because of link repairing method. We have tested protocols for different terrain area with approximate constant node densities and different traffic load.

  9. A subjective scheduler for subjective dedicated networks

    NASA Astrophysics Data System (ADS)

    Suherman; Fakhrizal, Said Reza; Al-Akaidi, Marwan

    2017-09-01

    Multiple access technique is one of important techniques within medium access layer in TCP/IP protocol stack. Each network technology implements the selected access method. Priority can be implemented in those methods to differentiate services. Some internet networks are dedicated for specific purpose. Education browsing or tutorial video accesses are preferred in a library hotspot, while entertainment and sport contents could be subjects of limitation. Current solution may use IP address filter or access list. This paper proposes subjective properties of users or applications are used for priority determination in multiple access techniques. The NS-2 simulator is employed to evaluate the method. A video surveillance network using WiMAX is chosen as the object. Subjective priority is implemented on WiMAX scheduler based on traffic properties. Three different traffic sources from monitoring video: palace, park, and market are evaluated. The proposed subjective scheduler prioritizes palace monitoring video that results better quality, xx dB than the later monitoring spots.

  10. An Enhanced Reservation-Based MAC Protocol for IEEE 802.15.4 Networks

    PubMed Central

    Afonso, José A.; Silva, Helder D.; Macedo, Pedro; Rocha, Luis A.

    2011-01-01

    The IEEE 802.15.4 Medium Access Control (MAC) protocol is an enabling standard for wireless sensor networks. In order to support applications requiring dedicated bandwidth or bounded delay, it provides a reservation-based scheme named Guaranteed Time Slot (GTS). However, the GTS scheme presents some drawbacks, such as inefficient bandwidth utilization and support to a maximum of only seven devices. This paper presents eLPRT (enhanced Low Power Real Time), a new reservation-based MAC protocol that introduces several performance enhancing features in comparison to the GTS scheme. This MAC protocol builds on top of LPRT (Low Power Real Time) and includes various mechanisms designed to increase data transmission reliability against channel errors, improve bandwidth utilization and increase the number of supported devices. A motion capture system based on inertial and magnetic sensors has been used to validate the protocol. The effectiveness of the performance enhancements introduced by each of the new features is demonstrated through the provision of both simulation and experimental results. PMID:22163826

  11. A Hybrid Lifetime Extended Directional Approach for WBANs

    PubMed Central

    Li, Changle; Yuan, Xiaoming; Yang, Li; Song, Yueyang

    2015-01-01

    Wireless Body Area Networks (WBANs) can provide real-time and reliable health monitoring, attributing to the human-centered and sensor interoperability properties. WBANs have become a key component of the ubiquitous eHealth (electronic health) revolution that prospers on the basis of information and communication technologies. The prime consideration in WBAN is how to maximize the network lifetime with battery-powered sensor nodes in energy constraint. Novel solutions in Medium Access Control (MAC) protocols are imperative to satisfy the particular BAN scenario and the need of excellent energy efficiency in healthcare applications. In this paper, we propose a hybrid Lifetime Extended Directional Approach (LEDA) MAC protocol based on IEEE 802.15.6 to reduce energy consumption and prolong network lifetime. The LEDA MAC protocol takes full advantages of directional superiority in energy saving that employs multi-beam directional mode in Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) and single-beam directional mode in Time Division Multiple Access (TDMA) for alternative in data reservation and transmission according to the traffic varieties. Moreover, the impacts of some inherent problems of directional antennas such as deafness and hidden terminal problem can be decreased owing to that all nodes generate individual beam according to user priorities designated. Furthermore, LEDA MAC employs a Dynamic Polled Allocation Period (DPAP) for burst data transmissions to increase the network reliability and adaptability. Extensive analysis and simulation results show that the proposed LEDA MAC protocol achieves extended network lifetime with improved performance compared with IEEE 802.15.6. PMID:26556357

  12. Medium Access Control in Ad Hoc Networks With Omni-Directional and Directional Antennas

    DTIC Science & Technology

    2004-06-01

    Carvalho, Marc, Hong, Long, Yong, Zhenjiang, Lei, Ravi, Saro, Hari, Ramesh, Brad, Renato and Radhika) in the Computer Communication Research Group (CCRG...which we call directional collision avoidance protocols. Ko et al. [35] propose two schemes. One scheme consists of nodes using directional RTS...different from the model assumed by Ko et al. [35] where antennas are always active for re- ceiving and thus transmissions to different antennas

  13. IDMA-Based MAC Protocol for Satellite Networks with Consideration on Channel Quality

    PubMed Central

    2014-01-01

    In order to overcome the shortcomings of existing medium access control (MAC) protocols based on TDMA or CDMA in satellite networks, interleave division multiple access (IDMA) technique is introduced into satellite communication networks. Therefore, a novel wide-band IDMA MAC protocol based on channel quality is proposed in this paper, consisting of a dynamic power allocation algorithm, a rate adaptation algorithm, and a call admission control (CAC) scheme. Firstly, the power allocation algorithm combining the technique of IDMA SINR-evolution and channel quality prediction is developed to guarantee high power efficiency even in terrible channel conditions. Secondly, the effective rate adaptation algorithm, based on accurate channel information per timeslot and by the means of rate degradation, can be realized. What is more, based on channel quality prediction, the CAC scheme, combining the new power allocation algorithm, rate scheduling, and buffering strategies together, is proposed for the emerging IDMA systems, which can support a variety of traffic types, and offering quality of service (QoS) requirements corresponding to different priority levels. Simulation results show that the new wide-band IDMA MAC protocol can make accurate estimation of available resource considering the effect of multiuser detection (MUD) and QoS requirements of multimedia traffic, leading to low outage probability as well as high overall system throughput. PMID:25126592

  14. Medium Access Control for Opportunistic Concurrent Transmissions under Shadowing Channels

    PubMed Central

    Son, In Keun; Mao, Shiwen; Hur, Seung Min

    2009-01-01

    We study the problem of how to alleviate the exposed terminal effect in multi-hop wireless networks in the presence of log-normal shadowing channels. Assuming node location information, we propose an extension of the IEEE 802.11 MAC protocol that sched-ules concurrent transmissions in the presence of log-normal shadowing, thus mitigating the exposed terminal problem and improving network throughput and delay performance. We observe considerable improvements in throughput and delay achieved over the IEEE 802.11 MAC under various network topologies and channel conditions in ns-2 simulations, which justify the importance of considering channel randomness in MAC protocol design for multi-hop wireless networks. PMID:22408556

  15. Analytical Modeling of Medium Access Control Protocols in Wireless Networks

    DTIC Science & Technology

    2006-03-01

    Rician-fading channels. However, no provision was made to consider a multihop ad hoc network and the interdependencies among the nodes. Gitman [54...published what is arguably the first paper that actually dealt with a mul- tihop system. Gitman considered a two-hop centralized network consisting of a...of MIMO space-time coded wireless systems. IEEE Journal on Selected Areas in Communications, 21(3):281–302, April 2003. [54] I. Gitman . On the

  16. Protocol for in vitro somatic embryogenesis and regeneration of rice (Oryza sativa L.).

    PubMed

    Verma, Dipti; Joshi, Rohit; Shukla, Alok; Kumar, Pramod

    2011-12-01

    Development of highly efficient and reproducible plant regeneration system has tremendous potential to provide improved technology to assist in genetic transformation of indica rice cultivars for their further exploitation in selection. For the development of a highly reproducible regeneration system through somatic embryogenesis, mature embryos of highly popular rice cultivars i.e., Govind (for rainfed areas), Pusa Basmati-1 (aromatic basmati) and Jaya (for irrigated areas) were used. Optimum callus formation (%) to MS medium supplemented with 2, 4-D was obtained at 12.0 microM in Govind, 14.0 microM in Jaya and 15.0 microM in Pusa Basmati-1. All the cultivars showed good proliferation on MS medium without hormone. In Govind, highest embryogenic response was observed in MS medium supplemented with 2, 4-D (0.4 microM) + kinetin (0.4 microM), while in Pusa Basmati-1 with 2, 4-D (0.4 microM) + kinetin (2.0 microM) and in Jaya on hormone-free MS medium. Excellent embryo regeneration in Govind was observed on MS medium supplemented with low concentrations (1.1 microM) of BAP or hormone-free MS medium, while in Pusa Basmati-1 and Jaya embryogenesis was observed on MS medium supplemented with higher concentration of BAP (2.2 microM). Similarly, maximum plantlets with proliferated roots were observed in Govind on hormone-free MS medium, while in Pusa Basmati-1 and Jaya on MS medium supplemented with high concentration of NAA (4.0 microM). Developed plantlets were further successfully acclimatized and grown under pot culture up to maturity. Further the yield potential of in vitro developed plants was accessed at par to the direct seeded one under pot culture. Present, protocol standardizes somatic embryogenesis and efficient regeneration of agronomically important, high yielding and diverse indica rice cultivars which can be utilized as an efficient tool for molecular studies and genetic transformation in future.

  17. Modular Energy-Efficient and Robust Paradigms for a Disaster-Recovery Process over Wireless Sensor Networks

    PubMed Central

    Razaque, Abdul; Elleithy, Khaled

    2015-01-01

    Robust paradigms are a necessity, particularly for emerging wireless sensor network (WSN) applications. The lack of robust and efficient paradigms causes a reduction in the provision of quality of service (QoS) and additional energy consumption. In this paper, we introduce modular energy-efficient and robust paradigms that involve two archetypes: (1) the operational medium access control (O-MAC) hybrid protocol and (2) the pheromone termite (PT) model. The O-MAC protocol controls overhearing and congestion and increases the throughput, reduces the latency and extends the network lifetime. O-MAC uses an optimized data frame format that reduces the channel access time and provides faster data delivery over the medium. Furthermore, O-MAC uses a novel randomization function that avoids channel collisions. The PT model provides robust routing for single and multiple links and includes two new significant features: (1) determining the packet generation rate to avoid congestion and (2) pheromone sensitivity to determine the link capacity prior to sending the packets on each link. The state-of-the-art research in this work is based on improving both the QoS and energy efficiency. To determine the strength of O-MAC with the PT model; we have generated and simulated a disaster recovery scenario using a network simulator (ns-3.10) that monitors the activities of disaster recovery staff; hospital staff and disaster victims brought into the hospital. Moreover; the proposed paradigm can be used for general purpose applications. Finally; the QoS metrics of the O-MAC and PT paradigms are evaluated and compared with other known hybrid protocols involving the MAC and routing features. The simulation results indicate that O-MAC with PT produced better outcomes. PMID:26153768

  18. Modular Energy-Efficient and Robust Paradigms for a Disaster-Recovery Process over Wireless Sensor Networks.

    PubMed

    Razaque, Abdul; Elleithy, Khaled

    2015-07-06

    Robust paradigms are a necessity, particularly for emerging wireless sensor network (WSN) applications. The lack of robust and efficient paradigms causes a reduction in the provision of quality of service (QoS) and additional energy consumption. In this paper, we introduce modular energy-efficient and robust paradigms that involve two archetypes: (1) the operational medium access control (O-MAC) hybrid protocol and (2) the pheromone termite (PT) model. The O-MAC protocol controls overhearing and congestion and increases the throughput, reduces the latency and extends the network lifetime. O-MAC uses an optimized data frame format that reduces the channel access time and provides faster data delivery over the medium. Furthermore, O-MAC uses a novel randomization function that avoids channel collisions. The PT model provides robust routing for single and multiple links and includes two new significant features: (1) determining the packet generation rate to avoid congestion and (2) pheromone sensitivity to determine the link capacity prior to sending the packets on each link. The state-of-the-art research in this work is based on improving both the QoS and energy efficiency. To determine the strength of O-MAC with the PT model; we have generated and simulated a disaster recovery scenario using a network simulator (ns-3.10) that monitors the activities of disaster recovery staff; hospital staff and disaster victims brought into the hospital. Moreover; the proposed paradigm can be used for general purpose applications. Finally; the QoS metrics of the O-MAC and PT paradigms are evaluated and compared with other known hybrid protocols involving the MAC and routing features. The simulation results indicate that O-MAC with PT produced better outcomes.

  19. An Energy Efficient MAC Protocol for Multi-Hop Swallowable Body Sensor Networks

    PubMed Central

    Lin, Lin; Yang, Chengfeng; Wong, Kai Juan; Yan, Hao; Shen, Junwen; Phee, Soo Jay

    2014-01-01

    Swallowable body sensor networks (BSNs) are composed of sensors which are swallowed by patients and send the collected data to the outside coordinator. These sensors are energy constraint and the batteries are difficult to be replaced. The medium access control (MAC) protocol plays an important role in energy management. This paper investigates an energy efficient MAC protocol design for swallowable BSNs. Multi-hop communication is analyzed and proved more energy efficient than single-hop communication within the human body when the circuitry power is low. Based on this result, a centrally controlled time slotting schedule is proposed. The major workload is shifted from the sensors to the coordinator. The coordinator collects the path-loss map and calculates the schedules, including routing, slot assignment and transmission power. Sensor nodes follow the schedules to send data in a multi-hop way. The proposed protocol is compared with the IEEE 802.15.6 protocol in terms of energy consumption. The results show that it is more energy efficient than IEEE 802.15.6 for swallowable BSN scenarios. PMID:25330049

  20. Adjacency Matrix-Based Transmit Power Allocation Strategies in Wireless Sensor Networks

    PubMed Central

    Consolini, Luca; Medagliani, Paolo; Ferrari, Gianluigi

    2009-01-01

    In this paper, we present an innovative transmit power control scheme, based on optimization theory, for wireless sensor networks (WSNs) which use carrier sense multiple access (CSMA) with collision avoidance (CA) as medium access control (MAC) protocol. In particular, we focus on schemes where several remote nodes send data directly to a common access point (AP). Under the assumption of finite overall network transmit power and low traffic load, we derive the optimal transmit power allocation strategy that minimizes the packet error rate (PER) at the AP. This approach is based on modeling the CSMA/CA MAC protocol through a finite state machine and takes into account the network adjacency matrix, depending on the transmit power distribution and determining the network connectivity. It will be then shown that the transmit power allocation problem reduces to a convex constrained minimization problem. Our results show that, under the assumption of low traffic load, the power allocation strategy, which guarantees minimal delay, requires the maximization of network connectivity, which can be equivalently interpreted as the maximization of the number of non-zero entries of the adjacency matrix. The obtained theoretical results are confirmed by simulations for unslotted Zigbee WSNs. PMID:22346705

  1. An Ultra-Low Power and Flexible Acoustic Modem Design to Develop Energy-Efficient Underwater Sensor Networks

    PubMed Central

    Sánchez, Antonio; Blanc, Sara; Yuste, Pedro; Perles, Angel; Serrano, Juan José

    2012-01-01

    This paper is focused on the description of the physical layer of a new acoustic modem called ITACA. The modem architecture includes as a major novelty an ultra-low power asynchronous wake-up system implementation for underwater acoustic transmission that is based on a low-cost off-the-shelf RFID peripheral integrated circuit. This feature enables a reduced power dissipation of 10 μW in stand-by mode and registers very low power values during reception and transmission. The modem also incorporates clear channel assessment (CCA) to support CSMA-based medium access control (MAC) layer protocols. The design is part of a compact platform for a long-life short/medium range underwater wireless sensor network. PMID:22969324

  2. An ultra-low power and flexible acoustic modem design to develop energy-efficient underwater sensor networks.

    PubMed

    Sánchez, Antonio; Blanc, Sara; Yuste, Pedro; Perles, Angel; Serrano, Juan José

    2012-01-01

    This paper is focused on the description of the physical layer of a new acoustic modem called ITACA. The modem architecture includes as a major novelty an ultra-low power asynchronous wake-up system implementation for underwater acoustic transmission that is based on a low-cost off-the-shelf RFID peripheral integrated circuit. This feature enables a reduced power dissipation of 10 μW in stand-by mode and registers very low power values during reception and transmission. The modem also incorporates clear channel assessment (CCA) to support CSMA-based medium access control (MAC) layer protocols. The design is part of a compact platform for a long-life short/medium range underwater wireless sensor network.

  3. A Power-Optimized Cooperative MAC Protocol for Lifetime Extension in Wireless Sensor Networks.

    PubMed

    Liu, Kai; Wu, Shan; Huang, Bo; Liu, Feng; Xu, Zhen

    2016-10-01

    In wireless sensor networks, in order to satisfy the requirement of long working time of energy-limited nodes, we need to design an energy-efficient and lifetime-extended medium access control (MAC) protocol. In this paper, a node cooperation mechanism that one or multiple nodes with higher channel gain and sufficient residual energy help a sender relay its data packets to its recipient is employed to achieve this objective. We first propose a transmission power optimization algorithm to prolong network lifetime by optimizing the transmission powers of the sender and its cooperative nodes to maximize their minimum residual energy after their data packet transmissions. Based on it, we propose a corresponding power-optimized cooperative MAC protocol. A cooperative node contention mechanism is designed to ensure that the sender can effectively select a group of cooperative nodes with the lowest energy consumption and the best channel quality for cooperative transmissions, thus further improving the energy efficiency. Simulation results show that compared to typical MAC protocol with direct transmissions and energy-efficient cooperative MAC protocol, the proposed cooperative MAC protocol can efficiently improve the energy efficiency and extend the network lifetime.

  4. A Power-Optimized Cooperative MAC Protocol for Lifetime Extension in Wireless Sensor Networks

    PubMed Central

    Liu, Kai; Wu, Shan; Huang, Bo; Liu, Feng; Xu, Zhen

    2016-01-01

    In wireless sensor networks, in order to satisfy the requirement of long working time of energy-limited nodes, we need to design an energy-efficient and lifetime-extended medium access control (MAC) protocol. In this paper, a node cooperation mechanism that one or multiple nodes with higher channel gain and sufficient residual energy help a sender relay its data packets to its recipient is employed to achieve this objective. We first propose a transmission power optimization algorithm to prolong network lifetime by optimizing the transmission powers of the sender and its cooperative nodes to maximize their minimum residual energy after their data packet transmissions. Based on it, we propose a corresponding power-optimized cooperative MAC protocol. A cooperative node contention mechanism is designed to ensure that the sender can effectively select a group of cooperative nodes with the lowest energy consumption and the best channel quality for cooperative transmissions, thus further improving the energy efficiency. Simulation results show that compared to typical MAC protocol with direct transmissions and energy-efficient cooperative MAC protocol, the proposed cooperative MAC protocol can efficiently improve the energy efficiency and extend the network lifetime. PMID:27706079

  5. FPGA implementation cost and performance evaluation of IEEE 802.11 protocol encryption security schemes

    NASA Astrophysics Data System (ADS)

    Sklavos, N.; Selimis, G.; Koufopavlou, O.

    2005-01-01

    The explosive growth of internet and consumer demand for mobility has fuelled the exponential growth of wireless communications and networks. Mobile users want access to services and information, from both internet and personal devices, from a range of locations without the use of a cable medium. IEEE 802.11 is one of the most widely used wireless standards of our days. The amount of access and mobility into wireless networks requires a security infrastructure that protects communication within that network. The security of this protocol is based on the wired equivalent privacy (WEP) scheme. Currently, all the IEEE 802.11 market products support WEP. But recently, the 802.11i working group introduced the advanced encryption standard (AES), as the security scheme for the future IEEE 802.11 applications. In this paper, the hardware integrations of WEP and AES are studied. A field programmable gate array (FPGA) device has been used as the hardware implementation platform, for a fair comparison between the two security schemes. Measurements for the FPGA implementation cost, operating frequency, power consumption and performance are given.

  6. Enhancing the Selection of Backoff Interval Using Fuzzy Logic over Wireless Ad Hoc Networks

    PubMed Central

    Ranganathan, Radha; Kannan, Kathiravan

    2015-01-01

    IEEE 802.11 is the de facto standard for medium access over wireless ad hoc network. The collision avoidance mechanism (i.e., random binary exponential backoff—BEB) of IEEE 802.11 DCF (distributed coordination function) is inefficient and unfair especially under heavy load. In the literature, many algorithms have been proposed to tune the contention window (CW) size. However, these algorithms make every node select its backoff interval between [0, CW] in a random and uniform manner. This randomness is incorporated to avoid collisions among the nodes. But this random backoff interval can change the optimal order and frequency of channel access among competing nodes which results in unfairness and increased delay. In this paper, we propose an algorithm that schedules the medium access in a fair and effective manner. This algorithm enhances IEEE 802.11 DCF with additional level of contention resolution that prioritizes the contending nodes according to its queue length and waiting time. Each node computes its unique backoff interval using fuzzy logic based on the input parameters collected from contending nodes through overhearing. We evaluate our algorithm against IEEE 802.11, GDCF (gentle distributed coordination function) protocols using ns-2.35 simulator and show that our algorithm achieves good performance. PMID:25879066

  7. Evaluation and development the routing protocol of a fully functional simulation environment for VANETs

    NASA Astrophysics Data System (ADS)

    Ali, Azhar Tareq; Warip, Mohd Nazri Mohd; Yaakob, Naimah; Abduljabbar, Waleed Khalid; Atta, Abdu Mohammed Ali

    2017-11-01

    Vehicular Ad-hoc Networks (VANETs) is an area of wireless technologies that is attracting a great deal of interest. There are still several areas of VANETS, such as security and routing protocols, medium access control, that lack large amounts of research. There is also a lack of freely available simulators that can quickly and accurately simulate VANETs. The main goal of this paper is to develop a freely available VANETS simulator and to evaluate popular mobile ad-hoc network routing protocols in several VANETS scenarios. The VANETS simulator consisted of a network simulator, traffic (mobility simulator) and used a client-server application to keep the two simulators in sync. The VANETS simulator also models buildings to create a more realistic wireless network environment. Ad-Hoc Distance Vector routing (AODV), Dynamic Source Routing (DSR) and Dynamic MANET On-demand (DYMO) were initially simulated in a city, country, and highway environment to provide an overall evaluation.

  8. Potential of Wake-Up Radio-Based MAC Protocols for Implantable Body Sensor Networks (IBSN)—A Survey

    PubMed Central

    Karuppiah Ramachandran, Vignesh Raja; Ayele, Eyuel D.; Meratnia, Nirvana; Havinga, Paul J. M.

    2016-01-01

    With the advent of nano-technology, medical sensors and devices are becoming highly miniaturized. Consequently, the number of sensors and medical devices being implanted to accurately monitor and diagnose a disease is increasing. By measuring the symptoms and controlling a medical device as close as possible to the source, these implantable devices are able to save lives. A wireless link between medical sensors and implantable medical devices is essential in the case of closed-loop medical devices, in which symptoms of the diseases are monitored by sensors that are not placed in close proximity of the therapeutic device. Medium Access Control (MAC) is crucial to make it possible for several medical devices to communicate using a shared wireless medium in such a way that minimum delay, maximum throughput, and increased network life-time are guaranteed. To guarantee this Quality of Service (QoS), the MAC protocols control the main sources of limited resource wastage, namely the idle-listening, packet collisions, over-hearing, and packet loss. Traditional MAC protocols designed for body sensor networks are not directly applicable to Implantable Body Sensor Networks (IBSN) because of the dynamic nature of the radio channel within the human body and the strict QoS requirements of IBSN applications. Although numerous MAC protocols are available in the literature, the majority of them are designed for Body Sensor Network (BSN) and Wireless Sensor Network (WSN). To the best of our knowledge, there is so far no research paper that explores the impact of these MAC protocols specifically for IBSN. MAC protocols designed for implantable devices are still in their infancy and one of their most challenging objectives is to be ultra-low-power. One of the technological solutions to achieve this objective so is to integrate the concept of Wake-up radio (WuR) into the MAC design. In this survey, we present a taxonomy of MAC protocols based on their use of WuR technology and identify their bottlenecks to be used in IBSN applications. Furthermore, we present a number of open research challenges and requirements for designing an energy-efficient and reliable wireless communication protocol for IBSN. PMID:27916822

  9. Potential of Wake-Up Radio-Based MAC Protocols for Implantable Body Sensor Networks (IBSN)-A Survey.

    PubMed

    Karuppiah Ramachandran, Vignesh Raja; Ayele, Eyuel D; Meratnia, Nirvana; Havinga, Paul J M

    2016-11-29

    With the advent of nano-technology, medical sensors and devices are becoming highly miniaturized. Consequently, the number of sensors and medical devices being implanted to accurately monitor and diagnose a disease is increasing. By measuring the symptoms and controlling a medical device as close as possible to the source, these implantable devices are able to save lives. A wireless link between medical sensors and implantable medical devices is essential in the case of closed-loop medical devices, in which symptoms of the diseases are monitored by sensors that are not placed in close proximity of the therapeutic device. Medium Access Control (MAC) is crucial to make it possible for several medical devices to communicate using a shared wireless medium in such a way that minimum delay, maximum throughput, and increased network life-time are guaranteed. To guarantee this Quality of Service (QoS), the MAC protocols control the main sources of limited resource wastage, namely the idle-listening, packet collisions, over-hearing, and packet loss. Traditional MAC protocols designed for body sensor networks are not directly applicable to Implantable Body Sensor Networks (IBSN) because of the dynamic nature of the radio channel within the human body and the strict QoS requirements of IBSN applications. Although numerous MAC protocols are available in the literature, the majority of them are designed for Body Sensor Network (BSN) and Wireless Sensor Network (WSN). To the best of our knowledge, there is so far no research paper that explores the impact of these MAC protocols specifically for IBSN. MAC protocols designed for implantable devices are still in their infancy and one of their most challenging objectives is to be ultra-low-power. One of the technological solutions to achieve this objective so is to integrate the concept of Wake-up radio (WuR) into the MAC design. In this survey, we present a taxonomy of MAC protocols based on their use of WuR technology and identify their bottlenecks to be used in IBSN applications. Furthermore, we present a number of open research challenges and requirements for designing an energy-efficient and reliable wireless communication protocol for IBSN.

  10. Guaranteeing synchronous message deadlines with the timed token medium access control protocol

    NASA Technical Reports Server (NTRS)

    Agrawal, Gopal; Chen, Baio; Zhao, Wei; Davari, Sadegh

    1992-01-01

    We study the problem of guaranteeing synchronous message deadlines in token ring networks where the timed token medium access control protocol is employed. Synchronous capacity, defined as the maximum time for which a node can transmit its synchronous messages every time it receives the token, is a key parameter in the control of synchronous message transmission. To ensure the transmission of synchronous messages before their deadlines, synchronous capacities must be properly allocated to individual nodes. We address the issue of appropriate allocation of the synchronous capacities. Several synchronous capacity allocation schemes are analyzed in terms of their ability to satisfy deadline constraints of synchronous messages. We show that an inappropriate allocation of the synchronous capacities could cause message deadlines to be missed even if the synchronous traffic is extremely low. We propose a scheme called the normalized proportional allocation scheme which can guarantee the synchronous message deadlines for synchronous traffic of up to 33 percent of available utilization. To date, no other synchronous capacity allocation scheme has been reported to achieve such substantial performance. Another major contribution of this paper is an extension to the previous work on the bounded token rotation time. We prove that the time elapsed between any consecutive visits to a particular node is bounded by upsilon TTRT, where TTRT is the target token rotation time set up at system initialization time. The previous result by Johnson and Sevcik is a special case where upsilon = 2. We use this result in the analysis of various synchronous allocation schemes. It can also be applied in other similar studies.

  11. Protocol for Communication Networking for Formation Flying

    NASA Technical Reports Server (NTRS)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in diverse local-area networks, this protocol offers both (1) a random- access mode needed for the early PFF deployment phase and (2) a time-bounded-services mode needed during PFF-maintenance operations. Switching between these two modes could be controlled by upper-layer entities using standard link-management mechanisms. Because the early deployment phase of a PFF mission can be expected to involve multihop relaying to achieve network connectivity (see figure), the proposed protocol includes the open shortest path first (OSPF) network protocol that is commonly used in the Internet. Each spacecraft in a PFF network would be in one of seven distinct states as the mission evolved from initial deployment, through coarse formation, and into precise formation. Reconfiguration of the formation to perform different scientific observations would also cause state changes among the network nodes. The application protocol provides for recognition and tracking of the seven states for each node and for protocol changes under specified conditions to adapt the network and satisfy communication requirements associated with the current PFF mission phase. Except during early deployment, when peer-to-peer random access discovery methods would be used, the application protocol provides for operation in a centralized manner.

  12. Exploitation of Existing Voice Over Internet Protocol Technology for Department of the Navy Application

    DTIC Science & Technology

    2002-09-01

    Protocol LAN Local Area Network LDAP Lightweight Directory Access Protocol LLQ Low Latency Queuing MAC Media Access Control MarCorSysCom Marine...Description Protocol SIP Session Initiation Protocol SMTP Simple Mail Transfer Protocol SPAWAR Space and Naval Warfare Systems Center SS7 ...PSTN infrastructure previously required to carry the conversation. The cost of accessing the PSTN is thereby eliminated. In cases where Internet

  13. Protecting intellectual property associated with Canadian academic clinical trials--approaches and impact.

    PubMed

    Ross, Sue; Magee, Laura; Walker, Mark; Wood, Stephen

    2012-12-27

    Intellectual property is associated with the creative work needed to design clinical trials. Two approaches have developed to protect the intellectual property associated with multicentre trial protocols prior to site initiation. The 'open access' approach involves publishing the protocol, permitting easy access to the complete protocol. The main advantages of the open access approach are that the protocol is freely available to all stakeholders, permitting them to discuss the protocol widely with colleagues, assess the quality and rigour of the protocol, determine the feasibility of conducting the trial at their centre, and after trial completion, to evaluate the reported findings based on a full understanding of the protocol. The main potential disadvantage of this approach is the potential for plagiarism; however if that occurred, it should be easy to identify because of the open access to the original trial protocol, as well as ensure that appropriate sanctions are used to deal with plagiarism. The 'restricted access' approach involves the use of non-disclosure agreements, legal documents that must be signed between the trial lead centre and collaborative sites. Potential sites must guarantee they will not disclose any details of the study before they are permitted to access the protocol. The main advantages of the restricted access approach are for the lead institution and nominated principal investigator, who protect their intellectual property associated with the trial. The main disadvantages are that ownership of the protocol and intellectual property is assigned to the lead institution; defining who 'needs to know' about the study protocol is difficult; and the use of non-disclosure agreements involves review by lawyers and institutional representatives at each site before access is permitted to the protocol, significantly delaying study implementation and adding substantial indirect costs to research institutes. This extra step may discourage sites from joining a trial. It is possible that the restricted access approach may contribute to the failure of well-designed trials without any significant benefit in protecting intellectual property. Funding agencies should formalize rules around open versus restricted access to the study protocol just as they have around open access to results.

  14. A Survey of MAC Protocols for Cognitive Radio Body Area Networks.

    PubMed

    Bhandari, Sabin; Moh, Sangman

    2015-04-20

    The advancement in electronics, wireless communications and integrated circuits has enabled the development of small low-power sensors and actuators that can be placed on, in or around the human body. A wireless body area network (WBAN) can be effectively used to deliver the sensory data to a central server, where it can be monitored, stored and analyzed. For more than a decade, cognitive radio (CR) technology has been widely adopted in wireless networks, as it utilizes the available spectra of licensed, as well as unlicensed bands. A cognitive radio body area network (CRBAN) is a CR-enabled WBAN. Unlike other wireless networks, CRBANs have specific requirements, such as being able to automatically sense their environments and to utilize unused, licensed spectra without interfering with licensed users, but existing protocols cannot fulfill them. In particular, the medium access control (MAC) layer plays a key role in cognitive radio functions, such as channel sensing, resource allocation, spectrum mobility and spectrum sharing. To address various application-specific requirements in CRBANs, several MAC protocols have been proposed in the literature. In this paper, we survey MAC protocols for CRBANs. We then compare the different MAC protocols with one another and discuss challenging open issues in the relevant research.

  15. Underwater Wireless Sensor Networks: how do acoustic propagation models impact the performance of higher-level protocols?

    PubMed

    Llor, Jesús; Malumbres, Manuel P

    2012-01-01

    Several Medium Access Control (MAC) and routing protocols have been developed in the last years for Underwater Wireless Sensor Networks (UWSNs). One of the main difficulties to compare and validate the performance of different proposals is the lack of a common standard to model the acoustic propagation in the underwater environment. In this paper we analyze the evolution of underwater acoustic prediction models from a simple approach to more detailed and accurate models. Then, different high layer network protocols are tested with different acoustic propagation models in order to determine the influence of environmental parameters on the obtained results. After several experiments, we can conclude that higher-level protocols are sensitive to both: (a) physical layer parameters related to the network scenario and (b) the acoustic propagation model. Conditions like ocean surface activity, scenario location, bathymetry or floor sediment composition, may change the signal propagation behavior. So, when designing network architectures for UWSNs, the role of the physical layer should be seriously taken into account in order to assert that the obtained simulation results will be close to the ones obtained in real network scenarios.

  16. Underwater Wireless Sensor Networks: How Do Acoustic Propagation Models Impact the Performance of Higher-Level Protocols?

    PubMed Central

    Llor, Jesús; Malumbres, Manuel P.

    2012-01-01

    Several Medium Access Control (MAC) and routing protocols have been developed in the last years for Underwater Wireless Sensor Networks (UWSNs). One of the main difficulties to compare and validate the performance of different proposals is the lack of a common standard to model the acoustic propagation in the underwater environment. In this paper we analyze the evolution of underwater acoustic prediction models from a simple approach to more detailed and accurate models. Then, different high layer network protocols are tested with different acoustic propagation models in order to determine the influence of environmental parameters on the obtained results. After several experiments, we can conclude that higher-level protocols are sensitive to both: (a) physical layer parameters related to the network scenario and (b) the acoustic propagation model. Conditions like ocean surface activity, scenario location, bathymetry or floor sediment composition, may change the signal propagation behavior. So, when designing network architectures for UWSNs, the role of the physical layer should be seriously taken into account in order to assert that the obtained simulation results will be close to the ones obtained in real network scenarios. PMID:22438712

  17. Access and accounting schemes of wireless broadband

    NASA Astrophysics Data System (ADS)

    Zhang, Jian; Huang, Benxiong; Wang, Yan; Yu, Xing

    2004-04-01

    In this paper, two wireless broadband access and accounting schemes were introduced. There are some differences in the client and the access router module between them. In one scheme, Secure Shell (SSH) protocol is used in the access system. The SSH server makes the authentication based on private key cryptography. The advantage of this scheme is the security of the user's information, and we have sophisticated access control. In the other scheme, Secure Sockets Layer (SSL) protocol is used the access system. It uses the technology of public privacy key. Nowadays, web browser generally combines HTTP and SSL protocol and we use the SSL protocol to implement the encryption of the data between the clients and the access route. The schemes are same in the radius sever part. Remote Authentication Dial in User Service (RADIUS), as a security protocol in the form of Client/Sever, is becoming an authentication/accounting protocol for standard access to the Internet. It will be explained in a flow chart. In our scheme, the access router serves as the client to the radius server.

  18. Technical modification of the Balb/c 3T3 cell transformation assay: the use of serum-reduced medium to optimise the practicability of the protocol.

    PubMed

    Hayashi, Kumiko; Sasaki, Kiyoshi; Asada, Shin; Tsuchiya, Toshiyuki; Hayashi, Makoto; Yoshimura, Isao; Tanaka, Noriho; Umeda, Makoto

    2008-12-01

    The two-stage Balb/c 3T3 model of cell transformation can mimic the two-stage carcinogenicity bioassay, and has been recognised as a screening method for detecting potential tumour initiators and promoters. A technical modification to the original protocol (which involved the use of M10F medium, consisting of MEM plus 10% fetal bovine serum [FBS]) has been previously proposed, in order to increase its efficacy, namely: the introduction of enriched, serum-reduced medium (DF2F medium, comprising DMEM/F12 plus 2% FBS and other supplements). The aim of this study was to further modify the protocol, so as to attain higher practicability for the assay. The protocol was further optimised by: a) reducing the number of plates required, through the use of larger plates; b) reducing the cost of the assay by retaining the reduced serum concentration and by using 2microg/ml insulin, rather than the more-complex insulin-transferrin-ethanolamine-sodium selenite (ITES) supplement (i.e. DF2F2I medium); and c) extending the culture period from 24-25 days to 31-32 days, resulting in clearer foci (the number of medium changes did not increase, as less-frequent medium changes were performed during the extended culture period). Growth curve construction revealed that variations in the saturation densities of the parental Balb/c 3T3 cell line and its three transformed clones were highest when M10F medium was replaced with DF2F2I medium just before cells reached confluence. We applied this newly-optimised protocol to the assessment of: a) the tumour initiating activity of 3-methylcholanthrene (MCA), N-methyl-N'-nitro-N-nitrosoguanidine, mitomycin C, methylmethane sulphonate, CdCl(2) and phenacetin, combining a post-treatment of 100ng/ml 12-O-tetradecanoylphorbol-13-acetate at the promotion stage; and b) the tumour promoting activity of insulin, lithocholic acid, CdCl(2) and phenobarbital, with pre-treatment of 0.2microg/ml MCA at the initiation stage. In the present study, only phenobarbital was negative when tested by using the modified protocol. 2008 FRAME.

  19. Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network.

    PubMed

    Omala, Anyembe Andrew; Mbandu, Angolo Shem; Mutiria, Kamenyi Domenic; Jin, Chunhua; Li, Fagen

    2018-04-28

    Wireless body area network (WBAN) provides a medium through which physiological information could be harvested and transmitted to application provider (AP) in real time. Integrating WBAN in a heterogeneous Internet of Things (IoT) ecosystem would enable an AP to monitor patients from anywhere and at anytime. However, the IoT roadmap of interconnected 'Things' is still faced with many challenges. One of the challenges in healthcare is security and privacy of streamed medical data from heterogeneously networked devices. In this paper, we first propose a heterogeneous signcryption scheme where a sender is in a certificateless cryptographic (CLC) environment while a receiver is in identity-based cryptographic (IBC) environment. We then use this scheme to design a heterogeneous access control protocol. Formal security proof for indistinguishability against adaptive chosen ciphertext attack and unforgeability against adaptive chosen message attack in random oracle model is presented. In comparison with some of the existing access control schemes, our scheme has lower computation and communication cost.

  20. Low Duty-Cycling MAC Protocol for Low Data-Rate Medical Wireless Body Area Networks

    PubMed Central

    Zhang, Chongqing; Wang, Yinglong; Liang, Yongquan; Shu, Minglei; Zhang, Jinquan; Ni, Lina

    2017-01-01

    Wireless body area networks (WBANs) are severely energy constrained, and how to improve the energy efficiency so as to prolong the network lifetime as long as possible is one of the most important goals of WBAN research. Low data-rate WBANs are promising to cut down the energy consumption and extend the network lifetime. Considering the characteristics and demands of low data-rate WBANs, a low duty-cycling medium access control (MAC) protocol is specially designed for this kind of WBAN in this paper. Longer superframes are exploited to cut down the energy consumed on the transmissions and receptions of redundant beacon frames. Insertion time slots are embedded into the inactive part of a superframe to deliver the frames and satisfy the quality of service (QoS) requirements. The number of the data subsections in an insertion time slot can be adaptively adjusted so as to accommodate low data-rate WBANs with different traffic. Simulation results show that the proposed MAC protocol performs well under the condition of low data-rate monitoring traffic. PMID:28509849

  1. RACOON: a multiuser QoS design for mobile wireless body area networks.

    PubMed

    Cheng, Shihheng; Huang, Chingyao; Tu, Chun Chen

    2011-10-01

    In this study, Random Contention-based Resource Allocation (RACOON) medium access control (MAC) protocol is proposed to support the quality of service (QoS) for multi-user mobile wireless body area networks (WBANs). Different from existing QoS designs that focus on a single WBAN, a multiuser WBAN QoS should further consider both inter-WBAN interference and inter-WBAN priorities. Similar problems have been studied in both overlapped wireless local area networks (WLANs) and Bluetooth piconets that need QoS supports. However, these solutions are designed for non-medical transmissions that do not consider any priority scheme for medical applications. Most importantly, these studies focus on only static or low mobility networks. Network mobility of WBANs will introduce unnecessary inter-network collisions and energy waste, which are not considered by these solutions. The proposed multiuser-QoS protocol, RACOON, simultaneously satisfies the inter WBAN QoS requirements and overcomes the performance degradation caused by WBAN mobility. Simulation results verify that RACOON provides better latency and energy control, as compared with WBAN QoS protocols without considering the inter-WBAN requirements.

  2. Protecting intellectual property associated with Canadian academic clinical trials - approaches and impact

    PubMed Central

    2012-01-01

    Intellectual property is associated with the creative work needed to design clinical trials. Two approaches have developed to protect the intellectual property associated with multicentre trial protocols prior to site initiation. The ‘open access’ approach involves publishing the protocol, permitting easy access to the complete protocol. The main advantages of the open access approach are that the protocol is freely available to all stakeholders, permitting them to discuss the protocol widely with colleagues, assess the quality and rigour of the protocol, determine the feasibility of conducting the trial at their centre, and after trial completion, to evaluate the reported findings based on a full understanding of the protocol. The main potential disadvantage of this approach is the potential for plagiarism; however if that occurred, it should be easy to identify because of the open access to the original trial protocol, as well as ensure that appropriate sanctions are used to deal with plagiarism. The ‘restricted access’ approach involves the use of non-disclosure agreements, legal documents that must be signed between the trial lead centre and collaborative sites. Potential sites must guarantee they will not disclose any details of the study before they are permitted to access the protocol. The main advantages of the restricted access approach are for the lead institution and nominated principal investigator, who protect their intellectual property associated with the trial. The main disadvantages are that ownership of the protocol and intellectual property is assigned to the lead institution; defining who ‘needs to know’ about the study protocol is difficult; and the use of non-disclosure agreements involves review by lawyers and institutional representatives at each site before access is permitted to the protocol, significantly delaying study implementation and adding substantial indirect costs to research institutes. This extra step may discourage sites from joining a trial. It is possible that the restricted access approach may contribute to the failure of well-designed trials without any significant benefit in protecting intellectual property. Funding agencies should formalize rules around open versus restricted access to the study protocol just as they have around open access to results. PMID:23270486

  3. A simple, effective media access protocol system for integrated, high data rate networks

    NASA Technical Reports Server (NTRS)

    Foudriat, E. C.; Maly, K.; Overstreet, C. M.; Khanna, S.; Zhang, L.

    1992-01-01

    The operation and performance of a dual media access protocol for integrated, gigabit networks are described. Unlike other dual protocols, each protocol supports a different class of traffic. The Carrier Sensed Multiple Access-Ring Network (CSMA/RN) protocol and the Circulating Reservation Packet (CRP) protocol support asynchronous and synchronous traffic, respectively. The two protocols operate with minimal impact upon each other. Performance information demonstrates that they support a complete range of integrated traffic loads, do not require call setup/termination or a special node for synchronous traffic control, and provide effective pre-use and recovery. The CRP also provides guaranteed access and fairness control for the asynchronous system. The paper demonstrates that the CSMA-CRP system fulfills many of the requirements for gigabit LAN-MAN networks most effectively and simply. To accomplish this, CSMA-CRP features are compared against similar ring and bus systems, such as Cambridge Fast Ring, Metaring, Cyclic Reservation Multiple Access, and Distributed Dual Queue Data Bus (DQDB).

  4. Resource allocation for multichannel broadcasting visible light communication

    NASA Astrophysics Data System (ADS)

    Le, Nam-Tuan; Jang, Yeong Min

    2015-11-01

    Visible light communication (VLC), which offers the possibility of using light sources for both illumination and data communications simultaneously, will be a promising incorporation technique with lighting applications. However, it still remains some challenges especially coverage because of field-of-view limitation. In this paper, we focus on this issue by suggesting a resource allocation scheme for VLC broadcasting system. By using frame synchronization and a network calculus QoS approximation, as well as diversity technology, the proposed VLC architecture and QoS resource allocation for the multichannel-broadcasting MAC (medium access control) protocol can solve the coverage limitation problem and the link switching problem of exhibition service.

  5. Crystallography Open Database (COD): an open-access collection of crystal structures and platform for world-wide collaboration

    PubMed Central

    Gražulis, Saulius; Daškevič, Adriana; Merkys, Andrius; Chateigner, Daniel; Lutterotti, Luca; Quirós, Miguel; Serebryanaya, Nadezhda R.; Moeck, Peter; Downs, Robert T.; Le Bail, Armel

    2012-01-01

    Using an open-access distribution model, the Crystallography Open Database (COD, http://www.crystallography.net) collects all known ‘small molecule / small to medium sized unit cell’ crystal structures and makes them available freely on the Internet. As of today, the COD has aggregated ∼150 000 structures, offering basic search capabilities and the possibility to download the whole database, or parts thereof using a variety of standard open communication protocols. A newly developed website provides capabilities for all registered users to deposit published and so far unpublished structures as personal communications or pre-publication depositions. Such a setup enables extension of the COD database by many users simultaneously. This increases the possibilities for growth of the COD database, and is the first step towards establishing a world wide Internet-based collaborative platform dedicated to the collection and curation of structural knowledge. PMID:22070882

  6. Providing end-to-end QoS for multimedia applications in 3G wireless networks

    NASA Astrophysics Data System (ADS)

    Guo, Katherine; Rangarajan, Samapth; Siddiqui, M. A.; Paul, Sanjoy

    2003-11-01

    As the usage of wireless packet data services increases, wireless carriers today are faced with the challenge of offering multimedia applications with QoS requirements within current 3G data networks. End-to-end QoS requires support at the application, network, link and medium access control (MAC) layers. We discuss existing CDMA2000 network architecture and show its shortcomings that prevent supporting multiple classes of traffic at the Radio Access Network (RAN). We then propose changes in RAN within the standards framework that enable support for multiple traffic classes. In addition, we discuss how Session Initiation Protocol (SIP) can be augmented with QoS signaling for supporting end-to-end QoS. We also review state of the art scheduling algorithms at the base station and provide possible extensions to these algorithms to support different classes of traffic as well as different classes of users.

  7. 75 FR 69502 - Self-Regulatory Organizations; The NASDAQ Stock Market LLC; Notice of Filing and Immediate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-12

    ... Connection testing [using current Nasdaq access protocols] during the normal operating hours of the NTF; No Charge--For Idle Connection testing [using current Nasdaq access protocols]; $333/hour--For Active Connection testing [using current Nasdaq access protocols] at all times other than the normal operating hours...

  8. Accuracy of software-assisted detection of tumour feeders in transcatheter hepatic chemoembolization using three target definition protocols.

    PubMed

    Iwazawa, J; Ohue, S; Hashimoto, N; Mitani, T

    2014-02-01

    To compare the accuracy of computer software analysis using three different target-definition protocols to detect tumour feeder vessels for transarterial chemoembolization of hepatocellular carcinoma. C-arm computed tomography (CT) data were analysed for 81 tumours from 57 patients who had undergone chemoembolization using software-assisted detection of tumour feeders. Small, medium, and large-sized targets were manually defined for each tumour. The tumour feeder was verified when the target tumour was enhanced on selective C-arm CT of the investigated vessel during chemoembolization. The sensitivity, specificity, and accuracy of the three protocols were evaluated and compared. One hundred and eight feeder vessels supplying 81 lesions were detected. The sensitivity of the small, medium, and large target protocols was 79.8%, 91.7%, and 96.3%, respectively; specificity was 95%, 88%, and 50%, respectively; and accuracy was 87.5%, 89.9%, and 74%, respectively. The sensitivity was significantly higher for the medium (p = 0.003) and large (p < 0.001) target protocols than for the small target protocol. The specificity and accuracy were higher for the small (p < 0.001 and p < 0.001, respectively) and medium (p < 0.001 and p < 0.001, respectively) target protocols than for the large target protocol. The overall accuracy of software-assisted automated feeder analysis in transarterial chemoembolization for hepatocellular carcinoma is affected by the target definition size. A large target definition increases sensitivity and decreases specificity in detecting tumour feeders. A target size equivalent to the tumour size most accurately predicts tumour feeders. Copyright © 2013 The Royal College of Radiologists. Published by Elsevier Ltd. All rights reserved.

  9. Comparison of Four Protocols to Generate Chondrocyte-Like Cells from Human Induced Pluripotent Stem Cells (hiPSCs).

    PubMed

    Suchorska, Wiktoria Maria; Augustyniak, Ewelina; Richter, Magdalena; Trzeciak, Tomasz

    2017-04-01

    Stem cells (SCs) are a promising approach to regenerative medicine, with the potential to treat numerous orthopedic disorders, including osteo-degenerative diseases. The development of human-induced pluripotent stem cells (hiPSCs) has increased the potential of SCs for new treatments. However, current methods of differentiating hiPSCs into chondrocyte-like cells are suboptimal and better methods are needed. The aim of the present study was to assess four different chondrogenic differentiation protocols to identify the most efficient method of generating hiPSC-derived chondrocytes. For this study, hiPSCs were obtained from primary human dermal fibroblasts (PHDFs) and differentiated into chondrocyte-like cells using four different protocols: 1) monolayer culture with defined growth factors (GF); 2) embryoid bodies (EBs) in a chondrogenic medium with TGF-β3 cells; 3) EBs in chondrogenic medium conditioned with human chondrocytes (HC-402-05a cell line) and 4) EBs in chondrogenic medium conditioned with human chondrocytes and supplemented with TGF-β3. The cells obtained through these four protocols were evaluated and compared at the mRNA and protein levels. Although chondrogenic differentiation of hiPSCs was successfully achieved with all of these protocols, the two fastest and most cost-effective methods were the monolayer culture with GFs and the medium conditioned with human chondrocytes. Both of these methods are superior to other available techniques. The main advantage of the conditioned medium is that the technique is relatively simple and inexpensive while the directed method (i.e., monolayer culture with GFs) is faster than any protocol described to date because it is does not require additional steps such as EB formation.

  10. Supporting Beacon and Event-Driven Messages in Vehicular Platoons through Token-Based Strategies

    PubMed Central

    Uhlemann, Elisabeth

    2018-01-01

    Timely and reliable inter-vehicle communications is a critical requirement to support traffic safety applications, such as vehicle platooning. Furthermore, low-delay communications allow the platoon to react quickly to unexpected events. In this scope, having a predictable and highly effective medium access control (MAC) method is of utmost importance. However, the currently available IEEE 802.11p technology is unable to adequately address these challenges. In this paper, we propose a MAC method especially adapted to platoons, able to transmit beacons within the required time constraints, but with a higher reliability level than IEEE 802.11p, while concurrently enabling efficient dissemination of event-driven messages. The protocol circulates the token within the platoon not in a round-robin fashion, but based on beacon data age, i.e., the time that has passed since the previous collection of status information, thereby automatically offering repeated beacon transmission opportunities for increased reliability. In addition, we propose three different methods for supporting event-driven messages co-existing with beacons. Analysis and simulation results in single and multi-hop scenarios showed that, by providing non-competitive channel access and frequent retransmission opportunities, our protocol can offer beacon delivery within one beacon generation interval while fulfilling the requirements on low-delay dissemination of event-driven messages for traffic safety applications. PMID:29570676

  11. Supporting Beacon and Event-Driven Messages in Vehicular Platoons through Token-Based Strategies.

    PubMed

    Balador, Ali; Uhlemann, Elisabeth; Calafate, Carlos T; Cano, Juan-Carlos

    2018-03-23

    Timely and reliable inter-vehicle communications is a critical requirement to support traffic safety applications, such as vehicle platooning. Furthermore, low-delay communications allow the platoon to react quickly to unexpected events. In this scope, having a predictable and highly effective medium access control (MAC) method is of utmost importance. However, the currently available IEEE 802.11p technology is unable to adequately address these challenges. In this paper, we propose a MAC method especially adapted to platoons, able to transmit beacons within the required time constraints, but with a higher reliability level than IEEE 802.11p, while concurrently enabling efficient dissemination of event-driven messages. The protocol circulates the token within the platoon not in a round-robin fashion, but based on beacon data age, i.e., the time that has passed since the previous collection of status information, thereby automatically offering repeated beacon transmission opportunities for increased reliability. In addition, we propose three different methods for supporting event-driven messages co-existing with beacons. Analysis and simulation results in single and multi-hop scenarios showed that, by providing non-competitive channel access and frequent retransmission opportunities, our protocol can offer beacon delivery within one beacon generation interval while fulfilling the requirements on low-delay dissemination of event-driven messages for traffic safety applications.

  12. Design of the Protocol Processor for the ROBUS-2 Communication System

    NASA Technical Reports Server (NTRS)

    Torres-Pomales, Wilfredo; Malekpour, Mahyar R.; Miner, Paul S.

    2005-01-01

    The ROBUS-2 Protocol Processor (RPP) is a custom-designed hardware component implementing the functionality of the ROBUS-2 fault-tolerant communication system. The Reliable Optical Bus (ROBUS) is the core communication system of the Scalable Processor-Independent Design for Enhanced Reliability (SPIDER), a general-purpose fault tolerant integrated modular architecture currently under development at NASA Langley Research Center. ROBUS is a time-division multiple access (TDMA) broadcast communication system with medium access control by means of time-indexed communication schedule. ROBUS-2 is a developmental version of the ROBUS providing guaranteed fault-tolerant services to the attached processing elements (PEs), in the presence of a bounded number of faults. These services include message broadcast (Byzantine Agreement), dynamic communication schedule update, time reference (clock synchronization), and distributed diagnosis (group membership). ROBUS also features fault-tolerant startup and restart capabilities. ROBUS-2 tolerates internal as well as PE faults, and incorporates a dynamic self-reconfiguration capability driven by the internal diagnostic system. ROBUS consists of RPPs connected to each other by a lower-level physical communication network. The RPP has a pipelined architecture and the design is parameterized in the behavioral and structural domains. The design of the RPP enables the bus to achieve a PE-message throughput that approaches the available bandwidth at the physical layer.

  13. FD/DAMA Scheme For Mobile/Satellite Communications

    NASA Technical Reports Server (NTRS)

    Yan, Tsun-Yee; Wang, Charles C.; Cheng, Unjeng; Rafferty, William; Dessouky, Khaled I.

    1992-01-01

    Integrated-Adaptive Mobile Access Protocol (I-AMAP) proposed to allocate communication channels to subscribers in first-generation MSAT-X mobile/satellite communication network. Based on concept of frequency-division/demand-assigned multiple access (FD/DAMA) where partition of available spectrum adapted to subscribers' demands for service. Requests processed, and competing requests resolved according to channel-access protocol, or free-access tree algorithm described in "Connection Protocol for Mobile/Satellite Communications" (NPO-17735). Assigned spectrum utilized efficiently.

  14. An ultra low-power and traffic-adaptive medium access control protocol for wireless body area network.

    PubMed

    Ullah, Sana; Kwak, Kyung Sup

    2012-06-01

    Wireless Body Area Network (WBAN) consists of low-power, miniaturized, and autonomous wireless sensor nodes that enable physicians to remotely monitor vital signs of patients and provide real-time feedback with medical diagnosis and consultations. It is the most reliable and cheaper way to take care of patients suffering from chronic diseases such as asthma, diabetes and cardiovascular diseases. Some of the most important attributes of WBAN is low-power consumption and delay. This can be achieved by introducing flexible duty cycling techniques on the energy constraint sensor nodes. Stated otherwise, low duty cycle nodes should not receive frequent synchronization and control packets if they have no data to send/receive. In this paper, we introduce a Traffic-adaptive MAC protocol (TaMAC) by taking into account the traffic information of the sensor nodes. The protocol dynamically adjusts the duty cycle of the sensor nodes according to their traffic-patterns, thus solving the idle listening and overhearing problems. The traffic-patterns of all sensor nodes are organized and maintained by the coordinator. The TaMAC protocol is supported by a wakeup radio that is used to accommodate emergency and on-demand events in a reliable manner. The wakeup radio uses a separate control channel along with the data channel and therefore it has considerably low power consumption requirements. Analytical expressions are derived to analyze and compare the performance of the TaMAC protocol with the well-known beacon-enabled IEEE 802.15.4 MAC, WiseMAC, and SMAC protocols. The analytical derivations are further validated by simulation results. It is shown that the TaMAC protocol outperforms all other protocols in terms of power consumption and delay.

  15. An efficient regeneration and rapid micropropagation protocol for Almond using dormant axillary buds as explants.

    PubMed

    Choudhary, Ravish; Chaudhury, Rekha; Malik, Surendra Kumar; Sharma, Kailash Chandra

    2015-07-01

    An efficient in vitro protocol was standardized for Almond (Prunus dulcis) propagation using dormant axillary buds as explants. Explants were cultured on Murashige and Skoog (MS) and woody plant medium (WPM) supplemented with different concentration/combination(s) of phytohormones. MS basal medium showed lowest shoot induction and took longest duration for shoot initiation. Multiple shoots were induced in MS medium supplemented with the combination of BAP (0.5 mgL(-1)). Cultures showed poor response for rooting in all combinations of plant growth regulators (PGRs) and took 90 days for initiation. Rooting was higher in half strength of MS than in full-strength. The highest root induction (33.33%) was recorded in half MS medium supplemented with 0.1 mgL(-1) IBA (indole-3-butyric acid) followed by full strength of MS medium (20%) supplemented with IBA (0.1 mgL(-1)). α-Naphthalene acetic acid (NAA) was less effective for rooting than IBA. The highest root induction (25%) was found in half strength of MS medium supplemented with 0.1 mgL(-1) NAA followed by full strength of MS medium (20%). The protocol developed would be of use in mass propagation of almond and also support in vitro conservation.

  16. Isolation and in vitro culture of trypanosomes from Leptodactylus ocellatus from the Atlantic Forest in a new experimental culture medium.

    PubMed

    Lemos, M; Souza, C S F; da Costa, S C Gonçalves; Souto-Padrón, T; D'Agosto, M

    2013-02-01

    The purpose of this study was to verify the in vitro development of Trypanosoma sp. isolated from Leptodactylus ocellatus frogs under a new protocol using a biphasic medium composed of Novy, McNeal, and Nicolle (NNN) blood agar medium as a solid phase and liver infusion, brain heart infusion, and tryptose (LIBHIT) medium as a liquid phase. Blood forms, collected by cardiac puncture or after the maceration of different organs, were inoculated in culture tubes containing the biphasic medium composed by NNN and LIBHIT. Trypanosomes were observed 4 days postinoculation; most bloodstream trypomastigotes had differentiated into epimastigotes and amastigotes by this time. Trypomastigotes were again observed in older cultures (7 days). Parasites were successfully subcultured for 8 mo in this medium and successfully cryopreserved. The present study provides a new protocol medium for the isolation and culture of anuran trypanosomes.

  17. On Ramps: Options and Issues in Accessing the Internet.

    ERIC Educational Resources Information Center

    Bocher, Bob

    1995-01-01

    Outlines the basic options that schools and libraries have for accessing the Internet, focusing on four models: direct connection; dial access using SLIP/PPP (Serial Line Internet Protocol/Point-to-Point Protocol); dial-up using terminal emulation mode; and dial access through commercial online services. Discusses access option issues such as…

  18. Validity of Assessments of Youth Access to Tobacco: The Familiarity Effect

    PubMed Central

    Landrine, Hope; Klonoff, Elizabeth A.

    2003-01-01

    Objectives. We examined the standard compliance protocol and its validity as a measure of youth access to tobacco. Methods. In Study 1, youth smokers reported buying cigarettes in stores where they are regular customers. In Study 2, youths attempted to purchase cigarettes by using the Standard Protocol, in which they appeared at stores once for cigarettes, and by using the Familiarity Protocol, in which they were rendered regular customers by purchasing nontobacco items 4 times and then requested cigarettes during their fifth visit. Results. Sales to youths aged 17 years in the Familiarity Protocol were significantly higher than sales to the same age group in the Standard Protocols (62.5% vs. 6%, respectively). Conclusions. The Standard Protocol does not match how youths obtain cigarettes. Access is low for stranger youths within compliance studies, but access is high for familiar youths outside of compliance studies. PMID:14600057

  19. A slotted access control protocol for metropolitan WDM ring networks

    NASA Astrophysics Data System (ADS)

    Baziana, P. A.; Pountourakis, I. E.

    2009-03-01

    In this study we focus on the serious scalability problems that many access protocols for WDM ring networks introduce due to the use of a dedicated wavelength per access node for either transmission or reception. We propose an efficient slotted MAC protocol suitable for WDM ring metropolitan area networks. The proposed network architecture employs a separate wavelength for control information exchange prior to the data packet transmission. Each access node is equipped with a pair of tunable transceivers for data communication and a pair of fixed tuned transceivers for control information exchange. Also, each access node includes a set of fixed delay lines for synchronization reasons; to keep the data packets, while the control information is processed. An efficient access algorithm is applied to avoid both the data wavelengths and the receiver collisions. In our protocol, each access node is capable of transmitting and receiving over any of the data wavelengths, facing the scalability issues. Two different slot reuse schemes are assumed: the source and the destination stripping schemes. For both schemes, performance measures evaluation is provided via an analytic model. The analytical results are validated by a discrete event simulation model that uses Poisson traffic sources. Simulation results show that the proposed protocol manages efficient bandwidth utilization, especially under high load. Also, comparative simulation results prove that our protocol achieves significant performance improvement as compared with other WDMA protocols which restrict transmission over a dedicated data wavelength. Finally, performance measures evaluation is explored for diverse numbers of buffer size, access nodes and data wavelengths.

  20. An energy-efficient transmission scheme for real-time data in wireless sensor networks.

    PubMed

    Kim, Jin-Woo; Barrado, José Ramón Ramos; Jeon, Dong-Keun

    2015-05-20

    The Internet of things (IoT) is a novel paradigm where all things or objects in daily life can communicate with other devices and provide services over the Internet. Things or objects need identifying, sensing, networking and processing capabilities to make the IoT paradigm a reality. The IEEE 802.15.4 standard is one of the main communication protocols proposed for the IoT. The IEEE 802.15.4 standard provides the guaranteed time slot (GTS) mechanism that supports the quality of service (QoS) for the real-time data transmission. In spite of some QoS features in IEEE 802.15.4 standard, the problem of end-to-end delay still remains. In order to solve this problem, we propose a cooperative medium access scheme (MAC) protocol for real-time data transmission. We also evaluate the performance of the proposed scheme through simulation. The simulation results demonstrate that the proposed scheme can improve the network performance.

  1. An Energy-Efficient Transmission Scheme for Real-Time Data in Wireless Sensor Networks

    PubMed Central

    Kim, Jin-Woo; Barrado, José Ramón Ramos; Jeon, Dong-Keun

    2015-01-01

    The Internet of things (IoT) is a novel paradigm where all things or objects in daily life can communicate with other devices and provide services over the Internet. Things or objects need identifying, sensing, networking and processing capabilities to make the IoT paradigm a reality. The IEEE 802.15.4 standard is one of the main communication protocols proposed for the IoT. The IEEE 802.15.4 standard provides the guaranteed time slot (GTS) mechanism that supports the quality of service (QoS) for the real-time data transmission. In spite of some QoS features in IEEE 802.15.4 standard, the problem of end-to-end delay still remains. In order to solve this problem, we propose a cooperative medium access scheme (MAC) protocol for real-time data transmission. We also evaluate the performance of the proposed scheme through simulation. The simulation results demonstrate that the proposed scheme can improve the network performance. PMID:26007722

  2. Spacelab system analysis: The modified free access protocol: An access protocol for communication systems with periodic and Poisson traffic

    NASA Technical Reports Server (NTRS)

    Ingels, Frank; Owens, John; Daniel, Steven

    1989-01-01

    The protocol definition and terminal hardware for the modified free access protocol, a communications protocol similar to Ethernet, are developed. A MFA protocol simulator and a CSMA/CD math model are also developed. The protocol is tailored to communication systems where the total traffic may be divided into scheduled traffic and Poisson traffic. The scheduled traffic should occur on a periodic basis but may occur after a given event such as a request for data from a large number of stations. The Poisson traffic will include alarms and other random traffic. The purpose of the protocol is to guarantee that scheduled packets will be delivered without collision. This is required in many control and data collection systems. The protocol uses standard Ethernet hardware and software requiring minimum modifications to an existing system. The modification to the protocol only affects the Ethernet transmission privileges and does not effect the Ethernet receiver.

  3. Interoperability in the Planetary Science Archive (PSA)

    NASA Astrophysics Data System (ADS)

    Rios Diaz, C.

    2017-09-01

    The protocols and standards currently being supported by the recently released new version of the Planetary Science Archive at this time are the Planetary Data Access Protocol (PDAP), the EuroPlanet- Table Access Protocol (EPN-TAP) and Open Geospatial Consortium (OGC) standards. We explore these protocols in more detail providing scientifically useful examples of their usage within the PSA.

  4. Experiences with http/WebDAV protocols for data access in high throughput computing

    NASA Astrophysics Data System (ADS)

    Bernabeu, Gerard; Martinez, Francisco; Acción, Esther; Bria, Arnau; Caubet, Marc; Delfino, Manuel; Espinal, Xavier

    2011-12-01

    In the past, access to remote storage was considered to be at least one order of magnitude slower than local disk access. Improvement on network technologies provide the alternative of using remote disk. For those accesses one can today reach levels of throughput similar or exceeding those of local disks. Common choices as access protocols in the WLCG collaboration are RFIO, [GSI]DCAP, GRIDFTP, XROOTD and NFS. HTTP protocol shows a promising alternative as it is a simple, lightweight protocol. It also enables the use of standard technologies such as http caching or load balancing which can be used to improve service resilience and scalability or to boost performance for some use cases seen in HEP such as the "hot files". WebDAV extensions allow writing data, giving it enough functionality to work as a remote access protocol. This paper will show our experiences with the WebDAV door for dCache, in terms of functionality and performance, applied to some of the HEP work flows in the LHC Tier1 at PIC.

  5. Intelligent Local Avoided Collision (iLAC) MAC Protocol for Very High Speed Wireless Network

    NASA Astrophysics Data System (ADS)

    Hieu, Dinh Chi; Masuda, Akeo; Rabarijaona, Verotiana Hanitriniala; Shimamoto, Shigeru

    Future wireless communication systems aim at very high data rates. As the medium access control (MAC) protocol plays the central role in determining the overall performance of the wireless system, designing a suitable MAC protocol is critical to fully exploit the benefit of high speed transmission that the physical layer (PHY) offers. In the latest 802.11n standard [2], the problem of long overhead has been addressed adequately but the issue of excessive colliding transmissions, especially in congested situation, remains untouched. The procedure of setting the backoff value is the heart of the 802.11 distributed coordination function (DCF) to avoid collision in which each station makes its own decision on how to avoid collision in the next transmission. However, collision avoidance is a problem that can not be solved by a single station. In this paper, we introduce a new MAC protocol called Intelligent Local Avoided Collision (iLAC) that redefines individual rationality in choosing the backoff counter value to avoid a colliding transmission. The distinguishing feature of iLAC is that it fundamentally changes this decision making process from collision avoidance to collaborative collision prevention. As a result, stations can avoid colliding transmissions with much greater precision. Analytical solution confirms the validity of this proposal and simulation results show that the proposed algorithm outperforms the conventional algorithms by a large margin.

  6. PAD-MAC: Primary User Activity-Aware Distributed MAC for Multi-Channel Cognitive Radio Networks

    PubMed Central

    Ali, Amjad; Piran, Md. Jalil; Kim, Hansoo; Yun, Jihyeok; Suh, Doug Young

    2015-01-01

    Cognitive radio (CR) has emerged as a promising technology to solve problems related to spectrum scarcity and provides a ubiquitous wireless access environment. CR-enabled secondary users (SUs) exploit spectrum white spaces opportunistically and immediately vacate the acquired licensed channels as primary users (PUs) arrive. Accessing the licensed channels without the prior knowledge of PU traffic patterns causes severe throughput degradation due to excessive channel switching and PU-to-SU collisions. Therefore, it is significantly important to design a PU activity-aware medium access control (MAC) protocol for cognitive radio networks (CRNs). In this paper, we first propose a licensed channel usage pattern identification scheme, based on a two-state Markov model, and then estimate the future idle slots using previous observations of the channels. Furthermore, based on these past observations, we compute the rank of each available licensed channel that gives SU transmission success assessment during the estimated idle slot. Secondly, we propose a PU activity-aware distributed MAC (PAD-MAC) protocol for heterogeneous multi-channel CRNs that selects the best channel for each SU to enhance its throughput. PAD-MAC controls SU activities by allowing them to exploit the licensed channels only for the duration of estimated idle slots and enables predictive and fast channel switching. To evaluate the performance of the proposed PAD-MAC, we compare it with the distributed QoS-aware MAC (QC-MAC) and listen-before-talk MAC schemes. Extensive numerical results show the significant improvements of the PAD-MAC in terms of the SU throughput, SU channel switching rate and PU-to-SU collision rate. PMID:25831084

  7. Cryopreservation of Human Pluripotent Stem Cells in Defined Medium

    PubMed Central

    Liu, Weiwei; Chen, Guokai

    2014-01-01

    This protocol describes a cryopreservation procedure using an enzyme-free dissociation method to harvest cells and preserve cells in albumin-free chemically defined E8 medium for human pluripotent stem cells (hPSCs). The dissociation by EDTA/PBS produces small cell aggregates that allow high survival efficiency in passaging and cryopreservation. The preservation in E8 medium eliminates serum or other animal products, and is suitable for the increasing demand for high quality hPSCs in translational research. In combination with the special feature of EDTA/PBS dissociation, this protocol allows efficient cryopreservation in more time-saving manner. PMID:25366897

  8. Establishment of an efficient in vitro regeneration protocol for rapid and mass propagation of Dendrobium chrysotoxum Lindl. using seed culture.

    PubMed

    Nongdam, Potshangbam; Tikendra, Leimapokpam

    2014-01-01

    An efficient in vitro regeneration protocol from seed culture has been established successfully for Dendrobium chrysotoxum, an epiphytic orchid having tremendous ornamental and medicinal values. Seed germination response was encouraging in Mitra (M) medium enriched with different combinations of auxins and cytokinins. Medium supplemented with 0.4% activated charcoal (AC), 2 mg/L 6-benzyl amino purine (BAP), and 2 mg/L indole-3-acetic acid (IAA) produced best seed germination percentage in 2 weeks of culture. Incorporation of higher concentration of kinetin (KN) or BAP in combination with low auxin in medium induced pronounced shooting and leaf formation. Reduction in leaf development was evident when cytokinins exist singly in medium indicating synergistic effect of auxin and cytokinin in leaf induction. Presence of elevated level of indole-3-butyric acid (IBA) or 1-naphthalene acetic acid (NAA) with low cytokinin content in medium generated more in vitro rooting, though IBA was found to be more effective in rooting induction as compared to NAA. The in vitro protocol for asymbiotic seed germination developed from the present investigation can be used for rapid mass propagation of this highly important Dendrobium orchid species.

  9. Establishment of an Efficient In Vitro Regeneration Protocol for Rapid and Mass Propagation of Dendrobium chrysotoxum Lindl. Using Seed Culture

    PubMed Central

    2014-01-01

    An efficient in vitro regeneration protocol from seed culture has been established successfully for Dendrobium chrysotoxum, an epiphytic orchid having tremendous ornamental and medicinal values. Seed germination response was encouraging in Mitra (M) medium enriched with different combinations of auxins and cytokinins. Medium supplemented with 0.4% activated charcoal (AC), 2 mg/L 6-benzyl amino purine (BAP), and 2 mg/L indole-3-acetic acid (IAA) produced best seed germination percentage in 2 weeks of culture. Incorporation of higher concentration of kinetin (KN) or BAP in combination with low auxin in medium induced pronounced shooting and leaf formation. Reduction in leaf development was evident when cytokinins exist singly in medium indicating synergistic effect of auxin and cytokinin in leaf induction. Presence of elevated level of indole-3-butyric acid (IBA) or 1-naphthalene acetic acid (NAA) with low cytokinin content in medium generated more in vitro rooting, though IBA was found to be more effective in rooting induction as compared to NAA. The in vitro protocol for asymbiotic seed germination developed from the present investigation can be used for rapid mass propagation of this highly important Dendrobium orchid species. PMID:25401154

  10. Distributed reservation control protocols for random access broadcasting channels

    NASA Technical Reports Server (NTRS)

    Greene, E. P.; Ephremides, A.

    1981-01-01

    Attention is given to a communication network consisting of an arbitrary number of nodes which can communicate with each other via a time-division multiple access (TDMA) broadcast channel. The reported investigation is concerned with the development of efficient distributed multiple access protocols for traffic consisting primarily of single packet messages in a datagram mode of operation. The motivation for the design of the protocols came from the consideration of efficient multiple access utilization of moderate to high bandwidth (4-40 Mbit/s capacity) communication satellite channels used for the transmission of short (1000-10,000 bits) fixed length packets. Under these circumstances, the ratio of roundtrip propagation time to packet transmission time is between 100 to 10,000. It is shown how a TDMA channel can be adaptively shared by datagram traffic and constant bandwidth users such as in digital voice applications. The distributed reservation control protocols described are a hybrid between contention and reservation protocols.

  11. Importance of dosimetry protocol for cell irradiation on a low X-rays facility and consequences for the biological response.

    PubMed

    Dos Santos, Morgane; Paget, Vincent; Ben Kacem, Mariam; Trompier, François; Benadjaoud, Mohamed Amine; François, Agnès; Guipaud, Olivier; Benderitter, Marc; Milliat, Fabien

    2018-06-01

    The main objective of radiobiology is to establish links between doses and radiation-induced biological effects. In this context, well-defined dosimetry protocols are crucial to the determination of experimental protocols. This work proposes a new dosimetry protocol for cell irradiation in a SARRP and shows the importance of the modification of some parameters defined in dosimetry protocol for physical dose and biological outcomes. Once all parameters of the configuration were defined, dosimetry measurements with ionization chambers and EBT3 films were performed to evaluate the dose rate and the attenuation due to the cell culture medium. To evaluate the influence of changes in cell culture volume and/or additional filtration, 6-well plates containing EBT3 films with water were used to determine the impact on the physical dose at 80 kV. Then, experiments with the same irradiation conditions were performed by replacing EBT3 films by HUVECs. The biological response was assessed using clonogenic assay. Using a 0.15 mm copper filter lead to a variation of +1% using medium thickness of 0.104 cm to -8% using a medium thickness of 0.936 cm on the physical dose compare to the reference condition (0.313 cm). For the 1 mm aluminum filter, a variation of +8 to -40% for the same medium thickness conditions has been observed. Cells irradiated in the same conditions showed significant differences in survival fraction, corroborating the effects of dosimetric changes on physical dose. This work shows the importance of dosimetry in radiobiology studies and the need of an accurate description of the dosimetry protocol used for irradiation.

  12. JAX Colony Management System (JCMS): an extensible colony and phenotype data management system.

    PubMed

    Donnelly, Chuck J; McFarland, Mike; Ames, Abigail; Sundberg, Beth; Springer, Dave; Blauth, Peter; Bult, Carol J

    2010-04-01

    The Jackson Laboratory Colony Management System (JCMS) is a software application for managing data and information related to research mouse colonies, associated biospecimens, and experimental protocols. JCMS runs directly on computers that run one of the PC Windows operating systems, but can be accessed via web browser interfaces from any computer running a Windows, Macintosh, or Linux operating system. JCMS can be configured for a single user or multiple users in small- to medium-size work groups. The target audience for JCMS includes laboratory technicians, animal colony managers, and principal investigators. The application provides operational support for colony management and experimental workflows, sample and data tracking through transaction-based data entry forms, and date-driven work reports. Flexible query forms allow researchers to retrieve database records based on user-defined criteria. Recent advances in handheld computers with integrated barcode readers, middleware technologies, web browsers, and wireless networks add to the utility of JCMS by allowing real-time access to the database from any networked computer.

  13. J-Plus Web Portal

    NASA Astrophysics Data System (ADS)

    Civera Lorenzo, Tamara

    2017-10-01

    Brief presentation about the J-PLUS EDR data access web portal (http://archive.cefca.es/catalogues/jplus-edr) where the different services available to retrieve images and catalogues data have been presented.J-PLUS Early Data Release (EDR) archive includes two types of data: images and dual and single catalogue data which include parameters measured from images. J-PLUS web portal offers catalogue data and images through several different online data access tools or services each suited to a particular need. The different services offered are: Coverage map Sky navigator Object visualization Image search Cone search Object list search Virtual observatory services: Simple Cone Search Simple Image Access Protocol Simple Spectral Access Protocol Table Access Protocol

  14. Ice nucleating agents allow embryo freezing without manual seeding.

    PubMed

    Teixeira, Magda; Buff, Samuel; Desnos, Hugo; Loiseau, Céline; Bruyère, Pierre; Joly, Thierry; Commin, Loris

    2017-12-01

    Embryo slow freezing protocols include a nucleation induction step called manual seeding. This step is time consuming, manipulator dependent and hard to standardize. It requires access to samples, which is not always possible within the configuration of systems, such as differential scanning calorimeters or cryomicroscopes. Ice nucleation can be induced by other methods, e.g., by the use of ice nucleating agents. Snomax is a commercial preparation of inactivated proteins extracted from Pseudomonas syringae. The aim of our study was to investigate if Snomax can be an alternative to manual seeding in the slow freezing of mouse embryos. The influence of Snomax on the pH and osmolality of the freezing medium was evaluated. In vitro development (blastocyst formation and hatching rates) of fresh embryos exposed to Snomax and embryo cryopreserved with and without Snomax was assessed. The mitochondrial activity of frozen-thawed blastocysts was assessed by JC-1 fluorescent staining. Snomax didn't alter the physicochemical properties of the freezing medium, and did not affect embryo development of fresh embryos. After cryopreservation, the substitution of manual seeding by the ice nucleating agent (INA) Snomax did not affect embryo development or embryo mitochondrial activity. In conclusion, Snomax seems to be an effective ice nucleating agent for the slow freezing of mouse embryos. Snomax can also be a valuable alternative to manual seeding in research protocols in which manual seeding cannot be performed (i.e., differential scanning calorimetry and cryomicroscopy). Copyright © 2017 Elsevier Inc. All rights reserved.

  15. Apricot (Prunus armeniaca L.).

    PubMed

    Petri, César; Alburquerque, Nuria; Burgos, Lorenzo

    2015-01-01

    A protocol for Agrobacterium-mediated stable transformation of whole leaf explants of the apricot (Prunus armeniaca) cultivars 'Helena' and 'Canino' is described. Regenerated buds were selected using a two-step selection strategy with paromomycin sulfate and transferred to bud multiplication medium 1 week after they were detected for optimal survival. After buds were transferred to bud multiplication medium, antibiotic was changed to kanamycin and concentration increased gradually at each transfer to fresh medium in order to eliminate possible escapes and chimeras. Transformation efficiency, based on PCR analysis of individual putative transformed shoots from independent lines, was 5.6%. Green and healthy buds, surviving high kanamycin concentration, were transferred to shoot multiplication medium where they elongated in shoots and proliferated. Elongated transgenic shoots were rooted in a medium containing 70 μM kanamycin. Rooted plants were acclimatized following standard procedures. This constitutes the only transformation protocol described for apricot clonal tissues and one of the few of Prunus.

  16. A minimal cost micropropagation protocol for Dianthus caryophyllus L.-- a commercially significant venture.

    PubMed

    Pant, Manu

    2016-03-01

    In tissue culture, high production cost of the products restricts their reach. Though tissue culture is a major strength in floriculture it is marred by pricing issues. Hence, we developed a complete regeneration low cost micropropagation protocol for an economically important floriculture crop, carnation (Dianthus caryophyllus L.). Successful regeneration of carnation from nodal explants on cost-efficient medium indicates that psyllium husk, sugar and RO water can effectively replace the conventional medium comprising agar, sucrose and distilled water. The protocol can contribute to increased carnation production at comparatively reduced cost, and there by encourage wide scale adoption by the common growers.

  17. Health care access for rural youth on equal terms? A mixed methods study protocol in northern Sweden.

    PubMed

    Goicolea, Isabel; Carson, Dean; San Sebastian, Miguel; Christianson, Monica; Wiklund, Maria; Hurtig, Anna-Karin

    2018-01-11

    The purpose of this paper is to propose a protocol for researching the impact of rural youth health service strategies on health care access. There has been no published comprehensive assessment of the effectiveness of youth health strategies in rural areas, and there is no clearly articulated model of how such assessments might be conducted. The protocol described here aims to gather information to; i) Assess rural youth access to health care according to their needs, ii) Identify and understand the strategies developed in rural areas to promote youth access to health care, and iii) Propose actions for further improvement. The protocol is described with particular reference to research being undertaken in the four northernmost counties of Sweden, which contain a widely dispersed and diverse youth population. The protocol proposes qualitative and quantitative methodologies sequentially in four phases. First, to map youth access to health care according to their health care needs, including assessing horizontal equity (equal use of health care for equivalent health needs,) and vertical equity (people with greater health needs should receive more health care than those with lesser needs). Second, a multiple case study design investigates strategies developed across the region (youth clinics, internet applications, public health programs) to improve youth access to health care. Third, qualitative comparative analysis of the 24 rural municipalities in the region identifies the best combination of conditions leading to high youth access to health care. Fourth, a concept mapping study involving rural stakeholders, care providers and youth provides recommended actions to improve rural youth access to health care. The implementation of this research protocol will contribute to 1) generating knowledge that could contribute to strengthening rural youth access to health care, as well as to 2) advancing the application of mixed methods to explore access to health care.

  18. Method and apparatus for communicating computer data from one point to another over a communications medium

    DOEpatents

    Arneson, Michael R [Chippewa Falls, WI; Bowman, Terrance L [Sumner, WA; Cornett, Frank N [Chippewa Falls, WI; DeRyckere, John F [Eau Claire, WI; Hillert, Brian T [Chippewa Falls, WI; Jenkins, Philip N [Eau Claire, WI; Ma, Nan [Chippewa Falls, WI; Placek, Joseph M [Chippewa Falls, WI; Ruesch, Rodney [Eau Claire, WI; Thorson, Gregory M [Altoona, WI

    2007-07-24

    The present invention is directed toward a communications channel comprising a link level protocol, a driver, a receiver, and a canceller/equalizer. The link level protocol provides logic for DC-free signal encoding and recovery as well as supporting many features including CRC error detection and message resend to accommodate infrequent bit errors across the medium. The canceller/equalizer provides equalization for destabilized data signals and also provides simultaneous bi-directional data transfer. The receiver provides bit deskewing by removing synchronization error, or skewing, between data signals. The driver provides impedance controlling by monitoring the characteristics of the communications medium, like voltage or temperature, and providing a matching output impedance in the signal driver so that fewer distortions occur while the data travels across the communications medium.

  19. Structural barriers in access to medical marijuana in the USA-a systematic review protocol.

    PubMed

    Valencia, Celina I; Asaolu, Ibitola O; Ehiri, John E; Rosales, Cecilia

    2017-08-07

    There are 43 state medical marijuana programs in the USA, yet limited evidence is available on the demographic characteristics of the patient population accessing these programs. Moreover, insights into the social and structural barriers that inform patients' success in accessing medical marijuana are limited. A current gap in the scientific literature exists regarding generalizable data on the social, cultural, and structural mechanisms that hinder access to medical marijuana among qualifying patients. The goal of this systematic review, therefore, is to identify the aforementioned mechanisms that inform disparities in access to medical marijuana in the USA. This scoping review protocol outlines the proposed study design for the systematic review and evaluation of peer-reviewed scientific literature on structural barriers to medical marijuana access. The protocol follows the guidelines set forth by the Preferred Reporting Items for Systematic review and Meta-Analysis Protocols (PRISMA-P) checklist. The overarching goal of this study is to rigorously evaluate the existing peer-reviewed data on access to medical marijuana in the USA. Income, ethnic background, stigma, and physician preferences have been posited as the primary structural barriers influencing medical marijuana patient population demographics in the USA. Identification of structural barriers to accessing medical marijuana provides a framework for future policies and programs. Evidence-based policies and programs for increasing medical marijuana access help minimize the disparity of access among qualifying patients.

  20. Advanced teleprocessing systems

    NASA Astrophysics Data System (ADS)

    Kleinrock, L.; Gerla, M.

    1982-09-01

    This Annual Technical Report covers research covering the period from October 1, 1981 to September 30, 1982. This contract has three primary designated research areas: packet radio systems, resource sharing and allocation, and distributed processing and control. This report contains abstracts of publications which summarize research results in these areas followed by the main body of the report which is devoted to a study of channel access protocols that are executed by the nodes of a network to schedule their transmissions on multi-access broadcast channel. In particular the main body consists of a Ph.D. dissertation, Channel Access Protocols for Multi-Hop Broadcast Packet Radio Networks. This work discusses some new channel access protocols useful for mobile radio networks. Included is an analysis of slotted ALOHA and some tight bounds on the performance of all possible protocols in a mobile environment.

  1. 75 FR 69492 - Self-Regulatory Organizations; NASDAQ OMX BX, Inc.; Notice of Filing and Immediate Effectiveness...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-12

    ... month.[the following charges: $285/hour--For Active Connection testing using current Exchange access... using current Exchange access protocols; $333/hour--For Active Connection testing using current Exchange... a fee of $285 per hour for active connection testing using current BX access protocols during the...

  2. A study of topologies and protocols for fiber optic local area network

    NASA Technical Reports Server (NTRS)

    Yeh, C.; Gerla, M.; Rodrigues, P.

    1985-01-01

    The emergence of new applications requiring high data traffic necessitates the development of high speed local area networks. Optical fiber is selected as the transmission medium due to its inherent advantages over other possible media and the dual optical bus architecture is shown to be the most suitable topology. Asynchronous access protocols, including token, random, hybrid random/token, and virtual token schemes, are developed and analyzed. Exact expressions for insertion delay and utilization at light and heavy load are derived, and intermediate load behavior is investigated by simulation. A new tokenless adaptive scheme whose control depends only on the detection of activity on the channel is shown to outperform round-robin schemes under uneven loads and multipacket traffic and to perform optimally at light load. An approximate solution to the queueing delay for an oscillating polling scheme under chaining is obtained and results are compared with simulation. Solutions to the problem of building systems with a large number of stations are presented, including maximization of the number of optical couplers, and the use of passive star/bus topologies, bridges and gateways.

  3. A MAC Protocol to Support Monitoring of Underwater Spaces.

    PubMed

    Santos, Rodrigo; Orozco, Javier; Ochoa, Sergio F; Meseguer, Roc; Eggly, Gabriel; Pistonesi, Marcelo F

    2016-06-27

    Underwater sensor networks are becoming an important field of research, because of their everyday increasing application scope. Examples of their application areas are environmental and pollution monitoring (mainly oil spills), oceanographic data collection, support for submarine geolocalization, ocean sampling and early tsunamis alert. The challenge of performing underwater communications is well known, provided that radio signals are useless in this medium, and a wired solution is too expensive. Therefore, the sensors in these networks transmit their information using acoustic signals that propagate well under water. This data transmission type not only brings an opportunity, but also several challenges to the implementation of these networks, e.g., in terms of energy consumption, data transmission and signal interference. In order to help advance the knowledge in the design and implementation of these networks for monitoring underwater spaces, this paper proposes a MAC protocol for acoustic communications between the nodes, based on a self-organized time division multiple access mechanism. The proposal was evaluated using simulations of a real monitoring scenario, and the obtained results are highly encouraging.

  4. A Brief Survey of Media Access Control, Data Link Layer, and Protocol Technologies for Lunar Surface Communications

    NASA Technical Reports Server (NTRS)

    Wallett, Thomas M.

    2009-01-01

    This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.

  5. Optimized conditions for primary culture of pituitary cells from the Atlantic cod (Gadus morhua). The importance of osmolality, pCO₂, and pH.

    PubMed

    Hodne, Kjetil; von Krogh, Kristine; Weltzien, Finn-Arne; Sand, Olav; Haug, Trude M

    2012-09-01

    Protocols for primary cultures of teleost cells are commonly only moderately adjusted from similar protocols for mammalian cells, the main adjustment often being of temperature. Because aquatic habitats are in general colder than mammalian body temperatures and teleosts have gills in direct contact with water, pH and buffer capacity of blood and extracellular fluid are different in fish and mammals. Plasma osmolality is generally higher in marine teleosts than in mammals. Using Atlantic cod (Gadus morhua) as a model, we have optimized these physiological parameters to maintain primary pituitary cells in culture for an extended period without loosing key properties. L-15 medium with adjusted osmolality, adapted to low pCO(2) (3.8mm Hg) and temperature (12°C), and with pH 7.85, maintained the cells in a physiologically sounder state than traditional culture medium, significantly improving cell viability compared to the initial protocol. In the optimized culture medium, resting membrane potential and response to releasing hormone were stable for at least two weeks, and the proportion of cells firing action potentials during spawning season was about seven times higher than in the original culture medium. The cells were moderately more viable when the modified medium was supplemented with newborn calf serum or artificial serum substitute. Compared to serum-free L-15 medium, expression of key genes (lhb, fshb, and gnrhr2a) was better maintained in medium containing SSR, whereas NCS tended to decrease the expression level. Although serum-free medium is adequate for many applications, serum supplement may be preferable for experiments dependent on membrane integrity. Copyright © 2012 Elsevier Inc. All rights reserved.

  6. Research on a Queue Scheduling Algorithm in Wireless Communications Network

    NASA Astrophysics Data System (ADS)

    Yang, Wenchuan; Hu, Yuanmei; Zhou, Qiancai

    This paper proposes a protocol QS-CT, Queue Scheduling Mechanism based on Multiple Access in Ad hoc net work, which adds queue scheduling mechanism to RTS-CTS-DATA using multiple access protocol. By endowing different queues different scheduling mechanisms, it makes networks access to the channel much more fairly and effectively, and greatly enhances the performance. In order to observe the final performance of the network with QS-CT protocol, we simulate it and compare it with MACA/C-T without QS-CT protocol. Contrast to MACA/C-T, the simulation result shows that QS-CT has greatly improved the throughput, delay, rate of packets' loss and other key indicators.

  7. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols

    PubMed Central

    Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon

    2016-01-01

    Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network. PMID:27314351

  8. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols.

    PubMed

    Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon

    2016-06-14

    Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network.

  9. An improved ATAC-seq protocol reduces background and enables interrogation of frozen tissues.

    PubMed

    Corces, M Ryan; Trevino, Alexandro E; Hamilton, Emily G; Greenside, Peyton G; Sinnott-Armstrong, Nicholas A; Vesuna, Sam; Satpathy, Ansuman T; Rubin, Adam J; Montine, Kathleen S; Wu, Beijing; Kathiria, Arwa; Cho, Seung Woo; Mumbach, Maxwell R; Carter, Ava C; Kasowski, Maya; Orloff, Lisa A; Risca, Viviana I; Kundaje, Anshul; Khavari, Paul A; Montine, Thomas J; Greenleaf, William J; Chang, Howard Y

    2017-10-01

    We present Omni-ATAC, an improved ATAC-seq protocol for chromatin accessibility profiling that works across multiple applications with substantial improvement of signal-to-background ratio and information content. The Omni-ATAC protocol generates chromatin accessibility profiles from archival frozen tissue samples and 50-μm sections, revealing the activities of disease-associated DNA elements in distinct human brain structures. The Omni-ATAC protocol enables the interrogation of personal regulomes in tissue context and translational studies.

  10. Abbreviated MRI Protocols: Wave of the Future for Breast Cancer Screening.

    PubMed

    Chhor, Chloe M; Mercado, Cecilia L

    2017-02-01

    The purpose of this article is to describe the use of abbreviated breast MRI protocols for improving access to screening for women at intermediate risk. Breast MRI is not a cost-effective modality for screening women at intermediate risk, including those with dense breast tissue as the only risk. Abbreviated breast MRI protocols have been proposed as a way of achieving efficiency and rapid throughput. Use of these abbreviated protocols may increase availability and provide women with greater access to breast MRI.

  11. Xrootd in dCache - design and experiences

    NASA Astrophysics Data System (ADS)

    Behrmann, Gerd; Ozerov, Dmitry; Zangerl, Thomas

    2011-12-01

    dCache is a well established distributed storage solution used in both high energy physics computing and other disciplines. An overview of the implementation of the xrootd data access protocol within dCache is presented. The performance of various access mechanisms is studied and compared and it is concluded that our implementation is as perfomant as other protocols. This makes dCache a compelling alternative to the Scalla software suite implementation of xrootd, with added value from broad protocol support, including the IETF approved NFS 4.1 protocol.

  12. Adaptive Code Division Multiple Access Protocol for Wireless Network-on-Chip Architectures

    NASA Astrophysics Data System (ADS)

    Vijayakumaran, Vineeth

    Massive levels of integration following Moore's Law ushered in a paradigm shift in the way on-chip interconnections were designed. With higher and higher number of cores on the same die traditional bus based interconnections are no longer a scalable communication infrastructure. On-chip networks were proposed enabled a scalable plug-and-play mechanism for interconnecting hundreds of cores on the same chip. Wired interconnects between the cores in a traditional Network-on-Chip (NoC) system, becomes a bottleneck with increase in the number of cores thereby increasing the latency and energy to transmit signals over them. Hence, there has been many alternative emerging interconnect technologies proposed, namely, 3D, photonic and multi-band RF interconnects. Although they provide better connectivity, higher speed and higher bandwidth compared to wired interconnects; they also face challenges with heat dissipation and manufacturing difficulties. On-chip wireless interconnects is one other alternative proposed which doesn't need physical interconnection layout as data travels over the wireless medium. They are integrated into a hybrid NOC architecture consisting of both wired and wireless links, which provides higher bandwidth, lower latency, lesser area overhead and reduced energy dissipation in communication. However, as the bandwidth of the wireless channels is limited, an efficient media access control (MAC) scheme is required to enhance the utilization of the available bandwidth. This thesis proposes using a multiple access mechanism such as Code Division Multiple Access (CDMA) to enable multiple transmitter-receiver pairs to send data over the wireless channel simultaneously. It will be shown that such a hybrid wireless NoC with an efficient CDMA based MAC protocol can significantly increase the performance of the system while lowering the energy dissipation in data transfer. In this work it is shown that the wireless NoC with the proposed CDMA based MAC protocol outperformed the wired counterparts and several other wireless architectures proposed in literature in terms of bandwidth and packet energy dissipation. Significant gains were observed in packet energy dissipation and bandwidth even with scaling the system to higher number of cores. Non-uniform traffic simulations showed that the proposed CDMA-WiNoC was consistent in bandwidth across all traffic patterns. It is also shown that the CDMA based MAC scheme does not introduce additional reliability concerns in data transfer over the on-chip wireless interconnects.

  13. Traffic Management for Emergency Vehicle Priority Based on Visual Sensing.

    PubMed

    Nellore, Kapileswar; Hancke, Gerhard P

    2016-11-10

    Vehicular traffic is endlessly increasing everywhere in the world and can cause terrible traffic congestion at intersections. Most of the traffic lights today feature a fixed green light sequence, therefore the green light sequence is determined without taking the presence of the emergency vehicles into account. Therefore, emergency vehicles such as ambulances, police cars, fire engines, etc. stuck in a traffic jam and delayed in reaching their destination can lead to loss of property and valuable lives. This paper presents an approach to schedule emergency vehicles in traffic. The approach combines the measurement of the distance between the emergency vehicle and an intersection using visual sensing methods, vehicle counting and time sensitive alert transmission within the sensor network. The distance between the emergency vehicle and the intersection is calculated for comparison using Euclidean distance, Manhattan distance and Canberra distance techniques. The experimental results have shown that the Euclidean distance outperforms other distance measurement techniques. Along with visual sensing techniques to collect emergency vehicle information, it is very important to have a Medium Access Control (MAC) protocol to deliver the emergency vehicle information to the Traffic Management Center (TMC) with less delay. Then only the emergency vehicle is quickly served and can reach the destination in time. In this paper, we have also investigated the MAC layer in WSNs to prioritize the emergency vehicle data and to reduce the transmission delay for emergency messages. We have modified the medium access procedure used in standard IEEE 802.11p with PE-MAC protocol, which is a new back off selection and contention window adjustment scheme to achieve low broadcast delay for emergency messages. A VANET model for the UTMS is developed and simulated in NS-2. The performance of the standard IEEE 802.11p and the proposed PE-MAC is analysed in detail. The NS-2 simulation results have shown that the PE-MAC outperforms the IEEE 802.11p in terms of average end-to-end delay, throughput and energy consumption. The performance evaluation results have proven that the proposed PE-MAC prioritizes the emergency vehicle data and delivers the emergency messages to the TMC with less delay compared to the IEEE 802.11p. The transmission delay of the proposed PE-MAC is also compared with the standard IEEE 802.15.4, and Enhanced Back-off Selection scheme for IEEE 802.15.4 protocol [EBSS, an existing protocol to ensure fast transmission of the detected events on the road towards the TMC] and the comparative results have proven the effectiveness of the PE-MAC over them. Furthermore, this research work will provide an insight into the design of an intelligent urban traffic management system for the effective management of emergency vehicles and will help to save lives and property.

  14. Web-accessible molecular modeling with Rosetta: The Rosetta Online Server that Includes Everyone (ROSIE).

    PubMed

    Moretti, Rocco; Lyskov, Sergey; Das, Rhiju; Meiler, Jens; Gray, Jeffrey J

    2018-01-01

    The Rosetta molecular modeling software package provides a large number of experimentally validated tools for modeling and designing proteins, nucleic acids, and other biopolymers, with new protocols being added continually. While freely available to academic users, external usage is limited by the need for expertise in the Unix command line environment. To make Rosetta protocols available to a wider audience, we previously created a web server called Rosetta Online Server that Includes Everyone (ROSIE), which provides a common environment for hosting web-accessible Rosetta protocols. Here we describe a simplification of the ROSIE protocol specification format, one that permits easier implementation of Rosetta protocols. Whereas the previous format required creating multiple separate files in different locations, the new format allows specification of the protocol in a single file. This new, simplified protocol specification has more than doubled the number of Rosetta protocols available under ROSIE. These new applications include pK a determination, lipid accessibility calculation, ribonucleic acid redesign, protein-protein docking, protein-small molecule docking, symmetric docking, antibody docking, cyclic toxin docking, critical binding peptide determination, and mapping small molecule binding sites. ROSIE is freely available to academic users at http://rosie.rosettacommons.org. © 2017 The Protein Society.

  15. Superovulation, in vitro fertilization (IVF) and in vitro development (IVD) protocols for inbred BALB/cJ mice in comparison with outbred NMRI mice.

    PubMed

    Golkar-Narenji, Afsaneh; Gourabi, Hamid; Eimani, Hussein; Barekati, Zeinab; Akhlaghi, Aliasghar

    2012-10-01

    To study assisted reproductive technology (ART) protocols including superovulation, in vitro fertilization (IVF) and in vitro development (IVD) for BALB/cJ mice in comparison with a common ART protocol for NMRI mice. Adult NMRI and BALB/cJ mice were superovulated using a 48 h G-interval. In order to find a more suitable G-interval for the BALB/cJ strain, G-intervals including 44, 46 and 50 h were also examined. Superovulation rates were recorded in all groups. IVF rate of BALB/c oocytes in T6 and mHTF media were compared. IVD rates of BALB/cJ zygotes in mHTF, T6 and G1V 5 /G2V 5 media were compared. In addition, IVF and IVD rates of BALB/cJ and NMRI oocytes were compared in T6 medium during IVF-IVD procedures. In BALB/cJ mice the highest superovulation rates were observed with 44-46 h G-intervals. However, with a 48 h G-interval, superovulation rates were significantly lower in BALB/cJ compared to NMRI mice ( p < 0.05). mHTF medium significantly increased in vitro fertilization of BALB/cJ oocytes compared to T6 medium ( p < 0.05). Fertilization rate of NMRI oocytes was significantly higher than BALB/cJ oocytes in T6 medium ( p < 0.05). The BALB/cJ embryo IVD was significantly higher in G1/G2 medium compared to mHTF and T6 media ( p < 0.01). Superovulation with 48 h G-interval and using T6 during all in vitro procedures produces embryos more efficiently for NMRI mice than for BALB/cJ mice. For BALB/cJ mice, a protocol including superovulation with a 44-46 h G-interval, using mHTF during IVF and G1V 5 /G2V 5 medium during IVD, may improve in vitro embryo production.

  16. Redactions in protocols for drug trials: what industry sponsors concealed.

    PubMed

    Marquardsen, Mikkel; Ogden, Michelle; Gøtzsche, Peter C

    2018-04-01

    Objective To describe the redactions in contemporary protocols for industry-sponsored randomised drug trials with patient relevant outcomes and to evaluate whether there was a legitimate rationale for the redactions. Design Cohort study. Under the Freedom of Information Act, we requested access to trial protocols approved by a research ethics committee in Denmark from October 2012 to March 2013. We received 17 consecutive protocols, which had been redacted before we got them, and nine protocols without redactions. In five additional cases, the companies refused to let the committees give us access, and in three other cases, documents were missing. Participants Not applicable. Setting Not applicable. Main outcome measure Amount and nature of redactions in 22 predefined key protocol variables. Results The redactions were most widespread in those sections of the protocol where there is empirical evidence of substantial problems with the trustworthiness of published drug trials: data analysis, handling of missing data, detection and analysis of adverse events, definition of the outcomes, interim analyses and premature termination of the study, sponsor's access to incoming data while the study is running, ownership to the data and investigators' publication rights. The parts of the text that were redacted differed widely, both between companies and within the same company. Conclusions We could not identify any legitimate rationale for the redactions. The current mistrust in industry-sponsored drug trials can only change if the industry offers unconditional access to its trial protocols and other relevant documents and data.

  17. Multiphase contrast medium injection for optimization of computed tomographic coronary angiography.

    PubMed

    Budoff, Matthew Jay; Shinbane, Jerold S; Child, Janis; Carson, Sivi; Chau, Alex; Liu, Stephen H; Mao, SongShou

    2006-02-01

    Electron beam angiography is a minimally invasive imaging technique. Adequate vascular opacification throughout the study remains a critical issue for image quality. We hypothesized that vascular image opacification and uniformity of vascular enhancement between slices can be improved using multiphase contrast medium injection protocols. We enrolled 244 consecutive patients who were randomized to three different injection protocols: single-phase contrast medium injection (Group 1), dual-phase contrast medium injection with each phase at a different injection rate (Group 2), and a three-phase injection with two phases of contrast medium injection followed by a saline injection phase (Group 3). Parameters measured were aortic opacification based on Hounsfield units and uniformity of aortic enhancement at predetermined slices (locations from top [level 1] to base [level 60]). In Group 1, contrast opacification differed across seven predetermined locations (scan levels: 1st versus 60th, P < .05), demonstrating significant nonuniformity. In Group 2, there was more uniform vascular enhancement, with no significant differences between the first 50 slices (P > .05). In Group 3, there was greater uniformity of vascular enhancement and higher mean Hounsfield units value across all 60 images, from the aortic root to the base of the heart (P < .05). The three-phase injection protocol improved vascular opacification at the base of the heart, as well as uniformity of arterial enhancement throughout the study.

  18. Implicit Block ACK Scheme for IEEE 802.11 WLANs

    PubMed Central

    Sthapit, Pranesh; Pyun, Jae-Young

    2016-01-01

    The throughput of IEEE 802.11 standard is significantly bounded by the associated Medium Access Control (MAC) overhead. Because of the overhead, an upper limit exists for throughput, which is bounded, including situations where data rates are extremely high. Therefore, an overhead reduction is necessary to achieve higher throughput. The IEEE 802.11e amendment introduced the block ACK mechanism, to reduce the number of control messages in MAC. Although the block ACK scheme greatly reduces overhead, further improvements are possible. In this letter, we propose an implicit block ACK method that further reduces the overhead associated with IEEE 802.11e’s block ACK scheme. The mathematical analysis results are presented for both the original protocol and the proposed scheme. A performance improvement of greater than 10% was achieved with the proposed implementation.

  19. Cooperative Vehicular Networking: A Survey

    PubMed Central

    Ahmed, Ejaz

    2018-01-01

    With the remarkable progress of cooperative communication technology in recent years, its transformation to vehicular networking is gaining momentum. Such a transformation has brought a new research challenge in facing the realization of cooperative vehicular networking (CVN). This paper presents a comprehensive survey of recent advances in the field of CVN. We cover important aspects of CVN research, including physical, medium access control, and routing protocols, as well as link scheduling and security. We also classify these research efforts in a taxonomy of cooperative vehicular networks. A set of key requirements for realizing the vision of cooperative vehicular networks is then identified and discussed. We also discuss open research challenges in enabling CVN. Lastly, the paper concludes by highlighting key points of research and future directions in the domain of CVN. PMID:29881331

  20. Digital Breast Tomosynthesis: Observer Performance of Clustered Microcalcification Detection on Breast Phantom Images Acquired with an Experimental System Using Variable Scan Angles, Angular Increments, and Number of Projection Views

    PubMed Central

    Goodsitt, Mitchell M.; Helvie, Mark A.; Zelakiewicz, Scott; Schmitz, Andrea; Noroozian, Mitra; Paramagul, Chintana; Roubidoux, Marilyn A.; Nees, Alexis V.; Neal, Colleen H.; Carson, Paul; Lu, Yao; Hadjiiski, Lubomir; Wei, Jun

    2014-01-01

    Purpose To investigate the dependence of microcalcification cluster detectability on tomographic scan angle, angular increment, and number of projection views acquired at digital breast tomosynthesis (DBTdigital breast tomosynthesis). Materials and Methods A prototype DBTdigital breast tomosynthesis system operated in step-and-shoot mode was used to image breast phantoms. Four 5-cm-thick phantoms embedded with 81 simulated microcalcification clusters of three speck sizes (subtle, medium, and obvious) were imaged by using a rhodium target and rhodium filter with 29 kV, 50 mAs, and seven acquisition protocols. Fixed angular increments were used in four protocols (denoted as scan angle, angular increment, and number of projection views, respectively: 16°, 1°, and 17; 24°, 3°, and nine; 30°, 3°, and 11; and 60°, 3°, and 21), and variable increments were used in three (40°, variable, and 13; 40°, variable, and 15; and 60°, variable, and 21). The reconstructed DBTdigital breast tomosynthesis images were interpreted by six radiologists who located the microcalcification clusters and rated their conspicuity. Results The mean sensitivity for detection of subtle clusters ranged from 80% (22.5 of 28) to 96% (26.8 of 28) for the seven DBTdigital breast tomosynthesis protocols; the highest sensitivity was achieved with the 16°, 1°, and 17 protocol (96%), but the difference was significant only for the 60°, 3°, and 21 protocol (80%, P < .002) and did not reach significance for the other five protocols (P = .01–.15). The mean sensitivity for detection of medium and obvious clusters ranged from 97% (28.2 of 29) to 100% (24 of 24), but the differences fell short of significance (P = .08 to >.99). The conspicuity of subtle and medium clusters with the 16°, 1°, and 17 protocol was rated higher than those with other protocols; the differences were significant for subtle clusters with the 24°, 3°, and nine protocol and for medium clusters with 24°, 3°, and nine; 30°, 3°, and 11; 60°, 3° and 21; and 60°, variable, and 21 protocols (P < .002). Conclusion With imaging that did not include x-ray source motion or patient motion during acquisition of the projection views, narrow-angle DBTdigital breast tomosynthesis provided higher sensitivity and conspicuity than wide-angle DBTdigital breast tomosynthesis for subtle microcalcification clusters. © RSNA, 2014 PMID:25007048

  1. A protocol describing the use of a recombinant protein-based, animal product-free medium (APEL) for human embryonic stem cell differentiation as spin embryoid bodies.

    PubMed

    Ng, Elizabeth S; Davis, Richard; Stanley, Edouard G; Elefanty, Andrew G

    2008-01-01

    In order to promote the uniform and reproducible differentiation of human embryonic stem cells (HESCs) in response to exogenously added growth factors, we have developed a method (spin embryoid bodies (EBs)) that uses a recombinant protein-based, animal product-free medium in which HESCs are aggregated by centrifugation to form EBs. In this protocol we describe the formulation of this medium, denoted APEL (Albumin Polyvinylalcohol Essential Lipids), and its use in spin EB differentiation of HESCs. We also describe a more economical variant, BPEL (Bovine Serum Albumin (BSA) Polyvinylalchohol Essential Lipids), in which BSA replaces the recombinant human albumin. The integration of a medium that includes only defined and recombinant components with a defined number of cells to initiate EB formation results in a generally applicable, robust platform for growth factor-directed HESC differentiation.

  2. Determination of nitrogen-15 isotope fractionation in tropine: evaluation of extraction protocols for isotope ratio measurement by isotope ratio mass spectrometry.

    PubMed

    Molinié, Roland; Kwiecień, Renata A; Silvestre, Virginie; Robins, Richard J

    2009-12-01

    N-Demethylation of tropine is an important step in the degradation of this compound and related metabolites. With the purpose of understanding the reaction mechanism(s) involved, it is desirable to measure the 15N kinetic isotope effects (KIEs), which can be accessed through the 15N isotope shift (Deltadelta15N) during the reaction. To measure the isotope fractionation in 15N during tropine degradation necessitates the extraction of the residual substrate from dilute aqueous solution without introducing artefactual isotope fractionation. Three protocols have been compared for the extraction and measurement of the 15N/14N ratio of tropine from aqueous medium, involving liquid-liquid phase partitioning or silica-C18 solid-phase extraction. Quantification was by gas chromatography (GC) on the recovered organic phase and delta15N values were obtained by isotope ratio measurement mass spectrometry (irm-MS). Although all the protocols used can provide satisfactory data and both irm-EA-MS and irm-GC-MS can be used to obtain the delta15N values, the most convenient method is liquid-liquid extraction from a reduced aqueous volume combined with irm-GC-MS. The protocols are applied to the measurement of 15N isotope shifts during growth of a Pseudomonas strain that uses tropane alkaloids as sole source of carbon and nitrogen. The accuracy of the determination of the 15N/14N ratio is sufficient to be used for the determination of 15N-KIEs. Copyright 2009 John Wiley & Sons, Ltd.

  3. Implementation of a Cross-Layer Sensing Medium-Access Control Scheme.

    PubMed

    Su, Yishan; Fu, Xiaomei; Han, Guangyao; Xu, Naishen; Jin, Zhigang

    2017-04-10

    In this paper, compressed sensing (CS) theory is utilized in a medium-access control (MAC) scheme for wireless sensor networks (WSNs). We propose a new, cross-layer compressed sensing medium-access control (CL CS-MAC) scheme, combining the physical layer and data link layer, where the wireless transmission in physical layer is considered as a compress process of requested packets in a data link layer according to compressed sensing (CS) theory. We first introduced using compressive complex requests to identify the exact active sensor nodes, which makes the scheme more efficient. Moreover, because the reconstruction process is executed in a complex field of a physical layer, where no bit and frame synchronizations are needed, the asynchronous and random requests scheme can be implemented without synchronization payload. We set up a testbed based on software-defined radio (SDR) to implement the proposed CL CS-MAC scheme practically and to demonstrate the validation. For large-scale WSNs, the simulation results show that the proposed CL CS-MAC scheme provides higher throughput and robustness than the carrier sense multiple access (CSMA) and compressed sensing medium-access control (CS-MAC) schemes.

  4. A universal data access and protocol integration mechanism for smart home

    NASA Astrophysics Data System (ADS)

    Shao, Pengfei; Yang, Qi; Zhang, Xuan

    2013-03-01

    With the lack of standardized or completely missing communication interfaces in home electronics, there is no perfect solution to address every aspect in smart homes based on existing protocols and technologies. In addition, the central control unit (CCU) of smart home system working point-to-point between the multiple application interfaces and the underlying hardware interfaces leads to its complicated architecture and unpleasant performance. A flexible data access and protocol integration mechanism is required. The current paper offers a universal, comprehensive data access and protocol integration mechanism for a smart home. The universal mechanism works as a middleware adapter with unified agreements of the communication interfaces and protocols, offers an abstraction of the application level from the hardware specific and decoupling the hardware interface modules from the application level. Further abstraction for the application interfaces and the underlying hardware interfaces are executed based on adaption layer to provide unified interfaces for more flexible user applications and hardware protocol integration. This new universal mechanism fundamentally changes the architecture of the smart home and in some way meets the practical requirement of smart homes more flexible and desirable.

  5. An Efficient Plant Regeneration and Transformation System of Ma Bamboo (Dendrocalamus latiflorus Munro) Started from Young Shoot as Explant

    PubMed Central

    Ye, Shanwen; Cai, Changyang; Ren, Huibo; Wang, Wenjia; Xiang, Mengqi; Tang, Xiaoshan; Zhu, Caiping; Yin, Tengfei; Zhang, Li; Zhu, Qiang

    2017-01-01

    Genetic engineering technology has been successfully used in many plant species, but is limited in woody plants, especially in bamboos. Ma bamboo (Dendrocalamus latiflorus Munro) is one of the most important bamboo species in Asia, and its genetic improvement was largely restricted by the lack of an efficient regeneration and transformation method. Here we reported a plantlet regeneration and Agrobacterium-mediated transformation protocol by using Ma bamboo young shoots as explants. Under our optimized conditions, embryogenic calluses were successfully induced from the excised young shoots on callus induction medium and rapidly grew on callus multiplication medium. Shoots and roots were regenerated on shoot induction medium and root induction medium, respectively, with high efficiency. An Agrobacterium-mediated genetic transformation protocol of Ma bamboo was established, verified by PCR and GUS staining. Furthermore, the maize Lc gene under the control of the ubiquitin promoter was successfully introduced into Ma bamboo genome and generated an anthocyanin over-accumulation phenotype. Our methods established here will facilitate the basic research as well as genetic breeding of this important bamboo species. Key achievements: A stable and high efficiency regeneration and Agrobacterium-mediated transformation protocol for Ma bamboo from vegetative organ is established. PMID:28798758

  6. Pace: Privacy-Protection for Access Control Enforcement in P2P Networks

    NASA Astrophysics Data System (ADS)

    Sánchez-Artigas, Marc; García-López, Pedro

    In open environments such as peer-to-peer (P2P) systems, the decision to collaborate with multiple users — e.g., by granting access to a resource — is hard to achieve in practice due to extreme decentralization and the lack of trusted third parties. The literature contains a plethora of applications in which a scalable solution for distributed access control is crucial. This fact motivates us to propose a protocol to enforce access control, applicable to networks consisting entirely of untrusted nodes. The main feature of our protocol is that it protects both sensitive permissions and sensitive policies, and does not rely on any centralized authority. We analyze the efficiency (computational effort and communication overhead) as well as the security of our protocol.

  7. Research of Ad Hoc Networks Access Algorithm

    NASA Astrophysics Data System (ADS)

    Xiang, Ma

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. When the ad hoc network is the access network of the internet, the gateway discovery protocol is very important to choose the most appropriate gateway to guarantee the connectivity between ad hoc network and IP based fixed networks. The paper proposes a QoS gateway discovery protocol which uses the time delay and stable route to the gateway selection conditions. And according to the gateway discovery protocol, it also proposes a fast handover scheme which can decrease the handover time and improve the handover efficiency.

  8. Optimizing Libraries’ Content Findability Using Simple Object Access Protocol (SOAP) With Multi-Tier Architecture

    NASA Astrophysics Data System (ADS)

    Lahinta, A.; Haris, I.; Abdillah, T.

    2017-03-01

    The aim of this paper is to describe a developed application of Simple Object Access Protocol (SOAP) as a model for improving libraries’ digital content findability on the library web. The study applies XML text-based protocol tools in the collection of data about libraries’ visibility performance in the search results of the book. Model from the integrated Web Service Document Language (WSDL) and Universal Description, Discovery and Integration (UDDI) are applied to analyse SOAP as element within the system. The results showed that the developed application of SOAP with multi-tier architecture can help people simply access the website in the library server Gorontalo Province and support access to digital collections, subscription databases, and library catalogs in each library in Regency or City in Gorontalo Province.

  9. Browsing for the Best Internet Access Provider?

    ERIC Educational Resources Information Center

    Weil, Marty

    1996-01-01

    Highlights points to consider when choosing an Internet Service Provider. Serial Line Internet Protocol (SLIP) and Point to Point Protocol (PPP) are compared regarding price, performance, bandwidth, speed, and technical support. Obtaining access via local, national, consumer online, and telephone-company providers is discussed. A pricing chart and…

  10. Tooth Tissue Engineering: The Importance of Blood Products as a Supplement in Tissue Culture Medium for Human Pulp Dental Stem Cells.

    PubMed

    Pisciolaro, Ricardo Luiz; Duailibi, Monica Talarico; Novo, Neil Ferreira; Juliano, Yara; Pallos, Debora; Yelick, Pamela Crotty; Vacanti, Joseph Phillip; Ferreira, Lydia Masako; Duailibi, Silvio Eduardo

    2015-11-01

    One of the goals in using cells for tissue engineering (TE) and cell therapy consists of optimizing the medium for cell culture. The present study compares three different blood product supplements for improved cell proliferation and protection against DNA damage in cultured human dental pulp stem cells for tooth TE applications. Human cells from dental pulp were first characterized as adult stem cells (ectomesenchymal mixed origin) by flow cytometry. Next, four different cell culture conditions were tested: I, supplement-free; II, supplemented with fetal bovine serum; III, allogeneic human serum; and IV, autologous human serum. Cultured cells were then characterized for cell proliferation, mineralized nodule formation, and colony-forming units (CFU) capability. After 28 days in culture, the comet assay was performed to assess possible damage in cellular DNA. Our results revealed that Protocol IV achieved higher cell proliferation than Protocol I (p = 0.0112). Protocols II and III resulted in higher cell proliferation than Protocol I, but no statistical differences were found relative to Protocol IV. The comet assay revealed less cell damage in cells cultured using Protocol IV as compared to Protocols II and III. The damage percentage observed on Protocol II was significantly higher than all other protocols. CFUs capability was highest using Protocol IV (p = 0.0018) and III, respectively, and the highest degree of mineralization was observed using Protocol IV as compared to Protocols II and III. Protocol IV resulted in significantly improved cell proliferation, and no cell damage was observed. These results demonstrate that human blood product supplements can be used as feasible supplements for culturing adult human dental stem cells.

  11. Direct data access protocols benchmarking on DPM

    NASA Astrophysics Data System (ADS)

    Furano, Fabrizio; Devresse, Adrien; Keeble, Oliver; Mancinelli, Valentina

    2015-12-01

    The Disk Pool Manager is an example of a multi-protocol, multi-VO system for data access on the Grid that went though a considerable technical evolution in the last years. Among other features, its architecture offers the opportunity of testing its different data access frontends under exactly the same conditions, including hardware and backend software. This characteristic inspired the idea of collecting monitoring information from various testbeds in order to benchmark the behaviour of the HTTP and Xrootd protocols for the use case of data analysis, batch or interactive. A source of information is the set of continuous tests that are run towards the worldwide endpoints belonging to the DPM Collaboration, which accumulated relevant statistics in its first year of activity. On top of that, the DPM releases are based on multiple levels of automated testing that include performance benchmarks of various kinds, executed regularly every day. At the same time, the recent releases of DPM can report monitoring information about any data access protocol to the same monitoring infrastructure that is used to monitor the Xrootd deployments. Our goal is to evaluate under which circumstances the HTTP-based protocols can be good enough for batch or interactive data access. In this contribution we show and discuss the results that our test systems have collected under the circumstances that include ROOT analyses using TTreeCache and stress tests on the metadata performance.

  12. Very Low Intravenous Contrast Volume Protocol for Computed Tomography Angiography Providing Comprehensive Cardiac and Vascular Assessment Prior to Transcatheter Aortic Valve Replacement in Patients with Chronic Kidney Disease

    PubMed Central

    Pulerwitz, Todd C.; Khalique, Omar K.; Nazif, Tamim N.; Rozenshtein, Anna; Pearson, Gregory D.N.; Hahn, Rebecca T.; Vahl, Torsten P.; Kodali, Susheel K.; George, Isaac; Leon, Martin B.; D'Souza, Belinda; Po, Ming Jack; Einstein, Andrew J.

    2016-01-01

    Background Transcatheter aortic valve replacement (TAVR) is a lifesaving procedure for many patients high risk for surgical aortic valve replacement. The prevalence of chronic kidney disease (CKD) is high in this population, and thus a very low contrast volume (VLCV) computed tomography angiography (CTA) protocol providing comprehensive cardiac and vascular imaging would be valuable. Methods 52 patients with severe, symptomatic aortic valve disease, undergoing pre-TAVR CTA assessment from 2013-4 at Columbia University Medical Center were studied, including all 26 patients with CKD (eGFR<30mL/min) who underwent a novel VLCV protocol (20mL of iohexol at 2.5mL/s), and 26 standard-contrast-volume (SCV) protocol patients. Using a 320-slice volumetric scanner, the protocol included ECG-gated volume scanning of the aortic root followed by medium-pitch helical vascular scanning through the femoral arteries. Two experienced cardiologists performed aortic annulus and root measurements. Vascular image quality was assessed by two radiologists using a 4-point scale. Results VLCV patients had mean(±SD) age 86±6.5, BMI 23.9±3.4 kg/m2 with 54% men; SCV patients age 83±8.8, BMI 28.7±5.3 kg/m2, 65% men. There was excellent intra- and inter-observer agreement for annular and root measurements, and excellent agreement with 3D-transesophageal echocardiographic measurements. Both radiologists found diagnostic-quality vascular imaging in 96% of VLCV and 100% of SCV cases, with excellent inter-observer agreement. Conclusions This study is the first of its kind to report the feasibility and reproducibility of measurements for a VLCV protocol for comprehensive pre-TAVR CTA. There was excellent agreement of cardiac measurements and almost all studies were diagnostic quality for vascular access assessment. PMID:27061253

  13. The Integrated Safety-Critical Advanced Avionics Communication and Control (ISAACC) System Concept: Infrastructure for ISHM

    NASA Technical Reports Server (NTRS)

    Gwaltney, David A.; Briscoe, Jeri M.

    2005-01-01

    Integrated System Health Management (ISHM) architectures for spacecraft will include hard real-time, critical subsystems and soft real-time monitoring subsystems. Interaction between these subsystems will be necessary and an architecture supporting multiple criticality levels will be required. Demonstration hardware for the Integrated Safety-Critical Advanced Avionics Communication & Control (ISAACC) system has been developed at NASA Marshall Space Flight Center. It is a modular system using a commercially available time-triggered protocol, ?Tp/C, that supports hard real-time distributed control systems independent of the data transmission medium. The protocol is implemented in hardware and provides guaranteed low-latency messaging with inherent fault-tolerance and fault-containment. Interoperability between modules and systems of modules using the TTP/C is guaranteed through definition of messages and the precise message schedule implemented by the master-less Time Division Multiple Access (TDMA) communications protocol. "Plug-and-play" capability for sensors and actuators provides automatically configurable modules supporting sensor recalibration and control algorithm re-tuning without software modification. Modular components of controlled physical system(s) critical to control algorithm tuning, such as pumps or valve components in an engine, can be replaced or upgraded as "plug and play" components without modification to the ISAACC module hardware or software. ISAACC modules can communicate with other vehicle subsystems through time-triggered protocols or other communications protocols implemented over Ethernet, MIL-STD- 1553 and RS-485/422. Other communication bus physical layers and protocols can be included as required. In this way, the ISAACC modules can be part of a system-of-systems in a vehicle with multi-tier subsystems of varying criticality. The goal of the ISAACC architecture development is control and monitoring of safety critical systems of a manned spacecraft. These systems include spacecraft navigation and attitude control, propulsion, automated docking, vehicle health management and life support. ISAACC can integrate local critical subsystem health management with subsystems performing long term health monitoring. The ISAACC system and its relationship to ISHM will be presented.

  14. 76 FR 24862 - Proposed Information Collection; Comment Request; Protocol for Access to Tissue Specimen Samples...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-03

    ... Collection; Comment Request; Protocol for Access to Tissue Specimen Samples From the National Marine Mammal Tissue Bank AGENCY: National Oceanic and Atmospheric Administration (NOAA), Commerce. ACTION: Notice... National Marine Mammal Tissue Bank (NMMTB) was established by the National Marine Fisheries Service (NMFS...

  15. Securing TCP/IP and Dial-up Access to Administrative Data.

    ERIC Educational Resources Information Center

    Conrad, L. Dean

    1992-01-01

    This article describes Arizona State University's solution to security risk inherent in general access systems such as TCP/IP (Transmission Control Protocol/INTERNET Protocol). Advantages and disadvantages of various options are compared, and the process of selecting a log-on authentication approach involving generation of a different password at…

  16. Definition and evaluation of the data-link layer of PACnet

    NASA Astrophysics Data System (ADS)

    Alsafadi, Yasser H.; Martinez, Ralph; Sanders, William H.

    1991-07-01

    PACnet is a 200-500 Mbps dual-ring fiber optic network designed to implement a picture archiving and communication system (PACS) in a hospital environment. The network consists of three channels: an image transfer channel, a command and control channel, and a real-time data channel. An initial network interface unit (NIU) design for PACnet consisted of a functional description of the protocols and NIU major components. In order to develop a demonstration prototype, additional definition of protocol algorithms of each channel is necessary. Using the International Standards Organization/Open Systems Interconnection (ISO/OSI) reference model as a guide, the definition of the data link layer is extended. This definition covers interface service specifications for the two constituent sublayers: logical link control (LLC) and medium access control (MAC). Furthermore, it describes procedures for data transfer, mechanisms of error detection and fault recovery. A performance evaluation study was then made to determine how the network performs under various application scenarios. The performance evaluation study was performed using stochastic activity networks, which can formally describe the network behavior. The results of the study demonstrate the feasibility of PACnet as an integrated image, data, and voice network for PACS.

  17. Earth Observing System Data Gateway

    NASA Technical Reports Server (NTRS)

    Pfister, Robin; McMahon, Joe; Amrhein, James; Sefert, Ed; Marsans, Lorena; Solomon, Mark; Nestler, Mark

    2006-01-01

    The Earth Observing System Data Gateway (EDG) software provides a "one-stop-shopping" standard interface for exploring and ordering Earth-science data stored at geographically distributed sites. EDG enables a user to do the following: 1) Search for data according to high-level criteria (e.g., geographic location, time, or satellite that acquired the data); 2) Browse the results of a search, viewing thumbnail sketches of data that satisfy the user s criteria; and 3) Order selected data for delivery to a specified address on a chosen medium (e.g., compact disk or magnetic tape). EDG consists of (1) a component that implements a high-level client/server protocol, and (2) a collection of C-language libraries that implement the passing of protocol messages between an EDG client and one or more EDG servers. EDG servers are located at sites usually called "Distributed Active Archive Centers" (DAACs). Each DAAC may allow access to many individual data items, called "granules" (e.g., single Landsat images). Related granules are grouped into collections called "data sets." EDG enables a user to send a search query to multiple DAACs simultaneously, inspect the resulting information, select browseable granules, and then order selected data from the different sites in a seamless fashion.

  18. Nonpainful wide-area compression inhibits experimental pain.

    PubMed

    Honigman, Liat; Bar-Bachar, Ofrit; Yarnitsky, David; Sprecher, Elliot; Granovsky, Yelena

    2016-09-01

    Compression therapy, a well-recognized treatment for lymphoedema and venous disorders, pressurizes limbs and generates massive non-noxious afferent sensory barrages. The aim of this study was to study whether such afferent activity has an analgesic effect when applied on the lower limbs, hypothesizing that larger compression areas will induce stronger analgesic effects, and whether this effect correlates with conditioned pain modulation (CPM). Thirty young healthy subjects received painful heat and pressure stimuli (47°C for 30 seconds, forearm; 300 kPa for 15 seconds, wrist) before and during 3 compression protocols of either SMALL (up to ankles), MEDIUM (up to knees), or LARGE (up to hips) compression areas. Conditioned pain modulation (heat pain conditioned by noxious cold water) was tested before and after each compression protocol. The LARGE protocol induced more analgesia for heat than the SMALL protocol (P < 0.001). The analgesic effect interacted with gender (P = 0.015). The LARGE protocol was more efficient for females, whereas the MEDIUM protocol was more efficient for males. Pressure pain was reduced by all protocols (P < 0.001) with no differences between protocols and no gender effect. Conditioned pain modulation was more efficient than the compression-induced analgesia. For the LARGE protocol, precompression CPM efficiency positively correlated with compression-induced analgesia. Large body area compression exerts an area-dependent analgesic effect on experimental pain stimuli. The observed correlation with pain inhibition in response to robust non-noxious sensory stimulation may suggest that compression therapy shares similar mechanisms with inhibitory pain modulation assessed through CPM.

  19. Interactions of oxidized multiwalled carbon nanotube with cadmium on zebrafish cell line: The influence of two co-exposure protocols on in vitro toxicity tests.

    PubMed

    Morozesk, Mariana; Franqui, Lidiane S; Mansano, Adrislaine S; Martinez, Diego Stéfani T; Fernandes, Marisa N

    2018-05-05

    The widespread production and application of carbon nanotubes (CNT) have raising concerns about their release into the environment and, the joint toxicity of CNT with pre-existing contaminants needs to be assessed. This is the first study that investigated the co-exposure of oxidized multiwalled carbon nanotubes (ox-MWCNT) and cadmium (Cd) using a zebrafish liver cell line (ZFL). Two in vitro co-exposure protocols differing by the order of ox-MWCNT interaction with Cd and fetal bovine serum (FBS) proteins were evaluated. Ox-MWCNT was physical and chemical characterized and its adsorption capacity and colloidal stability in cell culture medium was determined in both protocols. Cytotoxicity was investigated by MTT, neutral red, trypan blue, lactate dehydrogenase assays and the necrosis and apoptosis events were determined using flow cytometer. The Cd presence in medium did not interfere in the protein corona composition of MWCNT but the order of interaction of FBS and Cd interfered in its colloidal stability and metal adsorption rate. The ox-MWCNT increased Cd toxicity at low concentration probably by a "Trojan horse" and/or synergistic effect, and induced apoptosis and necrosis in ZFL cells. Although it was not observed differences of toxicity between protocols, the interaction of ox-MWCNT first with Cd led to its precipitation in cell culture medium and, as a consequence, to a possible false viability result by neutral red assay. Taken together, it was evident that the order of compounds interactions disturbs the colloidal stability and affects the in vitro toxicological assays. Considering that Protocol A showed more ox-MWCNT stability after interaction with Cd, this protocol is recommended to be adopted in future studies. Copyright © 2018 Elsevier B.V. All rights reserved.

  20. Human-Induced Pluripotent Stem Cell-Derived Mesenchymal Stem Cells as an Individual-Specific and Renewable Source of Adult Stem Cells.

    PubMed

    Sequiera, Glen Lester; Saravanan, Sekaran; Dhingra, Sanjiv

    2017-01-01

    This chapter deals with the employment of human-induced pluripotent stem cells (hiPSCs) as a candidate to differentiate into mesenchymal stem cells (MSCs). This would enable to help establish a regular source of human MSCs with the aim of avoiding the problems associated with procuring the MSCs either from different healthy individuals or patients, limited extraction potentials, batch-to-batch variations or from diverse sources such as bone marrow or adipose tissue. The procedures described herein allow for a guided and ensured approach for the regular maintenance of hiPSCs and their subsequent differentiation into MSCs using the prescribed medium. Subsequently, an easy protocol for the successive isolation and purification of the hiPSC-differentiated MSCs is outlined, which is carried out through passaging and can be further sorted through flow cytometry. Further, the maintenance and expansion of the resultant hiPSC-differentiated MSCs using appropriate characterization techniques, i.e., Reverse-transcription PCR and immunostaining is also elaborated. The course of action has been deliberated keeping in mind the awareness and the requisites available to even beginner researchers who mostly have access to regular consumables and medium components found in the general laboratory.

  1. The igmspec database of public spectra probing the intergalactic medium

    NASA Astrophysics Data System (ADS)

    Prochaska, J. X.

    2017-04-01

    We describe v02 of igmspec, a database of publicly available ultraviolet, optical, and near-infrared spectra that probe the intergalactic medium (IGM). This database, a child of the specdb repository in the specdb github organization, comprises 403 277 unique sources and 434 686 spectra obtained with the world's greatest observatories. All of these data are distributed in a single ≈ 25GB HDF5 file maintained at the University of California Observatories and the University of California, Santa Cruz. The specdb software package includes Python scripts and modules for searching the source catalog and spectral datasets, and software links to the linetools package for spectral analysis. The repository also includes software to generate private spectral datasets that are compliant with International Virtual Observatory Alliance (IVOA) protocols and a Python-based interface for IVOA Simple Spectral Access queries. Future versions of igmspec will ingest other sources (e.g. gamma-ray burst afterglows) and other surveys as they become publicly available. The overall goal is to include every spectrum that effectively probes the IGM. Future databases of specdb may include publicly available galaxy spectra (exgalspec) and published supernovae spectra (snspec). The community is encouraged to join the effort on github: https://github.com/specdb.

  2. An Examination of the Design, Development, and Implementation of an Internet Protocol Version 6 Network: The ADTRAN Inc. Case Study

    ERIC Educational Resources Information Center

    Perigo, Levi

    2013-01-01

    In this dissertation, the author examined the capabilities of Internet Protocol version 6 (IPv6) in regard to replacing Internet Protocol version 4 (IPv4) as the internetworking technology for Medium-sized Businesses (MBs) in the Information Systems (IS) field. Transition to IPv6 is inevitable, and, thus, organizations are adopting this protocol…

  3. Comparison between publicly accessible publications, registries, and protocols of phase III trials indicated persistence of selective outcome reporting.

    PubMed

    Zhang, Sheng; Liang, Fei; Li, Wenfeng

    2017-11-01

    The decision to make protocols of phase III randomized controlled trials (RCTs) publicly accessible by leading journals was a landmark event in clinical trial reporting. Here, we compared primary outcomes defined in protocols with those in publications describing the trials and in trial registration. We identified phase III RCTs published between January 1, 2012, and June 30, 2015, in The New England Journal of Medicine, The Lancet, The Journal of the American Medical Association, and The BMJ with available protocols. Consistency in primary outcomes between protocols and registries (articles) was evaluated. We identified 299 phase III RCTs with available protocols in this analysis. Out of them, 25 trials (8.4%) had some discrepancy for primary outcomes between publications and protocols. Types of discrepancies included protocol-defined primary outcome reported as nonprimary outcome in publication (11 trials, 3.7%), protocol-defined primary outcome omitted in publication (10 trials, 3.3%), new primary outcome introduced in publication (8 trials, 2.7%), protocol-defined nonprimary outcome reported as primary outcome in publication (4 trials, 1.3%), and different timing of assessment of primary outcome (4 trials, 1.3%). Out of trials with discrepancies in primary outcome, 15 trials (60.0%) had discrepancies that favored statistically significant results. Registration could be seen as a valid surrogate of protocol in 237 of 299 trials (79.3%) with regard to primary outcome. Despite unrestricted public access to protocols, selective outcome reporting persists in a small fraction of phase III RCTs. Only studies from four leading journals were included, which may cause selection bias and limit the generalizability of this finding. Copyright © 2017 Elsevier Inc. All rights reserved.

  4. Channel Access in Erlang

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nicklaus, Dennis J.

    2013-10-13

    We have developed an Erlang language implementation of the Channel Access protocol. Included are low-level functions for encoding and decoding Channel Access protocol network packets as well as higher level functions for monitoring or setting EPICS process variables. This provides access to EPICS process variables for the Fermilab Acnet control system via our Erlang-based front-end architecture without having to interface to C/C++ programs and libraries. Erlang is a functional programming language originally developed for real-time telecommunications applications. Its network programming features and list management functions make it particularly well-suited for the task of managing multiple Channel Access circuits and PVmore » monitors.« less

  5. The Intersystem - Internetworking for space systems

    NASA Astrophysics Data System (ADS)

    Landauer, C.

    This paper is a description of the Intersystem, which is a mechanism for internetworking among existing and planned military satellite communication systems. The communication systems interconnected with this mechanism are called member systems, and the interconnected set of communication systems is called the Intersystem. The Intersystem is implemented with higher layer protocols that impose a common organization on the different signaling conventions, so that end users of different systems can communicate with each other. The Intersystem provides its coordination of member system access and resource requests with Intersystem Resource Controllers (IRCs), which are processors that implement the Intersystem protocols and have interfaces to the member systems' own access and resource control mechanisms. The IRCs are connected to each other to form the IRC Subnetwork. Terminals request services from the IRC Subnetwork using the Intersystem Access Control Protocols, and the IRC Subnetwork responses to the requests are coordinated using the RCRC (Resource Controller to Resource Controller) Protocols.

  6. On the designing of a tamper resistant prescription RFID access control system.

    PubMed

    Safkhani, Masoumeh; Bagheri, Nasour; Naderi, Majid

    2012-12-01

    Recently, Chen et al. have proposed a novel tamper resistant prescription RFID access control system, published in the Journal of Medical Systems. In this paper we consider the security of the proposed protocol and identify some existing weaknesses. The main attack is a reader impersonation attack which allows an active adversary to impersonate a legitimate doctor, e.g. the patient's doctor, to access the patient's tag and change the patient prescription. The presented attack is quite efficient. To impersonate a doctor, the adversary should eavesdrop one session between the doctor and the patient's tag and then she can impersonate the doctor with the success probability of '1'. In addition, we present efficient reader-tag to back-end database impersonation, de-synchronization and traceability attacks against the protocol. Finally, we propose an improved version of protocol which is more efficient compared to the original protocol while provides the desired security against the presented attacks.

  7. Traffic Management for Emergency Vehicle Priority Based on Visual Sensing

    PubMed Central

    Nellore, Kapileswar; Hancke, Gerhard P.

    2016-01-01

    Vehicular traffic is endlessly increasing everywhere in the world and can cause terrible traffic congestion at intersections. Most of the traffic lights today feature a fixed green light sequence, therefore the green light sequence is determined without taking the presence of the emergency vehicles into account. Therefore, emergency vehicles such as ambulances, police cars, fire engines, etc. stuck in a traffic jam and delayed in reaching their destination can lead to loss of property and valuable lives. This paper presents an approach to schedule emergency vehicles in traffic. The approach combines the measurement of the distance between the emergency vehicle and an intersection using visual sensing methods, vehicle counting and time sensitive alert transmission within the sensor network. The distance between the emergency vehicle and the intersection is calculated for comparison using Euclidean distance, Manhattan distance and Canberra distance techniques. The experimental results have shown that the Euclidean distance outperforms other distance measurement techniques. Along with visual sensing techniques to collect emergency vehicle information, it is very important to have a Medium Access Control (MAC) protocol to deliver the emergency vehicle information to the Traffic Management Center (TMC) with less delay. Then only the emergency vehicle is quickly served and can reach the destination in time. In this paper, we have also investigated the MAC layer in WSNs to prioritize the emergency vehicle data and to reduce the transmission delay for emergency messages. We have modified the medium access procedure used in standard IEEE 802.11p with PE-MAC protocol, which is a new back off selection and contention window adjustment scheme to achieve low broadcast delay for emergency messages. A VANET model for the UTMS is developed and simulated in NS-2. The performance of the standard IEEE 802.11p and the proposed PE-MAC is analysed in detail. The NS-2 simulation results have shown that the PE-MAC outperforms the IEEE 802.11p in terms of average end-to-end delay, throughput and energy consumption. The performance evaluation results have proven that the proposed PE-MAC prioritizes the emergency vehicle data and delivers the emergency messages to the TMC with less delay compared to the IEEE 802.11p. The transmission delay of the proposed PE-MAC is also compared with the standard IEEE 802.15.4, and Enhanced Back-off Selection scheme for IEEE 802.15.4 protocol [EBSS, an existing protocol to ensure fast transmission of the detected events on the road towards the TMC] and the comparative results have proven the effectiveness of the PE-MAC over them. Furthermore, this research work will provide an insight into the design of an intelligent urban traffic management system for the effective management of emergency vehicles and will help to save lives and property. PMID:27834924

  8. An Adaptive OFDMA-Based MAC Protocol for Underwater Acoustic Wireless Sensor Networks

    PubMed Central

    Khalil, Issa M.; Gadallah, Yasser; Hayajneh, Mohammad; Khreishah, Abdallah

    2012-01-01

    Underwater acoustic wireless sensor networks (UAWSNs) have many applications across various civilian and military domains. However, they suffer from the limited available bandwidth of acoustic signals and harsh underwater conditions. In this work, we present an Orthogonal Frequency Division Multiple Access (OFDMA)-based Media Access Control (MAC) protocol that is configurable to suit the operating requirements of the underwater sensor network. The protocol has three modes of operation, namely random, equal opportunity and energy-conscious modes of operation. Our MAC design approach exploits the multi-path characteristics of a fading acoustic channel to convert it into parallel independent acoustic sub-channels that undergo flat fading. Communication between node pairs within the network is done using subsets of these sub-channels, depending on the configurations of the active mode of operation. Thus, the available limited bandwidth gets fully utilized while completely avoiding interference. We derive the mathematical model for optimal power loading and subcarrier selection, which is used as basis for all modes of operation of the protocol. We also conduct many simulation experiments to evaluate and compare our protocol with other Code Division Multiple Access (CDMA)-based MAC protocols. PMID:23012517

  9. An adaptive OFDMA-based MAC protocol for underwater acoustic wireless sensor networks.

    PubMed

    Khalil, Issa M; Gadallah, Yasser; Hayajneh, Mohammad; Khreishah, Abdallah

    2012-01-01

    Underwater acoustic wireless sensor networks (UAWSNs) have many applications across various civilian and military domains. However, they suffer from the limited available bandwidth of acoustic signals and harsh underwater conditions. In this work, we present an Orthogonal Frequency Division Multiple Access (OFDMA)-based Media Access Control (MAC) protocol that is configurable to suit the operating requirements of the underwater sensor network. The protocol has three modes of operation, namely random, equal opportunity and energy-conscious modes of operation. Our MAC design approach exploits the multi-path characteristics of a fading acoustic channel to convert it into parallel independent acoustic sub-channels that undergo flat fading. Communication between node pairs within the network is done using subsets of these sub-channels, depending on the configurations of the active mode of operation. Thus, the available limited bandwidth gets fully utilized while completely avoiding interference. We derive the mathematical model for optimal power loading and subcarrier selection, which is used as basis for all modes of operation of the protocol. We also conduct many simulation experiments to evaluate and compare our protocol with other Code Division Multiple Access (CDMA)-based MAC protocols.

  10. 78 FR 14359 - Verizon Business Networks Services, Inc., Senior Analysts-Order Management, Voice Over Internet...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-05

    ... Business Networks Services, Inc., Senior Analysts-Order Management, Voice Over Internet Protocol, Small And Medium Business, Tampa, Florida; Verizon Business Networks Services, Inc., Senior Coordinator-Order... Business Networks Services, Inc., Senior Analysts-Order Management, Voice Over Internet Protocol, Small and...

  11. Transcranial magnetic stimulation with acepromazine or dexmedetomidine in combination with levomethadone/fenpipramide in healthy Beagle dogs.

    PubMed

    Amendt, H-L; Siedenburg, J S; Steffensen, N; Söbbeler, F J; Schütter, A; Tünsmeyer, J; Rohn, K; Kästner, S B R; Tipold, A; Stein, V M

    2016-11-01

    The aim of this study was to evaluate the influence of two sedation protocols on transcranial magnetic motor evoked potentials (TMMEPs) after transcranial magnetic stimulation in medium sized dogs. Onset latencies and peak-to-peak amplitudes, elicited in the extensor carpi radialis and cranial tibial muscles, were analysed in 10 healthy Beagles that received either acepromazine or dexmedetomidine in combination with levomethadone/fenpipramide, in a crossover design. Similar TMMEP recordings could be made using both sedation protocols at 80-90% stimulation intensity; however, there were significantly shorter onset latencies with the acepromazine-levomethadone/fenpipramide protocol at 100% stimulation intensity. Reference values were established and it was concluded that both drug combinations are feasible for measuring TMMEPs in medium sized dogs. Copyright © 2016 Elsevier Ltd. All rights reserved.

  12. 5G small-cell networks leveraging optical technologies with mm-wave massive MIMO and MT-MAC protocols

    NASA Astrophysics Data System (ADS)

    Papaioannou, S.; Kalfas, G.; Vagionas, C.; Mitsolidou, C.; Maniotis, P.; Miliou, A.; Pleros, N.

    2018-01-01

    Analog optical fronthaul for 5G network architectures is currently being promoted as a bandwidth- and energy-efficient technology that can sustain the data-rate, latency and energy requirements of the emerging 5G era. This paper deals with a new optical fronthaul architecture that can effectively synergize optical transceiver, optical add/drop multiplexer and optical beamforming integrated photonics towards a DSP-assisted analog fronthaul for seamless and medium-transparent 5G small-cell networks. Its main application targets include dense and Hot-Spot Area networks, promoting the deployment of mmWave massive MIMO Remote Radio Heads (RRHs) that can offer wireless data-rates ranging from 25Gbps up to 400Gbps depending on the fronthaul technology employed. Small-cell access and resource allocation is ensured via a Medium-Transparent (MT-) MAC protocol that enables the transparent communication between the Central Office and the wireless end-users or the lamp-posts via roof-top-located V-band massive MIMO RRHs. The MTMAC is analysed in detail with simulation and analytical theoretical results being in good agreement and confirming its credentials to satisfy 5G network latency requirements by guaranteeing latency values lower than 1 ms for small- to midload conditions. Its extension towards supporting optical beamforming capabilities and mmWave massive MIMO antennas is discussed, while its performance is analysed for different fiber fronthaul link lengths and different optical channel capacities. Finally, different physical layer network architectures supporting the MT-MAC scheme are presented and adapted to different 5G use case scenarios, starting from PON-overlaid fronthaul solutions and gradually moving through Spatial Division Multiplexing up to Wavelength Division Multiplexing transport as the user density increases.

  13. A real-time polymerase chain reaction-based protocol for low/medium-throughput Y-chromosome microdeletions analysis.

    PubMed

    Segat, Ludovica; Padovan, Lara; Doc, Darja; Petix, Vincenzo; Morgutti, Marcello; Crovella, Sergio; Ricci, Giuseppe

    2012-12-01

    We describe a real-time polymerase chain reaction (PCR) protocol based on the fluorescent molecule SYBR Green chemistry, for a low- to medium-throughput analysis of Y-chromosome microdeletions, optimized according to the European guidelines and aimed at making the protocol faster, avoiding post-PCR processing, and simplifying the results interpretation. We screened 156 men from the Assisted Reproduction Unit, Department of Obstetrics and Gynecology, Institute for Maternal and Child Health IRCCS Burlo Garofolo (Trieste, Italy), 150 not presenting Y-chromosome microdeletion, and 6 with microdeletions in different azoospermic factor (AZF) regions. For each sample, the Zinc finger Y-chromosomal protein (ZFY), sex-determining region Y (SRY), sY84, sY86, sY127, sY134, sY254, and sY255 loci were analyzed by performing one reaction for each locus. AZF microdeletions were successfully detected in six individuals, confirming the results obtained with commercial kits. Our real-time PCR protocol proved to be a rapid, safe, and relatively cheap method that was suitable for a low- to medium-throughput diagnosis of Y-chromosome microdeletion, which allows an analysis of approximately 10 samples (with the addition of positive and negative controls) in a 96-well plate format, or approximately 46 samples in a 384-well plate for all markers simultaneously, in less than 2 h without the need of post-PCR manipulation.

  14. Simple Spectral Lines Data Model Version 1.0

    NASA Astrophysics Data System (ADS)

    Osuna, Pedro; Salgado, Jesus; Guainazzi, Matteo; Dubernet, Marie-Lise; Roueff, Evelyne; Osuna, Pedro; Salgado, Jesus

    2010-12-01

    This document presents a Data Model to describe Spectral Line Transitions in the context of the Simple Line Access Protocol defined by the IVOA (c.f. Ref[13] IVOA Simple Line Access protocol) The main objective of the model is to integrate with and support the Simple Line Access Protocol, with which it forms a compact unit. This integration allows seamless access to Spectral Line Transitions available worldwide in the VO context. This model does not provide a complete description of Atomic and Molecular Physics, which scope is outside of this document. In the astrophysical sense, a line is considered as the result of a transition between two energy levels. Under the basis of this assumption, a whole set of objects and attributes have been derived to define properly the necessary information to describe lines appearing in astrophysical contexts. The document has been written taking into account available information from many different Line data providers (see acknowledgments section).

  15. Nonpainful wide-area compression inhibits experimental pain

    PubMed Central

    Honigman, Liat; Bar-Bachar, Ofrit; Yarnitsky, David; Sprecher, Elliot; Granovsky, Yelena

    2016-01-01

    Abstract Compression therapy, a well-recognized treatment for lymphoedema and venous disorders, pressurizes limbs and generates massive non-noxious afferent sensory barrages. The aim of this study was to study whether such afferent activity has an analgesic effect when applied on the lower limbs, hypothesizing that larger compression areas will induce stronger analgesic effects, and whether this effect correlates with conditioned pain modulation (CPM). Thirty young healthy subjects received painful heat and pressure stimuli (47°C for 30 seconds, forearm; 300 kPa for 15 seconds, wrist) before and during 3 compression protocols of either SMALL (up to ankles), MEDIUM (up to knees), or LARGE (up to hips) compression areas. Conditioned pain modulation (heat pain conditioned by noxious cold water) was tested before and after each compression protocol. The LARGE protocol induced more analgesia for heat than the SMALL protocol (P < 0.001). The analgesic effect interacted with gender (P = 0.015). The LARGE protocol was more efficient for females, whereas the MEDIUM protocol was more efficient for males. Pressure pain was reduced by all protocols (P < 0.001) with no differences between protocols and no gender effect. Conditioned pain modulation was more efficient than the compression-induced analgesia. For the LARGE protocol, precompression CPM efficiency positively correlated with compression-induced analgesia. Large body area compression exerts an area-dependent analgesic effect on experimental pain stimuli. The observed correlation with pain inhibition in response to robust non-noxious sensory stimulation may suggest that compression therapy shares similar mechanisms with inhibitory pain modulation assessed through CPM. PMID:27152691

  16. A new high-frequency Agrobacterium-mediated transformation technique for Sesamum indicum L. using de-embryonated cotyledon as explant.

    PubMed

    Chowdhury, Supriyo; Basu, Arpita; Kundu, Surekha

    2014-09-01

    In spite of the economic importance of sesame (Sesamum indicum L.) and the recent availability of its genome sequence, a high-frequency transformation protocol is still not available. The only two existing Agrobacterium-mediated transformation protocols that are available have poor transformation efficiencies of less than 2%. In the present study, we report a high-frequency, simple, and reproducible transformation protocol for sesame. Transformation was done using de-embryonated cotyledons via somatic embryogenic stages. All the critical parameters of transformation, like incubation period of explants in pre-regeneration medium prior to infection by Agrobacterium tumefaciens, cocultivation period, concentrations of acetosyringone in cocultivation medium, kanamycin concentration, and concentration of plant hormones, including 6-benzylaminopurine, have been optimized. This protocol is superior to the two existing protocols in its high regeneration and transformation efficiencies. The transformed sesame lines have been tested by PCR, RT-PCR for neomycin phosphotransferase II gene expression, and β-glucuronidase (GUS) assay. The regeneration frequency and transformation efficiency are 57.33 and 42.66%, respectively. T0 and T1 generation transgenic plants were analyzed, and several T1 plants homozygous for the transgenes were obtained.

  17. Optimizing the NASA Technical Report Server

    NASA Technical Reports Server (NTRS)

    Nelson, Michael L.; Maa, Ming-Hokng

    1996-01-01

    The NASA Technical Report Server (NTRS), a World Wide Web report distribution NASA technical publications service, is modified for performance enhancement, greater protocol support, and human interface optimization. Results include: Parallel database queries, significantly decreasing user access times by an average factor of 2.3; access from clients behind firewalls and/ or proxies which truncate excessively long Uniform Resource Locators (URLs); access to non-Wide Area Information Server (WAIS) databases and compatibility with the 239-50.3 protocol; and a streamlined user interface.

  18. The US Culture Collection Network responding to the requirements of the Nagoya Protocol on Access and Benefit Sharing

    USDA-ARS?s Scientific Manuscript database

    The US Culture Collection Network held a meeting to share information about how collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Bio...

  19. TANDEM BIS-ALDOL REACTION OF KETONES: A FACILE ONE-POT SYNTHESIS OF 1,3-DIOXANES IN AQUEOUS MEDIUM

    EPA Science Inventory

    A novel tandem bis-aldol reaction of ketone with paraformaldehyde catalyzed by polystyrenesulfonic acid in aqueous medium delivers 1,3-dioxanes in high yield. This one pot, operationally simple microwave-assisted synthetic protocol proceeds efficiently in water in the absence of ...

  20. Intelligent device management in the selfcare marketplace.

    PubMed

    Biniaris, Christos G; Marsh, Andrew J

    2008-01-01

    Over the last ten years the Internet has emerged as a key infrastructure for service innovation, enabling IP (Internet Protocol) to become the wide area network communication protocol of choice. The natural result of this choice is that service providers and their customers are looking for ways to optimise costs by migrating existing services and applications onto IP as well. A good example is the medical industry, which is transitioning to Internet-based communications as the field of telemedicine broadens to preventative and self healthcare. However, technology is changing quickly and consumers face an array of choices to satisfy their healthcare needs with numerous devices from different vendors. Seamless healthcare device networking can play a major role in automating and safeguarding the process of collecting and transferring medical data, remote patient monitoring and reducing costs through remote equipment monitoring. In this scope, we describe an approach augmenting the Session Initiation Protocol (SIP) with healthcare services in order to form a framework for efficient collection and storage of measurements, aiming to address the issues of the lack of a standardised data interface for consumer healthcare technologies (including hardware and protocols) and the lack of a standardised format for self-collected healthcare data (including the storage medium). In this framework, measurements can be seamlessly collected and stored as XML notes located virtually anywhere, such as the user's home or mobile device. Additionally, these notes can be accessed locally or remotely by doctors and specialists. Also, we discuss how this approach supports user mobility by proxying and redirecting requests to the user's current location and how it can remove the complexity of using consumer healthcare technologies from different vendors connected to different devices and the opportunities for Independent Software Vendors to develop additional services.

  1. Experimental considerations for fast kurtosis imaging.

    PubMed

    Hansen, Brian; Lund, Torben E; Sangill, Ryan; Stubbe, Ebbe; Finsterbusch, Jürgen; Jespersen, Sune Nørhøj

    2016-11-01

    The clinical use of kurtosis imaging is impeded by long acquisitions and postprocessing. Recently, estimation of mean kurtosis tensor W¯ and mean diffusivity ( D¯) was made possible from 13 distinct diffusion weighted MRI acquisitions (the 1-3-9 protocol) with simple postprocessing. Here, we analyze the effects of noise and nonideal diffusion encoding, and propose a new correction strategy. We also present a 1-9-9 protocol with increased robustness to experimental imperfections and minimal additional scan time. This refinement does not affect computation time and also provides a fast estimate of fractional anisotropy (FA). 1-3-9/1-9-9 data are acquired in rat and human brains, and estimates of D¯, FA, W¯ from human brains are compared with traditional estimates from an extensive diffusion kurtosis imaging data set. Simulations are used to evaluate the influence of noise and diffusion encodings deviating from the scheme, and the performance of the correction strategy. Optimal b-values are determined from simulations and data. Accuracy and precision in D¯ and W¯ are comparable to nonlinear least squares estimation, and is improved with the 1-9-9 protocol. The compensation strategy vastly improves parameter estimation in nonideal data. The framework offers a robust and compact method for estimating several diffusion metrics. The protocol is easily implemented. Magn Reson Med 76:1455-1468, 2016. © 2015 The Authors. Magnetic Resonance in Medicine published by Wiley Periodicals, Inc. on behalf of International Society for Magnetic Resonance in Medicine. This is an open access article under the terms of the Creative Commons Attribution License, which permits use, distribution and reproduction in any medium, provided the original work is properly cited. © 2015 The Authors. Magnetic Resonance in Medicine published by Wiley Periodicals, Inc. on behalf of International Society for Magnetic Resonance in Medicine.

  2. 49 CFR 1542.209 - Fingerprint-based criminal history records checks (CHRC).

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...) Violence at international airports; 18 U.S.C. 37. (28) Conspiracy or attempt to commit any of the criminal... medium to the issuer. (2) Each individual with unescorted access authority who has a disqualifying criminal offense must report the offense to the airport operator and surrender the SIDA access medium to...

  3. 49 CFR 1542.209 - Fingerprint-based criminal history records checks (CHRC).

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...) Violence at international airports; 18 U.S.C. 37. (28) Conspiracy or attempt to commit any of the criminal... medium to the issuer. (2) Each individual with unescorted access authority who has a disqualifying criminal offense must report the offense to the airport operator and surrender the SIDA access medium to...

  4. 49 CFR 1542.209 - Fingerprint-based criminal history records checks (CHRC).

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...) Violence at international airports; 18 U.S.C. 37. (28) Conspiracy or attempt to commit any of the criminal... medium to the issuer. (2) Each individual with unescorted access authority who has a disqualifying criminal offense must report the offense to the airport operator and surrender the SIDA access medium to...

  5. 49 CFR 1542.209 - Fingerprint-based criminal history records checks (CHRC).

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...) Violence at international airports; 18 U.S.C. 37. (28) Conspiracy or attempt to commit any of the criminal... medium to the issuer. (2) Each individual with unescorted access authority who has a disqualifying criminal offense must report the offense to the airport operator and surrender the SIDA access medium to...

  6. 49 CFR 1542.209 - Fingerprint-based criminal history records checks (CHRC).

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...) Violence at international airports; 18 U.S.C. 37. (28) Conspiracy or attempt to commit any of the criminal... medium to the issuer. (2) Each individual with unescorted access authority who has a disqualifying criminal offense must report the offense to the airport operator and surrender the SIDA access medium to...

  7. EPA GHG certification of medium- and heavy-duty vehicles: Development of road grade profiles representative of US controlled access highways

    DOE PAGES

    Wood, Eric; Duran, Adam; Kelly, Kenneth

    2016-09-27

    In collaboration with the U.S. Environmental Protection Agency and the U.S. Department of Energy, the National Renewable Energy Laboratory has conducted a national analysis of road grade characteristics experienced by U.S. medium- and heavy-duty trucks on controlled access highways. These characteristics have been developed using TomTom's commercially available street map and road grade database. Using the TomTom national road grade database, national statistics on road grade and hill distances were generated for the U.S. network of controlled access highways. These statistical distributions were then weighted using data provided by the U.S. Environmental Protection Agency for activity of medium- and heavy-dutymore » trucks on controlled access highways. Here, the national activity-weighted road grade and hill distance distributions were then used as targets for development of a handful of sample grade profiles potentially to be used in the U.S. Environmental Protection Agency's Greenhouse Gas Emissions Model certification tool as well as in dynamometer testing of medium- and heavy-duty vehicles and their powertrains.« less

  8. EPA GHG certification of medium- and heavy-duty vehicles: Development of road grade profiles representative of US controlled access highways

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wood, Eric; Duran, Adam; Kelly, Kenneth

    In collaboration with the U.S. Environmental Protection Agency and the U.S. Department of Energy, the National Renewable Energy Laboratory has conducted a national analysis of road grade characteristics experienced by U.S. medium- and heavy-duty trucks on controlled access highways. These characteristics have been developed using TomTom's commercially available street map and road grade database. Using the TomTom national road grade database, national statistics on road grade and hill distances were generated for the U.S. network of controlled access highways. These statistical distributions were then weighted using data provided by the U.S. Environmental Protection Agency for activity of medium- and heavy-dutymore » trucks on controlled access highways. Here, the national activity-weighted road grade and hill distance distributions were then used as targets for development of a handful of sample grade profiles potentially to be used in the U.S. Environmental Protection Agency's Greenhouse Gas Emissions Model certification tool as well as in dynamometer testing of medium- and heavy-duty vehicles and their powertrains.« less

  9. In Vitro Propagation and Conservation of Bacopa monnieri L.

    PubMed

    Sharma, Neelam; Singh, Rakesh; Pandey, Ruchira

    2016-01-01

    Bacopa monnieri L. (common name brahmi) is a traditional and renowned Indian medicinal plant with high commercial value for its memory revitalizer potential. Demand for this herb has further escalated due to popularization of various brahmi-based drugs coupled with reported anticancer property. Insufficient seed availability and problems associated with seed propagation including short seed viability are the major constraints of seed conservation in the gene banks. In vitro clonal propagation, a prerequisite for in vitro conservation by enhanced axillary branching was standardized. We have developed a simple, single step protocol for in vitro establishment, propagation and medium-term conservation of B. monnieri. Single node explants, cultured on Murashige and Skoog's medium supplemented with BA (0.2 mg/L), exhibited shoot proliferation without callus formation. Rooting was achieved on the same medium. The in vitro raised plants were successfully transferred to soil with ~80 % survival. On the same medium, shoots could also be conserved for 12 months with high survival and genetic stability was maintained as revealed by molecular markers. The protocol optimized in the present study has been applied for culture establishment, shoot multiplication and medium-term conservation of several Bacopa germplasm, procured from different agro-ecological regions of India.

  10. Microcomputer Applications with PC LAN (Local Area Network) in Battleships.

    DTIC Science & Technology

    1988-12-01

    NETWORKS 5 C. TRANSMISSION TECHNIQUES 6 D. MEDIUM ACCESS CONTROL METHODS 6 1. CSMA CD 6 2. Control Token 7 3. Slotted Ring 7 E...network model in the Turkish Battleships will employ the broadband technique. D. MEDIUM ACCESS CONTROL METHODS The access method is one of the most...better performance at heavier loads. 3. Slotted Ring This method is used with a ring network. The ring is initialized to contain a fixed number of

  11. Numerical simulation of the optimal two-mode attacks for two-way continuous-variable quantum cryptography in reverse reconciliation

    NASA Astrophysics Data System (ADS)

    Zhang, Yichen; Li, Zhengyu; Zhao, Yijia; Yu, Song; Guo, Hong

    2017-02-01

    We analyze the security of the two-way continuous-variable quantum key distribution protocol in reverse reconciliation against general two-mode attacks, which represent all accessible attacks at fixed channel parameters. Rather than against one specific attack model, the expression of secret key rates of the two-way protocol are derived against all accessible attack models. It is found that there is an optimal two-mode attack to minimize the performance of the protocol in terms of both secret key rates and maximal transmission distances. We identify the optimal two-mode attack, give the specific attack model of the optimal two-mode attack and show the performance of the two-way protocol against the optimal two-mode attack. Even under the optimal two-mode attack, the performances of two-way protocol are still better than the corresponding one-way protocol, which shows the advantage of making double use of the quantum channel and the potential of long-distance secure communication using a two-way protocol.

  12. Data aggregation in wireless sensor networks using the SOAP protocol

    NASA Astrophysics Data System (ADS)

    Al-Yasiri, A.; Sunley, A.

    2007-07-01

    Wireless sensor networks (WSN) offer an increasingly attractive method of data gathering in distributed system architectures and dynamic access via wireless connectivity. Wireless sensor networks have physical and resource limitations, this leads to increased complexity for application developers and often results in applications that are closely coupled with network protocols. In this paper, a data aggregation framework using SOAP (Simple Object Access Protocol) on wireless sensor networks is presented. The framework works as a middleware for aggregating data measured by a number of nodes within a network. The aim of the study is to assess the suitability of the protocol in such environments where resources are limited compared to traditional networks.

  13. Wireless access to a pharmaceutical database: a demonstrator for data driven Wireless Application Protocol (WAP) applications in medical information processing.

    PubMed

    Schacht Hansen, M; Dørup, J

    2001-01-01

    The Wireless Application Protocol technology implemented in newer mobile phones has built-in facilities for handling much of the information processing needed in clinical work. To test a practical approach we ported a relational database of the Danish pharmaceutical catalogue to Wireless Application Protocol using open source freeware at all steps. We used Apache 1.3 web software on a Linux server. Data containing the Danish pharmaceutical catalogue were imported from an ASCII file into a MySQL 3.22.32 database using a Practical Extraction and Report Language script for easy update of the database. Data were distributed in 35 interrelated tables. Each pharmaceutical brand name was given its own card with links to general information about the drug, active substances, contraindications etc. Access was available through 1) browsing therapeutic groups and 2) searching for a brand name. The database interface was programmed in the server-side scripting language PHP3. A free, open source Wireless Application Protocol gateway to a pharmaceutical catalogue was established to allow dial-in access independent of commercial Wireless Application Protocol service providers. The application was tested on the Nokia 7110 and Ericsson R320s cellular phones. We have demonstrated that Wireless Application Protocol-based access to a dynamic clinical database can be established using open source freeware. The project opens perspectives for a further integration of Wireless Application Protocol phone functions in clinical information processing: Global System for Mobile communication telephony for bilateral communication, asynchronous unilateral communication via e-mail and Short Message Service, built-in calculator, calendar, personal organizer, phone number catalogue and Dictaphone function via answering machine technology. An independent Wireless Application Protocol gateway may be placed within hospital firewalls, which may be an advantage with respect to security. However, if Wireless Application Protocol phones are to become effective tools for physicians, special attention must be paid to the limitations of the devices. Input tools of Wireless Application Protocol phones should be improved, for instance by increased use of speech control.

  14. Wireless access to a pharmaceutical database: A demonstrator for data driven Wireless Application Protocol applications in medical information processing

    PubMed Central

    Hansen, Michael Schacht

    2001-01-01

    Background The Wireless Application Protocol technology implemented in newer mobile phones has built-in facilities for handling much of the information processing needed in clinical work. Objectives To test a practical approach we ported a relational database of the Danish pharmaceutical catalogue to Wireless Application Protocol using open source freeware at all steps. Methods We used Apache 1.3 web software on a Linux server. Data containing the Danish pharmaceutical catalogue were imported from an ASCII file into a MySQL 3.22.32 database using a Practical Extraction and Report Language script for easy update of the database. Data were distributed in 35 interrelated tables. Each pharmaceutical brand name was given its own card with links to general information about the drug, active substances, contraindications etc. Access was available through 1) browsing therapeutic groups and 2) searching for a brand name. The database interface was programmed in the server-side scripting language PHP3. Results A free, open source Wireless Application Protocol gateway to a pharmaceutical catalogue was established to allow dial-in access independent of commercial Wireless Application Protocol service providers. The application was tested on the Nokia 7110 and Ericsson R320s cellular phones. Conclusions We have demonstrated that Wireless Application Protocol-based access to a dynamic clinical database can be established using open source freeware. The project opens perspectives for a further integration of Wireless Application Protocol phone functions in clinical information processing: Global System for Mobile communication telephony for bilateral communication, asynchronous unilateral communication via e-mail and Short Message Service, built-in calculator, calendar, personal organizer, phone number catalogue and Dictaphone function via answering machine technology. An independent Wireless Application Protocol gateway may be placed within hospital firewalls, which may be an advantage with respect to security. However, if Wireless Application Protocol phones are to become effective tools for physicians, special attention must be paid to the limitations of the devices. Input tools of Wireless Application Protocol phones should be improved, for instance by increased use of speech control. PMID:11720946

  15. Wireless Distribution Systems To Support Medical Response to Disasters

    PubMed Central

    Arisoylu, Mustafa; Mishra, Rajesh; Rao, Ramesh; Lenert, Leslie A.

    2005-01-01

    We discuss the design of multi-hop access networks with multiple gateways that supports medical response to disasters. We examine and implement protocols to ensure high bandwidth, robust, self-healing and secure wireless multi-hop access networks for extreme conditions. Address management, path setup, gateway discovery and selection protocols are described. Future directions and plans are also considered. PMID:16779171

  16. A virtual observatory for photoionized nebulae: the Mexican Million Models database (3MdB).

    NASA Astrophysics Data System (ADS)

    Morisset, C.; Delgado-Inglada, G.; Flores-Fajardo, N.

    2015-04-01

    Photoionization models obtained with numerical codes are widely used to study the physics of the interstellar medium (planetary nebulae, HII regions, etc). Grids of models are performed to understand the effects of the different parameters used to describe the regions on the observables (mainly emission line intensities). Most of the time, only a small part of the computed results of such grids are published, and they are sometimes hard to obtain in a user-friendly format. We present here the Mexican Million Models dataBase (3MdB), an effort to resolve both of these issues in the form of a database of photoionization models, easily accessible through the MySQL protocol, and containing a lot of useful outputs from the models, such as the intensities of 178 emission lines, the ionic fractions of all the ions, etc. Some examples of the use of the 3MdB are also presented.

  17. A Hierarchical Communication Architecture for Oceanic Surveillance Applications

    PubMed Central

    Macias, Elsa; Suarez, Alvaro; Chiti, Francesco; Sacco, Andrea; Fantacci, Romano

    2011-01-01

    The interest in monitoring applications using underwater sensor networks has been growing in recent years. The severe communication restrictions imposed by underwater channels make that efficient monitoring be a challenging task. Though a lot of research has been conducted on underwater sensor networks, there are only few concrete applications to a real-world case study. In this work, hence, we propose a general three tier architecture leveraging low cost wireless technologies for acoustic communications between underwater sensors and standard technologies, Zigbee and Wireless Fidelity (WiFi), for water surface communications. We have selected a suitable Medium Access Control (MAC) layer, after making a comparison with some common MAC protocols. Thus the performance of the overall system in terms of Signals Discarding Rate (SDR), signalling delay at the surface gateway as well as the percentage of true detection have been evaluated by simulation, pointing out good results which give evidence in applicability’s favour. PMID:22247669

  18. Enhancing End-to-End Performance of Information Services Over Ka-Band Global Satellite Networks

    NASA Technical Reports Server (NTRS)

    Bhasin, Kul B.; Glover, Daniel R.; Ivancic, William D.; vonDeak, Thomas C.

    1997-01-01

    The Internet has been growing at a rapid rate as the key medium to provide information services such as e-mail, WWW and multimedia etc., however its global reach is limited. Ka-band communication satellite networks are being developed to increase the accessibility of information services via the Internet at global scale. There is need to assess satellite networks in their ability to provide these services and interconnect seamlessly with existing and proposed terrestrial telecommunication networks. In this paper the significant issues and requirements in providing end-to-end high performance for the delivery of information services over satellite networks based on various layers in the OSI reference model are identified. Key experiments have been performed to evaluate the performance of digital video and Internet over satellite-like testbeds. The results of the early developments in ATM and TCP protocols over satellite networks are summarized.

  19. DEADS: Depth and Energy Aware Dominating Set Based Algorithm for Cooperative Routing along with Sink Mobility in Underwater WSNs.

    PubMed

    Umar, Amara; Javaid, Nadeem; Ahmad, Ashfaq; Khan, Zahoor Ali; Qasim, Umar; Alrajeh, Nabil; Hayat, Amir

    2015-06-18

    Performance enhancement of Underwater Wireless Sensor Networks (UWSNs) in terms of throughput maximization, energy conservation and Bit Error Rate (BER) minimization is a potential research area. However, limited available bandwidth, high propagation delay, highly dynamic network topology, and high error probability leads to performance degradation in these networks. In this regard, many cooperative communication protocols have been developed that either investigate the physical layer or the Medium Access Control (MAC) layer, however, the network layer is still unexplored. More specifically, cooperative routing has not yet been jointly considered with sink mobility. Therefore, this paper aims to enhance the network reliability and efficiency via dominating set based cooperative routing and sink mobility. The proposed work is validated via simulations which show relatively improved performance of our proposed work in terms the selected performance metrics.

  20. RNA-Seq-Based Transcript Structure Analysis with TrBorderExt.

    PubMed

    Wang, Yejun; Sun, Ming-An; White, Aaron P

    2018-01-01

    RNA-Seq has become a routine strategy for genome-wide gene expression comparisons in bacteria. Despite lower resolution in transcript border parsing compared with dRNA-Seq, TSS-EMOTE, Cappable-seq, Term-seq, and others, directional RNA-Seq still illustrates its advantages: low cost, quantification and transcript border analysis with a medium resolution (±10-20 nt). To facilitate mining of directional RNA-Seq datasets especially with respect to transcript structure analysis, we developed a tool, TrBorderExt, which can parse transcript start sites and termination sites accurately in bacteria. A detailed protocol is described in this chapter for how to use the software package step by step to identify bacterial transcript borders from raw RNA-Seq data. The package was developed with Perl and R programming languages, and is accessible freely through the website: http://www.szu-bioinf.org/TrBorderExt .

  1. 'That proves my point': How mediums reconstrue disconfirmation in medium-sitter interactions.

    PubMed

    Enoksen, Anette Einan; Dickerson, Paul

    2018-04-01

    Previous research has examined how the talk of mediums attends to the epistemological status of their readings. Such work has identified that mediums frequently use question-framed propositions that are typically confirmed by the sitter, thereby conferring epistemological status on the medium. This study seeks to investigate what happens when the sitter disconfirms the propositions of the medium. The study focuses on the ways in which such disconfirmation can be responded to such that it is reconstrued as evidence of the psychic nature of the medium's reading. Televised demonstrations of psychic readings involving British and US mediums and their sitters are analysed. The results suggest that mediums rework disconfirmation as proof in several ways: first, by emphasizing the different access that sitter and medium have to knowledge (e.g., about the future); second, as evidence that the medium has access to the actual voice of the deceased (and may therefore mishear what the deceased has said to them); and third, as revealing an important truth that has hitherto been concealed from the sitter. The implications of these findings are considered for cases where speakers bring different and potentially competing, epistemological resources to an interaction. © 2018 The British Psychological Society.

  2. Amending storage vessel and media improves transfer interval of Musa spp. tissue culture plantlets

    USDA-ARS?s Scientific Manuscript database

    Musa spp. are some of the most important fruit food crops in the world. The USDA-ARS TARS maintains a Musa spp. germplasm collection of ~150 accessions in field plots and in medium-term storage in vitro. Accessions maintained in vitro require routine sub-culturing as nutrient medium is lost due to ...

  3. Fixed-time Insemination in Pasture-based Medium-sized Dairy Operations of Northern Germany and an Attempt to Replace GnRH by hCG.

    PubMed

    Marthold, D; Detterer, J; Koenig von Borstel, U; Gauly, M; Holtz, W

    2016-02-01

    A field study was conducted aimed at (i) evaluating the practicability of a fixed-time insemination regime for medium-sized dairy operations of north-western Germany, representative for many regions of Central Europe and (ii) substituting hCG for GnRH as ovulation-inducing agent at the end of a presynch or ovsynch protocol in an attempt to reduce the incidence of premature luteal regression. Cows of two herds synchronized by presynch and two herds synchronized by ovsynch protocol were randomly allotted to three subgroups; in one group ovulation was induced by the GnRH analog buserelin, in another by hCG, whereas a third group remained untreated. The synchronized groups were fixed-time inseminated; the untreated group bred to observed oestrus. Relative to untreated herd mates, pregnancy rate in cows subjected to a presynch protocol with buserelin as ovulation-inducing agent was 74%; for hCG it was 60%. In cows subjected to an ovsynch protocol, the corresponding relative pregnancy rates reached 138% in the case of buserelin and 95% in the case of hCG. Average service interval was shortened by 1 week in the presynch and delayed by 2 weeks in the ovsynch group. It may be concluded that fixed-time insemination of cows synchronized via ovsynch protocol with buserelin as ovulation-inducing agent is practicable and may help improve efficiency and reduce the work load involved with herd management in medium-sized dairy operations. The substitution of hCG for buserelin was found to be not advisable. © 2015 Blackwell Verlag GmbH.

  4. Blastocyst development in single medium with or without renewal on day 3: a prospective cohort study on sibling donor oocytes in a time-lapse incubator.

    PubMed

    Costa-Borges, Nuno; Bellés, Marta; Meseguer, Marcos; Galliano, Daniela; Ballesteros, Agustin; Calderón, Gloria

    2016-03-01

    To evaluate the efficiency of using a continuous (one-step) protocol with a single medium for the culture of human embryos in a time-lapse incubator (TLI). Prospective cohort study on sibling donor oocytes. University-affiliated in vitro fertilization (IVF) center. Embryos from 59 patients. Culture in a TLI in a single medium with or without renewal of the medium on day-3. Embryo morphology and morphokinetic parameters, clinical pregnancy, take-home baby rate, and perinatal outcomes. The blastocyst rates (68.3 vs. 66.8%) and the proportion of good-quality blastocysts (transferred plus frozen) obtained with the two-step (80.0%) protocol were statistically significantly similar to those obtained in the one-step protocol (72.2%). Similarly, morphokinetic events from early cleavage until late blastocyst stages were statistically significantly equivalent between both groups. No differences were found either in clinical pregnancy rates when comparing pure transfers performed with embryos selected from the two-step (75.0%), one-step (70.0%, respectively), and mixed (57.1%) groups. A total of 55 out of 91 embryos transferred implanted successfully (60.4%), resulting in a total of 37 newborns with a comparable birth weight mean among groups. Our findings support the idea that in a TLI with a controlled air purification system, human embryos can be successfully cultured continuously from day 0 onward in single medium with no need to renew it on day-3. This strategy does not affect embryo morphokinetics or development to term and offers more stable culture conditions for embryos as well as practical advantages and reduced costs for the IVF laboratory. Copyright © 2016 American Society for Reproductive Medicine. Published by Elsevier Inc. All rights reserved.

  5. Dosimetric evaluation of IMRT plan for homogenous and inhomogeneous medium using AAPM TG-119 protocol

    NASA Astrophysics Data System (ADS)

    Fatimah, L. A. N.; Wibowo, W. E.; Pawiro, S. A.

    2017-05-01

    The American Association of Physicists in Medicine (AAPM) TG-119 protocol has been applied for dose verification in IMRT technique. However, some criteria in the protocol need to be verified for inhomogeneous medium and small volume targets. Hence, the purpose of this study was to verify the assessment criteria of dose verification in AAPM TG-119 for inhomogeneous medium and small volume targets. The work has been conducted by dose verification for homogeneous (phantom A) and inhomogeneous phantoms (phantom B and C) on two geometrical targets: C-shape and circular targets. The targets were simulated using 7 static dMLC IMRT fields at two different depths of 5 g/cm2 and 10 g/cm2. The dose optimisation and calculation were done by using Pinnacle3 for 6 MV photons beam. The planning objectives were set according to AAPM TG-119 parameters. The plan analysis was conducted by Conformity Index and Homogeneity Index. The point dose measurements were conducted with Exradin A16, Semiflex 0.125cc, and Gafchromic EBT3. The plan results show that CI for C-shape target is in the range of 0.710-0.999 at 10 g/cm2 depth and 0.691-1.613 at 5 g/cm2. In addition, HI for C-shape and circular were in the range of 6.3%-58.7% and 5.4%-87.1% for 10 g/cm2 depth. The measurement results show that the dose measurement at inhomogeneous medium and small volume targets are much lower than the criteria in AAPM TG-119. In conclusion, the criteria in the AAPM TG-119 cannot be fully implemented for inhomogeneous medium and small volume targets.

  6. Improvement of parameters of freezing medium and freezing protocol for bull sperm using two osmotic supports.

    PubMed

    Chaveiro, A; Machado, L; Frijters, A; Engel, B; Woelders, H

    2006-06-01

    The aim of this study was to improve the freezing protocol of bull sperm, by investigating the influence on sperm viability after freeze/thawing of different freezing medium components, as well as the effect of cooling rates in the different stages of the cooling protocol, in single factor experiments. The experimental variables were: (1) salt-based versus a sugar-based medium (Tris versus sucrose); (2) glycerol concentration; (3) detergent (Equex) concentration; (4) presence of bicarbonate; (5) rate of cooling from 22 degrees C to holding temperature (CR1); (6) holding temperature (HT); (7) rate of cooling from holding temperature to -6 degrees C (CR2); (8) rate of cooling from -10 to -100 degrees C (CR3). All experiments were performed using five bulls per experiment (three ejaculates per bull). Sperm motility after freezing and thawing was assessed by CASA system, and sperm membrane integrity was assessed by flow cytometry. Sucrose-based medium did not offer a clear significant benefit compared to Tris medium. The concentration of Equex that gave the best results in Tris-based media group and sucrose-based media group was in a range between 2-7 and 4-7 g/l, respectively. In both media groups, a glycerol concentration of 800 mM was the best in any post-thaw viability parameters. In the Tris media group, the presence of bicarbonate had a negative effect on sperm viability. CR1 and CR2 had no significant effect on any of the post-thaw sperm viability parameters, but a CR1=0.2 degrees C/min and CR2=4 degrees C/min appeared to give better results in both media. The holding temperature (HT) that gave the best results was found to be in the range of 5-9 degrees C. There was a significant disadvantage of using a low CR3 of 10 degrees C/min, while 150 degrees C/min appeared to be the best cooling rate for either medium.

  7. Meristem culture and subsequent micropropagation of Chilean strawberry (Fragaria chiloensis (L.) Duch.).

    PubMed

    Quiroz, Karla A; Berríos, Miguel; Carrasco, Basilio; Retamales, Jorge B; Caligari, Peter D S; García-Gonzáles, Rolando

    2017-06-02

    Vegetative propagation of Fragaria sp. is traditionally carried out using stolons. This system of propagation, in addition to being slow, can spread plant diseases, particularly serious being viral. In vitro culture of meristems and the establishment of micropropagation protocols are important tools for solving these problems. In recent years, considerable effort has been made to develop in vitro propagation of the commercial strawberry in order to produce virus-free plants of high quality. These previous results can serve as the basis for developing in vitro-based propagation technologies in the less studied species Fragaria chiloensis. In this context, we studied the cultivation of meristems and establishment of a micropropagation protocol for F. chiloensis. The addition of polyvinylpyrrolidone (PVP) improved the meristem regeneration efficiency of F. chiloensis accessions. Similarly, the use of 6-benzylaminopurine (BAP) in the culture media increased the average rate of multiplication to 3-6 shoots per plant. In addition, the use of 6-benzylaminopurine (BAP), had low levels (near zero) of explant losses due to oxidation. However, plant height as well as number of leaves and roots were higher in media without growth regulators, with average values of 0.5 cm, 9 leaves and 4 roots per plant. For the first time in Chilean strawberry, meristem culture demonstrated to be an efficient tool for eliminating virus from infected plants, giving the possibility to produce disease free propagation material. Also, the addition of PVP into the basal MS medium improved the efficiency of plant recovery from isolated meristems. Farmers can now access to high quality plant material produced by biotech tools which will improve their technological practices.

  8. Novel Preclinical Testing Strategies for Treatment of Metastatic Pheochromocytoma

    DTIC Science & Technology

    2013-09-01

    proliferation using this protocol as reported or with any modifications tested Medium Y27632 (uM) Hydrocortisone (ug/mL) Insulin (ug/mL) rhEGF...0 + + 0 + + 0 + 0 Medium Y27632 (uM) Hydrocortisone (ug/mL) Insulin (ug/mL) rhEGF (ng/mL) Adenine (ug/mL) Result...reported (1) except for cholera toxin, which was toxic to this tumor under these conditions 17 Medium Y27632 (uM) Hydrocortisone (ug/mL

  9. Stimulation of GABA-Induced Ca2+ Influx Enhances Maturation of Human Induced Pluripotent Stem Cell-Derived Neurons

    PubMed Central

    Rushton, David J.; Mattis, Virginia B.; Svendsen, Clive N.; Allen, Nicholas D.; Kemp, Paul J.

    2013-01-01

    Optimal use of patient-derived, induced pluripotent stem cells for modeling neuronal diseases is crucially dependent upon the proper physiological maturation of derived neurons. As a strategy to develop defined differentiation protocols that optimize electrophysiological function, we investigated the role of Ca2+ channel regulation by astrocyte conditioned medium in neuronal maturation, using whole-cell patch clamp and Ca2+ imaging. Standard control medium supported basic differentiation of induced pluripotent stem cell-derived neurons, as assayed by the ability to fire simple, single, induced action potentials. In contrast, treatment with astrocyte conditioned medium elicited complex and spontaneous neuronal activity, often with rhythmic and biphasic characteristics. Such augmented spontaneous activity correlated with astrocyte conditioned medium-evoked hyperpolarization and was dependent upon regulated function of L-, N- and R-type Ca2+ channels. The requirement for astrocyte conditioned medium could be substituted by simply supplementing control differentiation medium with high Ca2+ or γ-amino butyric acid (GABA). Importantly, even in the absence of GABA signalling, opening Ca2+ channels directly using Bay K8644 was able to hyperpolarise neurons and enhance excitability, producing fully functional neurons. These data provide mechanistic insight into how secreted astrocyte factors control differentiation and, importantly, suggest that pharmacological modulation of Ca2+ channel function leads to the development of a defined protocol for improved maturation of induced pluripotent stem cell-derived neurons. PMID:24278369

  10. The U.S. Culture Collection Network Responding to the Requirements of the Nagoya Protocol on Access and Benefit Sharing

    Treesearch

    Kevin McCluskey; Katharine B. Barker; Hazel A. Barton; Kyria Boundy-Mills; Daniel R. Brown; Jonathan A. Coddington; Kevin Cook; Philippe Desmeth; David Geiser; Jessie A. Glaeser; Stephanie Greene; Seogchan Kang; Michael W. Lomas; Ulrich Melcher; Scott E. Miller; David R. Nobles; Kristina J. Owens; Jerome H. Reichman; Manuela da Silva; John Wertz; Cale Whitworth; David Smith; Steven E. Lindow

    2017-01-01

    The U.S. Culture Collection Network held a meeting to share information about how culture collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity (CBD). The meeting included representatives...

  11. Development and validation of a remote home safety protocol.

    PubMed

    Romero, Sergio; Lee, Mi Jung; Simic, Ivana; Levy, Charles; Sanford, Jon

    2018-02-01

    Environmental assessments and subsequent modifications conducted by healthcare professionals can enhance home safety and promote independent living. However, travel time, expense and the availability of qualified professionals can limit the broad application of this intervention. Remote technology has the potential to increase access to home safety evaluations. This study describes the development and validation of a remote home safety protocol that can be used by a caregiver of an elderly person to video-record their home environment for later viewing and evaluation by a trained professional. The protocol was developed based on literature reviews and evaluations from clinical and content experts. Cognitive interviews were conducted with a group of six caregivers to validate the protocol. The final protocol included step-by-step directions to record indoor and outdoor areas of the home. The validation process resulted in modifications related to safety, clarity of the protocol, readability, visual appearance, technical descriptions and usability. Our final protocol includes detailed instructions that a caregiver should be able to follow to record a home environment for subsequent evaluation by a home safety professional. Implications for Rehabilitation The results of this study have several implications for rehabilitation practice The remote home safety evaluation protocol can potentially improve access to rehabilitation services for clients in remote areas and prevent unnecessary delays for needed care. Using our protocol, a patient's caregiver can partner with therapists to quickly and efficiently evaluate a patient's home before they are released from the hospital. Caregiver narration, which reflects a caregiver's own perspective, is critical to evaluating home safety. In-home safety evaluations, currently not available to all who need them due to access barriers, can enhance a patient's independence and provide a safer home environment.

  12. A Tuned-RF Duty-Cycled Wake-Up Receiver with -90 dBm Sensitivity.

    PubMed

    Bdiri, Sadok; Derbel, Faouzi; Kanoun, Olfa

    2017-12-29

    A novel wake-up receiver for wireless sensor networks is introduced. It operates with a modified medium access protocol (MAC), allowing low-energy consumption and practical latency. The ultra-low-power wake-up receiver operates with enhanced duty-cycled listening. The analysis of energy models of the duty-cycle-based communication is presented. All the WuRx blocks are studied to obey the duty-cycle operation. For a mean interval time for the data exchange cycle between a transmitter and a receiver over 1.7 s and a 64-bit wake-up packet detection latency of 32 ms, the average power consumption of the wake-up receiver (WuRx) reaches down to 3 μ W . It also features scalable addressing of more than 512 bit at a data rate of 128 k bit / s -1 . At a wake-up packet error rate of 10 - 2 , the detection sensitivity reaches a minimum of - 90 dBm . The combination of the MAC protocol and the WuRx eases the adoption of different kinds of wireless sensor networks. In low traffic communication, the WuRx dramatically saves more energy than that of a network that is implementing conventional duty-cycling. In this work, a prototype was realized to evaluate the intended performance.

  13. A Tuned-RF Duty-Cycled Wake-Up Receiver with −90 dBm Sensitivity

    PubMed Central

    Derbel, Faouzi; Kanoun, Olfa

    2017-01-01

    A novel wake-up receiver for wireless sensor networks is introduced. It operates with a modified medium access protocol (MAC), allowing low-energy consumption and practical latency. The ultra-low-power wake-up receiver operates with enhanced duty-cycled listening. The analysis of energy models of the duty-cycle-based communication is presented. All the WuRx blocks are studied to obey the duty-cycle operation. For a mean interval time for the data exchange cycle between a transmitter and a receiver over 1.7 s and a 64-bit wake-up packet detection latency of 32 ms, the average power consumption of the wake-up receiver (WuRx) reaches down to 3 μW. It also features scalable addressing of more than 512 bit at a data rate of 128kbit/s−1. At a wake-up packet error rate of 10−2, the detection sensitivity reaches a minimum of −90 dBm. The combination of the MAC protocol and the WuRx eases the adoption of different kinds of wireless sensor networks. In low traffic communication, the WuRx dramatically saves more energy than that of a network that is implementing conventional duty-cycling. In this work, a prototype was realized to evaluate the intended performance. PMID:29286345

  14. Analyzing the effect of routing protocols on media access control protocols in radio networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Barrett, C. L.; Drozda, M.; Marathe, A.

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i)more » number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.« less

  15. Using the Critical Incident Technique to Research Decision Making regarding Access to Training and Development in Medium-Sized Enterprises

    ERIC Educational Resources Information Center

    Coetzer, Alan; Redmond, Janice; Sharafizad, Jalleh

    2012-01-01

    Employees in small and medium-sized enterprises (SMEs) form part of a "disadvantaged" group within the workforce that receives less access to training and development (T&D) than employees in large firms. Prior research into reasons for the relatively low levels of employee participation in training and development has typically…

  16. Taking advantage of acoustic inhomogeneities in photoacoustic measurements

    NASA Astrophysics Data System (ADS)

    Da Silva, Anabela; Handschin, Charles; Riedinger, Christophe; Piasecki, Julien; Mensah, Serge; Litman, Amélie; Akhouayri, Hassan

    2016-03-01

    Photoacoustic offers promising perspectives in probing and imaging subsurface optically absorbing structures in biological tissues. The optical uence absorbed is partly dissipated into heat accompanied with microdilatations that generate acoustic pressure waves, the intensity which is related to the amount of fluuence absorbed. Hence the photoacoustic signal measured offers access, at least potentially, to a local monitoring of the absorption coefficient, in 3D if tomographic measurements are considered. However, due to both the diffusing and absorbing nature of the surrounding tissues, the major part of the uence is deposited locally at the periphery of the tissue, generating an intense acoustic pressure wave that may hide relevant photoacoustic signals. Experimental strategies have been developed in order to measure exclusively the photoacoustic waves generated by the structure of interest (orthogonal illumination and detection). Temporal or more sophisticated filters (wavelets) can also be applied. However, the measurement of this primary acoustic wave carries a lot of information about the acoustically inhomogeneous nature of the medium. We propose a protocol that includes the processing of this primary intense acoustic wave, leading to the quantification of the surrounding medium sound speed, and, if appropriate to an acoustical parametric image of the heterogeneities. This information is then included as prior knowledge in the photoacoustic reconstruction scheme to improve the localization and quantification.

  17. Frame Transmission Efficiency-Based Cross-Layer Congestion Notification Scheme in Wireless Ad Hoc Networks.

    PubMed

    He, Huaguang; Li, Taoshen; Feng, Luting; Ye, Jin

    2017-07-15

    Different from the traditional wired network, the fundamental cause of transmission congestion in wireless ad hoc networks is medium contention. How to utilize the congestion state from the MAC (Media Access Control) layer to adjust the transmission rate is core work for transport protocol design. However, recent works have shown that the existing cross-layer congestion detection solutions are too complex to be deployed or not able to characterize the congestion accurately. We first propose a new congestion metric called frame transmission efficiency (i.e., the ratio of successful transmission delay to the frame service delay), which describes the medium contention in a fast and accurate manner. We further present the design and implementation of RECN (ECN and the ratio of successful transmission delay to the frame service delay in the MAC layer, namely, the frame transmission efficiency), a general supporting scheme that adjusts the transport sending rate through a standard ECN (Explicit Congestion Notification) signaling method. Our method can be deployed on commodity switches with small firmware updates, while making no modification on end hosts. We integrate RECN transparently (i.e., without modification) with TCP on NS2 simulation. The experimental results show that RECN remarkably improves network goodput across multiple concurrent TCP flows.

  18. The U.S. Culture Collection Network Responding to the Requirements of the Nagoya Protocol on Access and Benefit Sharing

    PubMed Central

    Barker, Katharine B.; Barton, Hazel A.; Boundy-Mills, Kyria; Brown, Daniel R.; Coddington, Jonathan A.; Cook, Kevin; Desmeth, Philippe; Geiser, David; Glaeser, Jessie A.; Greene, Stephanie; Kang, Seogchan; Lomas, Michael W.; Melcher, Ulrich; Miller, Scott E.; Nobles, David R.; Owens, Kristina J.; Reichman, Jerome H.; da Silva, Manuela; Wertz, John; Whitworth, Cale; Smith, David

    2017-01-01

    ABSTRACT The U.S. Culture Collection Network held a meeting to share information about how culture collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity (CBD). The meeting included representatives of many culture collections and other biological collections, the U.S. Department of State, U.S. Department of Agriculture, Secretariat of the CBD, interested scientific societies, and collection groups, including Scientific Collections International and the Global Genome Biodiversity Network. The participants learned about the policies of the United States and other countries regarding access to genetic resources, the definition of genetic resources, and the status of historical materials and genetic sequence information. Key topics included what constitutes access and how the CBD Access and Benefit-Sharing Clearing-House can help guide researchers through the process of obtaining Prior Informed Consent on Mutually Agreed Terms. U.S. scientists and their international collaborators are required to follow the regulations of other countries when working with microbes originally isolated outside the United States, and the local regulations required by the Nagoya Protocol vary by the country of origin of the genetic resource. Managers of diverse living collections in the United States described their holdings and their efforts to provide access to genetic resources. This meeting laid the foundation for cooperation in establishing a set of standard operating procedures for U.S. and international culture collections in response to the Nagoya Protocol. PMID:28811341

  19. The U.S. Culture Collection Network Responding to the Requirements of the Nagoya Protocol on Access and Benefit Sharing.

    PubMed

    McCluskey, Kevin; Barker, Katharine B; Barton, Hazel A; Boundy-Mills, Kyria; Brown, Daniel R; Coddington, Jonathan A; Cook, Kevin; Desmeth, Philippe; Geiser, David; Glaeser, Jessie A; Greene, Stephanie; Kang, Seogchan; Lomas, Michael W; Melcher, Ulrich; Miller, Scott E; Nobles, David R; Owens, Kristina J; Reichman, Jerome H; da Silva, Manuela; Wertz, John; Whitworth, Cale; Smith, David

    2017-08-15

    The U.S. Culture Collection Network held a meeting to share information about how culture collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity (CBD). The meeting included representatives of many culture collections and other biological collections, the U.S. Department of State, U.S. Department of Agriculture, Secretariat of the CBD, interested scientific societies, and collection groups, including Scientific Collections International and the Global Genome Biodiversity Network. The participants learned about the policies of the United States and other countries regarding access to genetic resources, the definition of genetic resources, and the status of historical materials and genetic sequence information. Key topics included what constitutes access and how the CBD Access and Benefit-Sharing Clearing-House can help guide researchers through the process of obtaining Prior Informed Consent on Mutually Agreed Terms. U.S. scientists and their international collaborators are required to follow the regulations of other countries when working with microbes originally isolated outside the United States, and the local regulations required by the Nagoya Protocol vary by the country of origin of the genetic resource. Managers of diverse living collections in the United States described their holdings and their efforts to provide access to genetic resources. This meeting laid the foundation for cooperation in establishing a set of standard operating procedures for U.S. and international culture collections in response to the Nagoya Protocol.

  20. A Mobile Satellite Experiment (MSAT-X) network definition

    NASA Technical Reports Server (NTRS)

    Wang, Charles C.; Yan, Tsun-Yee

    1990-01-01

    The network architecture development of the Mobile Satellite Experiment (MSAT-X) project for the past few years is described. The results and findings of the network research activities carried out under the MSAT-X project are summarized. A framework is presented upon which the Mobile Satellite Systems (MSSs) operator can design a commercial network. A sample network configuration and its capability are also included under the projected scenario. The Communication Interconnection aspect of the MSAT-X network is discussed. In the MSAT-X network structure two basic protocols are presented: the channel access protocol, and the link connection protocol. The error-control techniques used in the MSAT-X project and the packet structure are also discussed. A description of two testbeds developed for experimentally simulating the channel access protocol and link control protocol, respectively, is presented. A sample network configuration and some future network activities of the MSAT-X project are also presented.

  1. Distributed reservation-based code division multiple access

    NASA Astrophysics Data System (ADS)

    Wieselthier, J. E.; Ephremides, A.

    1984-11-01

    The use of spread spectrum signaling, motivated primarily by its antijamming capabilities in military applications, leads naturally to the use of Code Division Multiple Access (CDMA) techniques that permit the successful simultaneous transmission by a number of users over a wideband channel. In this paper we address some of the major issues that are associated with the design of multiple access protocols for spread spectrum networks. We then propose, analyze, and evaluate a distributed reservation-based multiple access protocol that does in fact exploit CDMA properties. Especially significant is the fact that no acknowledgment or feedback information from the destination is required (thus facilitating communication with a radio-silent mode), nor is any form of coordination among the users necessary.

  2. CSMA/RN: A universal protocol for gigabit networks

    NASA Technical Reports Server (NTRS)

    Foudriat, E. C.; Maly, Kurt J.; Overstreet, C. Michael; Khanna, S.; Paterra, Frank

    1990-01-01

    Networks must provide intelligent access for nodes to share the communications resources. In the range of 100 Mbps to 1 Gbps, the demand access class of protocols were studied extensively. Many use some form of slot or reservation system and many the concept of attempt and defer to determine the presence or absence of incoming information. The random access class of protocols like shared channel systems (Ethernet), also use the concept of attempt and defer in the form of carrier sensing to alleviate the damaging effects of collisions. In CSMA/CD, the sensing of interference is on a global basis. All systems discussed above have one aspect in common, they examine activity on the network either locally or globally and react in an attempt and whatever mechanism. Of the attempt + mechanisms discussed, one is obviously missing; that is attempt and truncate. Attempt and truncate was studied in a ring configuration called the Carrier Sensed Multiple Access Ring Network (CSMA/RN). The system features of CSMA/RN are described including a discussion of the node operations for inserting and removing messages and for handling integrated traffic. The performance and operational features based on analytical and simulation studies which indicate that CSMA/RN is a useful and adaptable protocol over a wide range of network conditions are discussed. Finally, the research and development activities necessary to demonstrate and realize the potential of CSMA/RN as a universal, gigabit network protocol is outlined.

  3. Tag Content Access Control with Identity-based Key Exchange

    NASA Astrophysics Data System (ADS)

    Yan, Liang; Rong, Chunming

    2010-09-01

    Radio Frequency Identification (RFID) technology that used to identify objects and users has been applied to many applications such retail and supply chain recently. How to prevent tag content from unauthorized readout is a core problem of RFID privacy issues. Hash-lock access control protocol can make tag to release its content only to reader who knows the secret key shared between them. However, in order to get this shared secret key required by this protocol, reader needs to communicate with a back end database. In this paper, we propose to use identity-based secret key exchange approach to generate the secret key required for hash-lock access control protocol. With this approach, not only back end database connection is not needed anymore, but also tag cloning problem can be eliminated at the same time.

  4. Very low intravenous contrast volume protocol for computed tomography angiography providing comprehensive cardiac and vascular assessment prior to transcatheter aortic valve replacement in patients with chronic kidney disease.

    PubMed

    Pulerwitz, Todd C; Khalique, Omar K; Nazif, Tamim N; Rozenshtein, Anna; Pearson, Gregory D N; Hahn, Rebecca T; Vahl, Torsten P; Kodali, Susheel K; George, Isaac; Leon, Martin B; D'Souza, Belinda; Po, Ming Jack; Einstein, Andrew J

    2016-01-01

    Transcatheter aortic valve replacement (TAVR) is a lifesaving procedure for many patients high risk for surgical aortic valve replacement. The prevalence of chronic kidney disease (CKD) is high in this population, and thus a very low contrast volume (VLCV) computed tomography angiography (CTA) protocol providing comprehensive cardiac and vascular imaging would be valuable. 52 patients with severe, symptomatic aortic valve disease, undergoing pre-TAVR CTA assessment from 2013-4 at Columbia University Medical Center were studied, including all 26 patients with CKD (eGFR<30 mL/min) who underwent a novel VLCV protocol (20 mL of iohexol at 2.5 mL/s), and 26 standard-contrast-volume (SCV) protocol patients. Using a 320-slice volumetric scanner, the protocol included ECG-gated volume scanning of the aortic root followed by medium-pitch helical vascular scanning through the femoral arteries. Two experienced cardiologists performed aortic annulus and root measurements. Vascular image quality was assessed by two radiologists using a 4-point scale. VLCV patients had mean (±SD) age 86 ± 6.5, BMI 23.9 ± 3.4 kg/m(2) with 54% men; SCV patients age 83 ± 8.8, BMI 28.7 ± 5.3 kg/m(2), 65% men. There was excellent intra- and inter-observer agreement for annular and root measurements, and excellent agreement with 3D-transesophageal echocardiographic measurements. Both radiologists found diagnostic-quality vascular imaging in 96% of VLCV and 100% of SCV cases, with excellent inter-observer agreement. This study is the first of its kind to report the feasibility and reproducibility of measurements for a VLCV protocol for comprehensive pre-TAVR CTA. There was excellent agreement of cardiac measurements and almost all studies were diagnostic quality for vascular access assessment. Copyright © 2016 Society of Cardiovascular Computed Tomography. Published by Elsevier Inc. All rights reserved.

  5. Securing the AliEn File Catalogue - Enforcing authorization with accountable file operations

    NASA Astrophysics Data System (ADS)

    Schreiner, Steffen; Bagnasco, Stefano; Sankar Banerjee, Subho; Betev, Latchezar; Carminati, Federico; Vladimirovna Datskova, Olga; Furano, Fabrizio; Grigoras, Alina; Grigoras, Costin; Mendez Lorenzo, Patricia; Peters, Andreas Joachim; Saiz, Pablo; Zhu, Jianlin

    2011-12-01

    The AliEn Grid Services, as operated by the ALICE Collaboration in its global physics analysis grid framework, is based on a central File Catalogue together with a distributed set of storage systems and the possibility to register links to external data resources. This paper describes several identified vulnerabilities in the AliEn File Catalogue access protocol regarding fraud and unauthorized file alteration and presents a more secure and revised design: a new mechanism, called LFN Booking Table, is introduced in order to keep track of access authorization in the transient state of files entering or leaving the File Catalogue. Due to a simplification of the original Access Envelope mechanism for xrootd-protocol-based storage systems, fundamental computational improvements of the mechanism were achieved as well as an up to 50% reduction of the credential's size. By extending the access protocol with signed status messages from the underlying storage system, the File Catalogue receives trusted information about a file's size and checksum and the protocol is no longer dependent on client trust. Altogether, the revised design complies with atomic and consistent transactions and allows for accountable, authentic, and traceable file operations. This paper describes these changes as part and beyond the development of AliEn version 2.19.

  6. Value of 100 kVp scan with sinogram-affirmed iterative reconstruction algorithm on a single-source CT system during whole-body CT for radiation and contrast medium dose reduction: an intra-individual feasibility study.

    PubMed

    Nagayama, Y; Nakaura, T; Oda, S; Tsuji, A; Urata, J; Furusawa, M; Tanoue, S; Utsunomiya, D; Yamashita, Y

    2018-02-01

    To perform an intra-individual investigation of the usefulness of a contrast medium (CM) and radiation dose-reduction protocol using single-source computed tomography (CT) combined with 100 kVp and sinogram-affirmed iterative reconstruction (SAFIRE) for whole-body CT (WBCT; chest-abdomen-pelvis CT) in oncology patients. Forty-three oncology patients who had undergone WBCT under both 120 and 100 kVp protocols at different time points (mean interscan intervals: 98 days) were included retrospectively. The CM doses for the 120 and 100 kVp protocols were 600 and 480 mg iodine/kg, respectively; 120 kVp images were reconstructed with filtered back-projection (FBP), whereas 100 kVp images were reconstructed with FBP (100 kVp-F) and the SAFIRE (100 kVp-S). The size-specific dose estimate (SSDE), iodine load and image quality of each protocol were compared. The SSDE and iodine load of 100 kVp protocol were 34% and 21%, respectively, lower than of 120 kVp protocol (SSDE: 10.6±1.1 versus 16.1±1.8 mGy; iodine load: 24.8±4versus 31.5±5.5 g iodine, p<0.01). Contrast enhancement, objective image noise, contrast-to-noise-ratio, and visual score of 100 kVp-S were similar to or better than of 120 kVp protocol. Compared with the 120 kVp protocol, the combined use of 100 kVp and SAFIRE in WBCT for oncology assessment with an SSCT facilitated substantial reduction in the CM and radiation dose while maintaining image quality. Copyright © 2017 The Royal College of Radiologists. Published by Elsevier Ltd. All rights reserved.

  7. Accessing Multi-Dimensional Images and Data Cubes in the Virtual Observatory

    NASA Astrophysics Data System (ADS)

    Tody, Douglas; Plante, R. L.; Berriman, G. B.; Cresitello-Dittmar, M.; Good, J.; Graham, M.; Greene, G.; Hanisch, R. J.; Jenness, T.; Lazio, J.; Norris, P.; Pevunova, O.; Rots, A. H.

    2014-01-01

    Telescopes across the spectrum are routinely producing multi-dimensional images and datasets, such as Doppler velocity cubes, polarization datasets, and time-resolved “movies.” Examples of current telescopes producing such multi-dimensional images include the JVLA, ALMA, and the IFU instruments on large optical and near-infrared wavelength telescopes. In the near future, both the LSST and JWST will also produce such multi-dimensional images routinely. High-energy instruments such as Chandra produce event datasets that are also a form of multi-dimensional data, in effect being a very sparse multi-dimensional image. Ensuring that the data sets produced by these telescopes can be both discovered and accessed by the community is essential and is part of the mission of the Virtual Observatory (VO). The Virtual Astronomical Observatory (VAO, http://www.usvao.org/), in conjunction with its international partners in the International Virtual Observatory Alliance (IVOA), has developed a protocol and an initial demonstration service designed for the publication, discovery, and access of arbitrarily large multi-dimensional images. The protocol describing multi-dimensional images is the Simple Image Access Protocol, version 2, which provides the minimal set of metadata required to characterize a multi-dimensional image for its discovery and access. A companion Image Data Model formally defines the semantics and structure of multi-dimensional images independently of how they are serialized, while providing capabilities such as support for sparse data that are essential to deal effectively with large cubes. A prototype data access service has been deployed and tested, using a suite of multi-dimensional images from a variety of telescopes. The prototype has demonstrated the capability to discover and remotely access multi-dimensional data via standard VO protocols. The prototype informs the specification of a protocol that will be submitted to the IVOA for approval, with an operational data cube service to be delivered in mid-2014. An associated user-installable VO data service framework will provide the capabilities required to publish VO-compatible multi-dimensional images or data cubes.

  8. Space Network IP Services (SNIS): An Architecture for Supporting Low Earth Orbiting IP Satellite Missions

    NASA Technical Reports Server (NTRS)

    Israel, David J.

    2005-01-01

    The NASA Space Network (SN) supports a variety of missions using the Tracking and Data Relay Satellite System (TDRSS), which includes ground stations in White Sands, New Mexico and Guam. A Space Network IP Services (SNIS) architecture is being developed to support future users with requirements for end-to-end Internet Protocol (IP) communications. This architecture will support all IP protocols, including Mobile IP, over TDRSS Single Access, Multiple Access, and Demand Access Radio Frequency (RF) links. This paper will describe this architecture and how it can enable Low Earth Orbiting IP satellite missions.

  9. An access technology delivery protocol for children with severe and multiple disabilities: a case demonstration.

    PubMed

    Mumford, Leslie; Lam, Rachel; Wright, Virginia; Chau, Tom

    2014-08-01

    This study applied response efficiency theory to create the Access Technology Delivery Protocol (ATDP), a child and family-centred collaborative approach to the implementation of access technologies. We conducted a descriptive, mixed methods case study to demonstrate the ATDP method with a 12-year-old boy with no reliable means of access to an external device. Evaluations of response efficiency, satisfaction, goal attainment, technology use and participation were made after 8 and 16 weeks of training with a custom smile-based access technology. At the 16 week mark, the new access technology offered better response quality; teacher satisfaction was high; average technology usage was 3-4 times per week for up to 1 h each time; switch sensitivity and specificity reached 78% and 64%, respectively, and participation scores increased by 38%. This case supports further development and testing of the ATDP with additional children with multiple or severe disabilities.

  10. Application of an access technology delivery protocol to two children with cerebral palsy.

    PubMed

    Mumford, Leslie; Chau, Tom

    2015-07-14

    This study further delineates the merits and limitations of the Access Technology Delivery Protocol (ATDP) through its application to two children with severe disabilities. We conducted mixed methods case studies to demonstrate the ATDP with two children with no reliable means of access to an external device. Evaluations of response efficiency, satisfaction, goal attainment, technology use and participation were made after 8 and 16 weeks of training with custom access technologies. After 16 weeks, one child's switch offered improved response efficiency, high teacher satisfaction and increased participation. The other child's switch resulted in improved satisfaction and switch effectiveness but lower overall efficiency. The latter child was no longer using his switch by the end of the study. These contrasting findings indicate that changes to any contextual factors that may impact the user's switch performance should mandate a reassessment of the access pathway. Secondly, it is important to ensure that individuals who will be responsible for switch training be identified at the outset and engaged throughout the ATDP. Finally, the ATDP should continue to be tested with individuals with severe disabilities to build an evidence base for the delivery of response efficient access solutions. Implications for Rehabilitation A data-driven, comprehensive access technology delivery protocol for children with complex communication needs could help to mitigate technology abandonment. Successful adoption of an access technology requires personalized design, training of the technology user, the teaching staff, the caregivers and other communication partners, and integration with functional activities.

  11. Honest broker protocol streamlines research access to data while safeguarding patient privacy.

    PubMed

    Silvey, Scott A; Silvey, Scott Andrew; Schulte, Janet; Smaltz, Detlev H; Smaltz, Detlev Herb; Kamal, Jyoti

    2008-11-06

    At Ohio State University Medical Center, The Honest Broker Protocol provides a streamlined mechanism whereby investigators can obtain de-identified clinical data for non-FDA research without having to invest the significant time and effort necessary to craft a formalized protocol for IRB approval.

  12. 28 CFR 115.221 - Evidence protocol and forensic medical examinations.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    .... Department of Justice's Office on Violence Against Women publication, “A National Protocol for Sexual Assault... for investigating allegations of sexual abuse, the agency shall follow a uniform evidence protocol... developed after 2011. (c) The agency shall offer all victims of sexual abuse access to forensic medical...

  13. 28 CFR 115.21 - Evidence protocol and forensic medical examinations.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Office on Violence Against Women publication, “A National Protocol for Sexual Assault Medical Forensic... allegations of sexual abuse, the agency shall follow a uniform evidence protocol that maximizes the potential.... (c) The agency shall offer all victims of sexual abuse access to forensic medical examinations...

  14. 28 CFR 115.221 - Evidence protocol and forensic medical examinations.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    .... Department of Justice's Office on Violence Against Women publication, “A National Protocol for Sexual Assault... for investigating allegations of sexual abuse, the agency shall follow a uniform evidence protocol... developed after 2011. (c) The agency shall offer all victims of sexual abuse access to forensic medical...

  15. 28 CFR 115.221 - Evidence protocol and forensic medical examinations.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    .... Department of Justice's Office on Violence Against Women publication, “A National Protocol for Sexual Assault... for investigating allegations of sexual abuse, the agency shall follow a uniform evidence protocol... developed after 2011. (c) The agency shall offer all victims of sexual abuse access to forensic medical...

  16. 28 CFR 115.21 - Evidence protocol and forensic medical examinations.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Office on Violence Against Women publication, “A National Protocol for Sexual Assault Medical Forensic... allegations of sexual abuse, the agency shall follow a uniform evidence protocol that maximizes the potential.... (c) The agency shall offer all victims of sexual abuse access to forensic medical examinations...

  17. 28 CFR 115.21 - Evidence protocol and forensic medical examinations.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Office on Violence Against Women publication, “A National Protocol for Sexual Assault Medical Forensic... allegations of sexual abuse, the agency shall follow a uniform evidence protocol that maximizes the potential.... (c) The agency shall offer all victims of sexual abuse access to forensic medical examinations...

  18. ART culture conditions change the probability of mouse embryo gestation through defined cellular and molecular responses.

    PubMed

    Schwarzer, Caroline; Esteves, Telma Cristina; Araúzo-Bravo, Marcos J; Le Gac, Séverine; Nordhoff, Verena; Schlatt, Stefan; Boiani, Michele

    2012-09-01

    Do different human ART culture protocols prepare embryos differently for post-implantation development? The type of ART culture protocol results in distinct cellular and molecular phenotypes in vitro at the blastocyst stage as well as subsequently during in vivo development. It has been reported that ART culture medium affects human development as measured by gestation rates and birthweights. However, due to individual variation across ART patients, it is not possible as yet to pinpoint a cause-effect relationship between choice of culture medium and developmental outcome. In a prospective study, 13 human ART culture protocols were compared two at a time against in vivo and in vitro controls. Superovulated mouse oocytes were fertilized in vivo using outbred and inbred mating schemes. Zygotes were cultured in medium or in the oviduct and scored for developmental parameters 96 h later. Blastocysts were either analyzed or transferred into fosters to measure implantation rates and fetal development. In total, 5735 fertilized mouse oocytes, 1732 blastocysts, 605 fetuses and 178 newborns were examined during the course of the study (December 2010-December 2011). Mice of the B6C3F1, C57Bl/6 and CD1 strains were used as oocyte donors, sperm donors and recipients for embryo transfer, respectively. In vivo fertilized B6C3F1 oocytes were allowed to cleave in 13 human ART culture protocols compared with mouse oviduct and optimized mouse medium (KSOM(aa)). Cell lineage composition of resultant blastocysts was analyzed by immunostaining and confocal microscopy (trophectoderm, Cdx2; primitive ectoderm, Nanog; primitive endoderm, Sox17), global gene expression by microarray analysis, and rates of development to midgestation and to term. Mouse zygotes show profound variation in blastocyst (49.9-91.9%) and fetal (15.7-62.0%) development rates across the 13 ART culture protocols tested (R(2)= 0.337). Two opposite protocols, human tubal fluid/multiblast (high fetal rate) and ISM1/ISM2 (low fetal rate), were analyzed in depth using outbred and inbred fertilization schemes. Resultant blastocysts show imbalances of cell lineage composition; culture medium-specific deviation of gene expression (38 genes, ≥ 4-fold) compared with the in vivo pattern; and produce different litter sizes (P ≤ 0.0076) after transfer into fosters. Confounding effects of subfertility, life style and genetic heterogeneity are reduced to a minimum in the mouse model compared with ART patients. This is an animal model study. Mouse embryo responses to human ART media are not transferable 1-to-1 to human development due to structural and physiologic differences between oocytes of the two species. Our data promote awareness that human ART culture media affect embryo development. Effects reported here in the mouse may apply also in human, because no ART medium presently available on the market has been optimized for human embryo development. The mouse embryo assay (MEA), which requires ART media to support at least 80% blastocyst formation, is in need of reform and should be extended to include post-implantation development.

  19. Determining contrast medium dose and rate on basis of lean body weight: does this strategy improve patient-to-patient uniformity of hepatic enhancement during multi-detector row CT?

    PubMed

    Ho, Lisa M; Nelson, Rendon C; Delong, David M

    2007-05-01

    To prospectively evaluate the use of lean body weight (LBW) as the main determinant of the volume and rate of contrast material administration during multi-detector row computed tomography of the liver. This HIPAA-compliant study had institutional review board approval. All patients gave written informed consent. Four protocols were compared. Standard protocol involved 125 mL of iopamidol injected at 4 mL/sec. Total body weight (TBW) protocol involved 0.7 g iodine per kilogram of TBW. Calculated LBW and measured LBW protocols involved 0.86 g of iodine per kilogram and 0.92 g of iodine per kilogram calculated or measured LBW for men and women, respectively. Injection rate used for the three experimental protocols was determined proportionally on the basis of the calculated volume of contrast material. Postcontrast attenuation measurements during portal venous phase were obtained in liver, portal vein, and aorta for each group and were summed for each patient. Patient-to-patient enhancement variability in same group was measured with Levene test. Two-tailed t test was used to compare the three experimental protocols with the standard protocol. Data analysis was performed in 101 patients (25 or 26 patients per group), including 56 men and 45 women (mean age, 53 years). Average summed attenuation values for standard, TBW, calculated LBW, and measured LBW protocols were 419 HU +/- 50 (standard deviation), 443 HU +/- 51, 433 HU +/- 50, and 426 HU +/- 33, respectively (P = not significant for all). Levene test results for summed attenuation data for standard, TBW, calculated LBW, and measured LBW protocols were 40 +/- 29, 38 +/- 33 (P = .83), 35 +/- 35 (P = .56), and 26 +/- 19 (P = .05), respectively. By excluding highly variable but poorly perfused adipose tissue from calculation of contrast medium dose, the measured LBW protocol may lessen patient-to-patient enhancement variability while maintaining satisfactory hepatic and vascular enhancement.

  20. Bioluminescence enhancement through an added washing protocol enabling a greater sensitivity to carbofuran toxicity.

    PubMed

    Jia, Kun; Eltzov, Evgeni; Marks, Robert S; Ionescu, Rodica E

    2013-10-01

    The effects of carbofuran toxicity on a genetically modified bacterial strain E. coli DPD2794 were enhanced using a new bioluminescent protocol which consisted of three consecutive steps: incubation, washing and luminescence reading. Specifically, in the first step, several concentrations of carbofuran aqueous solutions were incubated with different bacterial suspensions at recorded optical densities for different lengths of time. Thereafter, the resulting bacterial/toxicant mixtures were centrifuged and the aged cellular supernatant replaced with fresh medium. In the final step, the carbofuran- induced bioluminescence to the exposed E. coli DPD2794 bacteria was shown to provide a faster and higher intensity when recorded at a higher temperature at30°C which is not usually used in the literature. It was found that the incubation time and the replacement of aged cellular medium were essential factors to distinguish different concentrations of carbofuran in the bioluminescent assays. From our results, the optimum incubation time for a "light ON" bioluminescence detection of the effect of carbofuran was 6h. Thanks to the replacement of the aged cellular medium, a group of additional peaks starting around 30min were observed and we used the corresponding areas under the curve (AUC) at different contents of carbofuran to produce the calibration curve. Based on the new protocol, a carbofuran concentration of 0.5pg/mL can be easily determined in a microtiter plate bioluminescent assay, while a non-wash protocol provides an unexplainable order of curve evolutionswhich does not allow the user to determine the concentration. Copyright © 2013 Elsevier Inc. All rights reserved.

  1. Security Analysis and Improvements of Authentication and Access Control in the Internet of Things

    PubMed Central

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-01-01

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18–21 June 2012, pp. 588–592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464

  2. Security analysis and improvements of authentication and access control in the Internet of Things.

    PubMed

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-08-13

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.

  3. 47 CFR 79.109 - Activating accessibility features.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... ACCESSIBILITY OF VIDEO PROGRAMMING Apparatus § 79.109 Activating accessibility features. (a) Requirements... video programming transmitted in digital format simultaneously with sound, including apparatus designed to receive or display video programming transmitted in digital format using Internet protocol, with...

  4. VoIP Accessibility: A Usability Study of Voice over Internet Protocol (VoIP) Systems and A Survey of VoIP Users with Vision Loss

    ERIC Educational Resources Information Center

    Packer, Jaclyn; Reuschel, William

    2018-01-01

    Introduction: Accessibility of Voice over Internet Protocol (VoIP) systems was tested with a hands-on usability study and an online survey of VoIP users who are visually impaired. The survey examined the importance of common VoIP features, and both methods assessed difficulty in using those features. Methods: The usability test included four paid…

  5. Comparison of two MAC protocols based on LEO satellite networks

    NASA Astrophysics Data System (ADS)

    Guan, Mingxiang; Wang, Ruichun

    2009-12-01

    With the development of LEO satellite communication, it is the basic requirement that various kinds of services will be provided. Considering that weak channel collision detection ability, long propagation delay and heavy load in LEO satellite communication system, a valid adaptive access control protocol APRMA is proposed. Different access probability functions for different services are obtained and appropriate access probabilities for voice and data users are updated slot by slot based on the estimation of the voice traffic and the channel status. Finally simulation results demonstrate that the performance of system is improved by the APRMA compared with the conventional PRMA, with an acceptable trade-off between QoS of voice and delay of data. Also the APRMA protocol will be suitable for HAPS (high altitude platform station) with the characters of weak channel collision detection ability, long propagation delay and heavy load.

  6. Micropropagation of Asparagus by in vitro shoot culture.

    PubMed

    Stajner, Nataša

    2013-01-01

    Asparagus officinalis is most extensively studied species within the genus Asparagus, which is well known as garden asparagus. This species is dioecious with unisexual flowers, which means that generative propagation gives roughly equal number of male and female plants. Male plants are high yielders and preferred commercially over female plants. Tissue culture techniques could efficiently promote vegetative propagation of male plants and pave the way for efficient plant breeding.This chapter describes an efficient micropropagation protocol for developing rapid growing in vitro Asparagus shoot cultures. The source of explants, inoculation, and shoot proliferation, followed by shoot propagation, rooting, and acclimatization is described. The optimal medium for Asparagus micropropagation described in this chapter is composed of MS macro- and microelements and a combination of auxins and cytokinins. Plant growth regulators NAA, kinetin, and BA were used in various concentrations. Three different media representing the whole micropropagation protocol of Asparagus are described; medium for shoot initiation, medium for shoot multiplication, and medium for root formation. By in vitro propagation of Asparagus, root initiation is difficult, but can be promoted by adding growth retardant ancymidol which also greatly promotes shoot development and suppresses callus formation.

  7. Peer Review and Publication of Research Protocols and Proposals: A Role for Open Access Journals

    PubMed Central

    2004-01-01

    Peer-review and publication of research protocols offer several advantages to all parties involved. Among these are the following opportunities for authors: external expert opinion on the methods, demonstration to funding agencies of prior expert review of the protocol, proof of priority of ideas and methods, and solicitation of potential collaborators. We think that review and publication of protocols is an important role for Open Access journals. Because of their electronic form, openness for readers, and author-pays business model, they are better suited than traditional journals to ensure the sustainability and quality of protocol reviews and publications. In this editorial, we describe the workflow for investigators in eHealth research, from protocol submission to a funding agency, to protocol review and (optionally) publication at JMIR, to registration of trials at the International eHealth Study Registry (IESR), and to publication of the report. One innovation at JMIR is that protocol peer reviewers will be paid a honorarium, which will be drawn partly from a new submission fee for protocol reviews. Separating the article processing fee into a submission and a publishing fee will allow authors to opt for “peer-review only” (without subsequent publication) at reduced costs, if they wish to await a funding decision or for other reasons decide not to make the protocol public. PMID:15471763

  8. Peer-review and publication of research protocols and proposals: a role for open access journals.

    PubMed

    Eysenbach, Gunther

    2004-09-30

    Peer-review and publication of research protocols offer several advantages to all parties involved. Among these are the following opportunities for authors: external expert opinion on the methods, demonstration to funding agencies of prior expert review of the protocol, proof of priority of ideas and methods, and solicitation of potential collaborators. We think that review and publication of protocols is an important role for Open Access journals. Because of their electronic form, openness for readers, and author-pays business model, they are better suited than traditional journals to ensure the sustainability and quality of protocol reviews and publications. In this editorial, we describe the workflow for investigators in eHealth research, from protocol submission to a funding agency, to protocol review and (optionally) publication at JMIR, to registration of trials at the International eHealth Study Registry (IESR), and to publication of the report. One innovation at JMIR is that protocol peer reviewers will be paid a honorarium, which will be drawn partly from a new submission fee for protocol reviews. Separating the article processing fee into a submission and a publishing fee will allow authors to opt for "peer-review only" (without subsequent publication) at reduced costs, if they wish to await a funding decision or for other reasons decide not to make the protocol public.

  9. A carrier sensed multiple access protocol for high data base rate ring networks

    NASA Technical Reports Server (NTRS)

    Foudriat, E. C.; Maly, Kurt J.; Overstreet, C. Michael; Khanna, S.; Paterra, Frank

    1990-01-01

    The results of the study of a simple but effective media access protocol for high data rate networks are presented. The protocol is based on the fact that at high data rates networks can contain multiple messages simultaneously over their span, and that in a ring, nodes used to detect the presence of a message arriving from the immediate upstream neighbor. When an incoming signal is detected, the node must either abort or truncate a message it is presently sending. Thus, the protocol with local carrier sensing and multiple access is designated CSMA/RN. The performance of CSMA/RN with TTattempt and truncate is studied using analytic and simulation models. Three performance factors, wait or access time, service time and response or end-to-end travel time are presented. The service time is basically a function of the network rate, it changes by a factor of 1 between no load and full load. Wait time, which is zero for no load, remains small for load factors up to 70 percent of full load. Response time, which adds travel time while on the network to wait and service time, is mainly a function of network length, especially for longer distance networks. Simulation results are shown for CSMA/RN where messages are removed at the destination. A wide range of local and metropolitan area network parameters including variations in message size, network length, and node count are studied. Finally, a scaling factor based upon the ratio of message to network length demonstrates that the results, and hence, the CSMA/RN protocol, are applicable to wide area networks.

  10. Review and publication of protocol submissions to Trials - what have we learned in 10 years?

    PubMed

    Li, Tianjing; Boutron, Isabelle; Al-Shahi Salman, Rustam; Cobo, Erik; Flemyng, Ella; Grimshaw, Jeremy M; Altman, Douglas G

    2016-12-16

    Trials has 10 years of experience in providing open access publication of protocols for randomised controlled trials. In this editorial, the senior editors and editors-in-chief of Trials discuss editorial issues regarding managing trial protocol submissions, including the content and format of the protocol, timing of submission, approaches to tracking protocol amendments, and the purpose of peer reviewing a protocol submission. With the clarification and guidance provided, we hope we can make the process of publishing trial protocols more efficient and useful to trial investigators and readers.

  11. O How Wondrous Is E-Mail!

    ERIC Educational Resources Information Center

    Buchanan, Larry

    1998-01-01

    Addresses the use of e-mail for communication and collaborative projects in schools. Discusses the effectiveness of an e-mail system based on a UNIX host; problems with POP (post office protocol) client programs; and the new Internet Mail Access Protocol (IMAP) which addresses most of the shortcomings of the POP protocol while keeping advantages…

  12. Zero-Copy Objects System

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.

    2011-01-01

    Zero-Copy Objects System software enables application data to be encapsulated in layers of communication protocol without being copied. Indirect referencing enables application source data, either in memory or in a file, to be encapsulated in place within an unlimited number of protocol headers and/or trailers. Zero-copy objects (ZCOs) are abstract data access representations designed to minimize I/O (input/output) in the encapsulation of application source data within one or more layers of communication protocol structure. They are constructed within the heap space of a Simple Data Recorder (SDR) data store to which all participating layers of the stack must have access. Each ZCO contains general information enabling access to the core source data object (an item of application data), together with (a) a linked list of zero or more specific extents that reference portions of this source data object, and (b) linked lists of protocol header and trailer capsules. The concatenation of the headers (in ascending stack sequence), the source data object extents, and the trailers (in descending stack sequence) constitute the transmitted data object constructed from the ZCO. This scheme enables a source data object to be encapsulated in a succession of protocol layers without ever having to be copied from a buffer at one layer of the protocol stack to an encapsulating buffer at a lower layer of the stack. For large source data objects, the savings in copy time and reduction in memory consumption may be considerable.

  13. Quantum Tomography Protocols with Positivity are Compressed Sensing Protocols (Open Access)

    DTIC Science & Technology

    2015-12-08

    ARTICLE OPEN Quantum tomography protocols with positivity are compressed sensing protocols Amir Kalev1, Robert L Kosut2 and Ivan H Deutsch1...Characterising complex quantum systems is a vital task in quantum information science. Quantum tomography, the standard tool used for this purpose, uses a well...designed measurement record to reconstruct quantum states and processes. It is, however, notoriously inefficient. Recently, the classical signal

  14. Cryopreservation of in vitro grown shoot tips and apical meristems of the forage legume Arachis pintoi.

    PubMed

    Rey, Hebe Y; Faloci, Mirta; Medina, Ricardo; Dolce, Natalia; Mroginski, Luis; Engelmann, Florent

    2009-01-01

    A cryopreservation protocol using the encapsulation-dehydration procedure was established for shoot tips (2-3 mm in length) and meristems (0.3-0.5 mm) sampled from in vitro plantlets of diploid and triploid cytotypes of Arachis pintoi. The optimal protocol was the following: after dissection, explants were precultured for 24 h on establishment medium (EM), encapsulated in calcium alginate beads and pretreated in liquid EM medium with daily increasing sucrose concentration (0.5, 0.75, 1.0 M) and desiccated to 22-23 percent moisture content (fresh weight basis). Explants were frozen using slow cooling (1 C per min from 25C to -30C followed by direct immersion in liquid nitrogen), thawed rapidly and post-cultured in liquid EM medium enriched with daily decreasing sucrose concentrations (0.75, 0.50, 0.1 M). Explants were then transferred to solid EM medium in order to achieve shoot regeneration, then on Murashige and Skoog medium supplemented with 0.05 microM naphthalene acetic acid to induce rooting of shoots. With this procedure, 53 percent and 56 percent of cryopreserved shoot tips of the diploid and triploid cytotypes, respectively, survived and formed plants. However, only 16 percent of cryopreserved meristems of both cytotypes regenerated plants. Using ten isozyme systems and seven RAPD profiles, no modification induced by cryopreservation could be detected in plantlets regenerated from cryopreserved material.

  15. Establishment and characterization of a differentiated epithelial cell culture model derived from the porcine cervix uteri

    PubMed Central

    2012-01-01

    Background Cervical uterine epithelial cells maintain a physiological and pathogen-free milieu in the female mammalian reproductive tract and are involved in sperm-epithelium interaction. Easily accessible, differentiated model systems of the cervical epithelium are not yet available to elucidate the underlying molecular mechanisms within these highly specialized cells. Therefore, the aim of the study was to establish a cell culture of the porcine cervical epithelium representing in vivo-like properties of the tissue. Results We tested different isolation methods and culture conditions and validated purity of the cultured cells by immunohistochemistry against keratins. We could reproducibly culture pure epithelial cells from cervical tissue explants. Based on a morphology score and the WST-1 Proliferation Assay, we optimized the growth medium composition. Primary porcine cervical cells performed best in conditioned Ham's F-12, containing 10% FCS, EGF and insulin. After cultivation in an air-liquid interface for three weeks, the cells showed a discontinuously multilayered phenotype. Finally, differentiation was validated via immunohistochemistry against beta catenin. Mucopolysaccharide production could be shown via alcian blue staining. Conclusions We provide the first suitable protocol to establish a differentiated porcine epithelial model of the cervix uteri, based on easily accessible cells using slaughterhouse material. PMID:22429795

  16. Cytokinesis-block micronucleus assay in primary human liver fibroblasts exposed to griseofulvin and mitomycin C.

    PubMed

    Nesti, C; Trippi, F; Scarpato, R; Migliore, L; Turchi, G

    2000-03-01

    Primary liver fibroblasts were applied in a cytokinesis-block micronucleus assay in combination with fluorescence in situ hybridization (FISH) using two protocols. In protocol A (Prot. A), cytochalasin B (Cyt B) was added at the end of the treatment time directly to the medium containing the standard compounds, whereas in protocol B (Prot. B) the chemical-containing medium was removed and fresh medium with Cyt B was added. The study was performed using the aneugen griseofulvin (GF) and the clastogen mitomycin C (MMC) as standard compounds. With both protocols GF induced a significant increase in MN frequency over controls in a dose-related manner at the lower concentrations tested (7.5 and 15 microg/ml). At the highest dose (30 microg/ml) the aneugen effect was substantially reduced. MN induction obtained with Prot. A was significantly higher ( approximately 3-fold) than with Prot. B at the most effective concentration. The aneugen effect induced by GF did not change when different cell densities were used, but again with Prot. A we obtained the highest effect. MN induced by MMC showed a dose- and time-dependent increase in both protocols. In contrast to GF, the greater clastogenic response induced by MMC in human liver fibroblasts was obtained with Prot. B, approximately 3-fold higher than Prot. A at the most effective concentration and approximately 2-fold with 24 h treatment at 0.17 microg/ml MMC. With GF, the FISH data in human liver fibroblasts (80% C+MN) were fairly consistent with those obtained in the rodent cell lines. In human whole blood cultures, the same dose used in our experiment produced a relatively higher percentage of C+MN. FISH analysis showed that MMC induced mainly MN containing acentric fragments rather than whole chromosomes. In conclusion we have demostrated that chemically induced genetic effects are strongly dependent on the cell culture employed, treatment schedule and intra- and post-treatment experimental conditions.

  17. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  18. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  19. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  20. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  1. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  2. 47 CFR 9.7 - Access to 911 and E911 service capabilities.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 1 2013-10-01 2013-10-01 false Access to 911 and E911 service capabilities. 9.7 Section 9.7 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.7 Access to 911 and E911 service capabilities. (a) Access. Subject to the...

  3. 47 CFR 9.7 - Access to 911 and E911 service capabilities.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 1 2014-10-01 2014-10-01 false Access to 911 and E911 service capabilities. 9.7 Section 9.7 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.7 Access to 911 and E911 service capabilities. (a) Access. Subject to the...

  4. 47 CFR 9.7 - Access to 911 and E911 service capabilities.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 1 2012-10-01 2012-10-01 false Access to 911 and E911 service capabilities. 9.7 Section 9.7 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.7 Access to 911 and E911 service capabilities. (a) Access. Subject to the...

  5. Guidelines for Outsourcing Remote Access.

    ERIC Educational Resources Information Center

    Hassler, Ardoth; Neuman, Michael

    1996-01-01

    Discusses the advantages and disadvantages of outsourcing remote access to campus computer networks and the Internet, focusing on improved service, cost-sharing, partnerships with vendors, supported protocols, bandwidth, scope of access, implementation, support, network security, and pricing. Includes a checklist for a request for proposals on…

  6. Implementation of a written protocol for management of central venous access devices: a theoretical and practical education, including bedside examinations.

    PubMed

    Ahlin, Catharina; Klang-Söderkvist, Birgitta; Brundin, Seija; Hellström, Birgitta; Pettersson, Karin; Johansson, Eva

    2006-01-01

    The objectives of this study were to evaluate registered nurses' (RN) compliance with a local clinical central venous access device (CVAD) protocol after completing an educational program and to determine RNs' perception of the program. Seventy-five RNs working in hematology participated in the educational part of the program. Sixty-eight RNs were examined while changing CVAD dressings or placing a Huber needle into a port on actual patients. Sixty percent of the RNs passed the examination and reported that the program increased their knowledge. The results indicated that the educational program could be recommended for use when implementing a new clinical protocol.

  7. [Treatment results with ALL-BFM-95 protocol in children with acute lymphoblastic leukemia in Hungary].

    PubMed

    Müller, Judit; Kovács, Gábor; Jakab, Zsuzsanna; Rényi, Imre; Galántai, Ilona; Békési, Andrea; Kiss, Csongor; Nagy, Kálmán; Kajtár, Pál; Bartyik, Katalin; Masát, Péter; Magyarosy, Edina

    2005-01-09

    In Hungary children (from 1 to 18 years of age) with de novo acute lymphoblastic leukemia were treated from January 1996 to October 2002, according to protocol ALL-BFM-95. The aim of this study was to evaluate the experience with this protocol, the treatment results according to the risk groups and to compare the Hungarian data with the international results. Patients were stratified into 3 risk groups, based on initial white blood cell count, age, immunology, cytogenetics and response to treatment: standard, medium and high risk group. Three hundred sixty eight children entered the study (male-female ratio was 1.27:1, median age 6 years and 4 months). 110 (29.9%) children were in the standard, 210 (57.1%) in the medium and 48 (13%) in the high risk group. Duration of the chemotherapy was 2 years, except of the boys in the standard risk group, their maintenance therapy was 1 year longer. The overall complete remission rate was 93.2%. 20 (5.4%) children died in induction and 5 (1.4%) were non-responders. The 5-year overall survival for all patients was 78.5%, in the standard risk group 93.2%, in the medium risk group 78.4% and in the high risk group 44.5% with a minimum follow up of 1.19 years and median follow up of 4.85 years. From the 368 patients 272 (73.9%) are still in their first complete clinical remission and other 18 children are alive after relapse. In 14.7% of the patients relapse was diagnosed; the most common site was the bone marrow. In one patient second malignancy occurred. The 5-year event free survival for all patients was 72.6%, in the standard risk group 87.6%, in the medium risk group 72.1% and in the high risk group 39.9%. The treatment outcome of children with acute lymphoblastic leukemia improved remarkably over the last decades. 78% of children suffering from acute lymphoblastic leukemia could be cured with the ALL-BFM-95 protocol. The Hungarian results are comparable to those achieved by other leukaemia study groups in the world regarding the ALL-BFM-95 protocol.

  8. Cryopreservation of in vitro shoot apices of Oxalis tuberosa Mol.

    PubMed

    Gonzalez-Benito, M E; Mendoza-Condori, V H; Molina-Garcia, A D

    2007-01-01

    Oca (Oxalis tuberosa Mol.) is an under-utilized tuber crop from the Andean region. Cryopreservation would allow the safe and long-term preservation of the genetic resources of this crop. A protocol for the cryopreservation of in vitro grown shoots has been developed using the vitrification solution PVS2. Two genotypes were studied (G1 and G27). Nodal segments were cultured on MS medium and incubated at 10 degree C with 16 h photoperiod and 10 mol per square meter per second irradiance, for two weeks. Apices were then excised and cultured on MS+0.15 M sucrose for 3 days at 5 degree C in darkness. Subsequently, apices were immersed in a loading solution (liquid MS medium+2 M glycerol+0.4 M sucrose), and then treated with the vitrification solution PVS2 for 0 to 40 minutes. Cryovials were then immersed in liquid nitrogen. Four weeks after rewarming and culture on recovery medium, genotype G1 showed approximately 60 percent recovery (normal growth) with 20 min PVS2 treatment. Genotype G27 showed lower recovery (30 percent). Differential scanning calorimetry yielded a Tg midpoint for PSV2 solution of ca. -120 degree C. Calorimetric studies on apices at different stages of the cryopreservation protocol showed a change in calorimetric parameters consistent with a decrease in the amount of frozen water as the protocol advanced.

  9. Rapid in vitro propagation, conservation and analysis of genetic stability of Viola pilosa.

    PubMed

    Soni, Madhvi; Kaur, Rajinder

    2014-01-01

    A protocol for in vitro propagation was developed for Viola pilosa, a plant of immense medicinal value. To start with in vitro propagation, the sterilized explants (buds) were cultured on MS basal medium supplemented with various concentrations of growth regulators. One of the medium compositions MS basal + 0.5 mg/l BA + 0.5 mg/l TDZ + 0.5 mg/l GA3 gave best results for in vitro shoot bud establishment. Although the problem of shoot vitrification occurred on this medium but this was overcome by transferring the vitrified shoots on MS medium supplemented with 1 mg/l BA and 0.25 mg/l Kn. The same medium was found to be the best medium for further in vitro shoot multiplication. 100 % root induction from in vitro grown shoots was obtained on half strength MS medium supplemented with 1 mg/l IBA. In vitro formed plantlets were hardened and transferred to soil with 83 % survival. Additionally, conservation of in vitro multiplying shoots was also attempted using two different approaches namely slowing down the growth at low temperature and cryopreservation following vitrification. At low temperature retrieval rate was better at 10 °C than at 4 °C after conservation of in vitro multiplying shoots. In cryopreservation-vitrification studies, the vitrified shoot buds gave maximum retrieval of 41.66 % when they were precooled at 4 °C, while only 16.66 % vitrified shoots were retrieved from those precooled at 10 °C. Genetic stability of the in vitro grown plants was analysed by RAPD and ISSR markers which indicated no somaclonal variation among in vitro grown plants demonstrating the feasibility of using the protocol without any adverse genetical effects.

  10. Rapid mounting of adult Drosophila structures in Hoyer's medium.

    PubMed

    Stern, David L; Sucena, Elio

    2012-01-01

    The Drosophila cuticle carries a rich array of morphological details. Thus, cuticle examination has had a central role in the history of genetics. This protocol describes a procedure for mounting adult cuticles in Hoyer's medium, a useful mountant for both larval and adult cuticles. The medium digests soft tissues rapidly, leaving the cuticle cleared for observation. In addition, samples can be transferred directly from water to Hoyer's medium. However, specimens mounted in Hoyer's medium degrade over time. For example, the fine denticles on the larval dorsum are best observed soon after mounting; they begin to fade after 1 week, and can disappear completely after several months. More robust features, such as the ventral denticle belts, will persist for a longer period of time. Because adults cannot profitably be mounted whole in Hoyer's medium, some dissection is necessary.

  11. Bearer channel control protocol for the dynamic VB5.2 interface in ATM access networks

    NASA Astrophysics Data System (ADS)

    Fragoulopoulos, Stratos K.; Mavrommatis, K. I.; Venieris, Iakovos S.

    1996-12-01

    In the multi-vendor systems, a customer connected to an Access network (AN) must be capable of selecting a specific Service Node (SN) according to the services the SN provides. The multiplicity of technologically varying AN calls for the definition of a standard reference point between the AN and the SN widely known as the VB interface. Two versions are currently offered. The VB5.1 is simpler to implement but is not as flexible as the VB5.2, which supports switched connections. The VB5.2 functionality is closely coupled to the Broadband Bearer Channel Connection Protocol (B-BCCP). The B-BCCP is used for conveying the necessary information for dynamic resource allocation, traffic policing and routing in the AN as well as for information exchange concerning the status of the AN before a new call is established by the SN. By relying on such a protocol for the exchange of information instead of intercepting and interpreting signalling messages in the AN, the architecture of the AN is simplified because the functionality related to processing is not duplicated. In this paper a prominent B- BCCP candidate is defined, called the Service node Access network Interaction Protocol.

  12. The deployment of a large scale object store at the RAL Tier-1

    NASA Astrophysics Data System (ADS)

    Dewhurst, A.; Johnson, I.; Adams, J.; Canning, B.; Vasilakakos, G.; Packer, A.

    2017-10-01

    Since 2014, the RAL Tier-1 has been working on deploying a Ceph backed object store. The aim is to replace Castor for disk-only storage. This new service must be scalable to meet the data demands of the LHC to 2020 and beyond. As well as offering access protocols the LHC experiments currently use, it must also provide industry standard access protocols. In order to keep costs down the service must use erasure coding rather than replication to ensure data reliability. This paper will present details of the storage service setup, which has been named Echo, as well as the experience gained from running it. The RAL Tier-1 has also been developing XrootD and GridFTP plugins for Ceph. Both plugins are built on top of the same libraries that write striped data into Ceph and therefore data written by one protocol will be accessible by the other. In the long term we hope the LHC experiments will migrate to industry standard protocols, therefore these plugins will only provide the features needed by the LHC experiments. This paper will report on the development and testing of these plugins.

  13. Accounting for patient size in the optimization of dose and image quality of pelvis cone beam CT protocols on the Varian OBI system.

    PubMed

    Wood, Tim J; Moore, Craig S; Horsfield, Carl J; Saunderson, John R; Beavis, Andrew W

    2015-01-01

    The purpose of this study was to develop size-based radiotherapy kilovoltage cone beam CT (CBCT) protocols for the pelvis. Image noise was measured in an elliptical phantom of varying size for a range of exposure factors. Based on a previously defined "small pelvis" reference patient and CBCT protocol, appropriate exposure factors for small, medium, large and extra-large patients were derived which approximate the image noise behaviour observed on a Philips CT scanner (Philips Medical Systems, Best, Netherlands) with automatic exposure control (AEC). Selection criteria, based on maximum tube current-time product per rotation selected during the radiotherapy treatment planning scan, were derived based on an audit of patient size. It has been demonstrated that 110 kVp yields acceptable image noise for reduced patient dose in pelvic CBCT scans of small, medium and large patients, when compared with manufacturer's default settings (125 kVp). Conversely, extra-large patients require increased exposure factors to give acceptable images. 57% of patients in the local population now receive much lower radiation doses, whereas 13% require higher doses (but now yield acceptable images). The implementation of size-based exposure protocols has significantly reduced radiation dose to the majority of patients with no negative impact on image quality. Increased doses are required on the largest patients to give adequate image quality. The development of size-based CBCT protocols that use the planning CT scan (with AEC) to determine which protocol is appropriate ensures adequate image quality whilst minimizing patient radiation dose.

  14. Increasing the Accessibility of Science for All Students

    ERIC Educational Resources Information Center

    Langley-Turnbaugh, S. J.; Wilson, G.; Lovewell, L.

    2009-01-01

    This paper evaluates the accessibility of selected field and laboratory high school science activities, and provides suggestions for increasing accessibility for students with disabilities. We focused on GLOBE (Global Learning Observations to Benefit the Environment) protocols, specifically the new Seasons and Biomes investigation currently being…

  15. Preferred reporting items for systematic review and meta-analysis protocols (PRISMA-P) 2015 statement.

    PubMed

    Moher, David; Shamseer, Larissa; Clarke, Mike; Ghersi, Davina; Liberati, Alessandro; Petticrew, Mark; Shekelle, Paul; Stewart, Lesley A

    2015-01-01

    Systematic reviews should build on a protocol that describes the rationale, hypothesis, and planned methods of the review; few reviews report whether a protocol exists. Detailed, well-described protocols can facilitate the understanding and appraisal of the review methods, as well as the detection of modifications to methods and selective reporting in completed reviews. We describe the development of a reporting guideline, the Preferred Reporting Items for Systematic reviews and Meta-Analyses for Protocols 2015 (PRISMA-P 2015). PRISMA-P consists of a 17-item checklist intended to facilitate the preparation and reporting of a robust protocol for the systematic review. Funders and those commissioning reviews might consider mandating the use of the checklist to facilitate the submission of relevant protocol information in funding applications. Similarly, peer reviewers and editors can use the guidance to gauge the completeness and transparency of a systematic review protocol submitted for publication in a journal or other medium.

  16. The WHO Tobacco Convention: A New Dawn in the Implementation of International Health Instrument? Comment on "The Legal Strength of International Health Instruments - What It Brings to Global Health Governance?"

    PubMed

    Durojaye, Ebenezer

    2017-07-05

    The Tobacco Convention was adopted by the World Health Organization (WHO) in 2003. Nikogosian and Kickbusch examine the five potential impacts of the Tobacco Convention and its Protocol on public health. These include the adoption of the Convention would seem to unlock the treaty-making powers of WHO; the impact of the Convention in the global health architecture has been phenomenal globally; the Convention has facilitated the adoption of further instruments to strengthen its implementation at the national level; the Convention has led to the adoption of appropriate legal framework to combat the use of tobacco at the national level and that the impact of the Convention would seem to go beyond public health but has also led to the adoption of the Protocol to Eliminate Illicit Trade in Tobacco. However, the article by Nikogosian and Kickbusch would seem to overlook some of the challenges that may militate against the effective implementation of international law, including the Tobacco Convention, at the national level. © 2018 The Author(s); Published by Kerman University of Medical Sciences. This is an open-access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

  17. Traffic placement policies for a multi-band network

    NASA Technical Reports Server (NTRS)

    Maly, Kurt J.; Foudriat, E. C.; Game, David; Mukkamala, R.; Overstreet, C. Michael

    1990-01-01

    Recently protocols were introduced that enable the integration of synchronous traffic (voice or video) and asynchronous traffic (data) and extend the size of local area networks without loss in speed or capacity. One of these is DRAMA, a multiband protocol based on broadband technology. It provides dynamic allocation of bandwidth among clusters of nodes in the total network. A number of traffic placement policies for such networks are proposed and evaluated. Metrics used for performance evaluation include average network access delay, degree of fairness of access among the nodes, and network throughput. The feasibility of the DRAMA protocol is established through simulation studies. DRAMA provides effective integration of synchronous and asychronous traffic due to its ability to separate traffic types. Under the suggested traffic placement policies, the DRAMA protocol is shown to handle diverse loads, mixes of traffic types, and numbers of nodes, as well as modifications to the network structure and momentary traffic overloads.

  18. Agreements between Industry and Academia on Publication Rights: A Retrospective Study of Protocols and Publications of Randomized Clinical Trials.

    PubMed

    Kasenda, Benjamin; von Elm, Erik; You, John J; Blümle, Anette; Tomonaga, Yuki; Saccilotto, Ramon; Amstutz, Alain; Bengough, Theresa; Meerpohl, Joerg J; Stegert, Mihaela; Olu, Kelechi K; Tikkinen, Kari A O; Neumann, Ignacio; Carrasco-Labra, Alonso; Faulhaber, Markus; Mulla, Sohail M; Mertz, Dominik; Akl, Elie A; Bassler, Dirk; Busse, Jason W; Ferreira-González, Ignacio; Lamontagne, Francois; Nordmann, Alain; Gloy, Viktoria; Raatz, Heike; Moja, Lorenzo; Ebrahim, Shanil; Schandelmaier, Stefan; Sun, Xin; Vandvik, Per O; Johnston, Bradley C; Walter, Martin A; Burnand, Bernard; Schwenkglenks, Matthias; Hemkens, Lars G; Bucher, Heiner C; Guyatt, Gordon H; Briel, Matthias

    2016-06-01

    Little is known about publication agreements between industry and academic investigators in trial protocols and the consistency of these agreements with corresponding statements in publications. We aimed to investigate (i) the existence and types of publication agreements in trial protocols, (ii) the completeness and consistency of the reporting of these agreements in subsequent publications, and (iii) the frequency of co-authorship by industry employees. We used a retrospective cohort of randomized clinical trials (RCTs) based on archived protocols approved by six research ethics committees between 13 January 2000 and 25 November 2003. Only RCTs with industry involvement were eligible. We investigated the documentation of publication agreements in RCT protocols and statements in corresponding journal publications. Of 647 eligible RCT protocols, 456 (70.5%) mentioned an agreement regarding publication of results. Of these 456, 393 (86.2%) documented an industry partner's right to disapprove or at least review proposed manuscripts; 39 (8.6%) agreements were without constraints of publication. The remaining 24 (5.3%) protocols referred to separate agreement documents not accessible to us. Of those 432 protocols with an accessible publication agreement, 268 (62.0%) trials were published. Most agreements documented in the protocol were not reported in the subsequent publication (197/268 [73.5%]). Of 71 agreements reported in publications, 52 (73.2%) were concordant with those documented in the protocol. In 14 of 37 (37.8%) publications in which statements suggested unrestricted publication rights, at least one co-author was an industry employee. In 25 protocol-publication pairs, author statements in publications suggested no constraints, but 18 corresponding protocols documented restricting agreements. Publication agreements constraining academic authors' independence are common. Journal articles seldom report on publication agreements, and, if they do, statements can be discrepant with the trial protocol.

  19. PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices

    PubMed Central

    Sanchez, Pedro Moreno; Lopez, Rafa Marin; Gomez Skarmeta, Antonio F.

    2013-01-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices. PMID:24189332

  20. PANATIKI: a network access control implementation based on PANA for IoT devices.

    PubMed

    Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F

    2013-11-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  1. Investigating the efficiency of IEEE 802.15.4 for medical monitoring applications.

    PubMed

    Pelegris, P; Banitsas, K

    2011-01-01

    Recent advancements in wireless communications technologies bring us one step closer to provide reliable Telecare services as an alternative to patients staying in a hospital mainly for monitoring purposes. In this research we investigate the efficiency of IEEE 802.15.4 in a simple scenario where a patient is being monitored using an ECG and a blood analysis module. This approach binds well with assisted living solutions, by sharing the network infrastructure for both monitoring and control while taking advantage of the low power features of the protocol. Such applications are becoming more and more realistic to implement as IEEE 802.15.4 compatible hardware becomes increasingly available. Our aim is to examine the impact of Beacon and Superframe Order in the medium access delay, dropped packets, end to end delay, average retransmission attempts and consumed power focusing on this bandwidth demanding situation where the network load does not allow low duty cycles, in order to draw some conclusions on the effect that this will have to telemonitoring applications.

  2. Analytical Model of Large Data Transactions in CoAP Networks

    PubMed Central

    Ludovici, Alessandro; Di Marco, Piergiuseppe; Calveras, Anna; Johansson, Karl H.

    2014-01-01

    We propose a novel analytical model to study fragmentation methods in wireless sensor networks adopting the Constrained Application Protocol (CoAP) and the IEEE 802.15.4 standard for medium access control (MAC). The blockwise transfer technique proposed in CoAP and the 6LoWPAN fragmentation are included in the analysis. The two techniques are compared in terms of reliability and delay, depending on the traffic, the number of nodes and the parameters of the IEEE 802.15.4 MAC. The results are validated trough Monte Carlo simulations. To the best of our knowledge this is the first study that evaluates and compares analytically the performance of CoAP blockwise transfer and 6LoWPAN fragmentation. A major contribution is the possibility to understand the behavior of both techniques with different network conditions. Our results show that 6LoWPAN fragmentation is preferable for delay-constrained applications. For highly congested networks, the blockwise transfer slightly outperforms 6LoWPAN fragmentation in terms of reliability. PMID:25153143

  3. Materiel Readiness Support Activity Automation Plan

    DTIC Science & Technology

    1986-09-01

    Hardwire leased lines Sytek RF broadband cable modems Digital phone switched service Medium Speed - up to 56k baud RF modems Digital phone service High...dialing 121 I iI Medium Speed - up to 56k baud RF modems - up to 56k baud sync modem $2070 plus installation - $25 per month maintenance - $1200 per...security is to disconnect net- work, modem , and hardwire access (that is, all external access to the machine) after 5 p.m. (normal business hours

  4. Self-organization of human embryonic stem cells on micropatterns

    PubMed Central

    Deglincerti, Alessia; Etoc, Fred; Guerra, M. Cecilia; Martyn, Iain; Metzger, Jakob; Ruzo, Albert; Simunovic, Mijo; Yoney, Anna; Brivanlou, Ali H.; Siggia, Eric; Warmflash, Aryeh

    2018-01-01

    Fate allocation in the gastrulating embryo is spatially organized as cells differentiate to specialized cell types depending on their positions with respect to the body axes. There is a need for in vitro protocols that allow the study of spatial organization associated with this developmental transition. While embryoid bodies and organoids can exhibit some spatial organization of differentiated cells, these methods do not yield consistent and fully reproducible results. Here, we describe a micropatterning approach where human embryonic stem cells are confined to disk-shaped, sub-millimeter colonies. After 42 hours of BMP4 stimulation, cells form self-organized differentiation patterns in concentric radial domains, which express specific markers associated with the embryonic germ layers, reminiscent of gastrulating embryos. Our protocol takes 3 days; it uses commercial microfabricated slides (CYTOO), human laminin-521 (LN-521) as extra-cellular matrix coating, and either conditioned or chemically-defined medium (mTeSR). Differentiation patterns within individual colonies can be determined by immunofluorescence and analyzed with cellular resolution. Both the size of the micropattern and the type of medium affect the patterning outcome. The protocol is appropriate for personnel with basic stem cell culture training. This protocol describes a robust platform for quantitative analysis of the mechanisms associated with pattern formation at the onset of gastrulation. PMID:27735934

  5. NADA Protocol for Behavioral Health. Putting Tools in the Hands of Behavioral Health Providers: The Case for Auricular Detoxification Specialists.

    PubMed

    Stuyt, Elizabeth B; Voyles, Claudia A; Bursac, Sara

    2018-02-07

    Background: The National Acupuncture Detoxification Association (NADA) protocol, a simple standardized auricular treatment has the potential to provide vast public health relief on issues currently challenging our world. This includes but is not limited to addiction, such as the opioid epidemic, but also encompasses mental health, trauma, PTSD, chronic stress, and the symptoms associated with these conditions. Simple accessible tools that improve outcomes can make profound differences. We assert that the NADA protocol can have greatest impact when broadly applied by behavioral health professionals, Auricular Detoxification Specialists (ADSes). Methods: The concept of ADS is described and how current laws vary from state to state. Using available national data, a survey of practitioners in three selected states with vastly different laws regarding ADSes, and interviews of publicly funded programs which are successfully incorporating the NADA protocol, we consider possible effects of ADS-friendly conditions. Results: Data presented supports the idea that conditions conducive to ADS practice lead to greater implementation. Program interviews reflect settings in which adding ADSes can in turn lead to improved outcomes. Discussion: The primary purpose of non-acupuncturist ADSes is to expand the access of this simple but effective treatment to all who are suffering from addictions, stress, or trauma and to allow programs to incorporate acupuncture in the form of the NADA protocol at minimal cost, when and where it is needed. States that have changed laws to allow ADS practice for this standardized ear acupuncture protocol have seen increased access to this treatment, benefiting both patients and the programs.

  6. A dedicated neonatal brain imaging system

    PubMed Central

    Winchman, Tobias; Padormo, Francesco; Teixeira, Rui; Wurie, Julia; Sharma, Maryanne; Fox, Matthew; Hutter, Jana; Cordero‐Grande, Lucilio; Price, Anthony N.; Allsop, Joanna; Bueno‐Conde, Jose; Tusor, Nora; Arichi, Tomoki; Edwards, A. D.; Rutherford, Mary A.; Counsell, Serena J.; Hajnal, Joseph V.

    2016-01-01

    Purpose The goal of the Developing Human Connectome Project is to acquire MRI in 1000 neonates to create a dynamic map of human brain connectivity during early development. High‐quality imaging in this cohort without sedation presents a number of technical and practical challenges. Methods We designed a neonatal brain imaging system (NBIS) consisting of a dedicated 32‐channel receive array coil and a positioning device that allows placement of the infant's head deep into the coil for maximum signal‐to‐noise ratio (SNR). Disturbance to the infant was minimized by using an MRI‐compatible trolley to prepare and transport the infant and by employing a slow ramp‐up and continuation of gradient noise during scanning. Scan repeats were minimized by using a restart capability for diffusion MRI and retrospective motion correction. We measured the 1) SNR gain, 2) number of infants with a completed scan protocol, and 3) number of anatomical images with no motion artifact using NBIS compared with using an adult 32‐channel head coil. Results The NBIS has 2.4 times the SNR of the adult coil and 90% protocol completion rate. Conclusion The NBIS allows advanced neonatal brain imaging techniques to be employed in neonatal brain imaging with high protocol completion rates. Magn Reson Med 78:794–804, 2017. © 2016 The Authors Magnetic Resonance in Medicine published by Wiley Periodicals, Inc. on behalf of International Society for Magnetic Resonance in Medicine. This is an open access article under the terms of the Creative Commons Attribution‐NonCommercial‐NoDerivs License, which permits use and distribution in any medium, provided the original work is properly cited, the use is non‐commercial and no modifications or adaptations are made. PMID:27643791

  7. A Transmission Availability Forecast Service for Internet Protocol Networks

    DTIC Science & Technology

    1998-12-01

    long term changes in the network situation. The probe measurement takes a finite period and so can aggregate and characterise short term variations in...network situation. Nevertheless, the process remains vulnerable to medium term variations, ie changes that occur after the probe and before the download...vulnerable to the medium term changes that might occur between the completion of the examination and the commencement of the download. 3.2 TAF

  8. Nanoparticle-supported and magnetically recoverable ruthenium hydroxide catalyst: efficient hydration of nitriles to amides in aqueous medium.

    PubMed

    Polshettiwar, Vivek; Varma, Rajender S

    2009-01-01

    Magnetic attraction not filtration: A magnetic nanoparticle-supported ruthenium hydroxide catalyst (see figure) was readily prepared from inexpensive starting materials and shown to catalyze the hydration of nitriles with excellent yield in a benign aqueous medium. Catalyst recovery using an external magnetic field, superior activity, and the inherent stability of the catalyst system are additional sustainable attributes of this protocol.

  9. Similarity searching and scaffold hopping in synthetically accessible combinatorial chemistry spaces.

    PubMed

    Boehm, Markus; Wu, Tong-Ying; Claussen, Holger; Lemmen, Christian

    2008-04-24

    Large collections of combinatorial libraries are an integral element in today's pharmaceutical industry. It is of great interest to perform similarity searches against all virtual compounds that are synthetically accessible by any such library. Here we describe the successful application of a new software tool CoLibri on 358 combinatorial libraries based on validated reaction protocols to create a single chemistry space containing over 10 (12) possible products. Similarity searching with FTrees-FS allows the systematic exploration of this space without the need to enumerate all product structures. The search result is a set of virtual hits which are synthetically accessible by one or more of the existing reaction protocols. Grouping these virtual hits by their synthetic protocols allows the rapid design and synthesis of multiple follow-up libraries. Such library ideas support hit-to-lead design efforts for tasks like follow-up from high-throughput screening hits or scaffold hopping from one hit to another attractive series.

  10. Geospatial Brokering - Challenges and Future Directions

    NASA Astrophysics Data System (ADS)

    White, C. E.

    2012-12-01

    An important feature of many brokers is to facilitate straightforward human access to scientific data while maintaining programmatic access to it for system solutions. Standards-based protocols are critical for this, and there are a number of protocols to choose from. In this discussion, we will present a web application solution that leverages certain protocols - e.g., OGC CSW, REST, and OpenSearch - to provide programmatic as well as human access to geospatial resources. We will also discuss managing resources to reduce duplication yet increase discoverability, federated search solutions, and architectures that combine human-friendly interfaces with powerful underlying data management. The changing requirements witnessed in brokering solutions over time, our recent experience participating in the EarthCube brokering hack-a-thon, and evolving interoperability standards provide insight to future technological and philosophical directions planned for geospatial broker solutions. There has been much change over the past decade, but with the unprecedented data collaboration of recent years, in many ways the challenges and opportunities are just beginning.

  11. Chemically defined medium and Caenorhabditis elegans

    NASA Technical Reports Server (NTRS)

    Szewczyk, Nathaniel J.; Kozak, Elena; Conley, Catharine A.

    2003-01-01

    BACKGROUND: C. elegans has been established as a powerful genetic system. Use of a chemically defined medium (C. elegans Maintenance Medium (CeMM)) now allows standardization and systematic manipulation of the nutrients that animals receive. Liquid cultivation allows automated culturing and experimentation and should be of use in large-scale growth and screening of animals. RESULTS: We find that CeMM is versatile and culturing is simple. CeMM can be used in a solid or liquid state, it can be stored unused for at least a year, unattended actively growing cultures may be maintained longer than with standard techniques, and standard C. elegans protocols work well with animals grown in defined medium. We also find that there are caveats to using defined medium. Animals in defined medium grow more slowly than on standard medium, appear to display adaptation to the defined medium, and display altered growth rates as they change the composition of the defined medium. CONCLUSIONS: As was suggested with the introduction of C. elegans as a potential genetic system, use of defined medium with C. elegans should prove a powerful tool.

  12. Patient-Reported Outcome (PRO) Assessment in Clinical Trials: A Systematic Review of Guidance for Trial Protocol Writers

    PubMed Central

    Calvert, Melanie; Kyte, Derek; Duffy, Helen; Gheorghe, Adrian; Mercieca-Bebber, Rebecca; Ives, Jonathan; Draper, Heather; Brundage, Michael; Blazeby, Jane; King, Madeleine

    2014-01-01

    Background Evidence suggests there are inconsistencies in patient-reported outcome (PRO) assessment and reporting in clinical trials, which may limit the use of these data to inform patient care. For trials with a PRO endpoint, routine inclusion of key PRO information in the protocol may help improve trial conduct and the reporting and appraisal of PRO results; however, it is currently unclear exactly what PRO-specific information should be included. The aim of this review was to summarize the current PRO-specific guidance for clinical trial protocol developers. Methods and Findings We searched the MEDLINE, EMBASE, CINHAL and Cochrane Library databases (inception to February 2013) for PRO-specific guidance regarding trial protocol development. Further guidance documents were identified via Google, Google scholar, requests to members of the UK Clinical Research Collaboration registered clinical trials units and international experts. Two independent investigators undertook title/abstract screening, full text review and data extraction, with a third involved in the event of disagreement. 21,175 citations were screened and 54 met the inclusion criteria. Guidance documents were difficult to access: electronic database searches identified just 8 documents, with the remaining 46 sourced elsewhere (5 from citation tracking, 27 from hand searching, 7 from the grey literature review and 7 from experts). 162 unique PRO-specific protocol recommendations were extracted from included documents. A further 10 PRO recommendations were identified relating to supporting trial documentation. Only 5/162 (3%) recommendations appeared in ≥50% of guidance documents reviewed, indicating a lack of consistency. Conclusions PRO-specific protocol guidelines were difficult to access, lacked consistency and may be challenging to implement in practice. There is a need to develop easily accessible consensus-driven PRO protocol guidance. Guidance should be aimed at ensuring key PRO information is routinely included in appropriate trial protocols, in order to facilitate rigorous collection/reporting of PRO data, to effectively inform patient care. PMID:25333995

  13. Establishment of an efficient plant regeneration culture protocol and achievement of successful genetic transformation in Jatropha curcas L.

    PubMed

    Liu, Ying; Liu, Guoxuan; Yang, Yali; Niu, Sufang; Yang, Fuguang; Yang, Shaoxia; Tang, Jianian; Chen, Jianping

    2017-12-01

    An efficient and reproducible protocol is described for shoot-bud regeneration and Agrobacterium tumefaciens-mediated genetic transformation of J. curcas. Treating the explants with high concentrations (5-120 mg/L) of TDZ for short durations (5-80 min) before inoculation culture increased significantly the regeneration frequency and improved the quality of the regenerated buds. The highest shoot-buds induction rate (87.35%) was achieved when petiole explants were treated with 20 mg/L TDZ solution for 20 min and inoculated on hormone-free MS medium for 30 days. Regenerated shoots of 0.5 cm or a little longer were isolated and grafted to seedling stocks of the same species, and then the grafted plantlets were planted on half-strength MS medium containing 0.1 mg/L IBA and 2 mg/L sodium nitroprusside (SNP). This grafting strategy was found to be very effective, to obtain that healthy grafted plantlets ready for acclimatization within 20 days. By the above mentioned protocol and with general Agrobacterium - mediated genetic transformation methods only 65 days were needed to obtain intact transgenic plants.

  14. Internet and Intranet Use with a PC: Effects of Adapter Cards, Windows Versions and TCP/IP Software on Networking Performance.

    ERIC Educational Resources Information Center

    Nieuwenhuysen, Paul

    1997-01-01

    Explores data transfer speeds obtained with various combinations of hardware and software components through a study of access to the Internet from a notebook computer connected to a local area network based on Ethernet and TCP/IP (transmission control protocol/Internet protocol) network protocols. Upgrading is recommended for higher transfer…

  15. Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks.

    PubMed

    Chen, Young-Long; Liau, Ren-Hau; Chang, Liang-Yu

    2016-01-01

    People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communication channel. The content of the message number is not considered in a multiple secure authentication protocol. The more excessive transmission of messages would be easier to collect and decode by hackers. In this paper, we propose two schemes which allow the server to validate the user and reduce the number of messages using the XOR operation. Our schemes can improve the security of the authentication protocol. The experimental results show that our proposed authentication protocols are more secure and effective. In regard to applications of second authentication communication channels for a smart access control system, identity identification and E-wallet, our proposed authentication protocols can ensure the safety of person and property, and achieve more effective security management mechanisms.

  16. Performance and analysis of MAC protocols based on application

    NASA Astrophysics Data System (ADS)

    Yadav, Ravi; Daniel, A. K.

    2018-04-01

    Wireless Sensor Network is one of the rapid emerging technology in recent decades. It covers large application area as civilian and military. Wireless Sensor Network primary consists of sensor nodes having low-power, low cost and multifunctional activities to collaborates and communicates via wireless medium. The deployment of sensor nodes are adhoc in nature, so sensor nodes are auto organize themselves in such a way to communicate with each other. The characteristics make more challenging areas on WSNs. This paper gives overview about characteristics of WSNs, Architecture and Contention Based MAC protocol. The paper present analysis of various protocol based on performance.

  17. Doubled haploid production from Spanish onion (Allium cepa L.) germplasm: embryogenesis induction, plant regeneration and chromosome doubling.

    PubMed

    Fayos, Oreto; Vallés, María P; Garcés-Claver, Ana; Mallor, Cristina; Castillo, Ana M

    2015-01-01

    The use of doubled haploids in onion breeding is limited due to the low gynogenesis efficiency of this species. Gynogenesis capacity from Spanish germplasm, including the sweet cultivar Fuentes de Ebro, the highly pungent landrace BGHZ1354 and the two Valenciana type commercial varieties Recas and Rita, was evaluated and optimized in this study. The OH-1 population, characterized by a high gynogenesis induction, was used as control. Growing conditions of the donor plants were tested with a one-step protocol and field plants produced a slightly higher percentage of embryogenesis induction than growth chamber plants. A one-step protocol was compared with a two-step protocol for embryogenesis induction. Spanish germplasm produced a 2-3 times higher percentage of embryogenesis with the two-step protocol, Recas showing the highest percentage (2.09%) and Fuentes de Ebro the lowest (0.53%). These percentages were significantly lower than those from the OH-1 population, with an average of 15% independently of the protocol used. The effect of different containers on plant regeneration was tested using both protocols. The highest percentage of acclimated plants was obtained with the two-step protocol in combination with Eco2box (70%), whereas the lowest percentage was observed with glass tubes in the two protocols (20-23%). Different amiprofos-methyl (APM) treatments were applied to embryos for chromosome doubling. A similar number of doubled haploid plants were recovered with 25 or 50 μM APM in liquid medium. However, the application of 25 μM in solid medium for 24 h produced the highest number of doubled haploid plants. Somatic regeneration from flower buds of haploid and mixoploid plants proved to be a successful approach for chromosome doubling, since diploid plants were obtained from the four regenerated lines. In this study, doubled haploid plants were produced from the four Spanish cultivars, however further improvements are needed to increase their gynogenesis efficiency.

  18. 47 CFR 15.601 - Scope.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false Scope. 15.601 Section 15.601 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL RADIO FREQUENCY DEVICES Access Broadband Over Power Line (Access... (Access BPL) devices operating in the 1.705-80 MHz band over medium or low voltage lines. ...

  19. 21 CFR 1311.130 - Requirements for establishing logical access control-Institutional practitioner.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... practitioner's hard token or any other authentication factor required by the practitioner's two-factor authentication protocol is lost, stolen, or compromised. Such access must be terminated immediately upon...

  20. Improving accessibility and discovery of ESA planetary data through the new planetary science archive

    NASA Astrophysics Data System (ADS)

    Macfarlane, A. J.; Docasal, R.; Rios, C.; Barbarisi, I.; Saiz, J.; Vallejo, F.; Besse, S.; Arviset, C.; Barthelemy, M.; De Marchi, G.; Fraga, D.; Grotheer, E.; Heather, D.; Lim, T.; Martinez, S.; Vallat, C.

    2018-01-01

    The Planetary Science Archive (PSA) is the European Space Agency's (ESA) repository of science data from all planetary science and exploration missions. The PSA provides access to scientific data sets through various interfaces at http://psa.esa.int. Mostly driven by the evolution of the PDS standards which all new ESA planetary missions shall follow and the need to update the interfaces to the archive, the PSA has undergone an important re-engineering. In order to maximise the scientific exploitation of ESA's planetary data holdings, significant improvements have been made by utilising the latest technologies and implementing widely recognised open standards. To facilitate users in handling and visualising the many products stored in the archive which have spatial data associated, the new PSA supports Geographical Information Systems (GIS) by implementing the standards approved by the Open Geospatial Consortium (OGC). The modernised PSA also attempts to increase interoperability with the international community by implementing recognised planetary science specific protocols such as the PDAP (Planetary Data Access Protocol) and EPN-TAP (EuroPlanet-Table Access Protocol). In this paper we describe some of the methods by which the archive may be accessed and present the challenges that are being faced in consolidating data sets of the older PDS3 version of the standards with the new PDS4 deliveries into a single data model mapping to ensure transparent access to the data for users and services whilst maintaining a high performance.

  1. OAS :: Secretariat for Strengthening Democracy (SSD)

    Science.gov Websites

    Structure Our Locations Contact Us Access to Information Offices in the Member States Our History Logo Authorities Services Legal Protocol Topics A Access to Information Access to Rights Actions against Corruption Management Public Security R Racism and Intolerance Refugees S Scholarships School of Governance Science and

  2. The Many Faces of the Economic Bulletin Board.

    ERIC Educational Resources Information Center

    Boettcher, Jennifer

    1996-01-01

    The Economic Bulletin Board (EBB), a one-stop site for economic statistics and government-sponsored business information, can be accessed on the World Wide Web, gopher, telnet, file transfer protocol, dial-up, and fax. Each access method has advantages and disadvantages related to connections, pricing, depth of access, retrieval, and system…

  3. Algal autolysate medium to label proteins for NMR in mammalian cells.

    PubMed

    Fuccio, Carmelo; Luchinat, Enrico; Barbieri, Letizia; Neri, Sara; Fragai, Marco

    2016-04-01

    In-cell NMR provides structural and functional information on proteins directly inside living cells. At present, the high costs of the labeled media for mammalian cells represent a limiting factor for the development of this methodology. Here we report a protocol to prepare a homemade growth medium from Spirulina platensis autolysate, suitable to express uniformly labeled proteins inside mammalian cells at a reduced cost-per-sample. The human proteins SOD1 and Mia40 were overexpressed in human cells grown in (15)N-enriched S. platensis algal-derived medium, and high quality in-cell NMR spectra were obtained.

  4. Cardiac Mitochondria l Membrane Stability after Deep Hypothermia using a Xenon Clathrate Cryostasis Protocol – an Electron Microscopy Study

    PubMed Central

    Sheleg, Sergey; Hixon, Hugh; Cohen, Bruce; Lowry, David; Nedzved, Mikhail

    2008-01-01

    We investigated a new cryopreservation method using xenon, a clathrate-forming gas, under medium pressure (100psi). The objective of the study was to determine whether this cryostasis protocol could protect cardiac mitochondria at cryogenic temperatures (below 100 degrees Celsius).We analyzed transmission electron microscopy images to obtain information about changes in mitochondrial morphology induced by cryopreservation of the hearts. Our data showed absence of mitochondrial swelling, rupture of inner and outer membranes, and leakage of mitochondrial matrix into the cytoplasm after applying this cryostasis protocol. The electron microscopy results provided the first evidence that a cryostasis protocol using xenon as a clathrate-forming gas under pressure may have protective effects on intracellular membranes. This cryostasis technology may find applications in developing new approaches for long-term cryopreservation protocols. PMID:18787624

  5. [A security protocol for the exchange of personal medical data via Internet: monitoring treatment and drug effects].

    PubMed

    Viviani, R; Fischer, J; Spitzer, M; Freudenmann, R W

    2004-04-01

    We present a security protocol for the exchange of medical data via the Internet, based on the type/domain model. We discuss two applications of the protocol: in a system for the exchange of data for quality assurance, and in an on-line database of adverse reactions to drug use. We state that a type/domain security protocol can successfully comply with the complex requirements for data privacy and accessibility typical of such applications.

  6. Micropropagation and organogenesis of Anthurium andreanum Lind cv Rubrun.

    PubMed

    Maira, Oropeza; Alexander, Mejías; Vargas, Teresa Edith

    2010-01-01

    Tissue culture techniques are routinely used for mass propagation and the establishment of disease free stock material. Virtually all pot type Anthuriums available in the market today are produced by tissue culture. In this chapter, we describe an efficient protocol to obtain Anthurium andreanum cv Rubrun vitro plants through micropropagation and organogenesis. Seeds from plant spadixes were germinated on MS medium supplemented with 0.5 mg/L BA. Micro-cuttings from in vitro germinated seedlings were subcultured on MS medium containing 2 mg/L BA and 0.5 mg/L NAA. Four-week-old in vitro plants obtained from microcuttings, showed callus proliferation at the stem base. The development of shoots and plantlets was observed from callus tissue. We also describe a detailed method for the histological analysis of callus tissue and a vitro plants acclimatization protocol.

  7. [Extravasation of contrast media at the puncture site: Strategies for managment].

    PubMed

    Pacheco Compaña, F J; Gago Vidal, B; Méndez Díaz, C

    2014-01-01

    The incidence of contrast medium extravasation at the venipuncture site has increased with the generalized use of automatic injectors. Most extravasations only cause slight edema and erythema. Nevertheless, in some cases extravasation can result in severe skin lesions or even in compartment syndrome. Lesions caused by extravasation usually resolve spontaneously with conservative treatment. Although the complications of extravasation are well known, institutional protocols are normally lacking and the criteria for taking action and the type of treatment, whether based on the literature or personal preferences, tend to vary. In this article, we review the incidence, risk factors, clinical manifestations, and options for preventing and treating contrast medium extravasation in soft tissues. Finally, we present the protocol we use to manage extravasation at our hospital. Copyright © 2013 SERAM. Published by Elsevier Espana. All rights reserved.

  8. Rapid Diagnosis of Tuberculosis by Real-Time High-Resolution Imaging of Mycobacterium tuberculosis Colonies.

    PubMed

    Ghodbane, Ramzi; Asmar, Shady; Betzner, Marlena; Linet, Marie; Pierquin, Joseph; Raoult, Didier; Drancourt, Michel

    2015-08-01

    Culture remains the cornerstone of diagnosis for pulmonary tuberculosis, but the fastidiousness of Mycobacterium tuberculosis may delay culture-based diagnosis for weeks. We evaluated the performance of real-time high-resolution imaging for the rapid detection of M. tuberculosis colonies growing on a solid medium. A total of 50 clinical specimens, including 42 sputum specimens, 4 stool specimens, 2 bronchoalveolar lavage fluid specimens, and 2 bronchial aspirate fluid specimens were prospectively inoculated into (i) a commercially available Middlebrook broth and evaluated for mycobacterial growth indirectly detected by measuring oxygen consumption (standard protocol) and (ii) a home-made solid medium incubated in an incubator featuring real-time high-resolution imaging of colonies (real-time protocol). Isolates were identified by Ziehl-Neelsen staining and matrix-assisted laser desorption ionization-time of flight mass spectrometry. Use of the standard protocol yielded 14/50 (28%) M. tuberculosis isolates, which is not significantly different from the 13/50 (26%) M. tuberculosis isolates found using the real-time protocol (P = 1.00 by Fisher's exact test), and the contamination rate of 1/50 (2%) was not significantly different from the contamination rate of 2/50 (4%) using the real-time protocol (P = 1.00). The real-time imaging protocol showed a 4.4-fold reduction in time to detection, 82 ± 54 h versus 360 ± 142 h (P < 0.05). These preliminary data give the proof of concept that real-time high-resolution imaging of M. tuberculosis colonies is a new technology that shortens the time to growth detection and the laboratory diagnosis of pulmonary tuberculosis. Copyright © 2015, American Society for Microbiology. All Rights Reserved.

  9. Accounting for patient size in the optimization of dose and image quality of pelvis cone beam CT protocols on the Varian OBI system

    PubMed Central

    Moore, Craig S; Horsfield, Carl J; Saunderson, John R; Beavis, Andrew W

    2015-01-01

    Objective: The purpose of this study was to develop size-based radiotherapy kilovoltage cone beam CT (CBCT) protocols for the pelvis. Methods: Image noise was measured in an elliptical phantom of varying size for a range of exposure factors. Based on a previously defined “small pelvis” reference patient and CBCT protocol, appropriate exposure factors for small, medium, large and extra-large patients were derived which approximate the image noise behaviour observed on a Philips CT scanner (Philips Medical Systems, Best, Netherlands) with automatic exposure control (AEC). Selection criteria, based on maximum tube current–time product per rotation selected during the radiotherapy treatment planning scan, were derived based on an audit of patient size. Results: It has been demonstrated that 110 kVp yields acceptable image noise for reduced patient dose in pelvic CBCT scans of small, medium and large patients, when compared with manufacturer's default settings (125 kVp). Conversely, extra-large patients require increased exposure factors to give acceptable images. 57% of patients in the local population now receive much lower radiation doses, whereas 13% require higher doses (but now yield acceptable images). Conclusion: The implementation of size-based exposure protocols has significantly reduced radiation dose to the majority of patients with no negative impact on image quality. Increased doses are required on the largest patients to give adequate image quality. Advances in knowledge: The development of size-based CBCT protocols that use the planning CT scan (with AEC) to determine which protocol is appropriate ensures adequate image quality whilst minimizing patient radiation dose. PMID:26419892

  10. Role of the XIAP-Copper Axis in Prostate Cancer

    DTIC Science & Technology

    2010-04-01

    the copper chaperone for superoxide dismutase (CCS). We performed a targeted genetic screen in yeast to identify proteins involved in delivery of...copper (Cu) to XIAP. This screen identified CCS as a primary mediator of Cu delivery to XIAP in yeast , and we subsequently determined that CCS...protocol for growing yeast transformed with a plasmid encoding human XIAP in Cu-free selective medium. Supplemental Cu was added to the medium 1-2 hours

  11. Dramatic reduction of culture time of Mycobacterium tuberculosis

    NASA Astrophysics Data System (ADS)

    Ghodbane, Ramzi; Raoult, Didier; Drancourt, Michel

    2014-02-01

    Mycobacterium tuberculosis culture, a critical technique for routine diagnosis of tuberculosis, takes more than two weeks. Here, step-by-step improvements in the protocol including a new medium, microaerophlic atmosphere or ascorbic-acid supplement and autofluorescence detection dramatically shortened this delay. In the best case, primary culture and rifampicin susceptibility testing were achieved in 72 hours when specimens were inoculated directly on the medium supplemented by antibiotic at the beginning of the culture.

  12. Distribution of Information in Ad Hoc Networks

    DTIC Science & Technology

    2007-09-01

    2.4. MACA Protocol...................................20 Figure 2.5. Route discovery in AODV (From [32]).............28 Figure 2.6. Creation of a...19 Figure 2.3. Exposed terminal Problem (From [20]) (3) MACA and MACAW Protocols. One of the first protocols conceived for wireless local area...networks is MACA [21] (Multiple Accesses with Collision Avoidance). The transmitter sends a small packet, or RTS (Request To Send), which has little

  13. Receiver Statistics for Cognitive Radios in Dynamic Spectrum Access Networks

    DTIC Science & Technology

    2012-02-28

    SNR) are employed by many protocols and processes in direct-sequence ( DS ) spread-spectrum packet radio networks, including soft-decision decoding...adaptive modulation protocols, and power adjustment protocols. For DS spread spectrum, we have introduced and evaluated SNR estimators that employ...obtained during demodulation in a binary CDMA receiver. We investigated several methods to apply the proposed metric to the demodulator’s soft-decision

  14. Q-Learning and p-persistent CSMA based rendezvous protocol for cognitive radio networks operating with shared spectrum activity

    NASA Astrophysics Data System (ADS)

    Watson, Clifton L.; Biswas, Subir

    2014-06-01

    With an increasing demand for spectrum, dynamic spectrum access (DSA) has been proposed as viable means for providing the flexibility and greater access to spectrum necessary to meet this demand. Within the DSA concept, unlicensed secondary users temporarily "borrow" or access licensed spectrum, while respecting the licensed primary user's rights to that spectrum. As key enablers for DSA, cognitive radios (CRs) are based on software-defined radios which allow them to sense, learn, and adapt to the spectrum environment. These radios can operate independently and rapidly switch channels. Thus, the initial setup and maintenance of cognitive radio networks are dependent upon the ability of CR nodes to find each other, in a process known as rendezvous, and create a link on a common channel for the exchange of data and control information. In this paper, we propose a novel rendezvous protocol, known as QLP, which is based on Q-learning and the p-persistent CSMA protocol. With the QLP protocol, CR nodes learn which channels are best for rendezvous and thus adapt their behavior to visit those channels more frequently. We demonstrate through simulation that the QLP protocol provides a rendevous capability for DSA environments with different dynamics of PU activity, while attempting to achieve the following performance goals: (1) minimize the average time-to-rendezvous, (2) maximize system throughput, (3) minimize primary user interference, and (4) minimize collisions among CR nodes.

  15. Tolcapone suppresses ethanol intake in alcohol-preferring rats performing a novel cued access protocol.

    PubMed

    McCane, Aqilah M; Czachowski, Cristine L; Lapish, Christopher C

    2014-09-01

    Dopamine (DA) has been shown to play a central role in regulating motivated behavior and encoding reward. Chronic drug abuse elicits a state of hypodopaminergia in the mesocorticolimbic (MCL) system in both humans and preclinical rodent models of addiction, including those modeling alcohol use disorders (AUD). Working under the hypothesis that reductions in the bioavailability of DA play an integral role in the expression of the excessive drinking phenotype, the catechol-O-methyltransferase (COMT) inhibitor tolcapone was used as a means to amplify cortical DA concentration and drinking behaviors were then assessed. Sucrose and ethanol (EtOH) consumption were measured in P and Wistar rats in both a free choice drinking protocol and a novel cued access protocol. Tolcapone attenuated the consumption of EtOH, and to a lesser extent sucrose, in P rats in the cued access protocol, while no effect was observed in the free choice drinking protocol. Tolcapone also decreased EtOH consumption in high drinking Wistar rats. A follow-up experiment using the indirect DA agonist d-amphetamine showed no change in EtOH consumption. Collectively, these data suggest that COMT inhibitors may be capable of alleviating the extremely motivating or salient nature of stimuli associated with alcohol. The hypothesis is put forth that the relative specificity of tolcapone for cortical DA systems may mediate the suppression of the high seeking/drinking phenotype. Copyright © 2014 by the Research Society on Alcoholism.

  16. The impact of a hybrid social marketing intervention on inequities in access, ownership and use of insecticide-treated nets.

    PubMed

    Agha, Sohail; Van Rossem, Ronan; Stallworthy, Guy; Kusanthan, Thankian

    2007-01-29

    An ITN intervention was initiated in three predominantly rural districts of Eastern Province, Zambia, that lacked commercial distribution and communication infrastructures. Social marketing techniques were used for product and message development. Public sector clinics and village-based volunteers promoted and distributed subsidized ITNs priced at 2.5 dollars per net. A study was conducted to assess the effects of the intervention on inequities in knowledge, access, ownership and use of ITNs. A post-test only quasi-experimental study design was used to compare intervention and comparison districts. A total of 2,986 respondents were interviewed. Survey respondents were grouped into four socio-economic (SES) categories: low, medium-low, medium and high. Knowledge, access, ownership and use indicators are compared. Concentration index scores are calculated. Interactions between intervention status and SES help determine how different SES groups benefited from the intervention. Although overall use of nets remained relatively low, post-test data show that knowledge, access, ownership and use of mosquito nets was higher in intervention districts. A decline in SES inequity in access to nets occurred in intervention districts, resulting from a disproportionately greater increase in access among the low SES group. Declines in SES inequities in net ownership and use of nets were associated with the intervention. The largest increases in net ownership and use occurred among medium and high SES categories. Increasing access to nets among the poorest respondents in rural areas may not lead to increases in net use unless the price of nets is no longer a barrier to their purchase.

  17. A Secure and Efficient Handover Authentication Protocol for Wireless Networks

    PubMed Central

    Wang, Weijia; Hu, Lei

    2014-01-01

    Handover authentication protocol is a promising access control technology in the fields of WLANs and mobile wireless sensor networks. In this paper, we firstly review an efficient handover authentication protocol, named PairHand, and its existing security attacks and improvements. Then, we present an improved key recovery attack by using the linearly combining method and reanalyze its feasibility on the improved PairHand protocol. Finally, we present a new handover authentication protocol, which not only achieves the same desirable efficiency features of PairHand, but enjoys the provable security in the random oracle model. PMID:24971471

  18. User Procedures Standardization for Network Access. NBS Technical Note 799.

    ERIC Educational Resources Information Center

    Neumann, A. J.

    User access procedures to information systems have become of crucial importance with the advent of computer networks, which have opened new types of resources to a broad spectrum of users. This report surveys user access protocols of six representative systems: BASIC, GE MK II, INFONET, MEDLINE, NIC/ARPANET and SPIRES. Functional access…

  19. Tools to Ease Your Internet Adventures: Part I.

    ERIC Educational Resources Information Center

    Descy, Don E.

    1993-01-01

    This first of a two-part series highlights three tools that improve accessibility to Internet resources: (1) Alex, a database that accesses files in FTP (file transfer protocol) sites; (2) Archie, software that searches for file names with a user's search term; and (3) Gopher, a menu-driven program to access Internet sites. (LRW)

  20. 15 CFR 784.1 - Complementary access: General information on the purpose of complementary access, affected...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... may be conducted, on a selective basis, to verify the absence of undeclared nuclear material and nuclear related activities at reportable uranium hard-rock mines and ore beneficiation plants (see § 783.1... OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE ADDITIONAL PROTOCOL REGULATIONS COMPLEMENTARY ACCESS...

  1. Semiquantum key distribution with secure delegated quantum computation

    PubMed Central

    Li, Qin; Chan, Wai Hong; Zhang, Shengyu

    2016-01-01

    Semiquantum key distribution allows a quantum party to share a random key with a “classical” party who only can prepare and measure qubits in the computational basis or reorder some qubits when he has access to a quantum channel. In this work, we present a protocol where a secret key can be established between a quantum user and an almost classical user who only needs the quantum ability to access quantum channels, by securely delegating quantum computation to a quantum server. We show the proposed protocol is robust even when the delegated quantum server is a powerful adversary, and is experimentally feasible with current technology. As one party of our protocol is the most quantum-resource efficient, it can be more practical and significantly widen the applicability scope of quantum key distribution. PMID:26813384

  2. Two Mechanisms to Avoid Control Conflicts Resulting from Uncoordinated Intent

    NASA Technical Reports Server (NTRS)

    Mishkin, Andrew H.; Dvorak, Daniel L.; Wagner, David A.; Bennett, Matthew B.

    2013-01-01

    This software implements a real-time access control protocol that is intended to make all connected users aware of the presence of other connected users, and which of them is currently in control of the system. Here, "in control" means that a single user is authorized and enabled to issue instructions to the system. The software The software also implements a goal scheduling mechanism that can detect situations where plans for the operation of a target system proposed by different users overlap and interact in conflicting ways. In such situations, the system can either simply report the conflict (rejecting one goal or the entire plan), or reschedule the goals in a way that does not conflict. The access control mechanism (and associated control protocol) is unique. Other access control mechanisms are generally intended to authenticate users, or exclude unauthorized access. This software does neither, and would likely depend on having some other mechanism to support those requirements.

  3. An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application

    PubMed Central

    Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo

    2014-01-01

    This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical. PMID:25136651

  4. An action-based fine-grained access control mechanism for structured documents and its application.

    PubMed

    Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo

    2014-01-01

    This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical.

  5. Reliability Analysis and Modeling of ZigBee Networks

    NASA Astrophysics Data System (ADS)

    Lin, Cheng-Min

    The architecture of ZigBee networks focuses on developing low-cost, low-speed ubiquitous communication between devices. The ZigBee technique is based on IEEE 802.15.4, which specifies the physical layer and medium access control (MAC) for a low rate wireless personal area network (LR-WPAN). Currently, numerous wireless sensor networks have adapted the ZigBee open standard to develop various services to promote improved communication quality in our daily lives. The problem of system and network reliability in providing stable services has become more important because these services will be stopped if the system and network reliability is unstable. The ZigBee standard has three kinds of networks; star, tree and mesh. The paper models the ZigBee protocol stack from the physical layer to the application layer and analyzes these layer reliability and mean time to failure (MTTF). Channel resource usage, device role, network topology and application objects are used to evaluate reliability in the physical, medium access control, network, and application layers, respectively. In the star or tree networks, a series system and the reliability block diagram (RBD) technique can be used to solve their reliability problem. However, a division technology is applied here to overcome the problem because the network complexity is higher than that of the others. A mesh network using division technology is classified into several non-reducible series systems and edge parallel systems. Hence, the reliability of mesh networks is easily solved using series-parallel systems through our proposed scheme. The numerical results demonstrate that the reliability will increase for mesh networks when the number of edges in parallel systems increases while the reliability quickly drops when the number of edges and the number of nodes increase for all three networks. More use of resources is another factor impact on reliability decreasing. However, lower network reliability will occur due to network complexity, more resource usage and complex object relationship.

  6. A prototype of Virtual Observatory access for planetary data in the framework of Europlanet-RI/IDIS

    NASA Astrophysics Data System (ADS)

    Gangloff, M.; Cecconi, B.; Bourrel, N.; Jacquey, C.; Le Sidaner, P.; Berthier, J.; André, N.; Pallier, E.; Erard, S.; Aboudarham, J.; Chanteur, G. M.; Capria, M. T.; Khodachenko, M.; Manaud, N.; Schmidt, W.; Schmitt, B.; Topf, F.; Trautan, F.; Sarkissian, A.

    2011-12-01

    Europlanet RI is a four-year project supported by the European Union under the Seventh Framework Programme. Launched in January 2009, it is an Integrated Infrastructure Initiative, ie. A combination of Networking Activities, Transnational Access Activities and Joint Research Activities. The Networking Activities aim at further fostering a culture of cooperation in the field of Planetary Sciences. The objective of the Transnational Access Activities is to provide transnational access to a range of laboratory and field site facilities tailored to the needs of planetary research and on-line access to the available planetary science data, information and software tools, through the IDIS e-service. The overall aim of the Joint Research Activities (JRA) is to improve the services provided by the ensemble of Transnational Access Activities. In EuroPlaNet-RI, JRA4 must prepare essential tools for IDIS (Integrated and Distributed Information Service) allowing the planetary science community to interrogate some selected data centres, access and process data and visualize the results. This is the first step towards a Planetary Virtual Observatory. The first requirement for different data centres to be able to operate together collectively is adequate standardization. In particular a common description of data and services is essential. This is why the major part of JRA4/Task2 activity is focussing on data models, associated dictionnaries, and protocols to exchange queries. A specific data model is being developed for IDIS, associated with the PDAP protocol, a standard defined by the IPDA (International Planetary Data Alliance) The scope of this prototype is to demonstrate the capabilities of the IDIS Data Model, and the PDAP protocol to search and retrieve data in the wide topical planetology context.

  7. Recommendations for a service framework to access astronomical archives

    NASA Technical Reports Server (NTRS)

    Travisano, J. J.; Pollizzi, J.

    1992-01-01

    There are a large number of astronomical archives and catalogs on-line for network access, with many different user interfaces and features. Some systems are moving towards distributed access, supplying users with client software for their home sites which connects to servers at the archive site. Many of the issues involved in defining a standard framework of services that archive/catalog suppliers can use to achieve a basic level of interoperability are described. Such a framework would simplify the development of client and server programs to access the wide variety of astronomical archive systems. The primary services that are supplied by current systems include: catalog browsing, dataset retrieval, name resolution, and data analysis. The following issues (and probably more) need to be considered in establishing a standard set of client/server interfaces and protocols: Archive Access - dataset retrieval, delivery, file formats, data browsing, analysis, etc.; Catalog Access - database management systems, query languages, data formats, synchronous/asynchronous mode of operation, etc.; Interoperability - transaction/message protocols, distributed processing mechanisms (DCE, ONC/SunRPC, etc), networking protocols, etc.; Security - user registration, authorization/authentication mechanisms, etc.; Service Directory - service registration, lookup, port/task mapping, parameters, etc.; Software - public vs proprietary, client/server software, standard interfaces to client/server functions, software distribution, operating system portability, data portability, etc. Several archive/catalog groups, notably the Astrophysics Data System (ADS), are already working in many of these areas. In the process of developing StarView, which is the user interface to the Space Telescope Data Archive and Distribution Service (ST-DADS), these issues and the work of others were analyzed. A framework of standard interfaces for accessing services on any archive system which would benefit archive user and supplier alike is proposed.

  8. Examining the relationship between the food environment and adult diabetes prevalence by county economic and racial composition: an ecological study.

    PubMed

    Haynes-Maslow, Lindsey; Leone, Lucia A

    2017-08-09

    Inequitable access to healthy food may contribute to health disparities. This study examines the relationship between the prevalence of adult diabetes and food access in the U.S. by county economic/racial composition. An ecological study from 2012 was used to estimate the relationship between diabetes and retail food outlet access. County diabetes prevalence was measured based on individual responses to the Behavioral Risk Factor Surveillance Survey question, "Have you ever been told by a doctor that you have diabetes?" If the answer was "yes" individuals were classified as having diabetes. Retail food outlets included grocery stores, supercenters, farmer's markets, full-service restaurants, fast food restaurants and convenience stores. Counties were categorized as "high-poverty" or "low-poverty". Counties were categorized as low (< 4.6%), medium (4.6%-31.0%), and high (> 31.0%) percent minority residents. Multiple linear regression models estimated the association between retail food outlets and diabetes, controlling for confounders, and testing for interactions between retail food outlets and county racial composition. Regression models were conditioned on county economic composition. Data were analyzed in 2016. Density of retail foods outlets varied greatly by county economic and racial composition; counties with medium-minority populations had the least access to grocery stores and the highest access to fast food restaurants and convenience stores. Low poverty/low-minority population counties had the greatest access to farmer's markets and grocery stores. For low poverty/low-minority counties, grocery stores were associated with decreased of diabetes prevalence. Supercenters were associated with an increase in diabetes prevalence for high-poverty/low-minority counties. Only low poverty/medium-minority counties had a statistically significant relationship between farmer's markets and diabetes prevalence. Fast food restaurants were found to be positively associated with diabetes prevalence in all counties except high poverty/medium-minority. However, only low poverty/low-minority counties had a statistically significant relationship. Across all models, access to full service restaurants were significantly associated with lower prevalence of diabetes. Generally, access to convenience stores were associated with increased diabetes prevalence, except for high poverty/low-minority counties. The food environment is more strongly associated with diabetes prevalence for wealthier counties with a lower proportion of minority residents. This is important given efforts to increase food access in vulnerable communities. Availability of healthier food may not be enough to change health outcomes.

  9. A Telecommunications Industry Primer: A Systems Model.

    ERIC Educational Resources Information Center

    Obermier, Timothy R.; Tuttle, Ronald H.

    2003-01-01

    Describes the Telecommunications Systems Model to help technical educators and students understand the increasingly complex telecommunications infrastructure. Specifically looks at ownership and regulatory status, service providers, transport medium, network protocols, and end-user services. (JOW)

  10. Report: Results of Technical Network Vulnerability Assessment: EPA’s Erlanger Building

    EPA Pesticide Factsheets

    Report #10-P-0211, September 7, 2010. Vulnerability testing of EPA’s Erlanger Building network conducted in June 2010 identified Internet Protocol addresses with numerous high-risk and medium-risk vulnerabilities.

  11. Report: Results of Technical Network Vulnerability Assessment: EPA’s Region 4

    EPA Pesticide Factsheets

    Report #10-P-0213, September 7, 2010. Vulnerability testing of EPA’s Region 4 network conducted in June 2010 identified Internet Protocol addresses with numerous high-risk and medium-risk vulnerabilities.

  12. Internet Connections: Understanding Your Access Options.

    ERIC Educational Resources Information Center

    Notess, Greg R.

    1994-01-01

    Describes levels of Internet connectivity, physical connections, and connection speeds. Compares options for connecting to the Internet, including terminal accounts, dial-up terminal accounts, direct connections through a local area network, and direct connections using SLIP (Serial Line Internet Protocol) or PPP (Point-to-Point Protocol). (eight…

  13. A simple and effective protocol for fast isolation of human Tenon's fibroblasts from a single trabeculectomy biopsy - a comparison of cell behaviour in different culture media.

    PubMed

    Przekora, Agata; Zarnowski, Tomasz; Ginalska, Grazyna

    2017-01-01

    Human Tenon's fibroblasts (HTFs) play a crucial role in wound healing. They cause postoperative scarring of the filtering bleb and are thus responsible for trabeculectomy failure. This study aimed to find an effective and fast protocol for HTF isolation from trabeculectomy biopsies. The protocol was compared with the commonly recommended HTF isolation procedure, which uses Dulbecco's modified Eagle's medium (DMEM). We used Eagle's minimum essential medium (EMEM) enriched with fibroblast growth factor (FGF), which selectively promoted the proliferation of HTF cells. A secondary goal was to compare HTF morphology, metabolism and growth during parallel cultivation of the isolated cells in FGF-enriched EMEM and DMEM. Standard procedures for HTF isolation from tissue biopsies require a 20- to 30-day culture of the explants to obtain the first monolayer. Our protocol yielded the first monolayer after approx. 15 days. More importantly, the majority of the cells were fibroblasts with only individual epithelium-derived cells present. Using FGF-enriched EMEM allowed 1.3 × 10 6 vimentin-positive fibroblasts to be obtained from a single biopsy within approx. 25 days. Using DMEM resulted in isolation failure and required exchange to FGF-enriched medium to recover the fibroblast culture. HTFs maintained in FGF-enriched EMEM also showed faster proliferation and a different type I collagen production ability compared to HTFs cultured in DMEM. Thus, FGF-enriched EMEM is recommended for fast propagation of HTFs unless the aim of the study is to assess the effect of a tested agent on proliferation ability or type I collagen production. Our fast protocol for HTF isolation allows easy setup of cell banks by researchers under laboratory conditions and could be very useful during testing of novel ophthalmologic anti-fibrotic agents in vitro. Molecular analysis of HTFs isolated from patients with known treatment histories may provide valuable information on the effects of some medications taken before glaucoma surgery on the subsequent wound-healing process and potential for trabeculectomy failure.

  14. Satellite Communications Using Commercial Protocols

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  15. Chemically Defined Medium and Caenorhabditis elegans: A Powerful Approach

    NASA Technical Reports Server (NTRS)

    Szewczyk, N. J.; Kozak, E.; Conley, C. A.

    2003-01-01

    C. elegans has been established as a powerful genetic system. Growth in a chemically defined medium (C. elegans Maintenance Medium (CeMM)) now allows standardization and systematic manipulation of the nutrients that animals receive. Liquid cultivation allows automated culturing and experimentation and should be of me in large-scale growth and screening of animals. Here we present our initial results from developing culture systems with CeMM. We find that CeMM is versatile and culturing is simple. CeMM can be used in a solid or liquid state, it can be stored unused for at least a year, unattended actively growing cultures may be maintained longer than with standard techniques, and standard C. elegans protocols work well with animals grown in defined medium. We also find that there are caveats of using defined medium. Animals in defined medium grow more slowly than on standard medium, appear to display adaptation to the defined medium, and display altered growth rates as they change defined medium composition. As was suggested with the introduction of C. elegans as a potential genetic system, use of defined medium with C. elegans should prove a powerful tool.

  16. Agreements between Industry and Academia on Publication Rights: A Retrospective Study of Protocols and Publications of Randomized Clinical Trials

    PubMed Central

    Kasenda, Benjamin; von Elm, Erik; You, John J.; Tomonaga, Yuki; Saccilotto, Ramon; Amstutz, Alain; Bengough, Theresa; Meerpohl, Joerg J.; Stegert, Mihaela; Olu, Kelechi K.; Tikkinen, Kari A. O.; Neumann, Ignacio; Carrasco-Labra, Alonso; Faulhaber, Markus; Mulla, Sohail M.; Mertz, Dominik; Akl, Elie A.; Bassler, Dirk; Busse, Jason W.; Nordmann, Alain; Gloy, Viktoria; Ebrahim, Shanil; Schandelmaier, Stefan; Sun, Xin; Vandvik, Per O.; Johnston, Bradley C.; Walter, Martin A.; Burnand, Bernard; Hemkens, Lars G.; Bucher, Heiner C.; Guyatt, Gordon H.; Briel, Matthias

    2016-01-01

    Background Little is known about publication agreements between industry and academic investigators in trial protocols and the consistency of these agreements with corresponding statements in publications. We aimed to investigate (i) the existence and types of publication agreements in trial protocols, (ii) the completeness and consistency of the reporting of these agreements in subsequent publications, and (iii) the frequency of co-authorship by industry employees. Methods and Findings We used a retrospective cohort of randomized clinical trials (RCTs) based on archived protocols approved by six research ethics committees between 13 January 2000 and 25 November 2003. Only RCTs with industry involvement were eligible. We investigated the documentation of publication agreements in RCT protocols and statements in corresponding journal publications. Of 647 eligible RCT protocols, 456 (70.5%) mentioned an agreement regarding publication of results. Of these 456, 393 (86.2%) documented an industry partner’s right to disapprove or at least review proposed manuscripts; 39 (8.6%) agreements were without constraints of publication. The remaining 24 (5.3%) protocols referred to separate agreement documents not accessible to us. Of those 432 protocols with an accessible publication agreement, 268 (62.0%) trials were published. Most agreements documented in the protocol were not reported in the subsequent publication (197/268 [73.5%]). Of 71 agreements reported in publications, 52 (73.2%) were concordant with those documented in the protocol. In 14 of 37 (37.8%) publications in which statements suggested unrestricted publication rights, at least one co-author was an industry employee. In 25 protocol-publication pairs, author statements in publications suggested no constraints, but 18 corresponding protocols documented restricting agreements. Conclusions Publication agreements constraining academic authors’ independence are common. Journal articles seldom report on publication agreements, and, if they do, statements can be discrepant with the trial protocol. PMID:27352244

  17. Performance of TCP variants over LTE network

    NASA Astrophysics Data System (ADS)

    Nor, Shahrudin Awang; Maulana, Ade Novia

    2016-08-01

    One of the implementation of a wireless network is based on mobile broadband technology Long Term Evolution (LTE). LTE offers a variety of advantages, especially in terms of access speed, capacity, architectural simplicity and ease of implementation, as well as the breadth of choice of the type of user equipment (UE) that can establish the access. The majority of the Internet connections in the world happen using the TCP (Transmission Control Protocol) due to the TCP's reliability in transmitting packets in the network. TCP reliability lies in the ability to control the congestion. TCP was originally designed for wired media, but LTE connected through a wireless medium that is not stable in comparison to wired media. A wide variety of TCP has been made to produce a better performance than its predecessor. In this study, we simulate the performance provided by the TCP NewReno and TCP Vegas based on simulation using network simulator version 2 (ns2). The TCP performance is analyzed in terms of throughput, packet loss and end-to-end delay. In comparing the performance of TCP NewReno and TCP Vegas, the simulation result shows that the throughput of TCP NewReno is slightly higher than TCP Vegas, while TCP Vegas gives significantly better end-to-end delay and packet loss. The analysis of throughput, packet loss and end-to-end delay are made to evaluate the simulation.

  18. A Proactive Approach to High Risk Delirium Patients Undergoing Total Joint Arthroplasty.

    PubMed

    Duque, Andres F; Post, Zachary D; Orozco, Fabio R; Lutz, Rex W; Ong, Alvin C

    2018-04-01

    Delirium is a common complication among elderly patients undergoing total joint arthroplasty (TJA). Its incidence has been reported from 4% to 53%. The Centers for Medicare and Medicaid Services consider delirium following TJA a "never-event." The purpose of this study is to evaluate a simple perioperative protocol used to identify delirium risk patients and prevent its incidence following TJA. Our group developed a protocol to identify and prevent delirium in patients undergoing TJA. All patients were screened and scored in the preoperative assessment, on criteria such as age, history of forgetfulness, history of agitation or visual hallucinations, history of falls, history of postoperative confusion, and inability to perform higher brain functions. Patients were scored on performance in a simple mental examination. The patients were classified as low, medium, or high risk. Patients who were identified as high risk were enrolled in a delirium avoidance protocol that minimized narcotics and emphasized nursing involvement and fluids administration. Five of 7659 (0.065%) consecutive TJA patients from 2010 to 2015 developed delirium. A total of 422 patients were identified as high risk. All 5 patients who suffered delirium were within the high risk group. No low or medium risk patients suffered a delirium complication. Three (0.039%) patients suffered drug-induced delirium, 1 (0.013%) had delirium related to alcohol withdrawal, and 1 (0.013%) had delirium after a systemic infection. This protocol is effective in identifying patients at high delirium risk and diminishing the incidence of this complication by utilizing a simple screening tool and perioperative protocol. Copyright © 2017 Elsevier Inc. All rights reserved.

  19. Optimization of the scan protocols for CT-based material extraction in small animal PET/CT studies

    NASA Astrophysics Data System (ADS)

    Yang, Ching-Ching; Yu, Jhih-An; Yang, Bang-Hung; Wu, Tung-Hsin

    2013-12-01

    We investigated the effects of scan protocols on CT-based material extraction to minimize radiation dose while maintaining sufficient image information in small animal studies. The phantom simulation experiments were performed with the high dose (HD), medium dose (MD) and low dose (LD) protocols at 50, 70 and 80 kVp with varying mA s. The reconstructed CT images were segmented based on Hounsfield unit (HU)-physical density (ρ) calibration curves and the dual-energy CT-based (DECT) method. Compared to the (HU;ρ) method performed on CT images acquired with the 80 kVp HD protocol, a 2-fold improvement in segmentation accuracy and a 7.5-fold reduction in radiation dose were observed when the DECT method was performed on CT images acquired with the 50/80 kVp LD protocol, showing the possibility to reduce radiation dose while achieving high segmentation accuracy.

  20. Network support for turn-taking in multimedia collaboration

    NASA Astrophysics Data System (ADS)

    Dommel, Hans-Peter; Garcia-Luna-Aceves, Jose J.

    1997-01-01

    The effectiveness of collaborative multimedia systems depends on the regulation of access to their shared resources, such as continuous media or instruments used concurrently by multiple parties. Existing applications use only simple protocols to mediate such resource contention. Their cooperative rules follow a strict agenda and are largely application-specific. The inherent problem of floor control lacks a systematic methodology. This paper presents a general model on floor control for correct, scalable, fine-grained and fair resource sharing that integrates user interaction with network conditions, and adaptation to various media types. The motion of turn-taking known from psycholinguistics in studies on discourse structure is adapted for this framework. Viewed as a computational analogy to speech communication, online collaboration revolves around dynamically allocated access permissions called floors. The control semantics of floors derives from concurrently control methodology. An explicit specification and verification of a novel distributed Floor Control Protocol are presented. Hosts assume sharing roles that allow for efficient dissemination of control information, agreeing on a floor holder which is granted mutually exclusive access to a resource. Performance analytic aspects of floor control protocols are also briefly discussed.

  1. Chart Card: feasibility of a tool for improving emergency department care in sickle cell disease.

    PubMed

    Neumayr, Lynne; Pringle, Steven; Giles, Stephen; Quirolo, Keith C; Paulukonis, Susan; Vichinsky, Elliott P; Treadwell, Marsha J

    2010-11-01

    Patients with sickle cell disease (SCD) are concerned with emergency department care, including time to treatment and staff attitudes and knowledge. Providers are concerned about rapid access to patient information and SCD treatment protocols. A software application that stores and retrieves encrypted personal medical information on a plastic credit card-sized Chart Card was designed. To determine the applicability and feasibility of the Chart Card on patient satisfaction with emergency department care and provider accessibility to patient information and care protocols. One-half of 44 adults (aged -18 years) and 50 children with SCD were randomized to either the Chart Card or usual care. Patient satisfaction was surveyed pre and post implementation of the Chart Card program, and emergency department staff was surveyed about familiarity with SCD treatment protocols. Patient satisfaction with emergency department care and efficacy in health care increased post Chart Card implementation. Providers valued immediate access to patient information and SCD treatment guidelines. The technology has potential for application in the treatment of other illnesses in other settings.

  2. 49 CFR 1544.229 - Fingerprint-based criminal history records checks (CHRC): Unescorted access authority, authority...

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... identification media that one or more airports accepts as airport-approved media for unescorted access authority... identification media that one or more airports accepts as airport-approved media for unescorted access authority... aircraft operator identification medium to that individual; (3) Authorizing that individual to perform...

  3. 49 CFR 1544.229 - Fingerprint-based criminal history records checks (CHRC): Unescorted access authority, authority...

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... identification media that one or more airports accepts as airport-approved media for unescorted access authority... identification media that one or more airports accepts as airport-approved media for unescorted access authority... aircraft operator identification medium to that individual; (3) Authorizing that individual to perform...

  4. 49 CFR 1544.229 - Fingerprint-based criminal history records checks (CHRC): Unescorted access authority, authority...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... identification media that one or more airports accepts as airport-approved media for unescorted access authority... identification media that one or more airports accepts as airport-approved media for unescorted access authority... aircraft operator identification medium to that individual; (3) Authorizing that individual to perform...

  5. 49 CFR 1544.229 - Fingerprint-based criminal history records checks (CHRC): Unescorted access authority, authority...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... identification media that one or more airports accepts as airport-approved media for unescorted access authority... identification media that one or more airports accepts as airport-approved media for unescorted access authority... aircraft operator identification medium to that individual; (3) Authorizing that individual to perform...

  6. 49 CFR 1544.229 - Fingerprint-based criminal history records checks (CHRC): Unescorted access authority, authority...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... identification media that one or more airports accepts as airport-approved media for unescorted access authority... identification media that one or more airports accepts as airport-approved media for unescorted access authority... aircraft operator identification medium to that individual; (3) Authorizing that individual to perform...

  7. [Indigenous peoples' access to health services in Cuiabá, Mato Grosso State, Brazil].

    PubMed

    Gomes, Silvana Cardoso; Esperidião, Monique Azevedo

    2017-06-12

    This study aimed to evaluate indigenous peoples' access to medium and high-complexity health services in the municipality of Cuiabá, Mato Grosso State, Brazil, through the Casa de Saúde Indígena or Indigenous Peoples' Clinic (CASAI Cuiabá). A single case study with a qualitative approach was conducted at CASAI Cuiabá. Data were obtained from observation of the work routines at CASAI Cuiabá, semi-structured interviews with health professionals and administrators from the Cuiabá Special Indigenous Health District (DSEI) and CASAI Cuiabá, and document analysis. Data analysis used a matrix derived from the theoretical and logical model of accessibility, validated by the Delphi method with a group of experts on indigenous peoples' health. Despite advances achieved by CASAI in improving indigenous peoples' access, there are persistent social, organizational, cultural, and geographic barriers in access to medium and high-complexity health services in Cuiabá. The study highlights the need for specific strategies to improve access to health services by indigenous peoples in Mato Grosso State.

  8. An Educators' Guide to Information Access across the Internet.

    ERIC Educational Resources Information Center

    Hazari, Sunil

    1994-01-01

    A discussion of tools available for use of the Internet, particularly by college and university educators and students, offers information on use of various services, including electronic mailing list servers, data communications protocols for networking, inter-host connections, file transfer protocol, gopher software, bibliographic searching,…

  9. 47 CFR 79.4 - Closed captioning of video programming delivered using Internet protocol.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 4 2014-10-01 2014-10-01 false Closed captioning of video programming... (CONTINUED) BROADCAST RADIO SERVICES ACCESSIBILITY OF VIDEO PROGRAMMING Video Programming Owners, Providers, and Distributors § 79.4 Closed captioning of video programming delivered using Internet protocol. (a...

  10. 77 FR 6094 - Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-07

    ....-International Atomic Energy Agency Additional Protocol. Under the U.S.-International Atomic Energy Agency (IAEA...-related activities to the IAEA and potentially provide access to IAEA inspectors for verification purposes. The U.S.-IAEA Additional Protocol permits the United States unilaterally to declare exclusions from...

  11. Combining novel technologies with improved logistics to reduce hemodialysis vascular access dysfunction.

    PubMed

    Roy-Chaudhury, P; Lee, T; Duncan, H; El-Khatib, M

    2009-01-01

    Hemodialysis (HD) vascular access dysfunction is currently a huge clinical problem for which there are no effective therapies. There are, however, a number of promising technologies that are currently at the experimental or clinical trial stage. We believe that the application of these novel technologies in combination with better clinical protocols for vascular access care could significantly reduce the current problems associated with HD vascular access.

  12. Global Access to Library of Congress' Digital Resources: National Digital Library and Internet Resources.

    ERIC Educational Resources Information Center

    Chen, Ching-chih

    1996-01-01

    Summarizes how the Library of Congress' digital library collections can be accessed globally via the Internet and World Wide Web. Outlines the resources found in each of the various access points: gopher, online catalog, library and legislative Web sites, legal and copyright databases, and FTP (file transfer protocol) sites. (LAM)

  13. Efficacy of Chinese auriculotherapy for stress in nursing staff: a randomized clinical trial

    PubMed Central

    Kurebayashi, Leonice Fumiko Sato; da Silva, Maria Júlia Paes

    2014-01-01

    Objective this randomized single blind clinical study aimed to evaluate the efficacy of auriculotherapy with and without a protocol for reducing stress levels among nursing staff. Method a total of 175 nursing professionals with medium and high scores according to Vasconcelos' Stress Symptoms List were divided into 3 groups: Control (58), Group with protocol (58), Group with no protocol (59). They were assessed at the baseline, after 12 sessions, and at the follow-up (30 days). Results in the analysis of variance, statistically significant differences between the Control and Intervention groups were found in the two evaluations (p<0.05) with greater size of effect indices (Cohen) for the No protocol group. The Yang Liver 1 and 2, Kidney, Brain Stem and Shen Men were the points most used. Conclusion individualized auriculotherapy, with no protocol, could expand the scope of the technique for stress reduction compared with auriculotherapy with a protocol. NCT: 01420835 PMID:25029046

  14. Report: Results of Technical Network Vulnerability Assessment: EPA’s Radiation and Indoor Environments National Laboratory

    EPA Pesticide Factsheets

    Report #09-P-0053, December 9, 2008. Vulnerability testing of EPA’s Radiation and Indoor Environments National Laboratory (R&IEN) network identified Internet Protocol addresses with medium-risk vulnerabilities.

  15. Report: Results of Technical Network Vulnerability Assessment: EPA’s Ronald Reagan Building

    EPA Pesticide Factsheets

    Report #10-P-0212, September 7, 2010. Vulnerability testing of EPA’s Ronald Reagan Building network conducted in June 2010 identified Internet Protocol addresses with numerous high-risk and medium-risk vulnerabilities.

  16. 106-17 Telemetry Standards Chapter 7 Packet Telemetry Downlink

    DTIC Science & Technology

    2017-07-31

    Acronyms IP Internet Protocol IPv4 Internet Protocol, Version 4 IPv6 Internet Protocol, Version 6 LLP low-latency PTDP MAC media access control...o 4’b0101: PT Internet Protocol (IP) Packet o 4’b0110: PT Chapter 24 TmNSMessage Packet o 4’b0111 – 4’b1111: Reserved • Fragment (bits 17 – 16...packet is defined as a free -running 12-bit counter. The PT test counter packet shall consist of one 12-bit word and shall be encoded as one 24-bit

  17. Cardiac tissue engineering using perfusion bioreactor systems

    PubMed Central

    Radisic, Milica; Marsano, Anna; Maidhof, Robert; Wang, Yadong; Vunjak-Novakovic, Gordana

    2009-01-01

    This protocol describes tissue engineering of synchronously contractile cardiac constructs by culturing cardiac cell populations on porous scaffolds (in some cases with an array of channels) and bioreactors with perfusion of culture medium (in some cases supplemented with an oxygen carrier). The overall approach is ‘biomimetic’ in nature as it tends to provide in vivo-like oxygen supply to cultured cells and thereby overcome inherent limitations of diffusional transport in conventional culture systems. In order to mimic the capillary network, cells are cultured on channeled elastomer scaffolds that are perfused with culture medium that can contain oxygen carriers. The overall protocol takes 2–4 weeks, including assembly of the perfusion systems, preparation of scaffolds, cell seeding and cultivation, and on-line and end-point assessment methods. This model is well suited for a wide range of cardiac tissue engineering applications, including the use of human stem cells, and high-fidelity models for biological research. PMID:18388955

  18. Improved production of transgenic Dioscorea zingiberensis (Dioscoreaceae) by Agrobacterium tumefaciens-mediated transformation.

    PubMed

    Shi, L; Fan, J Q; Hu, C G; Luo, J; Yao, J L

    2012-02-03

    The establishment of high-efficiency Agrobacterium-mediated transformation techniques could improve the production of Dioscorea zingiberensis, a medicinal species with a high diosgenin content. We co-cultivated embryogenic calli induced from mature seeds with A. tumefaciens strain EHA105. A binary vector, pCAMBIA1381, which contains the gfp and hpt genes under the control of the ubiquitin promoter and the CaMV 35S promoter, respectively, was used for transformation. Pre-culture, basic medium, acetosyringone, and bacterial density were evaluated to establish the most efficient protocol. The optimal conditions consisted of MS medium without CaCl(2) for pre- and co-cultivation, three days for pre-culture, addition of 200 μM AS, and an OD(600) of 0.5. The transgenic plants grown under selection were confirmed by PCR analysis and Southern blot analysis. This protocol produced transgenic D. zingiberensis plants in seven months, with a transformation efficiency of 6%.

  19. Rapid Identification of Microorganisms from Positive Blood Culture by MALDI-TOF MS After Short-Term Incubation on Solid Medium.

    PubMed

    Curtoni, Antonio; Cipriani, Raffaella; Marra, Elisa Simona; Barbui, Anna Maria; Cavallo, Rossana; Costa, Cristina

    2017-01-01

    Matrix-assisted laser-desorption/ionization time-of-flight (MALDI-TOF) mass spectrometry (MS) is a useful tool for rapid identification of microorganisms. Unfortunately, its direct application to positive blood culture is still lacking standardized procedures. In this study, we evaluated an easy- and rapid-to-perform protocol for MALDI-TOF MS direct identification of microorganisms from positive blood culture after a short-term incubation on solid medium. This protocol was used to evaluate direct identification of microorganisms from 162 positive monomicrobial blood cultures; at different incubation times (3, 5, 24 h), MALDI-TOF MS assay was performed from the growing microorganism patina. Overall, MALDI-TOF MS concordance with conventional methods at species level was 60.5, 80.2, and 93.8% at 3, 5, and 24 h, respectively. Considering only bacteria, the identification performances at species level were 64.1, 85.0, and 94.1% at 3, 5, and 24 h, respectively. This protocol applied to a commercially available MS typing system may represent, a fast and powerful diagnostic tool for pathogen direct identification and for a promptly and pathogen-driven antimicrobial therapy in selected cases.

  20. Easy Online Access to Helpful Internet Guides.

    ERIC Educational Resources Information Center

    Tuss, Joan

    1993-01-01

    Lists recommended guides to the Internet that are available electronically. Basic commands needed to use anonymous ftp (file transfer protocol) are explained. An annotation and command formats to access, scan, retrieve, and exit each file are included for 11 titles. (EAM)

  1. Directional MAC approach for wireless body area networks.

    PubMed

    Hussain, Md Asdaque; Alam, Md Nasre; Kwak, Kyung Sup

    2011-01-01

    Wireless Body Area Networks (WBANs) designed for medical, sports, and entertainment applications, have drawn the attention of academia and industry alike. A WBAN is a special purpose network, designed to operate autonomously to connect various medical sensors and appliances, located inside and/or outside of a human body. This network enables physicians to remotely monitor vital signs of patients and provide real time feedback for medical diagnosis and consultations. The WBAN system can offer two significant advantages: patient mobility due to their use of portable monitoring devices and a location independent monitoring facility. With its appealing dimensions, it brings about a new set of challenges, which we do not normally consider in such small sensor networks. It requires a scalable network in terms of heterogeneous data traffic, low power consumption of sensor nodes, integration in and around the body networking and coexistence. This work presents a medium access control protocol for WBAN which tries to overcome the aforementioned challenges. We consider the use of multiple beam adaptive arrays (MBAA) at BAN Coordinator (BAN_C) node. When used as a BAN_C, an MBAA can successfully receive two or more overlapping packets at the same time. Each beam captures a different packet by automatically pointing its pattern toward one packet while annulling other contending packets. This paper describes how an MBAA can be integrated into a single hope star topology as a BAN_C. Simulation results show the performance of our proposed protocol.

  2. Multiple Access Schemes for Lunar Missions

    NASA Technical Reports Server (NTRS)

    Deutsch, Leslie; Hamkins, Jon; Stocklin, Frank J.

    2010-01-01

    Two years ago, the NASA Coding, Modulation, and Link Protocol (CMLP) study was completed. The study, led by the authors of this paper, recommended codes, modulation schemes, and desired attributes of link protocols for all space communication links in NASA's future space architecture. Portions of the NASA CMLP team were reassembled to resolve one open issue: the use of multiple access (MA) communication from the lunar surface. The CMLP-MA team analyzed and simulated two candidate multiple access schemes that were identified in the original CMLP study: Code Division MA (CDMA) and Frequency Division MA (FDMA) based on a bandwidth-efficient Continuous Phase Modulation (CPM) with a superimposed Pseudo-Noise (PN) ranging signal (CPM/PN). This paper summarizes the results of the analysis and simulation of the CMLP-MA study and describes the final recommendations.

  3. An efficient in vitro shoot regeneration from leaf petiolar explants and ex vitro rooting of Bixa orellana L.- A dye yielding plant.

    PubMed

    Mohammed, Arifullah; Chiruvella, Kishore K; Namsa, Nima D; Ghanta, Rama Gopal

    2015-07-01

    Bixa orellana L. (Bixaceae) is a multipurpose tree grown for the production of commercially important dyes. In the present study, an efficient, reproducible protocol was developed for direct plant regeneration from in vitro derived petiole explants of Bixa orellana L. Murashige and Skoog medium (MS) supplemented with 2-isopentenyl adenine (9.8 μM) and naphthalene acetic acid (10.7 μM) was found to be optimum for production of high frequency of shoot organogenesis. Subculturing of the shoots onto the fresh MS medium containing similar concentrations of 2-iP (9.8 μM) and NAA (10.7 μM) produced elongated shoots. Elongated shoots when placed onto MS medium supplemented with 1.7 μM indole-3-acetic acid and 14.7 μM 2-iP produced optimal rooting. Rooted plantlets were acclimatized and transplanted to the field successfully. Histological investigation revealed the origin of shoot primordia, from sub-epidermal cells of petiole explants. The regeneration protocol developed in this study can be useful for mass in vitro propagation and effective genetic transformation of commercially important edible dye yielding tree species.

  4. Optimized human platelet lysate as novel basis for a serum-, xeno-, and additive-free corneal endothelial cell and tissue culture.

    PubMed

    Thieme, Daniel; Reuland, Lynn; Lindl, Toni; Kruse, Friedrich; Fuchsluger, Thomas

    2018-02-01

    The expansion of donor-derived corneal endothelial cells (ECs) is a promising approach for regenerative therapies in corneal diseases. To achieve the best Good Manufacturing Practice standard the entire cultivation process should be devoid of nonhuman components. However, so far, there is no suitable xeno-free protocol for clinical applications. We therefore introduce a processed variant of a platelet lysate for the use in corneal cell and tissue culture based on a Good Manufacturing Practice-grade thrombocyte concentrate. This processed human platelet lysate (phPL), free of any animal components and of anticoagulants such as heparin with a physiological ionic composition, was used to cultivate corneal ECs in vitro and ex vivo in comparison to standard cultivation with fetal calf serum (FCS). Human donor corneas were cut in quarters while 2 quarters of each cornea were incubated with the respective medium supplement. Three fields of view per quarter were taken into account for the analysis. Evaluation of phPL as a medium supplement in cell culture of immortalized EC showed a superior viability compared with FCS control with reduced cell proliferation. Furthermore, the viability during the expansion of primary cells is significantly (3-fold ±0.5) increased with phPL compared with FCS standard medium. Quartering donor corneas was traumatic for the endothelium and therefore resulted in increased EC loss. Interestingly, however, cultivation of the quartered pieces for 2 weeks in 0.1-mg/ml pHPL in Biochrome I showed a 21 (±10) % EC loss compared with 67 (±12) % EC loss when cultivated in 2% FCS in Biochrome I. The cell culture protocol with pHPL as FCS replacement seems to be superior to the standard FCS protocols with respect to EC survival. It offers a xeno-free and physiological environment for corneal endothelial cells. This alternative cultivation protocol could facilitate the use of EC for human corneal cell therapy. Copyright © 2017 John Wiley & Sons, Ltd.

  5. RosettaScripts: a scripting language interface to the Rosetta macromolecular modeling suite.

    PubMed

    Fleishman, Sarel J; Leaver-Fay, Andrew; Corn, Jacob E; Strauch, Eva-Maria; Khare, Sagar D; Koga, Nobuyasu; Ashworth, Justin; Murphy, Paul; Richter, Florian; Lemmon, Gordon; Meiler, Jens; Baker, David

    2011-01-01

    Macromolecular modeling and design are increasingly useful in basic research, biotechnology, and teaching. However, the absence of a user-friendly modeling framework that provides access to a wide range of modeling capabilities is hampering the wider adoption of computational methods by non-experts. RosettaScripts is an XML-like language for specifying modeling tasks in the Rosetta framework. RosettaScripts provides access to protocol-level functionalities, such as rigid-body docking and sequence redesign, and allows fast testing and deployment of complex protocols without need for modifying or recompiling the underlying C++ code. We illustrate these capabilities with RosettaScripts protocols for the stabilization of proteins, the generation of computationally constrained libraries for experimental selection of higher-affinity binding proteins, loop remodeling, small-molecule ligand docking, design of ligand-binding proteins, and specificity redesign in DNA-binding proteins.

  6. Integrated AUTODIN System Architecture Report. Part 2.

    DTIC Science & Technology

    1979-03-01

    Link Modes Protocols and end-to- end host protocols Codes ASCII, ITA#2 ASCII, Others (Trans- parent to network) Speeds 45 thru 4800 bps 110 bps thru 56K ...service facilities such as AMPEs, subscriber access lines, modems , multiplexers, concentrators, interface development to include software design and...Protocol) CODES - ASCII and ITA#2 (others transparent) SPEEDS - 45.5bps - 56K bps FORMATS - AUTODIN II Segment Formats, JANAP 128, ACP 126/127, DOI 103

  7. Large-volume iodinated contrast medium extravasation: low frequency and good outcome after conservative management in a single-centre cohort of more than 67,000 patients.

    PubMed

    Ko, Chih-Hsiang; Tay, Shee Yen; Chang, Hsiu-Chin; Chan, Wing P

    2018-06-12

    Our aim was to retrospectively investigate the frequency and outcome of large-volume iodinated contrast medium (CM) extravasation in our institution and to compare our management protocol to current practice. Institutional review board approval was obtained, and informed consent was waived because the study was retrospective. From January 2008 to September 2016, radiological examinations with intravenous non-ionic iodinated CM administration were performed in 67,129 patients. Contrast medium extravasation events on CT scans and intravenous pyelograms but not on angiograms were included. All data were collected prospectively and stratified according to age, injection method (manual vs auto-injection), prevention of extravasation by various means (including intercom alarm), management of extravasation (routine application of silver sulfadiazine ointment, clobetasol propionate cream, and damp gauze at room temperature), etc. RESULTS: The incidence of large-volume CM extravasation was very low (0.04% [27/67,129] overall; 0.03% related to manual injection [age range, 59-92 years; mean, 75.4 years], and 0.045% related to auto-injection [age range, 36-86 years; mean, 65.8 years]). The CM extravasation volume in majority of patients was 20-40 ml in 5 of 9 patients (55.6%) in the manual injection group and 14 of 18 (77.8%) in the auto-injection group. Swelling and pain were the most common symptoms. No patient developed severe signs or needed surgical intervention. Results show a very low incidence of large-volume CM extravasation without severe complications or sequelae. The casual effect between our protocols and good outcome cannot be scrutinised thoroughly because the study lacks a control group and is retrospective. • The incidence of large-volume contrast medium extravasation (≥20 ml) was 0.04%. • No patient needed surgical intervention, and most recovered within 7 days. • Each element of our management protocol contributed to good outcome.

  8. Intrusion Detection for Defense at the MAC and Routing Layers of Wireless Networks

    DTIC Science & Technology

    2007-01-01

    Space DoS Denial of Service DSR Dynamic Source Routing IDS Intrusion Detection System LAR Location-Aided Routing MAC Media Access Control MACA Multiple...different mobility parameters. 10 They simulate interaction between three MAC protocols ( MACA , 802.11 and CSMA) and three routing protocols (AODV, DSR

  9. Migrating an Online Service to WAP - A Case Study.

    ERIC Educational Resources Information Center

    Klasen, Lars

    2002-01-01

    Discusses mobile access via wireless application protocol (WAP) to online services that is offered in Sweden through InfoTorg. Topics include the Swedish online market; filtering HTML data from an Internet/Web server into WML (wireless markup language); mobile phone technology; microbrowsers; WAP protocol; and future possibilities. (LRW)

  10. 78 FR 54612 - Closed Captioning of Internet Protocol-Delivered Video Programming: Implementation of the Twenty...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-05

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 79 [MB Docket No. 11-154; DA 13-1785] Closed Captioning of Internet Protocol-Delivered Video Programming: Implementation of the Twenty-First Century Communications and Video Accessibility Act of 2010 AGENCY: Federal Communications Commission. ACTION: Proposed...

  11. A protocol for rat in vitro fertilization during conventional laboratory working hours.

    PubMed

    Aoto, Toshihiro; Takahashi, Ri-ichi; Ueda, Masatsugu

    2011-12-01

    In vitro fertilization (IVF) is a valuable technique for the propagation of experimental animals. IVF has typically been used in mice to rapidly expand breeding colonies and create large numbers of embryos. However, applications of IVF in rat breeding experiments have stalled due to the inconvenient laboratory work schedules imposed by current IVF protocols for this species. Here, we developed a new rat IVF protocol that consists of experimental steps performed during common laboratory working hours. Our protocol can be completed within 12 h by shortening the period of sperm capacitation from 5 to 1 h and the fertilization time from 10 to 8 h in human tubal fluid (HTF) medium. This new protocol generated an excellent birth rate and was applicable not only to closed colony rat strains, such as Wistar, Long-Evans, and Sprague-Dawley (SD), but also to the inbred Lewis strain. Moreover, Wistar and Long-Evans embryos prepared by this protocol were successfully frozen by vitrification and later successfully thawed and resuscitated. This protocol is practical and can be easily adopted by laboratory workers.

  12. REVISITING NUCLEOPHILIC SUBSTITUTION REACTIONS: MICROWAVE-ASSISTED SYNTHESIS OF AZIDES, THIOCYANATES AND SULFONES IN AQUEOUS MEDIUM

    EPA Science Inventory

    A practical, rapid and efficient microwave (MW) promoted synthesis of various azides, thiocyanates and sulfones, is described in aqueous medium. This general and expeditious MW-enhanced nucleophilic substitution approach uses easily accessible starting materials such as halides o...

  13. Tandem Aldol-Michael Reactions in Aqueous Diethylamine Medium: A Greener and Efficient Approach to Bis-Pyrimidine Derivatives

    PubMed Central

    Al-Majid, Abdullah M.; Barakat, Assem; AL-Najjar, Hany J.; Mabkhot, Yahia N.; Ghabbour, Hazem A.; Fun, Hoong-Kun

    2013-01-01

    A simple protocol, involving the green synthesis for the construction of novel bis-pyrimidine derivatives, 3a–i and 4a–e are accomplished by the aqueous diethylamine media promoted tandem Aldol-Michael reaction between two molecules of barbituric acid derivatives 1a,b with various aldehydes. This efficient synthetic protocol using an economic and environmentally friendly reaction media with versatility and shorter reaction time provides bis-pyrimidine derivatives with high yields (88%–99%). PMID:24317435

  14. Low-power low-latency MAC protocol for aeronautical applications

    NASA Astrophysics Data System (ADS)

    Sabater, Jordi; Kluge, Martin; Bovelli, Sergio; Schalk, Josef

    2007-05-01

    This paper describes asynchronous MAC (Medium Access Control) strategies based on the IEEE 802.15.4 physical layer for wireless aeronautical applications where low power and low latency are important requirements as well as security and data integrity. Sensor data is acquired and collected on request, by means of a mobile device, and later stored in a centralized database. In order to have the smallest power consumption the wireless sensor has to remain in deep sleep mode as long as possible and wake up and listen periodically for RF activity. If its unique ID is mentioned in the destination address field, the complete frame is received, processed and replied if necessary. If the detected packet is addressed to another sensor the reception will stop immediately and the wireless sensor will go into deep sleep mode again. Listening instead of sending actively does not 'pollute' the already crowded 2.45GHz spectrum, reduces collisions and increases security. The mobile data concentrator can not be synchronized with all the sensors installed in a distributed environment, therefore smart asynchronous data transmission strategies are needed to reduce latencies and increase throughput. For the considered application, sensors are independent of each other, simply share the medium and together with the data concentrator are organized in a star network topology. The centre of the star is the concentrator which is rarely in range. It coordinates and activates the wireless sensor nodes to collect the measured data.

  15. The management of Convulsive Refractory Status Epilepticus in adults in the UK: No consistency in practice and little access to continuous EEG monitoring.

    PubMed

    Patel, Mitesh; Bagary, Manny; McCorry, Dougall

    2015-01-01

    Convulsive Status Epilepticus (CSE) is a common neurological emergency with patients presenting with prolonged epileptic activity. Sub-optimal management is coupled with high morbidity and mortality. Continuous electroencephalogram (EEG) monitoring is considered essential by the National Institute for Health and Care Excellence (NICE) in the management of Convulsive Refractory Status Epilepticus (CRSE). The aim of this research was to determine current clinical practice in the management of CRSE amongst adults in intensive care units (ICU) in the UK and establish if the use of a standardised protocol requires re-enforcement within trusts. 75 randomly selected UK NHS Trusts were contacted and asked to complete a questionnaire in addition to providing their protocol for CRSE management in ICU. 55 (73%) trusts responded. While 31 (56% of responders) had a protocol available in ICU for early stages of CSE, just 21 (38%) trusts had specific guidelines if CRSE occurred. Only 23 (42%) trusts involved neurologists at any stage of management and just 18 (33%) have access to continuous EEG monitoring. This study identifies significant inconsistency in the management of CSE in ICU's across the UK. A minority of ICU units have a protocol for CRSE or access to continuous EEG monitoring despite it being considered fundamental for management and supported by NICE guidance. Copyright © 2014 British Epilepsy Association. Published by Elsevier Ltd. All rights reserved.

  16. Scoring System for the Management of Acute Gallstone Pancreatitis: Cost Analysis of a Prospective Study.

    PubMed

    Prigoff, Jake G; Swain, Gary W; Divino, Celia M

    2016-05-01

    Predicting the presence of a persistent common bile duct (CBD) stone is a difficult and expensive task. The aim of this study is to determine if a previously described protocol-based scoring system is a cost-effective strategy. The protocol includes all patients with gallstone pancreatitis and stratifies them based on laboratory values and imaging to high, medium, and low likelihood of persistent stones. The patient's stratification then dictates the next course of management. A decision analytic model was developed to compare the costs for patients who followed the protocol versus those that did not. Clinical data model inputs were obtained from a prospective study conducted at The Mount Sinai Medical Center to validate the protocol from Oct 2009 to May 2013. The study included all patients presenting with gallstone pancreatitis regardless of disease severity. Seventy-three patients followed the proposed protocol and 32 did not. The protocol group cost an average of $14,962/patient and the non-protocol group cost $17,138/patient for procedural costs. Mean length of stay for protocol and non-protocol patients was 5.6 and 7.7 days, respectively. The proposed protocol is a cost-effective way to determine the course for patients with gallstone pancreatitis, reducing total procedural costs over 12 %.

  17. Distributed Fair Auto Rate Medium Access Control for IEEE 802.11 Based WLANs

    NASA Astrophysics Data System (ADS)

    Zhu, Yanfeng; Niu, Zhisheng

    Much research has shown that a carefully designed auto rate medium access control can utilize the underlying physical multi-rate capability to exploit the time-variation of the channel. In this paper, we develop a simple analytical model to elucidate the rule that maximizes the throughput of RTS/CTS based multi-rate wireless local area networks. Based on the discovered rule, we propose two distributed fair auto rate medium access control schemes called FARM and FARM+ from the view-point of throughput fairness and time-share fairness, respectively. With the proposed schemes, after receiving a RTS frame, the receiver selectively returns the CTS frame to inform the transmitter the maximum feasible rate probed by the signal-to-noise ratio of the received RTS frame. The key feature of the proposed schemes is that they are capable of maintaining throughput/time-share fairness in asymmetric situation where the distribution of SNR varies with stations. Extensive simulation results show that the proposed schemes outperform the existing throughput/time-share fair auto rate schemes in time-varying channel conditions.

  18. Complementary concept for an image archive and communication system in a cardiological department based on CD-medical, an online archive, and networking facilities

    NASA Astrophysics Data System (ADS)

    Oswald, Helmut; Mueller-Jones, Kay; Builtjes, Jan; Fleck, Eckart

    1998-07-01

    The developments in information technologies -- computer hardware, networking and storage media -- has led to expectations that these advances make it possible to replace 35 mm film completely by digital techniques in the catheter laboratory. Besides the role of an archival medium, cine film is used as the major image review and exchange medium in cardiology. None of the today technologies can fulfill completely the requirements to replace cine film. One of the major drawbacks of cine film is the single access in time and location. For the four catheter laboratories in our institutions we have designed a complementary concept combining the CD-R, also called CD-medical, as a single patient storage and exchange medium, and a digital archive for on-line access and image review of selected frames or short sequences on adequate medical workstations. The image data from various modalities as well as all digital documents regarding to a patient are part of an electronic patient record. The access, the processing and the display of documents is supported by an integrated medical application.

  19. Genetic diversity analysis of Varronia curassavica Jacq. accessions using ISSR markers.

    PubMed

    Brito, F A; Nizio, D A C; Silva, A V C; Diniz, L E C; Rabbani, A R C; Arrigoni-Blank, M F; Alvares-Carvalho, S V; Figueira, G M; Montanari Júnior, I; Blank, A F

    2016-09-02

    Varronia curassavica Jacq. is a medicinal and aromatic plant from Brazil with significant economic importance. Studies on genetic diversity in active germplasm banks (AGB) are essential for conservation and breeding programs. The aim of this study was to analyze the genetic diversity of V. curassavica accessions of the AGB of Medicinal and Aromatic Plants of the Federal University of Sergipe (UFS), using inter-simple sequence repeat molecular markers. Twenty-four primers were tested, and 14 were polymorphic and informative, resulting in 149 bands with 97.98% polymorphism. The UPGMA dendrogram divided the accessions into Clusters I and II. Jaccard similarity coefficients for pair-wise comparisons of accessions ranged between 0.24 and 0.78. The pairs of accessions VCUR-001/VCUR-503, VCUR-001/VCUR-504, and VCUR-104/VCUR-501 showed relatively low similarity (0.24), and the pair of accessions VCUR-402/VCUR- 403 showed medium similarity (0.78). Twenty-eight accessions were divided into three distinct clusters, according to the STRUCTURE analysis. The genetic diversity of V. curassavica in the AGB of UFS is low to medium, and it requires expansion. Accession VCUR-802 is the most suitable for selection in breeding program of this species, since it clearly represents all of the diversity present in the AGB.

  20. Effect of a feed/fast protocol on pH in the proximal equine stomach.

    PubMed

    Husted, L; Sanchez, L C; Baptiste, K E; Olsen, S N

    2009-09-01

    Risk factors for the development of gastric squamous ulcers include various management procedures, such as intermittent feed deprivation that can occur during weight management regimens or stall and dry lot confinement. To investigate the effect of intermittent feed deprivation relative to continuous feed intake on proximal intragastric pH, specifically in the region of the squamous mucosa of the lesser curvature. In 6 horses, pH electrodes were placed just inside of the oesophageal sphincter in the stomach for each of two 72 h protocols (A and B) in a randomised, cross-over design. Protocol A consisted of 12 h fed, 12 h fasted, 24 h fed and 24 h fasted, in sequence. Protocol B consisted of 72 h fed. During the fed periods of each protocol, horses had ad libitum access to coastal Bermuda hay and were fed sweet feed (1 kg, b.i.d.). Horses had ad libitum access to water at all times. Proximal intragastric pH was significantly lower during protocol A, than during protocol B. However, hourly mean pH was significantly different only during the day and evening hours between protocols. During protocol B, mean proximal pH decreased significantly from 03.00 to 09.00 compared to 19.00 to 23.00 h. A moderate positive correlation of hay intake vs. proximal gastric pH could be established. Intermittent feed deprivation decreased proximal gastric pH in horses relative to those horses for which feed was not restricted. However, the effect was only significant when fasting occurred during the day and evening hours, as a nocturnal decrease in pH occurred simultaneously in the fed horses. Episodes of daytime feed deprivation should be avoided if possible, as proximal gastric acid exposure rapidly increases during such events.

  1. Gaining Access to the Internet.

    ERIC Educational Resources Information Center

    Notess, Greg R.

    1992-01-01

    Discusses Internet services and protocols (i.e., electronic mail, file transfer, and remote login) and provides instructions for retrieving guides and directories of the Internet. Services providing access to the Internet are described, including bulletin board systems, regional networks, nationwide connections, and library organizations; and a…

  2. Quantum CSMA/CD Synchronous Communication Protocol with Entanglement

    NASA Astrophysics Data System (ADS)

    Zhou, Nanrun; Zeng, Binyang; Gong, Lihua

    By utilizing the characteristics of quantum entanglement, a quantum synchronous communication protocol for Carrier Sense Multiple Access with Collision Detection (CSMA/CD) is presented. The proposed protocol divides the link into the busy time and leisure one, where the data frames are sent via classical channels and the distribution of quantum entanglement is supposed to be completed at leisure time and the quantum acknowledge frames are sent via quantum entanglement channels. The time span between two successfully delivered messages can be significantly reduced in this proposed protocol. It is shown that the performance of the CSMA/CD protocol can be improved significantly since the collision can be reduced to a certain extent. The proposed protocol has great significance in quantum communication.

  3. On the Design of a Comprehensive Authorisation Framework for Service Oriented Architecture (SOA)

    DTIC Science & Technology

    2013-07-01

    Authentication Server AZM Authorisation Manager AZS Authorisation Server BP Business Process BPAA Business Process Authorisation Architecture BPAD Business...Internet Protocol Security JAAS Java Authentication and Authorisation Service MAC Mandatory Access Control RBAC Role Based Access Control RCA Regional...the authentication process, make authorisation decisions using application specific access control functions that results in the practice of

  4. Interdisciplinary Approach to the Development of Accessible Computer-Administered Measurement Instruments.

    PubMed

    Magasi, Susan; Harniss, Mark; Heinemann, Allen W

    2018-01-01

    Principles of fairness in testing require that all test takers, including people with disabilities, have an equal opportunity to demonstrate their capacity on the construct being measured. Measurement design features and assessment protocols can pose barriers for people with disabilities. Fairness in testing is a fundamental validity issue at all phases in the design, administration, and interpretation of measurement instruments in clinical practice and research. There is limited guidance for instrument developers on how to develop and evaluate the accessibility and usability of measurement instruments. This article describes a 6-stage iterative process for developing accessible computer-administered measurement instruments grounded in the procedures implemented across several major measurement initiatives. A key component of this process is interdisciplinary teams of accessibility experts, content and measurement experts, information technology experts, and people with disabilities working together to ensure that measurement instruments are accessible and usable by a wide range of users. The development of accessible measurement instruments is not only an ethical requirement, it also ensures better science by minimizing measurement bias, missing data, and attrition due to mismatches between the target population and test administration platform and protocols. Copyright © 2017 American Congress of Rehabilitation Medicine. Published by Elsevier Inc. All rights reserved.

  5. The Live Access Server Scientific Product Generation Through Workflow Orchestration

    NASA Astrophysics Data System (ADS)

    Hankin, S.; Calahan, J.; Li, J.; Manke, A.; O'Brien, K.; Schweitzer, R.

    2006-12-01

    The Live Access Server (LAS) is a well-established Web-application for display and analysis of geo-science data sets. The software, which can be downloaded and installed by anyone, gives data providers an easy way to establish services for their on-line data holdings, so their users can make plots; create and download data sub-sets; compare (difference) fields; and perform simple analyses. Now at version 7.0, LAS has been in operation since 1994. The current "Armstrong" release of LAS V7 consists of three components in a tiered architecture: user interface, workflow orchestration and Web Services. The LAS user interface (UI) communicates with the LAS Product Server via an XML protocol embedded in an HTTP "get" URL. Libraries (APIs) have been developed in Java, JavaScript and perl that can readily generate this URL. As a result of this flexibility it is common to find LAS user interfaces of radically different character, tailored to the nature of specific datasets or the mindset of specific users. When a request is received by the LAS Product Server (LPS -- the workflow orchestration component), business logic converts this request into a series of Web Service requests invoked via SOAP. These "back- end" Web services perform data access and generate products (visualizations, data subsets, analyses, etc.). LPS then packages these outputs into final products (typically HTML pages) via Jakarta Velocity templates for delivery to the end user. "Fine grained" data access is performed by back-end services that may utilize JDBC for data base access; the OPeNDAP "DAPPER" protocol; or (in principle) the OGC WFS protocol. Back-end visualization services are commonly legacy science applications wrapped in Java or Python (or perl) classes and deployed as Web Services accessible via SOAP. Ferret is the default visualization application used by LAS, though other applications such as Matlab, CDAT, and GrADS can also be used. Other back-end services may include generation of Google Earth layers using KML; generation of maps via WMS or ArcIMS protocols; and data manipulation with Unix utilities.

  6. Obtaining i.v. fosfomycin through an expanded-access protocol.

    PubMed

    Frederick, Corey M; Burnette, Jennifer; Aragon, Laura; Gauthier, Timothy P

    2016-08-15

    One hospital's experience with procuring i.v. fosfomycin via an expanded-access protocol to treat a panresistant infection is described. In mid-2014, a patient at a tertiary care institution had an infection caused by a gram-negative pathogen expressing notable drug resistance. Once it was determined by the infectious diseases (ID) attending physician that i.v. fosfomycin was a possible treatment for this patient, the ID pharmacist began the process of drug procurement. The research and ID pharmacists completed an investigational new drug (IND) application, which required patient-specific details and contributions from the ID physician. After obtaining approval of the IND, an Internet search identified a product vendor in the United Kingdom, who was then contacted to begin the drug purchasing and acquisition processes. Authorization of the transaction required signatures from key senior hospital administrators, including the chief financial officer and the chief operating officer. Approximately 6 days after beginning the acquisition process, the research pharmacist arranged for the wholesaler to expedite product delivery. The ID pharmacist contacted the wholesaler's shipping company at the U.S. Customs Office, providing relevant contact information to ensure that any unexpected circumstances could be quickly addressed. The product arrived at the U.S. Customs Office 8 days after beginning the acquisition process and was held in the U.S. Customs Office for 2 days. The patient received the first dose of i.v. fosfomycin 13 days after starting the expanded-access protocol process. I.V. fosfomycin was successfully procured through an FDA expanded-access protocol by coordinating efforts among ID physicians, pharmacists, and hospital executives. Copyright © 2016 by the American Society of Health-System Pharmacists, Inc. All rights reserved.

  7. Saccadic vector optokinetic perimetry in children with neurodisability or isolated visual pathway lesions: observational cohort study.

    PubMed

    Tailor, Vijay; Glaze, Selina; Unwin, Hilary; Bowman, Richard; Thompson, Graham; Dahlmann-Noor, Annegret

    2016-10-01

    Children and adults with neurological impairments are often not able to access conventional perimetry; however, information about the visual field is valuable. A new technology, saccadic vector optokinetic perimetry (SVOP), may have improved accessibility, but its accuracy has not been evaluated. We aimed to explore accessibility, testability and accuracy of SVOP in children with neurodisability or isolated visual pathway deficits. Cohort study; recruitment October 2013-May 2014, at children's eye clinics at a tertiary referral centre and a regional Child Development Centre; full orthoptic assessment, SVOP (central 30° of the visual field) and confrontation visual fields (CVF). Group 1: age 1-16 years, neurodisability (n=16), group 2: age 10-16 years, confirmed or suspected visual field defect (n=21); group 2 also completed Goldmann visual field testing (GVFT). Group 1: testability with a full 40-point test protocol is 12.5%; with reduced test protocols, testability is 100%, but plots may be clinically meaningless. Children (44%) and parents/carers (62.5%) find the test easy. SVOP and CVF agree in 50%. Group 2: testability is 62% for the 40-point protocol, and 90.5% for reduced protocols. Corneal changes in childhood glaucoma interfere with SVOP testing. All children and parents/carers find SVOP easy. Overall agreement with GVFT is 64.7%. While SVOP is highly accessible to children, many cannot complete a full 40-point test. Agreement with current standard tests is moderate to poor. Abnormal saccades cause an apparent non-specific visual field defect. In children with glaucoma or nystagmus SVOP calibration often fails. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  8. Enhanced Weight based DSR for Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Verma, Samant; Jain, Sweta

    2011-12-01

    Routing in ad hoc network is a great problematic, since a good routing protocol must ensure fast and efficient packet forwarding, which isn't evident in ad hoc networks. In literature there exists lot of routing protocols however they don't include all the aspects of ad hoc networks as mobility, device and medium constraints which make these protocols not efficient for some configuration and categories of ad hoc networks. Thus in this paper we propose an improvement of Weight Based DSR in order to include some of the aspects of ad hoc networks as stability, remaining battery power, load and trust factor and proposing a new approach Enhanced Weight Based DSR.

  9. IP access networks with QoS support

    NASA Astrophysics Data System (ADS)

    Sargento, Susana; Valadas, Rui J. M. T.; Goncalves, Jorge; Sousa, Henrique

    2001-07-01

    The increasing demand of new services and applications is pushing for drastic changes on the design of access networks targeted mainly for residential and SOHO users. Future access networks will provide full service integration (including multimedia), resource sharing at the packet level and QoS support. It is expected that using IP as the base technology, the ideal plug-and-play scenario, where the management actions of the access network operator are kept to a minimum, will be achieved easily. This paper proposes an architecture for access networks based on layer 2 or layer 3 multiplexers that allows a number of simplifications in the network elements and protocols (e.g. in the routing and addressing functions). We discuss two possible steps in the evolution of access networks towards a more efficient support of IP based services. The first one still provides no QoS support and was designed with the goal of reusing as much as possible current technologies; it is based on tunneling to transport PPP sessions. The second one introduces QoS support through the use of emerging technologies and protocols. We illustrate the different phases of a multimedia Internet access session, when using SIP for session initiation, COPS for the management of QoS policies including the AAA functions and RSVP for resource reservation.

  10. Analysis of practical backoff protocols for contention resolution with multiple servers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Goldberg, L.A.; MacKenzie, P.D.

    Backoff protocols are probably the most widely used protocols for contention resolution in multiple access channels. In this paper, we analyze the stochastic behavior of backoff protocols for contention resolution among a set of clients and servers, each server being a multiple access channel that deals with contention like an Ethernet channel. We use the standard model in which each client generates requests for a given server according to a Bemoulli distribution with a specified mean. The client-server request rate of a system is the maximum over all client-server pairs (i, j) of the sum of all request rates associatedmore » with either client i or server j. Our main result is that any superlinear polynomial backoff protocol is stable for any multiple-server system with a sub-unit client-server request rate. We confirm the practical relevance of our result by demonstrating experimentally that the average waiting time of requests is very small when such a system is run with reasonably few clients and reasonably small request rates such as those that occur in actual ethernets. Our result is the first proof of stability for any backoff protocol for contention resolution with multiple servers. Our result is also the first proof that any weakly acknowledgment based protocol is stable for contention resolution with multiple servers and such high request rates. Two special cases of our result are of interest. Hastad, Leighton and Rogoff have shown that for a single-server system with a sub-unit client-server request rate any modified superlinear polynomial backoff protocol is stable. These modified backoff protocols are similar to standard backoff protocols but require more random bits to implement. The special case of our result in which there is only one server extends the result of Hastad, Leighton and Rogoff to standard (practical) backoff protocols. Finally, our result applies to dynamic routing in optical networks.« less

  11. Very High-Speed Report File System

    DTIC Science & Technology

    1992-12-15

    1.5 and 45 Mb/s and is expected 1 Introduction to reach 150 Mb/s. These new technologies pose some challenges to The Internet Protocol (IP) family (IP... Internet Engineering Task Force (IETF) has R taken up the issue, but a definitive answer is probably some time away. The basic issues are the choice of AAL...by an IEEE 802. la Subnetwork Access Protocol (SNAP) However, with a large number of networks all header. The third proposal identifies the protocol

  12. Internet access for delivery of health information to South Australians older than 50.

    PubMed

    Wilson, Carlene; Flight, Ingrid; Hart, Elizabeth; Turnbull, Deborah; Cole, Steve; Young, Graeme

    2008-04-01

    An exploratory study to determine the proportion of people aged 50-76 years who have Internet access, the location of this access, predictive characteristics of such access, and preparedness to receive unsolicited health information through this medium. A random sample of 1,000 South Australians was identified from the Australian Electoral Commission roll and contacted by telephone in 2006. They were invited to answer questions about their access to the Internet and attitude towards receiving unsolicited health information via the Internet. Of those contacted, 41% provided information. Of this group, 59% indicated that they had Internet access, mostly at home. Men were more likely than women to have home access (p<0.05). Higher educational achievement, higher economic status and younger age were all significantly associated with access. Of those who had access, 65% would be willing to receive health information through the Internet. More than half the population older than 50 years has access to the Internet at some location, and there is a general acceptance of the possibility of receiving health-promoting material via this medium. However, delivery via the Internet alone would disadvantage those who are less educated, less financially well off and older. It is likely that a generational change in the entire nature of public communication will influence the efficiency and effectiveness of preventive health promotion delivery via the Internet. In order to facilitate improved health outcomes, issues of disparity of access must be addressed.

  13. Candida famata (Debaryomyces hansenii)

    NASA Astrophysics Data System (ADS)

    Sibirny, Andriy A.; Voronovsky, Andriy Y.

    Debaryomyces hansenii (teleomorph of asporogenous strains known as Candida famata ) belongs to the group of so named ‘ flavinogenic yeasts ’ capable of riboflavin oversynthesis during starvation for iron. Some strains of C. famata belong to the most flavinogenic organisms known (accumulate 20 mg of riboflavin in 1 ml of the medium) and were used for industrial production of riboflavin in USA for long time. Many strains of D. hansenii are characterized by high salt tolerance and are used for ageing of cheeses whereas some others are able to convert xylose to xylitol, anti-caries sweetener. Transformation system has been developed for D. hansenii. It includes collection of host recipient strains, vectors with complementation and dominant markers and several transformation protocols based on protoplasting and electroporation. Besides, methods of multicopy gene insertion and insertional mutagenesis have been developed and several strong constitutive and regulatable promoters have been cloned. All structural genes of riboflavin synthesis and some regulatory genes involved in this process have been identified. Genome of D. hansenii has been sequenced in the frame of French National program ‘Genolevure’ and is opened for public access

  14. Characterization of tissue-simulating phantom materials for ultrasound-guided needle procedures

    NASA Astrophysics Data System (ADS)

    Buchanan, Susan; Moore, John; Lammers, Deanna; Baxter, John; Peters, Terry

    2012-02-01

    Needle biopsies are standard protocols that are commonly performed under ultrasound (US) guidance or computed tomography (CT)1. Vascular access such as central line insertions, and many spinal needle therapies also rely on US guidance. Phantoms for these procedures are crucial as both training tools for clinicians and research tools for developing new guidance systems. Realistic imaging properties and material longevity are critical qualities for needle guidance phantoms. However, current commercially available phantoms for use with US guidance have many limitations, the most detrimental of which include harsh needle tracks obfuscating US images and a membrane comparable to human skin that does not allow seepage of inner media. To overcome these difficulties, we tested a variety of readily available media and membranes to evaluate optimal materials to fit our current needs. It was concluded that liquid hand soap was the best medium, as it instantly left no needle tracks, had an acceptable depth of US penetration and portrayed realistic imaging conditions, while because of its low leakage, low cost, acceptable durability and transparency, the optimal membrane was 10 gauge vinyl.

  15. Mild deoxygenation of aromatic ketones and aldehydes over Pd/C using polymethylhydrosiloxane as the reducing agent.

    PubMed

    Volkov, Alexey; Gustafson, Karl P J; Tai, Cheuk-Wai; Verho, Oscar; Bäckvall, Jan-E; Adolfsson, Hans

    2015-04-20

    Herein, a practical and mild method for the deoxygenation of a wide range of benzylic aldehydes and ketones is described, which utilizes heterogeneous Pd/C as the catalyst together with the green hydride source, polymethylhydrosiloxane. The developed catalytic protocol is scalable and robust, as exemplified by the deoxygenation of ethyl vanillin, which was performed on a 30 mmol scale in an open-to-air setup using only 0.085 mol % Pd/C catalyst to furnish the corresponding deoxygenated product in 93 % yield within 3 hours at room temperature. Furthermore, the Pd/C catalyst was shown to be recyclable up to 6 times without any observable decrease in efficiency and it exhibited low metal leaching under the reaction conditions. © 2015 The Authors. Published by Wiley-VCH Verlag GmbH & Co. KGaA. This is an open access article under the terms of the Creative Commons Attribution Non-Commercial NoDerivs License, which permits use and distribution in any medium, provided the original work is properly cited, the use is non-commercial and no modifications or adaptations are made.

  16. Report: Results of Technical Network Vulnerability Assessment: EPA’s National Vehicle and Fuel Emissions Laboratory

    EPA Pesticide Factsheets

    Report #12-P-0900, September 27, 2012. Vulnerability testing of networked resources located in the NVFEL identified Internet Protocol addresses with potentially 9 critical-risk, 70 high-risk, and 297 medium-risk vulnerabilities.

  17. Performance Analysis of Modified Accelerative Preallocation MAC Protocol for Passive Star-Coupled WDMA Networks

    NASA Astrophysics Data System (ADS)

    Yun, Changho; Kim, Kiseon

    2006-04-01

    For the passive star-coupled wavelength-division multiple-access (WDMA) network, a modified accelerative preallocation WDMA (MAP-WDMA) media access control (MAC) protocol is proposed, which is based on AP-WDMA. To show the advantages of MAP-WDMA as an adequate MAC protocol for the network over AP-WDMA, the channel utilization, the channel-access delay, and the latency of MAP-WDMA are investigated and compared with those of AP-WDMA under various data traffic patterns, including uniform, quasi-uniform type, disconnected type, mesh type, and ring type data traffics, as well as the assumption that a given number of network stations is equal to that of channels, in other words, without channel sharing. As a result, the channel utilization of MAP-WDMA can be competitive with respect to that of AP-WDMA at the expense of insignificantly higher latency. Namely, if the number of network stations is small, MAP-WDMA provides better channel utilization for uniform, quasi-uniform-type, and disconnected-type data traffics at all data traffic loads, as well as for mesh and ring-type data traffics at low data traffic loads. Otherwise, MAP-WDMA only outperforms AP-WDMA for the first three data traffics at higher data traffic loads. In the aspect of channel-access delay, MAP-WDMA gives better performance than AP-WDMA, regardless of data traffic patterns and the number of network stations.

  18. Design and Analysis of Underwater Acoustic Networks with Reflected Links

    NASA Astrophysics Data System (ADS)

    Emokpae, Lloyd

    Underwater acoustic networks (UWANs) have applications in environmental state monitoring, oceanic profile measurements, leak detection in oil fields, distributed surveillance, and navigation. For these applications, sets of nodes are employed to collaboratively monitor an area of interest and track certain events or phenomena. In addition, it is common to find autonomous underwater vehicles (AUVs) acting as mobile sensor nodes that perform search-and-rescue missions, reconnaissance in combat zones, and coastal patrol. These AUVs are to work cooperatively to achieve a desired goal and thus need to be able to, in an ad-hoc manner, establish and sustain communication links in order to ensure some desired level of quality of service. Therefore, each node is required to adapt to environmental changes and be able to overcome broken communication links caused by external noise affecting the communication channel due to node mobility. In addition, since radio waves are quickly absorbed in the water medium, it is common for most underwater applications to rely on acoustic (or sound) rather than radio channels for mid-to-long range communications. However, acoustic channels pose multiple challenging issues, most notably the high transmission delay due to slow signal propagation and the limited channel bandwidth due to high frequency attenuation. Moreover, the inhomogeneous property of the water medium affects the sound speed profile while the signal surface and bottom reflections leads to multipath effects. In this dissertation, we address these networking challenges by developing protocols that take into consideration the underwater physical layer dynamics. We begin by introducing a novel surface-based reflection scheme (SBR), which takes advantage of the multipath effects of the acoustic channel. SBR works by using reflections from the water surface, and bottom, to establish non-line-of-sight (NLOS) communication links. SBR makes it possible to incorporate both line-of-sight (LOS) and NLOS links by utilizing directional antennas, which will boost the signal-to-noise ratio (SNR) at the receiver while promoting NLOS usage. In our model, we employ a directional underwater acoustic antenna composed of an array of hydrophones that can be summed up at various phases and amplitudes resulting in a beam-former. We have also adopted a practical multimodal directional transducer concept which generates both directional and omni-directional beam patterns by combining the fundamental vibration modes of a cylindrical acoustic radiator. This allows the transducer to be electrically controlled and steered by simply adjusting the electrical voltage weights. A prototype acoustic modem is then developed to utilize the multimodal directional transducer for both LOS and NLOS communication. The acoustic modem has also been used as a platform for empirically validating our SBR communication model in a tank and with empirical data. Networking protocols have been developed to exploit the SBR communication model. These protocols include node discovery and localization, directional medium access control (D-MAC) and geographical routing. In node discovery and localization, each node will utilize SBR-based range measurements to its neighbors to determine their relative position. The D-MAC protocol utilizes directional antennas to increase the network throughput due to the spatial efficiency of the antenna model. In the proposed reflection-enabled directional MAC protocol (RED-MAC), each source node will be able to determine if an obstacle is blocking the LOS link to the destination and switch to the best NLOS link by utilizing surface/bottom reflections. Finally, we have developed a geographical routing algorithm which aims to establish the best stable route from a source node to a destination node. The optimized route is selected to achieve maximum network throughput. Extensive analysis of the network throughput when utilizing directional antennas is also presented to show the benefits of directional communication on the overall network throughput.

  19. Designing of routing algorithms in autonomous distributed data transmission system for mobile computing devices with ‘WiFi-Direct’ technology

    NASA Astrophysics Data System (ADS)

    Nikitin, I. A.; Sherstnev, V. S.; Sherstneva, A. I.; Botygin, I. A.

    2017-02-01

    The results of the research of existent routing protocols in wireless networks and their main features are discussed in the paper. Basing on the protocol data, the routing protocols in wireless networks, including search routing algorithms and phone directory exchange algorithms, are designed with the ‘WiFi-Direct’ technology. Algorithms without IP-protocol were designed, and that enabled one to increase the efficiency of the algorithms while working only with the MAC-addresses of the devices. The developed algorithms are expected to be used in the mobile software engineering with the Android platform taken as base. Easier algorithms and formats of the well-known route protocols, rejection of the IP-protocols enables to use the developed protocols on more primitive mobile devices. Implementation of the protocols to the engineering industry enables to create data transmission networks among working places and mobile robots without any access points.

  20. Cryptanalysis and improvement of an improved two factor authentication protocol for telecare medical information systems.

    PubMed

    Chaudhry, Shehzad Ashraf; Naqvi, Husnain; Shon, Taeshik; Sher, Muhammad; Farash, Mohammad Sabzinejad

    2015-06-01

    Telecare medical information systems (TMIS) provides rapid and convenient health care services remotely. Efficient authentication is a prerequisite to guarantee the security and privacy of patients in TMIS. Authentication is used to verify the legality of the patients and TMIS server during remote access. Very recently Islam et al. (J. Med. Syst. 38(10):135, 2014) proposed a two factor authentication protocol for TMIS using elliptic curve cryptography (ECC) to improve Xu et al.'s (J. Med. Syst. 38(1):9994, 2014) protocol. They claimed their improved protocol to be efficient and provides all security requirements. However our analysis reveals that Islam et al.'s protocol suffers from user impersonation and server impersonation attacks. Furthermore we proposed an enhanced protocol. The proposed protocol while delivering all the virtues of Islam et al.'s protocol resists all known attacks.

  1. A Study of Shared-Memory Mutual Exclusion Protocols Using CADP

    NASA Astrophysics Data System (ADS)

    Mateescu, Radu; Serwe, Wendelin

    Mutual exclusion protocols are an essential building block of concurrent systems: indeed, such a protocol is required whenever a shared resource has to be protected against concurrent non-atomic accesses. Hence, many variants of mutual exclusion protocols exist in the shared-memory setting, such as Peterson's or Dekker's well-known protocols. Although the functional correctness of these protocols has been studied extensively, relatively little attention has been paid to their non-functional aspects, such as their performance in the long run. In this paper, we report on experiments with the performance evaluation of mutual exclusion protocols using Interactive Markov Chains. Steady-state analysis provides an additional criterion for comparing protocols, which complements the verification of their functional properties. We also carefully re-examined the functional properties, whose accurate formulation as temporal logic formulas in the action-based setting turns out to be quite involved.

  2. Extremely high data-rate, reliable network systems research

    NASA Technical Reports Server (NTRS)

    Foudriat, E. C.; Maly, Kurt J.; Mukkamala, R.; Murray, Nicholas D.; Overstreet, C. Michael

    1990-01-01

    Significant progress was made over the year in the four focus areas of this research group: gigabit protocols, extensions of metropolitan protocols, parallel protocols, and distributed simulations. Two activities, a network management tool and the Carrier Sensed Multiple Access Collision Detection (CSMA/CD) protocol, have developed to the point that a patent is being applied for in the next year; a tool set for distributed simulation using the language SIMSCRIPT also has commercial potential and is to be further refined. The year's results for each of these areas are summarized and next year's activities are described.

  3. Automating individualized coaching and authentic role-play practice for brief intervention training.

    PubMed

    Hayes-Roth, B; Saker, R; Amano, K

    2010-01-01

    Brief intervention helps to reduce alcohol abuse, but there is a need for accessible, cost-effective training of clinicians. This study evaluated STAR Workshop , a web-based training system that automates efficacious techniques for individualized coaching and authentic role-play practice. We compared STAR Workshop to a web-based, self-guided e-book and a no-treatment control, for training the Engage for Change (E4C) brief intervention protocol. Subjects were medical and nursing students. Brief written skill probes tested subjects' performance of individual protocol steps, in different clinical scenarios, at three test times: pre-training, post-training, and post-delay (two weeks). Subjects also did live phone interviews with a standardized patient, post-delay. STAR subjects performed significantly better than both other groups. They showed significantly greater improvement from pre-training probes to post-training and post-delay probes. They scored significantly higher on post-delay phone interviews. STAR Workshop appears to be an accessible, cost-effective approach for training students to use the E4C protocol for brief intervention in alcohol abuse. It may also be useful for training other clinical interviewing protocols.

  4. A Survey of Authentication Schemes in Telecare Medicine Information Systems.

    PubMed

    Aslam, Muhammad Umair; Derhab, Abdelouahid; Saleem, Kashif; Abbas, Haider; Orgun, Mehmet; Iqbal, Waseem; Aslam, Baber

    2017-01-01

    E-Healthcare is an emerging field that provides mobility to its users. The protected health information of the users are stored at a remote server (Telecare Medical Information System) and can be accessed by the users at anytime. Many authentication protocols have been proposed to ensure the secure authenticated access to the Telecare Medical Information System. These protocols are designed to provide certain properties such as: anonymity, untraceability, unlinkability, privacy, confidentiality, availability and integrity. They also aim to build a key exchange mechanism, which provides security against some attacks such as: identity theft, password guessing, denial of service, impersonation and insider attacks. This paper reviews these proposed authentication protocols and discusses their strengths and weaknesses in terms of ensured security and privacy properties, and computation cost. The schemes are divided in three broad categories of one-factor, two-factor and three-factor authentication schemes. Inter-category and intra-category comparison has been performed for these schemes and based on the derived results we propose future directions and recommendations that can be very helpful to the researchers who work on the design and implementation of authentication protocols.

  5. Development of an improved rapid BACpro® protocol and a method for direct identification from blood-culture-positive bottles using matrix-assisted laser desorption ionization time-of-flight mass spectrometry.

    PubMed

    Yonezawa, Takatoshi; Watari, Tomohisa; Ashizawa, Kazuho; Hanada, Daisuke; Yanagiya, Takako; Watanabe, Naoki; Terada, Takashi; Tomoda, Yutaka; Fujii, Satoshi

    2018-05-01

    Matrix-assisted laser desorption ionization time-of-flight mass spectrometry (MALDI-TOF MS) has been incorporated into pathogenic bacterial identification methods and has improved their rapidity. Various methods have been reported to directly identify bacteria with MALDI-TOF MS by pretreating culture medium in blood culture bottles. Rapid BACpro® (Nittobo Medical Co., Ltd.) is a pretreatment kit for effective collection of bacteria with cationic copolymers. However, the Rapid BACpro® pretreatment kit is adapted only for MALDI Biotyper (Bruker Daltonics K.K.), and there has been a desire to expand its use to VITEK MS (VMS; bioMerieux SA). We improved the protocol and made it possible to analyze with VMS. The culture medium bacteria collection method was changed to a method with centrifugation after hemolysis using saponin; the cationic copolymer concentration was changed to 30% of the original concentration; the sequence with which reagents were added was changed; and a change was made to an ethanol/formic acid extraction method. The improved protocol enhanced the identification performance. When VMS was used, the identification rate was 100% with control samples. With clinical samples, the identification agreement rate with the cell smear method was 96.3%. The improved protocol is effective in blood culture rapid identification, being both simpler and having an improved identification performance compared with the original. Copyright © 2018 Elsevier B.V. All rights reserved.

  6. Land-mobile satellite communication system

    NASA Technical Reports Server (NTRS)

    Yan, Tsun-Yee (Inventor); Rafferty, William (Inventor); Dessouky, Khaled I. (Inventor); Wang, Charles C. (Inventor); Cheng, Unjeng (Inventor)

    1993-01-01

    A satellite communications system includes an orbiting communications satellite for relaying communications to and from a plurality of ground stations, and a network management center for making connections via the satellite between the ground stations in response to connection requests received via the satellite from the ground stations, the network management center being configured to provide both open-end service and closed-end service. The network management center of one embodiment is configured to provides both types of service according to a predefined channel access protocol that enables the ground stations to request the type of service desired. The channel access protocol may be configured to adaptively allocate channels to open-end service and closed-end service according to changes in the traffic pattern and include a free-access tree algorithm that coordinates collision resolution among the ground stations.

  7. Performance Analysis of Different Backoff Algorithms for WBAN-Based Emerging Sensor Networks

    PubMed Central

    Khan, Pervez; Ullah, Niamat; Ali, Farman; Ullah, Sana; Hong, Youn-Sik; Lee, Ki-Young; Kim, Hoon

    2017-01-01

    The Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) procedure of IEEE 802.15.6 Medium Access Control (MAC) protocols for the Wireless Body Area Network (WBAN) use an Alternative Binary Exponential Backoff (ABEB) procedure. The backoff algorithm plays an important role to avoid collision in wireless networks. The Binary Exponential Backoff (BEB) algorithm used in different standards does not obtain the optimum performance due to enormous Contention Window (CW) gaps induced from packet collisions. Therefore, The IEEE 802.15.6 CSMA/CA has developed the ABEB procedure to avoid the large CW gaps upon each collision. However, the ABEB algorithm may lead to a high collision rate (as the CW size is incremented on every alternative collision) and poor utilization of the channel due to the gap between the subsequent CW. To minimize the gap between subsequent CW sizes, we adopted the Prioritized Fibonacci Backoff (PFB) procedure. This procedure leads to a smooth and gradual increase in the CW size, after each collision, which eventually decreases the waiting time, and the contending node can access the channel promptly with little delay; while ABEB leads to irregular and fluctuated CW values, which eventually increase collision and waiting time before a re-transmission attempt. We analytically approach this problem by employing a Markov chain to design the PFB scheme for the CSMA/CA procedure of the IEEE 80.15.6 standard. The performance of the PFB algorithm is compared against the ABEB function of WBAN CSMA/CA. The results show that the PFB procedure adopted for IEEE 802.15.6 CSMA/CA outperforms the ABEB procedure. PMID:28257112

  8. Secure Publish-Subscribe Protocols for Heterogeneous Medical Wireless Body Area Networks

    PubMed Central

    Picazo-Sanchez, Pablo; Tapiador, Juan E.; Peris-Lopez, Pedro; Suarez-Tangil, Guillermo

    2014-01-01

    Security and privacy issues in medical wireless body area networks (WBANs) constitute a major unsolved concern because of the challenges posed by the scarcity of resources in WBAN devices and the usability restrictions imposed by the healthcare domain. In this paper, we describe a WBAN architecture based on the well-known publish-subscribe paradigm. We present two protocols for publishing data and sending commands to a sensor that guarantee confidentiality and fine-grained access control. Both protocols are based on a recently proposed ciphertext policy attribute-based encryption (CP-ABE) scheme that is lightweight enough to be embedded into wearable sensors. We show how sensors can implement lattice-based access control (LBAC) policies using this scheme, which are highly appropriate for the eHealth domain. We report experimental results with a prototype implementation demonstrating the suitability of our proposed solution. PMID:25460814

  9. Increasing access to kidney transplantation for sensitized recipient through three-way kidney paired donation with desensitization: The first Indian report

    PubMed Central

    Kute, Vivek B; Patel, Himanshu V; Shah, Pankaj R; Modi, Pranjal R; Shah, Veena R; Rizvi, Sayyed J; Pal, Bipin C; Modi, Manisha P; Shah, Priya S; Varyani, Umesh T; Wakhare, Pavan S; Shinde, Saiprasad G; Ghodela, Viajay A; Patel, Minaxi H; Trivedi, Varsha B; Trivedi, Hargovind L

    2016-01-01

    The combination of kidney paired donation (KPD) with desensitization represents a promising method of increasing the rate of living donor kidney transplantation (LDKT) in immunologically challenging patients. Patients who are difficult to match and desensitize due to strong donor specific antibody are may be transplanted by a combination of desensitization and KPD protocol with more immunologically favorable donor. We present our experience of combination of desensitization protocol with three-way KPD which contributed to successful LDKT in highly sensitized end stage renal disease patient. All recipients were discharged with normal and stable allograft function at 24 mo follow up. We believe that this is first report from India where three-way KPD exchange was performed with the combination of KPD and desensitization. The combination of desensitization protocol with KPD improves access and outcomes of LDKT. PMID:27803919

  10. The long underestimated carbonyl function of carbohydrates – an organocatalyzed shot into carbohydrate chemistry.

    PubMed

    Mahrwald, R

    2015-09-21

    The aggressive and strong development of organocatalysis provides several protocols for the convenient utilization of the carbonyl function of unprotected carbohydrates in C-C-bond formation processes. These amine-catalyzed mechanisms enable multiple cascade-protocols for the synthesis of a wide range of carbohydrate-derived compound classes. Several, only slightly different protocols, have been developed for the application of 1,3-dicarbonyl compounds in the stereoselective chain-elongation of unprotected carbohydrates and the synthesis of highly functionalized C-glycosides of defined configuration. In addition, C-glycosides can also be accessed by amine-catalyzed reactions with methyl ketones. By a one-pot cascade reaction of isocyanides with unprotected aldoses and amino acids access to defined configured glycopeptide mimetics is achieved. Depending on the reaction conditions different origins to control the installation of configuration during the bond-formation process were observed.

  11. Traffic management mechanism for intranets with available-bit-rate access to the Internet

    NASA Astrophysics Data System (ADS)

    Hassan, Mahbub; Sirisena, Harsha R.; Atiquzzaman, Mohammed

    1997-10-01

    The design of a traffic management mechanism for intranets connected to the Internet via an available bit rate access- link is presented. Selection of control parameters for this mechanism for optimum performance is shown through analysis. An estimate for packet loss probability at the access- gateway is derived for random fluctuation of available bit rate of the access-link. Some implementation strategies of this mechanism in the standard intranet protocol stack are also suggested.

  12. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources.

    PubMed

    Cruz-Piris, Luis; Rivera, Diego; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R

    2018-03-20

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.

  13. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources

    PubMed Central

    2018-01-01

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal. PMID:29558406

  14. Comparison of two cooling protocols for llama semen: with and without collagenase and seminal plasma in the medium.

    PubMed

    Carretero, M I; Giuliano, S M; Arraztoa, C C; Santa Cruz, R C; Fumuso, F G; Neild, D M

    2017-08-01

    Seminal plasma (SP) of South American Camelids could interfere with the interaction of spermatozoa with the extenders; therefore it becomes necessary to improve semen management using enzymatic treatment. Our objective was to compare two cooling protocols for llama semen. Twelve ejaculates were incubated in 0.1% collagenase and then were divided into two aliquots. One was extended in lactose and egg yolk (LEY) (Protocol A: collagenase and SP present). The other aliquot was centrifuged, and the pellet was resuspended in LEY (Protocol B: collagenase and SP absent). Both samples were maintained at 5°C during 24 hr. Routine and DNA evaluations were carried out in raw and cooled semen. Both cooling protocols maintained sperm viability, membrane function and DNA fragmentation, with Protocol A showing a significantly lowered total and progressive motility (p < .05) and Protocol B showing a significant increase in chromatin decondensation (p < .05). Protocol A avoids centrifugation, reducing processing times and making application in the field simpler. However, as neither protocol showed a significant superiority over the other, studies should be carried out in vivo to evaluate the effect on pregnancy rates of the presence of collagenase and SP in semen samples prior to either cooling or freeze-thawing. © 2016 Blackwell Verlag GmbH.

  15. Validation of the Pangao PG-800A11 wrist device assessed according to the European Society of Hypertension and the British Hypertension Society protocols.

    PubMed

    Xie, Peigen; Wang, Yanling; Xu, Xiaoying; Huang, Fei; Pan, Jingru

    2015-04-01

    The objective of this study was to determine the accuracy of the Pangao PG-800A11 wrist blood pressure monitor according to the European Society of Hypertension International Protocol (ESH-IP) revision 2010 and the protocol of the British Hypertension Society (BHS). The device evaluations were performed in 85 participants, 33 of whom were included according to the ESH-IP revision 2010 and 52 of whom were included on the basis of the requirements of the BHS protocol. The validation procedure and data analysis followed the protocols precisely. The device achieved an A/A grading for the BHS protocol and passed all phases of the ESH-IP revision 2010 protocol. The mean difference ±SD for the ESH and BHS protocols, respectively, was -0.6±4.5 and -0.8±6.2 mmHg for systolic pressure and 1.2±4.6 and -0.5±5.1 mmHg for diastolic pressure. The device maintained its A/A grading throughout the low, medium, and high-pressure ranges. The Pangao PG-800A11 wrist blood pressure monitor passed all requirements of the ESH-IP revision 2010 and achieved A/A grade of the BHS protocol in an adult population.

  16. Protocols for In Vitro Mass Multiplication and Analysis of Medicinally Important Phenolics of a Salep Orchid, Satyrium nepalense D.Don ("Salam Mishri").

    PubMed

    Babbar, Shashi B; Singh, Deepak K

    2016-01-01

    Satyrium nepalense is a rare and threatened medicinal orchid, populations of which in its native habitats are dwindling because of indiscriminate collections and habitat destruction, thus necessitating the development of methods for its in situ and ex situ conservation. Because of non-endospermous nature of the seeds and the immature embryos at seed dispersal stage, orchids cannot be seed-propagated as other plants. Micropropagation, using plant tissue culture techniques, offers an effective method for the multiplication of orchids. In this chapter, a five-step efficient reproducible protocol for large-scale in vitro multiplication of Satyrium nepalense is described. The first step involves asymbiotic germination of seeds isolated from immature green pods and cultured on Mitra's medium (M) gelled with 0.8 % agar and supplemented with 2 % sucrose and 1 % peptone (hereafter referred to as basal medium, BM). On this medium, seeds start germinating after a week of culture. Protocorms developed from the seeds are sub-cultured on BM fortified with 4 μM kinetin (Kn) after 8 weeks, for shoot differentiation and multiplication. The shoots developed on Kn-supplemented medium are transferred to BM alone for their elongation for the same period. The elongated shoots are transferred to the rooting medium, comprising BM supplemented with 0.5 or 1.0 μM indole-3-butyric acid, for further 8 weeks. The regenerated plantlets are transferred to a potting mix of sand and vermiculite (1:1) for acclimatization. The tubers and leaves excised from both in vitro-developed plants and those from their native habitats are analyzed and compared for the contents and concentration of medicinally important phenolics using high-performance liquid chromatography (HPLC), details of which are provided in this chapter.

  17. Micropropagation of Pithecellobium dulce (Roxb.) Benth-a multipurpose leguminous tree and assessment of genetic fidelity of micropropagated plants using molecular markers.

    PubMed

    Goyal, Pooja; Kachhwaha, Sumita; Kothari, S L

    2012-04-01

    An efficient and reproducible protocol has been developed for in vitro propagation of Pithecellobium dulce (Roxb.) Benth (a multipurpose leguminous tree) from field grown nodal segments (axillary bud). Shoot bud induction occurred from nodal explants of 15-years-old tree on Murashige and Skoog (MS) basal medium supplemented with 4.4 μM 6-benzyladenine (BA) and multiplication was achieved on MS medium supplemented with 4.4 μM BA + 0.73 μM phenylacetic acid (PAA) i.e. up to 7 shoot buds in the period of 5-6 weeks. Addition of adenine sulphate (AdS) to this medium further enhanced the number of shoot buds up to 10. Proliferating shoot cultures were established by repeatedly subculturing primary culture on fresh medium (MS + 4.4 μM BA + 0.73 μM PAA) after every 25 days. In vitro rooting was achieved on MS medium supplemented with 2.46 μM Indole-3-butyric acid (IBA) + 41.63 μM activated charcoal (AC). The micropropagated shoots with well developed roots were acclimatized in green house in pots containing sand, soil and manure (1:1:1). Genetic stability of micropropagated clones was evaluated using Random amplified polymorphic DNA (RAPD) and Inter simple sequence repeat (ISSR) markers. The amplification products were monomorphic in micropropagated plants and similar to those of mother plant. No polymorphism was detected revealing the genetic uniformity of micropropagated plants. This is the first report of an efficient protocol for regeneration of P. dulce through organogenesis, which can be used for further genetic transformation and pharmaceutical purposes.

  18. [Comparison of the present and previously used protocol of risk stratification in children with acute lymphoblastic leukemia].

    PubMed

    Glodkowska, Eliza; Bialas, Agnieszka; Jackowska, Teresa

    2007-01-01

    Acute lymphoblastic leukaemia (ALL) is one of the most common cancers in children. In Poland, since November 2002 a new protocol of risk stratification has been recommended for assessment of risk factors and for choosing therapy regimens. assessment of accuracy of protocol ALL-IC 2002 in comparison to previously used risk stratification protocols. ALL was diagnosed in 100 children (44 girls, 56 boys; 1-18 years of age) in the Department of Pediatric Hematology and Oncology, Warsaw Medical University, over the period from November 2002 to November 2006. According to the ALL-IC 2002 protocol the patients were divided into three risk groups: SR-standard, IR-intermediate and HR-high. The stratification was by age, leukocyte count, cytogenetic changes, early response to prednisone therapy and bone marrow remission. In the previously used risk stratification protocols-BFM-90, only hepatosplenomegaly and the number of blasts in peripheral blood (PB) were considered, and the patients were divided into three risk groups: low (LRG<0.8), medium (MRG) and high (HRG>1.2). out of the 100 patients qualified for treatment regimens according to the ALL-IC 2002 protocol, 97 entered remission, 11 died and 3 had a relapse. Under the ALL-IC 2002 protocol these children were stratified into the following groups: SR-31%, IR-44% and HR-25%. In the previously used stratification, there would be 26% children in low, 46% in the medium and 28% in the high risk group. According to the BFM-90 protocol 18/31 (58%) and 16/44 (36%) patients from the SR and IR groups respectively would be given more intensive treatment. On the other hand 11/44 (25%) and 14/25 (56%) patients from the IR and HR groups respectively would be given less intensive treatment. 1. ALL-IC 2002 protocol in comparison with the previously used protocol BFM-90, changes the qualification of children with ALL for the SR, IR and HR risk groups. This is linked to basic change of treatment protocol, adequate to severity of disease. 2. Children with ALL qualified according to protocol BFM-90 for moderate risk group (IR) constitute a mixed group in the ALL-IC 2002 classification. Part of the children was moved to the standard risk group (SR), part to high risk group (HR), and the rest remains in the intermediate risk category (IR). 3. Further studies are needed on stratification validity according to ALL-IL 2002 and on the need of further modification (eg assessment of additional factors) in order to decide on the best treatment, adequate to severity of disease.

  19. A performance study of WebDav access to storages within the Belle II collaboration

    NASA Astrophysics Data System (ADS)

    Pardi, S.; Russo, G.

    2017-10-01

    WebDav and HTTP are becoming popular protocols for data access in the High Energy Physics community. The most used Grid and Cloud storage solutions provide such kind of interfaces, in this scenario tuning and performance evaluation became crucial aspects to promote the adoption of these protocols within the Belle II community. In this work, we present the results of a large-scale test activity, made with the goal to evaluate performances and reliability of the WebDav protocol, and study a possible adoption for the user analysis. More specifically, we considered a pilot infrastructure composed by a set of storage elements configured with the WebDav interface, hosted at the Belle II sites. The performance tests include a comparison with xrootd and gridftp. As reference tests we used a set of analysis jobs running under the Belle II software framework, accessing the input data with the ROOT I/O library, in order to simulate as much as possible a realistic user activity. The final analysis shows the possibility to achieve promising performances with WebDav on different storage systems, and gives an interesting feedback, for Belle II community and for other high energy physics experiments.

  20. Providing Internet Access to High-Resolution Lunar Images

    NASA Technical Reports Server (NTRS)

    Plesea, Lucian

    2008-01-01

    The OnMoon server is a computer program that provides Internet access to high-resolution Lunar images, maps, and elevation data, all suitable for use in geographical information system (GIS) software for generating images, maps, and computational models of the Moon. The OnMoon server implements the Open Geospatial Consortium (OGC) Web Map Service (WMS) server protocol and supports Moon-specific extensions. Unlike other Internet map servers that provide Lunar data using an Earth coordinate system, the OnMoon server supports encoding of data in Moon-specific coordinate systems. The OnMoon server offers access to most of the available high-resolution Lunar image and elevation data. This server can generate image and map files in the tagged image file format (TIFF) or the Joint Photographic Experts Group (JPEG), 8- or 16-bit Portable Network Graphics (PNG), or Keyhole Markup Language (KML) format. Image control is provided by use of the OGC Style Layer Descriptor (SLD) protocol. Full-precision spectral arithmetic processing is also available, by use of a custom SLD extension. This server can dynamically add shaded relief based on the Lunar elevation to any image layer. This server also implements tiled WMS protocol and super-overlay KML for high-performance client application programs.

  1. South Dakota Department of Education Data Access Policy

    ERIC Educational Resources Information Center

    South Dakota Department of Education, 2015

    2015-01-01

    The South Dakota Department of Education (DOE) collects education records from local schools and districts in accordance with federal and state laws and regulations. This policy document establishes the procedures and protocols for accessing, maintaining, disclosing, and disposing of confidential data records, including data records containing…

  2. A statistical frame based TDMA protocol for human body communication.

    PubMed

    Nie, Zedong; Li, Zhao; Huang, Renwei; Liu, Yuhang; Li, Jingzhen; Wang, Lei

    2015-07-09

    Human body communication (HBC) using the human body as the transmission medium, which has been regarded as one of the most promising short-range communications in wireless body area networks (WBAN). Compared to the traditional wireless networks, two challenges are existed in HBC based WBAN. (1) Its sensor nodes should be energy saving since it is inconvenient to replace or recharge the battery on these sensor nodes; (2) the coordinator should be able to react dynamically and rapidly to the burst traffic triggered by sensing events. Those burst traffic conditions include vital physical signal (electrocardiogram, electroencephalogram etc.) monitoring, human motion detection (fall detection, activity monitoring, gesture recognition, motion sensing etc.) and so on. To cope with aforementioned challenges, a statistical frame based TDMA (S-TDMA) protocol with multi-constrained (energy, delay, transmission efficiency and emergency management) service is proposed in this paper. The scenarios where burst traffic is often triggered rapidly with low power consumption and low delay is handled in our proposed S-TDMA. A beacon frame with the contained synchronous and poll information is designed to reduce the possibility of collisions of request frames. A statistical frame which broadcasts the unified scheduling information is adopted to avoid packet collisions, idle listening and overhearing. Dynamic time slot allocation mechanism is presented to manage the burst traffic and reduce the active period in each beacon period. An emergency mechanism is proposed for vital signals to be transmitted. The theory analysis is proceed and the result is evaluated in the hardware platform. To verify its feasibility, S-TDMA was fully implemented on our independently-developed HBC platform where four sensor nodes and a coordinator are fastened on a human body. Experiment results show that S-TDMA costs 89.397 mJ every 20 s when the payload size is 122 bytes, 9.51% lower than Lightweight MAC (LMAC); the average data latency of S-TDMA is 6.3 ms, 7.02% lower than Preamble-based TDMA (PB-TDMA); the transmission efficiency of S-TDMA is 93.67%, 4.83% higher than IEEE 802.15.6 carrier sense multiple access/collision avoidance (CSMA/CA) protocol. With respect to the challenges of HBC based WBANs, a novel S-TDMA protocol was proposed in this paper. Compared to the traditional protocols, the results demonstrate that S-TDMA successfully meets the delay and transmission efficiency requirements of HBC while keeping a low energy consumption. We also believe that our S-TDMA protocol will promote development of HBC in wearable applications.

  3. Diagnostic and Therapeutic Knowledge and Practices in the Management of Congenital Syphilis by Pediatricians in Public Maternity Hospitals in Brazil.

    PubMed

    Dos Santos, Raquel Rodrigues; Niquini, Roberta Pereira; Bastos, Francisco Inácio; Domingues, Rosa Maria Soares Madeira

    2017-01-01

    The study aimed to assess conformity with Brazil's standard protocol for diagnostic and therapeutic practices in the management of congenital syphilis by pediatricians in public maternity hospitals. A cross-sectional study was conducted in 2015 with 41 pediatricians working in all the public maternity hospitals in Teresina, the capital of Piauí State, Northeast Brazil, through self-completed questionnaires. The study assessed the conformity of knowledge and practices according to the Brazilian Ministry of Health protocols. The study has made evident low access to training courses (54%) and insufficient knowledge of the case definition of congenital syphilis (42%) and rapid tests for syphilis (39%). Flaws were observed in the diagnostic workup and treatment of newborns. Requesting VDRL (88%) and correct treatment of neurosyphilis (88%) were the practices that showed the highest conformity with standard protocols. Low conformity with protocols leads to missed opportunities for identifying and adequately treating congenital syphilis. Based on the barriers identified in the study, better access to diagnostic and treatment protocols, improved recording on prenatal cards and hospital patient charts, availability of tests and medicines, and educational work with pregnant women should be urgently implemented, aiming to reverse the currently inadequate management of congenital syphilis and to curb its spread.

  4. Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks

    PubMed Central

    2017-01-01

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle’s safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given. PMID:29231882

  5. Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks.

    PubMed

    Song, Caixia

    2017-12-12

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle's safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given.

  6. Intelligent Cooperative MAC Protocol for Balancing Energy Consumption

    NASA Astrophysics Data System (ADS)

    Wu, S.; Liu, K.; Huang, B.; Liu, F.

    To extend the lifetime of wireless sensor networks, we proposed an intelligent balanced energy consumption cooperative MAC protocol (IBEC-CMAC) based on the multi-node cooperative transmission model. The protocol has priority to access high-quality channels for reducing energy consumption of each transmission. It can also balance the energy consumption among cooperative nodes by using high residual energy nodes instead of excessively consuming some node's energy. Simulation results show that IBEC-CMAC can obtain longer network lifetime and higher energy utilization than direct transmission.

  7. On Alarm Protocol in Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Cichoń, Jacek; Kapelko, Rafał; Lemiesz, Jakub; Zawada, Marcin

    We consider the problem of efficient alarm protocol for ad-hoc radio networks consisting of devices that try to gain access for transmission through a shared radio communication channel. The problem arise in tasks that sensors have to quickly inform the target user about an alert situation such as presence of fire, dangerous radiation, seismic vibrations, and more. In this paper, we present a protocol which uses O(logn) time slots and show that Ω(logn/loglogn) is a lower bound for used time slots.

  8. Device USB interface and software development for electric parameter measuring instrument

    NASA Astrophysics Data System (ADS)

    Li, Deshi; Chen, Jian; Wu, Yadong

    2003-09-01

    Aimed at general devices development, this paper discussed the development of USB interface and software development. With an example, using PDIUSBD12 which support parallel interface, the paper analyzed its technical characteristics. Designed different interface circuit with 80C52 singlechip microcomputer and TMS320C54 series digital signal processor, analyzed the address allocation, register access. According to USB1.1 standard protocol, designed the device software and application layer protocol. The paper designed the data exchange protocol, and carried out system functions.

  9. Report: Results of Technical Network Vulnerability Assessment: EPA’s Andrew W. Breidenbach Environmental Research Center

    EPA Pesticide Factsheets

    Report #10-P-0210, September 7, 2010. Vulnerability testing of EPA’s Andrew W. Breidenbach Environmental Research Center network conducted in June 2010 identified Internet Protocol addresses with numerous high-risk and medium-risk vulnerabilities.

  10. Optimization of an efficient semi-solid culture protocol for sterilization and plant regeneration of Centella asiatica (L.) as a medicinal herb.

    PubMed

    Moghaddam, Sina Siavash; Jaafar, Hawa Binti; Aziz, Maheran Abdul; Ibrahim, Rusli; Rahmat, Asmah Bt; Philip, Elizabeth

    2011-01-01

    The present study investigates the effects of different concentrations, as well as type of plant growth regulators (PGRs) and medium (MS, Duchefa) on the growth and development of Centella asiatica in semi-solid culture. In addition, a protocol for successful sterilization of C.asiatica explants prepared from field-grown plants highly exposed to fungal and bacterial contamination was determined. Results for sterilization treatments revealed that applying HgCl₂ and Plant Preservative Mixture (PPM) with cetrimide, bavistin and trimethoprim which were included after washing with tap water, followed by the addition of PPM in the medium, produced a very satisfactory result (clean culture 90 ± 1.33%) and TS5 (decon + cetrimide 1% + bavistin 150 mg/L + trimethoprim 50 mg/L + HgCl₂0.1% + PPM 2% soak and 2 mL/L in medium) was hence chosen as the best method of sterilization for C.asiatica. The synergistic combination of 6 benzylaminopurine (BAP) and 1-naphthaleneacetic acid (NAA) in concentrations of 2 mg/L and 0.1 mg/L, respectively, in Duchefa medium compared with MS induced the most optimal percentage of sprouted shoots (93 ± 0.667), number of shoots (5.2 ± 0.079) and nodes (4 ± 0.067) per explant, leaf per explant (14 ± 0.107) and shoot length (4.1 ± 0.67 cm). Furthermore, optimum rooting frequency (95.2 ± 0.81%), the number of roots/shoot (7.5 ± 0.107) and the mean root length (4.5 ± 0.133 cm) occurred for shoots that were cultured on full-strength MS medium containing 0.5 mg/L indole-3-butyric acid (IBA). In this study, the acclimatized plantlets were successfully established with almost 85% survival. The findings of this study have proven an efficient medium and PGR concentration for the mass propagation of C.asiatica. These findings would be useful in micropropagation and ex situ conservation of this plant.

  11. Effects of preincubation of eggs and activation medium on the percentage of eyed embryos in ide (Leuciscus idus), an externally fertilizing fish.

    PubMed

    Siddique, Mohammad Abdul Momin; Linhart, Otomar; Krejszeff, Sławomir; Żarski, Daniel; Król, Jarosław; Butts, Ian Anthony Ernest

    2016-03-15

    Standardization of fertilization protocols is crucial for improving reproductive techniques for externally fertilizing fish in captive breeding. Therefore, the objectives of this study were to determine the effects of preincubation of eggs and activation medium on the percentage of eyed embryos for ide (Leuciscus idus). Pooled eggs from five females were preincubated in three different activating media for 0, 30, 60, 90, and 120 seconds and then fertilized by pooled sperm from five males. At the eyed-egg stage, the percentage of viable embryos was later calculated. Results showed that preincubation time was significant for the freshwater activation medium (P < 0.001), such that the percentage of eyed embryos declined across the preincubation time gradient. Additionally, there was an effect on the percentage of eyed embryos when eggs were incubated with Woynarovich solution (P < 0.001), such that a decline was detected at 90 seconds, whereas no effect was detected for the saline water medium. Activating medium had a significant effect on the percentage of eyed embryos for each preincubation time (P < 0.05). More precisely, freshwater produced the lowest percentage of eyed embryos at all preincubation times (ranged from 1.9% at 120 seconds to 43.6% at 0 seconds), whereas saline water and Woynarovich solution produced the highest percentage of eyed embryos at 0 seconds and 30 seconds before incubation. Woynarovich solution produced the highest percentage of eyed embryos at 60 seconds (65.26%), whereas saline water produced the highest percentage at 90 seconds (68.37%). No difference was detected between saline water and Woynarovich solution at 120 seconds. Examination of sperm traits showed no impact of activating medium on computer assisted sperm analysis parameters. Together, these results suggest that saline water or Woynarovich solution improve fertilization rate in ide during IVF; thus, these media are useful for standardizing fertilization protocols and controlled reproduction for this species. Copyright © 2016 Elsevier Inc. All rights reserved.

  12. Pullman transportation plan : a transportation and access plan for Pullman National Monument and the surrounding neighborhood

    DOT National Transportation Integrated Search

    2017-09-01

    The Pullman Transportation Plan provides a holistic set of recommendations to improve access to and from Pullman National Monument and its surrounding neighborhoods for both visitors and residents. In this plan, we identify short-, medium-, and long-...

  13. Effects of cryoprotectant agents and freezing protocol on motility of black-lip pearl oyster (Pinctada margaritifera L.) spermatozoa.

    PubMed

    Acosta-Salmón, Héctor; Jerry, Dean R; Southgate, Paul C

    2007-02-01

    Gamete cryopreservation techniques have been applied to several bivalve mollusc species. However, research activity in this area has primarily focused on cryopreserving gametes from edible oysters (Ostreiidae). Few studies have examined the effect of cryoprotectants and freezing protocols in the preservation of spermatozoa from cultured pearl oysters (Pteriidae). Pearl oyster producers are increasingly looking towards the development of improved family lines and, as a consequence, the ability to cryopreserve gametes would bring about significant benefits to the cultured pearl industry. In response to this need, we evaluated the effect of three cryoprotectant additives (CPA) on motility of spermatozoa from the black-lip pearl oyster, Pinctada margaritifera. These additives have previously been used to cryopreserve gametes of other bivalve species. The following CPA mixtures were evaluated: (1) 0.45M trehalose and 0, 0.64, 1.02 and 1.53 M dimethyl sulfoxide (Me(2)SO); (2) 0.2M glucose and 2M Me(2)SO and (3) 1.31 M propylene glycol (PG). The effects of four different freezing protocols on motility of P. margaritifera spermatozoa were also evaluated (slow, medium, medium-rapid and rapid cooling). This study showed that total motility was best retained when spermatozoa were cryopreserved in 0.45 M trehalose and 0, 0.64, 1.02 or 1.53 M Me(2)SO and frozen using slow to medium-rapid cooling rates (2.1-5.2 degrees Cmin(-1)). Rapid freezing through direct plunging of spermatozoa into liquid nitrogen resulted in the lowest overall retention of motility regardless of the CPA additive; however, CPA mixture also influenced retention of motility, with 0.2M glucose in 2M Me(2)SO and 1.31 M PG retaining the lowest levels of motility for the CPAs evaluated.

  14. An effective protocol for micropropagation of edible bamboo species (Bambusa tulda and Melocanna baccifera) through nodal culture.

    PubMed

    Waikhom, Sayanika Devi; Louis, Bengyella

    2014-01-01

    High demand for edible bamboo shoots of Bambusa tulda and Melocanna baccifera in many Asian ethnic groups has led to the need for developing intensive bamboo farming. To achieve this, in vitro regeneration of bamboo plantlets is needed due to the long and irregular bamboo flowering cycle and scarcity of bamboo seeds. An effective protocol for plantlets regeneration in B. tulda and M. baccifera from nodal explants following validation of the species using the sequence of trnL-F intergenic spacer region is described. Effective axillary bud breaking was achieved at 3 mg/L of 6-benzylaminopurine (BAP) in MS medium. Importantly, combining 2 mg/L of kinetin (Kn) with 3 mg/L of BAP produced a synergistic effect for shoot multiplication in B. tulda and M. baccifera. Under optimized conditions in half-strength MS medium supplemented with 3 mg/L of indole-3-butyric acid (IBA), 10 mg/L of coumarin, and 3% sucrose, profuse production of dark-brown rhizome in B. tulda and abundant rooting (81.67%, P < 0.05, F = 15.46) for M. baccifera within 30 days were achieved. The established protocol and the validation of the reported species at the molecular level will be of help to stakeholders in edible bamboo trade to conserve gene-pool and increase productivity.

  15. Diagnosis of brucellosis by using blood cultures.

    PubMed Central

    Ruiz, J; Lorente, I; Pérez, J; Simarro, E; Martínez-Campos, L

    1997-01-01

    The performances of three blood culture systems, Hemoline performance diphasic medium (bioMérieux, Marcy l'Etoile, France), Bactec Plus Aerobic/F* (Becton Dickinson, Paramus, N.J.), and Vital Aer (bioMérieux), were compared for the diagnosis of 17 cases of brucellosis. By using a 5-day incubation protocol, positive results were 52.9, 82.4, and 11.8%, respectively. When the protocol was extended to 7 days, the results were 76.5, 94.1, and 47.1%, respectively. Bactec was the fastest system (P < 0.05). PMID:9276429

  16. MRI of penile fracture: what should be a tailored protocol in emergency?

    PubMed

    Esposito, Andrea Alessandro; Giannitto, Caterina; Muzzupappa, Claudia; Maccagnoni, Sara; Gadda, Franco; Albo, Giancarlo; Biondetti, Pietro Raimondo

    2016-09-01

    To conduct a review of literature to summarize the existing MRI protocols for penile trauma, suggesting a tailored protocol to reduce costs and time of examination. A systematic search was performed in Medline, Embase, Cochrane Library, and Cinahl databases from 1995 to 2015 to identify studies evaluating penis trauma with MRI examination. Studies were included if there was the description of MRI protocol with at least sequences and orthogonal planes used. We chose a systematic approach for data extraction and descriptive synthesis. 12 articles were included in our study. Among the list of 12 articles: 2 were case reports, 3 were clinical series, and 7 were reviews. Clinical trials were not found. There is no unanimous consensus among the authors. Summarizing the data, the most used protocol is characterized by T2 sequences in three orthogonal planes plus T1 sequences in one plane (either axial or sagittal) without contrast medium injection. There is a lack of a standard protocol. A tailored protocol to answer the diagnostic question, reducing costs and time of examination, is characterized by T2 sequences in three orthogonal planes plus at least a T1 sequence (either axial or sagittal plane).

  17. Cislan-2 extension final document by University of Twente (Netherlands)

    NASA Astrophysics Data System (ADS)

    Niemegeers, Ignas; Baumann, Frank; Beuwer, Wim; Jordense, Marcel; Pras, Aiko; Schutte, Leon; Tracey, Ian

    1992-01-01

    Results of worked performed under the so called Cislan extension contract are presented. The adaptation of the Cislan 2 prototype design to an environment of interconnected Local Area Networks (LAN's) instead of a single 802.5 token ring LAN is considered. In order to extend the network architecture, the Interconnection Function (IF) protocol layer was subdivided into two protocol layers: a new IF layer, and below the Medium Enhancement (ME) protocol layer. Some small enhancements to the distributed bandwidth allocation protocol were developed, which in fact are also applicable to the 'normal' Cislan 2 system. The new services and protocols are described together with some scenarios and requirements for the new internetting Cislan 2 system. How to overcome the degradation of the quality of speech due to packet loss on the LAN subsystem was studied. Experiments were planned in order to measure this speech quality degradation. Simulations were performed of two Cislan subsystems, the bandwidth allocation protocol and the clock synchronization mechanism. Results on both simulations, performed on SUN workstations using QNAP as a simulation tool, are given. Results of the simulations of the clock synchronization mechanism, and results of the simulation of the distributed bandwidth allocation protocol are given.

  18. Cultivating Conditions for Access: A Case for "Case-Making" in Graduate Student Preparation for Interdisciplinary Research

    ERIC Educational Resources Information Center

    Hannah, Mark A.; Arreguin, Alex

    2017-01-01

    Gaining access to interdisciplinary research sites poses unique research challenges to technical and professional communication scholars and practitioners. Drawing on applied experiences in externally funded interdisciplinary research projects and scholarship about interdisciplinary research, this article describes a training protocol for…

  19. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... substance prescriptions and who has obtained a two-factor authentication credential as provided in § 1311... his two-factor authentication credential to satisfy the logical access controls. The second individual... authentication factor required by the two-factor authentication protocol is lost, stolen, or compromised. Such...

  20. Remote Patron Validation: Posting a Proxy Server at the Digital Doorway.

    ERIC Educational Resources Information Center

    Webster, Peter

    2002-01-01

    Discussion of remote access to library services focuses on proxy servers as a method for remote access, based on experiences at Saint Mary's University (Halifax). Topics include Internet protocol user validation; browser-directed proxies; server software proxies; vendor alternatives for validating remote users; and Internet security issues. (LRW)

  1. Techtalk: Telecommunications for Improving Developmental Education.

    ERIC Educational Resources Information Center

    Caverly, David C.; Broderick, Bill

    1993-01-01

    Explains how to access the Internet, discussing hardware and software considerations, connectivity, and types of access available to users. Describes the uses of electronic mail; TELNET, a method for remotely logging onto another computer; and anonymous File Transfer Protocol (FTP), a method for downloading files from a remote computer. (MAB)

  2. The University of Minnesota's Internet Gopher System: A Tool for Accessing Network-Based Electronic Information.

    ERIC Educational Resources Information Center

    Wiggins, Rich

    1993-01-01

    Describes the Gopher system developed at the University of Minnesota for accessing information on the Internet. Highlights include the need for navigation tools; Gopher clients; FTP (File Transfer Protocol); campuswide information systems; navigational enhancements; privacy and security issues; electronic publishing; multimedia; and future…

  3. Results of the 2009 ASBVd survey of avocado accessions in the national germplasm collection in Florida

    USDA-ARS?s Scientific Manuscript database

    The presence of Avocado Sunblotch Viroid (ASBVd) infection among the avocado (Persea americana Mill.) accessions in the National Germplasm Repository at Miami (NGR-Mia) was established in previous studies. An ASBVd specific reverse transcription-polymerase chain reaction (RT-PCR) protocol was used t...

  4. A simple and efficient protocol for the mass propagation of Cymbidium mastersii: an ornamental orchid of Northeast India

    PubMed Central

    Mohanty, Padmaja; Paul, Sumi; Das, Meera C.; Kumaria, Suman; Tandon, Pramod

    2012-01-01

    Background and aims Cymbidium mastersii is an epiphytic orchid distributed mainly in Northeast India. Owing to its high commercial value in the floricultural industry, natural populations are under threat from over-exploitation. Mass propagation provides an alternative means of satisfying the demand. Unfortunately, conventional propagation is slow and difficult, suggesting in vitro methods for mass multiplication may be more appropriate. The objective of this study was to develop an efficient protocol. Methodology and principal results Four nutrient media were evaluated for seed germination and early protocorm development: Murashige and Skoog (MS), half-strength MS, Knudson ‘C’ (KC), and Vacin and Went (VW). In addition, the effects of plant growth regulators 6-benzylaminopurine (BAP), kinetin (KN), α-naphthalene acetic acid (NAA) and indole-3-butyric acid (IBA) were studied alone and in combination. The maximum percentage seed germination (93.58 ± 0.56) was obtained in MS basal medium after 8–9 weeks of culture. Secondary protocorms (protocorm-like bodies) were developed from primary protocorms on MS medium fortified with different concentrations and combinations of cytokinins (BAP and KN) and auxins (NAA and IBA). The highest numbers of secondary protocorms (20.55 ± 0.62)/primary protocorms were obtained in MS medium supplemented with 5.0 µM BAP and 2.5 µM NAA. The most effective auxin source promoting root production (7.46 ± 0.09 per shoot) was 10.0 µM IBA. The plants were acclimatized effectively (survival percentage 88 %) in a greenhouse using a rooting medium of crushed sterile brick and charcoal (1 : 1 v/v) and vermicompost (leaf litter + cow dung, 1 : 1 v/v). Conclusions An efficient protocol was established for in vitro propagation of C. mastersii using seed as the starting material. The percentage seed germination varied with the composition of the nutrient media and was highest in full-strength MS basal medium. The number of secondary protocorms that developed from primary protocorms was increased by the addition of 5.0 µM BAP and 2.5 µM NAA. In vitro raised plantlets acclimatized in a greenhouse were closely similar to the mother plants in morphology. PMID:22997547

  5. Factors Affecting the Implementation of Sheltered Instruction Observation Protocols for English Language Learners

    ERIC Educational Resources Information Center

    Calderon, Carlos Trevino

    2012-01-01

    The purpose of this sequential mixed methods case study was to explore the role of a teacher's attitude towards Sheltered Instruction Observation Protocols (SIOP) and how those attitudes affect the program's effectiveness. SIOP is a program designed to mitigate the effects of limited English proficiency and promote equal access to the curriculum…

  6. Accessing English and Networks at an English-Medium Multicultural Church in East Canada: An Ethnography

    ERIC Educational Resources Information Center

    Han, Huamei

    2014-01-01

    Drawing from a larger ethnography of skilled Chinese immigrants' language learning during settlement in Toronto, this article explores the role of informal interactions in facilitating immigrants learning English as a second language and settlement. Examining various activities and networks available at an English-medium multicultural church, this…

  7. A rapid and efficient in vitro regeneration system for lettuce (Lactuca sativa L.).

    PubMed

    Armas, Isabel; Pogrebnyak, Natalia; Raskin, Ilya

    2017-01-01

    Successful biotechnological improvement of crop plants requires a reliable and efficient in vitro regeneration system. Lettuce ( Lactuca sativa L.), one the most important vegetable crops worldwide, is strongly genotype-dependent in terms of regeneration capacity, limiting the potential for biotechnological improvement of cultivars which show recalcitrance under currently available protocols. The effect of different nutrient sources, plant hormone combinations and activated charcoal supplementation on shoot induction efficiency was evaluated on the cultivar 'RSL NFR', which had previously shown poor regeneration efficiency. Multiple shoot organogenesis from cotyledon explants was recorded at the highest frequency and speed on Murashige and Skoog regeneration medium supplemented with 200 mg/l of activated charcoal, 3% sucrose, 10 mg/l benzylaminopurine and 0.5 mg/l naphthaleneacetic acid, which induced shoots through direct regeneration in 90.8 ± 7.9% of explants. High shoot induction efficiency was also observed, albeit not quantified, when using this medium on some other cultivars. This activated charcoal-containing regeneration medium might offer a rapid and efficient option for direct shoot induction in some lettuce genotypes that do not respond well to common lettuce regeneration protocols. This is also the first report of the effect of activated charcoal in lettuce tissue culture.

  8. RAPD and ISSR based evaluation of genetic stability of micropropagated plantlets of Morus alba L. variety S-1

    PubMed Central

    Saha, Soumen; Adhikari, Sinchan; Dey, Tulsi; Ghosh, Parthadeb

    2015-01-01

    Plant regeneration through rapid in vitro clonal propagation of nodal explants of Morus alba L. variety S-1 was established along with genetic stability analysis of regenerates. Axillary shoot bud proliferation was achieved on Murashige and Skoog (MS) medium in various culture regimes. Highest number of shoots (5.62 ± 0.01), with average length 4.19 ± 0.01 cm, was initially achieved with medium containing 0.5 mg/l N6-benzyladenine (BA) and 3% sucrose. Repeated subculturing of newly formed nodal parts after each harvest up to sixth passage, yielded highest number of shoots (about 32.27) per explants was obtained after fourth passage. Rooting of shoots occurred on 1/2 MS medium supplemented with 1.0 mg/1 Indole-3-butyric acid (IBA). About 90% (89.16) of the plantlets transferred to the mixture of sand:soil:organic manure (2:2:1) in small plastic pots acclimatized successfully. Genetic stability of the discussed protocol was confirmed by two DNA-based fingerprinting techniques i.e. RAPD (random amplified polymorphic DNA) and ISSR (inter-simple sequence repeat). This protocol can be used for commercial propagation and for future genetic improvement studies. PMID:26693403

  9. Controlling Hyperhydricity in Date Palm In Vitro Culture by Reduced Concentration of Nitrate Nutrients.

    PubMed

    El-Dawayati, Maiada M; Zayed, Zeinab E

    2017-01-01

    Hyperhydricity (or vitrification) is a fundamental physiological disorder in date palm micropropagation. Several factors have been ascribed as being responsible for hyperhydricity, which are related to the explant, medium, culture vessel, and environment. The optimization of inorganic nutrients in the culture medium improves in vitro growth and morphogenesis, in addition to controlling hyperhydricity. This chapter describes a protocol for controlling hyperhydricity during the embryogenic callus stage by optimizing the ratio of nitrogen salts of the Murashige and Skoog (MS) nutrient culture medium. The best results of differentiation from cured hyperhydric callus are obtained using modification at a ratio of NH 4+ /NO 3- at 10:15 (825:1425 mg/L) of the MS culture medium to remedy hyperhydric date palm callus and achieve the recovery of normal embryogenic callus and subsequent regeneration of plantlets. Based on the results of this study, nutrient medium composition has an important role in avoiding hyperhydricity problems during date palm micropropagation.

  10. Mass propagation of Rauwolfia serpentina L. Benth.

    PubMed

    Salma, U; Rahman, M S M; Islam, S; Haque, N; Khatun, M; Jubair, T A; Paul, B C

    2008-05-01

    A protocol for mass propagation through axillary bud proliferation was established for Rauwolfia serpentina L. Benth. (Apocynaceae). MS medium supplemented with 1.5 mg L(-1) BA and 0.2 mg L(-1) NAA elicited the maximum number of shoots (4 multiple shoots) from nodal explants. These adventitious shoots were best rooted on half strength MS medium supplemented with 1.0 mg L(-1) each of IBA and IAA. The in vitro raised plants were acclimatized in glass house and successfully transplanted to field condition with almost 95% survival.

  11. The Impact of Language on Educational Access in South Africa. CREATE Pathways to Access. Research Monograph No. 24

    ERIC Educational Resources Information Center

    Lafon, Michel

    2009-01-01

    The role of Medium of Instruction or Language of Learning and Teaching has not received sufficient attention as a factor denying meaningful access to education in South Africa. Yet the majority of under-performing learners are also children who learn in a language that is not their mother-tongue. This research aims to assess how recent language…

  12. In-memory interconnect protocol configuration registers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cheng, Kevin Y.; Roberts, David A.

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mappingmore » decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.« less

  13. An optimized framework for quantitative magnetization transfer imaging of the cervical spinal cord in vivo

    PubMed Central

    Grussu, Francesco; Ianus, Andrada; Schneider, Torben; Prados, Ferran; Fairney, James; Ourselin, Sebastien; Alexander, Daniel C.; Cercignani, Mara; Gandini Wheeler‐Kingshott, Claudia A.M.; Samson, Rebecca S.

    2017-01-01

    Purpose To develop a framework to fully characterize quantitative magnetization transfer indices in the human cervical cord in vivo within a clinically feasible time. Methods A dedicated spinal cord imaging protocol for quantitative magnetization transfer was developed using a reduced field‐of‐view approach with echo planar imaging (EPI) readout. Sequence parameters were optimized based in the Cramer‐Rao‐lower bound. Quantitative model parameters (i.e., bound pool fraction, free and bound pool transverse relaxation times [ T2F, T2B], and forward exchange rate [k FB]) were estimated implementing a numerical model capable of dealing with the novelties of the sequence adopted. The framework was tested on five healthy subjects. Results Cramer‐Rao‐lower bound minimization produces optimal sampling schemes without requiring the establishment of a steady‐state MT effect. The proposed framework allows quantitative voxel‐wise estimation of model parameters at the resolution typically used for spinal cord imaging (i.e. 0.75 × 0.75 × 5 mm3), with a protocol duration of ∼35 min. Quantitative magnetization transfer parametric maps agree with literature values. Whole‐cord mean values are: bound pool fraction = 0.11(±0.01), T2F = 46.5(±1.6) ms, T2B = 11.0(±0.2) µs, and k FB = 1.95(±0.06) Hz. Protocol optimization has a beneficial effect on reproducibility, especially for T2B and k FB. Conclusion The framework developed enables robust characterization of spinal cord microstructure in vivo using qMT. Magn Reson Med 79:2576–2588, 2018. © 2017 The Authors Magnetic Resonance in Medicine published by Wiley Periodicals, Inc. on behalf of International Society for Magnetic Resonance in Medicine. This is an open access article under the terms of the Creative Commons Attribution License, which permits use, distribution and reproduction in any medium, provided the original work is properly cited. PMID:28921614

  14. Recent improvements in the NASA technical report server

    NASA Technical Reports Server (NTRS)

    Maa, Ming-Hokng; Nelson, Michael L.

    1995-01-01

    The NASA Technical Report Server (NTRS), a World Wide Web (WWW) report distribution service, has been modified to allow parallel database queries, significantly decreasing user access time by an average factor of 2.3, access from clients behind firewalls and/or proxies which truncate excessively long Uniform Resource Locators (URL's), access to non-Wide Area Information Server (WAIS) databases, and compatibility with the Z39-50.3 protocol.

  15. Early Access to the Cardiac Catheterization Laboratory for Patients Resuscitated From Cardiac Arrest Due to a Shockable Rhythm: The Minnesota Resuscitation Consortium Twin Cities Unified Protocol.

    PubMed

    Garcia, Santiago; Drexel, Todd; Bekwelem, Wobo; Raveendran, Ganesh; Caldwell, Emily; Hodgson, Lucinda; Wang, Qi; Adabag, Selcuk; Mahoney, Brian; Frascone, Ralph; Helmer, Gregory; Lick, Charles; Conterato, Marc; Baran, Kenneth; Bart, Bradley; Bachour, Fouad; Roh, Steven; Panetta, Carmelo; Stark, Randall; Haugland, Mark; Mooney, Michael; Wesley, Keith; Yannopoulos, Demetris

    2016-01-07

    In 2013 the Minnesota Resuscitation Consortium developed an organized approach for the management of patients resuscitated from shockable rhythms to gain early access to the cardiac catheterization laboratory (CCL) in the metro area of Minneapolis-St. Paul. Eleven hospitals with 24/7 percutaneous coronary intervention capabilities agreed to provide early (within 6 hours of arrival at the Emergency Department) access to the CCL with the intention to perform coronary revascularization for outpatients who were successfully resuscitated from ventricular fibrillation/ventricular tachycardia arrest. Other inclusion criteria were age >18 and <76 and presumed cardiac etiology. Patients with other rhythms, known do not resuscitate/do not intubate, noncardiac etiology, significant bleeding, and terminal disease were excluded. The primary outcome was survival to hospital discharge with favorable neurological outcome. Patients (315 out of 331) who were resuscitated from VT/VF and transferred alive to the Emergency Department had complete medical records. Of those, 231 (73.3%) were taken to the CCL per the Minnesota Resuscitation Consortium protocol while 84 (26.6%) were not taken to the CCL (protocol deviations). Overall, 197 (63%) patients survived to hospital discharge with good neurological outcome (cerebral performance category of 1 or 2). Of the patients who followed the Minnesota Resuscitation Consortium protocol, 121 (52%) underwent percutaneous coronary intervention, and 15 (7%) underwent coronary artery bypass graft. In this group, 151 (65%) survived with good neurological outcome, whereas in the group that did not follow the Minnesota Resuscitation Consortium protocol, 46 (55%) survived with good neurological outcome (adjusted odds ratio: 1.99; [1.07-3.72], P=0.03). Early access to the CCL after cardiac arrest due to a shockable rhythm in a selected group of patients is feasible in a large metropolitan area in the United States and is associated with a 65% survival rate to hospital discharge with a good neurological outcome. © 2016 The Authors. Published on behalf of the American Heart Association, Inc., by Wiley Blackwell.

  16. Glutathione promoted expeditious green synthesis of silver nanoparticles in water using microwaves

    EPA Science Inventory

    Silver nanoparticles with size range 5-10 nm has been synthesized under microwave irradiation conditions using gluathione, an absolutely benign antioxidant that serves as the reducing as well as capping agent in aqueous medium. This rapid protocol yields the nanoparticles within ...

  17. MICROWAVE-ASSISTED SYNTHESIS OF NITROGEN AND OXYGEN CONTAINING HETEROCYCLES IN AQUEOUS MEDIUM

    EPA Science Inventory

    Pharmaceutical scientists are required to generate diverse arrays of complex targets in short periods of time. A primary driver of organic chemistry is, therefore, the development of efficient and environmentally benign synthetic protocols. This can be achieved via the selection ...

  18. Multi-Bit Quantum Private Query

    NASA Astrophysics Data System (ADS)

    Shi, Wei-Xu; Liu, Xing-Tong; Wang, Jian; Tang, Chao-Jing

    2015-09-01

    Most of the existing Quantum Private Queries (QPQ) protocols provide only single-bit queries service, thus have to be repeated several times when more bits are retrieved. Wei et al.'s scheme for block queries requires a high-dimension quantum key distribution system to sustain, which is still restricted in the laboratory. Here, based on Markus Jakobi et al.'s single-bit QPQ protocol, we propose a multi-bit quantum private query protocol, in which the user can get access to several bits within one single query. We also extend the proposed protocol to block queries, using a binary matrix to guard database security. Analysis in this paper shows that our protocol has better communication complexity, implementability and can achieve a considerable level of security.

  19. Defined Medium Conditions for the Induction and Expansion of Human Pluripotent Stem Cell-Derived Retinal Pigment Epithelium.

    PubMed

    Lidgerwood, Grace E; Lim, Shiang Y; Crombie, Duncan E; Ali, Ray; Gill, Katherine P; Hernández, Damián; Kie, Josh; Conquest, Alison; Waugh, Hayley S; Wong, Raymond C B; Liang, Helena H; Hewitt, Alex W; Davidson, Kathryn C; Pébay, Alice

    2016-04-01

    We demonstrate that a combination of Noggin, Dickkopf-1, Insulin Growth Factor 1 and basic Fibroblast Growth Factor, promotes the differentiation of human pluripotent stem cells into retinal pigment epithelium (RPE) cells. We describe an efficient one-step approach that allows the generation of RPE cells from both human embryonic stem cells and human induced pluripotent stem cells within 40-60 days without the need for manual excision, floating aggregates or imbedded cysts. Compared to methods that rely on spontaneous differentiation, our protocol results in faster differentiation into RPE cells. This pro-retinal culture medium promotes the growth of functional RPE cells that exhibit key characteristics of the RPE including pigmentation, polygonal morphology, expression of mature RPE markers, electrophysiological membrane potential and the ability to phagocytose photoreceptor outer segments. This protocol can be adapted for feeder, feeder-free and serum-free conditions. This method thereby provides a rapid and simplified production of RPE cells for downstream applications such as disease modelling and drug screening.

  20. A hash based mutual RFID tag authentication protocol in telecare medicine information system.

    PubMed

    Srivastava, Keerti; Awasthi, Amit K; Kaul, Sonam D; Mittal, R C

    2015-01-01

    Radio Frequency Identification (RFID) is a technology which has multidimensional applications to reduce the complexity of today life. Everywhere, like access control, transportation, real-time inventory, asset management and automated payment systems etc., RFID has its enormous use. Recently, this technology is opening its wings in healthcare environments, where potential applications include patient monitoring, object traceability and drug administration systems etc. In this paper, we propose a secure RFID-based protocol for the medical sector. This protocol is based on hash operation with synchronized secret. The protocol is safe against active and passive attacks such as forgery, traceability, replay and de-synchronization attack.

  1. Simultaneous validation of the Grandway MD2301 digital automatic blood pressure monitor by the British Hypertension Society and the Association for the Advancement of Medical Instrumentation/the International Organization for Standardization protocols.

    PubMed

    Huang, Jinhua; Wang, Yun; Liu, Zhaoying; Wang, Yuling

    2017-02-01

    The aim of this study was to determine the accuracy of the Grandway MD2301 digital automatic blood pressure monitor by the British Hypertension Society (BHS) and the Association for the Advancement of Medical Instrumentation (AAMI)/the International Organization for Standardization (ISO) protocols. A total of 85 participants were included for evaluation based on the requirements of the BHS and the AAMI/ISO protocols. The validation procedure and data analysis followed the protocols precisely. The device achieved A/A grading for the BHS protocol and maintained A/A grading throughout the low, medium and high blood pressure ranges. The device also fulfilled the requirement of the AAMI/ISO protocol with device-observer differences of -0.9±5.6 and 0.8±5.2 mmHg for systolic and diastolic blood pressure, respectively, for criterion 1, and -0.9±4.7 and 0.8±4.2 mmHg, respectively, for criterion 2. The Grandway MD2301 digital automatic blood pressure monitor achieved A/A grade of the BHS protocol and passed the requirements of the AAMI/ISO protocol in adults.

  2. Insecurity of Wireless Networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sheldon, Frederick T; Weber, John Mark; Yoo, Seong-Moo

    Wireless is a powerful core technology enabling our global digital infrastructure. Wi-Fi networks are susceptible to attacks on Wired Equivalency Privacy, Wi-Fi Protected Access (WPA), and WPA2. These attack signatures can be profiled into a system that defends against such attacks on the basis of their inherent characteristics. Wi-Fi is the standard protocol for wireless networks used extensively in US critical infrastructures. Since the Wired Equivalency Privacy (WEP) security protocol was broken, the Wi-Fi Protected Access (WPA) protocol has been considered the secure alternative compatible with hardware developed for WEP. However, in November 2008, researchers developed an attack on WPA,more » allowing forgery of Address Resolution Protocol (ARP) packets. Subsequent enhancements have enabled ARP poisoning, cryptosystem denial of service, and man-in-the-middle attacks. Open source systems and methods (OSSM) have long been used to secure networks against such attacks. This article reviews OSSMs and the results of experimental attacks on WPA. These experiments re-created current attacks in a laboratory setting, recording both wired and wireless traffic. The article discusses methods of intrusion detection and prevention in the context of cyber physical protection of critical Internet infrastructure. The basis for this research is a specialized (and undoubtedly incomplete) taxonomy of Wi-Fi attacks and their adaptations to existing countermeasures and protocol revisions. Ultimately, this article aims to provide a clearer picture of how and why wireless protection protocols and encryption must achieve a more scientific basis for detecting and preventing such attacks.« less

  3. [Venous access in oncology].

    PubMed

    Lesimple, T; Béguec, J F; Levêque, J M

    1998-10-31

    Many treatments administered to cancer patients require venous access either via a peripheral vein or a larger central vein at the risk of local or systemic infection, thrombus formation or venous occlusion and dysfunction. Insertion of a central catheter is an invasive procedure which must be conducted under conditions of rigorous asepsia. Strict rules based on well-defined protocols must be applied throughout its use. Local or systemic infectious complications account for 18 to 25% of all nosocomial infections and are often related to colonisation of the puncture site by a Gram positive germ. In case of infection, ablation of the central catheter is not mandatory for diagnosis or antibiotic treatment. Reported at varying frequencies in the literature from 4 to 42%, thrombus formation is unpredictable and often difficult to diagnose. Anticoagulants or fibrolytic agents are indicated but it may also be necessary to withdraw the catheter. Displacement, rupture, obstruction and extravasation are frequent complications. Back flow must be checked in all venous accesses and free flow carefully verified. The access must remain patent throughout the period of use, guaranteed by a standard heparinization and rinsing protocol. This complications must not mask the important progress achieved with the use of central venous access for specific and symptomatic treatment in cancer patients.

  4. The Potato Cryobank at The International Potato Center (Cip): A Model for Long Term Conservation of Clonal Plant Genetic Resources Collections of the Future.

    PubMed

    Vollmer, R; Villagaray, R; Egusquiza, V; Espirilla, J; García, M; Torres, A; Rojas, E; Panta, A; Barkley, N A; Ellis, D

    Cryobanks are a secure, efficient and low cost method for the long-term conservation of plant genetic resources for theoretically centuries or millennia with minimal maintenance. The present manuscript describes CIP's modified protocol for potato cryopreservation, its large-scale application, and the establishment of quality and operational standards, which included a viability reassessment of material entering the cryobank. In 2013, CIP established stricter quality and operational standards under which 1,028 potato accessions were cryopreserved with an improved PVS2-droplet protocol. In 2014 the viability of 114 accessions cryopreserved in 2013 accessions were reassessed. The average recovery rate (full plant recovery after LN exposure) of 1028 cryopreserved Solanum species ranged from 34 to 59%, and 70% of the processed accessions showed a minimum recovery rate of ≥20% and were considered as successfully cryopreserved. CIP has established a new high quality management system for cryobanking. Periodic viability reassessment, strict and clear recovery criteria and the monitoring of the percent of successful accessions meeting the criteria as well as contamination rates are metrics that need to be considered in cryobanks.

  5. [Factors inducing transition from growth to dormancy in rhizobacteria Azospirillum brasilense].

    PubMed

    Kushneruk, M A; Tugarova, A V; Il'chukova, A V; Slavkina, E A; Starichkova, N I; Bogatyrev, V A; Antoniuk, L P

    2013-01-01

    The factors suppressing division of the cells of the rhizobacterium Azospirillum brasilense and inducing their transition to a dormant state were analyzed. These included the presence of hexylresorcinol or heavy metals (Cu and Co) in the medium, oxygen stress, and transfer of the cells into the physiological saline or phosphate buffer solution. The results were used to develop a protocol for obtaining of uncultured cells of A. brasilense Sp245, a natural symbiont of wheat. The cells lost their ability to grow on synthetic agar medium, but could revert to growth when incubated in freshly prepared liquid medium. Needle-shaped crystals differing from struvite, which has been previously reported for this strain, were found in the dormant culture of A. brasilense Sp245.

  6. In vitro propagation of Homalomena aromatica Schott., an endangered aromatic medicinal herb of Northeast India.

    PubMed

    Raomai, Shiveirou; Kumaria, Suman; Tandon, Pramod

    2013-04-01

    A successful report on the in vitro propagation of Homalomena aromatica via rhizome axillary bud multiplication is presented. Rhizome bud explants were cultured on Murashige and Skoog medium supplemented with various concentrations of cytokinins to induce multiple shoot formation for micropropagation. The highest number of shoots was achieved in MS medium supplemented with 2.0 mg l(-1) 6-benzylaminopurine. The regenerated shoots rooted most efficiently on half-strength MS medium supplemented with 0.5 mg l(-1) α-naphthalene acetic acid. The regenerated plantlets showed no morphological differences from the parent plant. This protocol takes approximately 6 months to reach the acclimatization stage from the initiation stage and facilitates commercial and rapid propagation of H. aromatica.

  7. A comparison of the additional protocols of the five nuclear weapon states and the ensuing safeguards benefits to international nonproliferation efforts

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Uribe, Eva C; Sandoval, M Analisa; Sandoval, Marisa N

    2009-01-01

    With the 6 January 2009 entry into force of the Additional Protocol by the United States of America, all five declared Nuclear Weapon States that are part of the Nonproliferation Treaty have signed, ratified, and put into force the Additional Protocol. This paper makes a comparison of the strengths and weaknesses of the five Additional Protocols in force by the five Nuclear Weapon States with respect to the benefits to international nonproliferation aims. This paper also documents the added safeguards burden to the five declared Nuclear Weapon States that these Additional Protocols put on the states with respect to accessmore » to their civilian nuclear programs and the hosting of complementary access activities as part of the Additional Protocol.« less

  8. Persistent escalation of alcohol drinking in C57BL/6J mice with intermittent access to 20% ethanol

    PubMed Central

    Hwa, Lara S.; Chu, Adam; Levinson, Sally A.; Kayyali, Tala M.; DeBold, Joseph F.; Miczek, Klaus A.

    2011-01-01

    Background Intermittent access to drugs of abuse, as opposed to continuous access, is hypothesized to induce a kindling-type transition from moderate to escalated use, leading to dependence. Intermittent 24-hour cycles of ethanol access and deprivation can generate high levels of voluntary ethanol drinking in rats. Methods The current study uses C57BL/6J mice (B6) in an intermittent access to 20% ethanol protocol to escalate ethanol drinking levels. Adult male and female B6 mice were given intermittent access to 20% ethanol on alternating days of the week with water available ad libitum. Ethanol consumption during the initial 2 hours of access was compared to a short term, limited access “binge” drinking procedure, similar to drinking-in-the-dark (DID). B6 mice were also assessed for ethanol dependence with handling-induced convulsion (HIC), a reliable measure of withdrawal severity. Results After 3 weeks, male mice given intermittent access to ethanol achieved high stable levels of ethanol drinking in excess of 20 g/kg/24h, reaching above 100 mg/dl BEC, and showed a significantly higher ethanol preference than mice given continuous access to ethanol. Also, mice given intermittent access drank about twice as much as DID mice in the initial 2-hour access period. B6 mice that underwent the intermittent access protocol for longer periods of time displayed more severe signs of alcohol withdrawal. Additionally, female B6 mice were given intermittent access to ethanol and drank significantly more than males (ca. 30 g/kg/24h). Discussion The intermittent access method in B6 mice is advantageous because it induces escalated, voluntary, and preferential per os ethanol intake, behavior that may mimic a cardinal feature of human alcohol dependence, though the exact nature and site of ethanol acting in the brain and blood as a result of intermittent access has yet to be determined. PMID:21631540

  9. Experimental energy consumption of Frame Slotted ALOHA and Distributed Queuing for data collection scenarios.

    PubMed

    Tuset-Peiro, Pere; Vazquez-Gallego, Francisco; Alonso-Zarate, Jesus; Alonso, Luis; Vilajosana, Xavier

    2014-07-24

    Data collection is a key scenario for the Internet of Things because it enables gathering sensor data from distributed nodes that use low-power and long-range wireless technologies to communicate in a single-hop approach. In this kind of scenario, the network is composed of one coordinator that covers a particular area and a large number of nodes, typically hundreds or thousands, that transmit data to the coordinator upon request. Considering this scenario, in this paper we experimentally validate the energy consumption of two Medium Access Control (MAC) protocols, Frame Slotted ALOHA (FSA) and Distributed Queuing (DQ). We model both protocols as a state machine and conduct experiments to measure the average energy consumption in each state and the average number of times that a node has to be in each state in order to transmit a data packet to the coordinator. The results show that FSA is more energy efficient than DQ if the number of nodes is known a priori because the number of slots per frame can be adjusted accordingly. However, in such scenarios the number of nodes cannot be easily anticipated, leading to additional packet collisions and a higher energy consumption due to retransmissions. Contrarily, DQ does not require to know the number of nodes in advance because it is able to efficiently construct an ad hoc network schedule for each collection round. This kind of a schedule ensures that there are no packet collisions during data transmission, thus leading to an energy consumption reduction above 10% compared to FSA.

  10. Accessing Stereochemically Rich Sultams via Microwave-Assisted, Continuous Flow Organic Synthesis (MACOS) Scale-out

    PubMed Central

    Organ, Michael G.; Hanson, Paul R.; Rolfe, Alan; Samarakoon, Thiwanka B.; Ullah, Farman

    2011-01-01

    The generation of stereochemically-rich benzothiaoxazepine-1,1′-dioxides for enrichment of high-throughput screening collections is reported. Utilizing a microwave-assisted, continuous flow organic synthesis platform (MACOS), scale-out of core benzothiaoxazepine-1,1′-dioxide scaffolds has been achieved on multi-gram scale using an epoxide opening/SNAr cyclization protocol. Diversification of these sultam scaffolds was attained via a microwave-assisted intermolecular SNAr reaction with a variety of amines. Overall, a facile, 2-step protocol generated a collection of benzothiaoxazepine-1,1′-dioxides possessing stereochemical complexity in rapid fashion, where all 8 stereoisomers were accessed from commercially available starting materials. PMID:22116791

  11. Remote direct memory access over datagrams

    DOEpatents

    Grant, Ryan Eric; Rashti, Mohammad Javad; Balaji, Pavan; Afsahi, Ahmad

    2014-12-02

    A communication stack for providing remote direct memory access (RDMA) over a datagram network is disclosed. The communication stack has a user level interface configured to accept datagram related input and communicate with an RDMA enabled network interface card (NIC) via an NIC driver. The communication stack also has an RDMA protocol layer configured to supply one or more data transfer primitives for the datagram related input of the user level. The communication stack further has a direct data placement (DDP) layer configured to transfer the datagram related input from a user storage to a transport layer based on the one or more data transfer primitives by way of a lower layer protocol (LLP) over the datagram network.

  12. A CoAP-Based Network Access Authentication Service for Low-Power Wide Area Networks: LO-CoAP-EAP.

    PubMed

    Garcia-Carrillo, Dan; Marin-Lopez, Rafael; Kandasamy, Arunprabhu; Pelov, Alexander

    2017-11-17

    The Internet-of-Things (IoT) landscape is expanding with new radio technologies. In addition to the Low-Rate Wireless Personal Area Network (LR-WPAN), the recent set of technologies conforming the so-called Low-Power Wide Area Networks (LP-WAN) offers long-range communications, allowing one to send small pieces of information at a reduced energy cost, which promotes the creation of new IoT applications and services. However, LP-WAN technologies pose new challenges since they have strong limitations in the available bandwidth. In general, a first step prior to a smart object being able to gain access to the network is the process of network access authentication. It involves authentication, authorization and key management operations. This process is of vital importance for operators to control network resources. However, proposals for managing network access authentication in LP-WAN are tailored to the specifics of each technology, which could introduce interoperability problems in the future. In this sense, little effort has been put so far into providing a wireless-independent solution for network access authentication in the area of LP-WAN. To fill this gap, we propose a service named Low-Overhead CoAP-EAP (LO-CoAP-EAP), which is based on previous work designed for LR-WPAN. LO-CoAP-EAP integrates the use of Authentication, Authorization and Accounting (AAA) infrastructures and the Extensible Authentication Protocol (EAP) protocol. For this integration, we use the Constrained Application Protocol (CoAP) to design a network authentication service independent of the type of LP-WAN technology. LO-CoAP-EAP represents a trade-off between flexibility, wireless technology independence, scalability and performance in LP-WAN.

  13. IEEE 802.15.4 Frame Aggregation Enhancement to Provide High Performance in Life-Critical Patient Monitoring Systems

    PubMed Central

    Akbar, Muhammad Sajjad; Yu, Hongnian; Cang, Shuang

    2017-01-01

    In wireless body area sensor networks (WBASNs), Quality of Service (QoS) provision for patient monitoring systems in terms of time-critical deadlines, high throughput and energy efficiency is a challenging task. The periodic data from these systems generates a large number of small packets in a short time period which needs an efficient channel access mechanism. The IEEE 802.15.4 standard is recommended for low power devices and widely used for many wireless sensor networks applications. It provides a hybrid channel access mechanism at the Media Access Control (MAC) layer which plays a key role in overall successful transmission in WBASNs. There are many WBASN’s MAC protocols that use this hybrid channel access mechanism in variety of sensor applications. However, these protocols are less efficient for patient monitoring systems where life critical data requires limited delay, high throughput and energy efficient communication simultaneously. To address these issues, this paper proposes a frame aggregation scheme by using the aggregated-MAC protocol data unit (A-MPDU) which works with the IEEE 802.15.4 MAC layer. To implement the scheme accurately, we develop a traffic patterns analysis mechanism to understand the requirements of the sensor nodes in patient monitoring systems, then model the channel access to find the performance gap on the basis of obtained requirements, finally propose the design based on the needs of patient monitoring systems. The mechanism is initially verified using numerical modelling and then simulation is conducted using NS2.29, Castalia 3.2 and OMNeT++. The proposed scheme provides the optimal performance considering the required QoS. PMID:28134853

  14. IEEE 802.15.4 Frame Aggregation Enhancement to Provide High Performance in Life-Critical Patient Monitoring Systems.

    PubMed

    Akbar, Muhammad Sajjad; Yu, Hongnian; Cang, Shuang

    2017-01-28

    In wireless body area sensor networks (WBASNs), Quality of Service (QoS) provision for patient monitoring systems in terms of time-critical deadlines, high throughput and energy efficiency is a challenging task. The periodic data from these systems generates a large number of small packets in a short time period which needs an efficient channel access mechanism. The IEEE 802.15.4 standard is recommended for low power devices and widely used for many wireless sensor networks applications. It provides a hybrid channel access mechanism at the Media Access Control (MAC) layer which plays a key role in overall successful transmission in WBASNs. There are many WBASN's MAC protocols that use this hybrid channel access mechanism in variety of sensor applications. However, these protocols are less efficient for patient monitoring systems where life critical data requires limited delay, high throughput and energy efficient communication simultaneously. To address these issues, this paper proposes a frame aggregation scheme by using the aggregated-MAC protocol data unit (A-MPDU) which works with the IEEE 802.15.4 MAC layer. To implement the scheme accurately, we develop a traffic patterns analysis mechanism to understand the requirements of the sensor nodes in patient monitoring systems, then model the channel access to find the performance gap on the basis of obtained requirements, finally propose the design based on the needs of patient monitoring systems. The mechanism is initially verified using numerical modelling and then simulation is conducted using NS2.29, Castalia 3.2 and OMNeT++. The proposed scheme provides the optimal performance considering the required QoS.

  15. A CoAP-Based Network Access Authentication Service for Low-Power Wide Area Networks: LO-CoAP-EAP

    PubMed Central

    Garcia-Carrillo, Dan; Marin-Lopez, Rafael; Kandasamy, Arunprabhu; Pelov, Alexander

    2017-01-01

    The Internet-of-Things (IoT) landscape is expanding with new radio technologies. In addition to the Low-Rate Wireless Personal Area Network (LR-WPAN), the recent set of technologies conforming the so-called Low-Power Wide Area Networks (LP-WAN) offers long-range communications, allowing one to send small pieces of information at a reduced energy cost, which promotes the creation of new IoT applications and services. However, LP-WAN technologies pose new challenges since they have strong limitations in the available bandwidth. In general, a first step prior to a smart object being able to gain access to the network is the process of network access authentication. It involves authentication, authorization and key management operations. This process is of vital importance for operators to control network resources. However, proposals for managing network access authentication in LP-WAN are tailored to the specifics of each technology, which could introduce interoperability problems in the future. In this sense, little effort has been put so far into providing a wireless-independent solution for network access authentication in the area of LP-WAN. To fill this gap, we propose a service named Low-Overhead CoAP-EAP (LO-CoAP-EAP), which is based on previous work designed for LR-WPAN. LO-CoAP-EAP integrates the use of Authentication, Authorization and Accounting (AAA) infrastructures and the Extensible Authentication Protocol (EAP) protocol. For this integration, we use the Constrained Application Protocol (CoAP) to design a network authentication service independent of the type of LP-WAN technology. LO-CoAP-EAP represents a trade-off between flexibility, wireless technology independence, scalability and performance in LP-WAN. PMID:29149040

  16. The Fine Art of Using a Laserdisc in the Art Classroom.

    ERIC Educational Resources Information Center

    Porter, Sharon

    1998-01-01

    Laserdiscs are an efficient and flexible medium for art presentations in schools. This article discusses laserdiscs, also called videodiscs; distinguishes between constant linear velocity (CLV) and constant angular velocity (CAV) which allows more flexible access; describes the use of bar coding for access; and lists selected visual art…

  17. A Mobility-Aware QoS Signaling Protocol for Ambient Networks

    NASA Astrophysics Data System (ADS)

    Jeong, Seong-Ho; Lee, Sung-Hyuck; Bang, Jongho

    Mobility-aware quality of service (QoS) signaling is crucial to provide seamless multimedia services in the ambient environment where mobile nodes may move frequently between different wireless access networks. The mobility of an IP-based node in ambient networks affects routing paths, and as a result, can have a significant impact on the operation and state management of QoS signaling protocols. In this paper, we first analyze the impact of mobility on QoS signaling protocols and how the protocols operate in mobility scenarios. We then propose an efficient mobility-aware QoS signaling protocol which can operate adaptively in ambient networks. The key features of the protocol include the fast discovery of a crossover node where the old and new paths converge or diverge due to handover and the localized state management for seamless services. Our analytical and simulation/experimental results show that the proposed/implemented protocol works better than existing protocols in the IP-based mobile environment.

  18. A protocol for monitoring soft tissue motion under compression garments during drop landings.

    PubMed

    Mills, Chris; Scurr, Joanna; Wood, Louise

    2011-06-03

    This study used a single-subject design to establish a valid and reliable protocol for monitoring soft tissue motion under compression garments during drop landings. One male participant performed six 40 cm drop landings onto a force platform, in three compression conditions (none, medium high). Five reflective markers placed on the thigh under the compression garment and five over the garment were filmed using two cameras (1000 Hz). Following manual digitisation, marker coordinates were reconstructed and their resultant displacements and maximum change in separation distance between skin and garment markers were calculated. To determine reliability of marker application, 35 markers were attached to the thigh over the high compression garment and filmed. Markers were then removed and re-applied on three occasions; marker separation and distance to thigh centre of gravity were calculated. Results showed similar ground reaction forces during landing trials. Significant reductions in the maximum change in separation distance between markers from no compression to high compression landings were reported. Typical errors in marker movement under and over the garment were 0.1mm in medium and high compression landings. Re-application of markers showed mean typical errors of 1mm in marker separation and <3mm relative to thigh centre of gravity. This paper presents a novel protocol that demonstrates sufficient sensitivity to detect reductions in soft tissue motion during landings in high compression garments compared to no compression. Additionally, markers placed under or over the garment demonstrate low variance in movement, and the protocol reports good reliability in marker re-application. Copyright © 2011 Elsevier Ltd. All rights reserved.

  19. An improved method for growing neurons: Comparison with standard protocols.

    PubMed

    Pozzi, Diletta; Ban, Jelena; Iseppon, Federico; Torre, Vincent

    2017-03-15

    Since different culturing parameters - such as media composition or cell density - lead to different experimental results, it is important to define the protocol used for neuronal cultures. The vital role of astrocytes in maintaining homeostasis of neurons - both in vivo and in vitro - is well established: the majority of improved culturing conditions for primary dissociated neuronal cultures rely on astrocytes. Our culturing protocol is based on a novel serum-free preparation of astrocyte - conditioned medium (ACM). We compared the proposed ACM culturing method with other two commonly used methods Neurobasal/B27- and FBS- based media. We performed morphometric characterization by immunocytochemistry and functional analysis by calcium imaging for all three culture methods at 1, 7, 14 and 60days in vitro (DIV). ACM-based cultures gave the best results for all tested criteria, i.e. growth cone's size and shape, neuronal outgrowth and branching, network activity and synchronization, maturation and long-term survival. The differences were more pronounced when compared with FBS-based medium. Neurobasal/B27 cultures were comparable to ACM for young cultures (DIV1), but not for culturing times longer than DIV7. ACM-based cultures showed more robust neuronal outgrowth at DIV1. At DIV7 and 60, the activity of neuronal network grown in ACM had a more vigorous spontaneous electrical activity and a higher degree of synchronization. We propose our ACM-based culture protocol as an improved and more suitable method for both short- and long-term neuronal cultures. Copyright © 2017 Elsevier B.V. All rights reserved.

  20. Dependence of synchronized bursting activity on medium stirring and the perfusion rate in a cultured network of neurons

    NASA Astrophysics Data System (ADS)

    Heo, Ryoun; Kim, Hyun; Lee, Kyoung J.

    2016-05-01

    A cultured network of neurons coupled with a multi-electrode-array (MEA) recording system has been a useful platform for investigating various issues in neuroscience and engineering. The neural activity supported by the system can be sensitive to environmental fluctuations, for example, in the medium's nutrient composition, ph, and temperature, and to mechanical disturbances, yet this issue has not been the subject. Especially, a normal practice in maintaining neuronal cell cultures involves an intermittent sequence of medium exchanges, typically at a time interval of a few days, and one such sudden medium exchange is unavoidably accompanied by many unintended disturbances. Here, based on a quantitative time-series analysis of synchronized bursting events, we explicitly demonstrate that such a medium exchange can, indeed, bring a huge change in the existing neural activity. Subsequently, we develop a medium perfusion-stirring system and an ideal protocol that can be used in conjunction with a MEA recording system, providing long-term stability. Specifically, we systematically evaluate the effects of medium stirring and perfusion rates. Unexpectedly, even some vigorous mechanical agitations do not have any impacts on neural activity. On the other hand, too much replenishment ( e.g., 1.8 ml/day for a 1.8-ml dish) of neurobasal medium results in an excitotoxicity.

  1. Nanoparticle-supported and magnetically recoverable palladium (Pd) catalyst: a selective and sustainable oxidation protocol with high turnover number

    EPA Science Inventory

    A magnetic nanoparticle-supported ruthenium hydroxide catalyst was readily prepared from inexpensive starting materials and shown to catalyze hydration of nitriles with excellent yield in benign aqueous medium. Catalyst recovery using an external magnetic field, superior activity...

  2. 106-17 Telemetry Management Resources Chapter 25

    DTIC Science & Technology

    2017-07-01

    aspects of the TmNS system . There are two primary protocols for accessing the management resources: Simple Network Management Protocol (SNMP) and... management resources as well as a basic HTTP clients and servers for a more RESTful approach to system management . Both tools are available from the...Telemetry Standards, RCC Standard 106-17 Chapter 25, July 2017 i CHAPTER 25 Management Resources Acronyms

  3. Universal Network Access System

    DTIC Science & Technology

    2003-11-01

    128 Figure 37 The detail of the SCM TX , (LO; local oscillator, LPF; Low-pass filter, AMP; Amplifier, BPF ...with UNAS, ( BPF : band-pass filter, BM Rx; Burst Mode receiver, AWGR; Arrayed waveguide grating router, FBG; Fiber Bragg Grating, TL; Tunable Laser...protocols. Standard specifications and RFCs will be used as guidelines for implementation. Table 1 UNAS Serial I/O Formats Protocol Implement1

  4. Virtual memory support for distributed computing environments using a shared data object model

    NASA Astrophysics Data System (ADS)

    Huang, F.; Bacon, J.; Mapp, G.

    1995-12-01

    Conventional storage management systems provide one interface for accessing memory segments and another for accessing secondary storage objects. This hinders application programming and affects overall system performance due to mandatory data copying and user/kernel boundary crossings, which in the microkernel case may involve context switches. Memory-mapping techniques may be used to provide programmers with a unified view of the storage system. This paper extends such techniques to support a shared data object model for distributed computing environments in which good support for coherence and synchronization is essential. The approach is based on a microkernel, typed memory objects, and integrated coherence control. A microkernel architecture is used to support multiple coherence protocols and the addition of new protocols. Memory objects are typed and applications can choose the most suitable protocols for different types of object to avoid protocol mismatch. Low-level coherence control is integrated with high-level concurrency control so that the number of messages required to maintain memory coherence is reduced and system-wide synchronization is realized without severely impacting the system performance. These features together contribute a novel approach to the support for flexible coherence under application control.

  5. An Examination of Library World Wide Web Sites at Medium-Sized Universities.

    ERIC Educational Resources Information Center

    Tolppanen, Bradley P.; Miller, Joan; Wooden, Martha H.

    2000-01-01

    Presents the results of a study of Web sites for 133 academic libraries serving medium-sized universities. Suggests that navigational and design aspects need improvement; information should not be included unless it will be accessed and used; and greater use should be made of online tutorials and virtual tours to supplement regular bibliographic…

  6. Exploring the Use of Internet by University Students for Seeking Health Related Information

    ERIC Educational Resources Information Center

    Ahmad, Asad; Khan, Mohammed Naved; Rahman, Obaidur

    2017-01-01

    Purpose: Internet is both a medium and a platform for information exchange. This characteristic of internet is gradually metamorphosing it into an e-learning enabler. A significant percentage of internet users access health-related information through the medium of internet, but little is known about the factors that determine such behaviour. This…

  7. Using Mimio Boardcast in an Online Principles of Macroeconomics Course to Improve Student Performance

    ERIC Educational Resources Information Center

    Finlay, Nikki McIntyre; Deis, Michael H.

    2005-01-01

    The emergence of the speedily evolving world of technology has given many universities an interactive medium to facilitate teaching and learning. One such medium has been online courses, which have provided greater access to both traditional and non-traditional students. In quantitative courses such as economics, however, there are often concerns…

  8. Graphical Internet Access on a Budget: Making a Pseudo-SLIP Connection.

    ERIC Educational Resources Information Center

    McCulley, P. Michael

    1995-01-01

    Examines The Internet Adapter (TIA), an Internet protocol that allows computers to be directly on the Internet and access graphics over standard telephone lines using high-speed modems. Compares TIA's system requirements, performance, and costs to other Internet connections. Sidebars describe connections other than TIA and how to find information…

  9. Access and benefit sharing: Best practices for the use and exchange of invertebrate biological control agents

    USDA-ARS?s Scientific Manuscript database

    The Convention on Biological Diversity (CBD) acknowledges the sovereign rights that countries have over their ‘genetic resources’. The Nagoya Protocol that came into force in 2014 provides a framework for implementation of and equitable process by which access to, and sharing of benefits between don...

  10. Wireless Computing Architecture III

    DTIC Science & Technology

    2013-09-01

    MIMO Multiple-Input and Multiple-Output MIMO /CON MIMO with concurrent hannel access and estimation MU- MIMO Multiuser MIMO OFDM Orthogonal...compressive sensing \\; a design for concurrent channel estimation in scalable multiuser MIMO networking; and novel networking protocols based on machine...Network, Antenna Arrays, UAV networking, Angle of Arrival, Localization MIMO , Access Point, Channel State Information, Compressive Sensing 16

  11. 21 CFR 312.320 - Treatment IND or treatment protocol.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... clinical trial under an IND designed to support a marketing application for the expanded access use, or (ii) All clinical trials of the drug have been completed; and (2) Marketing status. The sponsor is actively pursuing marketing approval of the drug for the expanded access use with due diligence; and (3) Evidence...

  12. Privacy/Security Policy

    Science.gov Websites

    automatically is: The Internet Protocol (IP) address of the domain from which you access the Internet (i.e DUF6 Management and Uses DUF6 Conversion EIS Documents News FAQs Internet Resources Glossary Home  , to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system

  13. A Stateful Multicast Access Control Mechanism for Future Metro-Area-Networks.

    ERIC Educational Resources Information Center

    Sun, Wei-qiang; Li, Jin-sheng; Hong, Pei-lin

    2003-01-01

    Multicasting is a necessity for a broadband metro-area-network; however security problems exist with current multicast protocols. A stateful multicast access control mechanism, based on MAPE, is proposed. The architecture of MAPE is discussed, as well as the states maintained and messages exchanged. The scheme is flexible and scalable. (Author/AEF)

  14. Embedded controller for GEM detector readout system

    NASA Astrophysics Data System (ADS)

    Zabołotny, Wojciech M.; Byszuk, Adrian; Chernyshova, Maryna; Cieszewski, Radosław; Czarski, Tomasz; Dominik, Wojciech; Jakubowska, Katarzyna L.; Kasprowicz, Grzegorz; Poźniak, Krzysztof; Rzadkiewicz, Jacek; Scholz, Marek

    2013-10-01

    This paper describes the embedded controller used for the multichannel readout system for the GEM detector. The controller is based on the embedded Mini ITX mainboard, running the GNU/Linux operating system. The controller offers two interfaces to communicate with the FPGA based readout system. FPGA configuration and diagnostics is controlled via low speed USB based interface, while high-speed setup of the readout parameters and reception of the measured data is handled by the PCI Express (PCIe) interface. Hardware access is synchronized by the dedicated server written in C. Multiple clients may connect to this server via TCP/IP network, and different priority is assigned to individual clients. Specialized protocols have been implemented both for low level access on register level and for high level access with transfer of structured data with "msgpack" protocol. High level functionalities have been split between multiple TCP/IP servers for parallel operation. Status of the system may be checked, and basic maintenance may be performed via web interface, while the expert access is possible via SSH server. System was designed with reliability and flexibility in mind.

  15. Group Membership Based Authorization to CADC Resources

    NASA Astrophysics Data System (ADS)

    Damian, A.; Dowler, P.; Gaudet, S.; Hill, N.

    2012-09-01

    The Group Membership Service (GMS), implemented at the Canadian Astronomy Data Centre (CADC), is a prototype of what could eventually be an IVOA standard for a distributed and interoperable group membership protocol. Group membership is the core authorization concept that enables teamwork and collaboration amongst astronomers accessing distributed resources and services. The service integrates and complements other access control related IVOA standards such as single-sign-on (SSO) using X.509 proxy certificates and the Credential Delegation Protocol (CDP). The GMS has been used at CADC for several years now, initially as a subsystem and then as a stand-alone Web service. It is part of the authorization mechanism for controlling the access to restricted Web resources as well as the VOSpace service hosted by the CADC. We present the role that GMS plays within the access control system at the CADC, including the functionality of the service and how the different CADC services make use of it to assert user authorization to resources. We also describe the main advantages and challenges of using the service as well as future work to increase its robustness and functionality.

  16. A Cyber Pearl Harbor

    DTIC Science & Technology

    2016-02-03

    specific intrusions that can vary in costs and damage. These medium- potential tools are used to access systems, sustain access, and hide access. In the...appropriate response. A cyber intrusion aimed at spying or extracting data will drive different international and domestic responses than a weapon...stealing credit cards or data to a DDoS or creating and selling malware to the highest bidder. Insecure cyberspace is a crime syndicate’s dream in

  17. Short-term adaptations following Complex Training in team-sports: A meta-analysis

    PubMed Central

    Martinez-Rodriguez, Alejandro; Calleja-González, Julio; Alcaraz, Pedro E.

    2017-01-01

    Objective The purpose of this meta-analysis was to study the short-term adaptations on sprint and vertical jump (VJ) performance following Complex Training (CT) in team-sports. CT is a resistance training method aimed at developing both strength and power, which has a direct effect on sprint and VJ. It consists on alternating heavy resistance training exercises with plyometric/power ones, set for set, on the same workout. Methods A search of electronic databases up to July 2016 (PubMed-MEDLINE, SPORTDiscus, Web of Knowledge) was conducted. Inclusion criteria: 1) at least one CT intervention group; 2) training protocols ≥4-wks; 3) sample of team-sport players; 4) sprint or VJ as an outcome variable. Effect sizes (ES) of each intervention were calculated and subgroup analyses were performed. Results A total of 9 studies (13 CT groups) met the inclusion criteria. Medium effect sizes (ES) (ES = 0.73) were obtained for pre-post improvements in sprint, and small (ES = 0.41) in VJ, following CT. Experimental-groups presented better post-intervention sprint (ES = 1.01) and VJ (ES = 0.63) performance than control-groups. Sprint large ESs were exhibited in younger athletes (<20 years old; ES = 1.13); longer CT interventions (≥6 weeks; ES = 0.95); conditioning activities with intensities ≤85% 1RM (ES = 0.96) and protocols with frequencies of <3 sessions/week (ES = 0.84). Medium ESs were obtained in Division I players (ES = 0.76); training programs >12 total sessions (ES = 0.74). VJ Large ESs in programs with >12 total sessions (ES = 0.81). Medium ESs obtained for under-Division I individuals (ES = 0.56); protocols with intracomplex rest intervals ≥2 min (ES = 0.55); conditioning activities with intensities ≤85% 1RM (ES = 0.64); basketball/volleyball players (ES = 0.55). Small ESs were found for younger athletes (ES = 0.42); interventions ≥6 weeks (ES = 0.45). Conclusions CT interventions have positive medium effects on sprint performance and small effects on VJ in team-sport athletes. This training method is a suitable option to include in the season planning. PMID:28662108

  18. Validation of Dissolution Testing with Biorelevant Media: An OrBiTo Study.

    PubMed

    Mann, James; Dressman, Jennifer; Rosenblatt, Karin; Ashworth, Lee; Muenster, Uwe; Frank, Kerstin; Hutchins, Paul; Williams, James; Klumpp, Lukas; Wielockx, Kristina; Berben, Philippe; Augustijns, Patrick; Holm, Rene; Hofmann, Michael; Patel, Sanjaykumar; Beato, Stefania; Ojala, Krista; Tomaszewska, Irena; Bruel, Jean-Luc; Butler, James

    2017-12-04

    Dissolution testing with biorelevant media has become widespread in the pharmaceutical industry as a means of better understanding how drugs and formulations behave in the gastrointestinal tract. Until now, however, there have been few attempts to gauge the reproducibility of results obtained with these methods. The aim of this study was to determine the interlaboratory reproducibility of biorelevant dissolution testing, using the paddle apparatus (USP 2). Thirteen industrial and three academic laboratories participated in this study. All laboratories were provided with standard protocols for running the tests: dissolution in FaSSGF to simulate release in the stomach, dissolution in a single intestinal medium, FaSSIF, to simulate release in the small intestine, and a "transfer" (two-stage) protocol to simulate the concentration profile when conditions are changed from the gastric to the intestinal environment. The test products chosen were commercially available ibuprofen tablets and zafirlukast tablets. The biorelevant dissolution tests showed a high degree of reproducibility among the participating laboratories, even though several different batches of the commercially available medium preparation powder were used. Likewise, results were almost identicalbetween the commercial biorelevant media and those produced in-house. Comparing results to previous ring studies, including those performed with USP calibrator tablets or commercially available pharmaceutical products in a single medium, the results for the biorelevant studies were highly reproducible on an interlaboratory basis. Interlaboratory reproducibility with the two-stage test was also acceptable, although the variability was somewhat greater than with the single medium tests. Biorelevant dissolution testing is highly reproducible among laboratories and can be relied upon for cross-laboratory comparisons.

  19. Serving Satellite Remote Sensing Data to User Community through the OGC Interoperability Protocols

    NASA Astrophysics Data System (ADS)

    di, L.; Yang, W.; Bai, Y.

    2005-12-01

    Remote sensing is one of the major methods for collecting geospatial data. Hugh amount of remote sensing data has been collected by space agencies and private companies around the world. For example, NASA's Earth Observing System (EOS) is generating more than 3 Tb of remote sensing data per day. The data collected by EOS are processed, distributed, archived, and managed by the EOS Data and Information System (EOSDIS). Currently, EOSDIS is managing several petabytes of data. All of those data are not only valuable for global change research, but also useful for local and regional application and decision makings. How to make the data easily accessible to and usable by the user community is one of key issues for realizing the full potential of these valuable datasets. In the past several years, the Open Geospatial Consortium (OGC) has developed several interoperability protocols aiming at making geospatial data easily accessible to and usable by the user community through Internet. The protocols particularly relevant to the discovery, access, and integration of multi-source satellite remote sensing data are the Catalog Service for Web (CS/W) and Web Coverage Services (WCS) Specifications. The OGC CS/W specifies the interfaces, HTTP protocol bindings, and a framework for defining application profiles required to publish and access digital catalogues of metadata for geographic data, services, and related resource information. The OGC WCS specification defines the interfaces between web-based clients and servers for accessing on-line multi-dimensional, multi-temporal geospatial coverage in an interoperable way. Based on definitions by OGC and ISO 19123, coverage data include all remote sensing images as well as gridded model outputs. The Laboratory for Advanced Information Technology and Standards (LAITS), George Mason University, has been working on developing and implementing OGC specifications for better serving NASA Earth science data to the user community for many years. We have developed the NWGISS software package that implements multiple OGC specifications, including OGC WMS, WCS, CS/W, and WFS. As a part of NASA REASON GeoBrain project, the NWGISS WCS and CS/W servers have been extended to provide operational access to NASA EOS data at data pools through OGC protocols and to make both services chainable in the web-service chaining. The extensions in the WCS server include the implementation of WCS 1.0.0 and WCS 1.0.2, and the development of WSDL description of the WCS services. In order to find the on-line EOS data resources, the CS/W server is extended at the backend to search metadata in NASA ECHO. This presentation reports those extensions and discuss lessons-learned on the implementation. It also discusses the advantage, disadvantages, and future improvement of OGC specifications, particularly the WCS.

  20. The Characteristics of Binary Spike-Time-Dependent Plasticity in HfO2-Based RRAM and Applications for Pattern Recognition

    NASA Astrophysics Data System (ADS)

    Zhou, Zheng; Liu, Chen; Shen, Wensheng; Dong, Zhen; Chen, Zhe; Huang, Peng; Liu, Lifeng; Liu, Xiaoyan; Kang, Jinfeng

    2017-04-01

    A binary spike-time-dependent plasticity (STDP) protocol based on one resistive-switching random access memory (RRAM) device was proposed and experimentally demonstrated in the fabricated RRAM array. Based on the STDP protocol, a novel unsupervised online pattern recognition system including RRAM synapses and CMOS neurons is developed. Our simulations show that the system can efficiently compete the handwritten digits recognition task, which indicates the feasibility of using the RRAM-based binary STDP protocol in neuromorphic computing systems to obtain good performance.

Top