Nonblocking and orphan free message logging protocols
NASA Technical Reports Server (NTRS)
Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith
1992-01-01
Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.
Nonblocking and orphan free message logging protocols
NASA Astrophysics Data System (ADS)
Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith
1992-12-01
Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.
Event Driven Messaging with Role-Based Subscriptions
NASA Technical Reports Server (NTRS)
Bui, Tung; Bui, Bach; Malhotra, Shantanu; Chen, Fannie; Kim, rachel; Allen, Christopher; Luong, Ivy; Chang, George; Zendejas, Silvino; Sadaqathulla, Syed
2009-01-01
Event Driven Messaging with Role-Based Subscriptions (EDM-RBS) is a framework integrated into the Service Management Database (SMDB) to allow for role-based and subscription-based delivery of synchronous and asynchronous messages over JMS (Java Messaging Service), SMTP (Simple Mail Transfer Protocol), or SMS (Short Messaging Service). This allows for 24/7 operation with users in all parts of the world. The software classifies messages by triggering data type, application source, owner of data triggering event (mission), classification, sub-classification and various other secondary classifying tags. Messages are routed to applications or users based on subscription rules using a combination of the above message attributes. This program provides a framework for identifying connected users and their applications for targeted delivery of messages over JMS to the client applications the user is logged into. EDMRBS provides the ability to send notifications over e-mail or pager rather than having to rely on a live human to do it. It is implemented as an Oracle application that uses Oracle relational database management system intrinsic functions. It is configurable to use Oracle AQ JMS API or an external JMS provider for messaging. It fully integrates into the event-logging framework of SMDB (Subnet Management Database).
Achieving the Holevo bound via a bisection decoding protocol
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rosati, Matteo; Giovannetti, Vittorio
2016-06-15
We present a new decoding protocol to realize transmission of classical information through a quantum channel at asymptotically maximum capacity, achieving the Holevo bound and thus the optimal communication rate. At variance with previous proposals, our scheme recovers the message bit by bit, making use of a series of “yes-no” measurements, organized in bisection fashion, thus determining which codeword was sent in log{sub 2} N steps, N being the number of codewords.
Space Reclamation for Uncoordinated Checkpointing in Message-Passing Systems. Ph.D. Thesis
NASA Technical Reports Server (NTRS)
Wang, Yi-Min
1993-01-01
Checkpointing and rollback recovery are techniques that can provide efficient recovery from transient process failures. In a message-passing system, the rollback of a message sender may cause the rollback of the corresponding receiver, and the system needs to roll back to a consistent set of checkpoints called recovery line. If the processes are allowed to take uncoordinated checkpoints, the above rollback propagation may result in the domino effect which prevents recovery line progression. Traditionally, only obsolete checkpoints before the global recovery line can be discarded, and the necessary and sufficient condition for identifying all garbage checkpoints has remained an open problem. A necessary and sufficient condition for achieving optimal garbage collection is derived and it is proved that the number of useful checkpoints is bounded by N(N+1)/2, where N is the number of processes. The approach is based on the maximum-sized antichain model of consistent global checkpoints and the technique of recovery line transformation and decomposition. It is also shown that, for systems requiring message logging to record in-transit messages, the same approach can be used to achieve optimal message log reclamation. As a final topic, a unifying framework is described by considering checkpoint coordination and exploiting piecewise determinism as mechanisms for bounding rollback propagation, and the applicability of the optimal garbage collection algorithm to domino-free recovery protocols is demonstrated.
Optimal message log reclamation for independent checkpointing
NASA Technical Reports Server (NTRS)
Wang, Yi-Min; Fuchs, W. Kent
1993-01-01
Independent (uncoordinated) check pointing for parallel and distributed systems allows maximum process autonomy but suffers from possible domino effects and the associated storage space overhead for maintaining multiple checkpoints and message logs. In most research on check pointing and recovery, it was assumed that only the checkpoints and message logs older than the global recovery line can be discarded. It is shown how recovery line transformation and decomposition can be applied to the problem of efficiently identifying all discardable message logs, thereby achieving optimal garbage collection. Communication trace-driven simulation for several parallel programs is used to show the benefits of the proposed algorithm for message log reclamation.
SMS-Based Medical Diagnostic Telemetry Data Transmission Protocol for Medical Sensors
Townsend, Ben; Abawajy, Jemal; Kim, Tai-Hoon
2011-01-01
People with special medical monitoring needs can, these days, be sent home and remotely monitored through the use of data logging medical sensors and a transmission base-station. While this can improve quality of life by allowing the patient to spend most of their time at home, most current technologies rely on hardwired landline technology or expensive mobile data transmissions to transmit data to a medical facility. The aim of this paper is to investigate and develop an approach to increase the freedom of a monitored patient and decrease costs by utilising mobile technologies and SMS messaging to transmit data from patient to medico. To this end, we evaluated the capabilities of SMS and propose a generic communications protocol which can work within the constraints of the SMS format, but provide the necessary redundancy and robustness to be used for the transmission of non-critical medical telemetry from data logging medical sensors. PMID:22163845
Extracting the Textual and Temporal Structure of Supercomputing Logs
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jain, S; Singh, I; Chandra, A
2009-05-26
Supercomputers are prone to frequent faults that adversely affect their performance, reliability and functionality. System logs collected on these systems are a valuable resource of information about their operational status and health. However, their massive size, complexity, and lack of standard format makes it difficult to automatically extract information that can be used to improve system management. In this work we propose a novel method to succinctly represent the contents of supercomputing logs, by using textual clustering to automatically find the syntactic structures of log messages. This information is used to automatically classify messages into semantic groups via an onlinemore » clustering algorithm. Further, we describe a methodology for using the temporal proximity between groups of log messages to identify correlated events in the system. We apply our proposed methods to two large, publicly available supercomputing logs and show that our technique features nearly perfect accuracy for online log-classification and extracts meaningful structural and temporal message patterns that can be used to improve the accuracy of other log analysis techniques.« less
New Results on Unconditionally Secure Multi-receiver Manual Authentication
NASA Astrophysics Data System (ADS)
Wang, Shuhong; Safavi-Naini, Reihaneh
Manual authentication is a recently proposed model of communication motivated by the settings where the only trusted infrastructure is a low bandwidth authenticated channel, possibly realized by the aid of a human, that connects the sender and the receiver who are otherwise connected through an insecure channel and do not have any shared key or public key infrastructure. A good example of such scenarios is pairing of devices in Bluetooth. Manual authentication systems are studied in computational and information theoretic security model and protocols with provable security have been proposed. In this paper we extend the results in information theoretic model in two directions. Firstly, we extend a single receiver scenario to multireceiver case where the sender wants to authenticate the same message to a group of receivers. We show new attacks (compared to single receiver case) that can launched in this model and demonstrate that the single receiver lower bound 2log(1/ɛ) + O(1) on the bandwidth of manual channel stays valid in the multireceiver scenario. We further propose a protocol that achieves this bound and provides security, in the sense that we define, if up to c receivers are corrupted. The second direction is the study of non-interactive protocols in unconditionally secure model. We prove that unlike computational security framework, without interaction a secure authentication protocol requires the bandwidth of the manual channel to be at least the same as the message size, hence non-trivial protocols do not exist.
Efficient decentralized consensus protocols
NASA Technical Reports Server (NTRS)
Lakshman, T. V.; Agrawala, A. K.
1986-01-01
Decentralized consensus protocols are characterized by successive rounds of message interchanges. Protocols which achieve a consensus in one round of message interchange require O(N-squared) messages, where N is the number of participants. In this paper, a communication scheme, based on finite projective planes, which requires only O(N sq rt N) messages for each round is presented. Using this communication scheme, decentralized consensus protocols which achieve a consensus within two rounds of message interchange are developed. The protocols are symmetric, and the communication scheme does not impose any hierarchical structure. The scheme is illustrated using blocking and nonblocking commit protocols, decentralized extrema finding, and computation of the sum function.
Creative Analytics of Mission Ops Event Messages
NASA Technical Reports Server (NTRS)
Smith, Dan
2017-01-01
Historically, tremendous effort has been put into processing and displaying mission health and safety telemetry data; and relatively little attention has been paid to extracting information from missions time-tagged event log messages. Todays missions may log tens of thousands of messages per day and the numbers are expected to dramatically increase as satellite fleets and constellations are launched, as security monitoring continues to evolve, and as the overall complexity of ground system operations increases. The logs may contain information about orbital events, scheduled and actual observations, device status and anomalies, when operators were logged on, when commands were resent, when there were data drop outs or system failures, and much much more. When dealing with distributed space missions or operational fleets, it becomes even more important to systematically analyze this data. Several advanced information systems technologies make it appropriate to now develop analytic capabilities which can increase mission situational awareness, reduce mission risk, enable better event-driven automation and cross-mission collaborations, and lead to improved operations strategies: Industry Standard for Log Messages. The Object Management Group (OMG) Space Domain Task Force (SDTF) standards organization is in the process of creating a formal standard for industry for event log messages. The format is based on work at NASA GSFC. Open System Architectures. The DoD, NASA, and others are moving towards common open system architectures for mission ground data systems based on work at NASA GSFC with the full support of the commercial product industry and major integration contractors. Text Analytics. A specific area of data analytics which applies statistical, linguistic, and structural techniques to extract and classify information from textual sources. This presentation describes work now underway at NASA to increase situational awareness through the collection of non-telemetry mission operations information into a common log format and then providing display and analytics tools to provide in-depth assessment of the log contents. The work includes: Common interface formats for acquiring time-tagged text messages Conversion of common files for schedules, orbital events, and stored commands to the common log format Innovative displays to depict thousands of messages on a single display Structured English text queries against the log message data store, extensible to a more mature natural language query capability Goal of speech-to-text and text-to-speech additions to create a personal mission operations assistant to aid on-console operations. A wide variety of planned uses identified by the mission operations teams will be discussed.
Shea, S; Sengupta, S; Crosswell, A; Clayton, P D
1992-01-01
The developing Integrated Academic Information System (IAIMS) at Columbia-Presbyterian Medical Center provides data sharing links between two separate corporate entities, namely Columbia University Medical School and The Presbyterian Hospital, using a network-based architecture. Multiple database servers with heterogeneous user authentication protocols are linked to this network. "One-stop information shopping" implies one log-on procedure per session, not separate log-on and log-off procedures for each server or application used during a session. These circumstances provide challenges at the policy and technical levels to data security at the network level and insuring smooth information access for end users of these network-based services. Five activities being conducted as part of our security project are described: (1) policy development; (2) an authentication server for the network; (3) Kerberos as a tool for providing mutual authentication, encryption, and time stamping of authentication messages; (4) a prototype interface using Kerberos services to authenticate users accessing a network database server; and (5) a Kerberized electronic signature.
Attacks on quantum key distribution protocols that employ non-ITS authentication
NASA Astrophysics Data System (ADS)
Pacher, C.; Abidin, A.; Lorünser, T.; Peev, M.; Ursin, R.; Zeilinger, A.; Larsson, J.-Å.
2016-01-01
We demonstrate how adversaries with large computing resources can break quantum key distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not information-theoretically secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a set of messages that she can calculate by finding collisions of a cryptographic hash function. However, when this authentication code was introduced, it was shown to prevent straightforward man-in-the-middle (MITM) attacks against QKD protocols. In this paper, we prove that the set of messages that collide with any given message under this authentication code contains with high probability a message that has small Hamming distance to any other given message. Based on this fact, we present extended MITM attacks against different versions of BB84 QKD protocols using the addressed authentication code; for three protocols, we describe every single action taken by the adversary. For all protocols, the adversary can obtain complete knowledge of the key, and for most protocols her success probability in doing so approaches unity. Since the attacks work against all authentication methods which allow to calculate colliding messages, the underlying building blocks of the presented attacks expose the potential pitfalls arising as a consequence of non-ITS authentication in QKD post-processing. We propose countermeasures, increasing the eavesdroppers demand for computational power, and also prove necessary and sufficient conditions for upgrading the discussed authentication code to the ITS level.
Robust Routing Protocol For Digital Messages
NASA Technical Reports Server (NTRS)
Marvit, Maclen
1994-01-01
Refinement of ditigal-message-routing protocol increases fault tolerance of polled networks. AbNET-3 is latest of generic AbNET protocols for transmission of messages among computing nodes. AbNET concept described in "Multiple-Ring Digital Communication Network" (NPO-18133). Specifically aimed at increasing fault tolerance of network in broadcast mode, in which one node broadcasts message to and receives responses from all other nodes. Communication in network of computers maintained even when links fail.
Performance comparison of token ring protocols for hard-real-time communication
NASA Technical Reports Server (NTRS)
Kamat, Sanjay; Zhao, Wei
1992-01-01
The ability to guarantee the deadlines of synchronous messages while maintaining a good aggregate throughput is an important consideration in the design of distributed real-time systems. In this paper, we study two token ring protocols, the priority driven protocol and the timed token protocol, for their suitability for hard real-time systems. Both these protocols use a token to control access to the transmission medium. In a priority driven protocol, messages are assigned priorities and the protocol ensures that messages are transmitted in the order of their priorities. Timed token protocols do not provide for priority arbitration but ensure that the maximum access delay for a station is bounded. For both protocols, we first derive the schedulability conditions under which the transmission deadlines of a given set of synchronous messages can be guaranteed. Subsequently, we use these schedulability conditions to quantitatively compare the average case behavior of the protocols. This comparison demonstrates that each of the protocols has its domain of superior performance and neither dominates the other for the entire range of operating conditions.
ERIC Educational Resources Information Center
Schwan, Stephan; Straub, Daniela; Hesse, Friedrich W.
2002-01-01
Describes a study of computer conferencing where learners interacted over the course of four log-in sessions to acquire the knowledge sufficient to pass a learning test. Studied the number of messages irrelevant to the topic, explicit threading of messages, reading times of relevant messages, and learning outcomes. (LRW)
Scalable Replay with Partial-Order Dependencies for Message-Logging Fault Tolerance
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lifflander, Jonathan; Meneses, Esteban; Menon, Harshita
2014-09-22
Deterministic replay of a parallel application is commonly used for discovering bugs or to recover from a hard fault with message-logging fault tolerance. For message passing programs, a major source of overhead during forward execution is recording the order in which messages are sent and received. During replay, this ordering must be used to deterministically reproduce the execution. Previous work in replay algorithms often makes minimal assumptions about the programming model and application in order to maintain generality. However, in many cases, only a partial order must be recorded due to determinism intrinsic in the code, ordering constraints imposed bymore » the execution model, and events that are commutative (their relative execution order during replay does not need to be reproduced exactly). In this paper, we present a novel algebraic framework for reasoning about the minimum dependencies required to represent the partial order for different concurrent orderings and interleavings. By exploiting this theory, we improve on an existing scalable message-logging fault tolerance scheme. The improved scheme scales to 131,072 cores on an IBM BlueGene/P with up to 2x lower overhead than one that records a total order.« less
Controlled Bidirectional Quantum Secure Direct Communication
Chou, Yao-Hsin; Lin, Yu-Ting; Zeng, Guo-Jyun; Lin, Fang-Jhu; Chen, Chi-Yuan
2014-01-01
We propose a novel protocol for controlled bidirectional quantum secure communication based on a nonlocal swap gate scheme. Our proposed protocol would be applied to a system in which a controller (supervisor/Charlie) controls the bidirectional communication with quantum information or secret messages between legitimate users (Alice and Bob). In this system, the legitimate users must obtain permission from the controller in order to exchange their respective quantum information or secret messages simultaneously; the controller is unable to obtain any quantum information or secret messages from the decoding process. Moreover, the presence of the controller also avoids the problem of one legitimate user receiving the quantum information or secret message before the other, and then refusing to help the other user decode the quantum information or secret message. Our proposed protocol is aimed at protecting against external and participant attacks on such a system, and the cost of transmitting quantum bits using our protocol is less than that achieved in other studies. Based on the nonlocal swap gate scheme, the legitimate users exchange their quantum information or secret messages without transmission in a public channel, thus protecting against eavesdroppers stealing the secret messages. PMID:25006596
The Quantum Steganography Protocol via Quantum Noisy Channels
NASA Astrophysics Data System (ADS)
Wei, Zhan-Hong; Chen, Xiu-Bo; Niu, Xin-Xin; Yang, Yi-Xian
2015-08-01
As a promising branch of quantum information hiding, Quantum steganography aims to transmit secret messages covertly in public quantum channels. But due to environment noise and decoherence, quantum states easily decay and change. Therefore, it is very meaningful to make a quantum information hiding protocol apply to quantum noisy channels. In this paper, we make the further research on a quantum steganography protocol for quantum noisy channels. The paper proved that the protocol can apply to transmit secret message covertly in quantum noisy channels, and explicity showed quantum steganography protocol. In the protocol, without publishing the cover data, legal receivers can extract the secret message with a certain probability, which make the protocol have a good secrecy. Moreover, our protocol owns the independent security, and can be used in general quantum communications. The communication, which happen in our protocol, do not need entangled states, so our protocol can be used without the limitation of entanglement resource. More importantly, the protocol apply to quantum noisy channels, and can be used widely in the future quantum communication.
GUMP: Adapting Client/Server Messaging Protocols into Peer-to-Peer Serverless Environments
2010-06-11
and other related metadata, such as message re- ceiver ID (for supporting multiple connections) and so forth. The Proxy consumes the message and uses...the underlying discovery subsystem and multicast to process the message and translate the request into behaviour suitable for the un- derlying...communication i.e. a chat. Jingle (XEP-0166) [26] is a related specification that de- fines an extension to the XMPP protocol for initiating and
Probability Distributions over Cryptographic Protocols
2009-06-01
Artificial Immune Algorithm . . . . . . . . . . . . . . . . . . . 9 3 Design Decisions 11 3.1 Common Ground...creation algorithm for unbounded distribution . . . . . . . 24 4.2 Message creation algorithm for unbounded naive distribution . . . . 24 4.3 Protocol...creation algorithm for intended-run distributions . . . . . . 26 4.4 Protocol and message creation algorithm for realistic distribution . . 32 ix THIS
Alternative parallel ring protocols
NASA Technical Reports Server (NTRS)
Mukkamala, R.; Foudriat, E. C.; Maly, Kurt J.; Kale, V.
1990-01-01
Communication protocols are know to influence the utilization and performance of communication network. The effect of two token ring protocols on a gigabit network with multiple ring structure is investigated. In the first protocol, a mode sends at most one message on receiving a token. In the second protocol, a mode sends all the waiting messages when a token is received. The behavior of these protocols is shown to be highly dependent on the number of rings as well as the load in the network.
Transaction aware tape-infrastructure monitoring
NASA Astrophysics Data System (ADS)
Nikolaidis, Fotios; Kruse, Daniele Francesco
2014-06-01
Administrating a large scale, multi protocol, hierarchical tape infrastructure like the CERN Advanced STORage manager (CASTOR)[2], which stores now 100 PB (with an increasing step of 25 PB per year), requires an adequate monitoring system for quick spotting of malfunctions, easier debugging and on demand report generation. The main challenges for such system are: to cope with CASTOR's log format diversity and its information scattered among several log files, the need for long term information archival, the strict reliability requirements and the group based GUI visualization. For this purpose, we have designed, developed and deployed a centralized system consisting of four independent layers: the Log Transfer layer for collecting log lines from all tape servers to a single aggregation server, the Data Mining layer for combining log data into transaction context, the Storage layer for archiving the resulting transactions and finally the Web UI layer for accessing the information. Having flexibility, extensibility and maintainability in mind, each layer is designed to work as a message broker for the next layer, providing a clean and generic interface while ensuring consistency, redundancy and ultimately fault tolerance. This system unifies information previously dispersed over several monitoring tools into a single user interface, using Splunk, which also allows us to provide information visualization based on access control lists (ACL). Since its deployment, it has been successfully used by CASTOR tape operators for quick overview of transactions, performance evaluation, malfunction detection and from managers for report generation.
A sessional blind signature based on quantum cryptography
NASA Astrophysics Data System (ADS)
Khodambashi, Siavash; Zakerolhosseini, Ali
2014-01-01
In this paper, we present a sessional blind signature protocol whose security is guaranteed by fundamental principles of quantum physics. It allows a message owner to get his message signed by an authorized signatory. However, the signatory is not capable of reading the message contents and everyone can verify authenticity of the message. For this purpose, we took advantage of a sessional signature as well as quantum entangled pairs which are generated with respect to it in our proposed protocol. We describe our proposed blind signature through an example and briefly discuss about its unconditional security. Due to the feasibility of the protocol, it can be widely employed for e-payment, e-government, e-business and etc.
47 CFR 10.350 - CMAS testing requirements.
Code of Federal Regulations, 2010 CFR
2010-10-01
... maintenance windows. (3) A Participating CMS Provider may forego an RMT if the RMT is pre-empted by actual... Gateway Administrator using a defined test message. Real event codes or alert messages shall not be used... automated log of RMT messages received by the CMS Provider Gateway from the Federal Alert Gateway. (b...
47 CFR 10.350 - CMAS Testing requirements.
Code of Federal Regulations, 2011 CFR
2011-10-01
... maintenance windows. (3) A Participating CMS Provider may forego an RMT if the RMT is pre-empted by actual... Gateway Administrator using a defined test message. Real event codes or alert messages shall not be used... automated log of RMT messages received by the CMS Provider Gateway from the Federal Alert Gateway. (b...
Windows Instant Messaging App Forensics: Facebook and Skype as Case Studies
Yang, Teing Yee; Dehghantanha, Ali; Choo, Kim-Kwang Raymond; Muda, Zaiton
2016-01-01
Instant messaging (IM) has changed the way people communicate with each other. However, the interactive and instant nature of these applications (apps) made them an attractive choice for malicious cyber activities such as phishing. The forensic examination of IM apps for modern Windows 8.1 (or later) has been largely unexplored, as the platform is relatively new. In this paper, we seek to determine the data remnants from the use of two popular Windows Store application software for instant messaging, namely Facebook and Skype on a Windows 8.1 client machine. This research contributes to an in-depth understanding of the types of terrestrial artefacts that are likely to remain after the use of instant messaging services and application software on a contemporary Windows operating system. Potential artefacts detected during the research include data relating to the installation or uninstallation of the instant messaging application software, log-in and log-off information, contact lists, conversations, and transferred files. PMID:26982207
Windows Instant Messaging App Forensics: Facebook and Skype as Case Studies.
Yang, Teing Yee; Dehghantanha, Ali; Choo, Kim-Kwang Raymond; Muda, Zaiton
2016-01-01
Instant messaging (IM) has changed the way people communicate with each other. However, the interactive and instant nature of these applications (apps) made them an attractive choice for malicious cyber activities such as phishing. The forensic examination of IM apps for modern Windows 8.1 (or later) has been largely unexplored, as the platform is relatively new. In this paper, we seek to determine the data remnants from the use of two popular Windows Store application software for instant messaging, namely Facebook and Skype on a Windows 8.1 client machine. This research contributes to an in-depth understanding of the types of terrestrial artefacts that are likely to remain after the use of instant messaging services and application software on a contemporary Windows operating system. Potential artefacts detected during the research include data relating to the installation or uninstallation of the instant messaging application software, log-in and log-off information, contact lists, conversations, and transferred files.
High-Dimensional Circular Quantum Secret Sharing Using Orbital Angular Momentum
NASA Astrophysics Data System (ADS)
Tang, Dawei; Wang, Tie-jun; Mi, Sichen; Geng, Xiao-Meng; Wang, Chuan
2016-11-01
Quantum secret sharing is to distribute secret message securely between multi-parties. Here exploiting orbital angular momentum (OAM) state of single photons as the information carrier, we propose a high-dimensional circular quantum secret sharing protocol which increases the channel capacity largely. In the proposed protocol, the secret message is split into two parts, and each encoded on the OAM state of single photons. The security of the protocol is guaranteed by the laws of non-cloning theorem. And the secret messages could not be recovered except that the two receivers collaborated with each other. Moreover, the proposed protocol could be extended into high-level quantum systems, and the enhanced security could be achieved.
TeleHealth networks: Instant messaging and point-to-point communication over the internet
NASA Astrophysics Data System (ADS)
Sachpazidis, Ilias; Ohl, Roland; Kontaxakis, George; Sakas, Georgios
2006-12-01
This paper explores the advantages and disadvantages of a medical network based on point-to-point communication and a medical network based on Jabber instant messaging protocol. Instant messaging might be, for many people, a convenient way of chatting over the Internet. We will attempt to illustrate how an instant messaging protocol could serve in the best way medical services and provide great flexibility to the involved parts. Additionally, the directory services and presence status offered by the Jabber protocol make it very attractive to medical applications that need to have real time and store and forward communication. Furthermore, doctors connected to Internet via high-speed networks could benefit by saving time due to the data transmission acceleration over Jabber.
Scalable Multicast Protocols for Overlapped Groups in Broker-Based Sensor Networks
NASA Astrophysics Data System (ADS)
Kim, Chayoung; Ahn, Jinho
In sensor networks, there are lots of overlapped multicast groups because of many subscribers, associated with their potentially varying specific interests, querying every event to sensors/publishers. And gossip based communication protocols are promising as one of potential solutions providing scalability in P(Publish)/ S(Subscribe) paradigm in sensor networks. Moreover, despite the importance of both guaranteeing message delivery order and supporting overlapped multicast groups in sensor or P2P networks, there exist little research works on development of gossip-based protocols to satisfy all these requirements. In this paper, we present two versions of causally ordered delivery guaranteeing protocols for overlapped multicast groups. The one is based on sensor-broker as delegates and the other is based on local views and delegates representing subscriber subgroups. In the sensor-broker based protocol, sensor-broker might lead to make overlapped multicast networks organized by subscriber's interests. The message delivery order has been guaranteed consistently and all multicast messages are delivered to overlapped subscribers using gossip based protocols by sensor-broker. Therefore, these features of the sensor-broker based protocol might be significantly scalable rather than those of the protocols by hierarchical membership list of dedicated groups like traditional committee protocols. And the subscriber-delegate based protocol is much stronger rather than fully decentralized protocols guaranteeing causally ordered delivery based on only local views because the message delivery order has been guaranteed consistently by all corresponding members of the groups including delegates. Therefore, this feature of the subscriber-delegate protocol is a hybrid approach improving the inherent scalability of multicast nature by gossip-based technique in all communications.
Instant Messaging between Students and Faculty: A Tool for Increasing Student-Faculty Interaction
ERIC Educational Resources Information Center
Hickerson, Corey A.; Giglio, Matt
2009-01-01
This study explores the pedagogical potential of instant messaging in a communication course. Two instructors made themselves available to students via instant messaging as a supplement to other modes of communication (e.g., e-mail, office hours). In order to gauge students' reactions to and use of the technology, the researchers kept logs of…
Instant Messaging for Creating Interactive and Collaborative m-Learning Environments
ERIC Educational Resources Information Center
Kadirire, James
2007-01-01
"Instant Messaging" (IM) and "Presence," which is essentially the ability of being able to detect if other users are logged in on the network and send them messages in real time, has become one of the most popular applications of the Internet, causing people to want to stay connected to the Internet for inordinate amounts of…
Performance Analysis of the Mobile IP Protocol (RFC 3344 and Related RFCS)
2006-12-01
Encapsulation HMAC Keyed-Hash Message Authentication Code ICMP Internet Control Message Protocol IEEE Institute of Electrical and Electronics Engineers IETF...Internet Engineering Task Force IOS Internetwork Operating System IP Internet Protocol ITU International Telecommunication Union LAN Local Area...network computing. Most organizations today have sophisticated networks that are connected to the Internet. The major benefit reaped from such a
Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks.
Chen, Young-Long; Liau, Ren-Hau; Chang, Liang-Yu
2016-01-01
People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communication channel. The content of the message number is not considered in a multiple secure authentication protocol. The more excessive transmission of messages would be easier to collect and decode by hackers. In this paper, we propose two schemes which allow the server to validate the user and reduce the number of messages using the XOR operation. Our schemes can improve the security of the authentication protocol. The experimental results show that our proposed authentication protocols are more secure and effective. In regard to applications of second authentication communication channels for a smart access control system, identity identification and E-wallet, our proposed authentication protocols can ensure the safety of person and property, and achieve more effective security management mechanisms.
NASA Astrophysics Data System (ADS)
Wei, Chun-Yan; Gao, Fei; Wen, Qiao-Yan; Wang, Tian-Yin
2014-12-01
Until now, the only kind of practical quantum private query (QPQ), quantum-key-distribution (QKD)-based QPQ, focuses on the retrieval of a single bit. In fact, meaningful message is generally composed of multiple adjacent bits (i.e., a multi-bit block). To obtain a message from database, the user Alice has to query l times to get each ai. In this condition, the server Bob could gain Alice's privacy once he obtains the address she queried in any of the l queries, since each ai contributes to the message Alice retrieves. Apparently, the longer the retrieved message is, the worse the user privacy becomes. To solve this problem, via an unbalanced-state technique and based on a variant of multi-level BB84 protocol, we present a protocol for QPQ of blocks, which allows the user to retrieve a multi-bit block from database in one query. Our protocol is somewhat like the high-dimension version of the first QKD-based QPQ protocol proposed by Jacobi et al., but some nontrivial modifications are necessary.
Wei, Chun-Yan; Gao, Fei; Wen, Qiao-Yan; Wang, Tian-Yin
2014-01-01
Until now, the only kind of practical quantum private query (QPQ), quantum-key-distribution (QKD)-based QPQ, focuses on the retrieval of a single bit. In fact, meaningful message is generally composed of multiple adjacent bits (i.e., a multi-bit block). To obtain a message from database, the user Alice has to query l times to get each ai. In this condition, the server Bob could gain Alice's privacy once he obtains the address she queried in any of the l queries, since each ai contributes to the message Alice retrieves. Apparently, the longer the retrieved message is, the worse the user privacy becomes. To solve this problem, via an unbalanced-state technique and based on a variant of multi-level BB84 protocol, we present a protocol for QPQ of blocks, which allows the user to retrieve a multi-bit block from database in one query. Our protocol is somewhat like the high-dimension version of the first QKD-based QPQ protocol proposed by Jacobi et al., but some nontrivial modifications are necessary. PMID:25518810
47 CFR 11.51 - EAS code and Attention Signal Transmission requirements.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Message (EOM) codes using the EAS Protocol. The Attention Signal must precede any emergency audio message... audio messages. No Attention Signal is required for EAS messages that do not contain audio programming... EAS messages in the main audio channel. All DAB stations shall also transmit EAS messages on all audio...
47 CFR 11.51 - EAS code and Attention Signal Transmission requirements.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Message (EOM) codes using the EAS Protocol. The Attention Signal must precede any emergency audio message... audio messages. No Attention Signal is required for EAS messages that do not contain audio programming... EAS messages in the main audio channel. All DAB stations shall also transmit EAS messages on all audio...
47 CFR 11.51 - EAS code and Attention Signal Transmission requirements.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Message (EOM) codes using the EAS Protocol. The Attention Signal must precede any emergency audio message... audio messages. No Attention Signal is required for EAS messages that do not contain audio programming... EAS messages in the main audio channel. All DAB stations shall also transmit EAS messages on all audio...
Toward Synthesis, Analysis, and Certification of Security Protocols
NASA Technical Reports Server (NTRS)
Schumann, Johann
2004-01-01
Implemented security protocols are basically pieces of software which are used to (a) authenticate the other communication partners, (b) establish a secure communication channel between them (using insecure communication media), and (c) transfer data between the communication partners in such a way that these data only available to the desired receiver, but not to anyone else. Such an implementation usually consists of the following components: the protocol-engine, which controls in which sequence the messages of the protocol are sent over the network, and which controls the assembly/disassembly and processing (e.g., decryption) of the data. the cryptographic routines to actually encrypt or decrypt the data (using given keys), and t,he interface to the operating system and to the application. For a correct working of such a security protocol, all of these components must work flawlessly. Many formal-methods based techniques for the analysis of a security protocols have been developed. They range from using specific logics (e.g.: BAN-logic [4], or higher order logics [12] to model checking [2] approaches. In each approach, the analysis tries to prove that no (or at least not a modeled intruder) can get access to secret data. Otherwise, a scenario illustrating the &tack may be produced. Despite the seeming simplicity of security protocols ("only" a few messages are sent between the protocol partners in order to ensure a secure communication), many flaws have been detected. Unfortunately, even a perfect protocol engine does not guarantee flawless working of a security protocol, as incidents show. Many break-ins and security vulnerabilities are caused by exploiting errors in the implementation of the protocol engine or the underlying operating system. Attacks using buffer-overflows are a very common class of such attacks. Errors in the implementation of exception or error handling can open up additional vulnerabilities. For example, on a website with a log-in screen: multiple tries with invalid passwords caused the expected error message (too many retries). but let the user nevertheless pass. Finally, security can be compromised by silly implementation bugs or design decisions. In a commercial VPN software, all calls to the encryption routines were incidentally replaced by stubs, probably during factory testing. The product worked nicely. and the error (an open VPN) would have gone undetected, if a team member had not inspected the low-level traffic out of curiosity. Also, the use secret proprietary encryption routines can backfire, because such algorithms often exhibit weaknesses which can be exploited easily (see e.g., DVD encoding). Summarizing, there is large number of possibilities to make errors which can compromise the security of a protocol. In today s world with short time-to-market and the use of security protocols in open and hostile networks for safety-critical applications (e.g., power or air-traffic control), such slips could lead to catastrophic situations. Thus, formal methods and automatic reasoning techniques should not be used just for the formal proof of absence of an attack, but they ought to be used to provide an end-to-end tool-supported framework for security software. With such an approach all required artifacts (code, documentation, test cases) , formal analyses, and reliable certification will be generated automatically, given a single, high level specification. By a combination of program synthesis, formal protocol analysis, certification; and proof-carrying code, this goal is within practical reach, since all the important technologies for such an approach actually exist and only need to be assembled in the right way.
Improving UDP/IP Transmission Without Increasing Congestion
NASA Technical Reports Server (NTRS)
Burleigh, Scott
2006-01-01
Datagram Retransmission (DGR) is a computer program that, within certain limits, ensures the reception of each datagram transmitted under the User Datagram Protocol/Internet Protocol. [User Datagram Protocol (UDP) is considered unreliable because it does not involve a reliability-ensuring connection-initiation dialogue between sender and receiver. UDP is well suited to issuing of many small messages to many different receivers.] Unlike prior software for ensuring reception of UDP datagrams, DGR does not contribute to network congestion by retransmitting data more frequently as an ever-increasing number of messages and acknowledgements is lost. Instead, DGR does just the opposite: DGR includes an adaptive timeout-interval- computing component that provides maximum opportunity for reception of acknowledgements, minimizing retransmission. By monitoring changes in the rate at which message-transmission transactions are completed, DGR detects changes in the level of congestion and responds by imposing varying degrees of delay on the transmission of new messages. In addition, DGR maximizes throughput by not waiting for acknowledgement of a message before sending the next message. All DGR communication is asynchronous, to maximize efficient utilization of network connections. DGR manages multiple concurrent datagram transmission and acknowledgement conversations.
Hugelius, Karin; Gifford, Mervyn; Örtenwall, Per; Adolfsson, Annsofie
2016-08-01
Crisis communication is seen as an integrated and essential part of disaster management measures. After Typhoon Haiyan (Yolanda) in the Philippines 2013, radio was used to broadcast information to the affected community. The aim of this study was to describe how disaster radio was used to communicate vital messages and health-related information to the public in one affected region after Typhoon Haiyan. Mixed-methods analysis using qualitative content analysis and descriptive statistics was used to analyze 2587 logged radio log files. Radio was used to give general information and to demonstrate the capability of officials to manage the situation, to encourage, to promote recovery and foster a sense of hope, and to give practical advice and encourage self-activity. The content and focus of the messages changed over time. Encouraging messages were the most frequently broadcast messages. Health-related messages were a minor part of all information broadcast and gaps in the broadcast over time were found. Disaster radio can serve as a transmitter of vital messages including health-related information and psychological support in disaster areas. The present study indicated the potential for increased use. The perception, impact, and use of disaster radio need to be further evaluated. (Disaster Med Public Health Preparedness. 2016;10:591-597).
Liu, Shuang; Willoughby, Jessica F
2018-01-01
Fitness tracking apps have the potential to change unhealthy lifestyles, but users' lack of compliance is an issue. The current intervention examined the effectiveness of using goal-setting theory-based text message reminders to promote tracking activities on fitness apps. We conducted a 2-week experiment with pre- and post-tests with young adults (n = 50). Participants were randomly assigned to two groups-a goal-setting text message reminder group and a generic text message reminder group. Participants were asked to use a fitness tracking app to log physical activity and diet for the duration of the study. Participants who received goal-setting reminders logged significantly more physical activities than those who only received generic reminders. Further, participants who received goal-setting reminders liked the messages and showed significantly increased self-efficacy, awareness of personal goals, motivation, and intention to use the app. The study shows that incorporating goal-setting theory-based text message reminders can be useful to boost user compliance with self-monitoring fitness apps by reinforcing users' personal goals and enhancing cognitive factors associated with health behavior change.
An Efficient Two-Tier Causal Protocol for Mobile Distributed Systems
Dominguez, Eduardo Lopez; Pomares Hernandez, Saul E.; Gomez, Gustavo Rodriguez; Medina, Maria Auxilio
2013-01-01
Causal ordering is a useful tool for mobile distributed systems (MDS) to reduce the non-determinism induced by three main aspects: host mobility, asynchronous execution, and unpredictable communication delays. Several causal protocols for MDS exist. Most of them, in order to reduce the overhead and the computational cost over wireless channels and mobile hosts (MH), ensure causal ordering at and according to the causal view of the Base Stations. Nevertheless, these protocols introduce certain disadvantage, such as unnecessary inhibition at the delivery of messages. In this paper, we present an efficient causal protocol for groupware that satisfies the MDS's constraints, avoiding unnecessary inhibitions and ensuring the causal delivery based on the view of the MHs. One interesting aspect of our protocol is that it dynamically adapts the causal information attached to each message based on the number of messages with immediate dependency relation, and this is not directly proportional to the number of MHs. PMID:23585828
NASA Astrophysics Data System (ADS)
Wang, Lili; Ma, Wenping
2016-02-01
In this paper, we propose a new controlled quantum secure direct communication (CQSDC) protocol with single photons in both polarization and spatial-mode degrees of freedom. Based on the defined local collective unitary operations, the sender’s secret messages can be transmitted directly to the receiver through encoding secret messages on the particles. Only with the help of the third side, the receiver can reconstruct the secret messages. Each single photon in two degrees of freedom can carry two bits of information, so the cost of our protocol is less than others using entangled qubits. Moreover, the security of our QSDC network protocol is discussed comprehensively. It is shown that our new CQSDC protocol cannot only defend the outsider eavesdroppers’ several sorts of attacks but also the inside attacks. Besides, our protocol is feasible since the preparation and the measurement of single photon quantum states in both the polarization and the spatial-mode degrees of freedom are available with current quantum techniques.
A carrier sensed multiple access protocol for high data base rate ring networks
NASA Technical Reports Server (NTRS)
Foudriat, E. C.; Maly, Kurt J.; Overstreet, C. Michael; Khanna, S.; Paterra, Frank
1990-01-01
The results of the study of a simple but effective media access protocol for high data rate networks are presented. The protocol is based on the fact that at high data rates networks can contain multiple messages simultaneously over their span, and that in a ring, nodes used to detect the presence of a message arriving from the immediate upstream neighbor. When an incoming signal is detected, the node must either abort or truncate a message it is presently sending. Thus, the protocol with local carrier sensing and multiple access is designated CSMA/RN. The performance of CSMA/RN with TTattempt and truncate is studied using analytic and simulation models. Three performance factors, wait or access time, service time and response or end-to-end travel time are presented. The service time is basically a function of the network rate, it changes by a factor of 1 between no load and full load. Wait time, which is zero for no load, remains small for load factors up to 70 percent of full load. Response time, which adds travel time while on the network to wait and service time, is mainly a function of network length, especially for longer distance networks. Simulation results are shown for CSMA/RN where messages are removed at the destination. A wide range of local and metropolitan area network parameters including variations in message size, network length, and node count are studied. Finally, a scaling factor based upon the ratio of message to network length demonstrates that the results, and hence, the CSMA/RN protocol, are applicable to wide area networks.
Reference Architecture for MNE 5 Technical System
2007-05-30
of being available in most experiments. Core Services A core set of applications whi directories, web portal and collaboration applications etc. A...classifications Messages (xml, JMS, content level…) Meta data filtering, who can initiate services Web browsing Collaboration & messaging Border...Exchange Ref Architecture for MNE5 Tech System.doc 9 of 21 audit logging Person and machine Data lev objects, web services, messages rification el
Wei, Chun-Yan; Gao, Fei; Wen, Qiao-Yan; Wang, Tian-Yin
2014-12-18
Until now, the only kind of practical quantum private query (QPQ), quantum-key-distribution (QKD)-based QPQ, focuses on the retrieval of a single bit. In fact, meaningful message is generally composed of multiple adjacent bits (i.e., a multi-bit block). To obtain a message a1a2···al from database, the user Alice has to query l times to get each ai. In this condition, the server Bob could gain Alice's privacy once he obtains the address she queried in any of the l queries, since each a(i) contributes to the message Alice retrieves. Apparently, the longer the retrieved message is, the worse the user privacy becomes. To solve this problem, via an unbalanced-state technique and based on a variant of multi-level BB84 protocol, we present a protocol for QPQ of blocks, which allows the user to retrieve a multi-bit block from database in one query. Our protocol is somewhat like the high-dimension version of the first QKD-based QPQ protocol proposed by Jacobi et al., but some nontrivial modifications are necessary.
NASA Astrophysics Data System (ADS)
Chapeland, S.; Carena, F.; Carena, W.; Chibante Barroso, V.; Costa, F.; Dénes, E.; Divià, R.; Fuchs, U.; Grigore, A.; Ionita, C.; Delort, C.; Simonetti, G.; Soós, C.; Telesca, A.; Vande Vyvre, P.; Von Haller, B.; Alice Collaboration
2014-04-01
ALICE (A Large Ion Collider Experiment) is a heavy-ion experiment studying the physics of strongly interacting matter and the quark-gluon plasma at the CERN LHC (Large Hadron Collider). The ALICE DAQ (Data Acquisition System) is based on a large farm of commodity hardware consisting of more than 600 devices (Linux PCs, storage, network switches). The DAQ reads the data transferred from the detectors through 500 dedicated optical links at an aggregated and sustained rate of up to 10 Gigabytes per second and stores at up to 2.5 Gigabytes per second. The infoLogger is the log system which collects centrally the messages issued by the thousands of processes running on the DAQ machines. It allows to report errors on the fly, and to keep a trace of runtime execution for later investigation. More than 500000 messages are stored every day in a MySQL database, in a structured table keeping track for each message of 16 indexing fields (e.g. time, host, user, ...). The total amount of logs for 2012 exceeds 75GB of data and 150 million rows. We present in this paper the architecture and implementation of this distributed logging system, consisting of a client programming API, local data collector processes, a central server, and interactive human interfaces. We review the operational experience during the 2012 run, in particular the actions taken to ensure shifters receive manageable and relevant content from the main log stream. Finally, we present the performance of this log system, and future evolutions.
Bell, Kerri; Warnick, Eugene; Nicholson, Kristen; Ulcoq, Sarah; Kim, Seong Jin; Schroeder, Gregory D; Vaccaro, Alexander
2018-03-01
Health care increasingly collects patient-reported outcomes (PROs) via web-based platforms. The purpose of this study was to evaluate how patient age influences portal engagement. Patients undergoing elective surgery at a single multispecialty orthopedic practice from September 2014 to February 2017 had access to an online portal to complete PROs, message the clinic, and view physical therapy instructions. A mobile app was optionally available. Age, sex, log-in frequency, PRO completion rates, and number of messages sent were reviewed retrospectively. Message frequency, log-in rates, and PRO compliance were highest for patients aged 41 to 50, 51 to 60, and 61 to 70, respectively. Mobile app use decreased with age ( P = .002); yet, at all ages, the mobile app group was more engaged. In particular, for patients aged 18 to 30 years, log-in frequency increased 2.5-fold and PRO compliance improved 44% ( P < .001) in the mobile app group. This study demonstrates that portal interaction varies by age and that data capture is highest in patients who choose the mobile app.
Using Publish-Subscribe Messaging for System Status and Automation
NASA Technical Reports Server (NTRS)
Smith, Danford S.
2015-01-01
The NASA Goddard Mission Services Evolution Center (GMSEC) system is a message-based plug-and-play open system architecture used in many of NASA mission operations centers. This presentation will focus on the use of GMSEC standard messages to report and analyze the status of a system and enable the automation of the system's components. In GMSEC systems, each component reports its status using a keep-alive message and also publishes status and activities as log messages. In addition, the components can accept functional directive messages from the GMSEC message bus. Over the past several years, development teams have found ways to utilize these messages to create innovative display pages and increasingly sophisticated approaches to automation. This presentation will show the flexibility and value of the message-based approach to system awareness and automation.
Usage of the hybrid encryption in a cloud instant messages exchange system
NASA Astrophysics Data System (ADS)
Kvyetnyy, Roman N.; Romanyuk, Olexander N.; Titarchuk, Evgenii O.; Gromaszek, Konrad; Mussabekov, Nazarbek
2016-09-01
A new approach for constructing cloud instant messaging represented in this article allows users to encrypt data locally by using Diffie - Hellman key exchange protocol. The described approach allows to construct a cloud service which operates only by users encrypted messages; encryption and decryption takes place locally at the user party using a symmetric AES encryption. A feature of the service is the conferences support without the need for messages reecryption for each participant. In the article it is given an example of the protocol implementation on the ECC and RSA encryption algorithms basis, as well as a comparison of these implementations.
Efficiency and security problems of anonymous key agreement protocol based on chaotic maps
NASA Astrophysics Data System (ADS)
Yoon, Eun-Jun
2012-07-01
In 2011, Niu-Wang proposed an anonymous key agreement protocol based on chaotic maps in [Niu Y, Wang X. An anonymous key agreement protocol based on chaotic maps. Commun Nonlinear Sci Simulat 2011;16(4):1986-92]. Niu-Wang's protocol not only achieves session key agreement between a server and a user, but also allows the user to anonymously interact with the server. Nevertheless, this paper points out that Niu-Wang's protocol has the following efficiency and security problems: (1) The protocol has computational efficiency problem when a trusted third party decrypts the user sending message. (2) The protocol is vulnerable to Denial of Service (DoS) attack based on illegal message modification by an attacker.
Quantum counterfactual communication without a weak trace
NASA Astrophysics Data System (ADS)
Arvidsson-Shukur, D. R. M.; Barnes, C. H. W.
2016-12-01
The classical theories of communication rely on the assumption that there has to be a flow of particles from Bob to Alice in order for him to send a message to her. We develop a quantum protocol that allows Alice to perceive Bob's message "counterfactually"; that is, without Alice receiving any particles that have interacted with Bob. By utilizing a setup built on results from interaction-free measurements, we outline a communication protocol whereby the information travels in the opposite direction of the emitted particles. In comparison to previous attempts on such protocols, this one is such that a weak measurement at the message source would not leave a weak trace that could be detected by Alice's receiver. While some interaction-free schemes require a large number of carefully aligned beam splitters, our protocol is realizable with two or more beam splitters. We demonstrate this protocol by numerically solving the time-dependent Schrödinger equation for a Hamiltonian that implements this quantum counterfactual phenomenon.
NASA Astrophysics Data System (ADS)
Pavičić, Mladen
2013-04-01
We show that in any quantum direct communication protocol that is based on Ψ and Φ Bell states, an eavesdropper can always tell Ψ from Φ states without altering the transmission in any way in the message mode. This renders all protocols that make use of only one Ψ state and one Φ state completely insecure in the message mode. All four-Bell-state protocols require a revision and this might be of importance for new implementations of entanglement-based cryptographic protocols. The detection rate of an eavesdropper is 25% per control transmission, i.e., a half of the rate in the two-state (ping-pong) protocol. An eavesdropper can detect control probes with certainty in the standard control transmission without a photon in the Alice-to-Bob's travel mode and with near certainty in a transmission with a fake photon in the travel mode. Resending of measured control photons via the travel mode would make an eavesdropper completely invisible.
Increasing the Operational Value of Event Messages
NASA Technical Reports Server (NTRS)
Li, Zhenping; Savkli, Cetin; Smith, Dan
2003-01-01
Assessing the health of a space mission has traditionally been performed using telemetry analysis tools. Parameter values are compared to known operational limits and are plotted over various time periods. This presentation begins with the notion that there is an incredible amount of untapped information contained within the mission s event message logs. Through creative advancements in message handling tools, the event message logs can be used to better assess spacecraft and ground system status and to highlight and report on conditions not readily apparent when messages are evaluated one-at-a-time during a real-time pass. Work in this area is being funded as part of a larger NASA effort at the Goddard Space Flight Center to create component-based, middleware-based, standards-based general purpose ground system architecture referred to as GMSEC - the GSFC Mission Services Evolution Center. The new capabilities and operational concepts for event display, event data analyses and data mining are being developed by Lockheed Martin and the new subsystem has been named GREAT - the GMSEC Reusable Event Analysis Toolkit. Planned for use on existing and future missions, GREAT has the potential to increase operational efficiency in areas of problem detection and analysis, general status reporting, and real-time situational awareness.
1982-10-01
BACK_ GVRATON; (geserate log me"ses from wather and wind planning log screenJ PERFORN AIPORT.PLANNIG LOGISSA ORItATION; (eSamrate log message from...ISSAGN H31.TAL(COUNT) .26 -kAUX imesase is constructed with wather imforimetiom ad stated) IF(VILO.TAM(J).DIl A(S)’ ’)1 (VXLOG.TABL(J).VU.(S)’ THEN
Advanced information processing system: Authentication protocols for network communication
NASA Technical Reports Server (NTRS)
Harper, Richard E.; Adams, Stuart J.; Babikyan, Carol A.; Butler, Bryan P.; Clark, Anne L.; Lala, Jaynarayan H.
1994-01-01
In safety critical I/O and intercomputer communication networks, reliable message transmission is an important concern. Difficulties of communication and fault identification in networks arise primarily because the sender of a transmission cannot be identified with certainty, an intermediate node can corrupt a message without certainty of detection, and a babbling node cannot be identified and silenced without lengthy diagnosis and reconfiguration . Authentication protocols use digital signature techniques to verify the authenticity of messages with high probability. Such protocols appear to provide an efficient solution to many of these problems. The objective of this program is to develop, demonstrate, and evaluate intercomputer communication architectures which employ authentication. As a context for the evaluation, the authentication protocol-based communication concept was demonstrated under this program by hosting a real-time flight critical guidance, navigation and control algorithm on a distributed, heterogeneous, mixed redundancy system of workstations and embedded fault-tolerant computers.
Deterministic secure quantum communication using a single d-level system.
Jiang, Dong; Chen, Yuanyuan; Gu, Xuemei; Xie, Ling; Chen, Lijun
2017-03-22
Deterministic secure quantum communication (DSQC) can transmit secret messages between two parties without first generating a shared secret key. Compared with quantum key distribution (QKD), DSQC avoids the waste of qubits arising from basis reconciliation and thus reaches higher efficiency. In this paper, based on data block transmission and order rearrangement technologies, we propose a DSQC protocol. It utilizes a set of single d-level systems as message carriers, which are used to directly encode the secret message in one communication process. Theoretical analysis shows that these employed technologies guarantee the security, and the use of a higher dimensional quantum system makes our protocol achieve higher security and efficiency. Since only quantum memory is required for implementation, our protocol is feasible with current technologies. Furthermore, Trojan horse attack (THA) is taken into account in our protocol. We give a THA model and show that THA significantly increases the multi-photon rate and can thus be detected.
Privacy-Preserving RFID Authentication Using Public Exponent Three RSA Algorithm
NASA Astrophysics Data System (ADS)
Kim, Yoonjeong; Ohm, Seongyong; Yi, Kang
In this letter, we propose a privacy-preserving authentication protocol with RSA cryptosystem in an RFID environment. For both overcoming the resource restriction and strengthening security, our protocol uses only modular exponentiation with exponent three at RFID tag side, with the padded random message whose length is greater than one-sixth of the whole message length.
Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication
NASA Astrophysics Data System (ADS)
Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru
In this paper, we propose password recovery attacks against challenge-response authentication protocols. Our attacks use a message difference for a MD5 collision attack proposed in IEICE 2008. First, we show how to efficiently find a message pair that collides with the above message difference. Second, we show that a password used in authenticated post office protocol (APOP) can be recovered practically. We also show that the password recovery attack can be applied to a session initiation protocol (SIP) and digest authentication. Our attack can recover up to the first 31 password characters in a short time and up to the first 60 characters faster than the naive search method. We have implemented our attack and confirmed that 31 characters can be successfully recovered.
NASA Technical Reports Server (NTRS)
Marvit, Maclen (Inventor); Kirkham, Harold (Inventor)
1995-01-01
The invention is a multiple interconnected network of intelligent message-repeating remote nodes which employs a remote node polling process performed by a master node by transmitting a polling message generically addressed to all remote nodes associated with the master node. Each remote node responds upon receipt of the generically addressed polling message by sequentially flooding the network with a poll-answering informational message and with the polling message.
AMS -- The Unix ADAM Message System
NASA Astrophysics Data System (ADS)
Kelly, B. D.; Chipperfield, A. J.
The ADAM Message System (AMS) library, which implements the ADAM inter-task communications protocol under Unix, is described, along with its Fortran-callable interface (FAMS). The description of AMS is distinguished from the current implementation which uses the Message System Primitives (MSP).
A native Bayesian classifier based routing protocol for VANETS
NASA Astrophysics Data System (ADS)
Bao, Zhenshan; Zhou, Keqin; Zhang, Wenbo; Gong, Xiaolei
2016-12-01
Geographic routing protocols are one of the most hot research areas in VANET (Vehicular Ad-hoc Network). However, there are few routing protocols can take both the transmission efficient and the usage of ratio into account. As we have noticed, different messages in VANET may ask different quality of service. So we raised a Native Bayesian Classifier based routing protocol (Naive Bayesian Classifier-Greedy, NBC-Greedy), which can classify and transmit different messages by its emergency degree. As a result, we can balance the transmission efficient and the usage of ratio with this protocol. Based on Matlab simulation, we can draw a conclusion that NBC-Greedy is more efficient and stable than LR-Greedy and GPSR.
Traub-Dargatz, Josie L; Weese, J Scott; Rousseau, Joyce D; Dunowska, Magdalena; Morley, Paul S; Dargatz, David A
2006-07-01
Reduction factors (RFs) for bacterial counts on examiners' hands were compared when performing a standardized equine physical examination, followed by the use of one of 3 hand-hygiene protocols (washing with soap, ethanol gel application, and chlorohexidine-ethanol application). The mean RFs were 1.29 log10 and 1.44 log10 at 2 study sites for the alcohol-gel (62% ethyl alcohol active ingredient) protocols and 1.47 log10 and 1.94 log10 at 2 study sites for the chlorhexidine-alcohol (61% ethyl alcohol plus 1% chlorhexidine active ingredients) protocols, respectively. The RFs were significantly different (P < 0.0001) between the hand-washing group and the other 2 treatment groups (the alcohol-gel and the chlorhexidine-alcohol lotion). The use of alcohol-based gels or chlorhexidine-alcohol hand hygiene protocols must still be proven effective in equine practice settings, but in this study, these protocols were equivalent or superior to hand washing for reduction in bacterial load on the hands of people after they perform routine physical examinations.
Traub-Dargatz, Josie L.; Weese, J. Scott; Rousseau, Joyce D.; Dunowska, Magdalena; Morley, Paul S.; Dargatz, David A.
2006-01-01
Abstract Reduction factors (RFs) for bacterial counts on examiners’ hands were compared when performing a standardized equine physical examination, followed by the use of one of 3 hand-hygiene protocols (washing with soap, ethanol gel application, and chlorohexidine-ethanol application). The mean RFs were 1.29 log10 and 1.44 log10 at 2 study sites for the alcohol-gel (62% ethyl alcohol active ingredient) protocols and 1.47 log10 and 1.94 log10 at 2 study sites for the chlorhexidine-alcohol (61% ethyl alcohol plus 1% chlorhexidine active ingredients) protocols, respectively. The RFs were significantly different (P < 0.0001) between the hand-washing group and the other 2 treatment groups (the alcohol-gel and the chlorhexidine-alcohol lotion). The use of alcohol-based gels or chlorhexidine-alcohol hand hygiene protocols must still be proven effective in equine practice settings, but in this study, these protocols were equivalent or superior to hand washing for reduction in bacterial load on the hands of people after they perform routine physical examinations. PMID:16898109
Asynchronous Messaging and Data Transfer in a Spacecraft: An Implementation
NASA Technical Reports Server (NTRS)
Moholt, Joseph M.
2005-01-01
Data transfer and messaging is an important part of a spacecraft. Creating a standard protocol for messaging that can be used for a variety of applications is an extremely beneficial project at the Jet Propulsion Laboratory (JPL). The Asynchronous Messaging Service (AMS) is a protocol outlining how subsystems initialize and conduct communication between each other. There are currently two implementations of AMS in the works. At JPL, my task is to get a working implementation of AMS onto vxWorks as a proof of concept. An Autocoder, a program used to convert visually created state chart diagrams to C++, has also been created to accomplish a part of the implementation. I was assigned to make the program portable on any Unix type environment. Lastly, I was to develop a program to demonstrate messaging between two FireWire cards running vxworks.
Sujansky, Walter; Wilson, Tom
2015-04-01
This report describes a grant-funded project to explore the use of DIRECT secure messaging for the electronic delivery of laboratory test results to outpatient physicians and electronic health record systems. The project seeks to leverage the inherent attributes of DIRECT secure messaging and electronic provider directories to overcome certain barriers to the delivery of lab test results in the outpatient setting. The described system enables laboratories that generate test results as HL7 messages to deliver these results as structured or unstructured documents attached to DIRECT secure messages. The system automatically analyzes generated HL7 messages and consults an electronic provider directory to determine the appropriate DIRECT address and delivery format for each indicated recipient. The system also enables lab results delivered to providers as structured attachments to be consumed by HL7 interface engines and incorporated into electronic health record systems. Lab results delivered as unstructured attachments may be printed or incorporated into patient records as PDF files. The system receives and logs acknowledgement messages to document the status of each transmitted lab result, and a graphical interface allows searching and review of this logged information. The described system is a fully implemented prototype that has been tested in a laboratory setting. Although this approach is promising, further work is required to pilot test the system in production settings with clinical laboratories and outpatient provider organizations. Copyright © 2015 Elsevier Inc. All rights reserved.
Remote Asynchronous Message Service Gateway
NASA Technical Reports Server (NTRS)
Wang, Shin-Ywan; Burleigh, Scott C.
2011-01-01
The Remote Asynchronous Message Service (RAMS) gateway is a special-purpose AMS application node that enables exchange of AMS messages between nodes residing in different AMS "continua," notionally in different geographical locations. JPL s implementation of RAMS gateway functionality is integrated with the ION (Interplanetary Overlay Network) implementation of the DTN (Delay-Tolerant Networking) bundle protocol, and with JPL s implementation of AMS itself. RAMS protocol data units are encapsulated in ION bundles and are forwarded to the neighboring RAMS gateways identified in the source gateway s AMS management information base. Each RAMS gateway has interfaces in two communication environments: the AMS message space it serves, and the RAMS network - the grid or tree of mutually aware RAMS gateways - that enables AMS messages produced in one message space to be forwarded to other message spaces of the same venture. Each gateway opens persistent, private RAMS network communication channels to the RAMS gateways of other message spaces for the same venture, in other continua. The interconnected RAMS gateways use these communication channels to forward message petition assertions and cancellations among themselves. Each RAMS gateway subscribes locally to all subjects that are of interest in any of the linked message spaces. On receiving its copy of a message on any of these subjects, the RAMS gateway node uses the RAMS network to forward the message to every other RAMS gateway whose message space contains at least one node that has subscribed to messages on that subject. On receiving a message via the RAMS network from some other RAMS gateway, the RAMS gateway node forwards the message to all subscribers in its own message space.
Cacades: A reliable dissemination protocol for data collection sensor network
Peng, Y.; Song, W.; Huang, R.; Xu, M.; Shirazi, B.; LaHusen, R.; Pei, G.
2009-01-01
In this paper, we propose a fast and reliable data dissemination protocol Cascades to disseminate data from the sink(base station) to all or a subset of nodes in a data collection sensor network. Cascades makes use of the parentmonitor-children analogy to ensure reliable dissemination. Each node monitors whether or not its children have received the broadcast messages through snooping children's rebroadcasts or waiting for explicit ACKs. If a node detects a gap in its message sequences, it can fetch the missing messages from its neighbours reactively. Cascades also considers many practical issues for field deployment, such as dynamic topology, link/node failure, etc.. It therefore guarantees that a disseminated message from the sink will reach all intended receivers and the dissemination is terminated in a short time period. Notice that, all existing dissemination protocols either do not guarantee reliability or do not terminate [1, 2], which does not meet the requirement of real-time command control. We conducted experiment evaluations in both TOSSIM simulator and a sensor network testbed to compare Cascades with those existing dissemination protocols in TinyOS sensor networks, which show that Cascades achieves a higher degree of reliability, lower communication cost, and less delivery delay. ??2009 IEEE.
Texting for Health: The Use of Participatory Methods to Develop Healthy Lifestyle Messages for Teens
ERIC Educational Resources Information Center
Hingle, Melanie; Nichter, Mimi; Medeiros, Melanie; Grace, Samantha
2013-01-01
Objective: To develop and test messages and a mobile phone delivery protocol designed to influence the nutrition and physical activity knowledge, attitudes, and behavior of adolescents. Design: Nine focus groups, 4 classroom discussions, and an 8-week pilot study exploring message content, format, origin, and message delivery were conducted over…
Message passing with a limited number of DMA byte counters
Blocksome, Michael [Rochester, MN; Chen, Dong [Croton on Hudson, NY; Giampapa, Mark E [Irvington, NY; Heidelberger, Philip [Cortlandt Manor, NY; Kumar, Sameer [White Plains, NY; Parker, Jeffrey J [Rochester, MN
2011-10-04
A method for passing messages in a parallel computer system constructed as a plurality of compute nodes interconnected as a network where each compute node includes a DMA engine but includes only a limited number of byte counters for tracking a number of bytes that are sent or received by the DMA engine, where the byte counters may be used in shared counter or exclusive counter modes of operation. The method includes using rendezvous protocol, a source compute node deterministically sending a request to send (RTS) message with a single RTS descriptor using an exclusive injection counter to track both the RTS message and message data to be sent in association with the RTS message, to a destination compute node such that the RTS descriptor indicates to the destination compute node that the message data will be adaptively routed to the destination node. Using one DMA FIFO at the source compute node, the RTS descriptors are maintained for rendezvous messages destined for the destination compute node to ensure proper message data ordering thereat. Using a reception counter at a DMA engine, the destination compute node tracks reception of the RTS and associated message data and sends a clear to send (CTS) message to the source node in a rendezvous protocol form of a remote get to accept the RTS message and message data and processing the remote get (CTS) by the source compute node DMA engine to provide the message data to be sent.
High speed polling protocol for multiple node network
NASA Technical Reports Server (NTRS)
Kirkham, Harold (Inventor)
1995-01-01
The invention is a multiple interconnected network of intelligent message-repeating remote nodes which employs a remote node polling process performed by a master node by transmitting a polling message generically addressed to all remote nodes associated with the master node. Each remote node responds upon receipt of the generically addressed polling message by transmitting a poll-answering informational message and by relaying the polling message to other adjacent remote nodes.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gunter, Dan; Lee, Jason; Stoufer, Martin
2003-03-28
The NetLogger Toolkit is designed to monitor, under actual operating conditions, the behavior of all the elements of the application-to-application communication path in order to determine exactly where time is spent within a complex system Using NetLogger, distnbuted application components are modified to produce timestamped logs of "interesting" events at all the critical points of the distributed system Events from each component are correlated, which allov^ one to characterize the performance of all aspects of the system and network in detail. The NetLogger Toolkit itself consists of four components an API and library of functions to simplify the generation ofmore » application-level event logs, a set of tools for collecting and sorting log files, an event archive system, and a tool for visualization and analysis of the log files In order to instrument an application to produce event logs, the application developer inserts calls to the NetLogger API at all the critical points in the code, then links the application with the NetLogger library All the tools in the NetLogger Toolkit share a common log format, and assume the existence of accurate and synchronized system clocks NetLogger messages can be logged using an easy-to-read text based format based on the lETF-proposed ULM format, or a binary format that can still be used through the same API but that is several times faster and smaller, with performance comparable or better than binary message formats such as MPI, XDR, SDDF-Binary, and PBIO. The NetLogger binary format is both highly efficient and self-describing, thus optimized for the dynamic message construction and parsing of application instrumentation. NetLogger includes an "activation" API that allows NetLogger logging to be turned on, off, or modified by changing an external file This IS useful for activating logging in daemons/services (e g GndFTP server). The NetLogger reliability API provides the ability to specify backup logging locations and penodically try to reconnect broken TCP pipe. A typical use for this is to store data on local disk while net is down. An event archiver can log one or more incoming NetLogger streams to a local disk file (netlogd) or to a mySQL database (netarchd). We have found exploratory, visual analysis of the log event data to be the most useful means of determining the causes of performance anomalies The NetLogger Visualization tool, niv, has been developed to provide a flexible and interactive graphical representation of system-level and application-level events.« less
A decentralized software bus based on IP multicas ting
NASA Technical Reports Server (NTRS)
Callahan, John R.; Montgomery, Todd
1995-01-01
We describe decentralized reconfigurable implementation of a conference management system based on the low-level Internet Protocol (IP) multicasting protocol. IP multicasting allows low-cost, world-wide, two-way transmission of data between large numbers of conferencing participants through the Multicasting Backbone (MBone). Each conference is structured as a software bus -- a messaging system that provides a run-time interconnection model that acts as a separate agent (i.e., the bus) for routing, queuing, and delivering messages between distributed programs. Unlike the client-server interconnection model, the software bus model provides a level of indirection that enhances the flexibility and reconfigurability of a distributed system. Current software bus implementations like POLYLITH, however, rely on a centralized bus process and point-to-point protocols (i.e., TCP/IP) to route, queue, and deliver messages. We implement a software bus called the MULTIBUS that relies on a separate process only for routing and uses a reliable IP multicasting protocol for delivery of messages. The use of multicasting means that interconnections are independent of IP machine addresses. This approach allows reconfiguration of bus participants during system execution without notifying other participants of new IP addresses. The use of IP multicasting also permits an economy of scale in the number of participants. We describe the MULITIBUS protocol elements and show how our implementation performs better than centralized bus implementations.
A Secure Region-Based Geographic Routing Protocol (SRBGR) for Wireless Sensor Networks
Adnan, Ali Idarous; Hanapi, Zurina Mohd; Othman, Mohamed; Zukarnain, Zuriati Ahmad
2017-01-01
Due to the lack of dependency for routing initiation and an inadequate allocated sextant on responding messages, the secure geographic routing protocols for Wireless Sensor Networks (WSNs) have attracted considerable attention. However, the existing protocols are more likely to drop packets when legitimate nodes fail to respond to the routing initiation messages while attackers in the allocated sextant manage to respond. Furthermore, these protocols are designed with inefficient collection window and inadequate verification criteria which may lead to a high number of attacker selections. To prevent the failure to find an appropriate relay node and undesirable packet retransmission, this paper presents Secure Region-Based Geographic Routing Protocol (SRBGR) to increase the probability of selecting the appropriate relay node. By extending the allocated sextant and applying different message contention priorities more legitimate nodes can be admitted in the routing process. Moreover, the paper also proposed the bound collection window for a sufficient collection time and verification cost for both attacker identification and isolation. Extensive simulation experiments have been performed to evaluate the performance of the proposed protocol in comparison with other existing protocols. The results demonstrate that SRBGR increases network performance in terms of the packet delivery ratio and isolates attacks such as Sybil and Black hole. PMID:28121992
A Secure Region-Based Geographic Routing Protocol (SRBGR) for Wireless Sensor Networks.
Adnan, Ali Idarous; Hanapi, Zurina Mohd; Othman, Mohamed; Zukarnain, Zuriati Ahmad
2017-01-01
Due to the lack of dependency for routing initiation and an inadequate allocated sextant on responding messages, the secure geographic routing protocols for Wireless Sensor Networks (WSNs) have attracted considerable attention. However, the existing protocols are more likely to drop packets when legitimate nodes fail to respond to the routing initiation messages while attackers in the allocated sextant manage to respond. Furthermore, these protocols are designed with inefficient collection window and inadequate verification criteria which may lead to a high number of attacker selections. To prevent the failure to find an appropriate relay node and undesirable packet retransmission, this paper presents Secure Region-Based Geographic Routing Protocol (SRBGR) to increase the probability of selecting the appropriate relay node. By extending the allocated sextant and applying different message contention priorities more legitimate nodes can be admitted in the routing process. Moreover, the paper also proposed the bound collection window for a sufficient collection time and verification cost for both attacker identification and isolation. Extensive simulation experiments have been performed to evaluate the performance of the proposed protocol in comparison with other existing protocols. The results demonstrate that SRBGR increases network performance in terms of the packet delivery ratio and isolates attacks such as Sybil and Black hole.
The covert channel over HTTP protocol
NASA Astrophysics Data System (ADS)
Graniszewski, Waldemar; Krupski, Jacek; Szczypiorski, Krzysztof
2016-09-01
The paper presents a new steganographic method - the covert channel is created over HTTP protocol header, i.e. trailer field. HTTP protocol is one of the most frequently used in the Internet. The popularity of the Web servers and network traffic from, and to them, is one of the requirements for undetectable message exchange. To study this kind of the information hiding technique an application in Javascript language based on the Node.js framework was written. The results of the experiment that was performed to send a message in the covert channel are also presented.
Fault-Tolerant Self-Stabilizing Distributed Clock Synchronization Protocol for Arbitrary Digraphs
NASA Technical Reports Server (NTRS)
Malekpour, Mahyar R. (Inventor)
2014-01-01
A self-stabilizing network in the form of an arbitrary, non-partitioned digraph includes K nodes having a synchronizer executing a protocol. K-1 monitors of each node may receive a Sync message transmitted from a directly connected node. When the Sync message is received, the logical clock value for the receiving node is set to between 0 and a communication latency value (gamma) if the clock value is less than a minimum event-response delay (D). A new Sync message is also transmitted to any directly connected nodes if the clock value is greater than or equal to both D and a graph threshold (T(sub S)). When the Sync message is not received the synchronizer increments the clock value if the clock value is less than a resynchronization period (P), and resets the clock value and transmits a new Sync message to all directly connected nodes when the clock value equals or exceeds P.
SEAODV: A Security Enhanced AODV Routing Protocol for Wireless Mesh Networks
NASA Astrophysics Data System (ADS)
Li, Celia; Wang, Zhuang; Yang, Cungang
In this paper, we propose a Security Enhanced AODV routing protocol (SEAODV) for wireless mesh networks (WMN). SEAODV employs Blom's key pre-distribution scheme to compute the pairwise transient key (PTK) through the flooding of enhanced HELLO message and subsequently uses the established PTK to distribute the group transient key (GTK). PTK and GTK authenticate unicast and broadcast routing messages respectively. In WMN, a unique PTK is shared by each pair of nodes, while GTK is shared secretly between the node and all its one-hop neighbours. A message authentication code (MAC) is attached as the extension to the original AODV routing message to guarantee the message's authenticity and integrity in a hop-by-hop fashion. Security analysis and performance evaluation show that SEAODV is more effective in preventing identified routing attacks and outperforms ARAN and SAODV in terms of computation cost and route acquisition latency.
DoD Message Protocol Report. Volume I. Message Protocol Specification.
1981-12-15
26L 2.6 STATUS-REPORTING SERVICES ........................................ 26 2.6.1 Acknowledgements and Processing Status...and data. Envelopes give processing instructions and/or descriptions of their contents. Data are not altered (as regards content) by the CBMS except...tailored to an individual user’s requirements, we view them as application-layer processes . The potential diversity of UAs makes verifi- cation difficult
Multiparty Quantum English Auction Scheme Using Single Photons as Message Carrier
NASA Astrophysics Data System (ADS)
Liu, Ge; Zhang, Jian-Zhong; Xie, Shu-Cui
2018-03-01
In this paper, a secure and economic multiparty english auction protocol using the single photons as message carrier of bids is proposed. In order to achieve unconditional security, fairness, undeniability and so on, we adopt the decoy photon checking technique and quantum encryption algorithm. Analysis result shows that our protocol satisfies all the characteristics of traditional english auction, meanwhile, it can resist malicious attacks.
Telemetry Standards, RCC Standard 106-17. Chapter 26. TmNSDataMessage Transfer Protocol
2017-07-01
Channel (RTSPDataChannel) ............................................ 26-13 26.4.3 Reliability Critical (RC) Delivery Protocol...error status code specified in RFC 2326 for "Request-URI Too Large" is 虮". 26.4.1.5 Request Types RTSPDataSources shall return valid ...to the following requirements. • Valid TmNSDataMessages shall be delivered containing the original Packages matching the requested
A Message Exchange Protocol in Command and Control Systems Integration, using the JC3IEDM
2014-06-01
19TH International Command and Control Research and Technology Symposium C2 Agility: Lessons Learned from Research and Operations. A Message...distribution unlimited 13. SUPPLEMENTARY NOTES Presented at the 18th International Command & Control Research & Technology Symposium (ICCRTS) held 16...presents approaches of integration, compares their technologies , points out their advantages, proposes requirements, and provides the design of a protocol
Asynchronous Message Service Reference Implementation
NASA Technical Reports Server (NTRS)
Burleigh, Scott C.
2011-01-01
This software provides a library of middleware functions with a simple application programming interface, enabling implementation of distributed applications in conformance with the CCSDS AMS (Consultative Committee for Space Data Systems Asynchronous Message Service) specification. The AMS service, and its protocols, implement an architectural concept under which the modules of mission systems may be designed as if they were to operate in isolation, each one producing and consuming mission information without explicit awareness of which other modules are currently operating. Communication relationships among such modules are self-configuring; this tends to minimize complexity in the development and operations of modular data systems. A system built on this model is a society of generally autonomous, inter-operating modules that may fluctuate freely over time in response to changing mission objectives, modules functional upgrades, and recovery from individual module failure. The purpose of AMS, then, is to reduce mission cost and risk by providing standard, reusable infrastructure for the exchange of information among data system modules in a manner that is simple to use, highly automated, flexible, robust, scalable, and efficient. The implementation is designed to spawn multiple threads of AMS functionality under the control of an AMS application program. These threads enable all members of an AMS-based, distributed application to discover one another in real time, subscribe to messages on specific topics, and to publish messages on specific topics. The query/reply (client/server) communication model is also supported. Message exchange is optionally subject to encryption (to support confidentiality) and authorization. Fault tolerance measures in the discovery protocol minimize the likelihood of overall application failure due to any single operational error anywhere in the system. The multi-threaded design simplifies processing while enabling application nodes to operate at high speeds; linked lists protected by mutex semaphores and condition variables are used for efficient, inter-thread communication. Applications may use a variety of transport protocols underlying AMS itself, including TCP (Transmission Control Protocol), UDP (User Datagram Protocol), and message queues.
Log Analysis Using Splunk Hadoop Connect
2017-06-01
running a logging service puts a performance tax on the system and may cause the degradation of performance. More thorough 8 logging will cause a...several nodes. For example, a disk failure would affect all the tasks running on a particular node and generate an alert message not only for the disk...the commands that were executed from the " Run " command. The keylogger installation did not create any registry keys for the program itself. However
Deterministic secure quantum communication using a single d-level system
Jiang, Dong; Chen, Yuanyuan; Gu, Xuemei; Xie, Ling; Chen, Lijun
2017-01-01
Deterministic secure quantum communication (DSQC) can transmit secret messages between two parties without first generating a shared secret key. Compared with quantum key distribution (QKD), DSQC avoids the waste of qubits arising from basis reconciliation and thus reaches higher efficiency. In this paper, based on data block transmission and order rearrangement technologies, we propose a DSQC protocol. It utilizes a set of single d-level systems as message carriers, which are used to directly encode the secret message in one communication process. Theoretical analysis shows that these employed technologies guarantee the security, and the use of a higher dimensional quantum system makes our protocol achieve higher security and efficiency. Since only quantum memory is required for implementation, our protocol is feasible with current technologies. Furthermore, Trojan horse attack (THA) is taken into account in our protocol. We give a THA model and show that THA significantly increases the multi-photon rate and can thus be detected. PMID:28327557
Mark Alexander Butler; Joseph Dahlen; Thomas L. Eberhardt; Cristian Montes; Finto Antony; Richard F. Daniels
2017-01-01
Key message Loblolly pine (Pinus taeda) logs can be evaluated using acoustic velocity whereby threshold acoustic velocity values can be set to ensure lumber meets specified mechanical property design values for modulus of elasticity. Context...
The Generational Impact of Technology on Formal Writing of Rural Middle School Students
ERIC Educational Resources Information Center
Land, Martha Ann
2012-01-01
The purpose of this study was to determine the impact text messages, social networks, Instant Messaging, email, and blogging had on rural middle school students' ability to decipher between formal and informal writing. Students completed self-evaluation logs, completed Formal and Informal Writing Assessments, and were scored on their use of…
Fair and optimistic quantum contract signing
NASA Astrophysics Data System (ADS)
Paunković, N.; Bouda, J.; Mateus, P.
2011-12-01
We present a fair and optimistic quantum-contract-signing protocol between two clients that requires no communication with the third trusted party during the exchange phase. We discuss its fairness and show that it is possible to design such a protocol for which the probability of a dishonest client to cheat becomes negligible and scales as N-1/2, where N is the number of messages exchanged between the clients. Our protocol is not based on the exchange of signed messages: Its fairness is based on the laws of quantum mechanics. Thus, it is abuse free, and the clients do not have to generate new keys for each message during the exchange phase. We discuss a real-life scenario when measurement errors and qubit-state corruption due to noisy channels and imperfect quantum memories occur and argue that for a real, good-enough measurement apparatus, transmission channels, and quantum memories, our protocol would still be fair. Apart from stable quantum memories, the other segments of our protocol could be implemented by today's technology, as they require in essence the same type of apparatus as the one needed for the Bennett-Brassard 1984 (BB84) cryptographic protocol. Finally, we briefly discuss two alternative versions of the protocol, one that uses only two states [based on the Bennett 1992 (B92) protocol] and the other that uses entangled pairs, and show that it is possible to generalize our protocol to an arbitrary number of clients.
Controlled Secure Direct Communication with Seven-Qubit Entangled States
NASA Astrophysics Data System (ADS)
Wang, Shu-Kai; Zha, Xin-Wei; Wu, Hao
2018-01-01
In this paper, a new controlled secure direct communication protocol based on a maximally seven-qubit entangled state is proposed. the outcomes of measurement is performed by the sender and the controller, the receiver can obtain different secret messages in a deterministic way with unit successful probability.In this scheme,by using entanglement swapping, no qubits carrying secret messages are transmitted.Therefore, the protocol is completely secure.
Vehicle Density Based Forwarding Protocol for Safety Message Broadcast in VANET
Huang, Jiawei; Wang, Jianxin
2014-01-01
In vehicular ad hoc networks (VANETs), the medium access control (MAC) protocol is of great importance to provide time-critical safety applications. Contemporary multihop broadcast protocols in VANETs usually choose the farthest node in broadcast range as the forwarder to reduce the number of forwarding hops. However, in this paper, we demonstrate that the farthest forwarder may experience large contention delay in case of high vehicle density. We propose an IEEE 802.11-based multihop broadcast protocol VDF to address the issue of emergency message dissemination. To achieve the tradeoff between contention delay and forwarding hops, VDF adaptably chooses the forwarder according to the vehicle density. Simulation results show that, due to its ability to decrease the transmission collisions, the proposed protocol can provide significantly lower broadcast delay. PMID:25121125
Murmer, a message generator and reporter for Unix, VMS, and VxWorks
NASA Astrophysics Data System (ADS)
Oleynik, G.; Appleton, B.; Moore, C.; Sergey, G.; Udumula, L.
1994-02-01
Murmer is a Unix based message generation, reporting, display, and logging system that we have developed for use in data acquisition systems at Fermilab. Murmer is a tool for the production and management of message reporting. Its usefulness ranges from software product development and maintenance to system level shakedown and diagnostics. Murmer provides a VMS MESSAGE-like function code generation utility, a client routine package for sending these codes over the network to a central server, and a server which translates the codes into meaningful visual information, writes the information to a logfile, and display it on B&W or color X windows. Because Murmer stores message information in keyed access files, it can provide advanced features such as popping up help when a displayed message is clicked on by the mouse and executing 'action' shell scripts when selected messages are received by the server.
Quantum Counterfactual Information Transmission Without a Weak Trace
NASA Astrophysics Data System (ADS)
Arvidsson Shukur, David; Barnes, Crispin
The classical theories of communication rely on the assumption that there has to be a flow of particles from Bob to Alice in order for him to send a message to her. We have developed a quantum protocol that allows Alice to perceive Bob's message ``counterfactually''. That is, without Alice receiving any particles that have interacted with Bob. By utilising a setup built on results from interaction-free measurements and the quantum Zeno effect, we outline a communication protocol in which the information travels in the opposite direction of the emitted particles. In comparison to previous attempts on such protocols, this one is such that a weak measurement at the message source would not leave a weak trace that could be detected by Alice's receiver. Whilst some interaction-free schemes require a large number of carefully aligned beam-splitters, our protocol is realisable with two or more beam-splitters. Furthermore, we outline how Alice's obtained classical Fisher information between a weak variable at Bob's laboratory is negligible in our scheme. We demonstrate this protocol by numerically solving the time-dependent Schrödinger Equation (TDSE) for a Hamiltonian that implements this quantum counterfactual phenomenon.
NASA Technical Reports Server (NTRS)
Ferrara, Jeffrey; Calk, William; Atwell, William; Tsui, Tina
2013-01-01
MPISS is an automatic file transfer system that implements a combination of standard and mission-unique transfer protocols required by the Global Precipitation Measurement Mission (GPM) Precipitation Processing System (PPS) to control the flow of data between the MOC and the PPS. The primary features of MPISS are file transfers (both with and without PPS specific protocols), logging of file transfer and system events to local files and a standard messaging bus, short term storage of data files to facilitate retransmissions, and generation of file transfer accounting reports. The system includes a graphical user interface (GUI) to control the system, allow manual operations, and to display events in real time. The PPS specific protocols are an enhanced version of those that were developed for the Tropical Rainfall Measuring Mission (TRMM). All file transfers between the MOC and the PPS use the SSH File Transfer Protocol (SFTP). For reports and data files generated within the MOC, no additional protocols are used when transferring files to the PPS. For observatory data files, an additional handshaking protocol of data notices and data receipts is used. MPISS generates and sends to the PPS data notices containing data start and stop times along with a checksum for the file for each observatory data file transmitted. MPISS retrieves the PPS generated data receipts that indicate the success or failure of the PPS to ingest the data file and/or notice. MPISS retransmits the appropriate files as indicated in the receipt when required. MPISS also automatically retrieves files from the PPS. The unique feature of this software is the use of both standard and PPS specific protocols in parallel. The advantage of this capability is that it supports users that require the PPS protocol as well as those that do not require it. The system is highly configurable to accommodate the needs of future users.
Software Design Document MCC CSCI (1). Volume 1 Sections 1.0-2.18
1991-06-01
AssociationUserProtocol /simnet/common!include/prot ____________________ ____________________ ocol/p assoc.h Primitive long Standard C type...Information. 2.2.1.4.2 ProcessMessage ProcessMessage processes a message from another process. type describes the message as either one-way, a synchronous or...Macintosh Consoles. This is sometimes necessary due to normal clock skew so that operations among the MCC components will remain synchronized . This
LOPP: A Location Privacy Protected Anonymous Routing Protocol for Disruption Tolerant Network
NASA Astrophysics Data System (ADS)
Lu, Xiaofeng; Hui, Pan; Towsley, Don; Pu, Juhua; Xiong, Zhang
In this paper, we propose an anonymous routing protocol, LOPP, to protect the originator's location privacy in Delay/Disruption Tolerant Network (DTN). The goals of our study are to minimize the originator's probability of being localized (Pl) and maximize the destination's probability of receiving the message (Pr). The idea of LOPP is to divide a sensitive message into k segments and send each of them to n different neighbors. Although message fragmentation could reduce the destination's probability to receive a complete message, LOPP can decrease the originator's Pl. We validate LOPP on a real-world human mobility dataset. The simulation results show that LOPP can decrease the originator's Pl by over 54% with only 5.7% decrease in destination's Pr. We address the physical localization issue of DTN, which was not studied in the literature.
Nicholson, Emma; Murphy, Tara; Larkin, Philip; Normand, Charles; Guerin, Suzanne
2016-10-21
Research networks that facilitate collaborative research are increasing both regionally and globally and such collaborations contribute greatly to knowledge transfer particularly in health research. The Palliative Care Research Network is an Irish-based network that seeks to create opportunities and engender a collaborative environment to encourage innovative research that is relevant for policy and practice. The current review outlines a methodology to identify cross-cutting messages to identify how dissemination outputs can be optimized to ensure that key messages from this research reaches all knowledge users. Preferred reporting items for systematic review and meta-analysis protocol guidelines will inform the search and analysis plan to ensure that the synthesis of the data is as rigorous as possible. An approach based on critical interpretative synthesis will be adapted to include a thematic synthesis for the identification of higher-order themes and messages from a body of dissemination products generated by the Palliative Care Research Network. The thematic synthesis outlined in the present protocol offers a novel method of synthesising data from a focused research network that employs a variety of dissemination materials as a means of identifying key themes and messages from a specific body of research. The high-level themes and messages will be identified from the thematic synthesis, widely disseminated and targeted towards a range of stakeholders and knowledge users such as carers, health and social care professionals, policy makers and researchers.
Design Considerations in Developing a Text Messaging Program Aimed at Smoking Cessation
Holtrop, Jodi Summers; Bağci Bosi, A Tülay; Emri, Salih
2012-01-01
Background Cell phone text messaging is gaining increasing recognition as an important tool that can be harnessed for prevention and intervention programs across a wide variety of health research applications. Despite the growing body of literature reporting positive outcomes, very little is available about the design decisions that scaffold the development of text messaging-based health interventions. What seems to be missing is documentation of the thought process of investigators in the initial stages of protocol and content development. This omission is of particular concern because many researchers seem to view text messaging as the intervention itself instead of simply a delivery mechanism. Certainly, aspects of this technology may increase participant engagement. Like other interventions, however, the content is a central driver of the behavior change. Objective To address this noted gap in the literature, we discuss the protocol decisions and content development for SMS Turkey (or Cebiniz birakin diyor in Turkish), a smoking cessation text messaging program for adult smokers in Turkey. Methods Content was developed in English and translated into Turkish. Efforts were made to ensure that the protocol and content were grounded in evidence-based smoking cessation theory, while also reflective of the cultural aspects of smoking and quitting in Turkey. Results Methodological considerations included whether to provide cell phones and whether to reimburse participants for texting costs; whether to include supplementary intervention resources (eg, personal contact); and whether to utilize unidirectional versus bidirectional messaging. Program design considerations included how messages were tailored to the quitting curve and one’s smoking status after one’s quit date, the number of messages participants received per day, and over what period of time the intervention lasted. Conclusion The content and methods of effective smoking cessation quitline programs were a useful guide in developing SMS Turkey. Proposed guidelines in developing text messaging-based behavior change programs are offered. PMID:22832182
Three-pass protocol scheme for bitmap image security by using vernam cipher algorithm
NASA Astrophysics Data System (ADS)
Rachmawati, D.; Budiman, M. A.; Aulya, L.
2018-02-01
Confidentiality, integrity, and efficiency are the crucial aspects of data security. Among the other digital data, image data is too prone to abuse of operation like duplication, modification, etc. There are some data security techniques, one of them is cryptography. The security of Vernam Cipher cryptography algorithm is very dependent on the key exchange process. If the key is leaked, security of this algorithm will collapse. Therefore, a method that minimizes key leakage during the exchange of messages is required. The method which is used, is known as Three-Pass Protocol. This protocol enables message delivery process without the key exchange. Therefore, the sending messages process can reach the receiver safely without fear of key leakage. The system is built by using Java programming language. The materials which are used for system testing are image in size 200×200 pixel, 300×300 pixel, 500×500 pixel, 800×800 pixel and 1000×1000 pixel. The result of experiments showed that Vernam Cipher algorithm in Three-Pass Protocol scheme could restore the original image.
Software Architecture Evolution
2013-12-01
system’s major components occurring via a Java Message Service message bus [69]. This architecture was designed to promote loose coupling of soft- ware...play reconfiguration of the system. The components were Java -based and platform-independent; the interfaces by which they communicated were based on...The MPCS database, a MySQL database used for storing telemetry as well as some other information, such as logs and commanding data [68]. This
Kouchri, Farrokh Mohammadzadeh
2012-11-06
A Voice over Internet Protocol (VoIP) communications system, a method of managing a communications network in such a system and a program product therefore. The system/network includes an ENERGY STAR (E-star) aware softswitch and E-star compliant communications devices at system endpoints. The E-star aware softswitch allows E-star compliant communications devices to enter and remain in power saving mode. The E-star aware softswitch spools messages and forwards only selected messages (e.g., calls) to the devices in power saving mode. When the E-star compliant communications devices exit power saving mode, the E-star aware softswitch forwards spooled messages.
Security of a sessional blind signature based on quantum cryptograph
NASA Astrophysics Data System (ADS)
Wang, Tian-Yin; Cai, Xiao-Qiu; Zhang, Rui-Ling
2014-08-01
We analyze the security of a sessional blind signature protocol based on quantum cryptograph and show that there are two security leaks in this protocol. One is that the legal user Alice can change the signed message after she gets a valid blind signature from the signatory Bob, and the other is that an external opponent Eve also can forge a valid blind message by a special attack, which are not permitted for blind signature. Therefore, this protocol is not secure in the sense that it does not satisfy the non-forgeability of blind signatures. We also discuss the methods to prevent the attack strategies in the end.
Acceptability of mHealth Technology for Self-Monitoring Eating and Activity among Rural Men.
Eisenhauer, Christine M; Hageman, Patricia A; Rowland, Sheri; Becker, Betsy J; Barnason, Susan A; Pullen, Carol H
2017-03-01
To examine rural men's use and perceptions of mobile and wireless devices to self-monitor eating and physical activity (mHealth). Men in this 3-week pilot study used FitBit One ® to log daily food intake and monitor activity. A companion application (app) allowed activity monitoring of fellow participants. Health-related text messages were received 1-3 times daily. A purposive sample of 12 rural men (ages 40-67) was recruited by community leaders. (1) baseline heart rate, blood pressure, and BMI, (2) FitBit One ® usage, (3) investigator-generated surveys on acceptability of mHealth, and (4) focus group on experience with mHealth. Men were overweight (n = 3) or obese (n = 9) and 9 of 12 were hypertensive. Nine of twelve wore FitBit One ® all 21 days. Eleven of 12 men logged food, with 9 of 12 doing this at least 15 of 21 days. Self-monitoring and daily text messaging increased awareness of energy intake and output. Companion app's food log needed targeting for rural foods. Rotating seasons (occupational, religious, recreational) and weak cellular signals created contextual barriers to self-monitoring eating and activity. FitBit One ® and text messaging were perceived as useful among the rural men, while the companion apps require adaptation to reflect dietary norms. © 2016 Wiley Periodicals, Inc.
The Interlibrary Loan Protocol: An OSI Solution to ILL Messaging.
ERIC Educational Resources Information Center
Turner, Fay
1990-01-01
Discusses the interlibrary loan (ILL) protocol, a standard based on the principles of the Open Systems Interconnection (OSI) Reference Model. Benefits derived from protocol use are described, the status of the protocol as an international standard is reviewed, and steps taken by the National Library of Canada to facilitate migration to an ILL…
NASA Astrophysics Data System (ADS)
Gu, Jun; Lin, Po-hua; Hwang, Tzonelih
2018-07-01
Recently, Zou and Qiu (Sci China Phys Mech Astron 57:1696-1702, 2014) proposed a three-step semi-quantum secure direct communication protocol allowing a classical participant who does not have a quantum register to securely send his/her secret message to a quantum participant. However, this study points out that an eavesdropper can use the double C-NOT attack to obtain the secret message. To solve this problem, a modification is proposed.
1982-02-23
segregate the computer and storage from the outside world 2. Administrative security to control access to secure computer facilities 3. Network security to...Classification Alternative A- 8 NETWORK KG GENSER DSSCS AMPE TERMINALS TP No. 022-4668-A Figure A-2. Dedicated Switching Architecture Alternative A- 9...communications protocol with the network and GENSER message transmission to the - I-S/A AMPE processor. 7. DSSCS TPU - Handles communications protocol with
Deterministic and unambiguous dense coding
NASA Astrophysics Data System (ADS)
Wu, Shengjun; Cohen, Scott M.; Sun, Yuqing; Griffiths, Robert B.
2006-04-01
Optimal dense coding using a partially-entangled pure state of Schmidt rank Dmacr and a noiseless quantum channel of dimension D is studied both in the deterministic case where at most Ld messages can be transmitted with perfect fidelity, and in the unambiguous case where when the protocol succeeds (probability τx ) Bob knows for sure that Alice sent message x , and when it fails (probability 1-τx ) he knows it has failed. Alice is allowed any single-shot (one use) encoding procedure, and Bob any single-shot measurement. For Dmacr ⩽D a bound is obtained for Ld in terms of the largest Schmidt coefficient of the entangled state, and is compared with published results by Mozes [Phys. Rev. A71, 012311 (2005)]. For Dmacr >D it is shown that Ld is strictly less than D2 unless Dmacr is an integer multiple of D , in which case uniform (maximal) entanglement is not needed to achieve the optimal protocol. The unambiguous case is studied for Dmacr ⩽D , assuming τx>0 for a set of Dmacr D messages, and a bound is obtained for the average ⟨1/τ⟩ . A bound on the average ⟨τ⟩ requires an additional assumption of encoding by isometries (unitaries when Dmacr =D ) that are orthogonal for different messages. Both bounds are saturated when τx is a constant independent of x , by a protocol based on one-shot entanglement concentration. For Dmacr >D it is shown that (at least) D2 messages can be sent unambiguously. Whether unitary (isometric) encoding suffices for optimal protocols remains a major unanswered question, both for our work and for previous studies of dense coding using partially-entangled states, including noisy (mixed) states.
Mezher, Ahmad Mohamad; Igartua, Mónica Aguilar; de la Cruz Llopis, Luis J; Pallarès Segarra, Esteve; Tripp-Barba, Carolina; Urquiza-Aguiar, Luis; Forné, Jordi; Sanvicente Gargallo, Emilio
2015-04-17
The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc.) could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers) rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs) has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic. Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs.
Berlin, M A; Anand, Sheila
2014-01-01
This paper presents Direction based Hazard Routing Protocol (DHRP) for disseminating information about fixed road hazards such as road blocks, tree fall, boulders on road, snow pile up, landslide, road maintenance work and other obstacles to the vehicles approaching the hazardous location. The proposed work focuses on dissemination of hazard messages on highways with sparse traffic. The vehicle coming across the hazard would report the presence of the hazard. It is proposed to use Road Side fixed infrastructure Units for reliable and timely delivery of hazard messages to vehicles. The vehicles can then take appropriate safety action to avoid the hazardous location. The proposed protocol has been implemented and tested using SUMO simulator to generate road traffic and NS 2.33 network simulator to analyze the performance of DHRP. The performance of the proposed protocol was also compared with simple flooding protocol and the results are presented.
Kurumop, Serah F.; Bullen, Chris; Whittaker, Robyn; Betuela, Inoni; Hetzel, Manuel W.; Pulford, Justin
2013-01-01
The aim of this study is to assess whether a text message reminder service designed to support health worker adherence to a revised malaria treatment protocol is feasible and acceptable in Papua New Guinea (PNG). The study took place in six purposively selected health facilities located in the Eastern Highlands Province (EHP) of PNG. Ten text messages designed to remind participants of key elements of the new NMTP were transmitted to 42 health workers twice over a two week period (two text messages per day, Monday to Friday) via the country’s largest mobile network provider. The feasibility and acceptability of the text message reminder service was assessed by transmission reports, participant diaries and group discussions. Findings indicate that the vast majority of text messages were successfully transmitted, participants’ had regular mobile phone access and that most text messages were read most of the time and were considered both acceptable and clinically useful. Nevertheless, the study found that PNG health workers may tire of the service if the same messages are repeated too many times and that health workers may be reluctant to utilize more comprehensive, yet complementary, resources. In conclusion, a text message reminder service to support health worker adherence to the new malaria treatment protocol is feasible and acceptable in PNG. A rigorous pragmatic, effectiveness trial would be justified on the basis of these findings. PMID:24116122
NASA Technical Reports Server (NTRS)
Hooke, A. J.
1979-01-01
A set of standard telemetry protocols for downlink data flow facilitating the end-to-end transport of instrument data from the spacecraft to the user in real time is proposed. The direct switching of data by autonomous message 'packets' that are assembled by the source instrument on the spacecraft is discussed. The data system consists thus of a format on a message rather than word basis, and such packet telemetry would include standardized protocol headers. Standards are being developed within the NASA End-to-End Data System (NEEDS) program for the source packet and transport frame protocols. The source packet protocol contains identification of both the sequence number of the packet as it is generated by the source and the total length of the packet, while the transport frame protocol includes a sequence count defining the serial number of the frame as it is generated by the spacecraft data system, and a field specifying any 'options' selected in the format of the frame itself.
Generating Models of Infinite-State Communication Protocols Using Regular Inference with Abstraction
NASA Astrophysics Data System (ADS)
Aarts, Fides; Jonsson, Bengt; Uijen, Johan
In order to facilitate model-based verification and validation, effort is underway to develop techniques for generating models of communication system components from observations of their external behavior. Most previous such work has employed regular inference techniques which generate modest-size finite-state models. They typically suppress parameters of messages, although these have a significant impact on control flow in many communication protocols. We present a framework, which adapts regular inference to include data parameters in messages and states for generating components with large or infinite message alphabets. A main idea is to adapt the framework of predicate abstraction, successfully used in formal verification. Since we are in a black-box setting, the abstraction must be supplied externally, using information about how the component manages data parameters. We have implemented our techniques by connecting the LearnLib tool for regular inference with the protocol simulator ns-2, and generated a model of the SIP component as implemented in ns-2.
Multi-level scaling properties of instant-message communications
NASA Astrophysics Data System (ADS)
Chen, Guanxiong; Han, Xiaopu; Wang, Binghong
2010-08-01
To research the statistical properties of human's communication behaviors is one of the highlight areas of Human Dynamics. In this paper, we analyze the instant message data of QICQ from volunteers, and discover that there are many forms of non-Poisson characters, such as inter-event distributions of sending and receiving messages, communications between two friends, log-in activities, the distribution of online time, quantities of messages, and so on. These distributions not only denote the pattern of human communication activities, but also relate to the statistical property of human behaviors in using software. We find out that most of these exponents distribute between -1 and -2, which indicates that the Instant Message (IM) communication behavior of human is different from Non-IM communication behaviors; there are many fat-tail characters related to IM communication behavior.
Designing normative messages about active surveillance for men with localized prostate cancer
Volk, Robert J.; Kinsman, Gianna T.; Le, Yen-Chi L.; Swank, Paul; Blumenthal-Barby, Jennifer; McFall, Stephanie L.; Byrd, Theresa L.; Mullen, Patricia Dolan; Cantor, Scott B.
2016-01-01
Active surveillance (AS) is increasingly recognized as a reasonable option for men with low-risk, localized prostate cancer, yet few men who might benefit from conservative management receive it. We examined the acceptability of normative messages about AS as a management option for patients with low-risk prostate cancer. Men with a diagnosis of localized prostate cancer who were recruited through prostate cancer support organizations completed a web-based survey (N=331). They rated messages about AS for believability, accuracy, and importance for men to hear when making treatment decisions. The message “you don’t have to panic…you have time to think about your options” was perceived as believable, accurate, and important by over 80% of the survivors. In contrast, messages about trust in the AS protocol and “knowing in plenty of time” if treatment is needed were rated as accurate by only about 36% of respondents. For AS to be viewed as a reasonable alternative, men will need reassurance that following an AS protocol is likely to allow time for curative treatment if the cancer progresses. PMID:26066011
DOT National Transportation Integrated Search
2009-08-31
Primary research focused on the design and development of an energy-efficient Risk Notification Message Dissemination Protocol (RNMDP) for vehicular ad hoc networks (VANETs). RNMDP propagates Risk Notification Messages (RNMs) from a location of origi...
SAMP, the Simple Application Messaging Protocol: Letting applications talk to each other
NASA Astrophysics Data System (ADS)
Taylor, M. B.; Boch, T.; Taylor, J.
2015-06-01
SAMP, the Simple Application Messaging Protocol, is a hub-based communication standard for the exchange of data and control between participating client applications. It has been developed within the context of the Virtual Observatory with the aim of enabling specialised data analysis tools to cooperate as a loosely integrated suite, and is now in use by many and varied desktop and web-based applications dealing with astronomical data. This paper reviews the requirements and design principles that led to SAMP's specification, provides a high-level description of the protocol, and discusses some of its common and possible future usage patterns, with particular attention to those factors that have aided its success in practice.
Reduced-impact logging and temporal activity of understorey bats in lowland Amazonia
Ivan Castro Arellano; Steven J. Presley; Michael R. Willig; Joseph M. Wunderle; Luiz N. Saldanha
2009-01-01
Because global timber demands continue to threaten tropical rain forests, identification of sustainable use forest management protocols that meet human needs while preserving biodiversity is critical. Reduced-impact logging (RIL) protocols are increasingly common in the tropics and may be a viable option for sustainable forest use; however, few studies have documented...
Design, Implementation, and Verification of the Reliable Multicast Protocol. Thesis
NASA Technical Reports Server (NTRS)
Montgomery, Todd L.
1995-01-01
This document describes the Reliable Multicast Protocol (RMP) design, first implementation, and formal verification. RMP provides a totally ordered, reliable, atomic multicast service on top of an unreliable multicast datagram service. RMP is fully and symmetrically distributed so that no site bears an undue portion of the communications load. RMP provides a wide range of guarantees, from unreliable delivery to totally ordered delivery, to K-resilient, majority resilient, and totally resilient atomic delivery. These guarantees are selectable on a per message basis. RMP provides many communication options, including virtual synchrony, a publisher/subscriber model of message delivery, a client/server model of delivery, mutually exclusive handlers for messages, and mutually exclusive locks. It has been commonly believed that total ordering of messages can only be achieved at great performance expense. RMP discounts this. The first implementation of RMP has been shown to provide high throughput performance on Local Area Networks (LAN). For two or more destinations a single LAN, RMP provides higher throughput than any other protocol that does not use multicast or broadcast technology. The design, implementation, and verification activities of RMP have occurred concurrently. This has allowed the verification to maintain a high fidelity between design model, implementation model, and the verification model. The restrictions of implementation have influenced the design earlier than in normal sequential approaches. The protocol as a whole has matured smoother by the inclusion of several different perspectives into the product development.
Internet Protocol Transition Workbook
1982-03-01
U N C-* INTERNET PROTOCOL TRANSITION WORKBOOK March 1982 Network Information Canter SRI International Menlo Park, CA 94025 t tv l...Feinler Network Information Center SRI International Menlo Park. California 94025 (415) 859-3695 FEINLEROSRI-NIC (Online mail) [Page ii] I.7 Internet ...31 Postel. J., " Internet Control Message Protocol - DARPA Internet Program Protocol Specification." RFC 792, USC/ Information Sciences Institute
DARPA Internet Program. Internet and Transmission Control Specifications,
1981-09-01
Internet Program Protocol Specification", RFC 791, USC/ Information Sciences Institute, September 1981. [34] Postel, J., ed., "Transmission Control Protocol...DARPA Internet Program Protocol Specification", RFC 793, USC/ Information Sciences Institute, September 1981. [35] Postel, J., "Echo Process", RFC 347...Newman, March 1981. [53] Postel, J., " Internet Control Message Protocol - DARPA Internet Program Protocol Specification", RFC 792, USC/ Information
Lemnos interoperable security project.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Halbgewachs, Ronald D.
2010-03-01
With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance inmore » a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.« less
Schick, Robert S; Kelsey, Thomas W; Marston, John; Samson, Kay; Humphris, Gerald W
2018-01-01
Approximately 11,000 people die in Scotland each year as a result of smoking-related causes. Quitting smoking is relatively easy; maintaining a quit attempt is a very difficult task with success rates for unaided quit attempts stubbornly remaining in the single digits. Pharmaceutical treatment can improve these rates by lowering the overall reward factor of nicotine. However, these and related nicotine replacement therapies do not operate on, or address, the spatial and contextual aspects of smoking behaviour. With the ubiquity of smartphones that can log spatial, quantitative and qualitative data related to smoking behaviour, there exists a person-centred clinical opportunity to support smokers attempting to quit by first understanding their smoking behaviour and subsequently sending them dynamic messages to encourage health behaviour change within a situational context. We have built a smartphone app-MapMySmoke-that works on Android and iOS platforms. The deployment of this app within a clinical National Health Service (NHS) setting has two distinct phases: (1) a 2-week logging phase where pre-quit patients log all of their smoking and craving events; and (2) a post-quit phase where users receive dynamic support messages and can continue to log craving events, and should they occur, relapse events. Following the initial logging phase, patients consult with their general practitioner (GP) or healthcare provider to review their smoking patterns and to outline a precise, individualised quit attempt plan. Our feasibility study consists of assessment of an initial app version during and after use by eight patients recruited from an NHS Fife GP practice. In addition to evaluation of the app as a potential smoking cessation aid, we have assessed the user experience, technological requirements and security of the data flow. In an initial feasibility study, we have deployed the app for a small number of patients within one GP practice in NHS Fife. We recruited eight patients within one surgery, four of whom actively logged information about their smoking behaviour. Initial feedback was very positive, and users indicated a willingness to log their craving and smoking events. In addition, two out of three patients who completed follow-up interviews noted that the app helped them reduce the number of cigarettes they smoked per day, while the third indicated that it had helped them quit. The study highlighted the use of pushed notifications as a potential technology for maintaining quit attempts, and the security of collection of data was audited. These initial results influenced the design of a planned second larger study, comprised of 100 patients, the primary objectives of which are to use statistical modelling to identify times and places of probable switches into smoking states, and to target these times with dynamic health behaviour messaging. While the health benefits of quitting smoking are unequivocal, such behaviour change is very difficult to achieve. Many factors are likely to contribute to maintaining smoking behaviour, yet the precise role of cues derived from the spatial environment remains unclear. The rise of smartphones, therefore, allows clinicians the opportunity to better understand the spatial aspects of smoking behaviour and affords them the opportunity to push targeted individualised health support messages at vulnerable times and places. ClinicalTrial.gov, NCT02932917.
The Network Protocol Analysis Technique in Snort
NASA Astrophysics Data System (ADS)
Wu, Qing-Xiu
Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.
Time-dependent analysis of dosage delivery information for patient-controlled analgesia services.
Kuo, I-Ting; Chang, Kuang-Yi; Juan, De-Fong; Hsu, Steen J; Chan, Chia-Tai; Tsou, Mei-Yung
2018-01-01
Pain relief always plays the essential part of perioperative care and an important role of medical quality improvement. Patient-controlled analgesia (PCA) is a method that allows a patient to self-administer small boluses of analgesic to relieve the subjective pain. PCA logs from the infusion pump consisted of a lot of text messages which record all events during the therapies. The dosage information can be extracted from PCA logs to provide easily understanding features. The analysis of dosage information with time has great help to figure out the variance of a patient's pain relief condition. To explore the trend of pain relief requirement, we developed a PCA dosage information generator (PCA DIG) to extract meaningful messages from PCA logs during the first 48 hours of therapies. PCA dosage information including consumption, delivery, infusion rate, and the ratio between demand and delivery is presented with corresponding values in 4 successive time frames. Time-dependent statistical analysis demonstrated the trends of analgesia requirements decreased gradually along with time. These findings are compatible with clinical observations and further provide valuable information about the strategy to customize postoperative pain management.
Code of Federal Regulations, 2011 CFR
2011-10-01
... time periods expire. (4) Display and logging. A visual message shall be developed from any valid header... input. (8) Decoder Programming. Access to decoder programming shall be protected by a lock or other...
Increasing the Automation and Autonomy for Spacecraft Operations with Criteria Action Table
NASA Technical Reports Server (NTRS)
Li, Zhen-Ping; Savki, Cetin
2005-01-01
The Criteria Action Table (CAT) is an automation tool developed for monitoring real time system messages for specific events and processes in order to take user defined actions based on a set of user-defined rules. CAT was developed by Lockheed Martin Space Operations as a part of a larger NASA effort at the Goddard Space Flight Center (GSFC) to create a component-based, middleware-based, and standard-based general purpose ground system architecture referred as GMSEC - the GSFC Mission Services Evolution Center. CAT has been integrated into the upgraded ground systems for Tropical Rainfall Measuring Mission (TRMM) and Small Explorer (SMEX) satellites and it plays the central role in their automation effort to reduce the cost and increase the reliability for spacecraft operations. The GMSEC architecture provides a standard communication interface and protocol for components to publish/describe messages to an information bus. It also provides a standard message definition so components can send and receive messages to the bus interface rather than each other, thus reducing the component-to-component coupling, interface, protocols, and link (socket) management. With the GMSEC architecture, components can publish standard event messages to the bus for all nominal, significant, and surprising events in regard to satellite, celestial, ground system, or any other activity. In addition to sending standard event messages, each GMSEC compliant component is required to accept and process GMSEC directive request messages.
Velásquez-Villada, Carlos; Donoso, Yezid
2016-03-25
Communications from remote areas that may be of interest is still a problem. Many innovative projects applied to remote sites face communications difficulties. The GOLDFISH project was an EU-funded project for river pollution monitoring in developing countries. It had several sensor clusters, with floating WiFi antennas, deployed along a downstream river's course. Sensor clusters sent messages to a Gateway installed on the riverbank. This gateway sent the messages, through a backhaul technology, to an Internet server where data was aggregated over a map. The communication challenge in this scenario was produced by the antennas' movement and network backhaul availability. Since the antennas were floating on the river, communications could be disrupted at any time. Also, 2G/3G availability near the river was not constant. For non-real-time applications, we propose a Delay/Disruption Tolerant Network (DTN)-based solution where all nodes have persistent storage capabilities and DTN protocols to be able to wait minutes or hours to transmit. A mechanical backhaul will periodically visit the river bank where the gateway is installed and it will automatically collect sensor data to be carried to an Internet-covered spot. The proposed forwarding protocol delivers around 98% of the messages for this scenario, performing better than other well-known DTN routing protocols.
Varma, Deepthi Satheesa; Hart, Mark; McIntyre, Denise Sonya; Kwiatkowski, Evan; Cottler, Linda Bauer
2016-06-28
Mobile phoned-based interventions have been increasingly used in clinical populations to improve health and health care delivery. The literature has shown that mobile phone-based text messages (short message service, SMS) are instantaneous, cost effective, and have less chance of being misplaced. Studies using mobile phone based-text messages have reported text messages as effective reminders that have resulted in increased appointment attendance, adherence to treatment, and better self-management. There have been no reports of adverse events when using text messaging in terms of misreading or misinterpreting data, transmitting inaccurate data, losing verbal or nonverbal communication cues, privacy issues, or failure or delay in message delivery. However, the literature has cited a need for personalized messages that are more responsive to individual needs. In addition, there has been a dearth of information on the use of reminders in nonclinical populations. The goal of this study is to assess the effectiveness of adding reminders in the form of text messaging versus reminder calls versus text messages and reminder calls to increase use of service referrals provided through community outreach. A total of 300 participants will be recruited for the study. Each participant will be randomized to one of three arms: a group that receives only reminder calls (CALLSONLY); a group that receives only text message reminders (TEXTONLY); and a group that receives both reminder calls and text messages (CALLS+TEXT). All groups will receive their reminder intervention on the 15th and 45th day after baseline when they receive medical and social service referrals from the community health workers (CHWs). A standard script will be used to administer the call and text reminders and a 15-item telephone-based satisfaction survey will be administered to assess the participant satisfaction with the process of receiving periodic reminders. The study is in the recruitment and follow-up phase. The authors anticipate completion of recruitment, interventions, and data entry by July 2016. Preliminary results are expected to be available by September 2016. This study will provide an opportunity to test the effectiveness of mobile-based interventions on nonclinical, community-recruited populations. In particular, such a protocol would increase the effectiveness of a community-based engagement program by instating a formal reminder system for all program members who receive social and/or medical service referrals during outreach in the community. Findings from this study would guide the development and implementation of reminder protocols for community-based engagement programs nationwide.
Two in-vivo protocols for testing virucidal efficacy of handwashing and hand disinfection.
Steinmann, J; Nehrkorn, R; Meyer, A; Becker, K
1995-01-01
Whole-hands and fingerpads of seven volunteers were contaminated with poliovirus type 1 Sabin strain in order to evaluate virucidal efficacy of different forms of handwashing and handrub with alcohols and alcohol-based disinfectants. In the whole-hand protocol, handwashing with unmedicated soap for 5 min and handrubbing with 80% ethanol yielded a log reduction factor (RF) of > 2, whereas the log RF by 96.8% ethanol exceeded 3.2. With the fingerpad model ethanol produced a greater log RF than iso- or n-propanol. Comparing five commercial hand disinfectants and a chlorine solution (1.0% chloramine T-solution) for handrub, Desderman and Promanum, both composed of ethanol, yielded log RFs of 2.47 and 2.26 respectively after an application time of 60 s, similar to 1.0% chloramine T-solution (log RF of 2.28). Autosept, Mucasept, and Sterillium, based on n-propanol and/or isopropanol, were found to be significantly less effective (log RFs of 1.16, 1.06 and 1.52 respectively). A comparison of a modified whole-hand and the fingerpad protocol with Promanum showed similar results with the two systems suggesting both models are suitable for testing the in-vivo efficacy of handwashing agents and hand disinfectants which are used without any water.
Space Flight Middleware: Remote AMS over DTN for Delay-Tolerant Messaging
NASA Technical Reports Server (NTRS)
Burleigh, Scott
2011-01-01
This paper describes a technique for implementing scalable, reliable, multi-source multipoint data distribution in space flight communications -- Delay-Tolerant Reliable Multicast (DTRM) -- that is fully supported by the "Remote AMS" (RAMS) protocol of the Asynchronous Message Service (AMS) proposed for standardization within the Consultative Committee for Space Data Systems (CCSDS). The DTRM architecture enables applications to easily "publish" messages that will be reliably and efficiently delivered to an arbitrary number of "subscribing" applications residing anywhere in the space network, whether in the same subnet or in a subnet on a remote planet or vehicle separated by many light minutes of interplanetary space. The architecture comprises multiple levels of protocol, each included for a specific purpose and allocated specific responsibilities: "application AMS" traffic performs end-system data introduction and delivery subject to access control; underlying "remote AMS" directs this application traffic to populations of recipients at remote locations in a multicast distribution tree, enabling the architecture to scale up to large networks; further underlying Delay-Tolerant Networking (DTN) Bundle Protocol (BP) advances RAMS protocol data units through the distribution tree using delay-tolerant storeand- forward methods; and further underlying reliable "convergence-layer" protocols ensure successful data transfer over each segment of the end-to-end route. The result is scalable, reliable, delay-tolerant multi-source multicast that is largely self-configuring.
Protocol for multiple node network
NASA Technical Reports Server (NTRS)
Kirkham, Harold (Inventor)
1995-01-01
The invention is a multiple interconnected network of intelligent message-repeating remote nodes which employs an antibody recognition message termination process performed by all remote nodes and a remote node polling process performed by other nodes which are master units controlling remote nodes in respective zones of the network assigned to respective master nodes. Each remote node repeats only those messages originated in the local zone, to provide isolation among the master nodes.
Protocol for multiple node network
NASA Technical Reports Server (NTRS)
Kirkham, Harold (Inventor)
1994-01-01
The invention is a multiple interconnected network of intelligent message-repeating remote nodes which employs an antibody recognition message termination process performed by all remote nodes and a remote node polling process performed by other nodes which are master units controlling remote nodes in respective zones of the network assigned to respective master nodes. Each remote node repeats only those messages originated in the local zone, to provide isolation among the master nodes.
Topology Optimisation for Energy Management in Underwater Sensor Networks
2015-01-01
the most efficient communications mech- anism ( Urick , 1994), where messages are transmitted with a communication radius ric for sensor i at a...formula ( Urick , 1994) that is valid in the range of hundreds of Hz to 50 kHz: 10 log10 a[f ] ≈ 0.11f 2 1 + f 2 + 44f 2 4100 + f 2 + 2.75 × 10−4f 2...effects. A reasonable approxi- mation is to take the net effects of noise ( Urick , 1994) as follows: 10 log10 N [f ] ≈ 50 − 18 log10 f, (4) where the
Compression-based aggregation model for medical web services.
Al-Shammary, Dhiah; Khalil, Ibrahim
2010-01-01
Many organizations such as hospitals have adopted Cloud Web services in applying their network services to avoid investing heavily computing infrastructure. SOAP (Simple Object Access Protocol) is the basic communication protocol of Cloud Web services that is XML based protocol. Generally,Web services often suffer congestions and bottlenecks as a result of the high network traffic that is caused by the large XML overhead size. At the same time, the massive load on Cloud Web services in terms of the large demand of client requests has resulted in the same problem. In this paper, two XML-aware aggregation techniques that are based on exploiting the compression concepts are proposed in order to aggregate the medical Web messages and achieve higher message size reduction.
Exploring the Implementation of Steganography Protocols on Quantum Audio Signals
NASA Astrophysics Data System (ADS)
Chen, Kehan; Yan, Fei; Iliyasu, Abdullah M.; Zhao, Jianping
2018-02-01
Two quantum audio steganography (QAS) protocols are proposed, each of which manipulates or modifies the least significant qubit (LSQb) of the host quantum audio signal that is encoded as an FRQA (flexible representation of quantum audio) audio content. The first protocol (i.e. the conventional LSQb QAS protocol or simply the cLSQ stego protocol) is built on the exchanges between qubits encoding the quantum audio message and the LSQb of the amplitude information in the host quantum audio samples. In the second protocol, the embedding procedure to realize it implants information from a quantum audio message deep into the constraint-imposed most significant qubit (MSQb) of the host quantum audio samples, we refer to it as the pseudo MSQb QAS protocol or simply the pMSQ stego protocol. The cLSQ stego protocol is designed to guarantee high imperceptibility between the host quantum audio and its stego version, whereas the pMSQ stego protocol ensures that the resulting stego quantum audio signal is better immune to illicit tampering and copyright violations (a.k.a. robustness). Built on the circuit model of quantum computation, the circuit networks to execute the embedding and extraction algorithms of both QAS protocols are determined and simulation-based experiments are conducted to demonstrate their implementation. Outcomes attest that both protocols offer promising trade-offs in terms of imperceptibility and robustness.
An Interpersonal Approach to Writing Negative Messages.
ERIC Educational Resources Information Center
Salerno, Douglas
1988-01-01
Asserts that textbook advice regarding buffers and negative messages is simplistic and frequently wrong, and analyses 22 job-refusal letters and their effectiveness. Claims that recent research on cognitive complexity and social perspective-taking suggests the need for more sophisticated audience analysis protocols for dealing with the negative…
National Association of Pediatric Nurse Practitioners
... Your Source for Pediatric CE Check out PedsCE today! P resident's Message PedsCE SM NAPNAP Partners for ... Log in Forgot Username/Password | Join JOIN NAPNAP TODAY! Become a Member Corporate Circle Members See All ...
NASA Astrophysics Data System (ADS)
Muhi, Daniel; Dulai, Tibor; Jaskó, Szilárd
2008-11-01
SIP is a general-purpose application layer protocol which is able to establish sessions between two or more parties. These sessions are mainly telephone calls and multimedia conferences. However it can be used for other purposes like instant messaging and presence service. SIP has a very important role in mobile communication as more and more communicating applications are going mobile. In this paper we would like to show how SIP can be used for instant messaging purposes.
Mezher, Ahmad Mohamad; Igartua, Mónica Aguilar; de la Cruz Llopis, Luis J.; Segarra, Esteve Pallarès; Tripp-Barba, Carolina; Urquiza-Aguiar, Luis; Forné, Jordi; Gargallo, Emilio Sanvicente
2015-01-01
The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc.) could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers) rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs) has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic.Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs. PMID:25897496
Guaranteeing synchronous message deadlines with the timed token medium access control protocol
NASA Technical Reports Server (NTRS)
Agrawal, Gopal; Chen, Baio; Zhao, Wei; Davari, Sadegh
1992-01-01
We study the problem of guaranteeing synchronous message deadlines in token ring networks where the timed token medium access control protocol is employed. Synchronous capacity, defined as the maximum time for which a node can transmit its synchronous messages every time it receives the token, is a key parameter in the control of synchronous message transmission. To ensure the transmission of synchronous messages before their deadlines, synchronous capacities must be properly allocated to individual nodes. We address the issue of appropriate allocation of the synchronous capacities. Several synchronous capacity allocation schemes are analyzed in terms of their ability to satisfy deadline constraints of synchronous messages. We show that an inappropriate allocation of the synchronous capacities could cause message deadlines to be missed even if the synchronous traffic is extremely low. We propose a scheme called the normalized proportional allocation scheme which can guarantee the synchronous message deadlines for synchronous traffic of up to 33 percent of available utilization. To date, no other synchronous capacity allocation scheme has been reported to achieve such substantial performance. Another major contribution of this paper is an extension to the previous work on the bounded token rotation time. We prove that the time elapsed between any consecutive visits to a particular node is bounded by upsilon TTRT, where TTRT is the target token rotation time set up at system initialization time. The previous result by Johnson and Sevcik is a special case where upsilon = 2. We use this result in the analysis of various synchronous allocation schemes. It can also be applied in other similar studies.
Vaisson, Gratianne; Witteman, Holly O; Bouck, Zachary; Bravo, Caroline A; Desveaux, Laura; Llovet, Diego; Presseau, Justin; Saragosa, Marianne; Taljaard, Monica; Umar, Shama; Grimshaw, Jeremy M; Tinmouth, Jill; Ivers, Noah M
2018-02-16
Cancer Care Ontario's Screening Activity Report (SAR) is an online audit and feedback tool designed to help primary care physicians in Ontario, Canada, identify patients who are overdue for cancer screening or have abnormal results requiring follow-up. Use of the SAR is associated with increased screening rates. To encourage SAR use, Cancer Care Ontario sends monthly emails to registered primary care physicians announcing that updated data are available. However, analytics reveal that 50% of email recipients do not open the email and less than 7% click the embedded link to log in to their report. The goal of the study is to determine whether rewritten emails result in increased log-ins. This manuscript describes how different user- and theory-informed messages intended to improve the impact of the monthly emails will be experimentally tested and how a process evaluation will explore why and how any effects observed were (or were not) achieved. A user-centered approach was used to rewrite the content of the monthly email, including messages operationalizing 3 behavior change techniques: anticipated regret, material incentive (behavior), and problem solving. A pragmatic, 2x2x2 factorial experiment within a multiphase optimization strategy will test the redesigned emails with an embedded qualitative process evaluation to understand how and why the emails may or may not have worked. Trial outcomes will be ascertained using routinely collected administrative data. Physicians will be recruited for semistructured interviews using convenience and snowball sampling. As of April 2017, 5576 primary care physicians across the province of Ontario, Canada, had voluntarily registered for the SAR, and in so doing, signed up to receive the monthly email updates. From May to August 2017 participants received the redesigned monthly emails with content specific to their allocated experimental condition prompting use of the SAR. We have not yet begun analyses. This study will inform how to communicate effectively with primary care providers by email and identify which behavior change techniques tested are most effective at encouraging engagement with an audit and feedback report. ClinicalTrials.gov NCT03124316; https://clinicaltrials.gov/ct2/show/NCT03124316 (Archived by WebCite at http://www.webcitation.org/6w2MqDWGu). ©Gratianne Vaisson, Holly O Witteman, Zachary Bouck, Caroline A Bravo, Laura Desveaux, Diego Llovet, Justin Presseau, Marianne Saragosa, Monica Taljaard, Shama Umar, Jeremy M Grimshaw, Jill Tinmouth, Noah M Ivers. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 16.02.2018.
DOT National Transportation Integrated Search
2016-12-25
The key objectives of this study were to: 1. Develop advanced analytical techniques that make use of a dynamically configurable connected vehicle message protocol to predict traffic flow regimes in near-real time in a virtual environment and examine ...
Improvement of One Quantum Encryption Scheme
NASA Astrophysics Data System (ADS)
Cao, Zhengjun; Liu, Lihua
2012-01-01
Zhou et al. proposed a quantum encryption scheme based on quantum computation in 2006 [N. Zhou et al., Physica A362 (2006) 305]. Each qubit of the ciphertext is constrained to two pairs of conjugate states. So, its implementation is feasible with the existing technology. But it is inefficient since it entails six key bits to encrypt one message bit, and the resulting ciphertext for one message bit consists of three qubits. In addition, its security cannot be directly reduced to the well-known BB84 protocol. In this paper, we improve it using the technique developed in BB84 protocol. The new scheme entails only two key bits to encrypt one message bit. The resulting ciphertext is just composed of two qubits. It saves about a half cost without the loss of security. Moreover, the new scheme is probabilistic instead of deterministic.
Improving security of the ping-pong protocol
NASA Astrophysics Data System (ADS)
Zawadzki, Piotr
2013-01-01
A security layer for the asymptotically secure ping-pong protocol is proposed and analyzed in the paper. The operation of the improvement exploits inevitable errors introduced by the eavesdropping in the control and message modes. Its role is similar to the privacy amplification algorithms known from the quantum key distribution schemes. Messages are processed in blocks which guarantees that an eavesdropper is faced with a computationally infeasible problem as long as the system parameters are within reasonable limits. The introduced additional information preprocessing does not require quantum memory registers and confidential communication is possible without prior key agreement or some shared secret.
Improving the capacity of the Boström-Felbinger protocol
NASA Astrophysics Data System (ADS)
Cai, Qing-Yu; Li, Bai-Wen
2004-05-01
We show that the capacity of the Boström-Felbinger (ping-pong) protocol [
Measuring the Effects of Cumulative Influence: Using NCW to Prevent or Minimize Civilian Casualties
2007-06-01
can be targeted.. How many computers, how many web site visits, how many TV channels, how many text capable cell phones , the number of email...Total number of cell phone text messages transmitted e. Total number of cell phone text messages replied to f. Build a location map of the city’s...determine how many of the identified people have email accounts, web pages, web logs or cell phone text capabilities. The campaign goes something like
Lossless quantum data compression and secure direct communication
NASA Astrophysics Data System (ADS)
Boström, Kim
2004-07-01
This thesis deals with the encoding and transmission of information through a quantum channel. A quantum channel is a quantum mechanical system whose state is manipulated by a sender and read out by a receiver. The individual state of the channel represents the message. The two topics of the thesis comprise 1) the possibility of compressing a message stored in a quantum channel without loss of information and 2) the possibility to communicate a message directly from one party to another in a secure manner, that is, a third party is not able to eavesdrop the message without being detected. The main results of the thesis are the following. A general framework for variable-length quantum codes is worked out. These codes are necessary to make lossless compression possible. Due to the quantum nature of the channel, the encoded messages are in general in a superposition of different lengths. It is found to be impossible to compress a quantum message without loss of information if the message is not apriori known to the sender. In the other case it is shown that lossless quantum data compression is possible and a lower bound on the compression rate is derived. Furthermore, an explicit compression scheme is constructed that works for arbitrarily given source message ensembles. A quantum cryptographic protocol - the “ping-pong protocol” - is presented that realizes the secure direct communication of classical messages through a quantum channel. The security of the protocol against arbitrary eavesdropping attacks is proven for the case of an ideal quantum channel. In contrast to other quantum cryptographic protocols, the ping-pong protocol is deterministic and can thus be used to transmit a random key as well as a composed message. The protocol is perfectly secure for the transmission of a key, and it is quasi-secure for the direct transmission of a message. The latter means that the probability of successful eavesdropping exponentially decreases with the length of the message. Diese Dissertation behandelt die Kodierung und Verschickung von Information durch einen Quantenkanal. Ein Quantenkanal besteht aus einem quantenmechanischen System, welches vom Sender manipuliert und vom Empfänger ausgelesen werden kann. Dabei repräsentiert der individuelle Zustand des Kanals die Nachricht. Die zwei Themen der Dissertation umfassen 1) die Möglichkeit, eine Nachricht in einem Quantenkanal verlustfrei zu komprimieren und 2) die Möglichkeit eine Nachricht von einer Partei zu einer einer anderen direkt und auf sichere Weise zu übermitteln, d.h. ohne dass es einer dritte Partei möglich ist, die Nachricht abzuhören und dabei unerkannt zu bleiben. Die wesentlichen Ergebnisse der Dissertation sind die folgenden. Ein allgemeiner Formalismus für Quantencodes mit variabler Länge wird ausgearbeitet. Diese Codes sind notwendig um verlustfreie Kompression zu ermöglichen. Wegen der Quantennatur des Kanals sind die codierten Nachrichten allgemein in einer Superposition von verschiedenen Längen. Es zeigt sich, daß es unmöglich ist eine Quantennachricht verlustfrei zu komprimieren, wenn diese dem Sender nicht apriori bekannt ist. Im anderen Falle wird die Möglichkeit verlustfreier Quantenkompression gezeigt und eine untere Schranke für die Kompressionsrate abgeleitet. Des weiteren wird ein expliziter Kompressionsalgorithmus konstruiert, der für beliebig vorgegebene Ensembles aus Quantennachrichten funktioniert. Ein quantenkryptografisches Prokoll - das “Ping-Pong Protokoll” - wird vorgestellt, welches die sichere direkte übertragung von klassischen Nachrichten durch einen Quantenkanal ermöglicht. Die Sicherheit des Protokolls gegen beliebige Abhörangriffe wird bewiesen für den Fall eines idealen Quantenkanals. Im Gegensatz zu anderen quantenkryptografischen Verfahren ist das Ping-Pong Protokoll deterministisch und kann somit sowohl für die Übermittlung eines zufälligen Schlüssels als auch einer komponierten Nachricht verwendet werden. Das Protokoll is perfekt sicher für die Übertragung eines Schlüssels und quasi-sicher für die direkte Übermittlung einer Nachricht. Letzteres bedeutet, dass die Wahrscheinlichkeit eines erfolgreichen Abhörangriffs exponenziell mit der Länge der Nachricht abnimmt.
Lightweight SIP/SDP compression scheme (LSSCS)
NASA Astrophysics Data System (ADS)
Wu, Jian J.; Demetrescu, Cristian
2001-10-01
In UMTS new IP based services with tight delay constraints will be deployed over the W-CDMA air interface such as IP multimedia and interactive services. To integrate the wireline and wireless IP services, 3GPP standard forum adopted the Session Initiation Protocol (SIP) as the call control protocol for the UMTS Release 5, which will implement next generation, all IP networks for real-time QoS services. In the current form the SIP protocol is not suitable for wireless transmission due to its large message size which will need either a big radio pipe for transmission or it will take far much longer to transmit than the current GSM Call Control (CC) message sequence. In this paper we present a novel compression algorithm called Lightweight SIP/SDP Compression Scheme (LSSCS), which acts at the SIP application layer and therefore removes the information redundancy before it is sent to the network and transport layer. A binary octet-aligned header is added to the compressed SIP/SDP message before sending it to the network layer. The receiver uses this binary header as well as the pre-cached information to regenerate the original SIP/SDP message. The key features of the LSSCS compression scheme are presented in this paper along with implementation examples. It is shown that this compression algorithm makes SIP transmission efficient over the radio interface without losing the SIP generality and flexibility.
Velásquez-Villada, Carlos; Donoso, Yezid
2016-01-01
Communications from remote areas that may be of interest is still a problem. Many innovative projects applied to remote sites face communications difficulties. The GOLDFISH project was an EU-funded project for river pollution monitoring in developing countries. It had several sensor clusters, with floating WiFi antennas, deployed along a downstream river’s course. Sensor clusters sent messages to a Gateway installed on the riverbank. This gateway sent the messages, through a backhaul technology, to an Internet server where data was aggregated over a map. The communication challenge in this scenario was produced by the antennas’ movement and network backhaul availability. Since the antennas were floating on the river, communications could be disrupted at any time. Also, 2G/3G availability near the river was not constant. For non-real-time applications, we propose a Delay/Disruption Tolerant Network (DTN)-based solution where all nodes have persistent storage capabilities and DTN protocols to be able to wait minutes or hours to transmit. A mechanical backhaul will periodically visit the river bank where the gateway is installed and it will automatically collect sensor data to be carried to an Internet-covered spot. The proposed forwarding protocol delivers around 98% of the messages for this scenario, performing better than other well-known DTN routing protocols. PMID:27023554
Problems and Mitigation Strategies for Developing and Validating Statistical Cyber Defenses
2014-04-01
Clustering Support Vector Machine (SVM) Classification Netflow Twitter Training Datasets Trained SVMs Enriched Feature State...requests. • Netflow data for TCP connections • E-mail data from SMTP logs • Chat data from XMPP logs • Microtext data (from Twitter message archives...summary data from Bro and Netflow data captured on the BBN network over the period of 1 month, plus simulated attacks WHOIS Domain name record
47 CFR 11.56 - Obligation to process CAP-formatted EAS messages.
Code of Federal Regulations, 2013 CFR
2013-10-01
...), and Common Alerting Protocol, v. 1.2 USA Integrated Public Alert and Warning System Profile Version 1...) “Common Alerting Protocol, v. 1.2 USA Integrated Public Alert and Warning System Profile Version 1.0” (Oct...
47 CFR 11.56 - Obligation to process CAP-formatted EAS messages.
Code of Federal Regulations, 2012 CFR
2012-10-01
...), and Common Alerting Protocol, v. 1.2 USA Integrated Public Alert and Warning System Profile Version 1...) “Common Alerting Protocol, v. 1.2 USA Integrated Public Alert and Warning System Profile Version 1.0” (Oct...
47 CFR 11.56 - Obligation to process CAP-formatted EAS messages.
Code of Federal Regulations, 2014 CFR
2014-10-01
...), and Common Alerting Protocol, v. 1.2 USA Integrated Public Alert and Warning System Profile Version 1...) “Common Alerting Protocol, v. 1.2 USA Integrated Public Alert and Warning System Profile Version 1.0” (Oct...
NASA Technical Reports Server (NTRS)
Burleigh, Scott
2008-01-01
This slide presentation reviews the activity around the Asynchronous Message Service (AMS) prototype. An AMS reference implementation has been available since late 2005. It is aimed at supporting message exchange both in on-board environments and over space links. The implementation incoroporates all mandatory elements of the draft recommendation from July 2007: (1) MAMS, AMS, and RAMS protocols. (2) Failover, heartbeats, resync. (3) "Hooks" for security, but no cipher suites included in the distribution. The performance is reviewed, and a Benchmark latency test over VxWorks Message Queues is shown as histograms of a count vs microseconds per 1000-byte message
Three-step semiquantum secure direct communication protocol
NASA Astrophysics Data System (ADS)
Zou, XiangFu; Qiu, DaoWen
2014-09-01
Quantum secure direct communication is the direct communication of secret messages without need for establishing a shared secret key first. In the existing schemes, quantum secure direct communication is possible only when both parties are quantum. In this paper, we construct a three-step semiquantum secure direct communication (SQSDC) protocol based on single photon sources in which the sender Alice is classical. In a semiquantum protocol, a person is termed classical if he (she) can measure, prepare and send quantum states only with the fixed orthogonal quantum basis {|0>, |1>}. The security of the proposed SQSDC protocol is guaranteed by the complete robustness of semiquantum key distribution protocols and the unconditional security of classical one-time pad encryption. Therefore, the proposed SQSDC protocol is also completely robust. Complete robustness indicates that nonzero information acquired by an eavesdropper Eve on the secret message implies the nonzero probability that the legitimate participants can find errors on the bits tested by this protocol. In the proposed protocol, we suggest a method to check Eves disturbing in the doves returning phase such that Alice does not need to announce publicly any position or their coded bits value after the photons transmission is completed. Moreover, the proposed SQSDC protocol can be implemented with the existing techniques. Compared with many quantum secure direct communication protocols, the proposed SQSDC protocol has two merits: firstly the sender only needs classical capabilities; secondly to check Eves disturbing after the transmission of quantum states, no additional classical information is needed.
NASA Astrophysics Data System (ADS)
Lai, Hong; Luo, Mingxing; Zhang, Jun; Pieprzyk, Josef; Pan, Lei; Orgun, Mehmet A.
2018-07-01
The orthogonality of the orbital angular momentum (OAM) eigenstates enables a single photon carry an arbitrary number of bits. Moreover, additional degrees of freedom (DOFs) of OAM can span a high-dimensional Hilbert space, which could greatly increase information capacity and security. Moreover, the use of the spin angular momentum-OAM hybrid entangled state can increase Shannon dimensionality, because photons can be hybrid entangled in multiple DOFs. Based on these observations, we develop a hybrid entanglement quantum key distribution (QKD) protocol to achieve three-party quantum key distribution without classical message exchanges. In our proposed protocol, a communicating party uses a spatial light modulator (SLM) and a specific phase hologram to modulate photons' OAM state. Similarly, the other communicating parties use their SLMs and the fixed different phase holograms to modulate the OAM entangled photon pairs, producing the shared key among the parties Alice, Bob and Charlie without classical message exchanges. More importantly, when the same operation is repeated for every party, our protocol could be extended to a multiple-party QKD protocol.
[Design and realization of the communication system for the mobile medical terminal].
Ji, Lei; Guo, Xu; Shi, Huayu
2013-01-01
Realizing wireless communication based on handset devices for medical staff; providing an instant messaging method. Constructing a set of communication protocols and standards; developing software both on server and client. Building an instant messaging system which follows the customized specification; based on Android the client provides functions like address book, message, voice service etc. As an independent module of the mobile medical terminal, the system can provide convenient communication for medical service with other mobile business.
System and method for transferring telemetry data between a ground station and a control center
NASA Technical Reports Server (NTRS)
Ray, Timothy J. (Inventor); Ly, Vuong T. (Inventor)
2012-01-01
Disclosed herein are systems, computer-implemented methods, and tangible computer-readable media for coordinating communications between a ground station, a control center, and a spacecraft. The method receives a call to a simple, unified application programmer interface implementing communications protocols related to outer space, when instruction relates to receiving a command at the control center for the ground station generate an abstract message by agreeing upon a format for each type of abstract message with the ground station and using a set of message definitions to configure the command in the agreed upon format, encode the abstract message to generate an encoded message, and transfer the encoded message to the ground station, and perform similar actions when the instruction relates to receiving a second command as a second encoded message at the ground station from the control center and when the determined instruction type relates to transmitting information to the control center.
Abroms, Lorien C; Ahuja, Meenakshi; Kodl, Yvonne; Thaweethai, Lalida; Sims, Justin; Winickoff, Jonathan P; Windsor, Richard A
2012-01-01
Text messaging programs on mobile phones have shown some promise in helping people quit smoking. Text2Quit is an automated, personalized, and interactive mobile health program that sends text messages and e-mails timed around a participant's quit date over the course of 3 months. The text messages include pre- and post-quit educational messages, peer ex-smoker messages, medication reminders and relapse messages, and multiple opportunities for interaction. Study participants were university students (N = 23) enrolled in the Text2Quit program. Participants were surveyed at baseline and at 2 and 4 weeks after enrollment. The majority of participants agreed that they liked the program at 2 and 4 weeks after enrollment (90.5% and 82.3%, respectively). Support for text messages was found to be moderate and higher than that of the e-mail and web components. Of participants, 75% reported reading most or all of the texts. On average, users made 11.8 responses to the texts over a 4-week period, although responses declined after the quit date. The interactive feature for tracking cigarettes was the most used interactive feature, followed by the craving trivia game. This pilot test provides some support for the Text2Quit program. A future iteration of the program will include additional tracking features in both the pre-quit and post-quit protocols and an easier entry into the not-quit protocol. Future studies are recommended that identify the value of the interactive and personalized features that characterize this program.
ABROMS, LORIEN C.; AHUJA, MEENAKSHI; KODL, YVONNE; THAWEETHAI, LALIDA; SIMS, JUSTIN; WINICKOFF, JONATHAN; WINDSOR, RICHARD A.
2012-01-01
Text messaging programs on mobile phones have shown some promise in helping people quit smoking. Text2Quit is an automated, personalized and interactive mobile health program that sends text messages and emails timed around a participant’s quit date over the course of 3 months. The text messages include pre- and post-quit educational messages, peer ex-smoker messages, medication reminders and relapse messages, as well as multiple opportunities for interaction. Study participants were university students (n=23) enrolled in the Text2Quit program. Participants were surveyed at baseline and at 2 and 4 weeks post-enrollment. The vast majority of participants agreed that they liked the program at 2 and 4 weeks post-enrollment (90.5% and 82.3%, respectively). Support for text messages was found to be moderate, and higher than that of the email and web components. Seventy-five percent of participants reported reading most or all of the texts. On average, users made 11.8 responses to the texts over a 4 week period, although responses declined following the quit date. The interactive feature for tracking cigarettes was the most used interactive feature, followed by the craving trivia game. This pilot test provides some support for the Text2Quit program. A future iteration of the program will include additional tracking features in both the pre-quit and post-quit protocol and an easier entry into the not-quit protocol. Future studies are recommended that identify the value of the interactive and personalized features that characterize this program. PMID:22548598
Financial Indicators of Reduced Impact Logging Performance in Brazil: Case Study Comparisons
Thomas P. Holmes; Frederick Boltz; Douglas R. Carter
2001-01-01
Indicators of financial performance are compared for three case studies in the Brazilian Amazon. Each case study presents parameters obtained from monitoring initial harvest entries into primary forests for reduced impact logging (RIL) and conventional logging (CL) operations. Differences in cost definitions and data collection protocols complicate the analysis, and...
The multidriver: A reliable multicast service using the Xpress Transfer Protocol
NASA Technical Reports Server (NTRS)
Dempsey, Bert J.; Fenton, John C.; Weaver, Alfred C.
1990-01-01
A reliable multicast facility extends traditional point-to-point virtual circuit reliability to one-to-many communication. Such services can provide more efficient use of network resources, a powerful distributed name binding capability, and reduced latency in multidestination message delivery. These benefits will be especially valuable in real-time environments where reliable multicast can enable new applications and increase the availability and the reliability of data and services. We present a unique multicast service that exploits features in the next-generation, real-time transfer layer protocol, the Xpress Transfer Protocol (XTP). In its reliable mode, the service offers error, flow, and rate-controlled multidestination delivery of arbitrary-sized messages, with provision for the coordination of reliable reverse channels. Performance measurements on a single-segment Proteon ProNET-4 4 Mbps 802.5 token ring with heterogeneous nodes are discussed.
New secure communication-layer standard for medical image management (ISCL)
NASA Astrophysics Data System (ADS)
Kita, Kouichi; Nohara, Takashi; Hosoba, Minoru; Yachida, Masuyoshi; Yamaguchi, Masahiro; Ohyama, Nagaaki
1999-07-01
This paper introduces a summary of the standard draft of ISCL 1.00 which will be published by MEDIS-DC officially. ISCL is abbreviation of Integrated Secure Communication Layer Protocols for Secure Medical Image Management Systems. ISCL is a security layer which manages security function between presentation layer and TCP/IP layer. ISCL mechanism depends on basic function of a smart IC card and symmetric secret key mechanism. A symmetry key for each session is made by internal authentication function of a smart IC card with a random number. ISCL has three functions which assure authentication, confidently and integrity. Entity authentication process is done through 3 path 4 way method using functions of internal authentication and external authentication of a smart iC card. Confidentially algorithm and MAC algorithm for integrity are able to be selected. ISCL protocols are communicating through Message Block which consists of Message Header and Message Data. ISCL protocols are evaluating by applying to regional collaboration system for image diagnosis, and On-line Secure Electronic Storage system for medical images. These projects are supported by Medical Information System Development Center. These project shows ISCL is useful to keep security.
Semi-quantum Dialogue Based on Single Photons
NASA Astrophysics Data System (ADS)
Ye, Tian-Yu; Ye, Chong-Qiang
2018-02-01
In this paper, we propose two semi-quantum dialogue (SQD) protocols by using single photons as the quantum carriers, where one requires the classical party to possess the measurement capability and the other does not have this requirement. The security toward active attacks from an outside Eve in the first SQD protocol is guaranteed by the complete robustness of present semi-quantum key distribution (SQKD) protocols, the classical one-time pad encryption, the classical party's randomization operation and the decoy photon technology. The information leakage problem of the first SQD protocol is overcome by the classical party' classical basis measurements on the single photons carrying messages which makes him share their initial states with the quantum party. The security toward active attacks from Eve in the second SQD protocol is guaranteed by the classical party's randomization operation, the complete robustness of present SQKD protocol and the classical one-time pad encryption. The information leakage problem of the second SQD protocol is overcome by the quantum party' classical basis measurements on each two adjacent single photons carrying messages which makes her share their initial states with the classical party. Compared with the traditional information leakage resistant QD protocols, the advantage of the proposed SQD protocols lies in that they only require one party to have quantum capabilities. Compared with the existing SQD protocol, the advantage of the proposed SQD protocols lies in that they only employ single photons rather than two-photon entangled states as the quantum carriers. The proposed SQD protocols can be implemented with present quantum technologies.
Bhat, Amritha; Mao, Johnny; Unützer, Jürgen; Reed, Susan; Unger, Jennifer
Mental health care integrated into obstetric settings improves access to perinatal depression treatments. Digital interactions such as text messaging between patient and provider can further improve access. We describe the use of text messaging within a perinatal Collaborative Care (CC) program, and explore the association of text messaging content with perinatal depression outcomes. We analyzed data from an open treatment trial of perinatal CC in a rural obstetric clinic. Twenty five women with Patient Health Questionnaire-9 score of ≥10 enrolled in CC, and used text messaging to communicate with their Care Manager(CM). We used surveys and focus groups to assessacceptability of text messaging with surveys and focus groups. We calculated the number of text messages exchanged, and analyzed content to understand usage patterns. We explored association between text messaging content and depression outcomes. CMs initiated 85.4% messages, and patients responded to 86.9% messages. CMs used text messaging for appointment reminders, and patients used it to obtain obstetric and parenting information. CMs had concerns about the likelihood of boundary violations. Patients appreciated the asynchronous nature of text messaging. Text messaging is feasible and acceptable within a perinatal CC program. We need further research into the effectiveness of text messaging content, and response protocols. Copyright © 2018 Elsevier Inc. All rights reserved.
Ayub, Qaisar; Ngadi, Asri; Rashid, Sulma; Habib, Hafiz Adnan
2018-01-01
Delay Tolerant Network (DTN) multi-copy routing protocols are privileged to create and transmit multiple copies of each message that causes congestion and some messages are dropped. This process is known as reactive drop because messages were dropped re-actively to overcome buffer overflows. The existing reactive buffer management policies apply a single metric to drop source, relay and destine messages. Hereby, selection to drop a message is dubious because each message as source, relay or destine may have consumed dissimilar magnitude of network resources. Similarly, DTN has included time to live (ttl) parameter which defines lifetime of message. Hence, when ttl expires then message is automatically destroyed from relay nodes. However, time-to-live (ttl) is not applicable on messages reached at their destinations. Moreover, nodes keep replicating messages till ttl expires even-though large number of messages has already been dispersed. In this paper, we have proposed Priority Queue Based Reactive Buffer Management Policy (PQB-R) for DTN under City Based Environments. The PQB-R classifies buffered messages into source, relay and destine queues. Moreover, separate drop metric has been applied on individual queue. The experiment results prove that proposed PQB-R has reduced number of messages transmissions, message drop and increases delivery ratio.
Ngadi, Asri; Rashid, Sulma; Habib, Hafiz Adnan
2018-01-01
Delay Tolerant Network (DTN) multi-copy routing protocols are privileged to create and transmit multiple copies of each message that causes congestion and some messages are dropped. This process is known as reactive drop because messages were dropped re-actively to overcome buffer overflows. The existing reactive buffer management policies apply a single metric to drop source, relay and destine messages. Hereby, selection to drop a message is dubious because each message as source, relay or destine may have consumed dissimilar magnitude of network resources. Similarly, DTN has included time to live (ttl) parameter which defines lifetime of message. Hence, when ttl expires then message is automatically destroyed from relay nodes. However, time-to-live (ttl) is not applicable on messages reached at their destinations. Moreover, nodes keep replicating messages till ttl expires even-though large number of messages has already been dispersed. In this paper, we have proposed Priority Queue Based Reactive Buffer Management Policy (PQB-R) for DTN under City Based Environments. The PQB-R classifies buffered messages into source, relay and destine queues. Moreover, separate drop metric has been applied on individual queue. The experiment results prove that proposed PQB-R has reduced number of messages transmissions, message drop and increases delivery ratio. PMID:29438438
Graham, Amanda L; Jacobs, Megan A; Cohn, Amy M; Cha, Sarah; Abroms, Lorien C; Papandonatos, George D; Whittaker, Robyn
2016-01-01
Introduction Millions of smokers use the Internet for smoking cessation assistance each year; however, most smokers engage minimally with even the best designed websites. The ubiquity of mobile devices and their effectiveness in promoting adherence in other areas of health behaviour change make them a promising tool to address adherence in Internet smoking cessation interventions. Text messaging is used by most adults, and messages can proactively encourage use of a web-based intervention. Text messaging can also be integrated with an Internet intervention to facilitate the use of core Internet intervention components. Methods and analysis We identified four aspects of a text message intervention that may enhance its effectiveness in promoting adherence to a web-based smoking cessation programme: personalisation, integration, dynamic tailoring and message intensity. Phase I will use a two-level full factorial design to test the impact of these four experimental features on adherence to a web-based intervention. The primary outcome is a composite metric of adherence that incorporates general utilisation metrics (eg, logins, page views) and specific feature utilisation shown to predict abstinence. Participants will be N=860 adult smokers who register on an established Internet cessation programme and enrol in its text message programme. Phase II will be a two-arm randomised trial to compare the efficacy of the web-based cessation programme alone and in conjunction with the optimised text messaging intervention on 30-day point prevalence abstinence at 9 months. Phase II participants will be N=600 adult smokers who register to use an established Internet cessation programme and enrol in text messaging. Secondary analyses will explore whether adherence mediates the effect of treatment condition on outcome. Ethics and dissemination This protocol was approved by Chesapeake IRB. We will disseminate study results through peer-reviewed manuscripts and conference presentations related to the methods and design, outcomes and exploratory analyses. Trial registration number NCT02585206. PMID:27029775
Net Results: Online Protocols Boost Group Learning Potential
ERIC Educational Resources Information Center
Dichter, Alan; Zydney, Janet Mannheimer
2015-01-01
Educators have begun to use protocols to facilitate professional development in online spaces--partly because people need to connect from different places, but also to take advantage of new environments for learning. For example, asynchronous tools, such as discussion forums, blogs, or Google+, where participants post messages to one another at…
Security Protocol Verification and Optimization by Epistemic Model Checking
2010-11-05
Three cryptographers are sitting down to dinner at their favourite restau- rant. Their waiter informs them that arrangements have been made with the...Unfortunately, the protocol cannot be expected to satisfy this: suppose that all agents manage to broadcast their mes- sage and all messages have the
Wolfe, Marlene K; Gallandat, Karin; Daniels, Kyle; Desmarais, Anne Marie; Scheinman, Pamela; Lantagne, Daniele
2017-01-01
To prevent Ebola transmission, frequent handwashing is recommended in Ebola Treatment Units and communities. However, little is known about which handwashing protocol is most efficacious. We evaluated six handwashing protocols (soap and water, alcohol-based hand sanitizer (ABHS), and 0.05% sodium dichloroisocyanurate, high-test hypochlorite, and stabilized and non-stabilized sodium hypochlorite solutions) for 1) efficacy of handwashing on the removal and inactivation of non-pathogenic model organisms and, 2) persistence of organisms in rinse water. Model organisms E. coli and bacteriophage Phi6 were used to evaluate handwashing with and without organic load added to simulate bodily fluids. Hands were inoculated with test organisms, washed, and rinsed using a glove juice method to retrieve remaining organisms. Impact was estimated by comparing the log reduction in organisms after handwashing to the log reduction without handwashing. Rinse water was collected to test for persistence of organisms. Handwashing resulted in a 1.94-3.01 log reduction in E. coli concentration without, and 2.18-3.34 with, soil load; and a 2.44-3.06 log reduction in Phi6 without, and 2.71-3.69 with, soil load. HTH performed most consistently well, with significantly greater log reductions than other handwashing protocols in three models. However, the magnitude of handwashing efficacy differences was small, suggesting protocols are similarly efficacious. Rinse water demonstrated a 0.28-4.77 log reduction in remaining E. coli without, and 0.21-4.49 with, soil load and a 1.26-2.02 log reduction in Phi6 without, and 1.30-2.20 with, soil load. Chlorine resulted in significantly less persistence of E. coli in both conditions and Phi6 without soil load in rinse water (p<0.001). Thus, chlorine-based methods may offer a benefit of reducing persistence in rinse water. We recommend responders use the most practical handwashing method to ensure hand hygiene in Ebola contexts, considering the potential benefit of chlorine-based methods in rinse water persistence.
Secret-key expansion from covert communication
NASA Astrophysics Data System (ADS)
Arrazola, Juan Miguel; Amiri, Ryan
2018-02-01
Covert communication allows the transmission of messages in such a way that it is not possible for adversaries to detect that the communication is occurring. This provides protection in situations where knowledge that two parties are talking to each other may be incriminating to them. In this work, we study how covert communication can be used for a different purpose: secret key expansion. First, we show that any message transmitted in a secure covert protocol is also secret and therefore unknown to an adversary. We then propose a covert communication protocol where the amount of key consumed in the protocol is smaller than the transmitted key, thus leading to secure secret key expansion. We derive precise conditions for secret key expansion to occur, showing that it is possible when there are sufficiently low levels of noise for a given security level. We conclude by examining how secret key expansion from covert communication can be performed in a computational security model.
Achieving fast and stable failure detection in WDM Networks
NASA Astrophysics Data System (ADS)
Gao, Donghui; Zhou, Zhiyu; Zhang, Hanyi
2005-02-01
In dynamic networks, the failure detection time takes a major part of the convergence time, which is an important network performance index. To detect a node or link failure in the network, traditional protocols, like Hello protocol in OSPF or RSVP, exchanges keep-alive messages between neighboring nodes to keep track of the link/node state. But by default settings, it can get a minimum detection time in the measure of dozens of seconds, which can not meet the demands of fast network convergence and failure recovery. When configuring the related parameters to reduce the detection time, there will be notable instability problems. In this paper, we analyzed the problem and designed a new failure detection algorithm to reduce the network overhead of detection signaling. Through our experiment we found it is effective to enhance the stability by implicitly acknowledge other signaling messages as keep-alive messages. We conducted our proposal and the previous approaches on the ASON test-bed. The experimental results show that our algorithm gives better performances than previous schemes in about an order magnitude reduction of both false failure alarms and queuing delay to other messages, especially under light traffic load.
Oughton, Matthew T; Loo, Vivian G; Dendukuri, Nandini; Fenn, Susan; Libman, Michael D
2009-10-01
To evaluate common hand hygiene methods for efficacy in removing Clostridium difficile. Randomized crossover comparison among 10 volunteers with hands experimentally contaminated by nontoxigenic C. difficile. Interventions included warm water with plain soap, cold water with plain soap, warm water with antibacterial soap, antiseptic hand wipes, alcohol-based handrub, and a control involving no intervention. All interventions were evaluated for mean reduction in colony-forming units (CFUs) under 2 contamination protocols: "whole hand" and "palmar surface." Results were analyzed according to a Bayesian approach, by using hierarchical models adjusted for multiple observations. Under the whole-hand protocol, the greatest adjusted mean reductions were achieved by warm water with plain soap (2.14 log(10) CFU/mL [95% credible interval (CrI), 1.74-2.54 log(10) CFU/mL]), cold water with plain soap (1.88 log(10) CFU/mL [95% CrI, 1.48-2.28 log(10) CFU/mL), and warm water with antibacterial soap (1.51 log(10) CFU/mL [95% CrI, 1.12-1.91 log(10) CFU/mL]), followed by antiseptic hand wipes (0.57 log(10) CFU/mL [95% CrI, 0.17-0.96 log(10) CFU/mL]). Alcohol-based handrub (0.06 log(10) CFU/mL [95% CrI, -0.34 to 0.45 log(10) CFU/mL]) was equivalent to no intervention. Under the palmar surface protocol, warm water with plain soap, cold water with plain soap, and warm water with antibacterial soap again yielded the greatest mean reductions, followed by antiseptic hand wipes (26.6, 26.6, 26.6, and 21.9 CFUs per plate, respectively), when compared with alcohol-based handrub. Hypothenar (odds ratio, 10.98 [95% CrI, 1.96-37.65]) and thenar (odds ratio, 6.99 [95% CrI, 1.25-23.41]) surfaces were more likely than fingertips to remain heavily contaminated after handwashing. Handwashing with soap and water showed the greatest efficacy in removing C. difficile and should be performed preferentially over the use of alcohol-based handrubs when contact with C. difficile is suspected or likely.
Recommended protocols for sampling macrofungi
Gregory M. Mueller; John Paul Schmit; Sabine M. Hubndorf Leif Ryvarden; Thomas E. O' Dell; D. Jean Lodge; Patrick R. Leacock; Milagro Mata; Loengrin Umania; Qiuxin (Florence) Wu; Daniel L. Czederpiltz
2004-01-01
This chapter discusses several issues regarding reommended protocols for sampling macrofungi: Opportunistic sampling of macrofungi, sampling conspicuous macrofungi using fixed-size, sampling small Ascomycetes using microplots, and sampling a fixed number of downed logs.
2015-01-06
Carnegie Mellon University rwcut Default Display By default • sIP , sPort • dIP, dPort • protocol • packets, bytes • flags • sTime, eTime, duration...TCP/IP SOCKET IP address: 10.0.0.1 L4 protocol : TCP High-numbered ephemeral port # TCP/IP SOCKET IP address: 203.0.113.1 L4 protocol : TCP Low-numbered...Fields found to be useful in analysis: • source address, destination address • source port, destination port (Internet Control Message Protocol
Shi, Jingyuan; Poorisat, Thanomwong; Salmon, Charles T
2018-01-01
The past decade has witnessed a rapid increase in the use of Social Networking Sites (SNSs) in health communication campaigns seeking to achieve an ambitious range of health-related impacts. This article provides a review of 40 studies and research protocols, with a focus on two key factors that differentiate SNSs from more traditional health communication approaches of the past. The first is the potential dualism between message sender and receiver, in which receivers become receiver-sources who forward and amplify the content and reach of health messages. The second is the potential dualism between message and message impact, in which the act of forwarding and modifying messages by receiver-sources itself becomes a measure of message impact. Each of these dualisms has implications for the design and evaluation of contemporary health communication campaigns. The review concludes with a series of observations and recommendations for future health communication research.
Knowledge and skill retention of a mobile phone data collection protocol in rural Liberia.
Munro, Michelle L; Lori, Jody R; Boyd, Carol J; Andreatta, Pamela
2014-01-01
With a large number of births occurring outside the formal health system, it is difficult to determine the number of pregnant women in rural regions of Liberia. The exponential growth of mobile phone use in developing countries provides a potential avenue for data collection on maternal and child health in such rural, remote regions. A pre-, post-, and one-year posttest design was used to collect data on knowledge and skill retention for 7 essential items required for mobile phone use among traditional birth attendants (TBAs) trained in a short message service (SMS) texting data collection protocol (N = 99) in rural Liberia. Sixty-three participants (63.6% retention) completed the one-year posttest and displayed evidence of statistically significant knowledge and skill retention in 6 of the 7 tasks (P < .005), including the ability to: 1) turn on the phone, 2) use the mobile phone to make a call, 3) recognize that they have coverage, 4) recognize that the mobile phone is charged, 5) create a SMS text message without help, and 6) send a SMS text message without help. The TBAs continued to have difficulty with more complex tasks such as adding minutes to a phone. The mobile phone data-collection protocol proved feasible with TBAs demonstrating knowledge retention in a one-year posttest; however, clinical significance needs further investigation. The protocol increased communication and collaboration among TBAs, certified midwives, and clinic staff. © 2014 by the American College of Nurse-Midwives.
Patient privacy protection using anonymous access control techniques.
Weerasinghe, D; Rajarajan, M; Elmufti, K; Rakocevic, V
2008-01-01
The objective of this study is to develop a solution to preserve security and privacy in a healthcare environment where health-sensitive information will be accessed by many parties and stored in various distributed databases. The solution should maintain anonymous medical records and it should be able to link anonymous medical information in distributed databases into a single patient medical record with the patient identity. In this paper we present a protocol that can be used to authenticate and authorize patients to healthcare services without providing the patient identification. Healthcare service can identify the patient using separate temporary identities in each identification session and medical records are linked to these temporary identities. Temporary identities can be used to enable record linkage and reverse track real patient identity in critical medical situations. The proposed protocol provides main security and privacy services such as user anonymity, message privacy, message confidentiality, user authentication, user authorization and message replay attacks. The medical environment validates the patient at the healthcare service as a real and registered patient for the medical services. Using the proposed protocol, the patient anonymous medical records at different healthcare services can be linked into one single report and it is possible to securely reverse track anonymous patient into the real identity. The protocol protects the patient privacy with a secure anonymous authentication to healthcare services and medical record registries according to the European and the UK legislations, where the patient real identity is not disclosed with the distributed patient medical records.
Faithful teleportation with partially entangled states
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gour, Gilad
2004-10-01
We write explicitly a general protocol for faithful teleportation of a d-state particle (qudit) via a partially entangled pair of (pure) n-state particles. The classical communication cost (CCC) of the protocol is log{sub 2}(nd) bits, and it is implemented by a projective measurement performed by Alice, and a unitary operator performed by Bob (after receiving from Alice the measurement result). We prove the optimality of our protocol by a comparison with the concentrate and teleport strategy. We also show that if d>n/2, or if there is no residual entanglement left after the faithful teleportation, the CCC of any protocol ismore » at least log{sub 2}(nd) bits. Furthermore, we find a lower bound on the CCC in the process transforming one bipartite state to another by means of local operation and classical communication.« less
Reese, Jasmine M; Joseph, Rodney P; Cherrington, Andrea; Allison, Jeroan; Kim, Young-Il; Spear, Bonnie; Childs, Gwendolyn; Simpson, Tina; Durant, Nefertiti H
2017-05-01
The purpose of this study was to develop a participant-informed technology-based physical activity (PA) promotion tool for young overweight and obese African American (AA) women. A mixed-method 3-phase study protocol design was used to develop text messages to promote PA in AA women attending the University of Alabama at Birmingham during the Spring of 2013. Nominal focus groups and a 2-week pilot were used to generate and test participant-developed messages. Participants ( n = 14) had a mean age of 19.79 years ( SD = 1.4) and mean body mass index of 35.9 ( SD = 5.926). Focus group data identified key themes associated with the use of text messages to promote PA including message frequency, length, tone, and time of day. Participants preferred text messages that were brief, specific, and time sensitive. Results showed that text messaging was a feasible and acceptable strategy to promote PA in overweight and obese AA women in a university setting.
Messages discriminated from the media about illicit drugs.
Patterson, S J
1994-01-01
The electronic media have been an instrumental tool in the most recent efforts to address the issue of illicit drug abuse in the United States. Messages about illicit drugs appear in three places in the media: advertising content, news content, and entertainment content. Many studies have documented the amount and types of messages that appear on the electronic media, but few have asked the audience how they interpret these messages. The purpose of this study is to investigate how much and what type of information college students receive from the media about drugs. Interviews were conducted with 228 students using the message discrimination protocol. The messages were then content analyzed into theme areas. Results indicate the majority of messages discriminated from advertising content were fear appeals; that the majority of messages discriminated from news content documented the enforcement efforts in the war on drugs; and that messages about drugs in entertainment content were more likely to provide clear accurate information about drugs than the other two content sources. The results are discussed in terms of the audience receiving fear and fight messages from the electronic media rather than clear, accurate information necessary to make informed decisions about drugs.
Lightweight CoAP-Based Bootstrapping Service for the Internet of Things.
Garcia-Carrillo, Dan; Marin-Lopez, Rafael
2016-03-11
The Internet of Things (IoT) is becoming increasingly important in several fields of industrial applications and personal applications, such as medical e-health, smart cities, etc. The research into protocols and security aspects related to this area is continuously advancing in making these networks more reliable and secure, taking into account these aspects by design. Bootstrapping is a procedure by which a user obtains key material and configuration information, among other parameters, to operate as an authenticated party in a security domain. Until now solutions have focused on re-using security protocols that were not developed for IoT constraints. For this reason, in this work we propose a design and implementation of a lightweight bootstrapping service for IoT networks that leverages one of the application protocols used in IoT : Constrained Application Protocol (CoAP). Additionally, in order to provide flexibility, scalability, support for large scale deployment, accountability and identity federation, our design uses technologies such as the Extensible Authentication Protocol (EAP) and Authentication Authorization and Accounting (AAA). We have named this service CoAP-EAP. First, we review the state of the art in the field of bootstrapping and specifically for IoT. Second, we detail the bootstrapping service: the architecture with entities and interfaces and the flow operation. Third, we obtain performance measurements of CoAP-EAP (bootstrapping time, memory footprint, message processing time, message length and energy consumption) and compare them with PANATIKI. The most significant and constrained representative of the bootstrapping solutions related with CoAP-EAP. As we will show, our solution provides significant improvements, mainly due to an important reduction of the message length.
Lightweight CoAP-Based Bootstrapping Service for the Internet of Things
Garcia-Carrillo, Dan; Marin-Lopez, Rafael
2016-01-01
The Internet of Things (IoT) is becoming increasingly important in several fields of industrial applications and personal applications, such as medical e-health, smart cities, etc. The research into protocols and security aspects related to this area is continuously advancing in making these networks more reliable and secure, taking into account these aspects by design. Bootstrapping is a procedure by which a user obtains key material and configuration information, among other parameters, to operate as an authenticated party in a security domain. Until now solutions have focused on re-using security protocols that were not developed for IoT constraints. For this reason, in this work we propose a design and implementation of a lightweight bootstrapping service for IoT networks that leverages one of the application protocols used in IoT : Constrained Application Protocol (CoAP). Additionally, in order to provide flexibility, scalability, support for large scale deployment, accountability and identity federation, our design uses technologies such as the Extensible Authentication Protocol (EAP) and Authentication Authorization and Accounting (AAA). We have named this service CoAP-EAP. First, we review the state of the art in the field of bootstrapping and specifically for IoT. Second, we detail the bootstrapping service: the architecture with entities and interfaces and the flow operation. Third, we obtain performance measurements of CoAP-EAP (bootstrapping time, memory footprint, message processing time, message length and energy consumption) and compare them with PANATIKI. The most significant and constrained representative of the bootstrapping solutions related with CoAP-EAP. As we will show, our solution provides significant improvements, mainly due to an important reduction of the message length. PMID:26978362
NASA Astrophysics Data System (ADS)
Xu, Shu-Jiang; Chen, Xiu-Bo; Wang, Lian-Hai; Ding, Qing-Yan; Zhang, Shu-Hui
2016-06-01
In 2011, Qu et al. proposed a quantum information hiding protocol based on the entanglement swapping of χ-type quantum states. Because a χ-type state can be described by the 4-particle cat states which have good symmetry, the possible output results of the entanglement swapping between a given χ-type state and all of the 16 χ-type states are divided into 8 groups instead of 16 groups of different results when the global phase is not considered. So it is difficult to read out the secret messages since each result occurs twice in each line (column) of the secret messages encoding rule for the original protocol. In fact, a 3-bit instead of a 4-bit secret message can be encoded by performing two unitary transformations on 2 particles of a χ-type quantum state in the original protocol. To overcome this defect, we propose an improved quantum information hiding protocol based on the general term formulas of the entanglement swapping among χ-type states. Supported by the National Natural Science Foundation of China under Grant Nos. 61572297, 61303199, 61272514, and 61373131, the Shandong Provincial Natural Science Foundation of China under Grant Nos. ZR2013FM025, ZR2013FQ001, ZR2014FM003, and ZY2015YL018, the Shandong Provincial Outstanding Research Award Fund for Young Scientists of China under Grant Nos. BS2015DX006 and BS2014DX007, the National Development Foundation for Cryptological Research, China under Grant No. MMJJ201401012, the Priority Academic Program Development of Jiangsu Higher Education Institutions and Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Funds, and the Shandong Academy of Sciences Youth Fund Project, China under Grant Nos. 2015QN003 and 2013QN007
Francis, Jillian J; Grimshaw, Jeremy M; Zwarenstein, Merrick; Eccles, Martin P; Shiller, Susan; Godin, Gaston; Johnston, Marie; O'Rourke, Keith; Presseau, Justin; Tetroe, Jacqueline
2007-01-01
Background A challenge for implementation researchers is to develop principles that could generate testable hypotheses that apply across a range of clinical contexts, thus leading to generalisability of findings. Such principles may be provided by systematically developed theories. The opportunity has arisen to test some of these theoretical principles in the Ontario Printed Educational Materials (OPEM) trial by conducting a sub-trial within the existing trial structure. OPEM is a large factorial cluster-randomised trial evaluating the effects of short directive and long discursive educational messages embedded into informed, an evidence-based newsletter produced in Canada by the Institute for Clinical Evaluative Sciences (ICES) and mailed to all primary care physicians in Ontario. The content of educational messages in the sub-trial will be constructed using both standard methods and methods inspired by psychological theory. The aim of this study is to test the effectiveness of the TheoRY-inspired MEssage ('TRY-ME') compared with the 'standard' message in changing prescribing behaviour. Methods The OPEM trial participants randomised to receive the short directive message attached to the outside of informed (an 'outsert') will be sub-randomised to receive either a standard message or a message informed by the theory of planned behaviour (TPB) using a two (long insert or no insert) by three (theory-based outsert or standard outsert or no outsert) design. The messages will relate to prescription of thiazide diuretics as first line drug treatment for hypertension (described in the accompanying protocol, "The Ontario Printed Educational Materials trial"). The short messages will be developed independently by two research teams. The primary outcome is prescription of thiazide diuretics, measured by routinely collected data available within ICES. The study is designed to answer the question, is there any difference in guideline adherence (i.e., thiazide prescription rates) between physicians in the six groups? A process evaluation survey instrument based on the TPB will be administered pre- and post-intervention (described in the accompanying protocol, "Looking inside the black box"). The second research question concerns processes that may underlie observed differences in prescribing behaviour. We expect that effects of the messages on prescribing behaviour will be mediated through changes in physicians' cognitions. Trial registration number Current controlled trial ISRCTN72772651 PMID:18039363
Song, Jin Soo A; Wozney, Lori; Chorney, Jill; Ishman, Stacey L; Hong, Paul
2017-11-01
Parents can struggle while providing perioperative tonsillectomy care for their children at home. Short message service (SMS) technology is an accessible and direct modality to communicate timely, evidence-based recommendations to parents across the perioperative period. This study focused on validating a SMS protocol, Tonsil-Text-To-Me (TTTM), for parents of children undergoing tonsillectomy. This study used a modified Delphi expert consensus method. Participants were an international sample of 27 clinicians/researchers. Participants rated level of agreement with recommendations across seven perioperative domains, derived systematically from scientific and lay literature. A priori consensus analysis was conducted using threshold criterion. A multidisciplinary team of local clinicians were also individually interviewed to consolidate text messages and implement recurrent suggestions. In the modified Delphi panel, 30 statements reached threshold agreement (>3.0 of 4.0); recommendations surrounding diet (3.87) and hygiene (3.83) had the highest level of consensus, while recommendations regarding activity (3.42) and non-pharmacologic pain management (3.55) had the lowest consensus. The 30 statements reconfigured into 12 concise text messages. After further interviews with local clinicians, 14 final text messages were included in the SMS protocol to be sent two weeks preoperatively to one week postoperatively. This study illustrates the development of TTTM which is designed to deliver key sequential text messages at the optimal time during the perioperative setting to parents caring for their children who are undergoing tonsillectomy. Copyright © 2017 Elsevier B.V. All rights reserved.
Fingerprinting Software Defined Networks and Controllers
2015-03-01
24 2.5.3 Intrusion Prevention System with SDN . . . . . . . . . . . . . . . 25 2.5.4 Modular Security Services...Control Message Protocol IDS Intrusion Detection System IPS Intrusion Prevention System ISP Internet Service Provider LLDP Link Layer Discovery Protocol...layer functions (e.g., web proxies, firewalls, intrusion detection/prevention, load balancers, etc.). The increase in switch capabilities combined
Automatic Coding of Dialogue Acts in Collaboration Protocols
ERIC Educational Resources Information Center
Erkens, Gijsbert; Janssen, Jeroen
2008-01-01
Although protocol analysis can be an important tool for researchers to investigate the process of collaboration and communication, the use of this method of analysis can be time consuming. Hence, an automatic coding procedure for coding dialogue acts was developed. This procedure helps to determine the communicative function of messages in online…
The Deep Impact Network Experiment Operations Center Monitor and Control System
NASA Technical Reports Server (NTRS)
Wang, Shin-Ywan (Cindy); Torgerson, J. Leigh; Schoolcraft, Joshua; Brenman, Yan
2009-01-01
The Interplanetary Overlay Network (ION) software at JPL is an implementation of Delay/Disruption Tolerant Networking (DTN) which has been proposed as an interplanetary protocol to support space communication. The JPL Deep Impact Network (DINET) is a technology development experiment intended to increase the technical readiness of the JPL implemented ION suite. The DINET Experiment Operations Center (EOC) developed by JPL's Protocol Technology Lab (PTL) was critical in accomplishing the experiment. EOC, containing all end nodes of simulated spaces and one administrative node, exercised publish and subscribe functions for payload data among all end nodes to verify the effectiveness of data exchange over ION protocol stacks. A Monitor and Control System was created and installed on the administrative node as a multi-tiered internet-based Web application to support the Deep Impact Network Experiment by allowing monitoring and analysis of the data delivery and statistics from ION. This Monitor and Control System includes the capability of receiving protocol status messages, classifying and storing status messages into a database from the ION simulation network, and providing web interfaces for viewing the live results in addition to interactive database queries.
NASA Astrophysics Data System (ADS)
Wang, LiLi; Ma, WenPing; Wang, MeiLing; Shen, DongSu
2016-05-01
We present an efficient three-party quantum secure direct communication (QSDC) protocol with single photos in both polarization and spatial-mode degrees of freedom. The three legal parties' messages can be encoded on the polarization and the spatial-mode states of single photons independently with desired unitary operations. A party can obtain the other two parties' messages simultaneously through a quantum channel. Because no extra public information is transmitted in the classical channels, the drawback of information leakage or classical correlation does not exist in the proposed scheme. Moreover, the comprehensive security analysis shows that the presented QSDC network protocol can defend the outsider eavesdropper's several sorts of attacks. Compared with the single photons with only one degree of freedom, our protocol based on the single photons in two degrees of freedom has higher capacity. Since the preparation and the measurement of single photon quantum states in both the polarization and the spatial-mode degrees of freedom are available with current quantum techniques, the proposed protocol is practical.
Mobile phone text messaging for improving the uptake of vaccinations: a systematic review protocol.
Kalan, Robyn; Wiysonge, Charles S; Ramafuthole, Tshepiso; Allie, Kurt; Ebrahim, Fatima; Engel, Mark Emmanuel
2014-08-04
Low vaccine coverage is a major public health concern, the consequences of which contribute to around 1.5 million child deaths from vaccine-preventable diseases. Thus, innovative strategies to rapidly increase coverage and recall rates for vaccinations are urgently required. Mobile text messaging (or short messaging service, SMS) has the potential to help increase vaccination coverage and therefore we propose to conduct a review of the current best evidence for the use of SMS as an intervention to promote vaccination coverage. This article describes the protocol for a systematic review of the effectiveness of SMS in improving the uptake of vaccination. Primary and secondary outcomes of interest are prespecified. We will preferably include randomised controlled trials (RCTs). However, non-randomised studies (NRS) will be considered if there is an inadequate number of RCTs. We will search several bibliographic databases (eg,PubMed, EMBASE, CINAHL, CENTRAL, Science Citation Index, Africa-Wide Information and WHOLIS electronic databases and search sources for grey literature. Following data extraction and assessment of risk of bias, we will meta-analyse studies and conduct subgroup analyses, according to intervention subtypes. We will assess clinical heterogeneity and statistical heterogeneity. For outcomes without quantitative data, a descriptive analysis will be used. This review protocol is registered in the PROSPERO International Prospective Register of systematic reviews, registration number 2014:CRD42014007531 ETHICS AND DISSEMINATION: Ethics is not required for this study, given that this is a protocol for a systematic review, which uses published data. The findings of this study will be disseminated through peer-reviewed publications and conference presentations. We anticipate that the results could be used by researchers and policymakers to help inform them of the efficacy of mobile phone text messaging interventions to promote increased vaccination coverage. PROSPERO registration number 2014:CRD42014007531. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
Herrett, Emily; van Staa, Tjeerd; Free, Caroline; Smeeth, Liam
2014-05-02
The UK government recommends that at least 75% of people aged under 64 with certain conditions receive an annual influenza vaccination. Primary care practices often fall short of this target and strategies to increase vaccine uptake are required. Text messaging reminders are already used in 30% of practices to remind patients about vaccination, but there has been no trial addressing their effectiveness in increasing influenza vaccine uptake in the UK. The aims of the study are (1) to develop the methodology for conducting cluster randomised trials of text messaging interventions utilising routine electronic health records and (2) to assess the effectiveness of using a text messaging influenza vaccine reminder in achieving an increase in influenza vaccine uptake in patients aged 18-64 with chronic conditions, compared with standard care. This cluster randomised trial will recruit general practices across three settings in English primary care (Clinical Practice Research Datalink, ResearchOne and London iPLATO text messaging software users) and randomise them to either standard care or a text messaging campaign to eligible patients. Flu vaccine uptake will be ascertained using routinely collected, anonymised electronic patient records. This protocol outlines the proposed study design and analysis methods. This study will determine the effectiveness of text messaging vaccine reminders in primary care in increasing influenza vaccine uptake, and will strengthen the methodology for using electronic health records in cluster randomised trials of text messaging interventions. This trial was approved by the Surrey Borders Ethics Committee (13/LO/0872). The trial results will be disseminated at national conferences and published in a peer-reviewed medical journal. The results will also be distributed to the Primary Care Research Network and to all participating general practices. This study is registered at controlled-trials.com ISRCTN48840025, July 2013.
Adolescents' receptivity to E-cigarette harms messages delivered using text messaging.
Noar, Seth M; Rohde, Jacob A; Horvitz, Casey; Lazard, Allison J; Cornacchione Ross, Jennifer; Sutfin, Erin L
2018-06-02
E-cigarette use among adolescents has dramatically risen since 2011, yet little research has tested e-cigarette harms messages among adolescents. We conducted a pretest-posttest pilot study to examine adolescents' receptivity to e-cigarette health harms messages delivered using text messaging. N = 69 adolescents were enrolled in an 8-day pretest-posttest text messaging study. Participants completed a pretest survey on day one, were texted one of three e-cigarette health harms messages per day on days two through seven, and completed a posttest survey on day eight (88% retention). We assessed message ratings at posttest and knowledge, thoughts, and beliefs about e-cigarette harms at pretest and posttest. Adolescents rated the three messages favorably, with both the chemical and brain messages scoring higher than the nicotine message on fear arousal and perceived message effectiveness. More than one-third of adolescents showed the messages to others and talked to others about the messages. At posttest, knowledge about the harms of e-cigarettes, thinking about the risks of e-cigarettes, and perceived risks of e-cigarettes were all significantly higher compared to pretest (p < .05). Participants largely adhered to the text messaging protocol and found the study highly acceptable. This pilot study suggests that adolescents are receptive to e-cigarette health harms messages and that delivering such messages using text messaging is feasible and acceptable. Future research should systematically develop and test a broad set of e-cigarette health harms messages and examine their impact in a randomized controlled trial. Copyright © 2018 Elsevier Ltd. All rights reserved.
NASA Technical Reports Server (NTRS)
Gwaltney, David A.; Briscoe, Jeri M.
2005-01-01
Integrated System Health Management (ISHM) architectures for spacecraft will include hard real-time, critical subsystems and soft real-time monitoring subsystems. Interaction between these subsystems will be necessary and an architecture supporting multiple criticality levels will be required. Demonstration hardware for the Integrated Safety-Critical Advanced Avionics Communication & Control (ISAACC) system has been developed at NASA Marshall Space Flight Center. It is a modular system using a commercially available time-triggered protocol, ?Tp/C, that supports hard real-time distributed control systems independent of the data transmission medium. The protocol is implemented in hardware and provides guaranteed low-latency messaging with inherent fault-tolerance and fault-containment. Interoperability between modules and systems of modules using the TTP/C is guaranteed through definition of messages and the precise message schedule implemented by the master-less Time Division Multiple Access (TDMA) communications protocol. "Plug-and-play" capability for sensors and actuators provides automatically configurable modules supporting sensor recalibration and control algorithm re-tuning without software modification. Modular components of controlled physical system(s) critical to control algorithm tuning, such as pumps or valve components in an engine, can be replaced or upgraded as "plug and play" components without modification to the ISAACC module hardware or software. ISAACC modules can communicate with other vehicle subsystems through time-triggered protocols or other communications protocols implemented over Ethernet, MIL-STD- 1553 and RS-485/422. Other communication bus physical layers and protocols can be included as required. In this way, the ISAACC modules can be part of a system-of-systems in a vehicle with multi-tier subsystems of varying criticality. The goal of the ISAACC architecture development is control and monitoring of safety critical systems of a manned spacecraft. These systems include spacecraft navigation and attitude control, propulsion, automated docking, vehicle health management and life support. ISAACC can integrate local critical subsystem health management with subsystems performing long term health monitoring. The ISAACC system and its relationship to ISHM will be presented.
AUV-12 Sonar Integration and Evaluation
2010-02-26
ActiveX control allow the real-time ES MKII data (with embedded navigation data) to be logged to the SBC disk in the ES MKII native XTF format. We...begin transmission to the AUV via the acoustic micro-modem message type 28 that contains the target vessel position, true heading, course over
The Activity of Antimicrobial Surfaces Varies by Testing Protocol Utilized
Campos, Matias D.; Zucchi, Paola C.; Phung, Ann; Leonard, Steven N.; Hirsch, Elizabeth B.
2016-01-01
Background Contaminated hospital surfaces are an important source of nosocomial infections. A major obstacle in marketing antimicrobial surfaces is a lack of efficacy data based on standardized testing protocols. Aim We compared the efficacy of multiple testing protocols against several “antimicrobial” film surfaces. Methods Four clinical isolates were used: one Escherichia coli, one Klebsiella pneumoniae, and two Staphylococcus aureus strains. Two industry methods (modified ISO 22196 and ASTM E2149), a “dried droplet”, and a “transfer” method were tested against two commercially available antimicrobial films, one film in development, an untreated control, and a positive (silver) control film. At 2 (only ISO) and 24 hours following inoculation, bacteria were collected from film surfaces and enumerated. Results Compared to untreated films in all protocols, there were no significant differences in recovery on either commercial brand at 2 or 24 hours after inoculation. The silver surface demonstrated significant microbicidal activity (mean loss 4.9 Log10 CFU/ml) in all methods and time points with the exception of 2 hours in the ISO protocol and the transfer method. Using our novel droplet method, no differences between placebo and active surfaces were detected. The surface in development demonstrated variable activity depending on method, organism, and time point. The ISO demonstrated minimal activity at 2 hours but significant activity at 24 hours (mean 4.5 Log10 CFU/ml difference versus placebo). The ASTEM protocol exhibited significant differences in recovery of staphylococci (mean 5 Log10 CFU/ml) but not Gram-negative isolates (10 fold decrease). Minimal activity was observed with this film in the transfer method. Conclusions Varying results between protocols suggested that efficacy of antimicrobial surfaces cannot be easily and reproducibly compared. Clinical use should be considered and further development of representative methods is needed. PMID:27494336
Van Gemert-Pijnen, Julia Ewc; Kelders, Saskia M; Bohlmeijer, Ernst T
2014-01-31
Web-based interventions for the early treatment of depressive symptoms can be considered effective in reducing mental complaints. However, there is a limited understanding of which elements in an intervention contribute to effectiveness. For efficiency and effectiveness of interventions, insight is needed into the use of content and persuasive features. The aims of this study were (1) to illustrate how log data can be used to understand the uptake of the content of a Web-based intervention that is based on the acceptance and commitment therapy (ACT) and (2) to discover how log data can be of value for improving the incorporation of content in Web-based interventions. Data from 206 participants (out of the 239) who started the first nine lessons of the Web-based intervention, Living to the Full, were used for a secondary analysis of a subset of the log data of the parent study about adherence to the intervention. The log files used in this study were per lesson: login, start mindfulness, download mindfulness, view success story, view feedback message, start multimedia, turn on text-message coach, turn off text-message coach, and view text message. Differences in usage between lessons were explored with repeated measures ANOVAs (analysis of variance). Differences between groups were explored with one-way ANOVAs. To explore the possible predictive value of the login per lesson quartiles on the outcome measures, four linear regressions were used with login quartiles as predictor and with the outcome measures (Center for Epidemiologic Studies-Depression [CES-D] and the Hospital Anxiety and Depression Scale-Anxiety [HADS-A] on post-intervention and follow-up) as dependent variables. A significant decrease in logins and in the use of content and persuasive features over time was observed. The usage of features varied significantly during the treatment process. The usage of persuasive features increased during the third part of the ACT (commitment to value-based living), which might indicate that at that stage motivational support was relevant. Higher logins over time (9 weeks) corresponded with a higher usage of features (in most cases significant); when predicting depressive symptoms at post-intervention, the linear regression yielded a significant model with login quartile as a significant predictor (explained variance is 2.7%). A better integration of content and persuasive features in the design of the intervention and a better intra-usability of features within the system are needed to identify which combination of features works best for whom. Pattern recognition can be used to tailor the intervention based on usage patterns from the earlier lessons and to support the uptake of content essential for therapy. An adaptable interface for a modular composition of therapy features supposes a dynamic approach for Web-based treatment; not a predefined path for all, but a flexible way to go through all features that have to be used.
2014-01-01
Background Web-based interventions for the early treatment of depressive symptoms can be considered effective in reducing mental complaints. However, there is a limited understanding of which elements in an intervention contribute to effectiveness. For efficiency and effectiveness of interventions, insight is needed into the use of content and persuasive features. Objective The aims of this study were (1) to illustrate how log data can be used to understand the uptake of the content of a Web-based intervention that is based on the acceptance and commitment therapy (ACT) and (2) to discover how log data can be of value for improving the incorporation of content in Web-based interventions. Methods Data from 206 participants (out of the 239) who started the first nine lessons of the Web-based intervention, Living to the Full, were used for a secondary analysis of a subset of the log data of the parent study about adherence to the intervention. The log files used in this study were per lesson: login, start mindfulness, download mindfulness, view success story, view feedback message, start multimedia, turn on text-message coach, turn off text-message coach, and view text message. Differences in usage between lessons were explored with repeated measures ANOVAs (analysis of variance). Differences between groups were explored with one-way ANOVAs. To explore the possible predictive value of the login per lesson quartiles on the outcome measures, four linear regressions were used with login quartiles as predictor and with the outcome measures (Center for Epidemiologic Studies—Depression [CES-D] and the Hospital Anxiety and Depression Scale—Anxiety [HADS-A] on post-intervention and follow-up) as dependent variables. Results A significant decrease in logins and in the use of content and persuasive features over time was observed. The usage of features varied significantly during the treatment process. The usage of persuasive features increased during the third part of the ACT (commitment to value-based living), which might indicate that at that stage motivational support was relevant. Higher logins over time (9 weeks) corresponded with a higher usage of features (in most cases significant); when predicting depressive symptoms at post-intervention, the linear regression yielded a significant model with login quartile as a significant predictor (explained variance is 2.7%). Conclusions A better integration of content and persuasive features in the design of the intervention and a better intra-usability of features within the system are needed to identify which combination of features works best for whom. Pattern recognition can be used to tailor the intervention based on usage patterns from the earlier lessons and to support the uptake of content essential for therapy. An adaptable interface for a modular composition of therapy features supposes a dynamic approach for Web-based treatment; not a predefined path for all, but a flexible way to go through all features that have to be used. PMID:24486914
Distillation with Sublogarithmic Overhead.
Hastings, Matthew B; Haah, Jeongwan
2018-02-02
It has been conjectured that, for any distillation protocol for magic states for the T gate, the number of noisy input magic states required per output magic state at output error rate ε is Ω[log(1/ε)]. We show that this conjecture is false. We find a family of quantum error correcting codes of parameters ⟦∑[under i=w+1][over m](m/i),∑[under i=0][over w](m/i),∑[under i=w+1][over r+1](r+1/i)⟧ for any integers m>2r, r>w≥0, by puncturing quantum Reed-Muller codes. When m>νr, our code admits a transversal logical gate at the νth level of Clifford hierarchy. In a distillation protocol for magic states at the level ν=3 (T gate), the ratio of input to output magic states is O(log^{γ}(1/ε)), where γ=log(n/k)/log(d)<0.678 for some m, r, w. The smallest code in our family for which γ<1 is on ≈2^{58} qubits.
Robust quantum data locking from phase modulation
NASA Astrophysics Data System (ADS)
Lupo, Cosmo; Wilde, Mark M.; Lloyd, Seth
2014-08-01
Quantum data locking is a uniquely quantum phenomenon that allows a relatively short key of constant size to (un)lock an arbitrarily long message encoded in a quantum state, in such a way that an eavesdropper who measures the state but does not know the key has essentially no information about the message. The application of quantum data locking in cryptography would allow one to overcome the limitations of the one-time pad encryption, which requires the key to have the same length as the message. However, it is known that the strength of quantum data locking is also its Achilles heel, as the leakage of a few bits of the key or the message may in principle allow the eavesdropper to unlock a disproportionate amount of information. In this paper we show that there exist quantum data locking schemes that can be made robust against information leakage by increasing the length of the key by a proportionate amount. This implies that a constant size key can still lock an arbitrarily long message as long as a fraction of it remains secret to the eavesdropper. Moreover, we greatly simplify the structure of the protocol by proving that phase modulation suffices to generate strong locking schemes, paving the way to optical experimental realizations. Also, we show that successful data locking protocols can be constructed using random code words, which very well could be helpful in discovering random codes for data locking over noisy quantum channels.
CERN alerter—RSS based system for information broadcast to all CERN offices
NASA Astrophysics Data System (ADS)
Otto, R.
2008-07-01
Nearly every large organization uses a tool to broadcast messages and information across the internal campus (messages like alerts announcing interruption in services or just information about upcoming events). These tools typically allow administrators (operators) to send 'targeted' messages which are sent only to specific groups of users or computers, e/g only those located in a specified building or connected to a particular computing service. CERN has a long history of such tools: CERNVMS's SPM_quotMESSAGE command, Zephyr [2] and the most recent the NICE Alerter based on the NNTP protocol. The NICE Alerter used on all Windows-based computers had to be phased out as a consequence of phasing out NNTP at CERN. The new solution to broadcast information messages on the CERN campus continues to provide the service based on cross-platform technologies, hence minimizing custom developments and relying on commercial software as much as possible. The new system, called CERN Alerter, is based on RSS (Really Simple Syndication) [9] for the transport protocol and uses Microsoft SharePoint as the backend for database and posting interface. The windows-based client relies on Internet Explorer 7.0 with custom code to trigger the window pop-ups and the notifications for new events. Linux and Mac OS X clients could also rely on any RSS readers to subscribe to targeted notifications. The paper covers the architecture and implementation aspects of the new system.
Graham, Amanda L; Jacobs, Megan A; Cohn, Amy M; Cha, Sarah; Abroms, Lorien C; Papandonatos, George D; Whittaker, Robyn
2016-03-30
Millions of smokers use the Internet for smoking cessation assistance each year; however, most smokers engage minimally with even the best designed websites. The ubiquity of mobile devices and their effectiveness in promoting adherence in other areas of health behaviour change make them a promising tool to address adherence in Internet smoking cessation interventions. Text messaging is used by most adults, and messages can proactively encourage use of a web-based intervention. Text messaging can also be integrated with an Internet intervention to facilitate the use of core Internet intervention components. We identified four aspects of a text message intervention that may enhance its effectiveness in promoting adherence to a web-based smoking cessation programme: personalisation, integration, dynamic tailoring and message intensity. Phase I will use a two-level full factorial design to test the impact of these four experimental features on adherence to a web-based intervention. The primary outcome is a composite metric of adherence that incorporates general utilisation metrics (eg, logins, page views) and specific feature utilisation shown to predict abstinence. Participants will be N=860 adult smokers who register on an established Internet cessation programme and enrol in its text message programme. Phase II will be a two-arm randomised trial to compare the efficacy of the web-based cessation programme alone and in conjunction with the optimised text messaging intervention on 30-day point prevalence abstinence at 9 months. Phase II participants will be N=600 adult smokers who register to use an established Internet cessation programme and enrol in text messaging. Secondary analyses will explore whether adherence mediates the effect of treatment condition on outcome. This protocol was approved by Chesapeake IRB. We will disseminate study results through peer-reviewed manuscripts and conference presentations related to the methods and design, outcomes and exploratory analyses. NCT02585206. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/
NASA Astrophysics Data System (ADS)
Laban, Shaban; El-Desouky, Aly
2014-05-01
To achieve a rapid, simple and reliable parallel processing of different types of tasks and big data processing on any compute cluster, a lightweight messaging-based distributed applications processing and workflow execution framework model is proposed. The framework is based on Apache ActiveMQ and Simple (or Streaming) Text Oriented Message Protocol (STOMP). ActiveMQ , a popular and powerful open source persistence messaging and integration patterns server with scheduler capabilities, acts as a message broker in the framework. STOMP provides an interoperable wire format that allows framework programs to talk and interact between each other and ActiveMQ easily. In order to efficiently use the message broker a unified message and topic naming pattern is utilized to achieve the required operation. Only three Python programs and simple library, used to unify and simplify the implementation of activeMQ and STOMP protocol, are needed to use the framework. A watchdog program is used to monitor, remove, add, start and stop any machine and/or its different tasks when necessary. For every machine a dedicated one and only one zoo keeper program is used to start different functions or tasks, stompShell program, needed for executing the user required workflow. The stompShell instances are used to execute any workflow jobs based on received message. A well-defined, simple and flexible message structure, based on JavaScript Object Notation (JSON), is used to build any complex workflow systems. Also, JSON format is used in configuration, communication between machines and programs. The framework is platform independent. Although, the framework is built using Python the actual workflow programs or jobs can be implemented by any programming language. The generic framework can be used in small national data centres for processing seismological and radionuclide data received from the International Data Centre (IDC) of the Preparatory Commission for the Comprehensive Nuclear-Test-Ban Treaty Organization (CTBTO). Also, it is possible to extend the use of the framework in monitoring the IDC pipeline. The detailed design, implementation,conclusion and future work of the proposed framework will be presented.
Overview of AMS (CCSDS Asynchronous Message Service)
NASA Technical Reports Server (NTRS)
Burleigh, Scott
2006-01-01
This viewgraph presentation gives an overview of the Consultative Committee for Space Data Systems (CCSDS) Asynchronous Message Service (AMS). The topics include: 1) Key Features; 2) A single AMS continuum; 3) The AMS Protocol Suite; 4) A multi-continuum venture; 5) Constraining transmissions; 6) Security; 7) Fault Tolerance; 8) Performance of Reference Implementation; 9) AMS vs Multicast (1); 10) AMS vs Multicast (2); 11) RAMS testing exercise; and 12) Results.
Automatic Traffic-Based Internet Control Message Protocol (ICMP) Model Generation for ns-3
2015-12-01
through visiting the inferred automata o Fuzzing of an implementation by generating altered message formats We tested with 3 versions of Netzob. First...relationships. Afterwards, we used the Automata module to generate state machines using different functions: “generateChainedStateAutomata...The “generatePTAAutomata” takes as input several communication sessions and then identifies common paths and merges these into a single automata . The
Ada (Trademark) Case Studies II.
1984-01-01
number ( CSN ) in that character set’s "transmission identifier". The array is named START CSN , but a better name would be STARTOFCSN. The word of...protocols), CSN (Channel Sequence Number), EON (End of Message), LMF (Line Media Format), MCB (Message Control Block), RI (Routing Indicator), and TI...component names should end with -PART, - FIELD , or COMPONENT.El - Package names should end with PACKAGE. - Enumeration literals should have suffixes
Supporting Beacon and Event-Driven Messages in Vehicular Platoons through Token-Based Strategies
Uhlemann, Elisabeth
2018-01-01
Timely and reliable inter-vehicle communications is a critical requirement to support traffic safety applications, such as vehicle platooning. Furthermore, low-delay communications allow the platoon to react quickly to unexpected events. In this scope, having a predictable and highly effective medium access control (MAC) method is of utmost importance. However, the currently available IEEE 802.11p technology is unable to adequately address these challenges. In this paper, we propose a MAC method especially adapted to platoons, able to transmit beacons within the required time constraints, but with a higher reliability level than IEEE 802.11p, while concurrently enabling efficient dissemination of event-driven messages. The protocol circulates the token within the platoon not in a round-robin fashion, but based on beacon data age, i.e., the time that has passed since the previous collection of status information, thereby automatically offering repeated beacon transmission opportunities for increased reliability. In addition, we propose three different methods for supporting event-driven messages co-existing with beacons. Analysis and simulation results in single and multi-hop scenarios showed that, by providing non-competitive channel access and frequent retransmission opportunities, our protocol can offer beacon delivery within one beacon generation interval while fulfilling the requirements on low-delay dissemination of event-driven messages for traffic safety applications. PMID:29570676
Supporting Beacon and Event-Driven Messages in Vehicular Platoons through Token-Based Strategies.
Balador, Ali; Uhlemann, Elisabeth; Calafate, Carlos T; Cano, Juan-Carlos
2018-03-23
Timely and reliable inter-vehicle communications is a critical requirement to support traffic safety applications, such as vehicle platooning. Furthermore, low-delay communications allow the platoon to react quickly to unexpected events. In this scope, having a predictable and highly effective medium access control (MAC) method is of utmost importance. However, the currently available IEEE 802.11p technology is unable to adequately address these challenges. In this paper, we propose a MAC method especially adapted to platoons, able to transmit beacons within the required time constraints, but with a higher reliability level than IEEE 802.11p, while concurrently enabling efficient dissemination of event-driven messages. The protocol circulates the token within the platoon not in a round-robin fashion, but based on beacon data age, i.e., the time that has passed since the previous collection of status information, thereby automatically offering repeated beacon transmission opportunities for increased reliability. In addition, we propose three different methods for supporting event-driven messages co-existing with beacons. Analysis and simulation results in single and multi-hop scenarios showed that, by providing non-competitive channel access and frequent retransmission opportunities, our protocol can offer beacon delivery within one beacon generation interval while fulfilling the requirements on low-delay dissemination of event-driven messages for traffic safety applications.
Time Warp Operating System (TWOS)
NASA Technical Reports Server (NTRS)
Bellenot, Steven F.
1993-01-01
Designed to support parallel discrete-event simulation, TWOS is complete implementation of Time Warp mechanism - distributed protocol for virtual time synchronization based on process rollback and message annihilation.
Um, Ki Sung; Kwak, Yun Sik; Cho, Hune; Kim, Il Kon
2005-11-01
A basic assumption of Health Level Seven (HL7) protocol is 'No limitation of message length'. However, most existing commercial HL7 interface engines do limit message length because they use the string array method, which is run in the main memory for the HL7 message parsing process. Specifically, messages with image and multi-media data create a long string array and thus cause the computer system to raise critical and fatal problem. Consequently, HL7 messages cannot handle the image and multi-media data necessary in modern medical records. This study aims to solve this problem with the 'streaming algorithm' method. This new method for HL7 message parsing applies the character-stream object which process character by character between the main memory and hard disk device with the consequence that the processing load on main memory could be alleviated. The main functions of this new engine are generating, parsing, validating, browsing, sending, and receiving HL7 messages. Also, the engine can parse and generate XML-formatted HL7 messages. This new HL7 engine successfully exchanged HL7 messages with 10 megabyte size images and discharge summary information between two university hospitals.
Gallandat, Karin; Daniels, Kyle; Desmarais, Anne Marie; Scheinman, Pamela; Lantagne, Daniele
2017-01-01
To prevent Ebola transmission, frequent handwashing is recommended in Ebola Treatment Units and communities. However, little is known about which handwashing protocol is most efficacious. We evaluated six handwashing protocols (soap and water, alcohol-based hand sanitizer (ABHS), and 0.05% sodium dichloroisocyanurate, high-test hypochlorite, and stabilized and non-stabilized sodium hypochlorite solutions) for 1) efficacy of handwashing on the removal and inactivation of non-pathogenic model organisms and, 2) persistence of organisms in rinse water. Model organisms E. coli and bacteriophage Phi6 were used to evaluate handwashing with and without organic load added to simulate bodily fluids. Hands were inoculated with test organisms, washed, and rinsed using a glove juice method to retrieve remaining organisms. Impact was estimated by comparing the log reduction in organisms after handwashing to the log reduction without handwashing. Rinse water was collected to test for persistence of organisms. Handwashing resulted in a 1.94–3.01 log reduction in E. coli concentration without, and 2.18–3.34 with, soil load; and a 2.44–3.06 log reduction in Phi6 without, and 2.71–3.69 with, soil load. HTH performed most consistently well, with significantly greater log reductions than other handwashing protocols in three models. However, the magnitude of handwashing efficacy differences was small, suggesting protocols are similarly efficacious. Rinse water demonstrated a 0.28–4.77 log reduction in remaining E. coli without, and 0.21–4.49 with, soil load and a 1.26–2.02 log reduction in Phi6 without, and 1.30–2.20 with, soil load. Chlorine resulted in significantly less persistence of E. coli in both conditions and Phi6 without soil load in rinse water (p<0.001). Thus, chlorine-based methods may offer a benefit of reducing persistence in rinse water. We recommend responders use the most practical handwashing method to ensure hand hygiene in Ebola contexts, considering the potential benefit of chlorine-based methods in rinse water persistence. PMID:28231311
Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks
2017-01-01
Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle’s safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given. PMID:29231882
Collocated Dataglyphs for large-message storage and retrieval
NASA Astrophysics Data System (ADS)
Motwani, Rakhi C.; Breidenbach, Jeff A.; Black, John R.
2004-06-01
In contrast to the security and integrity of electronic files, printed documents are vulnerable to damage and forgery due to their physical nature. Researchers at Palo Alto Research Center utilize DataGlyph technology to render digital characteristics to printed documents, which provides them with the facility of tamper-proof authentication and damage resistance. This DataGlyph document is known as GlyphSeal. Limited DataGlyph carrying capacity per printed page restricted the application of this technology to a domain of graphically simple and small-sized single-paged documents. In this paper the authors design a protocol motivated by techniques from the networking domain and back-up strategies, which extends the GlyphSeal technology to larger-sized, graphically complex, multi-page documents. This protocol provides fragmentation, sequencing and data loss recovery. The Collocated DataGlyph Protocol renders large glyph messages onto multiple printed pages and recovers the glyph data from rescanned versions of the multi-page documents, even when pages are missing, reordered or damaged. The novelty of this protocol is the application of ideas from RAID to the domain of DataGlyphs. The current revision of this protocol is capable of generating at most 255 pages, if page recovery is desired and does not provide enough data density to store highly detailed images in a reasonable amount of page space.
Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks.
Song, Caixia
2017-12-12
Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle's safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given.
Implementation and Evaluation of Four Interoperable Open Standards for the Internet of Things.
Jazayeri, Mohammad Ali; Liang, Steve H L; Huang, Chih-Yuan
2015-09-22
Recently, researchers are focusing on a new use of the Internet called the Internet of Things (IoT), in which enabled electronic devices can be remotely accessed over the Internet. As the realization of IoT concept is still in its early stages, manufacturers of Internet-connected devices and IoT web service providers are defining their proprietary protocols based on their targeted applications. Consequently, IoT becomes heterogeneous in terms of hardware capabilities and communication protocols. Addressing these heterogeneities by following open standards is a necessary step to communicate with various IoT devices. In this research, we assess the feasibility of applying existing open standards on resource-constrained IoT devices. The standard protocols developed in this research are OGC PUCK over Bluetooth, TinySOS, SOS over CoAP, and OGC SensorThings API. We believe that by hosting open standard protocols on IoT devices, not only do the devices become self-describable, self-contained, and interoperable, but innovative applications can also be easily developed with standardized interfaces. In addition, we use memory consumption, request message size, response message size, and response latency to benchmark the efficiency of the implemented protocols. In all, this research presents and evaluates standard-based solutions to better understand the feasibility of applying existing standards to the IoT vision.
Design and Implementation of BDS RTCM SSR Message
NASA Astrophysics Data System (ADS)
Xiao, Xia; Cheng, Fang; Liu, Feng; Lu, XiaoChun
2017-09-01
Based on the real-time differential positioning system of Beidou wide area, a set of Beidou high-precision differential information transmission protocol is studied and designed. After the system generates satellite precise orbit and clock difference products, it needs to be sent to the users in a certain data format through C band GEO communication satellite. The transport protocol should be designed according to the data volume and update rate of the system. At the same time, it is necessary to combine the signal system, satellite resources and the restriction and restriction of the receiver implementation technology. It refers to the relevant fields and international similar systems of technology and standards to design. This paper establishes a set of technical indicators which can measure the pros and cons of differential message organization and broadcasting strategy. Through modeling, simulation and actual test, this paper makes a comprehensive comparison of different strategies. Finally, a transmission protocol design scheme which has good performance and meets the system service requirements is presented.
A Mechanism for Reliable Mobility Management for Internet of Things Using CoAP
Chun, Seung-Man; Park, Jong-Tae
2017-01-01
Under unreliable constrained wireless networks for Internet of Things (IoT) environments, the loss of the signaling message may frequently occur. Mobile Internet Protocol version 6 (MIPv6) and its variants do not consider this situation. Consequently, as a constrained device moves around different wireless networks, its Internet Protocol (IP) connectivity may be frequently disrupted and power can be drained rapidly. This can result in the loss of important sensing data or a large delay for time-critical IoT services such as healthcare monitoring and disaster management. This paper presents a reliable mobility management mechanism in Internet of Things environments with lossy low-power constrained device and network characteristics. The idea is to use the Internet Engineering Task Force (IETF) Constrained Application Protocol (CoAP) retransmission mechanism to achieve both reliability and simplicity for reliable IoT mobility management. Detailed architecture, algorithms, and message extensions for reliable mobility management are presented. Finally, performance is evaluated using both mathematical analysis and simulation. PMID:28085109
A Mechanism for Reliable Mobility Management for Internet of Things Using CoAP.
Chun, Seung-Man; Park, Jong-Tae
2017-01-12
Under unreliable constrained wireless networks for Internet of Things (IoT) environments, the loss of the signaling message may frequently occur. Mobile Internet Protocol version 6 (MIPv6) and its variants do not consider this situation. Consequently, as a constrained device moves around different wireless networks, its Internet Protocol (IP) connectivity may be frequently disrupted and power can be drained rapidly. This can result in the loss of important sensing data or a large delay for time-critical IoT services such as healthcare monitoring and disaster management. This paper presents a reliable mobility management mechanism in Internet of Things environments with lossy low-power constrained device and network characteristics. The idea is to use the Internet Engineering Task Force (IETF) Constrained Application Protocol (CoAP) retransmission mechanism to achieve both reliability and simplicity for reliable IoT mobility management. Detailed architecture, algorithms, and message extensions for reliable mobility management are presented. Finally, performance is evaluated using both mathematical analysis and simulation.
NCC Simulation Model: Simulating the operations of the network control center, phase 2
NASA Technical Reports Server (NTRS)
Benjamin, Norman M.; Paul, Arthur S.; Gill, Tepper L.
1992-01-01
The simulation of the network control center (NCC) is in the second phase of development. This phase seeks to further develop the work performed in phase one. Phase one concentrated on the computer systems and interconnecting network. The focus of phase two will be the implementation of the network message dialogues and the resources controlled by the NCC. These resources are requested, initiated, monitored and analyzed via network messages. In the NCC network messages are presented in the form of packets that are routed across the network. These packets are generated, encoded, decoded and processed by the network host processors that generate and service the message traffic on the network that connects these hosts. As a result, the message traffic is used to characterize the work done by the NCC and the connected network. Phase one of the model development represented the NCC as a network of bi-directional single server queues and message generating sources. The generators represented the external segment processors. The served based queues represented the host processors. The NCC model consists of the internal and external processors which generate message traffic on the network that links these hosts. To fully realize the objective of phase two it is necessary to identify and model the processes in each internal processor. These processes live in the operating system of the internal host computers and handle tasks such as high speed message exchanging, ISN and NFE interface, event monitoring, network monitoring, and message logging. Inter process communication is achieved through the operating system facilities. The overall performance of the host is determined by its ability to service messages generated by both internal and external processors.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Doucet, Mathieu; Hobson, Tanner C.; Ferraz Leal, Ricardo Miguel
The Django Remote Submission (DRS) is a Django (Django, n.d.) application to manage long running job submission, including starting the job, saving logs, and storing results. It is an independent project available as a standalone pypi package (PyPi, n.d.). It can be easily integrated in any Django project. The source code is freely available as a GitHub repository (django-remote-submission, n.d.). To run the jobs in background, DRS takes advantage of Celery (Celery, n.d.), a powerful asynchronous job queue used for running tasks in the background, and the Redis Server (Redis, n.d.), an in-memory data structure store. Celery uses brokers tomore » pass messages between a Django Project and the Celery workers. Redis is the message broker of DRS. In addition DRS provides real time monitoring of the progress of Jobs and associated logs. Through the Django Channels project (Channels, n.d.), and the usage of Web Sockets, it is possible to asynchronously display the Job Status and the live Job output (standard output and standard error) on a web page.« less
Doucet, Mathieu; Hobson, Tanner C.; Ferraz Leal, Ricardo Miguel
2017-08-01
The Django Remote Submission (DRS) is a Django (Django, n.d.) application to manage long running job submission, including starting the job, saving logs, and storing results. It is an independent project available as a standalone pypi package (PyPi, n.d.). It can be easily integrated in any Django project. The source code is freely available as a GitHub repository (django-remote-submission, n.d.). To run the jobs in background, DRS takes advantage of Celery (Celery, n.d.), a powerful asynchronous job queue used for running tasks in the background, and the Redis Server (Redis, n.d.), an in-memory data structure store. Celery uses brokers tomore » pass messages between a Django Project and the Celery workers. Redis is the message broker of DRS. In addition DRS provides real time monitoring of the progress of Jobs and associated logs. Through the Django Channels project (Channels, n.d.), and the usage of Web Sockets, it is possible to asynchronously display the Job Status and the live Job output (standard output and standard error) on a web page.« less
Galaviz-Mosqueda, Alejandro; Villarreal-Reyes, Salvador; Galeana-Zapién, Hiram; Rubio-Loyola, Javier; Covarrubias-Rosales, David H.
2014-01-01
Vehicular ad hoc networks (VANETs) have been identified as a key technology to enable intelligent transport systems (ITS), which are aimed to radically improve the safety, comfort, and greenness of the vehicles in the road. However, in order to fully exploit VANETs potential, several issues must be addressed. Because of the high dynamic of VANETs and the impairments in the wireless channel, one key issue arising when working with VANETs is the multihop dissemination of broadcast packets for safety and infotainment applications. In this paper a reliable low-overhead multihop broadcast (RLMB) protocol is proposed to address the well-known broadcast storm problem. The proposed RLMB takes advantage of the hello messages exchanged between the vehicles and it processes such information to intelligently select a relay set and reduce the redundant broadcast. Additionally, to reduce the hello messages rate dependency, RLMB uses a point-to-zone link evaluation approach. RLMB performance is compared with one of the leading multihop broadcast protocols existing to date. Performance metrics show that our RLMB solution outperforms the leading protocol in terms of important metrics such as packet dissemination ratio, overhead, and delay. PMID:25133224
ACR/NEMA Digital Image Interface Standard (An Illustrated Protocol Overview)
NASA Astrophysics Data System (ADS)
Lawrence, G. Robert
1985-09-01
The American College of Radiologists (ACR) and the National Electrical Manufacturers Association (NEMA) have sponsored a joint standards committee mandated to develop a universal interface standard for the transfer of radiology images among a variety of PACS imaging devicesl. The resulting standard interface conforms to the ISO/OSI standard reference model for network protocol layering. The standard interface specifies the lower layers of the reference model (Physical, Data Link, Transport and Session) and implies a requirement of the Network Layer should a requirement for a network exist. The message content has been considered and a flexible message and image format specified. The following Imaging Equipment modalities are supported by the standard interface... CT Computed Tomograpy DS Digital Subtraction NM Nuclear Medicine US Ultrasound MR Magnetic Resonance DR Digital Radiology The following data types are standardized over the transmission interface media.... IMAGE DATA DIGITIZED VOICE HEADER DATA RAW DATA TEXT REPORTS GRAPHICS OTHERS This paper consists of text supporting the illustrated protocol data flow. Each layer will be individually treated. Particular emphasis will be given to the Data Link layer (Frames) and the Transport layer (Packets). The discussion utilizes a finite state sequential machine model for the protocol layers.
47 CFR 54.503 - Other supported special services.
Code of Federal Regulations, 2010 CFR
2010-10-01
... telecommunications carriers include voice mail, interconnected voice over Internet protocol (VoIP), text messaging, Internet access, and installation and maintenance of internal connections in addition to all reasonable...
Incorporating Brokers within Collaboration Environments
NASA Astrophysics Data System (ADS)
Rajasekar, A.; Moore, R.; de Torcy, A.
2013-12-01
A collaboration environment, such as the integrated Rule Oriented Data System (iRODS - http://irods.diceresearch.org), provides interoperability mechanisms for accessing storage systems, authentication systems, messaging systems, information catalogs, networks, and policy engines from a wide variety of clients. The interoperability mechanisms function as brokers, translating actions requested by clients to the protocol required by a specific technology. The iRODS data grid is used to enable collaborative research within hydrology, seismology, earth science, climate, oceanography, plant biology, astronomy, physics, and genomics disciplines. Although each domain has unique resources, data formats, semantics, and protocols, the iRODS system provides a generic framework that is capable of managing collaborative research initiatives that span multiple disciplines. Each interoperability mechanism (broker) is linked to a name space that enables unified access across the heterogeneous systems. The collaboration environment provides not only support for brokers, but also support for virtualization of name spaces for users, files, collections, storage systems, metadata, and policies. The broker enables access to data or information in a remote system using the appropriate protocol, while the collaboration environment provides a uniform naming convention for accessing and manipulating each object. Within the NSF DataNet Federation Consortium project (http://www.datafed.org), three basic types of interoperability mechanisms have been identified and applied: 1) drivers for managing manipulation at the remote resource (such as data subsetting), 2) micro-services that execute the protocol required by the remote resource, and 3) policies for controlling the execution. For example, drivers have been written for manipulating NetCDF and HDF formatted files within THREDDS servers. Micro-services have been written that manage interactions with the CUAHSI data repository, the DataONE information catalog, and the GeoBrain broker. Policies have been written that manage transfer of messages between an iRODS message queue and the Advanced Message Queuing Protocol. Examples of these brokering mechanisms will be presented. The DFC collaboration environment serves as the intermediary between community resources and compute grids, enabling reproducible data-driven research. It is possible to create an analysis workflow that retrieves data subsets from a remote server, assemble the required input files, automate the execution of the workflow, automatically track the provenance of the workflow, and share the input files, workflow, and output files. A collaborator can re-execute a shared workflow, compare results, change input files, and re-execute an analysis.
Secure HL7 transactions using Internet mail (Internet draft).
Schadow, Gunther; Tucker, Mark; Rishel, Wes
2002-01-01
The document describes the applicability of the Internet standardisation efforts on secure electronic data interchange (EDI) transactions for Health Level-7 (HL7), an EDI standard for Healthcare used world-wide. The document heavily relies on the work in progress by the IETF EDIINT working group. It is in most parts a restatement of the EDIINTs requirements document and application statement 1 (AS#1) tailored to the needs of the HL7 audience. The authors tried to make the document as self consistent as possible. The goal is to give to the reader who is not a security or Internet standards expert enough foundational and detail information to enable him to build communication software that complies to the Internet standards. Even though the authors rely on and promote the respective Internet standards and drafts, they did not withstand from commenting on and criticising the work where they see upcoming problems in use with HL7 or other EDI protocols that have not been in the initial focus of the EDIINT working group. The authors make suggestions to add parameters to the specification of the MIME type for EDI messages in RFC 1767 in order to enhance functionality. The authors give use cases for a larger subset of disposition types and modifiers of message disposition notifications. One key issue where the document goes beyond the current EDIINT drafts is the concept of non-repudiation of commitment to an EDI transaction. Secure EDI transactions should be regarded as "distributed contracts," i.e. not only the sending and receiving of single messages should be non-refutable but also the connection between messages interchanges. In anticipation of this requirement HL7 usually requires a response message to be sent to acknowledge every transaction. The authors therefore have the requirement to securely couple an EDI response message to its request message. Given the current shape of RFC 1767 this is generally possible only if a response message is coupled with an MDN receipt and the combination of both signed by the responder. The document describes a protocol to bundle MDN and response that uses the MIME multi-part/related content type in RFC 2112.
Baseman, Janet; Revere, Debra; Painter, Ian; Oberle, Mark; Duchin, Jeffrey; Thiede, Hanne; Nett, Randall; MacEachern, Dorothy; Stergachis, Andy
2016-02-01
Health care providers play an essential role in public health emergency preparedness and response. We conducted a 4-year randomized controlled trial to systematically compare the effectiveness of traditional and mobile communication strategies for sending time-sensitive public health messages to providers. Subjects (N=848) included providers who might be leveraged to assist with emergency preparedness and response activities, such as physicians, pharmacists, nurse practitioners, physician's assistants, and veterinarians. Providers were randomly assigned to a group that received time-sensitive quarterly messages via e-mail, fax, or cell phone text messaging (SMS) or to a no-message control group. Follow-up phone interviews elicited information about message receipt, topic recall, and perceived credibility and trustworthiness of message and source. Our main outcome measures were awareness and recall of message content, which was compared across delivery methods. Per-protocol analysis revealed that e-mail messages were recalled at a higher rate than were messaged delivered by fax or SMS, whereas the as-treated analysis found that e-mail and fax groups had similar recall rates and both had higher recall rates than the SMS group. This is the first study to systematically evaluate the relative effectiveness of public health message delivery systems. Our findings provide guidance to improve public health agency communications with providers before, during, and after a public health emergency.
Novel methods to estimate antiretroviral adherence: protocol for a longitudinal study.
Saberi, Parya; Ming, Kristin; Legnitto, Dominique; Neilands, Torsten B; Gandhi, Monica; Johnson, Mallory O
2018-01-01
There is currently no gold standard for assessing antiretroviral (ARV) adherence, so researchers often resort to the most feasible and cost-effective methods possible (eg, self-report), which may be biased or inaccurate. The goal of our study was to evaluate the feasibility and acceptability of innovative and remote methods to estimate ARV adherence, which can potentially be conducted with less time and financial resources in a wide range of clinic and research settings. Here, we describe the research protocol for studying these novel methods and some lessons learned. The 6-month pilot study aimed to examine the feasibility and acceptability of a remotely conducted study to evaluate the correlation between: 1) text-messaged photographs of pharmacy refill dates for refill-based adherence; 2) text-messaged photographs of pills for pill count-based adherence; and 3) home-collected hair sample measures of ARV concentration for pharmacologic-based adherence. Participants were sent monthly automated text messages to collect refill dates and pill counts that were taken and sent via mobile telephone photographs, and hair collection kits every 2 months by mail. At the study end, feasibility was calculated by specific metrics, such as the receipt of hair samples and responses to text messages. Participants completed a quantitative survey and qualitative exit interviews to examine the acceptability of these adherence evaluation methods. The relationship between the 3 novel metrics of adherence and self-reported adherence will be assessed. Investigators conducting adherence research are often limited to using either self-reported adherence, which is subjective, biased, and often overestimated, or other more complex methods. Here, we describe the protocol for evaluating the feasibility and acceptability of 3 novel and remote methods of estimating adherence, with the aim of evaluating the relationships between them. Additionally, we note the lessons learned from the protocol implementation to date. We expect that these novel measures will be feasible and acceptable. The implications of this research will be the identification and evaluation of innovative and accurate metrics of ARV adherence for future implementation.
Novel methods to estimate antiretroviral adherence: protocol for a longitudinal study
Saberi, Parya; Ming, Kristin; Legnitto, Dominique; Neilands, Torsten B; Gandhi, Monica; Johnson, Mallory O
2018-01-01
Background There is currently no gold standard for assessing antiretroviral (ARV) adherence, so researchers often resort to the most feasible and cost-effective methods possible (eg, self-report), which may be biased or inaccurate. The goal of our study was to evaluate the feasibility and acceptability of innovative and remote methods to estimate ARV adherence, which can potentially be conducted with less time and financial resources in a wide range of clinic and research settings. Here, we describe the research protocol for studying these novel methods and some lessons learned. Methods The 6-month pilot study aimed to examine the feasibility and acceptability of a remotely conducted study to evaluate the correlation between: 1) text-messaged photographs of pharmacy refill dates for refill-based adherence; 2) text-messaged photographs of pills for pill count-based adherence; and 3) home-collected hair sample measures of ARV concentration for pharmacologic-based adherence. Participants were sent monthly automated text messages to collect refill dates and pill counts that were taken and sent via mobile telephone photographs, and hair collection kits every 2 months by mail. At the study end, feasibility was calculated by specific metrics, such as the receipt of hair samples and responses to text messages. Participants completed a quantitative survey and qualitative exit interviews to examine the acceptability of these adherence evaluation methods. The relationship between the 3 novel metrics of adherence and self-reported adherence will be assessed. Discussion Investigators conducting adherence research are often limited to using either self-reported adherence, which is subjective, biased, and often overestimated, or other more complex methods. Here, we describe the protocol for evaluating the feasibility and acceptability of 3 novel and remote methods of estimating adherence, with the aim of evaluating the relationships between them. Additionally, we note the lessons learned from the protocol implementation to date. We expect that these novel measures will be feasible and acceptable. The implications of this research will be the identification and evaluation of innovative and accurate metrics of ARV adherence for future implementation. PMID:29950816
Limitations on Design Principles for Public Key Protocols
1996-01-01
preserves nonrepudiation|assuming, as in the last example, that signatures are added to each message. Note that for all the messages save one, the...digital money must be put up against any bid in their auction, the attack requires the active partic- ipation of a bank. Second, since they protect...ACM Press, New York, November 1993. [5] R. Bird, I. Gopal, A. Herzberg , P. Janson, S. Kut- ten, R. Molva, and M. Yung. Systematic Design of a Family
Controller-Independent Bidirectional Direct Communication with Four-Qubit Cluster States
NASA Astrophysics Data System (ADS)
Cao, Yong; Zha, Xin-Wei; Wang, Shu-Kai
2018-03-01
We propose a feasible scheme for implementing bidirectional quantum direct communication protocol using four-qubit cluster states. In this scheme, the quantum channel between the sender Alice and the receiver Bob consists of an ordered sequence of cluster states which are prepared by Alice. After ensuring the security of quantum channel, according to the secret messages, the sender will perform the unitary operation and the receiver can obtain different secret messages in a deterministic way.
Testing Dialog-Verification of SIP Phones with Single-Message Denial-of-Service Attacks
NASA Astrophysics Data System (ADS)
Seedorf, Jan; Beckers, Kristian; Huici, Felipe
The Session Initiation Protocol (SIP) is widely used for signaling in multimedia communications. However, many SIP implementations are still in their infancy and vulnerable to malicious messages. We investigate flaws in the SIP implementations of eight phones, showing that the deficient verification of SIP dialogs further aggravates the problem by making it easier for attacks to succeed. Our results show that the majority of the phones we tested are susceptible to these attacks.
Texting Adolescents in Repeat DKA and Their Caregivers.
Wagner, David V; Barry, Samantha; Teplitsky, Lena; Sheffield, Annan; Stoeckel, Maggie; Ogden, Jimmie D; Karkula, Elizabeth; Hartman, Alexandra; Duke, Danny C; Spiro, Kim; Harris, Michael A
2016-07-01
Text message interventions are feasible, preferable, and sometimes effective for youth with diabetes. However, few, if any studies, have examined the personalized use of text messages with youth repeatedly hospitalized for diabetic ketoacidosis (DKA) and their caregivers. This study characterizes the use of personalized text messages in Novel Interventions in Children's Healthcare (NICH). Approximately 2 months of text messages sent to youth with repeat DKA and their caregivers were logged regarding the following text characteristics: (1) content, (2) intervention type, (3) timing, and (4) recipient characteristics. NICH interventionists sent 2.3 and 1.5 texts per day to patients and caregivers, respectively. Approximately 59% of outgoing texts occurred outside of typical business hours, and roughly 68% of texts contained some form of support and/or encouragement. The relation between type of intended intervention and day/time of text was significant, χ(2)(2, N = 5,808) = 266.93, P < .001. Interventionists were more likely to send behavioral intervention text messages outside of business hours, whereas they were more likely to send care coordination and case management text messages during business hours. To our knowledge, this is the first study to specifically categorize and describe the personalized use of text messages with youth repeatedly hospitalized for DKA and their caregivers. Findings indicate that a promising treatment program for these youth frequently used text interventions to deliver praise and encouragement to patients and caregivers alike, often outside of typical business hours, and tailored text content based on patient and caregiver characteristics. © 2016 Diabetes Technology Society.
Quantum CSMA/CD Synchronous Communication Protocol with Entanglement
NASA Astrophysics Data System (ADS)
Zhou, Nanrun; Zeng, Binyang; Gong, Lihua
By utilizing the characteristics of quantum entanglement, a quantum synchronous communication protocol for Carrier Sense Multiple Access with Collision Detection (CSMA/CD) is presented. The proposed protocol divides the link into the busy time and leisure one, where the data frames are sent via classical channels and the distribution of quantum entanglement is supposed to be completed at leisure time and the quantum acknowledge frames are sent via quantum entanglement channels. The time span between two successfully delivered messages can be significantly reduced in this proposed protocol. It is shown that the performance of the CSMA/CD protocol can be improved significantly since the collision can be reduced to a certain extent. The proposed protocol has great significance in quantum communication.
Comment on 'Quantum direct communication with authentication'
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhang, Zhan-jun; Key Laboratory of Optoelectronic Information Acquisition and Manipulation of Ministry of Education of China, School of Physics and Material Science, Anhui University, Hefei 230039; Liu, Jun
2007-02-15
Two protocols of quantum direct communication with authentication [Phys. Rev. A 73, 042305 (2006)] were recently proposed by Lee, Lim, and Yang. In this paper we will show that in the two protocols the authenticator Trent should be prevented from knowing the secret message. The first protocol can be eavesdropped on by Trent using the intercept-measure-resend attack, while the second protocol can be eavesdropped on by Trent using a simple single-qubit measurement. To fix these leaks, we revise the original versions of the protocols by using the Pauli Z operation {sigma}{sub z} instead of the original bit-flip operation X. Asmore » a consequence, the attacks we present can be prevented and accordingly the protocol securities are improved.« less
Christopoulos, Katerina A; Riley, Elise D; Carrico, Adam W; Tulsky, Jacqueline; Moskowitz, Judith T; Dilworth, Samantha; Coffin, Lara S; Wilson, Leslie; Peretz, Jason Johnson; Hilton, Joan F
2018-02-21
Text messaging is a promising strategy to support HIV care engagement, but little is known about its efficacy in urban safety-net HIV clinic populations. We conducted a randomized controlled trial of a supportive and motivational text messaging intervention, Connect4Care (C4C), among viremic patients who had a history of poor retention or were new to clinic. Participants were randomized (stratified by new HIV diagnosis status) to receive one of the following for 12 months: 1) thrice-weekly intervention messages, plus texted primary care appointment reminders and a monthly text message requesting confirmation of study participation, or; 2) texted reminders and monthly messages alone. Viral load was assessed at 6 and 12 months. The primary outcome was virologic suppression (<200 copies/mL) at 12 months, estimated via repeated measures log-binomial regression, adjusted for new diagnosis status. The secondary outcome was retention in clinic care. Between August 2013-November 2015, 230 participants were randomized. Virologic suppression at 12 months was similar between intervention and control participants (48.8% vs. 45.8%), with negligible change from 6-month estimates, yielding RR 1.07 (95% CI: 0.82, 1.39). Suppression was higher in the newly diagnosed (78.3% vs. 45.3%). There were no intervention effects on the secondary outcome. Exploratory analyses suggested that patients with more responses to study text messages had better outcomes, regardless of arm. The C4C text messaging intervention did not significantly increase virologic suppression or retention in care. Response to text messages may be a useful way for providers to gauge risk for poor HIV outcomes. NCT01917994.
Harris, Lynne T.; Koepsell, Thomas D.; Haneuse, Sebastien J.; Martin, Diane P.; Ralston, James D.
2013-01-01
OBJECTIVE To study differences in glycemic control and HbA1c testing associated with use of secure electronic patient-provider messaging. We hypothesized that messaging use would be associated with better glycemic control and a higher rate of adherence to HbA1c testing recommendations. RESEARCH DESIGN AND METHODS Retrospective observational study of secure messaging at Group Health, a large nonprofit health care system. Our analysis included adults with diabetes who had registered for access to a shared electronic medical record (SMR) between 2003 and 2006. We fit log-linear regression models, using generalized estimating equations, to estimate the adjusted rate ratio of meeting three indicators of glycemic control (HbA1c <7%, HbA1c <8%, and HbA1c >9%) and HbA1c testing adherence by level of previous messaging use. Multiple imputation and inverse probability weights were used to account for missing data. RESULTS During the study period, 6,301 adults with diabetes registered for access to the SMR. Of these individuals, 74% used messaging at least once during that time. Frequent use of messaging during the previous calendar quarter was associated with a higher rate of good glycemic control (HbA1c <7%: rate ratio, 1.26 [95% CI, 1.15–1.37]) and a higher rate testing adherence (1.20 [1.15–1.25]). CONCLUSIONS Among SMR users, recent and frequent messaging use was associated with better glycemic control and a higher rate of HbA1c testing adherence. These results suggest that secure messaging may facilitate important processes of care and help some patients to achieve or maintain adequate glycemic control. PMID:23628618
Cooper, Nicole; Bassett, Danielle S.; Falk, Emily B.
2017-01-01
Brain activity in medial prefrontal cortex (MPFC) during exposure to persuasive messages can predict health behavior change. This brain-behavior relationship has been linked to areas of MPFC previously associated with self-related processing; however, the mechanism underlying this relationship is unclear. We explore two components of self-related processing – self-reflection and subjective valuation – and examine coherent activity between relevant networks of brain regions during exposure to health messages encouraging exercise and discouraging sedentary behaviors. We find that objectively logged reductions in sedentary behavior in the following month are linked to functional connectivity within brain regions associated with positive valuation, but not within regions associated with self-reflection on personality traits. Furthermore, functional connectivity between valuation regions contributes additional information compared to average brain activation within single brain regions. These data support an account in which MPFC integrates the value of messages to the self during persuasive health messaging and speak to broader questions of how humans make decisions about how to behave. PMID:28240271
Introducing high performance distributed logging service for ACS
NASA Astrophysics Data System (ADS)
Avarias, Jorge A.; López, Joao S.; Maureira, Cristián; Sommer, Heiko; Chiozzi, Gianluca
2010-07-01
The ALMA Common Software (ACS) is a software framework that provides the infrastructure for the Atacama Large Millimeter Array and other projects. ACS, based on CORBA, offers basic services and common design patterns for distributed software. Every properly built system needs to be able to log status and error information. Logging in a single computer scenario can be as easy as using fprintf statements. However, in a distributed system, it must provide a way to centralize all logging data in a single place without overloading the network nor complicating the applications. ACS provides a complete logging service infrastructure in which every log has an associated priority and timestamp, allowing filtering at different levels of the system (application, service and clients). Currently the ACS logging service uses an implementation of the CORBA Telecom Log Service in a customized way, using only a minimal subset of the features provided by the standard. The most relevant feature used by ACS is the ability to treat the logs as event data that gets distributed over the network in a publisher-subscriber paradigm. For this purpose the CORBA Notification Service, which is resource intensive, is used. On the other hand, the Data Distribution Service (DDS) provides an alternative standard for publisher-subscriber communication for real-time systems, offering better performance and featuring decentralized message processing. The current document describes how the new high performance logging service of ACS has been modeled and developed using DDS, replacing the Telecom Log Service. Benefits and drawbacks are analyzed. A benchmark is presented comparing the differences between the implementations.
A Log-Scaling Fault Tolerant Agreement Algorithm for a Fault Tolerant MPI
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hursey, Joshua J; Naughton, III, Thomas J; Vallee, Geoffroy R
The lack of fault tolerance is becoming a limiting factor for application scalability in HPC systems. The MPI does not provide standardized fault tolerance interfaces and semantics. The MPI Forum's Fault Tolerance Working Group is proposing a collective fault tolerant agreement algorithm for the next MPI standard. Such algorithms play a central role in many fault tolerant applications. This paper combines a log-scaling two-phase commit agreement algorithm with a reduction operation to provide the necessary functionality for the new collective without any additional messages. Error handling mechanisms are described that preserve the fault tolerance properties while maintaining overall scalability.
Implementation and Evaluation of Four Interoperable Open Standards for the Internet of Things
Jazayeri, Mohammad Ali; Liang, Steve H. L.; Huang, Chih-Yuan
2015-01-01
Recently, researchers are focusing on a new use of the Internet called the Internet of Things (IoT), in which enabled electronic devices can be remotely accessed over the Internet. As the realization of IoT concept is still in its early stages, manufacturers of Internet-connected devices and IoT web service providers are defining their proprietary protocols based on their targeted applications. Consequently, IoT becomes heterogeneous in terms of hardware capabilities and communication protocols. Addressing these heterogeneities by following open standards is a necessary step to communicate with various IoT devices. In this research, we assess the feasibility of applying existing open standards on resource-constrained IoT devices. The standard protocols developed in this research are OGC PUCK over Bluetooth, TinySOS, SOS over CoAP, and OGC SensorThings API. We believe that by hosting open standard protocols on IoT devices, not only do the devices become self-describable, self-contained, and interoperable, but innovative applications can also be easily developed with standardized interfaces. In addition, we use memory consumption, request message size, response message size, and response latency to benchmark the efficiency of the implemented protocols. In all, this research presents and evaluates standard-based solutions to better understand the feasibility of applying existing standards to the IoT vision. PMID:26402683
Witteman, Holly O; Bouck, Zachary; Bravo, Caroline A; Desveaux, Laura; Llovet, Diego; Presseau, Justin; Saragosa, Marianne; Taljaard, Monica; Umar, Shama; Grimshaw, Jeremy M; Tinmouth, Jill; Ivers, Noah M
2018-01-01
Background Cancer Care Ontario’s Screening Activity Report (SAR) is an online audit and feedback tool designed to help primary care physicians in Ontario, Canada, identify patients who are overdue for cancer screening or have abnormal results requiring follow-up. Use of the SAR is associated with increased screening rates. To encourage SAR use, Cancer Care Ontario sends monthly emails to registered primary care physicians announcing that updated data are available. However, analytics reveal that 50% of email recipients do not open the email and less than 7% click the embedded link to log in to their report. Objective The goal of the study is to determine whether rewritten emails result in increased log-ins. This manuscript describes how different user- and theory-informed messages intended to improve the impact of the monthly emails will be experimentally tested and how a process evaluation will explore why and how any effects observed were (or were not) achieved. Methods A user-centered approach was used to rewrite the content of the monthly email, including messages operationalizing 3 behavior change techniques: anticipated regret, material incentive (behavior), and problem solving. A pragmatic, 2x2x2 factorial experiment within a multiphase optimization strategy will test the redesigned emails with an embedded qualitative process evaluation to understand how and why the emails may or may not have worked. Trial outcomes will be ascertained using routinely collected administrative data. Physicians will be recruited for semistructured interviews using convenience and snowball sampling. Results As of April 2017, 5576 primary care physicians across the province of Ontario, Canada, had voluntarily registered for the SAR, and in so doing, signed up to receive the monthly email updates. From May to August 2017 participants received the redesigned monthly emails with content specific to their allocated experimental condition prompting use of the SAR. We have not yet begun analyses. Conclusions This study will inform how to communicate effectively with primary care providers by email and identify which behavior change techniques tested are most effective at encouraging engagement with an audit and feedback report. Trial Registration ClinicalTrials.gov NCT03124316; https://clinicaltrials.gov/ct2/show/NCT03124316 (Archived by WebCite at http://www.webcitation.org/6w2MqDWGu) PMID:29453190
A hierarchical detection method in external communication for self-driving vehicles based on TDMA.
Alheeti, Khattab M Ali; Al-Ani, Muzhir Shaban; McDonald-Maier, Klaus
2018-01-01
Security is considered a major challenge for self-driving and semi self-driving vehicles. These vehicles depend heavily on communications to predict and sense their external environment used in their motion. They use a type of ad hoc network termed Vehicular ad hoc networks (VANETs). Unfortunately, VANETs are potentially exposed to many attacks on network and application level. This paper, proposes a new intrusion detection system to protect the communication system of self-driving cars; utilising a combination of hierarchical models based on clusters and log parameters. This security system is designed to detect Sybil and Wormhole attacks in highway usage scenarios. It is based on clusters, utilising Time Division Multiple Access (TDMA) to overcome some of the obstacles of VANETs such as high density, high mobility and bandwidth limitations in exchanging messages. This makes the security system more efficient, accurate and capable of real time detection and quick in identification of malicious behaviour in VANETs. In this scheme, each vehicle log calculates and stores different parameter values after receiving the cooperative awareness messages from nearby vehicles. The vehicles exchange their log data and determine the difference between the parameters, which is utilised to detect Sybil attacks and Wormhole attacks. In order to realize efficient and effective intrusion detection system, we use the well-known network simulator (ns-2) to verify the performance of the security system. Simulation results indicate that the security system can achieve high detection rates and effectively detect anomalies with low rate of false alarms.
47 CFR 11.52 - EAS code and Attention Signal Monitoring requirements.
Code of Federal Regulations, 2012 CFR
2012-10-01
... technologies, such as instant messaging and email) the distribution of Common Alert Protocol (CAP)-formatted... Integrated Public Alert and Warning System (IPAWS) to enable (whether through “pull” interface technologies...
47 CFR 11.52 - EAS code and Attention Signal Monitoring requirements.
Code of Federal Regulations, 2013 CFR
2013-10-01
... technologies, such as instant messaging and email) the distribution of Common Alert Protocol (CAP)-formatted... Integrated Public Alert and Warning System (IPAWS) to enable (whether through “pull” interface technologies...
47 CFR 11.52 - EAS code and Attention Signal Monitoring requirements.
Code of Federal Regulations, 2014 CFR
2014-10-01
... technologies, such as instant messaging and email) the distribution of Common Alert Protocol (CAP)-formatted... Integrated Public Alert and Warning System (IPAWS) to enable (whether through “pull” interface technologies...
Gateway-Assisted Retransmission for Lightweight and Reliable IoT Communications.
Chang, Hui-Ling; Wang, Cheng-Gang; Wu, Mong-Ting; Tsai, Meng-Hsun; Lin, Chia-Ying
2016-09-22
Message Queuing Telemetry Transport for Sensor Networks (MQTT-SN) and Constrained Application Protocol (CoAP) are two protocols supporting publish/subscribe models for IoT devices to publish messages to interested subscribers. Retransmission mechanisms are introduced to compensate for the lack of data reliability. If the device does not receive the acknowledgement (ACK) before retransmission timeout (RTO) expires, the device will retransmit data. Setting an appropriate RTO is important because the delay may be large or retransmission may be too frequent when the RTO is inappropriate. We propose a Gateway-assisted CoAP (GaCoAP) to dynamically compute RTO for devices. Simulation models are proposed to investigate the performance of GaCoAP compared with four other methods. The experiment results show that GaCoAP is more suitable for IoT devices.
NASA Technical Reports Server (NTRS)
Defeo, P.; Chen, M.
1987-01-01
Means for evaluating data bus architectures and protocols for highly integrated flight control system applications are needed. Described are the criteria and plans to do this by using the NASA/Ames Intelligent Redundant Actuation System (IRAS) experimental set-up. Candidate bus architectures differ from one another in terms of: topology, access control, message transfer schemes, message characteristics, initialization. data flow control, transmission rates, fault tolerance, and time synchronization. The evaluation criteria are developed relative to these features. A preliminary, analytical evaluation of four candidate busses (MIL-STD-1553B, DATAC, Ethernet, and HSIS) is described. A bus must be exercised in a real-time environment to evaluate its dynamic characteristics. A plan for real-time evaluation of these four busses using a combination of hardware and simulation techniques is presented.
Gateway-Assisted Retransmission for Lightweight and Reliable IoT Communications
Chang, Hui-Ling; Wang, Cheng-Gang; Wu, Mong-Ting; Tsai, Meng-Hsun; Lin, Chia-Ying
2016-01-01
Message Queuing Telemetry Transport for Sensor Networks (MQTT-SN) and Constrained Application Protocol (CoAP) are two protocols supporting publish/subscribe models for IoT devices to publish messages to interested subscribers. Retransmission mechanisms are introduced to compensate for the lack of data reliability. If the device does not receive the acknowledgement (ACK) before retransmission timeout (RTO) expires, the device will retransmit data. Setting an appropriate RTO is important because the delay may be large or retransmission may be too frequent when the RTO is inappropriate. We propose a Gateway-assisted CoAP (GaCoAP) to dynamically compute RTO for devices. Simulation models are proposed to investigate the performance of GaCoAP compared with four other methods. The experiment results show that GaCoAP is more suitable for IoT devices. PMID:27669243
Simple algorithm for improved security in the FDDI protocol
NASA Astrophysics Data System (ADS)
Lundy, G. M.; Jones, Benjamin
1993-02-01
We propose a modification to the Fiber Distributed Data Interface (FDDI) protocol based on a simple algorithm which will improve confidential communication capability. This proposed modification provides a simple and reliable system which exploits some of the inherent security properties in a fiber optic ring network. This method differs from conventional methods in that end to end encryption can be facilitated at the media access control sublayer of the data link layer in the OSI network model. Our method is based on a variation of the bit stream cipher method. The transmitting station takes the intended confidential message and uses a simple modulo two addition operation against an initialization vector. The encrypted message is virtually unbreakable without the initialization vector. None of the stations on the ring will have access to both the encrypted message and the initialization vector except the transmitting and receiving stations. The generation of the initialization vector is unique for each confidential transmission and thus provides a unique approach to the key distribution problem. The FDDI protocol is of particular interest to the military in terms of LAN/MAN implementations. Both the Army and the Navy are considering the standard as the basis for future network systems. A simple and reliable security mechanism with the potential to support realtime communications is a necessary consideration in the implementation of these systems. The proposed method offers several advantages over traditional methods in terms of speed, reliability, and standardization.
NASA Astrophysics Data System (ADS)
Génot, V.; André, N.; Cecconi, B.; Bouchemit, M.; Budnik, E.; Bourrel, N.; Gangloff, M.; Dufourg, N.; Hess, S.; Modolo, R.; Renard, B.; Lormant, N.; Beigbeder, L.; Popescu, D.; Toniutti, J.-P.
2014-11-01
The interest for data communication between analysis tools in planetary sciences and space physics is illustrated in this paper via several examples of the uses of SAMP. The Simple Application Messaging Protocol is developed in the frame of the IVOA from an earlier protocol called PLASTIC. SAMP enables easy communication and interoperability between astronomy software, stand-alone and web-based; it is now increasingly adopted by the planetary sciences and space physics community. Its attractiveness is based, on one hand, on the use of common file formats for exchange and, on the other hand, on established messaging models. Examples of uses at the CDPP and elsewhere are presented. The CDPP (Centre de Données de la Physique des Plasmas, http://cdpp.eu/), the French data center for plasma physics, is engaged for more than a decade in the archiving and dissemination of data products from space missions and ground observatories. Besides these activities, the CDPP developed services like AMDA (Automated Multi Dataset Analysis, http://amda.cdpp.eu/) which enables in depth analysis of large amount of data through dedicated functionalities such as: visualization, conditional search and cataloging. Besides AMDA, the 3DView (http://3dview.cdpp.eu/) tool provides immersive visualizations and is further developed to include simulation and observational data. These tools and their interactions with each other, notably via SAMP, are presented via science cases of interest to planetary sciences and space physics communities.
Event-Driven Messaging for Offline Data Quality Monitoring at ATLAS
NASA Astrophysics Data System (ADS)
Onyisi, Peter
2015-12-01
During LHC Run 1, the information flow through the offline data quality monitoring in ATLAS relied heavily on chains of processes polling each other's outputs for handshaking purposes. This resulted in a fragile architecture with many possible points of failure and an inability to monitor the overall state of the distributed system. We report on the status of a project undertaken during the LHC shutdown to replace the ad hoc synchronization methods with a uniform message queue system. This enables the use of standard protocols to connect processes on multiple hosts; reliable transmission of messages between possibly unreliable programs; easy monitoring of the information flow; and the removal of inefficient polling-based communication.
Mays, Darren
2016-01-01
Background Although skin cancer is largely preventable, it affects nearly 1 of 5 US adults. There is a need for research on how to optimally design persuasive public health indoor tanning prevention messages. Objective The objective of our study was to examine whether framed messages on indoor tanning behavioral intentions delivered through short message service (SMS) text messaging would produce (1) positive responses to the messages, including message receptivity and emotional response; (2) indoor tanning efficacy beliefs, including response efficacy and self-efficacy; and (3) indoor tanning risk beliefs. Methods We conducted a pilot study of indoor tanning prevention messages delivered via mobile phone text messaging in a sample of 21 young adult women who indoor tan. Participants completed baseline measures, were randomly assigned to receive gain-, loss-, or balanced-framed text messages, and completed postexposure outcome measures on indoor tanning cognitions and behaviors. Participants received daily mobile phone indoor tanning prevention text messages for 1 week and completed the same postexposure measures as at baseline. Results Over the 1-week period there were trends or significant changes after receipt of the text messages, including increased perceived susceptibility (P<.001), response efficacy beliefs (P<.001), and message receptivity (P=.03). Ordinary least squares stepwise linear regression models showed an effect of text message exposure on self-efficacy to quit indoor tanning (t6=–2.475, P<.02). Ordinary least squares linear regression including all measured scales showed a marginal effect of SMS texts on self-efficacy (t20=1.905, P=.08). Participants endorsed highly favorable views toward the text messaging protocol. Conclusions This study supports this use of mobile text messaging as an indoor tanning prevention strategy. Given the nature of skin cancer risk perceptions, the addition of multimedia messaging service is another area of potential innovation for disseminating indoor tanning prevention messages. PMID:28007691
Evans, William D; Mays, Darren
2016-12-22
Although skin cancer is largely preventable, it affects nearly 1 of 5 US adults. There is a need for research on how to optimally design persuasive public health indoor tanning prevention messages. The objective of our study was to examine whether framed messages on indoor tanning behavioral intentions delivered through short message service (SMS) text messaging would produce (1) positive responses to the messages, including message receptivity and emotional response; (2) indoor tanning efficacy beliefs, including response efficacy and self-efficacy; and (3) indoor tanning risk beliefs. We conducted a pilot study of indoor tanning prevention messages delivered via mobile phone text messaging in a sample of 21 young adult women who indoor tan. Participants completed baseline measures, were randomly assigned to receive gain-, loss-, or balanced-framed text messages, and completed postexposure outcome measures on indoor tanning cognitions and behaviors. Participants received daily mobile phone indoor tanning prevention text messages for 1 week and completed the same postexposure measures as at baseline. Over the 1-week period there were trends or significant changes after receipt of the text messages, including increased perceived susceptibility (P<.001), response efficacy beliefs (P<.001), and message receptivity (P=.03). Ordinary least squares stepwise linear regression models showed an effect of text message exposure on self-efficacy to quit indoor tanning (t 6 =-2.475, P<.02). Ordinary least squares linear regression including all measured scales showed a marginal effect of SMS texts on self-efficacy (t 20 =1.905, P=.08). Participants endorsed highly favorable views toward the text messaging protocol. This study supports this use of mobile text messaging as an indoor tanning prevention strategy. Given the nature of skin cancer risk perceptions, the addition of multimedia messaging service is another area of potential innovation for disseminating indoor tanning prevention messages. ©William Evans, Darren Mays. Originally published in JMIR Mhealth and Uhealth (http://mhealth.jmir.org), 22.12.2016.
Reducing Interprocessor Dependence in Recoverable Distributed Shared Memory
NASA Technical Reports Server (NTRS)
Janssens, Bob; Fuchs, W. Kent
1994-01-01
Checkpointing techniques in parallel systems use dependency tracking and/or message logging to ensure that a system rolls back to a consistent state. Traditional dependency tracking in distributed shared memory (DSM) systems is expensive because of high communication frequency. In this paper we show that, if designed correctly, a DSM system only needs to consider dependencies due to the transfer of blocks of data, resulting in reduced dependency tracking overhead and reduced potential for rollback propagation. We develop an ownership timestamp scheme to tolerate the loss of block state information and develop a passive server model of execution where interactions between processors are considered atomic. With our scheme, dependencies are significantly reduced compared to the traditional message-passing model.
A Multi-Center Space Data System Prototype Based on CCSDS Standards
NASA Technical Reports Server (NTRS)
Rich, Thomas M.
2016-01-01
Deep space missions beyond earth orbit will require new methods of data communications in order to compensate for increasing RF propagation delay. The Consultative Committee for Space Data Systems (CCSDS) standard protocols Spacecraft Monitor & Control (SM&C), Asynchronous Message Service (AMS), and Delay/Disruption Tolerant Networking (DTN) provide such a method. The maturity level of this protocol set is, however, insufficient for mission inclusion at this time. This prototype is intended to provide experience which will raise the Technical Readiness Level (TRL) of these protocols..
Minimum expected delay-based routing protocol (MEDR) for Delay Tolerant Mobile Sensor Networks.
Feng, Yong; Liu, Ming; Wang, Xiaomin; Gong, Haigang
2010-01-01
It is a challenging work to develop efficient routing protocols for Delay Tolerant Mobile Sensor Networks (DTMSNs), which have several unique characteristics such as sensor mobility, intermittent connectivity, energy limit, and delay tolerability. In this paper, we propose a new routing protocol called Minimum Expected Delay-based Routing (MEDR) tailored for DTMSNs. MEDR achieves a good routing performance by finding and using the connected paths formed dynamically by mobile sensors. In MEDR, each sensor maintains two important parameters: Minimum Expected Delay (MED) and its expiration time. According to MED, messages will be delivered to the sensor that has at least a connected path with their hosting nodes, and has the shortest expected delay to communication directly with the sink node. Because of the changing network topology, the path is fragile and volatile, so we use the expiration time of MED to indicate the valid time of the path, and avoid wrong transmissions. Simulation results show that the proposed MEDR achieves a higher message delivery ratio with lower transmission overhead and data delivery delay than other DTMSN routing approaches.
Securing TCP/IP and Dial-up Access to Administrative Data.
ERIC Educational Resources Information Center
Conrad, L. Dean
1992-01-01
This article describes Arizona State University's solution to security risk inherent in general access systems such as TCP/IP (Transmission Control Protocol/INTERNET Protocol). Advantages and disadvantages of various options are compared, and the process of selecting a log-on authentication approach involving generation of a different password at…
Authentication in Reprogramming of Sensor Networks for Mote Class Adversaries
2006-01-01
based approach. In this paper, we propose a symmetric key-based protocol for authenticating the reprogramming process. Our protocol is based on the ... secret instantiation algorithm, which requires only O(log n) keys to be maintained at each sensor. We integrate this algorithm with the existing
A Student Teamwork Induction Protocol
ERIC Educational Resources Information Center
Kamau, Caroline; Spong, Abigail
2015-01-01
Faulty group processes have harmful effects on performance but there is little research about intervention protocols to pre-empt them in higher education. This naturalistic experiment compared a control cohort with an inducted cohort. The inducted cohort attended a workshop, consultations, elected a leader and used tools (a group log and group…
Diurnal Soil Temperature Effects within the Globe[R] Program Dataset
ERIC Educational Resources Information Center
Witter, Jason D.; Spongberg, Alison L.; Czajkowski, Kevin P.
2007-01-01
Long-term collection of soil temperature with depth is important when studying climate change. The international program GLOBE[R] provides an excellent opportunity to collect such data, although currently endorsed temperature collection protocols need to be refined. To enhance data quality, protocol-based methodology and automated data logging,…
Internet Protocol Security (IPSEC): Testing and Implications on IPv4 and IPv6 Networks
2008-08-27
Message Authentication Code-Message Digest 5-96). Due to the processing power consumption and slowness of public key authentication methods, RSA ...MODP) group with a 768 -bit modulus 2. a MODP group with a 1024-bit modulus 3. an Elliptic Curve Group over GF[ 2n ] (EC2N) group with a 155-bit...nonces, digital signatures using the Digital Signature Algorithm, and the Rivest-Shamir- Adelman ( RSA ) algorithm. For more information about the
Steven J. Presley; Michael R. Willig; Wunderle Jr. Joseph M.; Luis Nélio Saldanha
2008-01-01
1.As human population size increases, demand for natural resources will increase. Logging pressure related to increasing demands continues to threaten remote areas of Amazonian forest. A harvest protocol is required to provide renewable timber resources that meet consumer needs while minimizing negative effects on biodiversity and ecosystem services. Reduced-impact...
Defense in Depth Added to Malicious Activities Simulation Tools (MAST)
2015-09-01
cipher suites. The TLS Handshake is a combination of three components: handshake, change cipher spec, and alert. 41 (1) The Handshake ( Hello ) The...TLS Handshake, specifically the “ Hello ” portion, is designed to negotiate session parameters (cipher suite). The client informs the server of the...protocols and standards that it supports and then the server selects the highest common protocols and standards. Specifically, the Client Hello message
Performance Analysis and Optimization of the Winnow Secret Key Reconciliation Protocol
2011-06-01
use in a quantum key system can be defined in two ways : The number of messages passed between Alice and Bob The...classical and quantum environment. Post- quantum cryptography , which is generally used to describe classical quantum -resilient protocols, includes...composed of a one- way quantum channel and a two - way classical channel. Owing to the physics of the channel, the quantum channel is subject to
SVANET: A smart vehicular ad hoc network for efficient data transmission with wireless sensors.
Sahoo, Prasan Kumar; Chiang, Ming-Jer; Wu, Shih-Lin
2014-11-25
Wireless sensors can sense any event, such as accidents, as well as icy roads, and can forward the rescue/warning messages through intermediate vehicles for any necessary help. In this paper, we propose a smart vehicular ad hoc network (SVANET) architecture that uses wireless sensors to detect events and vehicles to transmit the safety and non-safety messages efficiently by using different service channels and one control channel with different priorities. We have developed a data transmission protocol for the vehicles in the highway, in which data can be forwarded with the help of vehicles if they are connected with each other or data can be forwarded with the help of nearby wireless sensors. Our data transmission protocol is designed to increase the driving safety, to prevent accidents and to utilize channels efficiently by adjusting the control and service channel time intervals dynamically. Besides, our protocol can transmit information to vehicles in advance, so that drivers can decide an alternate route in case of traffic congestion. For various data sharing, we design a method that can select a few leader nodes among vehicles running along a highway to broadcast data efficiently. Simulation results show that our protocol can outperform the existing standard in terms of the end to end packet delivery ratio and latency.
SVANET: A Smart Vehicular Ad Hoc Network for Efficient Data Transmission with Wireless Sensors
Sahoo, Prasan Kumar; Chiang, Ming-Jer; Wu, Shih-Lin
2014-01-01
Wireless sensors can sense any event, such as accidents, as well as icy roads, and can forward the rescue/warning messages through intermediate vehicles for any necessary help. In this paper, we propose a smart vehicular ad hoc network (SVANET) architecture that uses wireless sensors to detect events and vehicles to transmit the safety and non-safety messages efficiently by using different service channels and one control channel with different priorities. We have developed a data transmission protocol for the vehicles in the highway, in which data can be forwarded with the help of vehicles if they are connected with each other or data can be forwarded with the help of nearby wireless sensors. Our data transmission protocol is designed to increase the driving safety, to prevent accidents and to utilize channels efficiently by adjusting the control and service channel time intervals dynamically. Besides, our protocol can transmit information to vehicles in advance, so that drivers can decide an alternate route in case of traffic congestion. For various data sharing, we design a method that can select a few leader nodes among vehicles running along a highway to broadcast data efficiently. Simulation results show that our protocol can outperform the existing standard in terms of the end to end packet delivery ratio and latency. PMID:25429409
Multi-User Space Link Extension (SLE) System
NASA Technical Reports Server (NTRS)
Perkins, Toby
2013-01-01
The Multi-User Space (MUS) Link Extension system, a software and data system, provides Space Link Extension (SLE) users with three space data transfer services in timely, complete, and offline modes as applicable according to standards defined by the Consultative Committee for Space Data Systems (CCSDS). MUS radically reduces the schedule, cost, and risk of implementing a new SLE user system, minimizes operating costs with a lights-out approach to SLE, and is designed to require no sustaining engineering expense during its lifetime unless changes in the CCSDS SLE standards, combined with new provider implementations, force changes. No software modification to MUS needs to be made to support a new mission. Any systems engineer with Linux experience can begin testing SLE user service instances with MUS starting from a personal computer (PC) within five days. For flight operators, MUS provides a familiar-looking Web page for entering SLE configuration data received from SLE. Operators can also use the Web page to back up a space mission's entire set of up to approximately 500 SLE service instances in less than five seconds, or to restore or transfer from another system the same amount of data from a MUS backup file in about the same amount of time. Missions operate each MUS SLE service instance independently by sending it MUS directives, which are legible, plain ASCII strings. MUS directives are usually (but not necessarily) sent through a TCP-IP (Transmission Control Protocol Internet Protocol) socket from a MOC (Mission Operations Center) or POCC (Payload Operations Control Center) system, under scripted control, during "lights-out" spacecraft operation. MUS permits the flight operations team to configure independently each of its data interfaces; not only commands and telemetry, but also MUS status messages to the MOC. Interfaces can use single- or multiple-client TCP/IP server sockets, TCP/IP client sockets, temporary disk files, the system log, or standard in, standard out, or standard error as applicable. By defining MUS templates in ASCII, the flight operations team can include any MUS system variable in telemetry or command headers or footers, and/or in status messages. Data fields can be arranged within messages in different sequences, according to the mission s needs. The only constraints imposed are on the format of MUS directive strings, and some bare minimum logical requirements that must be met in order for MUS to read the mission control center's spacecraft command inputs. The MUS system imposes no limits or constraints on the numbers and combinations of missions and SLE service instances that it will support simultaneously. At any time, flight operators may add, change, delete, bind, connect, or disconnect.
Space Network Time Distribution and Synchronization Protocol Development for Mars Proximity Link
NASA Technical Reports Server (NTRS)
Woo, Simon S.; Gao, Jay L.; Mills, David
2010-01-01
Time distribution and synchronization in deep space network are challenging due to long propagation delays, spacecraft movements, and relativistic effects. Further, the Network Time Protocol (NTP) designed for terrestrial networks may not work properly in space. In this work, we consider the time distribution protocol based on time message exchanges similar to Network Time Protocol (NTP). We present the Proximity-1 Space Link Interleaved Time Synchronization (PITS) algorithm that can work with the CCSDS Proximity-1 Space Data Link Protocol. The PITS algorithm provides faster time synchronization via two-way time transfer over proximity links, improves scalability as the number of spacecraft increase, lowers storage space requirement for collecting time samples, and is robust against packet loss and duplication which underlying protocol mechanisms provide.
Compositional Verification of a Communication Protocol for a Remotely Operated Vehicle
NASA Technical Reports Server (NTRS)
Goodloe, Alwyn E.; Munoz, Cesar A.
2009-01-01
This paper presents the specification and verification in the Prototype Verification System (PVS) of a protocol intended to facilitate communication in an experimental remotely operated vehicle used by NASA researchers. The protocol is defined as a stack-layered com- position of simpler protocols. It can be seen as the vertical composition of protocol layers, where each layer performs input and output message processing, and the horizontal composition of different processes concurrently inhabiting the same layer, where each process satisfies a distinct requirement. It is formally proven that the protocol components satisfy certain delivery guarantees. Compositional techniques are used to prove these guarantees also hold in the composed system. Although the protocol itself is not novel, the methodology employed in its verification extends existing techniques by automating the tedious and usually cumbersome part of the proof, thereby making the iterative design process of protocols feasible.
Pein, Miriam; Eckert, Carolin; Preis, Maren; Breitkreutz, Jörg
2013-09-01
Performance qualification (PQ) of taste sensing systems is mandatory for their use in pharmaceutical industry. According to ICH Q2 (R1) and a recent adaptation for taste sensing systems, non-specificity, log-linear relationships between the concentration of analytes and the sensor signal as well as a repeatability with relative standard deviation (RSD) values <4% were defined as basic requirements to pass a PQ. In the present work, the αAstree taste sensing system led to a successful PQ procedure by the use of recent sensor batches for pharmaceutical applications (sensor set #2) and a modified measurement protocol. Log-linear relationships between concentration and responses of each sensor were investigated for different bitter tasting active pharmaceutical ingredients (APIs). Using the new protocol, RSD values <2.1% were obtained in the repeatability study. Applying the visual evaluation approach, detection and quantitation limit could be determined for caffeine citrate with every sensor (LOD 0.05-0.5 mM, LOQ: 0.1-0.5 mM). In addition, the sensor set marketed for food applications (sensor set #5) was proven to show beneficial effects regarding the log-linear relationship between the concentration of quinine hydrochloride and the sensor signal. By the use of our proposed protocol, it is possible to implement the αAstree taste sensing system as a tool to assure quality control in the pharmaceutical industry. Copyright © 2013 Elsevier B.V. All rights reserved.
Park, Linda G; Collins, Eileen G; Shim, Janet K; Whooley, Mary A
2017-07-18
Adherence to antiplatelet medications is critical to prevent life threatening complications (ie, stent thrombosis) after percutaneous coronary interventions (PCIs), yet rates of nonadherence range from 21-57% by 12 months. Mobile interventions delivered via text messaging or mobile apps represent a practical and inexpensive strategy to promote behavior change and enhance medication adherence. The Mobile4Meds study seeks to determine whether text messaging or a mobile app, compared with an educational website control provided to all Veterans, can improve adherence to antiplatelet therapy among patients following acute coronary syndrome (ACS) or PCI. The three aims of the study are to: (1) determine preferences for content and frequency of text messaging to promote medication adherence through focus groups; (2) identify the most patient-centered app that promotes adherence, through a content analysis of all commercially available apps for medication adherence and focus groups centered on usability; and (3) compare adherence to antiplatelet medications in Veterans after ACS/PCI via a randomized clinical trial (RCT). We will utilize a mixed-methods design that uses focus groups to achieve the first and second aims (N=32). Patients will be followed for 12 months after being randomly assigned to one of three arms: (1) customized text messaging, (2) mobile app, or (3) website-control groups (N=225). Medication adherence will be measured with electronic monitoring devices, pharmacy records, and self-reports. Enrollment for the focus groups is currently in progress. We expect to enroll patients for the RCT in the beginning of 2018. Determining the efficacy of mobile technology using a Veteran-designed protocol to promote medication adherence will have a significant impact on Veteran health and public health, particularly for individuals with chronic diseases that require strict medication adherence. ClinicalTrials.gov NCT03022669. ©Linda G Park, Eileen G Collins, Janet K Shim, Mary A Whooley. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 18.07.2017.
Using secure messaging to update medications list in ambulatory care setting.
Raghu, T S; Frey, Keith; Chang, Yu-Hui; Cheng, Meng-Ru; Freimund, Sharon; Patel, Asha
2015-10-01
This study analyzed patient adoption of secure messaging to update medication list in an ambulatory care setting. The objective was to establish demographic differences between users and non-users of secure messaging for medications list update. Efficiency of secure messaging for the updates was compared to fax and telephone based updates. The study used a retrospective, cross-sectional study of patient medical records and pharmacy call logs at Mayo Clinic, Arizona from December 2012 to May 2013, approximately one year after organizing a pharmacy call center for medication updates. A subgroup analysis during a 2-week period was used to measure time to complete update. Main dependent variable is the frequency of medication list updates over the study duration. Technician time required for the update was also utilized. A total of 22,495 outpatient visits were drawn and 18,702 unique patients were included in the primary analysis. A total of 402 unique patients were included in sub-group analysis. Secure message response rate (49.5%) was statistically significantly lower than that for phone calls (54.8%, p<0.001). Time to complete the update was significantly higher for faxed medication lists (Wilcoxon rank-sum tests, p<0.001) when compared to those for secure message or phone. Around 50% of the patients respond to medication update requests before office visit when contacted using phone calls and secure messages. Given the demographic differences between users and non-users of patient portal, mixed mode communication with patients is likely to be the norm for the foreseeable future in outpatient settings. Copyright © 2015. Published by Elsevier Ireland Ltd.
2014-01-01
Background Globally, the incidence of sexually transmitted infections (STI) is rising, posing a challenge to its control and appropriate management. Text messaging has become the most common mode of communication among almost six billion mobile phone users worldwide. Text messaging can be used to remind patients about clinic appointments, to notify patients that it is time for STI re-testing, and to facilitate patient communication with their health professionals with any questions and concerns they may have about their sexual health. While there are a handful of systematic reviews published on short message service (SMS) interventions in a variety of health settings and issues, none are related to sexual health. We plan to conduct a systematic review to examine the impact text messaging might have on interventions for the prevention and care of patients with STIs. Methods/Design Eligible studies will include both quantitative and qualitative studies published after 1995 that discuss the efficacy and effectiveness of SMS interventions for STI prevention and management using text messaging. Data will be abstracted independently by two reviewers using a standardized pre-tested data abstraction form. Inter-rater reliability scores will be obtained to ensure consistency in the inclusion and data extraction of studies. Heterogeneity will be assessed using the I2 test and subgroup analyses. A nonhypothesis driven inductive reasoning approach as well as a coding framework will be applied to analyze qualitative studies. A meta-analysis may be conducted if sufficient quantitative studies are found using similar outcomes. Discussion For this protocol, we identified ten related systematic reviews. The reviews were limited to a particular disease or setting, were not exclusive to SMS interventions, or were out of date. This systematic review will be the first comprehensive examination of studies that discuss the effectiveness of SMS on multiple outcomes that relate to STI prevention and management, covering diverse settings and populations. Findings of the systematic review and any additional meta-analyses will be published and presented to our key knowledge users. This information will provide the evidence that is required to appropriately adopt text messaging into standard practice in STI care. PMID:24433348
Medium Access Control for Opportunistic Concurrent Transmissions under Shadowing Channels
Son, In Keun; Mao, Shiwen; Hur, Seung Min
2009-01-01
We study the problem of how to alleviate the exposed terminal effect in multi-hop wireless networks in the presence of log-normal shadowing channels. Assuming node location information, we propose an extension of the IEEE 802.11 MAC protocol that sched-ules concurrent transmissions in the presence of log-normal shadowing, thus mitigating the exposed terminal problem and improving network throughput and delay performance. We observe considerable improvements in throughput and delay achieved over the IEEE 802.11 MAC under various network topologies and channel conditions in ns-2 simulations, which justify the importance of considering channel randomness in MAC protocol design for multi-hop wireless networks. PMID:22408556
Protocols for Handling Messages Between Simulation Computers
NASA Technical Reports Server (NTRS)
Balcerowski, John P.; Dunnam, Milton
2006-01-01
Practical Simulator Network (PSimNet) is a set of data-communication protocols designed especially for use in handling messages between computers that are engaging cooperatively in real-time or nearly-real-time training simulations. In a typical application, computers that provide individualized training at widely dispersed locations would communicate, by use of PSimNet, with a central host computer that would provide a common computational- simulation environment and common data. Originally intended for use in supporting interfaces between training computers and computers that simulate the responses of spacecraft scientific payloads, PSimNet could be especially well suited for a variety of other applications -- for example, group automobile-driver training in a classroom. Another potential application might lie in networking of automobile-diagnostic computers at repair facilities to a central computer that would compile the expertise of numerous technicians and engineers and act as an expert consulting technician.
Distillation with Sublogarithmic Overhead
NASA Astrophysics Data System (ADS)
Hastings, Matthew B.; Haah, Jeongwan
2018-02-01
It has been conjectured that, for any distillation protocol for magic states for the T gate, the number of noisy input magic states required per output magic state at output error rate ɛ is Ω [log (1 /ɛ )] . We show that this conjecture is false. We find a family of quantum error correcting codes of parameters ⟦ ∑ i =w +1 m (
Testing warning messages on smokers’ cigarette packages: A standardized protocol
Brewer, Noel T.; Hall, Marissa G.; Lee, Joseph G. L.; Peebles, Kathryn; Noar, Seth M.; Ribisl, Kurt M.
2015-01-01
Purpose Lab experiments on cigarette warnings typically use a brief one-time exposure that is not paired with the cigarette packs smokers use every day, leaving open the question of how repeated warning exposure over several weeks may affect smokers. This proof of principle study sought to develop a new protocol for testing cigarette warnings that better reflects real-world exposure by presenting them on cigarette smokers’ own packs. Methods We tested a cigarette pack labeling protocol with 76 US smokers ages 18 and older. We applied graphic warnings to the front and back of smokers’ cigarette packs. Results Most smokers reported that at least 75% of the packs of cigarettes they smoked during the study had our warnings. Nearly all said they would participate in the study again. Using cigarette packs with the study warnings increased quit intentions (p<.05). Conclusion Our findings suggest a feasible pack labeling protocol with six steps: (1) schedule appointments at brief intervals; (2) determine typical cigarette consumption; (3) ask smokers to bring a supply of cigarette packs to study appointments; (4) apply labels to smokers’ cigarette packs; (5) provide participation incentives at the end of appointments; and (6) refer smokers to cessation services at end of the study. When used in randomized controlled trials in settings with real-world message exposure over time, this protocol may help identify the true impact of warnings and thus better inform tobacco product labeling policy. PMID:25564282
2008-03-01
Machine [29]. OC4J applications support Java Servlets , Web services, and the following J2EE specific standards: Extensible Markup Language (XML...IMAP Internet Message Access Protocol IP Internet Protocol IT Information Technology xviii J2EE Java Enterprise Environment JSR 168 Java ...LDAP), World Wide Web Distributed Authoring and Versioning (WebDav), Java Specification Request 168 (JSR 168), and Web Services for Remote
Comment on "Bit-string oblivious transfer based on quantum state computational distinguishability"
NASA Astrophysics Data System (ADS)
He, Guang Ping
2015-10-01
We show that in the protocol proposed in Phys. Rev. A 91, 042306 (2015), 10.1103/PhysRevA.91.042306, a dishonest sender can always ensure with certainty that the receiver fails to get the secret message. Thus the security requirement of oblivious transfer is not met. This security problem also makes the protocol unsuitable for serving as a building block for 1-out-of-2 oblivious transfer.
Remote object authentication: confidence model, cryptosystem and protocol
NASA Astrophysics Data System (ADS)
Lancrenon, Jean; Gillard, Roland; Fournel, Thierry
2009-04-01
This paper follows a paper by Bringer et al.3 to adapt a security model and protocol used for remote biometric authentication to the case of remote morphometric object authentication. We use a different type of encryption technique that requires smaller key sizes and has a built-in mechanism to help control the integrity of the messages received by the server. We also describe the optical technology used to extract the morphometric templates.
NASA Technical Reports Server (NTRS)
Zenie, Alexandre; Luguern, Jean-Pierre
1987-01-01
The specification, verification, validation, and evaluation, which make up the different steps of the CS-PN software are outlined. The colored stochastic Petri net software is applied to a Wound/Wait protocol decomposable into two principal modules: request or couple (transaction, granule) treatment module and wound treatment module. Each module is specified, verified, validated, and then evaluated separately, to deduce a verification, validation and evaluation of the complete protocol. The colored stochastic Petri nets tool is shown to be a natural extension of the stochastic tool, adapted to distributed systems and protocols, because the color conveniently takes into account the numerous sites, transactions, granules and messages.
Methods for extracting social network data from chatroom logs
NASA Astrophysics Data System (ADS)
Osesina, O. Isaac; McIntire, John P.; Havig, Paul R.; Geiselman, Eric E.; Bartley, Cecilia; Tudoreanu, M. Eduard
2012-06-01
Identifying social network (SN) links within computer-mediated communication platforms without explicit relations among users poses challenges to researchers. Our research aims to extract SN links in internet chat with multiple users engaging in synchronous overlapping conversations all displayed in a single stream. We approached this problem using three methods which build on previous research. Response-time analysis builds on temporal proximity of chat messages; word context usage builds on keywords analysis and direct addressing which infers links by identifying the intended message recipient from the screen name (nickname) referenced in the message [1]. Our analysis of word usage within the chat stream also provides contexts for the extracted SN links. To test the capability of our methods, we used publicly available data from Internet Relay Chat (IRC), a real-time computer-mediated communication (CMC) tool used by millions of people around the world. The extraction performances of individual methods and their hybrids were assessed relative to a ground truth (determined a priori via manual scoring).
High-Throughput Bit-Serial LDPC Decoder LSI Based on Multiple-Valued Asynchronous Interleaving
NASA Astrophysics Data System (ADS)
Onizawa, Naoya; Hanyu, Takahiro; Gaudet, Vincent C.
This paper presents a high-throughput bit-serial low-density parity-check (LDPC) decoder that uses an asynchronous interleaver. Since consecutive log-likelihood message values on the interleaver are similar, node computations are continuously performed by using the most recently arrived messages without significantly affecting bit-error rate (BER) performance. In the asynchronous interleaver, each message's arrival rate is based on the delay due to the wire length, so that the decoding throughput is not restricted by the worst-case latency, which results in a higher average rate of computation. Moreover, the use of a multiple-valued data representation makes it possible to multiplex control signals and data from mutual nodes, thus minimizing the number of handshaking steps in the asynchronous interleaver and eliminating the clock signal entirely. As a result, the decoding throughput becomes 1.3 times faster than that of a bit-serial synchronous decoder under a 90nm CMOS technology, at a comparable BER.
Security architecture for HL/7 message interchange.
Chen, T S; Liao, B S; Lin, M G; Gough, T G
2001-01-01
The promotion of quality medical treatment is very important to the healthcare providers as well as to patients. It requires that the medical resources of different hospitals be combined to ensure that medical information is shared and that resources are not wasted. A computer-based patient record is one of the best methods to accomplish the interchange of the patient's clinical data. In our system, the Health Level/Seven (HL/7) format is used for the interchange of the clinical data, as it has been supported by many healthcare providers and become a â standard'. The security of the interchange of clinical data is a serious issue for people using the Internet for data communication. Several international well-developed security algorithms, models and secure policies are adopted in the design of a security handler for an HL/7 architecture. The goal of our system is to combine our security system with the end-to-end communication systems constructed from the HL/7 format to establish a safe delivery channel. A suitable security interchange environment is implemented to address some shortcomings in clinical data interchange. located at the application layer of the ISO/OSI reference model. The medical message components, sub-components, and related types of message event are the primary goals of the HL/7 protocols. The patient management system, the doctor's system for recording his advice, examination and diagnosis as well as any financial management system are all covered by the HL/7 protocols. Healthcare providers and hospitals in Taiwan are very interested in developing the HL/7 protocols as a common standard for clinical data interchange.
Coherent attack on oblivious transfer based on single-qubit rotations
NASA Astrophysics Data System (ADS)
He, Guang Ping
2018-04-01
Recently a bit-string quantum oblivious transfer (OT) protocol based on single-qubit rotations was proposed (Rodrigues et al 2017 J. Phys. A: Math. Theor. 50 205301) and proven secure against few-qubit measurements. However, it was left as an open question whether the protocol remains secure against general attacks. Here, we close the gap by showing that if the receiver Bob can perform collective measurements on all qubits, then he can learn Alice’s secret message with a probability close to one. Thus the protocol fails to meet the security criterion of OT.
A hierarchical detection method in external communication for self-driving vehicles based on TDMA
Al-ani, Muzhir Shaban; McDonald-Maier, Klaus
2018-01-01
Security is considered a major challenge for self-driving and semi self-driving vehicles. These vehicles depend heavily on communications to predict and sense their external environment used in their motion. They use a type of ad hoc network termed Vehicular ad hoc networks (VANETs). Unfortunately, VANETs are potentially exposed to many attacks on network and application level. This paper, proposes a new intrusion detection system to protect the communication system of self-driving cars; utilising a combination of hierarchical models based on clusters and log parameters. This security system is designed to detect Sybil and Wormhole attacks in highway usage scenarios. It is based on clusters, utilising Time Division Multiple Access (TDMA) to overcome some of the obstacles of VANETs such as high density, high mobility and bandwidth limitations in exchanging messages. This makes the security system more efficient, accurate and capable of real time detection and quick in identification of malicious behaviour in VANETs. In this scheme, each vehicle log calculates and stores different parameter values after receiving the cooperative awareness messages from nearby vehicles. The vehicles exchange their log data and determine the difference between the parameters, which is utilised to detect Sybil attacks and Wormhole attacks. In order to realize efficient and effective intrusion detection system, we use the well-known network simulator (ns-2) to verify the performance of the security system. Simulation results indicate that the security system can achieve high detection rates and effectively detect anomalies with low rate of false alarms. PMID:29315302
A Multi-Center Space Data System Prototype Based on CCSDS Standards
NASA Technical Reports Server (NTRS)
Rich, Thomas M.
2016-01-01
Deep space missions beyond earth orbit will require new methods of data communications in order to compensate for increasing Radio Frequency (RF) propagation delay. The Consultative Committee for Space Data Systems (CCSDS) standard protocols Spacecraft Monitor & Control (SM&C), Asynchronous Message Service (AMS), and Delay/Disruption Tolerant Networking (DTN) provide such a method. However, the maturity level of this protocol stack is insufficient for mission inclusion at this time. This Space Data System prototype is intended to provide experience which will raise the Technical Readiness Level (TRL) of this protocol set. In order to reduce costs, future missions can take advantage of these standard protocols, which will result in increased interoperability between control centers. This prototype demonstrates these capabilities by implementing a realistic space data system in which telemetry is published to control center applications at the Jet Propulsion Lab (JPL), the Marshall Space Flight Center (MSFC), and the Johnson Space Center (JSC). Reverse publishing paths for commanding from each control center are also implemented. The target vehicle consists of realistic flight computer hardware running Core Flight Software (CFS) in the integrated Power, Avionics, and Power (iPAS) Pathfinder Lab at JSC. This prototype demonstrates a potential upgrade path for future Deep Space Network (DSN) modification, in which the automatic error recovery and communication gap compensation capabilities of DTN would be exploited. In addition, SM&C provides architectural flexibility by allowing new service providers and consumers to be added efficiently anywhere in the network using the common interface provided by SM&C's Message Abstraction Layer (MAL). In FY 2015, this space data system was enhanced by adding telerobotic operations capability provided by the Robot API Delegate (RAPID) family of protocols developed at NASA. RAPID is one of several candidates for consideration and inclusion in a new international standard being developed by the CCSDS Telerobotic Operations Working Group. Software gateways for the purpose of interfacing RAPID messages with the existing SM&C based infrastructure were developed. Telerobotic monitor, control, and bridge applications were written in the RAPID framework, which were then tailored to the NAO telerobotic test article hardware, a product of Aldebaran Robotics.
PRAIS: Distributed, real-time knowledge-based systems made easy
NASA Technical Reports Server (NTRS)
Goldstein, David G.
1990-01-01
This paper discusses an architecture for real-time, distributed (parallel) knowledge-based systems called the Parallel Real-time Artificial Intelligence System (PRAIS). PRAIS strives for transparently parallelizing production (rule-based) systems, even when under real-time constraints. PRAIS accomplishes these goals by incorporating a dynamic task scheduler, operating system extensions for fact handling, and message-passing among multiple copies of CLIPS executing on a virtual blackboard. This distributed knowledge-based system tool uses the portability of CLIPS and common message-passing protocols to operate over a heterogeneous network of processors.
Using Sphinx to Improve Onion Routing Circuit Construction
NASA Astrophysics Data System (ADS)
Kate, Aniket; Goldberg, Ian
This paper presents compact message formats for onion routing circuit construction using the Sphinx methodology developed for mixes. We significantly compress the circuit construction messages for three onion routing protocols that have emerged as enhancements to the Tor anonymizing network; namely, Tor with predistributed Diffie-Hellman values, pairing-based onion routing, and certificateless onion routing. Our new circuit constructions are also secure in the universal composability framework, a property that was missing from the original constructions. Further, we compare the performance of our schemes with their older counterparts as well as with each other.
SPECS: Secure and Privacy Enhancing Communications Schemes for VANETs
NASA Astrophysics Data System (ADS)
Chim, T. W.; Yiu, S. M.; Hui, L. C. K.; Jiang, Zoe L.; Li, Victor O. K.
Vehicular ad hoc network (VANET) is an emerging type of networks which facilitates vehicles on roads to communicate for driving safety. The basic idea is to allow arbitrary vehicles to broadcast ad hoc messages (e.g. traffic accidents) to other vehicles. However, this raises the concern of security and privacy. Messages should be signed and verified before they are trusted while the real identity of vehicles should not be revealed, but traceable by authorized party. Existing solutions either rely heavily on a tamper-proof hardware device, or cannot satisfy the privacy requirement and do not have an effective message verification scheme. In this paper, we provide a software-based solution which makes use of only two shared secrets to satisfy the privacy requirement and gives lower message overhead and at least 45% higher successful rate than previous solutions in the message verification phase using the bloom filter and the binary search techniques. We also provide the first group communication protocol to allow vehicles to authenticate and securely communicate with others in a group of known vehicles.
King, Elizabeth; Kinvig, Karen; Steif, Jonathan; Qiu, Annie Q; Maan, Evelyn J; Albert, Arianne YK; Pick, Neora; Alimenti, Ariane; Kestler, Mary H; Money, Deborah M; Lester, Richard T
2017-01-01
Background Combination antiretroviral therapy (cART) as treatment for human immunodeficiency virus (HIV) infection is effective and available, but poor medication adherence limits benefits, particularly in vulnerable populations. In a Kenyan randomized controlled trial, a weekly text-messaging intervention (WelTel) improved cART adherence and HIV viral load (VL). Despite growing evidence for short message service (SMS) text-message interventions in HIV care, there is a paucity of data utilizing these interventions in marginalized or female cohorts. Objective This study was undertaken to assess whether the standardized WelTel SMS text-message intervention applied to a vulnerable, predominantly female, population improved cART adherence and VL. Methods We conducted a repeated measures study of the WelTel intervention in high-risk HIV-positive persons by measuring change in VL, CD4 count, and self-reported adherence 12 months before and 12 months after the WelTel intervention was introduced. Inclusion criteria included VL ≥200 copies/mL, indication for treatment, and meeting vulnerability criteria. Participants were given a mobile phone with unlimited texting (where required), and weekly check-in text messages were sent for one year from the WelTel computer platform. Clinical data were collected for control and intervention years. Participants were followed by a multidisciplinary team in a clinical setting. Outcomes were assessed using Wilcoxon signed ranks tests for change in CD4 and VL from control year to study end and mixed-effects logistic regressions for change in cART adherence and appointment attendance. A secondary analysis was conducted to assess the effect of response rate on the outcome by modeling final log10 VL by number of responses while controlling for mean log10 VL in the control year. Results Eighty-five participants enrolled in the study, but 5 withdrew (final N=80). Participants were predominantly female (90%, 72/80) with a variety of vulnerabilities. Mean VL decreased from 1098 copies/mL in the control year to 439 copies/mL at study end (P=.004). Adherence to cART significantly improved (OR 1.14, IQR 1.10-1.18; P<.001), whereas appointment attendance decreased slightly with the intervention (OR 0.81, IQR 0.67-0.99; P=.03). A response was received for 46.57% (1753/3764) of messages sent and 9.62% (362/3764) of text messages sent were replied to with a problem. An outcome analysis examining relationship between reply rate and VL did not meet statistical significance (P=.07), but may be worthy of investigating further in a larger study. Conclusions WelTel may be an effective tool for improving cART adherence and reducing VLs among high-risk, vulnerable HIV-positive persons. Trial Registration Clinicaltrials.gov NCT02603536; https://clinicaltrials.gov/ct2/show/NCT02603536 (Archived by WebCite at http://www.webcitation.org/6qK57zCwv) PMID:28572079
USDA-ARS?s Scientific Manuscript database
Shiitake mushrooms have a reputation as a healthy food. Growers may be able to use the presence of health promoting constituents as a marketing tool to promote sales of their products for premium prices. There are few reports on the effects of management protocols for log-grown shiitakes on the conc...
NASA Astrophysics Data System (ADS)
Hassan, Waleed K.; Al-Assam, Hisham
2017-05-01
The main problem associated with using symmetric/ asymmetric keys is how to securely store and exchange the keys between the parties over open networks particularly in the open environment such as cloud computing. Public Key Infrastructure (PKI) have been providing a practical solution for session key exchange for loads of web services. The key limitation of PKI solution is not only the need for a trusted third partly (e.g. certificate authority) but also the absent link between data owner and the encryption keys. The latter is arguably more important where accessing data needs to be linked with identify of the owner. Currently available key exchange protocols depend on using trusted couriers or secure channels, which can be subject to man-in-the-middle attack and various other attacks. This paper proposes a new protocol for Key Exchange using Biometric Identity Based Encryption (KE-BIBE) that enables parties to securely exchange cryptographic keys even an adversary is monitoring the communication channel between the parties. The proposed protocol combines biometrics with IBE in order to provide a secure way to access symmetric keys based on the identity of the users in unsecure environment. In the KE-BIOBE protocol, the message is first encrypted by the data owner using a traditional symmetric key before migrating it to a cloud storage. The symmetric key is then encrypted using public biometrics of the users selected by data owner to decrypt the message based on Fuzzy Identity-Based Encryption. Only the selected users will be able to decrypt the message by providing a fresh sample of their biometric data. The paper argues that the proposed solution eliminates the needs for a key distribution centre in traditional cryptography. It will also give data owner the power of finegrained sharing of encrypted data by control who can access their data.
Enabling IP Header Compression in COTS Routers via Frame Relay on a Simplex Link
NASA Technical Reports Server (NTRS)
Nguyen, Sam P.; Pang, Jackson; Clare, Loren P.; Cheng, Michael K.
2010-01-01
NASA is moving toward a networkcentric communications architecture and, in particular, is building toward use of Internet Protocol (IP) in space. The use of IP is motivated by its ubiquitous application in many communications networks and in available commercial off-the-shelf (COTS) technology. The Constellation Program intends to fit two or more voice (over IP) channels on both the forward link to, and the return link from, the Orion Crew Exploration Vehicle (CEV) during all mission phases. Efficient bandwidth utilization of the links is key for voice applications. In Voice over IP (VoIP), the IP packets are limited to small sizes to keep voice latency at a minimum. The common voice codec used in VoIP is G.729. This new algorithm produces voice audio at 8 kbps and in packets of 10-milliseconds duration. Constellation has designed the VoIP communications stack to use the combination of IP/UDP/RTP protocols where IP carries a 20-byte header, UDP (User Datagram Protocol) carries an 8-byte header, and RTP (Real Time Transport Protocol) carries a 12-byte header. The protocol headers total 40 bytes and are equal in length to a 40-byte G.729 payload, doubling the VoIP latency. Since much of the IP/UDP/RTP header information does not change from IP packet to IP packet, IP/UDP/RTP header compression can avoid transmission of much redundant data as well as reduce VoIP latency. The benefits of IP header compression are more pronounced at low data rate links such as the forward and return links during CEV launch. IP/UDP/RTP header compression codecs are well supported by many COTS routers. A common interface to the COTS routers is through frame relay. However, enabling IP header compression over frame relay, according to industry standard (Frame Relay IP Header Compression Agreement FRF.20), requires a duplex link and negotiations between the compressor router and the decompressor router. In Constellation, each forward to and return link from the CEV in space is treated independently as a simplex link. Without negotiation, the COTS routers are prevented from entering into the IP header compression mode, and no IP header compression would be performed. An algorithm is proposed to enable IP header compression in COTS routers on a simplex link with no negotiation or with a one-way messaging. In doing so, COTS routers can enter IP header compression mode without the need to handshake through a bidirectional link as required by FRF.20. This technique would spoof the routers locally and thereby allow the routers to enter into IP header compression mode without having the negotiations between routers actually occur. The spoofing function is conducted by a frame relay adapter (also COTS) with the capability to generate control messages according to the FRF.20 descriptions. Therefore, negotiation is actually performed between the FRF.20 adapter and the connecting COTS router locally and never occurs over the space link. Through understanding of the handshaking protocol described by FRF.20, the necessary FRF.20 negotiations messages can be generated to control the connecting router, not only to turn on IP header compression but also to adjust the compression parameters. The FRF.20 negotiation (or control) message is composed in the FRF.20 adapter by interpreting the incoming router request message. Many of the fields are simply transcribed from request to response while the control field indicating response and type are modified.
Adaptive Peer Sampling with Newscast
NASA Astrophysics Data System (ADS)
Tölgyesi, Norbert; Jelasity, Márk
The peer sampling service is a middleware service that provides random samples from a large decentralized network to support gossip-based applications such as multicast, data aggregation and overlay topology management. Lightweight gossip-based implementations of the peer sampling service have been shown to provide good quality random sampling while also being extremely robust to many failure scenarios, including node churn and catastrophic failure. We identify two problems with these approaches. The first problem is related to message drop failures: if a node experiences a higher-than-average message drop rate then the probability of sampling this node in the network will decrease. The second problem is that the application layer at different nodes might request random samples at very different rates which can result in very poor random sampling especially at nodes with high request rates. We propose solutions for both problems. We focus on Newscast, a robust implementation of the peer sampling service. Our solution is based on simple extensions of the protocol and an adaptive self-control mechanism for its parameters, namely—without involving failure detectors—nodes passively monitor local protocol events using them as feedback for a local control loop for self-tuning the protocol parameters. The proposed solution is evaluated by simulation experiments.
An Adaptive Jitter Mechanism for Reactive Route Discovery in Sensor Networks
Cordero, Juan Antonio; Yi, Jiazi; Clausen, Thomas
2014-01-01
This paper analyses the impact of jitter when applied to route discovery in reactive (on-demand) routing protocols. In multi-hop non-synchronized wireless networks, jitter—a small, random variation in the timing of message emission—is commonly employed, as a means to avoid collisions of simultaneous transmissions by adjacent routers over the same channel. In a reactive routing protocol for sensor and ad hoc networks, jitter is recommended during the route discovery process, specifically, during the network-wide flooding of route request messages, in order to avoid collisions. Commonly, a simple uniform jitter is recommended. Alas, this is not without drawbacks: when applying uniform jitter to the route discovery process, an effect called delay inversion is observed. This paper, first, studies and quantifies this delay inversion effect. Second, this paper proposes an adaptive jitter mechanism, designed to alleviate the delay inversion effect and thereby to reduce the route discovery overhead and (ultimately) allow the routing protocol to find more optimal paths, as compared to uniform jitter. This paper presents both analytical and simulation studies, showing that the proposed adaptive jitter can effectively decrease the cost of route discovery and increase the path quality. PMID:25111238
A high performance totally ordered multicast protocol
NASA Technical Reports Server (NTRS)
Montgomery, Todd; Whetten, Brian; Kaplan, Simon
1995-01-01
This paper presents the Reliable Multicast Protocol (RMP). RMP provides a totally ordered, reliable, atomic multicast service on top of an unreliable multicast datagram service such as IP Multicasting. RMP is fully and symmetrically distributed so that no site bears un undue portion of the communication load. RMP provides a wide range of guarantees, from unreliable delivery to totally ordered delivery, to K-resilient, majority resilient, and totally resilient atomic delivery. These QoS guarantees are selectable on a per packet basis. RMP provides many communication options, including virtual synchrony, a publisher/subscriber model of message delivery, an implicit naming service, mutually exclusive handlers for messages, and mutually exclusive locks. It has commonly been held that a large performance penalty must be paid in order to implement total ordering -- RMP discounts this. On SparcStation 10's on a 1250 KB/sec Ethernet, RMP provides totally ordered packet delivery to one destination at 842 KB/sec throughput and with 3.1 ms packet latency. The performance stays roughly constant independent of the number of destinations. For two or more destinations on a LAN, RMP provides higher throughput than any protocol that does not use multicast or broadcast.
Advanced Shipboard Control Systems
2001-05-07
Nov 1989: 41-47. Carnivale, J. A. DD-21 Presentation. Jan 1999. Deitel H.M. and P. J. Deitel . C++ How To Program . Upper Saddle River...One distinct advantage to an OSI model is that each level of the network is clearly defined, allowing different users to understand how a specific...Pri) field that tells the layer how this message is to be sent. The L2Hdr is an 8 bit section of the Link Protocol Data Unit/MAC Protocol Data
Unlinkable Serial Transactions: Protocols and Applications
1999-11-01
4) intends for the blind signature to be secure from “one-more” forgery attacks [Pointcheval and Stern 1996]. Such forgery enables the originator to...protocols we describe. The signature indicated by S in message 2 uses the vendor’s signature key for service S and is only used to sign blinded hashes. We...make use of blind signatures ; although, not surprisingly, their sys- tems are rather different from the ones given here [Fujioka et al. 1993; Cranor 1996
How to Stop Disagreeing and Start Cooperatingin the Presence of Asymmetric Packet Loss.
Morales-Ponce, Oscar; Schiller, Elad M; Falcone, Paolo
2018-04-22
We consider the design of a disagreement correction protocol in multi-vehicle systems. Vehicles broadcast in real-time vital information such as position, direction, speed, acceleration, intention, etc. This information is then used to identify the risks and adapt their trajectory to maintain the highest performance without compromising the safety. To minimize the risk due to the use of inconsistent information, all cooperating vehicles must agree whether to use the exchanged information to operate in a cooperative mode or use the only local information to operate in an autonomous mode. However, since wireless communications are prone to failures, it is impossible to deterministically reach an agreement. Therefore, any protocol will exhibit necessary disagreement periods. In this paper, we investigate whether vehicles can still cooperate despite communication failures even in the scenario where communication is suddenly not available. We present a deterministic protocol that allows all participants to either operate a cooperative mode when vehicles can exchange all the information in a timely manner or operate in autonomous mode when messages are lost. We show formally that the disagreement time is bounded by the time that the communication channel requires to deliver messages and validate our protocol using NS-3 simulations. We explain how the proposed solution can be used in vehicular platooning to attain high performance and still guarantee high safety standards despite communication failures.
How to Stop Disagreeing and Start Cooperatingin the Presence of Asymmetric Packet Loss
2018-01-01
We consider the design of a disagreement correction protocol in multi-vehicle systems. Vehicles broadcast in real-time vital information such as position, direction, speed, acceleration, intention, etc. This information is then used to identify the risks and adapt their trajectory to maintain the highest performance without compromising the safety. To minimize the risk due to the use of inconsistent information, all cooperating vehicles must agree whether to use the exchanged information to operate in a cooperative mode or use the only local information to operate in an autonomous mode. However, since wireless communications are prone to failures, it is impossible to deterministically reach an agreement. Therefore, any protocol will exhibit necessary disagreement periods. In this paper, we investigate whether vehicles can still cooperate despite communication failures even in the scenario where communication is suddenly not available. We present a deterministic protocol that allows all participants to either operate a cooperative mode when vehicles can exchange all the information in a timely manner or operate in autonomous mode when messages are lost. We show formally that the disagreement time is bounded by the time that the communication channel requires to deliver messages and validate our protocol using NS-3 simulations. We explain how the proposed solution can be used in vehicular platooning to attain high performance and still guarantee high safety standards despite communication failures. PMID:29690572
A new deadlock resolution protocol and message matching algorithm for the extreme-scale simulator
Engelmann, Christian; Naughton, III, Thomas J.
2016-03-22
Investigating the performance of parallel applications at scale on future high-performance computing (HPC) architectures and the performance impact of different HPC architecture choices is an important component of HPC hardware/software co-design. The Extreme-scale Simulator (xSim) is a simulation toolkit for investigating the performance of parallel applications at scale. xSim scales to millions of simulated Message Passing Interface (MPI) processes. The overhead introduced by a simulation tool is an important performance and productivity aspect. This paper documents two improvements to xSim: (1)~a new deadlock resolution protocol to reduce the parallel discrete event simulation overhead and (2)~a new simulated MPI message matchingmore » algorithm to reduce the oversubscription management overhead. The results clearly show a significant performance improvement. The simulation overhead for running the NAS Parallel Benchmark suite was reduced from 102% to 0% for the embarrassingly parallel (EP) benchmark and from 1,020% to 238% for the conjugate gradient (CG) benchmark. xSim offers a highly accurate simulation mode for better tracking of injected MPI process failures. Furthermore, with highly accurate simulation, the overhead was reduced from 3,332% to 204% for EP and from 37,511% to 13,808% for CG.« less
NASA Astrophysics Data System (ADS)
Ahmad, Afandi; Roslan, Muhammad Faris; Amira, Abbes
2017-09-01
In high jump sports, approach take-off speed and force during the take-off are two (2) main important parts to gain maximum jump. To measure both parameters, wireless sensor network (WSN) that contains microcontroller and sensor are needed to describe the results of speed and force for jumpers. Most of the microcontroller exhibit transmission issues in terms of throughput, latency and cost. Thus, this study presents the comparison of wireless microcontrollers in terms of throughput, latency and cost, and the microcontroller that have best performances and cost will be implemented in high jump wearable device. In the experiments, three (3) parts have been integrated - input, process and output. Force (for ankle) and global positioning system (GPS) sensor (for body waist) acts as an input for data transmission. These data were then being processed by both microcontrollers, ESP8266 and Arduino Yun Mini to transmit the data from sensors to the server (host-PC) via message queuing telemetry transport (MQTT) protocol. The server acts as receiver and the results was calculated from the MQTT log files. At the end, results obtained have shown ESP8266 microcontroller had been chosen since it achieved high throughput, low latency and 11 times cheaper in term of prices compared to Arduino Yun Mini microcontroller.
Lightweight causal and atomic group multicast
NASA Technical Reports Server (NTRS)
Birman, Kenneth P.; Schiper, Andre; Stephenson, Pat
1991-01-01
The ISIS toolkit is a distributed programming environment based on support for virtually synchronous process groups and group communication. A suite of protocols is presented to support this model. The approach revolves around a multicast primitive, called CBCAST, which implements a fault-tolerant, causally ordered message delivery. This primitive can be used directly or extended into a totally ordered multicast primitive, called ABCAST. It normally delivers messages immediately upon reception, and imposes a space overhead proportional to the size of the groups to which the sender belongs, usually a small number. It is concluded that process groups and group communication can achieve performance and scaling comparable to that of a raw message transport layer. This finding contradicts the widespread concern that this style of distributed computing may be unacceptably costly.
A message passing kernel for the hypercluster parallel processing test bed
NASA Technical Reports Server (NTRS)
Blech, Richard A.; Quealy, Angela; Cole, Gary L.
1989-01-01
A Message-Passing Kernel (MPK) for the Hypercluster parallel-processing test bed is described. The Hypercluster is being developed at the NASA Lewis Research Center to support investigations of parallel algorithms and architectures for computational fluid and structural mechanics applications. The Hypercluster resembles the hypercube architecture except that each node consists of multiple processors communicating through shared memory. The MPK efficiently routes information through the Hypercluster, using a message-passing protocol when necessary and faster shared-memory communication whenever possible. The MPK also interfaces all of the processors with the Hypercluster operating system (HYCLOPS), which runs on a Front-End Processor (FEP). This approach distributes many of the I/O tasks to the Hypercluster processors and eliminates the need for a separate I/O support program on the FEP.
Rapid prototyping 3D virtual world interfaces within a virtual factory environment
NASA Technical Reports Server (NTRS)
Kosta, Charles Paul; Krolak, Patrick D.
1993-01-01
On-going work into user requirements analysis using CLIPS (NASA/JSC) expert systems as an intelligent event simulator has led to research into three-dimensional (3D) interfaces. Previous work involved CLIPS and two-dimensional (2D) models. Integral to this work was the development of the University of Massachusetts Lowell parallel version of CLIPS, called PCLIPS. This allowed us to create both a Software Bus and a group problem-solving environment for expert systems development. By shifting the PCLIPS paradigm to use the VEOS messaging protocol we have merged VEOS (HlTL/Seattle) and CLIPS into a distributed virtual worlds prototyping environment (VCLIPS). VCLIPS uses the VEOS protocol layer to allow multiple experts to cooperate on a single problem. We have begun to look at the control of a virtual factory. In the virtual factory there are actors and objects as found in our Lincoln Logs Factory of the Future project. In this artificial reality architecture there are three VCLIPS entities in action. One entity is responsible for display and user events in the 3D virtual world. Another is responsible for either simulating the virtual factory or communicating with the real factory. The third is a user interface expert. The interface expert maps user input levels, within the current prototype, to control information for the factory. The interface to the virtual factory is based on a camera paradigm. The graphics subsystem generates camera views of the factory on standard X-Window displays. The camera allows for view control and object control. Control or the factory is accomplished by the user reaching into the camera views to perform object interactions. All communication between the separate CLIPS expert systems is done through VEOS.
A New On-Line Diagnosis Protocol for the SPIDER Family of Byzantine Fault Tolerant Architectures
NASA Technical Reports Server (NTRS)
Geser, Alfons; Miner, Paul S.
2004-01-01
This paper presents the formal verification of a new protocol for online distributed diagnosis for the SPIDER family of architectures. An instance of the Scalable Processor-Independent Design for Electromagnetic Resilience (SPIDER) architecture consists of a collection of processing elements communicating over a Reliable Optical Bus (ROBUS). The ROBUS is a specialized fault-tolerant device that guarantees Interactive Consistency, Distributed Diagnosis (Group Membership), and Synchronization in the presence of a bounded number of physical faults. Formal verification of the original SPIDER diagnosis protocol provided a detailed understanding that led to the discovery of a significantly more efficient protocol. The original protocol was adapted from the formally verified protocol used in the MAFT architecture. It required O(N) message exchanges per defendant to correctly diagnose failures in a system with N nodes. The new protocol achieves the same diagnostic fidelity, but only requires O(1) exchanges per defendant. This paper presents this new diagnosis protocol and a formal proof of its correctness using PVS.
NASA Technical Reports Server (NTRS)
Joseph, T. A.; Birman, Kenneth P.
1989-01-01
A number of broadcast protocols that are reliable subject to a variety of ordering and delivery guarantees are considered. Developing applications that are distributed over a number of sites and/or must tolerate the failures of some of them becomes a considerably simpler task when such protocols are available for communication. Without such protocols the kinds of distributed applications that can reasonably be built will have a very limited scope. As the trend towards distribution and decentralization continues, it will not be surprising if reliable broadcast protocols have the same role in distributed operating systems of the future that message passing mechanisms have in the operating systems of today. On the other hand, the problems of engineering such a system remain large. For example, deciding which protocol is the most appropriate to use in a certain situation or how to balance the latency-communication-storage costs is not an easy question.
Menezes, Pedro Monteiro; Cook, Timothy Wayne; Cavalini, Luciana Tricai
2016-01-01
To present the technical background and the development of a procedure that enriches the semantics of Health Level Seven version 2 (HL7v2) messages for software-intensive systems in telemedicine trauma care. This study followed a multilevel model-driven approach for the development of semantically interoperable health information systems. The Pre-Hospital Trauma Life Support (PHTLS) ABCDE protocol was adopted as the use case. A prototype application embedded the semantics into an HL7v2 message as an eXtensible Markup Language (XML) file, which was validated against an XML schema that defines constraints on a common reference model. This message was exchanged with a second prototype application, developed on the Mirth middleware, which was also used to parse and validate both the original and the hybrid messages. Both versions of the data instance (one pure XML, one embedded in the HL7v2 message) were equally validated and the RDF-based semantics recovered by the receiving side of the prototype from the shared XML schema. This study demonstrated the semantic enrichment of HL7v2 messages for intensive-software telemedicine systems for trauma care, by validating components of extracts generated in various computing environments. The adoption of the method proposed in this study ensures the compliance of the HL7v2 standard in Semantic Web technologies.
Shingleton, Rebecca M; Pratt, Elizabeth M; Gorman, Bernard; Barlow, David H; Palfai, Tibor P; Thompson-Brenner, Heather
2016-05-01
This study tested a motivational text message treatment adjunct for individuals with eating disorders (EDs) who exhibited high dietary restraint/restriction. A replicated single-case alternating treatment design was used to examine (a) the feasibility of combining a brief motivational interview with subsequent text messages and (b) the influence of the text messages on eating behaviors and motivation to change in individuals with EDs (N=12). The protocol was 8weeks and the text messages were adjunctive to cognitive-behavioral therapy. The intervention was well accepted (mean rating=7/10) and feasible within the context of monetary compensation (mean daily monitoring compliance =91%). Text messages did not impact behavioral outcomes: dietary restraint and kilocalorie intake. They had mixed effects on motivation to change dietary restraint, measured by the Readiness and Motivation Questionnaire (RMQ). When receiving text messages, RMQ precontemplation scores (desire to restrict) significantly increased, indicating decreased motivation; however, action scores (effort toward reducing dietary restraint) significantly increased, indicating increased motivation. These effects were moderated by weight status. Underweight individuals (n=4; body mass index [BMI]<19.0) reported increased ambivalence-that is, an increased desire to restrict and increased action toward reducing restriction-in response to the text messages. Normal weight participants (n=8; BMI>19.0) reported only increased action toward reducing restriction in response to the text messages. These data demonstrate text messages are a potentially feasible and acceptable treatment adjunct and may be effective at increasing motivation to change for normal weight individuals, while their influence on underweight patients is more complex. These findings provide a foundation for future research in technology-based motivational interventions for EDs and offer preliminary evidence for using these methods among normal weight individuals. Copyright © 2016. Published by Elsevier Ltd.
Schüz, Natalie; Ferguson, Stuart G
2015-07-01
Smokers and nonsmokers can encounter a variety of antismoking messages in their everyday life. Antismoking warnings often involve fear appeals to which particularly smokers may react in a defensive manner by avoiding or derogating the messages, or downplaying their personal risk. However, previous studies testing the effects of antismoking warnings have either been retrospective or lab-based, thus introducing potential recall biases and yielding limited ecological validity. We used ecological momentary assessment (EMA) to give an overview on the number, type, and locations where individuals encounter such messages and to examine their immediate reactions. In an EMA study, 33 smokers and 37 never-smokers logged every encounter with antismoking warnings during 2.5 weeks (1,237 participant days of monitoring). After randomly selected encounters, several markers of defensiveness were assessed. On average, nonsmokers reported noticing significantly fewer warnings than smokers (M = 0.49/day vs. M = 2.14/day). Both groups saw the majority of warnings on cigarette packages. Smokers reported a significantly higher level of message derogation and a significantly lower level of message acceptance than nonsmokers. There were no differences in feelings of vulnerability between smokers and nonsmokers upon encountering the warnings. The overall number of encounters with antismoking warnings in people's everyday life is relatively low, particularly among smokers. Smokers are likely to avoid messages and respond defensively, thus limiting their potential effectiveness. © The Author 2014. Published by Oxford University Press on behalf of the Society for Research on Nicotine and Tobacco. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
Impact of Repeated Exposures on Information Spreading in Social Networks
Zhou, Cangqi; Zhao, Qianchuan; Lu, Wenbo
2015-01-01
Clustered structure of social networks provides the chances of repeated exposures to carriers with similar information. It is commonly believed that the impact of repeated exposures on the spreading of information is nontrivial. Does this effect increase the probability that an individual forwards a message in social networks? If so, to what extent does this effect influence people’s decisions on whether or not to spread information? Based on a large-scale microblogging data set, which logs the message spreading processes and users’ forwarding activities, we conduct a data-driven analysis to explore the answer to the above questions. The results show that an overwhelming majority of message samples are more probable to be forwarded under repeated exposures, compared to those under only a single exposure. For those message samples that cover various topics, we observe a relatively fixed, topic-independent multiplier of the willingness of spreading when repeated exposures occur, regardless of the differences in network structure. We believe that this finding reflects average people’s intrinsic psychological gain under repeated stimuli. Hence, it makes sense that the gain is associated with personal response behavior, rather than network structure. Moreover, we find that the gain is robust against the change of message popularity. This finding supports that there exists a relatively fixed gain brought by repeated exposures. Based on the above findings, we propose a parsimonious model to predict the saturated numbers of forwarding activities of messages. Our work could contribute to better understandings of behavioral psychology and social media analytics. PMID:26465749
Performance analysis of local area networks
NASA Technical Reports Server (NTRS)
Alkhatib, Hasan S.; Hall, Mary Grace
1990-01-01
A simulation of the TCP/IP protocol running on a CSMA/CD data link layer was described. The simulation was implemented using the simula language, and object oriented discrete event language. It allows the user to set the number of stations at run time, as well as some station parameters. Those parameters are the interrupt time and the dma transfer rate for each station. In addition, the user may configure the network at run time with stations of differing characteristics. Two types are available, and the parameters of both types are read from input files at run time. The parameters include the dma transfer rate, interrupt time, data rate, average message size, maximum frame size and the average interarrival time of messages per station. The information collected for the network is the throughput and the mean delay per packet. For each station, the number of messages attempted as well as the number of messages successfully transmitted is collected in addition to the throughput and mean packet delay per station.
Testing warning messages on smokers' cigarette packages: a standardised protocol.
Brewer, Noel T; Hall, Marissa G; Lee, Joseph G L; Peebles, Kathryn; Noar, Seth M; Ribisl, Kurt M
2016-03-01
Lab experiments on cigarette warnings typically use a brief one-time exposure that is not paired with the cigarette packs smokers use every day, leaving open the question of how repeated warning exposure over several weeks may affect smokers. This proof of principle study sought to develop a new protocol for testing cigarette warnings that better reflects real-world exposure by presenting them on cigarette smokers' own packs. We tested a cigarette pack labelling protocol with 76 US smokers ages 18 and older. We applied graphic warnings to the front and back of smokers' cigarette packs. Most smokers reported that at least 75% of the packs of cigarettes they smoked during the study had our warnings. Nearly all said they would participate in the study again. Using cigarette packs with the study warnings increased quit intentions (p<0.05). Our findings suggest a feasible pack labelling protocol with six steps: (1) schedule appointments at brief intervals; (2) determine typical cigarette consumption; (3) ask smokers to bring a supply of cigarette packs to study appointments; (4) apply labels to smokers' cigarette packs; (5) provide participation incentives at the end of appointments; and (6) refer smokers to cessation services at end of the study. When used in randomised controlled trials in settings with real-world message exposure over time, this protocol may help identify the true impact of warnings and thus better inform tobacco product labelling policy. NCT02247908. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/
Resident perceptions of the impact of paging on intraoperative education.
Rose, Joel S; Waibel, Brett H; Schenarts, Paul J
2012-06-01
Our purpose was to evaluate the impact of paging on perceptions of intraoperative learning. Intraoperative logs of pager interruptions were kept by surgical residents at a university hospital over a 30-day period. The postgraduate year, number of pages, category of caller, reason for call, and level of urgency were recorded during each operation. At the conclusion of each operation, residents also completed a two-item survey with responses on a 5-point scale (1 = strongly disagree to 5 = strongly agree), querying if interruptions negatively impacted the intraoperative experience and if a message taken by a third party was effective in limiting interruptions. Logs were completed for 124 of 204 operations. Fifty-five per cent of operations were interrupted at least once with 49 per cent interrupted two to five times and 6 per cent were interrupted six or more times. Junior residents had 69 per cent of their operations interrupted compared with 39 per cent of senior residents (P = 0.001). Ninety-two per cent of pages were nonurgent. Residents did not perceive pager interruptions negatively impacted their educational experience (mean 2.3) but were neutral with respect if messages taken by a third party decreased interruptions (mean 3.8). Although our hypothesis was that pager interruptions were frequent and disrupt resident education, our data demonstrate the opposite.
Continuous Tamper-proof Logging using TPM2.0
2014-06-16
process each log entry. Additional hardware support could mitigate this problem. Tradeoffs between performance and security guarantees Disk write...becomes weaker as the block size increases. This problem is mitigated in protocol B by allowing offline recovery from a power failure and detection of...M.K., Isozaki, H.: Flicker : An execution infrastructure for TCB minimization. ACM SIGOPS Operating Systems Review 42(4) (2008) 315–328 24. Parno, B
Protocol for a Delay-Tolerant Data-Communication Network
NASA Technical Reports Server (NTRS)
Torgerson, Jordan; Hooke, Adrian; Burleigh, Scott; Fall, Kevin
2004-01-01
As its name partly indicates, the Delay-Tolerant Networking (DTN) Bundle Protocol is a protocol for delay-tolerant transmission of data via communication networks. This protocol was conceived as a result of studies of how to adapt Internet protocols so that Internet-like services could be provided across interplanetary distances in support of deep-space exploration. The protocol, and software to implement the protocol, is being developed in collaboration among experts at NASA's Jet Propulsion Laboratory and other institutions. No current Internet protocols can accommodate long transmission delay times or intermittent link connectivity. The DTN Bundle Protocol represents a departure from the standard Internet assumption that a continuous path is available from a host computer to a client computer: It provides for routing of data through networks that may be disjointed and may be characterized by long transmission delays. In addition to networks that include deepspace communication links, examples of such networks include terrestrial ones within which branches are temporarily disconnected. The protocol is based partly on the definition of a message-based overlay above the transport layers of the networks on which it is hosted.
The Prodiguer Messaging Platform
NASA Astrophysics Data System (ADS)
Greenslade, Mark; Denvil, Sebastien; Raciazek, Jerome; Carenton, Nicolas; Levavasseur, Guillame
2014-05-01
CONVERGENCE is a French multi-partner national project designed to gather HPC and informatics expertise to innovate in the context of running French climate models with differing grids and at differing resolutions. Efficient and reliable execution of these models and the management and dissemination of model output (data and meta-data) are just some of the complexities that CONVERGENCE aims to resolve. The Institut Pierre Simon Laplace (IPSL) is responsible for running climate simulations upon a set of heterogenous HPC environments within France. With heterogeneity comes added complexity in terms of simulation instrumentation and control. Obtaining a global perspective upon the state of all simulations running upon all HPC environments has hitherto been problematic. In this presentation we detail how, within the context of CONVERGENCE, the implementation of the Prodiguer messaging platform resolves complexity and permits the development of real-time applications such as: 1. a simulation monitoring dashboard; 2. a simulation metrics visualizer; 3. an automated simulation runtime notifier; 4. an automated output data & meta-data publishing pipeline; The Prodiguer messaging platform leverages a widely used open source message broker software called RabbitMQ. RabbitMQ itself implements the Advanced Message Queue Protocol (AMPQ). Hence it will be demonstrated that the Prodiguer messaging platform is built upon both open source and open standards.
NASA Technical Reports Server (NTRS)
Clare, L. P.; Yan, T.-Y.
1985-01-01
The analysis of the ALOHA random access protocol for communications channels with fading is presented. The protocol is modified to send multiple contiguous copies of a message at each transmission attempt. Both pure and slotted ALOHA channels are considered. A general two state model is used for the channel error process to account for the channel fading memory. It is shown that greater throughput and smaller delay may be achieved using repetitions. The model is applied to the analysis of the delay-throughput performance in a fading mobile communications environment. Numerical results are given for NASA's Mobile Satellite Experiment.
Analysis of MD5 authentication in various routing protocols using simulation tools
NASA Astrophysics Data System (ADS)
Dinakaran, M.; Darshan, K. N.; Patel, Harsh
2017-11-01
Authentication being an important paradigm of security and Computer Networks require secure paths to make the flow of the data even more secure through some security protocols. So MD-5(Message Digest 5) helps in providing data integrity to the data being sent through it and authentication to the network devices. This paper gives a brief introduction to the MD-5, simulation of the networks by including MD-5 authentication using various routing protocols like OSPF, EIGRP and RIPv2. GNS3 is being used to simulate the scenarios. Analysis of the MD-5 authentication is done in the later sections of the paper.
Three-party quantum secure direct communication against collective noise
NASA Astrophysics Data System (ADS)
He, Ye-Feng; Ma, Wen-Ping
2017-10-01
Based on logical quantum states, two three-party quantum secure direct communication protocols are proposed, which can realize the exchange of the secret messages between three parties with the help of the measurement correlation property of six-particle entangled states. These two protocols can be immune to the collective-dephasing noise and the collective-rotation noise, respectively; neither of them has information leakage problem. The one-way transmission mode ensures that they can congenitally resist against the Trojan horse attacks and the teleportation attack. Furthermore, these two protocols are secure against other active attacks because of the use of the decoy state technology.
Using a Participatory Four-Step Protocol to Develop Culturally Targeted Cancer Education Brochures
Kulukulualani, Manny; Braun, Kathryn L.; Tsark, JoAnn U.
2010-01-01
Native Hawaiians have a high cancer burden, but few culturally targeted cancer education brochures exist. The authors followed a participatory four-step protocol, involving more than 200 health providers and clients, to develop and test culturally targeted brochures on skin, oral, cervical, prostate, and testicular cancers. The final products featured Hawaiian faces, scenes, words, and activities. They proved more attractive than existing materials, in particular to younger Hawaiians, and posttests suggested good comprehension of intended messages. This protocol may have application in other communities that want to develop brochures that are attractive, acceptable, readable, and useful to minority clients and their providers. PMID:18353907
Using a participatory four-step protocol to develop culturally targeted cancer education brochures.
Kulukulualani, Manny; Braun, Kathryn L; Tsark, JoAnn U
2008-10-01
Native Hawaiians have a high cancer burden, but few culturally targeted cancer education brochures exist. The authors followed a participatory four-step protocol, involving more than 200 health providers and clients, to develop and test culturally targeted brochures on skin, oral, cervical, prostate, and testicular cancers. The final products featured Hawaiian faces, scenes, words, and activities. They proved more attractive than existing materials, in particular to younger Hawaiians, and posttests suggested good comprehension of intended messages. This protocol may have application in other communities that want to develop brochures that are attractive, acceptable, readable, and useful to minority clients and their providers.
High-Performance, Reliable Multicasting: Foundations for Future Internet Groupware Applications
NASA Technical Reports Server (NTRS)
Callahan, John; Montgomery, Todd; Whetten, Brian
1997-01-01
Network protocols that provide efficient, reliable, and totally-ordered message delivery to large numbers of users will be needed to support many future Internet applications. The Reliable Multicast Protocol (RMP) is implemented on top of IP multicast to facilitate reliable transfer of data for replicated databases and groupware applications that will emerge on the Internet over the next decade. This paper explores some of the basic questions and applications of reliable multicasting in the context of the development and analysis of RMP.
Packet Controller For Wireless Headset
NASA Technical Reports Server (NTRS)
Christensen, Kurt K.; Swanson, Richard J.
1993-01-01
Packet-message controller implements communications protocol of network of wireless headsets. Designed for headset application, readily adapted to other uses; slight modification enables controller to implement Integrated Services Digital Network (ISDN) X.25 protocol, giving far-reaching applications in telecommunications. Circuit converts continuous voice signals into digital packets of data and vice versa. Operates in master or slave mode. Controller reduced to single complementary metal oxide/semiconductor integrated-circuit chip. Occupies minimal space in headset and consumes little power, extending life of headset battery.
Quantum direct communication protocol strengthening against Pavičić’s attack
NASA Astrophysics Data System (ADS)
Zhang, Bo; Shi, Wei-Xu; Wang, Jian; Tang, Chao-Jing
2015-12-01
A quantum circuit providing an undetectable eavesdropping of information in message mode, which compromises all two-state ψ-ϕ quantum direct communication (QDC) protocols, has been recently proposed by Pavičić [Phys. Rev. A 87 (2013) 042326]. A modification of the protocol’s control mode is proposed, which improves users’ 25% detection probability of Eve to 50% at best, as that in ping-pong protocol. The modification also improves the detection probability of Wójcik’s attack [Phys. Rev. Lett 90 (2003) 157901] to 75% at best. The resistance against man-in-the-middle (MITM) attack as well as the discussion of security for four Bell state protocols is presented. As a result, the protocol security is strengthened both theoretically and practically, and quantum advantage of superdense coding is restored.
Optimistic barrier synchronization
NASA Technical Reports Server (NTRS)
Nicol, David M.
1992-01-01
Barrier synchronization is fundamental operation in parallel computation. In many contexts, at the point a processor enters a barrier it knows that it has already processed all the work required of it prior to synchronization. The alternative case, when a processor cannot enter a barrier with the assurance that it has already performed all the necessary pre-synchronization computation, is treated. The problem arises when the number of pre-sychronization messages to be received by a processor is unkown, for example, in a parallel discrete simulation or any other computation that is largely driven by an unpredictable exchange of messages. We describe an optimistic O(log sup 2 P) barrier algorithm for such problems, study its performance on a large-scale parallel system, and consider extensions to general associative reductions as well as associative parallel prefix computations.
Marthick, Michael; Dhillon, Haryana M; Alison, Jennifer A; Cheema, Birinder S; Shaw, Tim
2018-05-15
Significant benefits accrue from increasing physical activity levels in people with a history of cancer. Physical activity levels can be increased using behavioral change interventions in this population. Access to Web portals and provision of activity monitors to provide feedback may support behavior change by encouraging patient engagement in physical therapy. The Web portal evaluated in this study will provide a system to monitor physical activity and sleep, for use by both clinician and patient, along with symptom and health-related quality of life tracking capabilities. The aim of this study was to outline a protocol for a feasibility study focused on a Web-based portal that provides activity monitoring and personalized messaging to increase physical activity in people with cancer. Using a longitudinal cohort design, people with cancer will be serially allocated to 3 intervention cohorts of 20 participants each and followed for 10 weeks. Cohort 1 will be provided a wearable activity monitor and access to a Web-based portal. Cohort 2 will receive the same content as Cohort 1 and in addition will receive a weekly activity summary message. Cohort 3 will receive the same content as Cohorts 1 and 2 and in addition will receive a personalized weekly coaching message. Feasibility of the use of the portal is the primary outcome. Results are expected in early 2018. Outcome measures will include goal attainment and completion rate. This study will provide information about the feasibility of investigating eHealth initiatives to promote physical activity in people with cancer. RR1-10.2196/9586. ©Michael Marthick, Haryana M Dhillon, Jennifer A Alison, Birinder S Cheema, Tim Shaw. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 15.05.2018.
Frew, Paula M; Kriss, Jennifer L; Chamberlain, Allison T; Malik, Fauzia; Chung, Yunmi; Cortés, Marielysse; Omer, Saad B
2016-08-02
We sought to examine the effectiveness of persuasive communication interventions on influenza vaccination uptake among black/African American pregnant women in Atlanta, Georgia. We recruited black/African American pregnant women ages 18 to 50 y from Atlanta, GA to participate in a prospective, randomized controlled trial of influenza immunization messaging conducted from January to April 2013. Eligible participants were randomized to 3 study arms. We conducted follow-up questionnaires on influenza immunization at 30-days post-partum with all groups. Chi-square and t tests evaluated group differences, and outcome intention-to-treat assessment utilized log-binomial regression models. Of the 106 enrolled, 95 women completed the study (90% retention), of which 31 were randomly assigned to affective messaging intervention ("Pregnant Pause" video), 30 to cognitive messaging intervention ("Vaccines for a Healthy Pregnancy" video), and 34 to a comparison condition (receipt of the Influenza Vaccine Information Statement). The three groups were balanced on baseline demographic characteristics and reported health behaviors. At baseline, most women (63%, n = 60) reported no receipt of seasonal influenza immunization during the previous 5 y. They expressed a low likelihood (2.1 ± 2.8 on 0-10 scale) of obtaining influenza immunization during their current pregnancy. At 30-days postpartum follow-up, influenza immunization was low among all participants (7-13%) demonstrating no effect after a single exposure to either affective messaging (RR = 1.10; 95% CI: 0.30-4.01) or cognitive messaging interventions (RR = 0.57; 95% CI: 0.11-2.88). Women cited various reasons for not obtaining maternal influenza immunizations. These included concern about vaccine harm (47%, n = 40), low perceived influenza infection risk (31%, n = 26), and a history of immunization nonreceipt (24%, n = 20). The findings reflect the limitations associated with a single exposure to varying maternal influenza immunization message approaches on vaccine behavior. For this population, repeated influenza immunization exposures may be warranted with alterations in message format, content, and relevance for coverage improvement.
Eksert, Sami; Aşık, Mehmet Burak; Akay, Sinan; Keklikçi, Kenan; Aydın, Fevzi Nuri; Çoban, Mehmet; Kantemir, Ali; Güngör, Onur; Garip, Beyazıt; Turgut, Mustafa Suphi; Olcay, Kenan
2017-05-01
Coordination of an emergency response team is an important determinant of prompt treatment for combat injuries in hospitals. The authors hypothesized that instant messaging applications for smartphones could be appropriate tools for notifying emergency response team members. The objective of this study was to investigate the efficiency of a commercial instant messaging application (WhatsApp, Mountain View, CA) as a communication tool for the emergency team in a level-I trauma center. We retrospectively evaluated the messages in the instant messaging application group that was formed to coordinate responses to patients who suffered from combat injuries and who were transported to our hospital via helicopter during an 8-week period. We evaluated the response times, response time periods during or outside of work hours, and the differences in the response times of doctors, nurses, and technicians among the members of the emergency team to the team leader's initial message about the patients. A total of 510 emergency call messages pertaining to 17 combat injury emergency cases were logged. The median time of emergency response was 4.1 minutes, 6 minutes, and 5.3 minutes for doctors, nurses, and the other team members, respectively. The differences in these response times between the groups were statistically significant (p=0.03), with subgroup analyses revealing significant differences between doctors and nurses (p=0.038). However, no statistically significant differences were observed between the doctors and the technicians (p=0.19) or the nurses and the technicians (p=1.0). From the team leader's perspective, using this application reduced the workload and the time loss, and also encouraged the team. Instant messaging applications for smartphones can be efficient, easy-to-operate, and time-saving communication tools in the transfer of medical information and the coordination of emergency response team members in hospitals.
Implementing TCP/IP and a socket interface as a server in a message-passing operating system
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hipp, E.; Wiltzius, D.
1990-03-01
The UNICOS 4.3BSD network code and socket transport interface are the basis of an explicit network server for NLTSS, a message passing operating system on the Cray YMP. A BSD socket user library provides access to the network server using an RPC mechanism. The advantages of this server methodology are its modularity and extensibility to migrate to future protocol suites (e.g. OSI) and transport interfaces. In addition, the network server is implemented in an explicit multi-tasking environment to take advantage of the Cray YMP multi-processor platform. 19 refs., 5 figs.
Average waiting time in FDDI networks with local priorities
NASA Technical Reports Server (NTRS)
Gercek, Gokhan
1994-01-01
A method is introduced to compute the average queuing delay experienced by different priority group messages in an FDDI node. It is assumed that no FDDI MAC layer priorities are used. Instead, a priority structure is introduced to the messages at a higher protocol layer (e.g. network layer) locally. Such a method was planned to be used in Space Station Freedom FDDI network. Conservation of the average waiting time is used as the key concept in computing average queuing delays. It is shown that local priority assignments are feasable specially when the traffic distribution is asymmetric in the FDDI network.
A General Purpose Connections type CTI Server Based on SIP Protocol and Its Implementation
NASA Astrophysics Data System (ADS)
Watanabe, Toru; Koizumi, Hisao
In this paper, we propose a general purpose connections type CTI (Computer Telephony Integration) server that provides various CTI services such as voice logging where the CTI server communicates with IP-PBX using the SIP (Session Initiation Protocol), and accumulates voice packets of external line telephone call flowing between an IP telephone for extension and a VoIP gateway connected to outside line networks. The CTI server realizes CTI services such as voice logging, telephone conference, or IVR (interactive voice response) with accumulating and processing voice packets sampled. Furthermore, the CTI server incorporates a web server function which can provide various CTI services such as a Web telephone directory via a Web browser to PCs, cellular telephones or smart-phones in mobile environments.
NASA Astrophysics Data System (ADS)
Broers, Anna; Robichaud, Peter; Lewis, Sarah
2017-04-01
Wildfires are part of the natural process in most forested landscapes and during subsequent precipitation, the runoff and consequently erosion of the soil increases. Several factors contribute to the increased runoff: loss of runoff storage in the forest floor, the water repellent soil layer and reduced interception by the canopy. Due to climate change, the number of wildfires and their severity is likely to increase, which will lead to increased erosion; this has been investigated by others. Often, land management protocol is to remove the standing dead trees before they decay. In the past years salvage logging has received more attention in research, yet results have been mixed on its effects on increased erosion. The goal of the current research is to determine the change in surface conditions due to salvage logging operations by comparing the pre- and post-fire and post-salvage surface conditions. To determine this change, high resolution WorldView remote sensing imagery was used after 9000-ha 2015 Tower Fire which was located on the border of Idaho and Washington (USA). Ground validation measurements were taken using the forest soil disturbance protocol as well as GPS coordinates and measurements of highly disturbed areas such as skid trails, skyline drag lines and other machinery impacts. Some correlations were found between disturbance classes, bare soil, exposed wheel tracks (rutting) and soil compaction. High resolution WorldView remote sensing images detected changes in the pre- and post-fire environmental conditions and the change due to salvage logging operations. Classifying disturbances using remote sensing imagery is complicated by natural revegetation processes and by the timing of salvage logging operations. Initial results suggest that high resolution imagery can be used to determine onsite impacts of salvage logging operations.
NASA Astrophysics Data System (ADS)
Lee, Jasper C.; Ma, Kevin C.; Liu, Brent J.
2008-03-01
A Data Grid for medical images has been developed at the Image Processing and Informatics Laboratory, USC to provide distribution and fault-tolerant storage of medical imaging studies across Internet2 and public domain. Although back-up policies and grid certificates guarantee privacy and authenticity of grid-access-points, there still lacks a method to guarantee the sensitive DICOM images have not been altered or corrupted during transmission across a public domain. This paper takes steps toward achieving full image transfer security within the Data Grid by utilizing DICOM image authentication and a HIPAA-compliant auditing system. The 3-D lossless digital signature embedding procedure involves a private 64 byte signature that is embedded into each original DICOM image volume, whereby on the receiving end the signature can to be extracted and verified following the DICOM transmission. This digital signature method has also been developed at the IPILab. The HIPAA-Compliant Auditing System (H-CAS) is required to monitor embedding and verification events, and allows monitoring of other grid activity as well. The H-CAS system federates the logs of transmission and authentication events at each grid-access-point and stores it into a HIPAA-compliant database. The auditing toolkit is installed at the local grid-access-point and utilizes Syslog [1], a client-server standard for log messaging over an IP network, to send messages to the H-CAS centralized database. By integrating digital image signatures and centralized logging capabilities, DICOM image integrity within the Medical Imaging and Informatics Data Grid can be monitored and guaranteed without loss to any image quality.
ERIC Educational Resources Information Center
Dessy, Raymond E.
1982-01-01
Local area networks are common communication conduits allowing various terminals, computers, discs, printers, and other electronic devices to intercommunicate over short distances. Discusses the vocabulary of such networks including RS-232C point-to-point and IEEE-488 multidrop protocols; error detection; message packets; multiplexing; star, ring,…
Modified Dynamic Decode-and-Forward Relaying Protocol for Type II Relay in LTE-Advanced and Beyond
Nam, Sung Sik; Alouini, Mohamed-Slim; Choi, Seyeong
2016-01-01
In this paper, we propose a modified dynamic decode-and-forward (MoDDF) relaying protocol to meet the critical requirements for user equipment (UE) relays in next-generation cellular systems (e.g., LTE-Advanced and beyond). The proposed MoDDF realizes the fast jump-in relaying and the sequential decoding with an application of random codeset to encoding and re-encoding process at the source and the multiple UE relays, respectively. A subframe-by-subframe decoding based on the accumulated (or buffered) messages is employed to achieve energy, information, or mixed combining. Finally, possible early termination of decoding at the end user can lead to the higher spectral efficiency and more energy saving by reducing the frequency of redundant subframe transmission and decoding. These attractive features eliminate the need of directly exchanging control messages between multiple UE relays and the end user, which is an important prerequisite for the practical UE relay deployment. PMID:27898712
Modified Dynamic Decode-and-Forward Relaying Protocol for Type II Relay in LTE-Advanced and Beyond.
Nam, Sung Sik; Alouini, Mohamed-Slim; Choi, Seyeong
2016-01-01
In this paper, we propose a modified dynamic decode-and-forward (MoDDF) relaying protocol to meet the critical requirements for user equipment (UE) relays in next-generation cellular systems (e.g., LTE-Advanced and beyond). The proposed MoDDF realizes the fast jump-in relaying and the sequential decoding with an application of random codeset to encoding and re-encoding process at the source and the multiple UE relays, respectively. A subframe-by-subframe decoding based on the accumulated (or buffered) messages is employed to achieve energy, information, or mixed combining. Finally, possible early termination of decoding at the end user can lead to the higher spectral efficiency and more energy saving by reducing the frequency of redundant subframe transmission and decoding. These attractive features eliminate the need of directly exchanging control messages between multiple UE relays and the end user, which is an important prerequisite for the practical UE relay deployment.
An improved PRoPHET routing protocol in delay tolerant network.
Han, Seung Deok; Chung, Yun Won
2015-01-01
In delay tolerant network (DTN), an end-to-end path is not guaranteed and packets are delivered from a source node to a destination node via store-carry-forward based routing. In DTN, a source node or an intermediate node stores packets in buffer and carries them while it moves around. These packets are forwarded to other nodes based on predefined criteria and finally are delivered to a destination node via multiple hops. In this paper, we improve the dissemination speed of PRoPHET (probability routing protocol using history of encounters and transitivity) protocol by employing epidemic protocol for disseminating message m, if forwarding counter and hop counter values are smaller than or equal to the threshold values. The performance of the proposed protocol was analyzed from the aspect of delivery probability, average delay, and overhead ratio. Numerical results show that the proposed protocol can improve the delivery probability, average delay, and overhead ratio of PRoPHET protocol by appropriately selecting the threshold forwarding counter and threshold hop counter values.
Sandia Compact Sensor Node (SCSN) v. 1.0
DOE Office of Scientific and Technical Information (OSTI.GOV)
HARRINGTON, JOHN
2009-01-07
The SCSN communication protocol is implemented in software and incorporates elements of Frequency Division Multiple Access (FDMA), Time Division Multiple Access (TDMA), and Carrier Sense Multiple Access (CSMA) to reduce radio message collisions, latency, and power consumption. Alarm messages are expeditiously routed to a central node as a 'star' network with minimum overhead. Other messages can be routed along network links between any two nodes so that peer-to-peer communication is possible. Broadcast messages can be composed that flood the entire network or just specific portions with minimal radio traffic and latency. Two-way communication with sensor nodes, which sleep most ofmore » the time to conserve battery life, can occur at seven second intervals. SCSN software also incorporates special algorithms to minimize superfluous radio traffic that can result from excessive intrusion alarm messages. A built-in seismic detector is implemented with a geophone and software that distinguishes between pedestrian and vehicular targets. Other external sensors can be attached to a SCSN using supervised interface lines that are controlled by software. All software is written in the ANSI C language for ease of development, maintenance, and portability.« less
de Tolly, Katherine Marianne; Constant, Deborah
2014-02-14
Medical abortion is legal in South Africa but access and acceptability are hampered by the current protocol requiring a follow-up visit to assess abortion completion. To assess the feasibility and efficacy of information and follow-up provided via mobile phone after medical abortion in a randomized controlled trial (RCT). Mobile phones were used in three ways in the study: (1) coaching women through medical abortion using short message service (SMS; text messages); (2) a questionnaire to assess abortion completion via unstructured supplementary service data (USSD, a protocol used by GSM mobile telephones that allows the user to interact with a server via text-based menus) and the South African mobile instant message and social networking application Mxit; and (3) family planning information via SMS, mobisite and Mxit. A needs and context assessment was done to learn about women's experiences undergoing medical abortion and their use of mobile phones. After development, the mobile interventions were piloted. Recruitment was done by field workers at the clinics. In the RCT, women were interviewed at baseline and exit. Computer logs were also analyzed. All study participants received standard of care at the clinics. In the RCT, 234 women were randomized to the intervention group. Eight did not receive the intervention due to invalid numbers, mis-registration, system failure, or opt-out, leaving 226 participants receiving the full intervention. Of the 226, 190 returned and were interviewed at their clinic follow-up visit. The SMSs were highly acceptable, with 97.9% (186/190) saying that the SMSs helped them through the medical abortion. In terms of mobile phone privacy, 86.3% (202/234) said that it was not likely or possible that someone would see SMSs on their phone, although at exit, 20% (38/190) indicated that they had worried about phone privacy. Having been given training at baseline and subsequently asked via SMS to complete the self-assessment questionnaire, 90.3% (204/226) attempted it, and of those, 86.3% (176/204) reached an endpoint of the questionnaire. For the family planning information, a preference for SMS was indicated by study clients, although the publicly available Mxit/mobisite was heavily used (813,375 pages were viewed) over the study duration. SMS provided a good medium for timed, "push" information that guided and supported women through medical abortion. Women were able to perform a self-assessment questionnaire via mobile phones if provided training and prompted by SMS. Phone privacy needs to be protected in similar settings. This study may contribute to the successful expansion of medical abortion provision aided by mobile phones. Pan African Clinical Trials Registry (PACTR): PACTR201302000427144; http://www.pactr.org/ATMWeb/appmanager/atm/atmregistry?dar=true&tNo=PACTR201302000427144 (Archived by WebCite at http://www.webcitation.org/6N0fnZfzm).
USDA-ARS?s Scientific Manuscript database
Two rapid immunomagnetic separation (IMS) protocols were evaluated to recover 1-2 log CFU/g inoculated E. coli O157:H7 from 30 different commercial, finished compost samples. Both protocols detected E. coli O157:H7 in compost samples; PCR techniques required the removal of inhibitors to reduce poss...
Enhanced, Partially Redundant Emergency Notification System
NASA Technical Reports Server (NTRS)
Pounds, Clark D.
2005-01-01
The Johnson Space Center Emergency Notification System (JENS) software utilizes pre-existing computation and communication infrastructure to augment a prior variable-tone, siren-based, outdoor alarm system, in order to enhance the ability to give notice of emergencies to employees working in multiple buildings. The JENS software includes a component that implements an administrative Web site. Administrators can grant and deny access to the administrative site and to an originator Web site that enables authorized individuals to quickly compose and issue alarms. The originator site also facilitates maintenance and review of alarms already issued. A custom client/server application program enables an originator to notify every user who is logged in on a Microsoft Windows-based desktop computer by means of a pop-up message that interrupts, but does not disrupt, the user s work. Alternatively or in addition, the originator can send an alarm message to recipients on an e-mail distribution list and/or can post the notice on an internal Web site. An alarm message can consist of (1) text describing the emergency and suggesting a course of action and (2) a replica of the corresponding audible outdoor alarm.
Callender, Chishinga; Thompson, Deborah
2018-06-19
Obesity prevalence is greater in African American girls than their non-Hispanic white peers. Obesity prevention programs are needed to help parents create an obesity-preventive home environment. This paper reports the feasibility and acceptability of a mHealth child obesity prevention program consisting of self-determination theory-grounded text messages promoting a healthy home food and activity environment to parents of 8⁻10-year-old African American girls. A one-group design with baseline and immediate post-intervention assessments was utilized. Mothers ( n = 19) received 36 text messages over 12 weeks. Feasibility and acceptability were assessed through staff logs and post-intervention surveys and an interview. Feasibility and acceptability criteria were met. Mothers reported positive reactions to the intervention; they liked the program, used the information, and all but one gave it an A or B grade. The majority made changes and shared the text messages with others. This research provides evidence that a theoretically grounded mHealth child obesity prevention intervention is feasible and acceptable to parents of African American girls.
NASA Technical Reports Server (NTRS)
Muhsin, Mansour; Walters, Ian
2004-01-01
The Document Concurrence System is a combination of software modules for routing users expressions of concurrence with documents. This system enables determination of the current status of concurrences and eliminates the need for the prior practice of manually delivering paper documents to all persons whose approvals were required. This system runs on a server, and participants gain access via personal computers equipped with Web-browser and electronic-mail software. A user can begin a concurrence routing process by logging onto an administration module, naming the approvers and stating the sequence for routing among them, and attaching documents. The server then sends a message to the first person on the list. Upon concurrence by the first person, the system sends a message to the second person, and so forth. A person on the list indicates approval, places the documents on hold, or indicates disapproval, via a Web-based module. When the last person on the list has concurred, a message is sent to the initiator, who can then finalize the process through the administration module. A background process running on the server identifies concurrence processes that are overdue and sends reminders to the appropriate persons.
System approach to distributed sensor management
NASA Astrophysics Data System (ADS)
Mayott, Gregory; Miller, Gordon; Harrell, John; Hepp, Jared; Self, Mid
2010-04-01
Since 2003, the US Army's RDECOM CERDEC Night Vision Electronic Sensor Directorate (NVESD) has been developing a distributed Sensor Management System (SMS) that utilizes a framework which demonstrates application layer, net-centric sensor management. The core principles of the design support distributed and dynamic discovery of sensing devices and processes through a multi-layered implementation. This results in a sensor management layer that acts as a System with defined interfaces for which the characteristics, parameters, and behaviors can be described. Within the framework, the definition of a protocol is required to establish the rules for how distributed sensors should operate. The protocol defines the behaviors, capabilities, and message structures needed to operate within the functional design boundaries. The protocol definition addresses the requirements for a device (sensors or processes) to dynamically join or leave a sensor network, dynamically describe device control and data capabilities, and allow dynamic addressing of publish and subscribe functionality. The message structure is a multi-tiered definition that identifies standard, extended, and payload representations that are specifically designed to accommodate the need for standard representations of common functions, while supporting the need for feature-based functions that are typically vendor specific. The dynamic qualities of the protocol enable a User GUI application the flexibility of mapping widget-level controls to each device based on reported capabilities in real-time. The SMS approach is designed to accommodate scalability and flexibility within a defined architecture. The distributed sensor management framework and its application to a tactical sensor network will be described in this paper.
Data Fusion of Geographically Dispersed Information: Experience With the Scalable Data Grid
2011-03-01
framework that exposes calls to this HLA interface to registered plug-ins (Figure 2). The SDG exploits this plug-in to intercept and log messages and...implementation and use of the SDG and Hadoop Figure 4. Schematic meshrouter topology. Figure 5. Factored Meshrouter implementation, with application-specific...communications primitives. Yao, Ward, & Davis 92 ITEA Journal show promise for the T&E environments. It reported on experiments implementing the SDG and on
Hazard of deceptive advertising of athletic footwear.
Robbins, S; Waked, E
1997-12-01
Athletic footwear are associated with frequent injury that are thought to result from repetitive impact. No scientific data suggest they protect well. Expensive athletic shoes are deceptively advertised to safeguard well through "cushioning impact", yet account for 123% greater injury frequency than the cheapest ones. This study tested the hypothesis that deceptive advertising creates a false sense of security with users of expensive athletic shoes, inducing attenuation of impact moderating behaviour, increased impact, and injury. Fifteen young healthy male volunteers confronted four surfaces: a bare force moment platform, and three with this platform covered by identical shoe sole material made to appear different and advertised divergently. Advertising messages suggested superior impact absorption and protection (deceptive message), poor impact absorption and high injury risk (warning message), and unknown impact absorption and safety (neutral message). Ground reaction forces were recorded for 10 barefoot footfalls, according to a protocol requiring stepping forward from perch to a surface 4.5 cm below. Impact varied as a function of advertising message (p < 0.001). Deceptive message equalled neutral message in eliciting higher impact than the warning message and the bare platform. Differences grew with repetitions (p < 0.001). These data provide a plausible mechanism explaining higher injury frequency in users of expensive athletic shoes. This is the first report to suggest: (1) deceptive advertising of protective devices may represent a public health hazard and may have to be eliminated presumably through regulation; (2) a tendency in humans to be less cautious when using new devices of unknown benefit because of overly positive attitudes associated with new technology and novel devices.
Hazard of deceptive advertising of athletic footwear.
Robbins, S; Waked, E
1997-01-01
OBJECTIVES: Athletic footwear are associated with frequent injury that are thought to result from repetitive impact. No scientific data suggest they protect well. Expensive athletic shoes are deceptively advertised to safeguard well through "cushioning impact", yet account for 123% greater injury frequency than the cheapest ones. This study tested the hypothesis that deceptive advertising creates a false sense of security with users of expensive athletic shoes, inducing attenuation of impact moderating behaviour, increased impact, and injury. METHODS: Fifteen young healthy male volunteers confronted four surfaces: a bare force moment platform, and three with this platform covered by identical shoe sole material made to appear different and advertised divergently. Advertising messages suggested superior impact absorption and protection (deceptive message), poor impact absorption and high injury risk (warning message), and unknown impact absorption and safety (neutral message). Ground reaction forces were recorded for 10 barefoot footfalls, according to a protocol requiring stepping forward from perch to a surface 4.5 cm below. RESULTS: Impact varied as a function of advertising message (p < 0.001). Deceptive message equalled neutral message in eliciting higher impact than the warning message and the bare platform. Differences grew with repetitions (p < 0.001). CONCLUSIONS: These data provide a plausible mechanism explaining higher injury frequency in users of expensive athletic shoes. This is the first report to suggest: (1) deceptive advertising of protective devices may represent a public health hazard and may have to be eliminated presumably through regulation; (2) a tendency in humans to be less cautious when using new devices of unknown benefit because of overly positive attitudes associated with new technology and novel devices. PMID:9429006
Edwards, David P; Gilroy, James J; Woodcock, Paul; Edwards, Felicity A; Larsen, Trond H; Andrews, David J R; Derhé, Mia A; Docherty, Teegan D S; Hsu, Wayne W; Mitchell, Simon L; Ota, Takahiro; Williams, Leah J; Laurance, William F; Hamer, Keith C; Wilcove, David S
2014-01-01
Selective logging is a major driver of rainforest degradation across the tropics. Two competing logging strategies are proposed to meet timber demands with the least impact on biodiversity: land sharing, which combines timber extraction with biodiversity protection across the concession; and land sparing, in which higher intensity logging is combined with the protection of intact primary forest reserves. We evaluate these strategies by comparing the abundances and species richness of birds, dung beetles and ants in Borneo, using a protocol that allows us to control for both timber yield and net profit across strategies. Within each taxonomic group, more species had higher abundances with land-sparing than land-sharing logging, and this translated into significantly higher species richness within land-sparing concessions. Our results are similar when focusing only on species found in primary forest and restricted in range to Sundaland, and they are independent of the scale of sampling. For each taxonomic group, land-sparing logging was the most promising strategy for maximizing the biological value of logging operations. © 2013 John Wiley & Sons Ltd.
Firewall Traversal for CORBA Applications Using an Implementation of Bidirectional IIOP in MICO
NASA Technical Reports Server (NTRS)
Griffin, Robert I.; Lopez, Isaac (Technical Monitor)
2002-01-01
The Object Management Group (OMG) has added specifications to the General Inter-ORB Protocol (GIOP 1.2), specifically the Internet Inter-ORB Protocol (IIOP 1.2), that allow servers and clients on opposing sides of a firewall to reverse roles and still communicate freely. This addition to the GIOP specifications is referred to as Bidirectional GIOP. The implementation of these specifications as applied to communication over TCP/IP connections is referred to as 'Bidirectional Internet Inter-ORB Protocol' or BiDirIIOP. This paper details the implementation and testing of the BiDirIIOP Specification in an open source ORB, MICO, that did not previously support Bidirectional GIOP. It also provides simple contextual information and a description of the OMG GIOP/IIOP messaging protocols.
Tsunami.gov: NOAA's Tsunami Information Portal
NASA Astrophysics Data System (ADS)
Shiro, B.; Carrick, J.; Hellman, S. B.; Bernard, M.; Dildine, W. P.
2014-12-01
We present the new Tsunami.gov website, which delivers a single authoritative source of tsunami information for the public and emergency management communities. The site efficiently merges information from NOAA's Tsunami Warning Centers (TWC's) by way of a comprehensive XML feed called Tsunami Event XML (TEX). The resulting unified view allows users to quickly see the latest tsunami alert status in geographic context without having to understand complex TWC areas of responsibility. The new site provides for the creation of a wide range of products beyond the traditional ASCII-based tsunami messages. The publication of modern formats such as Common Alerting Protocol (CAP) can drive geographically aware emergency alert systems like FEMA's Integrated Public Alert and Warning System (IPAWS). Supported are other popular information delivery systems, including email, text messaging, and social media updates. The Tsunami.gov portal allows NOAA staff to easily edit content and provides the facility for users to customize their viewing experience. In addition to access by the public, emergency managers and government officials may be offered the capability to log into the portal for special access rights to decision-making and administrative resources relevant to their respective tsunami warning systems. The site follows modern HTML5 responsive design practices for optimized use on mobile as well as non-mobile platforms. It meets all federal security and accessibility standards. Moving forward, we hope to expand Tsunami.gov to encompass tsunami-related content currently offered on separate websites, including the NOAA Tsunami Website, National Tsunami Hazard Mitigation Program, NOAA Center for Tsunami Research, National Geophysical Data Center's Tsunami Database, and National Data Buoy Center's DART Program. This project is part of the larger Tsunami Information Technology Modernization Project, which is consolidating the software architectures of NOAA's existing TWC's into a single system. We welcome your feedback to help Tsunami.gov become an effective public resource for tsunami information and a medium to enable better global tsunami warning coordination.
Reiss, Rebecca A; Guerra, Peter; Makhnin, Oleg
2016-01-01
Chlorinated solvent contamination of potable water supplies is a serious problem worldwide. Biostimulation protocols can successfully remediate chlorinated solvent contamination through enhanced reductive dechlorination pathways, however the process is poorly understood and sometimes stalls creating a more serious problem. Whole metagenome techniques have the potential to reveal details of microbial community changes induced by biostimulation. Here we compare the metagenome of a tetrachloroethene contaminated Environmental Protection Agency Superfund Site before and after the application of biostimulation protocols. Environmental DNA was extracted from uncultured microbes that were harvested by on-site filtration of groundwater one month prior to and five months after the injection of emulsified vegetable oil, nutrients, and hydrogen gas bioamendments. Pair-end libraries were prepared for high-throughput DNA sequencing and 90 basepairs from both ends of randomly fragmented 400 basepair DNA fragments were sequenced. Over 31 millions reads were annotated with Metagenome Rapid Annotation using Subsystem Technology representing 32 prokaryotic phyla, 869 genera, and 3,181 species. A 3.6 log 2 fold increase in biomass as measured by DNA yield per mL water was measured, but there was a 9% decrease in the number of genera detected post-remediation. We apply Bayesian statistical methods to assign false discovery rates to fold-change abundance data and use Zipf's power law to filter genera with low read counts. Plotting the log-rank against the log-fold-change facilitates the visualization of the changes in the community in response to the enhanced reductive dechlorination protocol. Members of the Archaea domain increased 4.7 log 2 fold, dominated by methanogens. Prior to remediation, classes Alphaproteobacteria and Betaproteobacteria dominated the community but exhibit significant decreases five months after biostimulation. Geobacter and Sulfurospirillum replace " Sideroxydans " and Burkholderia as the most abundant genera. As a result of biostimulation, Deltaproteobacteria and Epsilonproteobacteria capable of dehalogenation, iron and sulfate reduction, and sulfur oxidation increase. Matches to thermophilic, haloalkane respiring archaea is evidence for additional species involved in biodegradation of chlorinated solvents. Additionally, potentially pathogenic bacteria increase, indicating that there may be unintended consequences of bioremediation.
Specification and Verification of Communication Protocols in AFFIRM Using State Transition Models.
1981-03-01
NewQueueOfftcket; theorem Pendnglnvariant, Remove(Pending(s)) = NewQueueOfPacket; Since the implementation is in keeping with the specification, its salp ...another communication line. The communication lines are unreliable; messages traveling in either direction can be lost, reordered, corrupted, or
Kumar, Pardeep; Lee, Sang-Gon; Lee, Hoon-Jae
2012-01-01
A wireless medical sensor network (WMSN) can sense humans’ physiological signs without sacrificing patient comfort and transmit patient vital signs to health professionals’ hand-held devices. The patient physiological data are highly sensitive and WMSNs are extremely vulnerable to many attacks. Therefore, it must be ensured that patients’ medical signs are not exposed to unauthorized users. Consequently, strong user authentication is the main concern for the success and large scale deployment of WMSNs. In this regard, this paper presents an efficient, strong authentication protocol, named E-SAP, for healthcare application using WMSNs. The proposed E-SAP includes: (1) a two-factor (i.e., password and smartcard) professional authentication; (2) mutual authentication between the professional and the medical sensor; (3) symmetric encryption/decryption for providing message confidentiality; (4) establishment of a secure session key at the end of authentication; and (5) professionals can change their password. Further, the proposed protocol requires three message exchanges between the professional, medical sensor node and gateway node, and achieves efficiency (i.e., low computation and communication cost). Through the formal analysis, security analysis and performance analysis, we demonstrate that E-SAP is more secure against many practical attacks, and allows a tradeoff between the security and the performance cost for healthcare application using WMSNs. PMID:22438729
Kumar, Pardeep; Lee, Sang-Gon; Lee, Hoon-Jae
2012-01-01
A wireless medical sensor network (WMSN) can sense humans' physiological signs without sacrificing patient comfort and transmit patient vital signs to health professionals' hand-held devices. The patient physiological data are highly sensitive and WMSNs are extremely vulnerable to many attacks. Therefore, it must be ensured that patients' medical signs are not exposed to unauthorized users. Consequently, strong user authentication is the main concern for the success and large scale deployment of WMSNs. In this regard, this paper presents an efficient, strong authentication protocol, named E-SAP, for healthcare application using WMSNs. The proposed E-SAP includes: (1) a two-factor (i.e., password and smartcard) professional authentication; (2) mutual authentication between the professional and the medical sensor; (3) symmetric encryption/decryption for providing message confidentiality; (4) establishment of a secure session key at the end of authentication; and (5) professionals can change their password. Further, the proposed protocol requires three message exchanges between the professional, medical sensor node and gateway node, and achieves efficiency (i.e., low computation and communication cost). Through the formal analysis, security analysis and performance analysis, we demonstrate that E-SAP is more secure against many practical attacks, and allows a tradeoff between the security and the performance cost for healthcare application using WMSNs.
Bidgood, W D; alSafadi, Y; Tucker, M; Prior, F; Hagan, G; Mattison, J E
1998-02-01
The decision to use Digital Imaging and Communications in Medicine (DICOM), Health Level 7 (HL7), a common object broker such as the Common Object Request Brokering Architecture (CORBA) or ActiveX (Microsoft Corp, Redmond, WA) or any other protocol for the transfer of DICOM data depends on the requirements of a particular implementation. The selection of protocol is independent of the information model. Our goal as message standards developers is to design a data interchange infrastructure that will faithfully convey the computer-based patient record and make it available to authorized health care providers when and where it is needed for patient care. DICOM accurately and expressively represents the clinically significant properties of images and the semantics of image-related information. The DICOM data model is small and well-defined. The model can be expressed in Standard Generalized Markup Language (SGML) or Object Management Group Interface Definition Language or other common syntax-and can be implemented using any reliable communications protocol. Therefore our opinion is that the DICOM semantic data model should serve as the basis for a logically equivalent set of specifications in HL7, CORBA, ActiveX, and SGML for the interchange of biomedical images and image-related information.
Cook, Timothy Wayne; Cavalini, Luciana Tricai
2016-01-01
Objectives To present the technical background and the development of a procedure that enriches the semantics of Health Level Seven version 2 (HL7v2) messages for software-intensive systems in telemedicine trauma care. Methods This study followed a multilevel model-driven approach for the development of semantically interoperable health information systems. The Pre-Hospital Trauma Life Support (PHTLS) ABCDE protocol was adopted as the use case. A prototype application embedded the semantics into an HL7v2 message as an eXtensible Markup Language (XML) file, which was validated against an XML schema that defines constraints on a common reference model. This message was exchanged with a second prototype application, developed on the Mirth middleware, which was also used to parse and validate both the original and the hybrid messages. Results Both versions of the data instance (one pure XML, one embedded in the HL7v2 message) were equally validated and the RDF-based semantics recovered by the receiving side of the prototype from the shared XML schema. Conclusions This study demonstrated the semantic enrichment of HL7v2 messages for intensive-software telemedicine systems for trauma care, by validating components of extracts generated in various computing environments. The adoption of the method proposed in this study ensures the compliance of the HL7v2 standard in Semantic Web technologies. PMID:26893947
Home Energy Management System - VOLTTRON Integration
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zandi, Helia
In most Home Energy Management Systems (HEMS) available in the market, different devices running different communication protocols cannot interact with each other and exchange information. As a result of this integration, the information about different devices running different communication protocol can be accessible by other agents and devices running on VOLTTRON platform. The integration process can be used by any HEMS available in the market regardless of the programming language they use. If the existing HEMS provides an Application Programming Interface (API) based on the RESTFul architecture, that API can be used for integration. Our candidate HEMS in this projectmore » is home-assistant (Hass). An agent is implemented which can communicate with the Hass API and receives information about the devices loaded on the API. The agent publishes the information it receives on the VOLTTRON message bus so other agents can have access to this information. On the other side, for each type of devices, an agent is implemented such as Climate Agent, Lock Agent, Switch Agent, Light Agent, etc. Each of these agents is subscribed to the messages published on the message bus about their associated devices. These agents can also change the status of the devices by sending appropriate service calls to the API. Other agents and services on the platform can also access this information and coordinate their decision-making process based on this information.« less
Denehy, Mel; Crawford, Gemma; Leavy, Justine; Nimmo, Lauren; Jancey, Jonine
2016-01-01
Introduction Worldwide, children under the age of 5 years are at particular risk of drowning. Responding to this need requires the development of evidence-informed drowning prevention strategies. Historically, drowning prevention strategies have included denying access, learning survival skills and providing supervision, as well as education and information which includes the use of mass media. Interventions underpinned by behavioural theory and formative evaluation tend to be more effective, yet few practical examples exist in the drowning and/or injury prevention literature. The Health Belief Model and Social Cognitive Theory will be used to explore participants' perspectives regarding proposed mass media messaging. This paper describes a qualitative protocol to undertake formative research to develop theory-based messages for a child drowning prevention campaign. Methods and analysis The primary data source will be focus group interviews with parents and caregivers of children under 5 years of age in metropolitan and regional Western Australia. Qualitative content analysis will be used to analyse the data. Ethics and dissemination This study will contribute to the drowning prevention literature to inform the development of future child drowning prevention mass media campaigns. Findings from the study will be disseminated to practitioners, policymakers and researchers via international conferences, peer and non-peer-reviewed journals and evidence summaries. The study was submitted and approved by the Curtin University Human Research Ethics Committee. PMID:27207621
Design of SIP transformation server for efficient media negotiation
NASA Astrophysics Data System (ADS)
Pack, Sangheon; Paik, Eun Kyoung; Choi, Yanghee
2001-07-01
Voice over IP (VoIP) is one of the advanced services supported by the next generation mobile communication. VoIP should support various media formats and terminals existing together. This heterogeneous environment may prevent diverse users from establishing VoIP sessions among them. To solve the problem an efficient media negotiation mechanism is required. In this paper, we propose the efficient media negotiation architecture using the transformation server and the Intelligent Location Server (ILS). The transformation server is an extended Session Initiation Protocol (SIP) proxy server. It can modify an unacceptable session INVITE message into an acceptable one using the ILS. The ILS is a directory server based on the Lightweight Directory Access Protocol (LDAP) that keeps userí*s location information and available media information. The proposed architecture can eliminate an unnecessary response and re-INVITE messages of the standard SIP architecture. It takes only 1.5 round trip times to negotiate two different media types while the standard media negotiation mechanism takes 2.5 round trip times. The extra processing time in message handling is negligible in comparison to the reduced round trip time. The experimental results show that the session setup time in the proposed architecture is less than the setup time in the standard SIP. These results verify that the proposed media negotiation mechanism is more efficient in solving diversity problems.
Distributed reservation control protocols for random access broadcasting channels
NASA Technical Reports Server (NTRS)
Greene, E. P.; Ephremides, A.
1981-01-01
Attention is given to a communication network consisting of an arbitrary number of nodes which can communicate with each other via a time-division multiple access (TDMA) broadcast channel. The reported investigation is concerned with the development of efficient distributed multiple access protocols for traffic consisting primarily of single packet messages in a datagram mode of operation. The motivation for the design of the protocols came from the consideration of efficient multiple access utilization of moderate to high bandwidth (4-40 Mbit/s capacity) communication satellite channels used for the transmission of short (1000-10,000 bits) fixed length packets. Under these circumstances, the ratio of roundtrip propagation time to packet transmission time is between 100 to 10,000. It is shown how a TDMA channel can be adaptively shared by datagram traffic and constant bandwidth users such as in digital voice applications. The distributed reservation control protocols described are a hybrid between contention and reservation protocols.
Performance Evaluation of a SLA Negotiation Control Protocol for Grid Networks
NASA Astrophysics Data System (ADS)
Cergol, Igor; Mirchandani, Vinod; Verchere, Dominique
A framework for an autonomous negotiation control protocol for service delivery is crucial to enable the support of heterogeneous service level agreements (SLAs) that will exist in distributed environments. We have first given a gist of our augmented service negotiation protocol to support distinct service elements. The augmentations also encompass related composition of the services and negotiation with several service providers simultaneously. All the incorporated augmentations will enable to consolidate the service negotiation operations for telecom networks, which are evolving towards Grid networks. Furthermore, our autonomous negotiation protocol is based on a distributed multi-agent framework to create an open market for Grid services. Second, we have concisely presented key simulation results of our work in progress. The results exhibit the usefulness of our negotiation protocol for realistic scenarios that involves different background traffic loading, message sizes and traffic flow asymmetry between background and negotiation traffics.
NASA Astrophysics Data System (ADS)
Kao, Shih-Hung; Lin, Jason; Tsai, Chia-Wei; Hwang, Tzonelih
2018-03-01
In early 2009, Xiu et al. (Opt. Commun. 282(2) 333-337 2009) presented a controlled deterministic secure quantum communication (CDSQC) protocol via a newly constructed five-qubit entangled quantum state. Later, Qin et al. (Opt. Commun. 282(13), 2656-2658 2009) pointed out two security loopholes in Xiu et al.'s protocol: (1) A correlation-elicitation (CE) attack can reveal the entire secret message; (2) A leakage of partial information for the receiver is noticed. Then, Xiu et al. (Opt. Commun. 283(2), 344-347 2010) presented a revised CDSQC protocol to remedy the CE attack problem. However, the information leakage problem still remains open. This work proposes a new CDSQC protocol using the same five-qubit entangled state which can work without the above mentioned security problems. Moreover, the Trojan Horse attacks can be automatically avoided without using detecting devices in the new CDSQC.
NASA Astrophysics Data System (ADS)
Kao, Shih-Hung; Lin, Jason; Tsai, Chia-Wei; Hwang, Tzonelih
2018-06-01
In early 2009, Xiu et al. (Opt. Commun. 282(2) 333-337 2009) presented a controlled deterministic secure quantum communication (CDSQC) protocol via a newly constructed five-qubit entangled quantum state. Later, Qin et al. (Opt. Commun. 282(13), 2656-2658 2009) pointed out two security loopholes in Xiu et al.'s protocol: (1) A correlation-elicitation (CE) attack can reveal the entire secret message; (2) A leakage of partial information for the receiver is noticed. Then, Xiu et al. (Opt. Commun. 283(2), 344-347 2010) presented a revised CDSQC protocol to remedy the CE attack problem. However, the information leakage problem still remains open. This work proposes a new CDSQC protocol using the same five-qubit entangled state which can work without the above mentioned security problems. Moreover, the Trojan Horse attacks can be automatically avoided without using detecting devices in the new CDSQC.
Whitford, Heather M; Donnan, Peter T; Symon, Andrew G; Kellett, Gillian; Monteith-Hodge, Ewa; Rauchhaus, Petra; Wyatt, Jeremy C
2012-01-01
To test the reliability, validity, acceptability, and practicality of short message service (SMS) messaging for collection of research data. The studies were carried out in a cohort of recently delivered women in Tayside, Scotland, UK, who were asked about their current infant feeding method and future feeding plans. Reliability was assessed by comparison of their responses to two SMS messages sent 1 day apart. Validity was assessed by comparison of their responses to text questions and the same question administered by phone 1 day later, by comparison with the same data collected from other sources, and by correlation with other related measures. Acceptability was evaluated using quantitative and qualitative questions, and practicality by analysis of a researcher log. Reliability of the factual SMS message gave perfect agreement. Reliabilities for the numerical question were reasonable, with κ between 0.76 (95% CI 0.56 to 0.96) and 0.80 (95% CI 0.59 to 1.00). Validity for data compared with that collected by phone within 24 h (κ =0.92 (95% CI 0.84 to 1.00)) and with health visitor data (κ =0.85 (95% CI 0.73 to 0.97)) was excellent. Correlation validity between the text responses and other related demographic and clinical measures was as expected. Participants found the method a convenient and acceptable way of providing data. For researchers, SMS text messaging provided an easy and functional method of gathering a large volume of data. In this sample and for these questions, SMS was a reliable and valid method for capturing research data.
Donnan, Peter T; Symon, Andrew G; Kellett, Gillian; Monteith-Hodge, Ewa; Rauchhaus, Petra; Wyatt, Jeremy C
2012-01-01
Objective To test the reliability, validity, acceptability, and practicality of short message service (SMS) messaging for collection of research data. Materials and methods The studies were carried out in a cohort of recently delivered women in Tayside, Scotland, UK, who were asked about their current infant feeding method and future feeding plans. Reliability was assessed by comparison of their responses to two SMS messages sent 1 day apart. Validity was assessed by comparison of their responses to text questions and the same question administered by phone 1 day later, by comparison with the same data collected from other sources, and by correlation with other related measures. Acceptability was evaluated using quantitative and qualitative questions, and practicality by analysis of a researcher log. Results Reliability of the factual SMS message gave perfect agreement. Reliabilities for the numerical question were reasonable, with κ between 0.76 (95% CI 0.56 to 0.96) and 0.80 (95% CI 0.59 to 1.00). Validity for data compared with that collected by phone within 24 h (κ =0.92 (95% CI 0.84 to 1.00)) and with health visitor data (κ =0.85 (95% CI 0.73 to 0.97)) was excellent. Correlation validity between the text responses and other related demographic and clinical measures was as expected. Participants found the method a convenient and acceptable way of providing data. For researchers, SMS text messaging provided an easy and functional method of gathering a large volume of data. Conclusion In this sample and for these questions, SMS was a reliable and valid method for capturing research data. PMID:22539081
Internetting tactical security sensor systems
NASA Astrophysics Data System (ADS)
Gage, Douglas W.; Bryan, W. D.; Nguyen, Hoa G.
1998-08-01
The Multipurpose Surveillance and Security Mission Platform (MSSMP) is a distributed network of remote sensing packages and control stations, designed to provide a rapidly deployable, extended-range surveillance capability for a wide variety of military security operations and other tactical missions. The baseline MSSMP sensor suite consists of a pan/tilt unit with video and FLIR cameras and laser rangefinder. With an additional radio transceiver, MSSMP can also function as a gateway between existing security/surveillance sensor systems such as TASS, TRSS, and IREMBASS, and IP-based networks, to support the timely distribution of both threat detection and threat assessment information. The MSSMP system makes maximum use of Commercial Off The Shelf (COTS) components for sensing, processing, and communications, and of both established and emerging standard communications networking protocols and system integration techniques. Its use of IP-based protocols allows it to freely interoperate with the Internet -- providing geographic transparency, facilitating development, and allowing fully distributed demonstration capability -- and prepares it for integration with the IP-based tactical radio networks that will evolve in the next decade. Unfortunately, the Internet's standard Transport layer protocol, TCP, is poorly matched to the requirements of security sensors and other quasi- autonomous systems in being oriented to conveying a continuous data stream, rather than discrete messages. Also, its canonical 'socket' interface both conceals short losses of communications connectivity and simply gives up and forces the Application layer software to deal with longer losses. For MSSMP, a software applique is being developed that will run on top of User Datagram Protocol (UDP) to provide a reliable message-based Transport service. In addition, a Session layer protocol is being developed to support the effective transfer of control of multiple platforms among multiple control stations.
Fault-tolerant quantum blind signature protocols against collective noise
NASA Astrophysics Data System (ADS)
Zhang, Ming-Hui; Li, Hui-Fang
2016-10-01
This work proposes two fault-tolerant quantum blind signature protocols based on the entanglement swapping of logical Bell states, which are robust against two kinds of collective noises: the collective-dephasing noise and the collective-rotation noise, respectively. Both of the quantum blind signature protocols are constructed from four-qubit decoherence-free (DF) states, i.e., logical Bell qubits. The initial message is encoded on the logical Bell qubits with logical unitary operations, which will not destroy the anti-noise trait of the logical Bell qubits. Based on the fundamental property of quantum entanglement swapping, the receiver simply performs two Bell-state measurements (rather than four-qubit joint measurements) on the logical Bell qubits to verify the signature, which makes the protocols more convenient in a practical application. Different from the existing quantum signature protocols, our protocols can offer the high fidelity of quantum communication with the employment of logical qubits. Moreover, we hereinafter prove the security of the protocols against some individual eavesdropping attacks, and we show that our protocols have the characteristics of unforgeability, undeniability and blindness.
ERIC Educational Resources Information Center
Tennant, Roy
1992-01-01
Explains how users can find and access information resources available on the Internet. Highlights include network information centers (NICs); lists, both formal and informal; computer networking protocols, including international standards; electronic mail; remote log-in; and file transfer. (LRW)
Gawaziuk, J P; Alfa, M J; Olson, N; Logsetty, S
2014-05-01
This study assesses the feasibility of using the Versajet™ system (VJS) on an inoculated pork hock (PH) skin surface sequentially for 8 days with daily cleaning and intermediate-level disinfection (ILD). Daily, PHs were inoculated with bacteria suspended in artificial test soil (ATS). An ILD protocol with accelerated hydrogen peroxide (AHP, OxivirTB(®)) was employed to clean and disinfect the VJS between debridements. PH skin contains 6.1-6.8×10(6)cfu/cm(2) bacteria. Bacterial counts in the handpiece and discharge hoses immediately after debridement of the PHs, and before cleaning, increased throughout the study period (5.19-6.43log10cfu/mL). Cleaning with the ILD protocol was reduced bacterial counts on the VJS by 6-log. Protein, a surrogate marker of organic contamination, was also reduced post-cleaning and ILD. Compared to a maximum post-debridement level of protein (57.9 μg/mL) obtained before ILD, VJS protein levels dropped to 9.8 (handpiece) and 13.8 μg/mL (discharge hose). Disinfection of the handpiece and discharge hose after debridement with AHP resulted in a 6-log reduction in bacterial count and 4.2 fold reduction in protein. An ILD protocol with an AHP may be a feasible method for serial skin surface debridements with the VJS for up to eight days. Copyright © 2013 Elsevier Ltd and ISBI. All rights reserved.
Developing a Complete and Effective ACT-R Architecture
2008-01-01
of computational primitives , as contrasted with the predominant “one-off” and “grab-bag” cognitive models in the field. These architectures have...transport/ semaphore protocols connected via a glue script. Both protocols rely on the fact that file rename and file remove operations are atomic...the Trial Log file until just prior to processing the next input request. Thus, to perform synchronous identifications it is necessary to run an
Scalability enhancement of AODV using local link repairing
NASA Astrophysics Data System (ADS)
Jain, Jyoti; Gupta, Roopam; Bandhopadhyay, T. K.
2014-09-01
Dynamic change in the topology of an ad hoc network makes it difficult to design an efficient routing protocol. Scalability of an ad hoc network is also one of the important criteria of research in this field. Most of the research works in ad hoc network focus on routing and medium access protocols and produce simulation results for limited-size networks. Ad hoc on-demand distance vector (AODV) is one of the best reactive routing protocols. In this article, modified routing protocols based on local link repairing of AODV are proposed. Method of finding alternate routes for next-to-next node is proposed in case of link failure. These protocols are beacon-less, means periodic hello message is removed from the basic AODV to improve scalability. Few control packet formats have been changed to accommodate suggested modification. Proposed protocols are simulated to investigate scalability performance and compared with basic AODV protocol. This also proves that local link repairing of proposed protocol improves scalability of the network. From simulation results, it is clear that scalability performance of routing protocol is improved because of link repairing method. We have tested protocols for different terrain area with approximate constant node densities and different traffic load.
Code of Federal Regulations, 2013 CFR
2013-10-01
... End Of Message (EOM) Codes. (1) The Preamble and EAS Codes must use Audio Frequency Shift Keying at a rate of 520.83 bits per second to transmit the codes. Mark frequency is 2083.3 Hz and space frequency... Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL EMERGENCY ALERT SYSTEM (EAS) Equipment Requirements § 11...
Code of Federal Regulations, 2014 CFR
2014-10-01
... End Of Message (EOM) Codes. (1) The Preamble and EAS Codes must use Audio Frequency Shift Keying at a rate of 520.83 bits per second to transmit the codes. Mark frequency is 2083.3 Hz and space frequency... Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL EMERGENCY ALERT SYSTEM (EAS) Equipment Requirements § 11...
Code of Federal Regulations, 2010 CFR
2010-10-01
... End Of Message (EOM) Codes. (1) The Preamble and EAS Codes must use Audio Frequency Shift Keying at a rate of 520.83 bits per second to transmit the codes. Mark frequency is 2083.3 Hz and space frequency... Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL EMERGENCY ALERT SYSTEM (EAS) Equipment Requirements § 11...
Code of Federal Regulations, 2012 CFR
2012-10-01
... End Of Message (EOM) Codes. (1) The Preamble and EAS Codes must use Audio Frequency Shift Keying at a rate of 520.83 bits per second to transmit the codes. Mark frequency is 2083.3 Hz and space frequency... Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL EMERGENCY ALERT SYSTEM (EAS) Equipment Requirements § 11...
Code of Federal Regulations, 2011 CFR
2011-10-01
... End Of Message (EOM) Codes. (1) The Preamble and EAS Codes must use Audio Frequency Shift Keying at a rate of 520.83 bits per second to transmit the codes. Mark frequency is 2083.3 Hz and space frequency... Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL EMERGENCY ALERT SYSTEM (EAS) Equipment Requirements § 11...
The Defense Message System and the U.S. Coast Guard
1992-06-01
these mail services, the Internet also provides a File Transfer Protocol (FTP) and remote login between host computers (TELNET) capabilities. 17 [Ref...the Joint Maritime Intelligence Element (JMIE), Zincdust, and Emerald . [Ref. 27] 4. Secure Data Network The Coast Guard’s Secure Data Network (SDN
Steganography and Cryptography Inspired Enhancement of Introductory Programming Courses
ERIC Educational Resources Information Center
Kortsarts, Yana; Kempner, Yulia
2015-01-01
Steganography is the art and science of concealing communication. The goal of steganography is to hide the very existence of information exchange by embedding messages into unsuspicious digital media covers. Cryptography, or secret writing, is the study of the methods of encryption, decryption and their use in communications protocols.…
Ross, Emily S; Sakakibara, Brodie M; Mackay, Martha H; Whitehurst, David Gt; Singer, Joel; Toma, Mustafa; Corbett, Kitty K; Van Spall, Harriette Gc; Rutherford, Kimberly; Gheorghiu, Bobby; Code, Jillianne; Lear, Scott A
2017-05-23
Acute coronary syndrome, including acute myocardial infarction (AMI), is one of the leading causes for hospitalization, with AMI 30-day readmission rates around 20%. Supporting patient information needs and increasing adherence to recommended self-management behaviors during transition from hospital to home has the potential to improve patient outcomes. Text messages have been effective in other interventions and may be suitable to provide support to patients during this transition period. The goal of this study is to pilot test a text messaging intervention program (Txt2Prevent) that supports acute coronary syndrome patients for 60 days postdischarge. The primary objective is to compare self-management, as measured by the Health Education Impact Questionnaire, between patients receiving only usual care versus those who receive usual care plus the Txt2Prevent intervention. The secondary objectives are to compare medication adherence, health-related quality of life, self-efficacy, health care resource use (and associated costs), all-cause and cardiovascular disease (CVD) readmission, and all-cause and CVD mortality rates between the 2 groups. The third objective is to assess acceptability of the text messaging intervention and feasibility of the study protocol. This is a randomized controlled trial with blinding of outcome assessors. The Txt2Prevent program includes automated text messages to patients about standard follow-up care, general self-management, and healthy living. The content of the text messages was informed by and developed based on interviews with patients, discharge materials, theoretical domains of behavior, and a clinical advisory group composed of patients, clinicians, and researchers. We will recruit 76 consecutive cardiac in-patients with acute coronary syndrome who are treated with either medical management or percutaneous coronary intervention from a hospital in Vancouver, Canada. Assessments at baseline will include measures for demographic information, self-management, health-related quality of life, and self-efficacy. Assessments at follow-up will include medication adherence, readmissions, health care resource use, and mortality in addition to the reassessment of baseline measures. Baseline assessments are done in-person while follow-up assessments are completed through a combination of mailed packages and phone calls. Semistructured interviews with participants will also be performed to better understand participant experiences managing their condition and with the text messages. This study will determine preliminary efficacy, feasibility, and acceptability of the Txt2Prevent program to support acute coronary syndrome patients in the transition to home following hospital discharge. The results of this study will be used to inform a larger trial. ClinicalTrials.gov NCT02336919; https://clinicaltrials.gov/ct2/show/NCT02336919 (Archived by WebCite at http://www.webcitation.org/6qMjEqo6O). ©Emily S Ross, Brodie M Sakakibara, Martha H Mackay, David GT Whitehurst, Joel Singer, Mustafa Toma, Kitty K Corbett, Harriette GC Van Spall, Kimberly Rutherford, Bobby Gheorghiu, Jillianne Code, Scott A Lear. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 23.05.2017.
Performance analysis of replication ALOHA for fading mobile communications channels
NASA Technical Reports Server (NTRS)
Yan, Tsun-Yee; Clare, Loren P.
1986-01-01
This paper describes an ALOHA random access protocol for fading communications channels. A two-state Markov model is used for the channel error process to account for the channel fading memory. The ALOHA protocol is modified to send multiple contiguous copies of a message at each transmission attempt. Both pure and slotted ALOHA channels are considered. The analysis is applicable to fading environments where the channel memory is short compared to the propagation delay. It is shown that smaller delay may be achieved using replications and, in noisy conditions, can also improve throughput.
Comparative Study on Various Authentication Protocols in Wireless Sensor Networks.
Rajeswari, S Raja; Seenivasagam, V
2016-01-01
Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated.
Region-Based Collision Avoidance Beaconless Geographic Routing Protocol in Wireless Sensor Networks.
Lee, JeongCheol; Park, HoSung; Kang, SeokYoon; Kim, Ki-Il
2015-06-05
Due to the lack of dependency on beacon messages for location exchange, the beaconless geographic routing protocol has attracted considerable attention from the research community. However, existing beaconless geographic routing protocols are likely to generate duplicated data packets when multiple winners in the greedy area are selected. Furthermore, these protocols are designed for a uniform sensor field, so they cannot be directly applied to practical irregular sensor fields with partial voids. To prevent the failure of finding a forwarding node and to remove unnecessary duplication, in this paper, we propose a region-based collision avoidance beaconless geographic routing protocol to increase forwarding opportunities for randomly-deployed sensor networks. By employing different contention priorities into the mutually-communicable nodes and the rest of the nodes in the greedy area, every neighbor node in the greedy area can be used for data forwarding without any packet duplication. Moreover, simulation results are given to demonstrate the increased packet delivery ratio and shorten end-to-end delay, rather than well-referred comparative protocols.
Region-Based Collision Avoidance Beaconless Geographic Routing Protocol in Wireless Sensor Networks
Lee, JeongCheol; Park, HoSung; Kang, SeokYoon; Kim, Ki-Il
2015-01-01
Due to the lack of dependency on beacon messages for location exchange, the beaconless geographic routing protocol has attracted considerable attention from the research community. However, existing beaconless geographic routing protocols are likely to generate duplicated data packets when multiple winners in the greedy area are selected. Furthermore, these protocols are designed for a uniform sensor field, so they cannot be directly applied to practical irregular sensor fields with partial voids. To prevent the failure of finding a forwarding node and to remove unnecessary duplication, in this paper, we propose a region-based collision avoidance beaconless geographic routing protocol to increase forwarding opportunities for randomly-deployed sensor networks. By employing different contention priorities into the mutually-communicable nodes and the rest of the nodes in the greedy area, every neighbor node in the greedy area can be used for data forwarding without any packet duplication. Moreover, simulation results are given to demonstrate the increased packet delivery ratio and shorten end-to-end delay, rather than well-referred comparative protocols. PMID:26057037
Comparative Study on Various Authentication Protocols in Wireless Sensor Networks
Rajeswari, S. Raja; Seenivasagam, V.
2016-01-01
Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated. PMID:26881272
Andreoli, Fernando César; Sabogal-Paz, Lyda Patricia
2017-11-15
Removing protozoa from a water supply using coagulation, flocculation, dissolved air flotation (DAF) and filtration on a bench scale was evaluated. Calcium carbonate flocculation with and without immunomagnetic separation (IMS) was chosen to detect Giardia spp. cysts and Cryptosporidium spp. oocysts in the studied samples. The results indicated that DAF removed between 1.31 log and 1.79 log of cysts and between 1.08 log and 1.42 log of oocysts. The performance was lower in filtration, with the removal of 1.07 log-1.44 log for cysts and 0.82 log-0.98 log for oocysts. The coagulation, flocculation, DAF and filtration steps removed more than 2.2 log of cysts and oocysts from the water studied. However, protozoa were detected in the filtered water, even with turbidity values of 0.2 NTU. The recovery of the detection method met the international criteria and was higher when there was no IMS. Including the third acid dissociation in the IMS was critical to improve the performance of the protocol tested. However, there was an increase in the technical and analytical complexity and costs. It was also observed that the efficiency of the treatment was linked to the performance of the selected method of detecting protozoa.
Hodges, Lisa R; Rose, Laura J; O'Connell, Heather; Arduino, Matthew J
2010-05-01
Twelve Laboratory Response Network (LRN) affiliated laboratories participated in a validation study of a macrofoam swab protocol for the recovery, detection, and quantification of viable B. anthracis (BA) Sterne spores from steel surfaces. CDC personnel inoculated steel coupons (26cm(2)) with 1-4 log(10) BA spores and recovered them by sampling with pre-moistened macrofoam swabs. Phase 1 (P1) of the study evaluated swabs containing BA only, while dust and background organisms were added to swabs in Phase 2 (P2) to mimic environmental conditions. Laboratories processed swabs and enumerated spores by culturing eluted swab suspensions and counting colonies with morphology consistent with BA. Processed swabs were placed in enrichment broth, incubated 24h, and cultured by streaking for isolation. Real-time PCR was performed on selected colonies from P2 samples to confirm the identity of BA. Mean percent recovery (%R) of spores from the surface ranged from 15.8 to 31.0% (P1) and from 27.9 to 55.0% (P2). The highest mean percent recovery was 31.0% (sd 10.9%) for P1 (4 log(10) inoculum) and 55.0% (sd 27.6%) for P2 (1 log(10) inoculum). The overall %R was higher for P2 (44.6%) than P1 (24.1%), but the overall reproducibility (between-lab variability) was lower in P2 than in P1 (25.0 vs 16.5%CV, respectively). The overall precision (within-lab variability) was close to identical for P1 and P2 (44.0 and 44.1, respectively), but varied greatly between inoculum levels. The protocol demonstrated linearity in %R over the three inoculum levels and is able to detect between 26 and 5x10(6)spores/26cm(2). Sensitivity as determined by culture was >98.3% for both phases and all inocula, suggesting that the culture method maintains sensitivity in the presence of contaminants. The enrichment broth method alone was less sensitive for sampled swabs (66.4%) during P2, suggesting that the presence of background organisms inhibited growth or isolation of BA from the broth. The addition of real-time PCR testing to the assay increased specificity from >85.4% to >95.0% in P2. Although the precision was low at the 1 log(10) inoculum level in both phases (59.0 and 50.2%), this swab processing protocol, was sensitive, specific, precise, and reproducible at 2-4 log(10)/26cm(2) spore concentrations. Published by Elsevier B.V.
The broadcast classical-quantum capacity region of a two-phase bidirectional relaying channel
NASA Astrophysics Data System (ADS)
Boche, Holger; Cai, Minglai; Deppe, Christian
2015-10-01
We studied a three-node quantum network that enables bidirectional communication between two nodes with a half-duplex relay node for transmitting classical messages. A decode-and-forward protocol is used to perform the communication in two phases. In the first phase, the messages of two nodes are transmitted to the relay node. The capacity of the first phase is well known by previous works. In the second phase, the relay node broadcasts a re-encoded composition to the two nodes. We determine the capacity region of the broadcast phase. To the best of our knowledge, this is the first paper analyzing quantum bidirectional relay networks.
Hmone, Myat Pan; Li, Mu; Alam, Ashraful; Dibley, Michael J
2017-06-28
Myanmar has a high burden of mortality for children aged younger than 5 years in which undernutrition plays a major role. Despite current efforts, the exclusive breastfeeding rate for children under 6 months is only 24%. To date there have been no interventions using mobile phones to improve breastfeeding and other feeding practices in Myanmar. This study aims to implement a breastfeeding promotion intervention using mobile phone text messages in Yangon, Myanmar, and evaluate its impact on breastfeeding practices. M528 is a 2-group parallel-arm randomized controlled trial with 9 months follow-up from recruitment until 6 months post-delivery. A total of 353 pregnant women between 28 and 34 weeks' gestation who had access to a mobile phone and were able to read and write have been recruited from the Central Women's Hospital, Yangon, and allocated randomly to an intervention or control group in a 1:1 ratio. The intervention group received breastfeeding promotional SMS messages 3 times a week while the control group received maternal and child health care messages (excluding breastfeeding-related messages) once a week. The SMS messages were tailored for the women's stage of gestation or the child's age. A formative qualitative study was conducted prior to the trial to inform the study design and text message content. We hypothesize that the exclusive breastfeeding rate in the intervention group will be double that in the control group. The primary outcome is exclusive breastfeeding from birth to 6 months and secondary outcomes are median durations of exclusive breastfeeding and other infant feeding practices. Both primary and secondary outcomes were assessed by monthly phone calls at 1 to 6 months postdelivery in both groups. Participants' delivery status was tracked through text messages, phone calls, and hospital records, and delivery characteristics were assessed 1 month after delivery. Child morbidity and breastfeeding self-efficacy scores were assessed at 1, 3, and 5 months postdelivery. Social desirability was measured at 5 months, and text messages expressing delivery success and user experience were assessed at the end of the study. The targeted 353 pregnant women were recruited between January and March 2015. Baseline data have been collected; SMS messages have been developed and pretested and sent to the women from both groups. Follow-up data collection via phone calls has been completed. Data analysis is being done and results are expected soon. This is the first RCT study examining the effects of mobile text messaging for promoting exclusive breastfeeding. This trial is timely in Myanmar following the telecommunications market opening in 2014. Our results will help determine whether text messaging is an effective and feasible method for promoting appropriate feeding practices and will inform further research to assess how this model could be replicated in the broader community. Australian New Zealand Clinical Trial Registry ACTRN12615000063516; https://anzctr.org.au/Trial/Registration/TrialReview.aspx?id=367704 (Archived by WebCite at http://www.webcitation.org/ 6rGif3l81). ©Myat Pan Hmone, Mu Li, Ashraful Alam, Michael J Dibley. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 28.06.2017.
Analysis of the Impact of Data Normalization on Cyber Event Correlation Query Performance
2012-03-01
2003). Organizations use it in planning, target marketing , decision-making, data analysis, and customer services (Shin, 2003). Organizations that...Following this IP address is a router message sequence number. This is a globally unique number for each router terminal and can range from...Appendix G, invokes the PERL parser for the log files from a particular USAF base, and invokes the CTL file that loads the resultant CSV file into the
Design and implementation of an interactive website to support long-term maintenance of weight loss.
Stevens, Victor J; Funk, Kristine L; Brantley, Phillip J; Erlinger, Thomas P; Myers, Valerie H; Champagne, Catherine M; Bauck, Alan; Samuel-Hodge, Carmen D; Hollis, Jack F
2008-01-25
For most individuals, long-term maintenance of weight loss requires long-term, supportive intervention. Internet-based weight loss maintenance programs offer considerable potential for meeting this need. Careful design processes are required to maximize adherence and minimize attrition. This paper describes the development, implementation and use of a Web-based intervention program designed to help those who have recently lost weight sustain their weight loss over 1 year. The weight loss maintenance website was developed over a 1-year period by an interdisciplinary team of public health researchers, behavior change intervention experts, applications developers, and interface designers. Key interactive features of the final site include social support, self-monitoring, written guidelines for diet and physical activity, links to appropriate websites, supportive tools for behavior change, check-in accountability, tailored reinforcement messages, and problem solving and relapse prevention training. The weight loss maintenance program included a reminder system (automated email and telephone messages) that prompted participants to return to the website if they missed their check-in date. If there was no log-in response to the email and telephone automated prompts, a staff member called the participant. We tracked the proportion of participants with at least one log-in per month, and analyzed log-ins as a result of automated prompts. The mean age of the 348 participants enrolled in an ongoing randomized trial and assigned to use the website was 56 years; 63% were female, and 38% were African American. While weight loss data will not be available until mid-2008, website use remained high during the first year with over 80% of the participants still using the website during month 12. During the first 52 weeks, participants averaged 35 weeks with at least one log-in. Email and telephone prompts appear to be very effective at helping participants sustain ongoing website use. Developing interactive websites is expensive, complex, and time consuming. We found that extensive paper prototyping well in advance of programming and a versatile product manager who could work with project staff at all levels of detail were essential to keeping the development process efficient. clinicaltrials.gov NCT00054925.
Development of a staff recall system for mass casualty incidents using cell phone text messaging.
Epstein, Richard H; Ekbatani, Ali; Kaplan, Javier; Shechter, Ronen; Grunwald, Zvi
2010-03-01
After a mass casualty incident (MCI), rapid mobilization of hospital personnel is required because of an expected surge of victims. Risk assessment of our department's manual phone tree recall system revealed multiple weaknesses that would limit an effective response. Because cell phone use is widespread within the department, we developed and tested a staff recall system, based in our anesthesia information management system (AIMS), using Short Message Service (SMS) text messaging. We sent test text messages to anesthesia staff members' cell phone numbers, determined the distance from their home to the hospital, and stored this information in our AIMS. Latency testing for the time from transmission of SMS test messages from the server to return of an e-mail reply was determined at 2 different times on 2 different dates, 1 of which was a busy holiday weekend, using volunteers within the department. Two unannounced simulated disaster recall drills were conducted, with text messages sent asking for the anticipated time to return to the hospital. A timeline of available staff on site was determined. Reasons for failure to respond to the disaster notification message were tabulated. Latency data were fit by a log-normal distribution with an average of 82 seconds from message transmission to e-mail reply. Replies to the simulated disaster alert were received from approximately 50% of staff, with 16 projecting that they would have been able to be back at the hospital within 30 minutes on both dates. There would have been 21 and 23 staff in-house at 30 minutes, and 32 and 37 staff in-house at 60 minutes on the first and second test date, respectively, including in-house staff. Of the nonresponders to the alert, 48% indicated that their cell phone was not with them or was turned off, whereas 22% missed the message. Our SMS staff recall system is likely to be able to rapidly mobilize sufficient numbers of anesthesia personnel in response to an MCI, but actual performance cannot be predicted with confidence. Using our AIMS as the source for contact information and from which to send messages was simple, inexpensive, and easy to implement. Updating contact information, periodic testing, and analysis of responses to simulated disaster alerts are essential for the effective functioning of such a system. However, maintenance of alternative methods of communication is recommended, because there may be more significant message transmission delays and failures during an actual MCI, and not all staff will receive the text message in a timely fashion.
Cottrell, Elizabeth; Cox, Tracey; O'Connell, Phil; Chambers, Ruth
2015-01-01
Objectives To establish patient and professional user satisfaction with the Advice & Interactive Messaging (AIM) for Health programme delivered using a mobile phone-based, simple telehealth intervention, ‘Florence’. Design A service evaluation using data extracted from Florence and from a professional user electronic survey. Setting 425 primary care practices across 31 Clinical Commissioning Groups in England. Participants 3381 patients registered on 1 of 10 AIM protocols between March 2013 and January 2014 and 77 professional users. Intervention The AIM programme offered 10 clinical protocols, in three broad groups: (1) hypertension diagnosis/monitoring, (2) medication reminders and (3) smoking cessation. Florence sent patients prompts to submit clinical information, educational messages and user satisfaction questions. Patient responses were reviewed by their primary healthcare providers. Primary outcome measures Patients and professional user experiences of using AIM, and within this, Florence. Results Patient activity using Florence was generally good at month 1 for the hypertension protocols (71–80%), but reduced over 2–3 months (31–60%). For the other protocols, patient activity was 0–39% at 3 months. Minimum target days of texting were met for half the hypertension protocols. 1707/2304 (74%) patients sent evaluative texts responded at least once. Among responders, agreement with the adapted friends and family statement generally exceeded preproject aspirations. Professional responders were generally positive or equivocal about the programme. Conclusions Satisfaction with AIM appeared optimal when patients were carefully selected for the protocol; professional users were familiar with the system, the programme addressed a problem with the previous service delivery that was identified by users and users took an active approach to achieve clinical goals. However, there was a significant decrease in patients’ use of Florence over time. Future applications may be optimised by identifying and addressing reasons for the waning use of the service and enhancing support during implementation of the service. PMID:25795698
Issues in designing transport layer multicast facilities
NASA Technical Reports Server (NTRS)
Dempsey, Bert J.; Weaver, Alfred C.
1990-01-01
Multicasting denotes a facility in a communications system for providing efficient delivery from a message's source to some well-defined set of locations using a single logical address. While modem network hardware supports multidestination delivery, first generation Transport Layer protocols (e.g., the DoD Transmission Control Protocol (TCP) (15) and ISO TP-4 (41)) did not anticipate the changes over the past decade in underlying network hardware, transmission speeds, and communication patterns that have enabled and driven the interest in reliable multicast. Much recent research has focused on integrating the underlying hardware multicast capability with the reliable services of Transport Layer protocols. Here, we explore the communication issues surrounding the design of such a reliable multicast mechanism. Approaches and solutions from the literature are discussed, and four experimental Transport Layer protocols that incorporate reliable multicast are examined.
Distributed Dynamic Host Configuration Protocol (D2HCP)
Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez
2011-01-01
Mobile Ad Hoc Networks (MANETs) are multihop wireless networks of mobile nodes without any fixed or preexisting infrastructure. The topology of these networks can change randomly due to the unpredictable mobility of nodes and their propagation characteristics. In most networks, including MANETs, each node needs a unique identifier to communicate. This work presents a distributed protocol for dynamic node IP address assignment in MANETs. Nodes of a MANET synchronize from time to time to maintain a record of IP address assignments in the entire network and detect any IP address leaks. The proposed stateful autoconfiguration scheme uses the OLSR proactive routing protocol for synchronization and guarantees unique IP addresses under a variety of network conditions, including message losses and network partitioning. Simulation results show that the protocol incurs low latency and communication overhead for IP address assignment. PMID:22163856
Distributed Dynamic Host Configuration Protocol (D2HCP).
Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez
2011-01-01
Mobile Ad Hoc Networks (MANETs) are multihop wireless networks of mobile nodes without any fixed or preexisting infrastructure. The topology of these networks can change randomly due to the unpredictable mobility of nodes and their propagation characteristics. In most networks, including MANETs, each node needs a unique identifier to communicate. This work presents a distributed protocol for dynamic node IP address assignment in MANETs. Nodes of a MANET synchronize from time to time to maintain a record of IP address assignments in the entire network and detect any IP address leaks. The proposed stateful autoconfiguration scheme uses the OLSR proactive routing protocol for synchronization and guarantees unique IP addresses under a variety of network conditions, including message losses and network partitioning. Simulation results show that the protocol incurs low latency and communication overhead for IP address assignment.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Molotkov, S. N., E-mail: sergei.molotkov@gmail.com
2012-12-15
Any key-generation session contains a finite number of quantum-state messages, and it is there-fore important to understand the fundamental restrictions imposed on the minimal length of a string required to obtain a secret key with a specified length. The entropy uncertainty relations for smooth min and max entropies considerably simplify and shorten the proof of security. A proof of security of quantum key distribution with phase-temporal encryption is presented. This protocol provides the maximum critical error compared to other protocols up to which secure key distribution is guaranteed. In addition, unlike other basic protocols (of the BB84 type), which aremore » vulnerable with respect to an attack by 'blinding' of avalanche photodetectors, this protocol is stable with respect to such an attack and guarantees key security.« less
Handling of drug-related emergencies: an evaluation of emergency medical dispatch.
Tonje, Lorem; Elisabeth, Saether; Lars, Wik
2009-02-01
Documenting the quality of emergency dispatch centres handling of emergency calls regarding intoxicated unconscious patients. Interview with eight emergency dispatch centre directors and a nationwide survey among 313 dispatchers in Norway were performed. In addition, a customized scoring system was used to evaluate dispatcher log recordings of real cases. The recordings were compared with information from corresponding ambulance records. Ninety-nine percent of the dispatchers stated that they used the Norwegian protocol for medical emergencies and 89% of them found it useful. The interviews, the survey, and the recordings, however, documented frequent deviation from the protocol. This instructs ambulance dispatch for any unconscious patient, but 21% stated that they would not dispatch any resource for an unconscious patient without further survey in alcohol-related cases. This was significantly more often (P<0.05) than for the narcotic, combination and prescription - drug-related cases with 4, 10 and 7%, respectively. The recordings revealed deviation from the protocol with dispatchers only determining the patients' level of consciousness and respiratory status in 64 and 70% of the cases, respectively. For 16% of the cases, the dispatcher did not ask the caller about consciousness at all, even though these patients later were found with reduced consciousness. On the basis of the interviews and the survey, cases were handled according to guidelines. The log recordings, however, disclosed deviation from the protocol. Alcohol intoxication was associated with higher rate of deviation from the protocol compared with other intoxications.
From Our Practices to Yours: Key Messages for the Journey to Integrated Behavioral Health.
Gold, Stephanie B; Green, Larry A; Peek, C J
The historic, cultural separation of primary care and behavioral health has caused the spread of integrated care to lag behind other practice transformation efforts. The Advancing Care Together study was a 3-year evaluation of how practices implemented integrated care in their local contexts; at its culmination, practice leaders ("innovators") identified lessons learned to pass on to others. Individual feedback from innovators, key messages created by workgroups of innovators and the study team, and a synthesis of key messages from a facilitated discussion were analyzed for themes via immersion/crystallization. Five key themes were captured: (1) frame integrated care as a necessary paradigm shift to patient-centered, whole-person health care; (2) initialize: define relationships and protocols up-front, understanding they will evolve; (3) build inclusive, empowered teams to provide the foundation for integration; (4) develop a change management strategy of continuous evaluation and course-correction; and (5) use targeted data collection pertinent to integrated care to drive improvement and impart accountability. Innovators integrating primary care and behavioral health discerned key messages from their practical experience that they felt were worth sharing with others. Their messages present insight into the challenges unique to integrating care beyond other practice transformation efforts. © Copyright 2017 by the American Board of Family Medicine.
Forman, Leah S; Patts, Gregory J; Coleman, Sharon M; Blokhina, Elena; Lu, John; Yaroslavtseva, Tatiana; Gnatienko, Natalia; Krupitsky, Evgeny; Samet, Jeffrey H; Chaisson, Christine E
2018-02-01
Reproducible outcomes in clinical trials depend on adherence to study protocol. Short message service (also known as text message) reminders have been shown to improve clinical trial adherence in the United States and elsewhere. However, due to systematic differences in mobile data plans, languages, and technology, these systems are not easily translated to international settings. To gauge technical capabilities for international projects, we developed SMSMessenger, an automated Android application that uses a US server to send medication reminders to participants in a clinical trial in St. Petersburg, Russia (Zinc for HIV disease among alcohol users-a randomized controlled trial in the Russia Alcohol Research Collaboration on HIV/AIDS cohort). The application is downloaded once onto an Android study phone. When it is time for the text message reminders to be sent, study personnel access the application on a local phone, which in turn accesses the existing clinical trial database hosted on a US web server. The application retrieves a list of participants with the following information: phone number, whether a message should be received at that time, and the appropriate text of the message. The application is capable of storing multiple outgoing messages. With a few clicks, text messages are sent to study participants who can reply directly to the message. Study staff can check the local phone for incoming messages. The SMSMessenger application uses an existing clinical trial database and is able to receive real-time updates. All communications between the application and server are encrypted, and phone numbers are stored in a secure database behind a firewall. No sensitive data are stored on the phone, as outgoing messages are sent through the application and not by messaging features on the phone itself. Messages are sent simultaneously to study participants, which reduces the burden on local study staff. Costs and setup are minimal. The only local requirements are an Android phone and data plan. The SMSMessenger technology could be modified to be applied anywhere in the world, in any language, script, or alphabet, and for many different purposes. The novel application of this existing low-cost technology can improve the usefulness of text messaging in advancing the goals of international clinical trials.
Comparing Web and Touch Screen Transaction Log Files
Huntington, Paul; Williams, Peter
2001-01-01
Background Digital health information is available on a wide variety of platforms including PC-access of the Internet, Wireless Application Protocol phones, CD-ROMs, and touch screen public kiosks. All these platforms record details of user sessions in transaction log files, and there is a growing body of research into the evaluation of this data. However, there is very little research that has examined the problems of comparing the transaction log files of kiosks and the Internet. Objectives To provide a first step towards examining the problems of comparing the transaction log files of kiosks and the Internet. Methods We studied two platforms: touch screen kiosks and a comparable Web site. For both of these platforms, we examined the menu structure (which affects transaction log file data), the log-file structure, and the metrics derived from log-file records. Results We found substantial differences between the generated metrics. Conclusions None of the metrics discussed can be regarded as an effective way of comparing the use of kiosks and Web sites. Two metrics stand out as potentially comparable and valuable: the number of user sessions per hour and user penetration of pages. PMID:11720960
Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo
2013-01-01
Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP. PMID:24002231
Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo
2013-09-02
Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP.
HS.Register - An Audit-Trail Tool to Respond to the General Data Protection Regulation (GDPR).
Gonçalves-Ferreira, Duarte; Leite, Mariana; Santos-Pereira, Cátia; Correia, Manuel E; Antunes, Luis; Cruz-Correia, Ricardo
2018-01-01
Introduction The new General Data Protection Regulation (GDPR) compels health care institutions and their software providers to properly document all personal data processing and provide clear evidence that their systems are inline with the GDPR. All applications involved in personal data processing should therefore produce meaningful event logs that can later be used for the effective auditing of complex processes. Aim This paper aims to describe and evaluate HS.Register, a system created to collect and securely manage at scale audit logs and data produced by a large number of systems. Methods HS.Register creates a single audit log by collecting and aggregating all kinds of meaningful event logs and data (e.g. ActiveDirectory, syslog, log4j, web server logs, REST, SOAP and HL7 messages). It also includes specially built dashboards for easy auditing and monitoring of complex processes, crossing different systems in an integrated way, as well as providing tools for helping on the auditing and on the diagnostics of difficult problems, using a simple web application. HS.Register is currently installed at five large Portuguese Hospitals and is composed of the following open-source components: HAproxy, RabbitMQ, Elasticsearch, Logstash and Kibana. Results HS.Register currently collects and analyses an average of 93 million events per week and it is being used to document and audit HL7 communications. Discussion Auditing tools like HS.Register are likely to become mandatory in the near future to allow for traceability and detailed auditing for GDPR compliance.
NASA Technical Reports Server (NTRS)
Spuler, Linda M.; Ford, Patricia K.; Skeete, Darren C.; Hershman, Scot; Raviprakash, Pushpa; Arnold, John W.; Tran, Victor; Haenze, Mary Alice
2005-01-01
"Close Call Action Log Form" ("CCALF") is the name of both a computer program and a Web-based service provided by the program for creating an enhanced database of close calls (in the colloquial sense of mishaps that were avoided by small margins) assigned to the Center Operations Directorate (COD) at Johnson Space Center. CCALF provides a single facility for on-line collaborative review of close calls. Through CCALF, managers can delegate responses to employees. CCALF utilizes a pre-existing e-mail system to notify managers that there are close calls to review, but eliminates the need for the prior practices of passing multiple e-mail messages around the COD, then collecting and consolidating them into final responses: CCALF now collects comments from all responders for incorporation into reports that it generates. Also, whereas it was previously necessary to manually calculate metrics (e.g., numbers of maintenance-work orders necessitated by close calls) for inclusion in the reports, CCALF now computes the metrics, summarizes them, and displays them in graphical form. The reports and all pertinent information used to generate the reports are logged, tracked, and retained by CCALF for historical purposes.
Mobile Learning: A Framework and Evaluation
ERIC Educational Resources Information Center
Motiwalla, Luvai F.
2007-01-01
Wireless data communications in form of Short Message Service (SMS) and Wireless Access Protocols (WAP) browsers have gained global popularity, yet, not much has been done to extend the usage of these devices in electronic learning (e-learning). This project explores the extension of e-learning into wireless/handheld (W/H) computing devices with…
DOT National Transportation Integrated Search
This report covers the seventh in a series of tasks involving the assessment of driver workload in heavy vehicle operation associated with in-cab devices or systems. This report addresses the application of a workload assessment protocol and measurem...
Baby Steps: Starting Out on the World Wide Web.
ERIC Educational Resources Information Center
Simpson, Carol; McElmeel, Sharron L.
1997-01-01
While the Internet is the physical medium used to transport data, the World Wide Web is the collection of protocols and standards used to access the information. This article provides a basic explanation of what the Web is and describes common browser commands. Discusses graphic Web browsers; universal resource locators (URLs); file, message,…
ERIC Educational Resources Information Center
Milner, Jacob
2005-01-01
Voice over Internet Protocol (VoIP) is everywhere. The technology lets users make and receive phone calls over the Internet, transporting voice traffic alongside data traffic such as instant messages (IMs) and e-mail. While the number of consumer customers using VoIP increases every week, the technology is finding its way into K-12 education as…
A Stateful Multicast Access Control Mechanism for Future Metro-Area-Networks.
ERIC Educational Resources Information Center
Sun, Wei-qiang; Li, Jin-sheng; Hong, Pei-lin
2003-01-01
Multicasting is a necessity for a broadband metro-area-network; however security problems exist with current multicast protocols. A stateful multicast access control mechanism, based on MAPE, is proposed. The architecture of MAPE is discussed, as well as the states maintained and messages exchanged. The scheme is flexible and scalable. (Author/AEF)
Addressing Poverty Issues in Christian Schools: Teachers' Perspectives
ERIC Educational Resources Information Center
Bankston, Catherine
2015-01-01
The purpose of Christian education is to incorporate Biblical values in the curriculum, and one essential message in the Bible is to reach out and liberate the poor. Through interviews, writing protocols, a focus group meeting, and document analysis, this narrative study focuses on the question of how do Christian educators create pedagogical…
Frew, Paula M.; Kriss, Jennifer L.; Chamberlain, Allison T.; Malik, Fauzia; Chung, Yunmi; Cortés, Marielysse; Omer, Saad B.
2016-01-01
ABSTRACT Objective: We sought to examine the effectiveness of persuasive communication interventions on influenza vaccination uptake among black/African American pregnant women in Atlanta, Georgia. Methods: We recruited black/African American pregnant women ages 18 to 50 y from Atlanta, GA to participate in a prospective, randomized controlled trial of influenza immunization messaging conducted from January to April 2013. Eligible participants were randomized to 3 study arms. We conducted follow-up questionnaires on influenza immunization at 30-days post-partum with all groups. Chi-square and t tests evaluated group differences, and outcome intention-to-treat assessment utilized log-binomial regression models. Results: Of the 106 enrolled, 95 women completed the study (90% retention), of which 31 were randomly assigned to affective messaging intervention (“Pregnant Pause” video), 30 to cognitive messaging intervention (“Vaccines for a Healthy Pregnancy” video), and 34 to a comparison condition (receipt of the Influenza Vaccine Information Statement). The three groups were balanced on baseline demographic characteristics and reported health behaviors. At baseline, most women (63%, n = 60) reported no receipt of seasonal influenza immunization during the previous 5 y. They expressed a low likelihood (2.1 ± 2.8 on 0-10 scale) of obtaining influenza immunization during their current pregnancy. At 30-days postpartum follow-up, influenza immunization was low among all participants (7-13%) demonstrating no effect after a single exposure to either affective messaging (RR = 1.10; 95% CI: 0.30-4.01) or cognitive messaging interventions (RR = 0.57; 95% CI: 0.11-2.88). Women cited various reasons for not obtaining maternal influenza immunizations. These included concern about vaccine harm (47%, n = 40), low perceived influenza infection risk (31%, n = 26), and a history of immunization nonreceipt (24%, n = 20). Conclusion: The findings reflect the limitations associated with a single exposure to varying maternal influenza immunization message approaches on vaccine behavior. For this population, repeated influenza immunization exposures may be warranted with alterations in message format, content, and relevance for coverage improvement. PMID:27322154
An Energy Centric Cluster-Based Routing Protocol for Wireless Sensor Networks.
Hosen, A S M Sanwar; Cho, Gi Hwan
2018-05-11
Clustering is an effective way to prolong the lifetime of a wireless sensor network (WSN). The common approach is to elect cluster heads to take routing and controlling duty, and to periodically rotate each cluster head's role to distribute energy consumption among nodes. However, a significant amount of energy dissipates due to control messages overhead, which results in a shorter network lifetime. This paper proposes an energy-centric cluster-based routing mechanism in WSNs. To begin with, cluster heads are elected based on the higher ranks of the nodes. The rank is defined by residual energy and average distance from the member nodes. With the role of data aggregation and data forwarding, a cluster head acts as a caretaker for cluster-head election in the next round, where the ranks' information are piggybacked along with the local data sending during intra-cluster communication. This reduces the number of control messages for the cluster-head election as well as the cluster formation in detail. Simulation results show that our proposed protocol saves the energy consumption among nodes and achieves a significant improvement in the network lifetime.
An Energy Centric Cluster-Based Routing Protocol for Wireless Sensor Networks
Hosen, A. S. M. Sanwar; Cho, Gi Hwan
2018-01-01
Clustering is an effective way to prolong the lifetime of a wireless sensor network (WSN). The common approach is to elect cluster heads to take routing and controlling duty, and to periodically rotate each cluster head’s role to distribute energy consumption among nodes. However, a significant amount of energy dissipates due to control messages overhead, which results in a shorter network lifetime. This paper proposes an energy-centric cluster-based routing mechanism in WSNs. To begin with, cluster heads are elected based on the higher ranks of the nodes. The rank is defined by residual energy and average distance from the member nodes. With the role of data aggregation and data forwarding, a cluster head acts as a caretaker for cluster-head election in the next round, where the ranks’ information are piggybacked along with the local data sending during intra-cluster communication. This reduces the number of control messages for the cluster-head election as well as the cluster formation in detail. Simulation results show that our proposed protocol saves the energy consumption among nodes and achieves a significant improvement in the network lifetime. PMID:29751663
Completely device-independent quantum key distribution
NASA Astrophysics Data System (ADS)
Aguilar, Edgar A.; Ramanathan, Ravishankar; Kofler, Johannes; Pawłowski, Marcin
2016-08-01
Quantum key distribution (QKD) is a provably secure way for two distant parties to establish a common secret key, which then can be used in a classical cryptographic scheme. Using quantum entanglement, one can reduce the necessary assumptions that the parties have to make about their devices, giving rise to device-independent QKD (DIQKD). However, in all existing protocols to date the parties need to have an initial (at least partially) random seed as a resource. In this work, we show that this requirement can be dropped. Using recent advances in the fields of randomness amplification and randomness expansion, we demonstrate that it is sufficient for the message the parties want to communicate to be (partially) unknown to the adversaries—an assumption without which any type of cryptography would be pointless to begin with. One party can use her secret message to locally generate a secret sequence of bits, which can then be openly used by herself and the other party in a DIQKD protocol. Hence our work reduces the requirements needed to perform secure DIQKD and establish safe communication.
Software Implements a Space-Mission File-Transfer Protocol
NASA Technical Reports Server (NTRS)
Rundstrom, Kathleen; Ho, Son Q.; Levesque, Michael; Sanders, Felicia; Burleigh, Scott; Veregge, John
2004-01-01
CFDP is a computer program that implements the CCSDS (Consultative Committee for Space Data Systems) File Delivery Protocol, which is an international standard for automatic, reliable transfers of files of data between locations on Earth and in outer space. CFDP administers concurrent file transfers in both directions, delivery of data out of transmission order, reliable and unreliable transmission modes, and automatic retransmission of lost or corrupted data by use of one or more of several lost-segment-detection modes. The program also implements several data-integrity measures, including file checksums and optional cyclic redundancy checks for each protocol data unit. The metadata accompanying each file can include messages to users application programs and commands for operating on remote file systems.
King, Elizabeth; Kinvig, Karen; Steif, Jonathan; Qiu, Annie Q; Maan, Evelyn J; Albert, Arianne Yk; Pick, Neora; Alimenti, Ariane; Kestler, Mary H; Money, Deborah M; Lester, Richard T; Murray, Melanie Caroline Margaret
2017-06-01
Combination antiretroviral therapy (cART) as treatment for human immunodeficiency virus (HIV) infection is effective and available, but poor medication adherence limits benefits, particularly in vulnerable populations. In a Kenyan randomized controlled trial, a weekly text-messaging intervention (WelTel) improved cART adherence and HIV viral load (VL). Despite growing evidence for short message service (SMS) text-message interventions in HIV care, there is a paucity of data utilizing these interventions in marginalized or female cohorts. This study was undertaken to assess whether the standardized WelTel SMS text-message intervention applied to a vulnerable, predominantly female, population improved cART adherence and VL. We conducted a repeated measures study of the WelTel intervention in high-risk HIV-positive persons by measuring change in VL, CD4 count, and self-reported adherence 12 months before and 12 months after the WelTel intervention was introduced. Inclusion criteria included VL ≥200 copies/mL, indication for treatment, and meeting vulnerability criteria. Participants were given a mobile phone with unlimited texting (where required), and weekly check-in text messages were sent for one year from the WelTel computer platform. Clinical data were collected for control and intervention years. Participants were followed by a multidisciplinary team in a clinical setting. Outcomes were assessed using Wilcoxon signed ranks tests for change in CD4 and VL from control year to study end and mixed-effects logistic regressions for change in cART adherence and appointment attendance. A secondary analysis was conducted to assess the effect of response rate on the outcome by modeling final log 10 VL by number of responses while controlling for mean log 10 VL in the control year. Eighty-five participants enrolled in the study, but 5 withdrew (final N=80). Participants were predominantly female (90%, 72/80) with a variety of vulnerabilities. Mean VL decreased from 1098 copies/mL in the control year to 439 copies/mL at study end (P=.004). Adherence to cART significantly improved (OR 1.14, IQR 1.10-1.18; P<.001), whereas appointment attendance decreased slightly with the intervention (OR 0.81, IQR 0.67-0.99; P=.03). A response was received for 46.57% (1753/3764) of messages sent and 9.62% (362/3764) of text messages sent were replied to with a problem. An outcome analysis examining relationship between reply rate and VL did not meet statistical significance (P=.07), but may be worthy of investigating further in a larger study. WelTel may be an effective tool for improving cART adherence and reducing VLs among high-risk, vulnerable HIV-positive persons. Clinicaltrials.gov NCT02603536; https://clinicaltrials.gov/ct2/show/NCT02603536 (Archived by WebCite at http://www.webcitation.org/6qK57zCwv). ©Elizabeth King, Karen Kinvig, Jonathan Steif, Annie Q Qiu, Evelyn J Maan, Arianne YK Albert, Neora Pick, Ariane Alimenti, Mary H Kestler, Deborah M Money, Richard T Lester, Melanie Caroline Margaret Murray. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 01.06.2017.
Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks.
Vara, M Isabel; Campo, Celeste
2015-07-20
Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2). In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1). In order to advertise services, we have added a new type-length-value structure (TLV) to the OLSRv2 protocol, called service discovery message (SDM), according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC) 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV) protocol, in terms of service discovery ratio, service latency and network overhead.
Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks
Vara, M. Isabel; Campo, Celeste
2015-01-01
Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2). In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1). In order to advertise services, we have added a new type-length-value structure (TLV) to the OLSRv2 protocol, called service discovery message (SDM), according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC) 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV) protocol, in terms of service discovery ratio, service latency and network overhead. PMID:26205272
Extending Word Highlighting in Multiparticipant Chat
2013-05-01
PAGE unclassified Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18 [05:40] < daddy > is there a way to change 11.04 interface back to...10.10 [05:40] <DrFrankenstein> daddy : launching programs from a drop down menu instead of the screen with the icons? [05:40] <Soupermanito> yes, log out...user daddy asks a question about Unity, referring to it as the “11.04 interface.” For the corpus, we labeled only those messages that concern topics
Exponential Decay of Reconstruction Error from Binary Measurements of Sparse Signals
2014-08-01
that the required condition of Corollary 9, namely q ≥ Cδ−4s̃ log(n/s̃), is still satisfied. The result follows from massaging the equations, as...study of the relationship of heart attacks to various factors may test whether certain subjects have heart attacks in a short window of time and other...subjects have heart attacks in a long window of time. The main message of this paper is that by carefully choosing this threshold the accuracy of
Schwerdtfeger, Andreas R; Schmitz, Catalina; Warken, Matthias
2012-01-01
Sedentarism is a serious health concern in industrialized countries throughout the world. We examined whether a text message-based intervention, targeted at increasing daily levels of physical activity, would be more effective than a standard psychoeducational intervention and a control condition. Sixty-three individuals (43 women) with a mean age of 23.7 years participated in the study. They were randomly assigned to a psychoeducational standard intervention; an augmented intervention with additional short text messages sent to the mobile phones to remind participants of their action plans, and a control condition. Objectively assessed physical activity and self-efficacy were assessed pre- and post-intervention. Participants in the control condition showed a significant decline in physical activity from pre-assessment to post-assessment, whereas participants in both intervention arms exhibited a slight increase. Moreover, the augmented intervention resulted in a marginally significant increase in self-efficacy, whereas the standard intervention resulted in a significant decrease. The findings suggest that short text messages reminding individuals of their action plans are not more effective than an intervention without text messages, although there seems to be a beneficial effect on self-efficacy, which might facilitate behavior change in the long-term. Challenging aspects of the research design (e.g., reactivity of the assessment protocol) are discussed and suggestions for future research are highlighted.
A qualitative analysis of messages to promote smoking cessation among pregnant women
Hoek, Janet; Gifford, Heather; Maubach, Ninya; Newcombe, Rhiannon
2014-01-01
Objectives Although aware that smoking while pregnant presents serious risks to their unborn children, some women continue to smoke and rationalise their dissonance rather than quit. We explored metaphors women used to frame smoking and quitting, then developed cessation messages that drew on these metaphors and examined the perceived effectiveness of these. Participants We used a two-phase qualitative study. Phase one involved 13 in-depth interviews with women who were smoking (or who had smoked) while pregnant. Phase two comprised 22 in-depth interviews with a new sample drawn from the same population. Analyses Data were analysed using thematic analysis, which promoted theme identification independently of the research protocol. Results Participants often described smoking as a choice, a frame that explicitly asserted control over their behaviour. This stance allowed them to counter-argue messages to quit, and distanced them from the risks they created and faced. Messages tested in phase 2 used strong affective appeals as well as themes that stimulated cognitive reflection. Without exception, the messages depicting unwell or distressed children elicited strong emotional responses, were more powerful cessation stimuli, and elicited fewer counter-arguments. Conclusions Cessation messages that evoke strong affective responses capitalise on the dissonance many women feel when smoking while pregnant and stimulate stronger consideration of quitting. Given the importance of promoting cessation among pregnant women, future campaigns could make greater use of emotional appeals and place less emphasis on informational approaches, which often prompt vigorous counter-arguments. PMID:25431224
Distance versus near visual acuity in amblyopia
Christoff, Alex; Repka, Michael X.; Kaminski, Brett M.; Holmes, Jonathan M.; Ch, B
2011-01-01
Purpose There are conflicting reports about whether distance and near visual acuity are similar in eyes with amblyopia. The purpose of this study is to compare monocular distance visual acuity with near visual acuity in amblyopic eyes of children. Methods Subjects 2 to 6 years of age were evaluated in a randomized trial of amblyopia therapy for moderate amblyopia (20/40 to 20/80) due to anisometropia, strabismus, or both. Prior to initiating the protocol-prescribed therapy, subjects had best-corrected visual acuity measured with standardized protocols at 3 meters and 0.4 meters using single-surrounded HOTV optotypes. Results A total of 129 subjects were included. The mean amblyopic eye visual acuity was similar at distance and near (mean, 0.45 logMAR at distance versus 0.45 logMAR at near; mean difference, +0.00, 95% CI, −0.03 to 0.03). Of the 129 subjects, 86 (67%) tested within one line at distance and near, 19 (15%) tested more than one logMAR line better at distance, and 24 (19%) tested more than one logMAR line better at near. The mean visual acuity difference between distance and near did not differ by cause of amblyopia, age, or spherical equivalent refractive error. Conclusions We found no systematic difference between distance and near visual acuity in 2- to 6-year-old children with moderate amblyopia associated with strabismus and/or anisometropia. Individual differences between distance and near visual acuity are likely due to test–retest variability. PMID:21907115
Teaming up: feasibility of an online treatment environment for adolescents with type 1 diabetes.
Boogerd, Emiel A; Noordam, Cees; Kremer, Jan Am; Prins, Judith B; Verhaak, Chris M
2014-08-01
To evaluate the feasibility of an online interactive treatment environment for adolescents with type 1 diabetes, called Sugarsquare, to supplement usual care. Sugarsquare provides easily accessible contact with the diabetes team, peer support, and treatment overview. Of 120 eligible patients, 62 adolescents aged 11-21 (M = 15.23, SD = 2.00) were assigned to a usual-care group (n = 31) or a usual-care + intervention group (n = 31). Feasibility was assessed in terms of acceptability, demand, practicability, integration, and efficacy in a 9-month study-period. Assessment of acceptability and demand revealed that 20 adolescents in the intervention group (65%) logged in at least once; 16 adolescents (52%) logged in repeatedly. Usage resulted in 5795 page-views, 3580 chat-messages, 427 forum-messages, and in 40 private interactions between 11 adolescents (35%) and professionals. Assessment of practicability revealed that all 13 professionals (100%) accessed the intervention. Slow processing speed and security procedures formed obstacles for usage. Assessment of integration showed that international standards for diabetes care (International Diabetes Federation/International Society for Pediatric and Adolescent Diabetes/American Diabetes Association) were met. Assessment of efficacy revealed improvement in the intervention group in evaluation of care (Patients' Evaluation of Quality of Diabetes), F(1,30) = 5.35, p < 0.05, and quality of life, communication (PedsQL), F(1,30) = 11.65, p <0.05. The latter was correlated with posted chat-messages (r = 0.42, p < 0.05). No between-group differences were found. This study shows that Sugarsquare is feasible in adolescents with type 1 diabetes. It meets a demand in adolescents and can support professionals when organizing on-going care according to international standards. Results are promising and next steps are a full-scale randomized controlled trial and subsequent implementation in daily care. © 2013 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.
Compact Modbus TCP/IP protocol for data acquisition systems based on limited hardware resources
NASA Astrophysics Data System (ADS)
Bai, Q.; Jin, B.; Wang, D.; Wang, Y.; Liu, X.
2018-04-01
The Modbus TCP/IP has been a standard industry communication protocol and widely utilized for establishing sensor-cloud platforms on the Internet. However, numerous existing data acquisition systems built on traditional single-chip microcontrollers without sufficient resources cannot support it, because the complete Modbus TCP/IP protocol always works dependent on a full operating system which occupies abundant hardware resources. Hence, a compact Modbus TCP/IP protocol is proposed in this work to make it run efficiently and stably even on a resource-limited hardware platform. Firstly, the Modbus TCP/IP protocol stack is analyzed and the refined protocol suite is rebuilt by streamlining the typical TCP/IP suite. Then, specific implementation of every hierarchical layer is respectively presented in detail according to the protocol structure. Besides, the compact protocol is implemented in a traditional microprocessor to validate the feasibility of the scheme. Finally, the performance of the proposed scenario is assessed. The experimental results demonstrate that message packets match the frame format of Modbus TCP/IP protocol and the average bandwidth reaches to 1.15 Mbps. The compact protocol operates stably even based on a traditional microcontroller with only 4-kB RAM and 12-MHz system clock, and no communication congestion or frequent packet loss occurs.
Bušić, Mladen; Bjeloš, Mirjana; Petrovečki, Mladen; Kuzmanović Elabjer, Biljana; Bosnar, Damir; Ramić, Senad; Miletić, Daliborka; Andrijašević, Lidija; Kondža Krstonijević, Edita; Jakovljević, Vid; Bišćan Tvrdi, Ana; Predović, Jurica; Kokot, Antonio; Bišćan, Filip; Kovačević Ljubić, Mirna; Motušić Aras, Ranka
2016-02-01
To present and evaluate a new screening protocol for amblyopia in preschool children. Zagreb Amblyopia Preschool Screening (ZAPS) study protocol performed screening for amblyopia by near and distance visual acuity (VA) testing of 15 648 children aged 48-54 months attending kindergartens in the City of Zagreb County between September 2011 and June 2014 using Lea Symbols in lines test. If VA in either eye was >0.1 logMAR, the child was re-tested, if failed at re-test, the child was referred to comprehensive eye examination at the Eye Clinic. 78.04% of children passed the screening test. Estimated prevalence of amblyopia was 8.08%. Testability, sensitivity, and specificity of the ZAPS study protocol were 99.19%, 100.00%, and 96.68% respectively. The ZAPS study used the most discriminative VA test with optotypes in line as they do not underestimate amblyopia. The estimated prevalence of amblyopia was considerably higher than reported elsewhere. To the best of our knowledge, the ZAPS study protocol reached the highest sensitivity and specificity when evaluating diagnostic accuracy of VA tests for screening. The pass level defined at ≤0.1 logMAR for 4-year-old children, using Lea Symbols in lines missed no amblyopia cases, advocating that both near and distance VA testing should be performed when screening for amblyopia.
Bušić, Mladen; Bjeloš, Mirjana; Petrovečki, Mladen; Kuzmanović Elabjer, Biljana; Bosnar, Damir; Ramić, Senad; Miletić, Daliborka; Andrijašević, Lidija; Kondža Krstonijević, Edita; Jakovljević, Vid; Bišćan Tvrdi, Ana; Predović, Jurica; Kokot, Antonio; Bišćan, Filip; Kovačević Ljubić, Mirna; Motušić Aras, Ranka
2016-01-01
Aim To present and evaluate a new screening protocol for amblyopia in preschool children. Methods Zagreb Amblyopia Preschool Screening (ZAPS) study protocol performed screening for amblyopia by near and distance visual acuity (VA) testing of 15 648 children aged 48-54 months attending kindergartens in the City of Zagreb County between September 2011 and June 2014 using Lea Symbols in lines test. If VA in either eye was >0.1 logMAR, the child was re-tested, if failed at re-test, the child was referred to comprehensive eye examination at the Eye Clinic. Results 78.04% of children passed the screening test. Estimated prevalence of amblyopia was 8.08%. Testability, sensitivity, and specificity of the ZAPS study protocol were 99.19%, 100.00%, and 96.68% respectively. Conclusion The ZAPS study used the most discriminative VA test with optotypes in lines as they do not underestimate amblyopia. The estimated prevalence of amblyopia was considerably higher than reported elsewhere. To the best of our knowledge, the ZAPS study protocol reached the highest sensitivity and specificity when evaluating diagnostic accuracy of VA tests for screening. The pass level defined at ≤0.1 logMAR for 4-year-old children, using Lea Symbols in lines missed no amblyopia cases, advocating that both near and distance VA testing should be performed when screening for amblyopia. PMID:26935612
Lang, Jun
2012-01-30
In this paper, we propose a novel secure image sharing scheme based on Shamir's three-pass protocol and the multiple-parameter fractional Fourier transform (MPFRFT), which can safely exchange information with no advance distribution of either secret keys or public keys between users. The image is encrypted directly by the MPFRFT spectrum without the use of phase keys, and information can be shared by transmitting the encrypted image (or message) three times between users. Numerical simulation results are given to verify the performance of the proposed algorithm.
Lightweight UDP Pervasive Protocol in Smart Home Environment Based on Labview
NASA Astrophysics Data System (ADS)
Kurniawan, Wijaya; Hannats Hanafi Ichsan, Mochammad; Rizqika Akbar, Sabriansyah; Arwani, Issa
2017-04-01
TCP (Transmission Control Protocol) technology in a reliable environment was not a problem, but not in an environment where the entire Smart Home network connected locally. Currently employing pervasive protocols using TCP technology, when data transmission is sent, it would be slower because they have to perform handshaking process in advance and could not broadcast the data. On smart home environment, it does not need large size and complex data transmission between monitoring site and monitoring center required in Smart home strain monitoring system. UDP (User Datagram Protocol) technology is quick and simple on data transmission process. UDP can broadcast messages because the UDP did not require handshaking and with more efficient memory usage. LabVIEW is a programming language software for processing and visualization of data in the field of data acquisition. This paper proposes to examine Pervasive UDP protocol implementations in smart home environment based on LabVIEW. UDP coded in LabVIEW and experiments were performed on a PC and can work properly.
Further developments in generating type-safe messaging
DOE Office of Scientific and Technical Information (OSTI.GOV)
Neswold, R.; King, C.; /Fermilab
2011-11-01
At ICALEPCS 09, we introduced a source code generator that allows processes to communicate safely using data types native to each host language. In this paper, we discuss further development that has occurred since the conference in Kobe, Japan, including the addition of three more client languages, an optimization in network packet size and the addition of a new protocol data type. The protocol compiler is continuing to prove itself as an easy and robust way to get applications written in different languages hosted on different computer architectures to communicate. We have two active Erlang projects that are using themore » protocol compiler to access ACNET data at high data rates. We also used the protocol compiler output to deliver ACNET data to an iPhone/iPad application. Since it takes an average of two weeks to support a new language, we're willing to expand the protocol compiler to support new languages that our community uses.« less
Motion Imagery and Robotics Application (MIRA)
NASA Technical Reports Server (NTRS)
Martinez, Lindolfo; Rich, Thomas
2011-01-01
Objectives include: I. Prototype a camera service leveraging the CCSDS Integrated protocol stack (MIRA/SM&C/AMS/DTN): a) CCSDS MIRA Service (New). b) Spacecraft Monitor and Control (SM&C). c) Asynchronous Messaging Service (AMS). d) Delay/Disruption Tolerant Networking (DTN). II. Additional MIRA Objectives: a) Demo of Camera Control through ISS using CCSDS protocol stack (Berlin, May 2011). b) Verify that the CCSDS standards stack can provide end-to-end space camera services across ground and space environments. c) Test interoperability of various CCSDS protocol standards. d) Identify overlaps in the design and implementations of the CCSDS protocol standards. e) Identify software incompatibilities in the CCSDS stack interfaces. f) Provide redlines to the SM&C, AMS, and DTN working groups. d) Enable the CCSDS MIRA service for potential use in ISS Kibo camera commanding. e) Assist in long-term evolution of this entire group of CCSDS standards to TRL 6 or greater.
Genomics-Based Security Protocols: From Plaintext to Cipherprotein
NASA Technical Reports Server (NTRS)
Shaw, Harry; Hussein, Sayed; Helgert, Hermann
2011-01-01
The evolving nature of the internet will require continual advances in authentication and confidentiality protocols. Nature provides some clues as to how this can be accomplished in a distributed manner through molecular biology. Cryptography and molecular biology share certain aspects and operations that allow for a set of unified principles to be applied to problems in either venue. A concept for developing security protocols that can be instantiated at the genomics level is presented. A DNA (Deoxyribonucleic acid) inspired hash code system is presented that utilizes concepts from molecular biology. It is a keyed-Hash Message Authentication Code (HMAC) capable of being used in secure mobile Ad hoc networks. It is targeted for applications without an available public key infrastructure. Mechanics of creating the HMAC are presented as well as a prototype HMAC protocol architecture. Security concepts related to the implementation differences between electronic domain security and genomics domain security are discussed.
Model Checking a Self-Stabilizing Distributed Clock Synchronization Protocol for Arbitrary Digraphs
NASA Technical Reports Server (NTRS)
Malekpour, Mahyar R.
2011-01-01
This report presents the mechanical verification of a self-stabilizing distributed clock synchronization protocol for arbitrary digraphs in the absence of faults. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. The system under study is an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. This protocol deterministically converges within a time bound that is a linear function of the self-stabilization period.
Self-Configuration and Self-Optimization Process in Heterogeneous Wireless Networks
Guardalben, Lucas; Villalba, Luis Javier García; Buiati, Fábio; Sobral, João Bosco Mangueira; Camponogara, Eduardo
2011-01-01
Self-organization in Wireless Mesh Networks (WMN) is an emergent research area, which is becoming important due to the increasing number of nodes in a network. Consequently, the manual configuration of nodes is either impossible or highly costly. So it is desirable for the nodes to be able to configure themselves. In this paper, we propose an alternative architecture for self-organization of WMN based on Optimized Link State Routing Protocol (OLSR) and the ad hoc on demand distance vector (AODV) routing protocols as well as using the technology of software agents. We argue that the proposed self-optimization and self-configuration modules increase the throughput of network, reduces delay transmission and network load, decreases the traffic of HELLO messages according to network’s scalability. By simulation analysis, we conclude that the self-optimization and self-configuration mechanisms can significantly improve the performance of OLSR and AODV protocols in comparison to the baseline protocols analyzed. PMID:22346584
Self-configuration and self-optimization process in heterogeneous wireless networks.
Guardalben, Lucas; Villalba, Luis Javier García; Buiati, Fábio; Sobral, João Bosco Mangueira; Camponogara, Eduardo
2011-01-01
Self-organization in Wireless Mesh Networks (WMN) is an emergent research area, which is becoming important due to the increasing number of nodes in a network. Consequently, the manual configuration of nodes is either impossible or highly costly. So it is desirable for the nodes to be able to configure themselves. In this paper, we propose an alternative architecture for self-organization of WMN based on Optimized Link State Routing Protocol (OLSR) and the ad hoc on demand distance vector (AODV) routing protocols as well as using the technology of software agents. We argue that the proposed self-optimization and self-configuration modules increase the throughput of network, reduces delay transmission and network load, decreases the traffic of HELLO messages according to network's scalability. By simulation analysis, we conclude that the self-optimization and self-configuration mechanisms can significantly improve the performance of OLSR and AODV protocols in comparison to the baseline protocols analyzed.
Multi-party Semi-quantum Key Agreement with Delegating Quantum Computation
NASA Astrophysics Data System (ADS)
Liu, Wen-Jie; Chen, Zhen-Yu; Ji, Sai; Wang, Hai-Bin; Zhang, Jun
2017-10-01
A multi-party semi-quantum key agreement (SQKA) protocol based on delegating quantum computation (DQC) model is proposed by taking Bell states as quantum resources. In the proposed protocol, the participants only need the ability of accessing quantum channel and preparing single photons {|0〉, |1〉, |+〉, |-〉}, while the complicated quantum operations, such as the unitary operations and Bell measurement, will be delegated to the remote quantum center. Compared with previous quantum key agreement protocols, this client-server model is more feasible in the early days of the emergence of quantum computers. In order to prevent the attacks from outside eavesdroppers, inner participants and quantum center, two single photon sequences are randomly inserted into Bell states: the first sequence is used to perform the quantum channel detection, while the second is applied to disorder the positions of message qubits, which guarantees the security of the protocol.
NASA Technical Reports Server (NTRS)
Malekpour, Mahyar R.
2011-01-01
This report presents a deductive proof of a self-stabilizing distributed clock synchronization protocol. It is focused on the distributed clock synchronization of an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. This protocol does not rely on assumptions about the initial state of the system, and no central clock or a centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. We present a deductive proof of the correctness of the protocol as it applies to the networks with unidirectional and bidirectional links. We also confirm the claims of determinism and linear convergence.
Design and implementation considerations of a MSAT packet data network
NASA Technical Reports Server (NTRS)
Karam, Fouad G.; Hearn, Terry; Rohr, Doug; Guibord, Arthur F.
1993-01-01
The Mobile Data System, which is intended to provide for packet switched data services is currently under development. The system is based on a star network topology consisting of a centralized Data Hub (DH) serving a large number of mobile terminals. Through the Data Hub, end-to-end connections can be established between terrestrial users on public or private data networks and mobile users. The MDS network will be capable of offering a variety of services some of which are based on the standard X.25 network interface protocol, and others optimized for short messages and broadcast messages. A description of these services and the trade-offs in the DH design are presented.
High-capacity quantum secure direct communication with two-photon six-qubit hyperentangled states
NASA Astrophysics Data System (ADS)
Wu, FangZhou; Yang, GuoJian; Wang, HaiBo; Xiong, Jun; Alzahrani, Faris; Hobiny, Aatef; Deng, FuGuo
2017-12-01
This study proposes the first high-capacity quantum secure direct communication (QSDC) with two-photon six-qubit hyper-entangled Bell states in two longitudinal momentum and polarization degrees of freedom (DOFs) of photon pairs, which can be generated using two 0.5 mm-thick type-I β barium borate crystal slabs aligned one behind the other and an eight-hole screen. The secret message can be independently encoded on the photon pairs with 64 unitary operations in all three DOFs. This protocol has a higher capacity than previous QSDC protocols because each photon pair can carry 6 bits of information, not just 2 or 4 bits. Our QSDC protocol decreases the influence of decoherence from environment noise by exploiting the decoy photons to check the security of the transmission of the first photon sequence. Compared with two-way QSDC protocols, our QSDC protocol is immune to an attack by an eavesdropper using Trojan horse attack strategies because it is a one-way quantum communication. The QSDC protocol has good applications in the future quantum communication because of all these features.
Message Passing vs. Shared Address Space on a Cluster of SMPs
NASA Technical Reports Server (NTRS)
Shan, Hongzhang; Singh, Jaswinder Pal; Oliker, Leonid; Biswas, Rupak
2000-01-01
The convergence of scalable computer architectures using clusters of PCs (or PC-SMPs) with commodity networking has become an attractive platform for high end scientific computing. Currently, message-passing and shared address space (SAS) are the two leading programming paradigms for these systems. Message-passing has been standardized with MPI, and is the most common and mature programming approach. However message-passing code development can be extremely difficult, especially for irregular structured computations. SAS offers substantial ease of programming, but may suffer from performance limitations due to poor spatial locality, and high protocol overhead. In this paper, we compare the performance of and programming effort, required for six applications under both programming models on a 32 CPU PC-SMP cluster. Our application suite consists of codes that typically do not exhibit high efficiency under shared memory programming. due to their high communication to computation ratios and complex communication patterns. Results indicate that SAS can achieve about half the parallel efficiency of MPI for most of our applications: however, on certain classes of problems SAS performance is competitive with MPI. We also present new algorithms for improving the PC cluster performance of MPI collective operations.
Haug, Severin; Kowatsch, Tobias; Castro, Raquel Paz; Filler, Andreas; Schaub, Michael P
2014-08-07
Problem drinking, particularly risky single-occasion drinking is widespread among adolescents and young adults in most Western countries. Mobile phone text messaging allows a proactive and cost-effective delivery of short messages at any time and place and allows the delivery of individualised information at times when young people typically drink alcohol. The main objective of the planned study is to test the efficacy of a combined web- and text messaging-based intervention to reduce problem drinking in young people with heterogeneous educational level. A two-arm cluster-randomised controlled trial with one follow-up assessment after 6 months will be conducted to test the efficacy of the intervention in comparison to assessment only. The fully-automated intervention program will provide an online feedback based on the social norms approach as well as individually tailored mobile phone text messages to stimulate (1) positive outcome expectations to drink within low-risk limits, (2) self-efficacy to resist alcohol and (3) planning processes to translate intentions to resist alcohol into action. Program participants will receive up to two weekly text messages over a time period of 3 months. Study participants will be 934 students from approximately 93 upper secondary and vocational schools in Switzerland. Main outcome criterion will be risky single-occasion drinking in the past 30 days preceding the follow-up assessment. This is the first study testing the efficacy of a combined web- and text messaging-based intervention to reduce problem drinking in young people. Given that this intervention approach proves to be effective, it could be easily implemented in various settings, and it could reach large numbers of young people in a cost-effective way. Current Controlled Trials ISRCTN59944705.
Extending the Wireshark Network Protocol Analyser to Decode Link 16 Tactical Data Link Messages
2014-01-01
Interoperability Workshop 2003, Paper No. 03F- SIW -002. 6. Boardman, B., (2008), Introduction to Tactical Data Links in the ADF, accessed from <http...2008, Paper No. 08E- SIW -046. 19. Lamping, U., (2013), Wireshark Developer’s Guide for Wireshark 1.11, accessed from <http://www.wireshark.org/docs
The Prodiguer Messaging Platform
NASA Astrophysics Data System (ADS)
Denvil, S.; Greenslade, M. A.; Carenton, N.; Levavasseur, G.; Raciazek, J.
2015-12-01
CONVERGENCE is a French multi-partner national project designed to gather HPC and informatics expertise to innovate in the context of running French global climate models with differing grids and at differing resolutions. Efficient and reliable execution of these models and the management and dissemination of model output are some of the complexities that CONVERGENCE aims to resolve.At any one moment in time, researchers affiliated with the Institut Pierre Simon Laplace (IPSL) climate modeling group, are running hundreds of global climate simulations. These simulations execute upon a heterogeneous set of French High Performance Computing (HPC) environments. The IPSL's simulation execution runtime libIGCM (library for IPSL Global Climate Modeling group) has recently been enhanced so as to support hitherto impossible realtime use cases such as simulation monitoring, data publication, metrics collection, simulation control, visualizations … etc. At the core of this enhancement is Prodiguer: an AMQP (Advanced Message Queue Protocol) based event driven asynchronous distributed messaging platform. libIGCM now dispatches copious amounts of information, in the form of messages, to the platform for remote processing by Prodiguer software agents at IPSL servers in Paris. Such processing takes several forms: Persisting message content to database(s); Launching rollback jobs upon simulation failure; Notifying downstream applications; Automation of visualization pipelines; We will describe and/or demonstrate the platform's: Technical implementation; Inherent ease of scalability; Inherent adaptiveness in respect to supervising simulations; Web portal receiving simulation notifications in realtime.
Hirsch-Moverman, Yael; Daftary, Amrita; Yuengling, Katharine A.; Saito, Suzue; Ntoane, Moeketsi; Frederix, Koen; Maama, Llang B.; Howard, Andrea A.
2017-01-01
Background: mHealth is a promising means of supporting adherence to treatment. The Start TB patients on ART and Retain on Treatment (START) study included real-time adherence support using short-text messaging service (SMS) text messaging and trained village health workers (VHWs). We describe the use and acceptability of mHealth by patients with HIV/tuberculosis and health care providers. Methods: Patients and treatment supporters received automated, coded medication and appointment reminders at their preferred time and frequency, using their own phones, and $3.70 in monthly airtime. Facility-based VHWs were trained to log patient information and text message preferences into a mobile application and were given a password-protected mobile phone and airtime to communicate with community-based VHWs. The use of mHealth tools was analyzed from process data over the study course. Acceptability was evaluated during monthly follow-up interviews with all participants and during qualitative interviews with a subset of 30 patients and 30 health care providers at intervention sites. Use and acceptability were contextualized by monthly adherence data. Findings: From April 2013 to August 2015, the automated SMS system successfully delivered 39,528 messages to 835 individuals, including 633 patients and 202 treatment supporters. Uptake of the SMS intervention was high, with 92.1% of 713 eligible patients choosing to receive SMS messages. Patient and provider interviews yielded insight into barriers and facilitators to mHealth utilization. The intervention improved the quality of health communication between patients, treatment supporters, and providers. HIV-related stigma and technical challenges were identified as potential barriers. Conclusions: The mHealth intervention for HIV/tuberculosis treatment support in Lesotho was found to be a low-tech, user-friendly intervention, which was acceptable to patients and health care providers. PMID:27930610
Hirsch-Moverman, Yael; Daftary, Amrita; Yuengling, Katharine A; Saito, Suzue; Ntoane, Moeketsi; Frederix, Koen; Maama, Llang B; Howard, Andrea A
2017-01-01
mHealth is a promising means of supporting adherence to treatment. The Start TB patients on ART and Retain on Treatment (START) study included real-time adherence support using short-text messaging service (SMS) text messaging and trained village health workers (VHWs). We describe the use and acceptability of mHealth by patients with HIV/tuberculosis and health care providers. Patients and treatment supporters received automated, coded medication and appointment reminders at their preferred time and frequency, using their own phones, and $3.70 in monthly airtime. Facility-based VHWs were trained to log patient information and text message preferences into a mobile application and were given a password-protected mobile phone and airtime to communicate with community-based VHWs. The use of mHealth tools was analyzed from process data over the study course. Acceptability was evaluated during monthly follow-up interviews with all participants and during qualitative interviews with a subset of 30 patients and 30 health care providers at intervention sites. Use and acceptability were contextualized by monthly adherence data. From April 2013 to August 2015, the automated SMS system successfully delivered 39,528 messages to 835 individuals, including 633 patients and 202 treatment supporters. Uptake of the SMS intervention was high, with 92.1% of 713 eligible patients choosing to receive SMS messages. Patient and provider interviews yielded insight into barriers and facilitators to mHealth utilization. The intervention improved the quality of health communication between patients, treatment supporters, and providers. HIV-related stigma and technical challenges were identified as potential barriers. The mHealth intervention for HIV/tuberculosis treatment support in Lesotho was found to be a low-tech, user-friendly intervention, which was acceptable to patients and health care providers.
Streamlining CASTOR to manage the LHC data torrent
NASA Astrophysics Data System (ADS)
Lo Presti, G.; Espinal Curull, X.; Cano, E.; Fiorini, B.; Ieri, A.; Murray, S.; Ponce, S.; Sindrilaru, E.
2014-06-01
This contribution describes the evolution of the main CERN storage system, CASTOR, as it manages the bulk data stream of the LHC and other CERN experiments, achieving over 90 PB of stored data by the end of LHC Run 1. This evolution was marked by the introduction of policies to optimize the tape sub-system throughput, going towards a cold storage system where data placement is managed by the experiments' production managers. More efficient tape migrations and recalls have been implemented and deployed where bulk meta-data operations greatly reduce the overhead due to small files. A repack facility is now integrated in the system and it has been enhanced in order to automate the repacking of several tens of petabytes, required in 2014 in order to prepare for the next LHC run. Finally the scheduling system has been evolved to integrate the internal monitoring. To efficiently manage the service a solid monitoring infrastructure is required, able to analyze the logs produced by the different components (about 1 kHz of log messages). A new system has been developed and deployed, which uses a transport messaging layer provided by the CERN-IT Agile Infrastructure and exploits technologies including Hadoop and HBase. This enables efficient data mining by making use of MapReduce techniques, and real-time data aggregation and visualization. The outlook for the future is also presented. Directions and possible evolution will be discussed in view of the restart of data taking activities.
Route Flap Damping Made Usable
NASA Astrophysics Data System (ADS)
Pelsser, Cristel; Maennel, Olaf; Mohapatra, Pradosh; Bush, Randy; Patel, Keyur
The Border Gateway Protocol (BGP), the de facto inter-domain routing protocol of the Internet, is known to be noisy. The protocol has two main mechanisms to ameliorate this, MinRouteAdvertisementInterval (MRAI), and Route Flap Damping (RFD). MRAI deals with very short bursts on the order of a few to 30 seconds. RFD deals with longer bursts, minutes to hours. Unfortunately, RFD was found to severely penalize sites for being well-connected because topological richness amplifies the number of update messages exchanged. So most operators have disabled it. Through measurement, this paper explores the avenue of absolutely minimal change to code, and shows that a few RFD algorithmic constants and limits can be trivially modified, with the result being damping a non-trivial amount of long term churn without penalizing well-behaved prefixes' normal convergence process.
NASA Technical Reports Server (NTRS)
Witt, Kenneth J.; Stanley, Jason; Shendock, Robert; Mandl, Daniel
2005-01-01
Space Technology 5 (ST-5) is a three-satellite constellation, technology validation mission under the New Millennium Program at NASA to be launched in March 2006. One of the key technologies to be validated is a lights-out, model-based operations approach to be used for one week to control the ST-5 constellation with no manual intervention. The ground architecture features the GSFC Mission Services Evolution Center (GMSEC) middleware, which allows easy plugging in of software components and a standardized messaging protocol over a software bus. A predictive modeling tool built on MatLab's Simulink software package makes use of the GMSEC standard messaging protocol to interface to the Advanced Mission Planning System (AMPS) Scenario Scheduler which controls all activities, resource allocation and real-time re-profiling of constellation resources when non-nominal events occur. The key features of this system, which we refer to as the ST-5 Simulink system, are as follows: Original daily plan is checked to make sure that predicted resources needed are available by comparing the plan against the model. As the plan is run in real-time, the system re-profiles future activities in real-time if planned activities do not occur in the predicted timeframe or fashion. Alert messages are sent out on the GMSEC bus by the system if future predicted problems are detected. This will allow the Scenario Scheduler to correct the situation before the problem happens. The predictive model is evolved automatically over time via telemetry updates thus reducing the cost of implementing and maintaining the models by an order of magnitude from previous efforts at GSFC such as the model-based system built for MAP in the mid-1990's. This paper will describe the key features, lessons learned and implications for future missions once this system is successfully validated on-orbit in 2006.
Mian, Adnan Noor; Fatima, Mehwish; Khan, Raees; Prakash, Ravi
2014-01-01
Energy efficiency is an important design paradigm in Wireless Sensor Networks (WSNs) and its consumption in dynamic environment is even more critical. Duty cycling of sensor nodes is used to address the energy consumption problem. However, along with advantages, duty cycle aware networks introduce some complexities like synchronization and latency. Due to their inherent characteristics, many traditional routing protocols show low performance in densely deployed WSNs with duty cycle awareness, when sensor nodes are supposed to have high mobility. In this paper we first present a three messages exchange Lightweight Random Walk Routing (LRWR) protocol and then evaluate its performance in WSNs for routing low data rate packets. Through NS-2 based simulations, we examine the LRWR protocol by comparing it with DYMO, a widely used WSN protocol, in both static and dynamic environments with varying duty cycles, assuming the standard IEEE 802.15.4 in lower layers. Results for the three metrics, that is, reliability, end-to-end delay, and energy consumption, show that LRWR protocol outperforms DYMO in scalability, mobility, and robustness, showing this protocol as a suitable choice in low duty cycle and dense WSNs.
Modelling the protocol stack in NCS with deterministic and stochastic petri net
NASA Astrophysics Data System (ADS)
Hui, Chen; Chunjie, Zhou; Weifeng, Zhu
2011-06-01
Protocol stack is the basis of the networked control systems (NCS). Full or partial reconfiguration of protocol stack offers both optimised communication service and system performance. Nowadays, field testing is unrealistic to determine the performance of reconfigurable protocol stack; and the Petri net formal description technique offers the best combination of intuitive representation, tool support and analytical capabilities. Traditionally, separation between the different layers of the OSI model has been a common practice. Nevertheless, such a layered modelling analysis framework of protocol stack leads to the lack of global optimisation for protocol reconfiguration. In this article, we proposed a general modelling analysis framework for NCS based on the cross-layer concept, which is to establish an efficiency system scheduling model through abstracting the time constraint, the task interrelation, the processor and the bus sub-models from upper and lower layers (application, data link and physical layer). Cross-layer design can help to overcome the inadequacy of global optimisation based on information sharing between protocol layers. To illustrate the framework, we take controller area network (CAN) as a case study. The simulation results of deterministic and stochastic Petri-net (DSPN) model can help us adjust the message scheduling scheme and obtain better system performance.
A note on the security of IS-RFID, an inpatient medication safety.
Safkhani, Masoumeh; Bagheri, Nasour; Naderi, Majid
2014-01-01
In this paper we investigate the security level of a comprehensive RFID solution to enhance inpatient medication safety, named IS-RFID, which has been recently proposed by Peris-Lopez et al. We analyses the security of the protocol against the known attacks in the context. The main target of this paper is to determine whether the new protocol provides the confidentiality property, which is expected to be provided by such a protocol. It was found that IS-RFID has critical weaknesses. The presented security investigations show that a passive adversary can retrieve secret parameters of patient's tag in cost of O(2(16)) off-line PRNG evaluations. Given the tag's secret parameters, any security claims are ruined. In this paper we presented an efficient passive secret disclosure attack which retrieves the main secret parameters related to the patient which shows that IS-RFID may put the patient safety on risk. The proposed attacking technique is in light of two vulnerabilities of the protocol: (1) the short length of the used PRNG, which is urged by the target technology, EPC C1 Gen2 ; (2) the message-generating mechanism utilizing PRNG was not carefully scrutinized. While the later point can be fixed by careful designing of the transferred messages between the protocol's party, the earlier point, i.e., the short length of the available PRNG for EPC C1 Gen2 tags, is a limitation which is forced by the technology. In addition, over the last years, schemes based solely on using simple operations or short PRNG (such as IS-RFID) have been shown to offer very low or no security at all. Recent advances in lightweight ciphers, such as PRESENT or Grain , seem a much more appropriate solution rather than relying on short PRNGs. However, such solutions breaks the EPC C1 Gen2 compatibility. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.
Kerrison, R S; Shukla, H; Cunningham, D; Oyebode, O; Friedman, E
2015-03-17
There is a need for interventions to promote uptake of breast screening throughout Europe. We performed a single-blind randomised controlled trial to test whether text-message reminders were effective. Two thousand two hundred and forty women receiving their first breast screening invitation were included in the study and randomly assigned in a 1 : 1 ratio to receive either a normal invitation only (n=1118) or a normal invitation plus a text-message reminder 48 h before their appointment (n=1122). In the intention-to-treat analysis, uptake of breast screening was 59.1% among women in the normal invitation group and 64.4% in the text-message reminder group (χ(2)=6.47, odds ratio (OR): 1.26, 95% confidence intervals (CI): 1.05-1.48, P=0.01). Of the 1122 women assigned to the text-message reminder group, only 456 (41%) had a mobile number recorded by their GP and were thereby sent a text. In the per-protocol analysis, uptake by those in the control group who had a mobile number recorded on the GP system was 59.77% and by those in the intervention group who were sent a reminder 71.7% (χ(2)=14.12, OR=1.71, 95% CI=1.29-2.26, P<0.01). Sending women a text-message reminder before their first routine breast screening appointment significantly increased attendance. This information can be used to allocate resources efficiently to improve uptake without exacerbating social inequalities.
A qualitative analysis of messages to promote smoking cessation among pregnant women.
Hoek, Janet; Gifford, Heather; Maubach, Ninya; Newcombe, Rhiannon
2014-11-27
Although aware that smoking while pregnant presents serious risks to their unborn children, some women continue to smoke and rationalise their dissonance rather than quit. We explored metaphors women used to frame smoking and quitting, then developed cessation messages that drew on these metaphors and examined the perceived effectiveness of these. We used a two-phase qualitative study. Phase one involved 13 in-depth interviews with women who were smoking (or who had smoked) while pregnant. Phase two comprised 22 in-depth interviews with a new sample drawn from the same population. Data were analysed using thematic analysis, which promoted theme identification independently of the research protocol. Participants often described smoking as a choice, a frame that explicitly asserted control over their behaviour. This stance allowed them to counter-argue messages to quit, and distanced them from the risks they created and faced. Messages tested in phase 2 used strong affective appeals as well as themes that stimulated cognitive reflection. Without exception, the messages depicting unwell or distressed children elicited strong emotional responses, were more powerful cessation stimuli, and elicited fewer counter-arguments. Cessation messages that evoke strong affective responses capitalise on the dissonance many women feel when smoking while pregnant and stimulate stronger consideration of quitting. Given the importance of promoting cessation among pregnant women, future campaigns could make greater use of emotional appeals and place less emphasis on informational approaches, which often prompt vigorous counter-arguments. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
Highbarger, Helene C.; Alvord, W. Gregory; Jiang, Min Kang; Shah, Akram S.; Metcalf, Julia A.; Lane, H. Clifford; Dewar, Robin L.
1999-01-01
This study evaluated correlation and agreement between version 3 of the Quantiplex human immunodeficiency virus type 1 (HIV-1) RNA assay (v3 branched DNA [bDNA]) and a sensitized Amplicor HIV-1 Monitor assay (reverse transcription [RT]-PCR) for the measurement of HIV RNA. Three hundred eighteen samples from 59 randomly selected, HIV-1-seropositive persons on various drug protocols from the National Institute of Allergy and Infectious Diseases HIV outpatient clinic were studied. The results indicate that v3 bDNA and RT-PCR are highly correlated (r = 0.98) and are in good agreement (mean difference in log10 copies/ml ± 2 standard deviations = 0.072 ± 0.371). The relationship between values obtained by both assays is given by the following equation: log10v3 bDNA = −0.0915 + 1.0052 · log10RT-PCR. This represents a 1.026-fold difference between log10RT-PCR values and log10v3 bDNA values. PMID:10523562
Wilson, Marcia H.; Rowe, Barbara L.; Gitzen, Robert A.; Wilson, Stephen K.; Paintner-Green, Kara J.
2014-01-01
As recommended by Oakley et al. (2003), this protocol provides a narrative and the rationale for selection of streams and rivers within the NGPN that will be measured for water quality, including dissolved oxygen, pH, specific conductivity, and temperature. Standard operating procedures (SOPs) that detail the steps to collect, manage, and disseminate the NGPN water quality data are in an accompanying document. The sampling design documented in this protocol may be updated as monitoring information is collected and interpreted, and as refinement of methodologies develop through time. In addition, evaluation of data and refinement of the program may necessitate potential changes of program objectives. Changes to the NGPN water quality protocols and SOPs will be carefully documented in a revision history log.
Denehy, Mel; Crawford, Gemma; Leavy, Justine; Nimmo, Lauren; Jancey, Jonine
2016-05-20
Worldwide, children under the age of 5 years are at particular risk of drowning. Responding to this need requires the development of evidence-informed drowning prevention strategies. Historically, drowning prevention strategies have included denying access, learning survival skills and providing supervision, as well as education and information which includes the use of mass media. Interventions underpinned by behavioural theory and formative evaluation tend to be more effective, yet few practical examples exist in the drowning and/or injury prevention literature. The Health Belief Model and Social Cognitive Theory will be used to explore participants' perspectives regarding proposed mass media messaging. This paper describes a qualitative protocol to undertake formative research to develop theory-based messages for a child drowning prevention campaign. The primary data source will be focus group interviews with parents and caregivers of children under 5 years of age in metropolitan and regional Western Australia. Qualitative content analysis will be used to analyse the data. This study will contribute to the drowning prevention literature to inform the development of future child drowning prevention mass media campaigns. Findings from the study will be disseminated to practitioners, policymakers and researchers via international conferences, peer and non-peer-reviewed journals and evidence summaries. The study was submitted and approved by the Curtin University Human Research Ethics Committee. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/
Decentralized session initiation protocol solution in ad hoc networks
NASA Astrophysics Data System (ADS)
Han, Lu; Jin, Zhigang; Shu, Yantai; Dong, Linfang
2006-10-01
With the fast development of ad hoc networks, SIP has attracted more and more attention in multimedia service. This paper proposes a new architecture to provide SIP service for ad hoc users, although there is no centralized SIP server deployed. In this solution, we provide the SIP service by the introduction of two nodes: Designated SIP Server (DS) and its Backup Server (BDS). The nodes of ad hoc network designate DS and BDS when they join the session nodes set and when some pre-defined events occur. A new sip message type called REGISTRAR is presented so nodes can send others REGISTRAR message to declare they want to be DS. According to the IP information taken in the message, an algorithm works like the election of DR and BDR in OSPF protocol is used to vote DS and BDS SIP servers. Naturally, the DS will be replaced by BDS when the DS is down for predicable or unpredictable reasons. To facilitate this, the DS should register to the BDS and transfer a backup of the SIP users' database. Considering the possibility DS or BDS may abruptly go down, a special policy is given. When there is no DS and BDS, a new election procedure is triggered just like the startup phase. The paper also describes how SIP works normally in the decentralized model as well as the evaluation of its performance. All sessions based on SIP in ad hoc such as DS voting have been tested in the real experiments within a 500m*500m square area where about 30 random nodes are placed.
Jin, Wenquan; Kim, DoHyeun
2018-05-26
The Internet of Things is comprised of heterogeneous devices, applications, and platforms using multiple communication technologies to connect the Internet for providing seamless services ubiquitously. With the requirement of developing Internet of Things products, many protocols, program libraries, frameworks, and standard specifications have been proposed. Therefore, providing a consistent interface to access services from those environments is difficult. Moreover, bridging the existing web services to sensor and actuator networks is also important for providing Internet of Things services in various industry domains. In this paper, an Internet of Things proxy is proposed that is based on virtual resources to bridge heterogeneous web services from the Internet to the Internet of Things network. The proxy enables clients to have transparent access to Internet of Things devices and web services in the network. The proxy is comprised of server and client to forward messages for different communication environments using the virtual resources which include the server for the message sender and the client for the message receiver. We design the proxy for the Open Connectivity Foundation network where the virtual resources are discovered by the clients as Open Connectivity Foundation resources. The virtual resources represent the resources which expose services in the Internet by web service providers. Although the services are provided by web service providers from the Internet, the client can access services using the consistent communication protocol in the Open Connectivity Foundation network. For discovering the resources to access services, the client also uses the consistent discovery interface to discover the Open Connectivity Foundation devices and virtual resources.
A remote control console for the HHIRF 25-MV Tandem Accelerator
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hasanul Basher, A.M.
The CAMAC-based control system for the 25-MV Tandem Accelerator at HHIRF uses two Perkin-Elmer, 32-bit minicomputers: a message-switching computer and a supervisory computer. Two operator consoles are located on one of the six serial highways. Operator control is provided by means of a console CRT, trackball, assignable shaft encoders, and meters. The message-switching computer transmits and receives control information on the serial highways. At present, the CRT pages with updated parameters can be displayed and parameters can be controlled only from the two existing consoles, one in the Tandem control room and the other in the ORIC control room. Itmore » has become necessary to expand the control capability to several other locations in the building. With the expansion of control and monitoring capability of accelerator parameters to other locations, the operators will be able to control and observe the result of the control action at the same time. This capability will be useful in the new Radioactive Ion Beam project of the division. Since the new control console will be PC-based, the existing page format will be changed. The PC will be communicating with the Perkin-Elmer through RS-232 with the aid of a communication protocol. Hardware configuration has been established, a software program that reads the pages from the shared memory, and a communication protocol have been developed. The following sections present the implementation strategy, work completed, future action plans, and the functional details of the communication protocol.« less
A Family of ACO Routing Protocols for Mobile Ad Hoc Networks.
Rupérez Cañas, Delfín; Sandoval Orozco, Ana Lucila; García Villalba, Luis Javier; Kim, Tai-Hoon
2017-05-22
In this work, an ACO routing protocol for mobile ad hoc networks based on AntHocNet is specified. As its predecessor, this new protocol, called AntOR, is hybrid in the sense that it contains elements from both reactive and proactive routing. Specifically, it combines a reactive route setup process with a proactive route maintenance and improvement process. Key aspects of the AntOR protocol are the disjoint-link and disjoint-node routes, separation between the regular pheromone and the virtual pheromone in the diffusion process and the exploration of routes, taking into consideration the number of hops in the best routes. In this work, a family of ACO routing protocols based on AntOR is also specified. These protocols are based on protocol successive refinements. In this work, we also present a parallelized version of AntOR that we call PAntOR. Using programming multiprocessor architectures based on the shared memory protocol, PAntOR allows running tasks in parallel using threads. This parallelization is applicable in the route setup phase, route local repair process and link failure notification. In addition, a variant of PAntOR that consists of having more than one interface, which we call PAntOR-MI (PAntOR-Multiple Interface), is specified. This approach parallelizes the sending of broadcast messages by interface through threads.
An evaluation of MPI message rate on hybrid-core processors
Barrett, Brian W.; Brightwell, Ron; Grant, Ryan; ...
2014-11-01
Power and energy concerns are motivating chip manufacturers to consider future hybrid-core processor designs that may combine a small number of traditional cores optimized for single-thread performance with a large number of simpler cores optimized for throughput performance. This trend is likely to impact the way in which compute resources for network protocol processing functions are allocated and managed. In particular, the performance of MPI match processing is critical to achieving high message throughput. In this paper, we analyze the ability of simple and more complex cores to perform MPI matching operations for various scenarios in order to gain insightmore » into how MPI implementations for future hybrid-core processors should be designed.« less
Design and Implementation of an Interactive Website to Support Long-Term Maintenance of Weight Loss
Stevens, Victor J; Brantley, Phillip J; Erlinger, Thomas P; Myers, Valerie H; Champagne, Catherine M; Bauck, Alan; Samuel-Hodge, Carmen D; Hollis, Jack F
2008-01-01
Background For most individuals, long-term maintenance of weight loss requires long-term, supportive intervention. Internet-based weight loss maintenance programs offer considerable potential for meeting this need. Careful design processes are required to maximize adherence and minimize attrition. Objective This paper describes the development, implementation and use of a Web-based intervention program designed to help those who have recently lost weight sustain their weight loss over 1 year. Methods The weight loss maintenance website was developed over a 1-year period by an interdisciplinary team of public health researchers, behavior change intervention experts, applications developers, and interface designers. Key interactive features of the final site include social support, self-monitoring, written guidelines for diet and physical activity, links to appropriate websites, supportive tools for behavior change, check-in accountability, tailored reinforcement messages, and problem solving and relapse prevention training. The weight loss maintenance program included a reminder system (automated email and telephone messages) that prompted participants to return to the website if they missed their check-in date. If there was no log-in response to the email and telephone automated prompts, a staff member called the participant. We tracked the proportion of participants with at least one log-in per month, and analyzed log-ins as a result of automated prompts. Results The mean age of the 348 participants enrolled in an ongoing randomized trial and assigned to use the website was 56 years; 63% were female, and 38% were African American. While weight loss data will not be available until mid-2008, website use remained high during the first year with over 80% of the participants still using the website during month 12. During the first 52 weeks, participants averaged 35 weeks with at least one log-in. Email and telephone prompts appear to be very effective at helping participants sustain ongoing website use. Conclusions Developing interactive websites is expensive, complex, and time consuming. We found that extensive paper prototyping well in advance of programming and a versatile product manager who could work with project staff at all levels of detail were essential to keeping the development process efficient. Trial Registration clinicaltrials.gov NCT00054925 PMID:18244892
An Interface Transformation Strategy for AF-IPPS
2012-12-01
Representational State Transfer (REST) and Java Enterprise Edition ( Java EE) to implement a reusable “translation service.” For SOAP and REST protocols, XML and...of best-of-breed open source software. The product baseline is summarized in the following table: Product Function Description Java Language...Compiler & Runtime JBoss Application Server Applications, Messaging, Translation Java EE Application Server Ruby on Rails Applications Ruby Web
Covert Channels in SIP for VoIP Signalling
NASA Astrophysics Data System (ADS)
Mazurczyk, Wojciech; Szczypiorski, Krzysztof
In this paper, we evaluate available steganographic techniques for SIP (Session Initiation Protocol) that can be used for creating covert channels during signaling phase of VoIP (Voice over IP) call. Apart from characterizing existing steganographic methods we provide new insights by introducing new techniques. We also estimate amount of data that can be transferred in signalling messages for typical IP telephony call.
Predicting Host Level Reachability via Static Analysis of Routing Protocol Configuration
2007-09-01
check_function_bodies = false; SET client_min_messages = warning; -- -- Name: SCHEMA public; Type: COMMENT; Schema: -; Owner: postgres -- COMMENT...public; Owner: mcmanst -- -- -- Name: public; Type: ACL; Schema: -; Owner: postgres -- REVOKE ALL ON SCHEMA public FROM PUBLIC; REVOKE...ALL ON SCHEMA public FROM postgres ; GRANT ALL ON SCHEMA public TO postgres ; GRANT ALL ON SCHEMA public TO PUBLIC; -- -- PostgreSQL database
Cellular computational platform and neurally inspired elements thereof
Okandan, Murat
2016-11-22
A cellular computational platform is disclosed that includes a multiplicity of functionally identical, repeating computational hardware units that are interconnected electrically and optically. Each computational hardware unit includes a reprogrammable local memory and has interconnections to other such units that have reconfigurable weights. Each computational hardware unit is configured to transmit signals into the network for broadcast in a protocol-less manner to other such units in the network, and to respond to protocol-less broadcast messages that it receives from the network. Each computational hardware unit is further configured to reprogram the local memory in response to incoming electrical and/or optical signals.
On Reducing Delay in Mesh-Based P2P Streaming: A Mesh-Push Approach
NASA Astrophysics Data System (ADS)
Liu, Zheng; Xue, Kaiping; Hong, Peilin
The peer-assisted streaming paradigm has been widely employed to distribute live video data on the internet recently. In general, the mesh-based pull approach is more robust and efficient than the tree-based push approach. However, pull protocol brings about longer streaming delay, which is caused by the handshaking process of advertising buffer map message, sending request message and scheduling of the data block. In this paper, we propose a new approach, mesh-push, to address this issue. Different from the traditional pull approach, mesh-push implements block scheduling algorithm at sender side, where the block transmission is initiated by the sender rather than by the receiver. We first formulate the optimal upload bandwidth utilization problem, then present the mesh-push approach, in which a token protocol is designed to avoid block redundancy; a min-cost flow model is employed to derive the optimal scheduling for the push peer; and a push peer selection algorithm is introduced to reduce control overhead. Finally, we evaluate mesh-push through simulation, the results of which show mesh-push outperforms the pull scheduling in streaming delay, and achieves comparable delivery ratio at the same time.
Iteratively Developing an mHealth HIV Prevention Program for Sexual Minority Adolescent Men
Prescott, Tonya L.; Philips, Gregory L.; Bull, Sheana S.; Parsons, Jeffrey T.; Mustanski, Brian
2015-01-01
Five activities were implemented between November 2012 and June 2014 to develop an mHealth HIV prevention program for adolescent gay, bisexual, and queer men (AGBM): (1) focus groups to gather acceptability of the program components; (2) ongoing development of content; (3) Content Advisory Teams to confirm the tone, flow, and understandability of program content; (4) an internal team test to alpha test software functionality; and (5) a beta test to test the protocol and intervention messages. Findings suggest that AGBM preferred positive and friendly content that at the same time, did not try to sound like a peer. They deemed the number of daily text messages (i.e., 8–15 per day) to be acceptable. The Text Buddy component was well received but youth needed concrete direction about appropriate discussion topics. AGBM determined the self-safety assessment also was acceptable. Its feasible implementation in the beta test suggests that AGBM can actively self-determine their potential danger when participating in sexual health programs. Partnering with the target population in intervention development is critical to ensure that a salient final product and feasible protocol are created. PMID:26238038
Live chat alternative security protocol
NASA Astrophysics Data System (ADS)
Rahman, J. P. R.; Nugraha, E.; Febriany, A.
2018-05-01
Indonesia is one of the largest e-commerce markets in Southeast Asia, as many as 5 million people do transactions in e-commerce, therefore more and more people use live chat service to communicate with customer service. In live chat, the customer service often asks customers’ data such as, full name, address, e-mail, transaction id, which aims to verify the purchase of the product. One of the risks that will happen is sniffing which will lead to the theft of confidential information that will cause huge losses to the customer. The anticipation that will be done is build an alternative security protocol for user interaction in live chat by using a cryptographic algorithm that is useful for protecting confidential messages. Live chat requires confidentiality and data integration with encryption and hash functions. The used algorithm are Rijndael 256 bits, RSA, and SHA256. To increase the complexity, the Rijndael algorithm will be modified in the S-box and ShiftRow sections based on the shannon principle rule, the results show that all pass the Randomness test, but the modification in Shiftrow indicates a better avalanche effect. Therefore the message will be difficult to be stolen or changed.
Trial of real-time locating and messaging system with Bluetooth low energy.
Arisaka, Naoya; Mamorita, Noritaka; Isonaka, Risa; Kawakami, Tadashi; Takeuchi, Akihiro
2016-09-14
Hospital real-time location systems (RTLS) are increasing efficiency and reducing operational costs, but room access tags are necessary. We developed three iPhone 5 applications for an RTLS and communications using Bluetooth low energy (BLE). The applications were: Peripheral device tags, Central beacons, and a Monitor. A Peripheral communicated with a Central using BLE. The Central communicated with a Monitor using sockets on TCP/IP (Transmission Control Protocol/Internet Protocol) via a WLAN (wireless local area network). To determine a BLE threshold level for the received signal strength indicator (RSSI), relationships between signal strength and distance were measured in our laboratory and on the terrace. The BLE RSSI threshold was set at -70 dB, about 10 m. While an individual with a Peripheral moved around in a concrete building, the Peripheral was captured in a few 10-sec units at about 10 m from a Central. The Central and Monitor showed and saved the approach events, location, and Peripheral's nickname sequentially in real time. Remote Centrals also interactively communicate with Peripherals by intermediating through Monitors that found the nickname in the event database. Trial applications using BLE on iPhones worked well for patient tracking, and messaging in indoor environments.
Protocol Analysis as a Tool in Function and Task Analysis
1999-10-01
Autocontingency The use of log-linear and logistic regression methods to analyse sequential data seems appealing , and is strongly advocated by...collection and analysis of observational data. Behavior Research Methods, Instruments, and Computers, 23(3), 415-429. Patrick, J. D. (1991). Snob : A
32 CFR 806b.35 - Balancing protection.
Code of Federal Regulations, 2014 CFR
2014-07-01
..., Computer Security, 5 for procedures on safeguarding personal information in automated records. 5 http://www... automated system with a log-on protocol. Others may require more sophisticated security protection based on the sensitivity of the information. Classified computer systems or those with established audit and...
32 CFR 806b.35 - Balancing protection.
Code of Federal Regulations, 2013 CFR
2013-07-01
..., Computer Security, 5 for procedures on safeguarding personal information in automated records. 5 http://www... automated system with a log-on protocol. Others may require more sophisticated security protection based on the sensitivity of the information. Classified computer systems or those with established audit and...
32 CFR 806b.35 - Balancing protection.
Code of Federal Regulations, 2012 CFR
2012-07-01
..., Computer Security, 5 for procedures on safeguarding personal information in automated records. 5 http://www... automated system with a log-on protocol. Others may require more sophisticated security protection based on the sensitivity of the information. Classified computer systems or those with established audit and...
32 CFR 806b.35 - Balancing protection.
Code of Federal Regulations, 2011 CFR
2011-07-01
..., Computer Security, 5 for procedures on safeguarding personal information in automated records. 5 http://www... automated system with a log-on protocol. Others may require more sophisticated security protection based on the sensitivity of the information. Classified computer systems or those with established audit and...
32 CFR 806b.35 - Balancing protection.
Code of Federal Regulations, 2010 CFR
2010-07-01
..., Computer Security, 5 for procedures on safeguarding personal information in automated records. 5 http://www... automated system with a log-on protocol. Others may require more sophisticated security protection based on the sensitivity of the information. Classified computer systems or those with established audit and...
An Efficient Mutual Authentication Framework for Healthcare System in Cloud Computing.
Kumar, Vinod; Jangirala, Srinivas; Ahmad, Musheer
2018-06-28
The increasing role of Telecare Medicine Information Systems (TMIS) makes its accessibility for patients to explore medical treatment, accumulate and approach medical data through internet connectivity. Security and privacy preservation is necessary for medical data of the patient in TMIS because of the very perceptive purpose. Recently, Mohit et al.'s proposed a mutual authentication protocol for TMIS in the cloud computing environment. In this work, we reviewed their protocol and found that it is not secure against stolen verifier attack, many logged in patient attack, patient anonymity, impersonation attack, and fails to protect session key. For enhancement of security level, we proposed a new mutual authentication protocol for the similar environment. The presented framework is also more capable in terms of computation cost. In addition, the security evaluation of the protocol protects resilience of all possible security attributes, and we also explored formal security evaluation based on random oracle model. The performance of the proposed protocol is much better in comparison to the existing protocol.
Chlan, Linda; Patterson, Robert P.; Heiderscheit, Annie
2011-01-01
Methods to easily, accurately, and efficiently obtain data in an ICU-based clinical trial can be challenging in this high-tech setting. Patient medical status and the dynamic nature of this clinical setting further complicates data collection. The purpose of this paper is to describe the modifications of commercially available headphones and the application of a data logging device to capture frequency and length of protocol use (music listening or headphones only for noise cancellation) without burdening participants or busy ICU nurses. With the automatic capture of protocol use by research participants, there have been no instances of lost data for this clinical trial. PMID:21382515
Chlan, Linda; Patterson, Robert P; Heiderscheit, Annie
2011-07-01
Methods to easily, accurately, and efficiently obtain data in an ICU-based clinical trial can be challenging in this high-tech setting. Patient medical status and the dynamic nature of this clinical setting further complicate data collection. The purpose of this paper is to describe the modifications of commercially available headphones and the application of a data logging device to capture frequency and length of protocol use (music listening or headphones only for noise cancellation) without burdening participants or busy ICU nurses. With the automatic capture of protocol use by research participants, there have been no instances of lost data for this clinical trial. Copyright © 2011 Elsevier Inc. All rights reserved.
Kim, Eun-Young
2017-10-01
The monitoring of medication compliance in clinical trials is important but labor intensive. To check medication compliance in clinical trials, a system was developed, and its technical feasibility evaluated. The system consisted of three parts: a management part (clinical trial center database and a developed program), clinical trial investigator part (monitoring), and clinical trial participant part (personal digital assistant [PDA] with a barcode scanner). The system was tested with 20 participants for 2 weeks, and compliance was evaluated. This study developed a medication compliance monitoring system that used a PDA with a barcode scanner, which sent reminder/warning messages, logged medication barcode data, and provided compliance information to investigators. Registered participants received short message service (SMS) reminder/warning messages on their PDA and sent barcode data at the dosing time. The age range of the participants was 29 to 73 years. Five participants were <50 years old and 8 were ≥65 years old. The total mean compliance rate was 82.3%. The mean compliance rate was 83.1% in participants <65 years old and 81.1% in those ≥65 years old. The system was feasible, usable, and effective, even with elderly participants, for monitoring medication compliance in clinical trials using a PDA with a barcode scanner, and may improve the quality of clinical trials.
Patterson, Paul Daniel; Moore, Charity G; Weaver, Matthew D; Buysse, Daniel J; Suffoletto, Brian P; Callaway, Clifton W; Yealy, Donald M
2014-06-21
Mental and physical fatigue while at work is common among emergency medical services (EMS) shift workers. Extended shifts (for example 24 hours) and excessive amounts of overtime work increase the likelihood of negative safety outcomes and pose a challenge for EMS fatigue-risk management. Text message-based interventions are a potentially high-impact, low-cost platform for sleep and fatigue assessment and distributing information to workers at risk of negative safety outcomes related to sleep behaviors and fatigue. We will conduct a pilot randomized trial with a convenience sample of adult EMS workers recruited from across the United States using a single study website. Participants will be allocated to one of two possible arms for a 90-day study period. The intervention arm will involve text message assessments of sleepiness, fatigue, and difficulty with concentration at the beginning, during, and end of scheduled shifts. Intervention subjects reporting high levels of sleepiness or fatigue will receive one of four randomly selected intervention messages promoting behavior change during shiftwork. Control subjects will receive assessment only text messages. We aim to determine the performance characteristics of a text messaging tool for the delivery of a sleep and fatigue intervention. We seek to determine if a text messaging program with tailored intervention messages is effective at reducing perceived sleepiness and/or fatigue among emergency medicine clinician shift workers. Additional aims include testing whether a theory-based behavioral intervention, delivered by text message, changes 'alertness behaviors'. The SleepTrackTXT pilot trial could provide evidence of compliance and effectiveness that would support rapid widespread expansion in one of two forms: 1) a stand-alone program in the form of a tailored/individualized sleep monitoring and fatigue reduction support service for EMS workers; or 2) an add-on to a multi-component fatigue risk management program led and maintained by employers or by safety and risk management services. Clinicaltrials.gov NCT02063737, Registered on 10 January 2014.
2014-01-01
Background Mental and physical fatigue while at work is common among emergency medical services (EMS) shift workers. Extended shifts (for example 24 hours) and excessive amounts of overtime work increase the likelihood of negative safety outcomes and pose a challenge for EMS fatigue-risk management. Text message-based interventions are a potentially high-impact, low-cost platform for sleep and fatigue assessment and distributing information to workers at risk of negative safety outcomes related to sleep behaviors and fatigue. Methods/Design We will conduct a pilot randomized trial with a convenience sample of adult EMS workers recruited from across the United States using a single study website. Participants will be allocated to one of two possible arms for a 90-day study period. The intervention arm will involve text message assessments of sleepiness, fatigue, and difficulty with concentration at the beginning, during, and end of scheduled shifts. Intervention subjects reporting high levels of sleepiness or fatigue will receive one of four randomly selected intervention messages promoting behavior change during shiftwork. Control subjects will receive assessment only text messages. We aim to determine the performance characteristics of a text messaging tool for the delivery of a sleep and fatigue intervention. We seek to determine if a text messaging program with tailored intervention messages is effective at reducing perceived sleepiness and/or fatigue among emergency medicine clinician shift workers. Additional aims include testing whether a theory-based behavioral intervention, delivered by text message, changes ‘alertness behaviors’. Discussion The SleepTrackTXT pilot trial could provide evidence of compliance and effectiveness that would support rapid widespread expansion in one of two forms: 1) a stand-alone program in the form of a tailored/individualized sleep monitoring and fatigue reduction support service for EMS workers; or 2) an add-on to a multi-component fatigue risk management program led and maintained by employers or by safety and risk management services. Trial Registration Clinicaltrials.gov NCT02063737, Registered on 10 January 2014 PMID:24952387
An Efficient and QoS Supported Multichannel MAC Protocol for Vehicular Ad Hoc Networks
Tan, Guozhen; Yu, Chao
2017-01-01
Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety (transport efficiency and infotainment) applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. Different types of applications require different levels Quality-of-Service (QoS) support. Recently, transport efficiency and infotainment applications (e.g., electronic map download and Internet access) have received more and more attention, and this kind of applications is expected to become a big market driver in a near future. In this paper, we propose an Efficient and QoS supported Multichannel Medium Access Control (EQM-MAC) protocol for VANETs in a highway environment. The EQM-MAC protocol utilizes the service channel resources for non-safety message transmissions during the whole synchronization interval, and it dynamically adjusts minimum contention window size for different non-safety services according to the traffic conditions. Theoretical model analysis and extensive simulation results show that the EQM-MAC protocol can support QoS services, while ensuring the high saturation throughput and low transmission delay for non-safety applications. PMID:28991217
NASA Technical Reports Server (NTRS)
Moore, J. Strother
1992-01-01
In this paper we present a formal model of asynchronous communication as a function in the Boyer-Moore logic. The function transforms the signal stream generated by one processor into the signal stream consumed by an independently clocked processor. This transformation 'blurs' edges and 'dilates' time due to differences in the phases and rates of the two clocks and the communications delay. The model can be used quantitatively to derive concrete performance bounds on asynchronous communications at ISO protocol level 1 (physical level). We develop part of the reusable formal theory that permits the convenient application of the model. We use the theory to show that a biphase mark protocol can be used to send messages of arbitrary length between two asynchronous processors. We study two versions of the protocol, a conventional one which uses cells of size 32 cycles and an unconventional one which uses cells of size 18. We conjecture that the protocol can be proved to work under our model for smaller cell sizes and more divergent clock rates but the proofs would be harder.
NASA Technical Reports Server (NTRS)
Collazo, Carlimar
2011-01-01
The statement of purpose is to analyze network monitoring logs to support the computer incident response team. Specifically, gain a clear understanding of the Uniform Resource Locator (URL) and its structure, and provide a way to breakdown a URL based on protocol, host name domain name, path, and other attributes. Finally, provide a method to perform data reduction by identifying the different types of advertisements shown on a webpage for incident data analysis. The procedures used for analysis and data reduction will be a computer program which would analyze the URL and identify and advertisement links from the actual content links.
McCarthy, Ona L; Osorio Calderon, Veronica; Makleff, Shelly; Huaynoca, Silvia; Leurent, Baptiste; Edwards, Phil; Lopez Gallardo, Jhonny; Free, Caroline
2017-12-18
Unintended pregnancy is associated with numerous poorer health outcomes for both women and their children. Fulfilling unmet need for contraception is essential in avoiding unintended pregnancies, yet millions of women in low- and middle-income countries continue to face obstacles in realizing their fertility desires. In Bolivia, family planning progress has improved in recent decades but lags behind other countries in the region. Unmet need for contraception among women aged 15 to 19 years is estimated to be 38%, with the adolescent fertility rate at 70 per 1000 women. Mobile phones are an established and popular mode in which to deliver health behavior support. The London School of Hygiene & Tropical Medicine and the Centro de Investigación, Educación y Servicios in Bolivia have partnered to develop and evaluate a contraceptive behavioral intervention for Bolivian young women delivered by mobile phone. The intervention was developed guided by behavioral science and consists of short instant messages sent through an app over 4 months. The objective of this study is to evaluate the effect of the intervention on young women's use of and attitudes toward the most effective contraceptive methods. We will allocate 1310 women aged 16 to 24 years with an unmet need for contraception in a 1:1 ratio to receive the intervention messages or the control messages about trial participation. The messages are sent through the Tú decides app, which contains standard family planning information. Coprimary outcomes are use and acceptability of at least one effective contraceptive method, both measured at 4 months. Recruitment commenced on March 1, 2017 and was completed on July 29, 2017. We estimate that the follow-up period will end in January 2018. This trial will evaluate the effect of the intervention on young women's use of and attitudes toward the (nonpermanent) effective contraception methods available in Bolivia. ClinicalTrials.gov NCT02905526; https://clinicaltrials.gov/ct2/show/NCT02905526 (Archived by WebCite at http://www.webcitation.org/6vT0yIFfN). ©Ona L McCarthy, Veronica Osorio Calderon, Shelly Makleff, Silvia Huaynoca, Baptiste Leurent, Phil Edwards, Jhonny Lopez Gallardo, Caroline Free. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 18.12.2017.
The Interplanetary Overlay Networking Protocol Accelerator
NASA Technical Reports Server (NTRS)
Pang, Jackson; Torgerson, Jordan L.; Clare, Loren P.
2008-01-01
A document describes the Interplanetary Overlay Networking Protocol Accelerator (IONAC) an electronic apparatus, now under development, for relaying data at high rates in spacecraft and interplanetary radio-communication systems utilizing a delay-tolerant networking protocol. The protocol includes provisions for transmission and reception of data in bundles (essentially, messages), transfer of custody of a bundle to a recipient relay station at each step of a relay, and return receipts. Because of limitations on energy resources available for such relays, data rates attainable in a conventional software implementation of the protocol are lower than those needed, at any given reasonable energy-consumption rate. Therefore, a main goal in developing the IONAC is to reduce the energy consumption by an order of magnitude and the data-throughput capability by two orders of magnitude. The IONAC prototype is a field-programmable gate array that serves as a reconfigurable hybrid (hardware/ firmware) system for implementation of the protocol. The prototype can decode 108,000 bundles per second and encode 100,000 bundles per second. It includes a bundle-cache static randomaccess memory that enables maintenance of a throughput of 2.7Gb/s, and an Ethernet convergence layer that supports a duplex throughput of 1Gb/s.
A Lightweight Protocol for Secure Video Streaming
Morkevicius, Nerijus; Bagdonas, Kazimieras
2018-01-01
The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing “Fog Node-End Device” layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard. PMID:29757988
A General Self-Organized Tree-Based Energy-Balance Routing Protocol for Wireless Sensor Network
NASA Astrophysics Data System (ADS)
Han, Zhao; Wu, Jie; Zhang, Jie; Liu, Liefeng; Tian, Kaiyun
2014-04-01
Wireless sensor network (WSN) is a system composed of a large number of low-cost micro-sensors. This network is used to collect and send various kinds of messages to a base station (BS). WSN consists of low-cost nodes with limited battery power, and the battery replacement is not easy for WSN with thousands of physically embedded nodes, which means energy efficient routing protocol should be employed to offer a long-life work time. To achieve the aim, we need not only to minimize total energy consumption but also to balance WSN load. Researchers have proposed many protocols such as LEACH, HEED, PEGASIS, TBC and PEDAP. In this paper, we propose a General Self-Organized Tree-Based Energy-Balance routing protocol (GSTEB) which builds a routing tree using a process where, for each round, BS assigns a root node and broadcasts this selection to all sensor nodes. Subsequently, each node selects its parent by considering only itself and its neighbors' information, thus making GSTEB a dynamic protocol. Simulation results show that GSTEB has a better performance than other protocols in balancing energy consumption, thus prolonging the lifetime of WSN.
A Lightweight Protocol for Secure Video Streaming.
Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis
2018-05-14
The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.
The Space Communications Protocol Standards Program
NASA Technical Reports Server (NTRS)
Jeffries, Alan; Hooke, Adrian J.
1994-01-01
In the fall of 1992 NASA and the Department of Defense chartered a technical team to explore the possibility of developing a common set of space data communications standards for potential dual-use across the U.S. national space mission support infrastructure. The team focused on the data communications needs of those activities associated with on-lined control of civil and military aircraft. A two-pronged approach was adopted: a top-down survey of representative civil and military space data communications requirements was conducted; and a bottom-up analysis of available standard data communications protocols was performed. A striking intersection of civil and military space mission requirements emerged, and an equally striking consensus on the approach towards joint civil and military space protocol development was reached. The team concluded that wide segments of the U.S. civil and military space communities have common needs for: (1) an efficient file transfer protocol; (2) various flavors of underlying data transport service; (3) an optional data protection mechanism to assure end-to-end security of message exchange; and (4) an efficient internetworking protocol. These recommendations led to initiating a program to develop a suite of protocols based on these findings. This paper describes the current status of this program.
Peanut Roaster Temperatures Relative to Salmonella Kill
USDA-ARS?s Scientific Manuscript database
ARS, Market Quality and Handling Research Unit, Raleigh NC 27695 In response to the limited peanut butter contamination incident of 2006/7, studies were initiated to examine the effect of various time and temperature protocols on log kill levels for Salmonella on peanuts. The objective of the work ...
Park, Jihong; Kim, Ki-Hyung; Kim, Kangseok
2017-04-19
The IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) was proposed for various applications of IPv6 low power wireless networks. While RPL supports various routing metrics and is designed to be suitable for wireless sensor network environments, it does not consider the mobility of nodes. Therefore, there is a need for a method that is energy efficient and that provides stable and reliable data transmission by considering the mobility of nodes in RPL networks. This paper proposes an algorithm to support node mobility in RPL in an energy-efficient manner and describes its operating principle based on different scenarios. The proposed algorithm supports the mobility of nodes by dynamically adjusting the transmission interval of the messages that request the route based on the speed and direction of the motion of mobile nodes, as well as the costs between neighboring nodes. The performance of the proposed algorithm and previous algorithms for supporting node mobility were examined experimentally. From the experiment, it was observed that the proposed algorithm requires fewer messages per unit time for selecting a new parent node following the movement of a mobile node. Since fewer messages are used to select a parent node, the energy consumption is also less than that of previous algorithms.
Park, Jihong; Kim, Ki-Hyung; Kim, Kangseok
2017-01-01
The IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) was proposed for various applications of IPv6 low power wireless networks. While RPL supports various routing metrics and is designed to be suitable for wireless sensor network environments, it does not consider the mobility of nodes. Therefore, there is a need for a method that is energy efficient and that provides stable and reliable data transmission by considering the mobility of nodes in RPL networks. This paper proposes an algorithm to support node mobility in RPL in an energy-efficient manner and describes its operating principle based on different scenarios. The proposed algorithm supports the mobility of nodes by dynamically adjusting the transmission interval of the messages that request the route based on the speed and direction of the motion of mobile nodes, as well as the costs between neighboring nodes. The performance of the proposed algorithm and previous algorithms for supporting node mobility were examined experimentally. From the experiment, it was observed that the proposed algorithm requires fewer messages per unit time for selecting a new parent node following the movement of a mobile node. Since fewer messages are used to select a parent node, the energy consumption is also less than that of previous algorithms. PMID:28422084