Sample records for nouveau protocole pour

  1. Utilisation d'images aeroportees a tres haute resolution spatiale pour l'estimation de la vigueur des peuplements forestiers du nord-ouest du Nouveau-Brunswick

    NASA Astrophysics Data System (ADS)

    Louis, Ognel Pierre

    Le but de cette etude est de developper un outil permettant d'estimer le niveau de risque de perte de vigueur des peuplements forestiers de la region de Gounamitz au nord-ouest du Nouveau-Brunswick via des donnees d'inventaires forestiers et des donnees de teledetection. Pour ce faire, un marteloscope de 100m x 100m et 20 parcelles d'echantillonnages ont ete delimites. A l'interieur de ces derniers, le niveau de risque de perte de vigueur des arbres ayant un DHP superieur ou egal a 9 cm a ete determine. Afin de caracteriser le risque de perte de vigueur des arbres, leurs positions spatiales ont ete repertoriees a partir d'un GPS en tenant compte des defauts au niveau des tiges. Pour mener a bien ce travail, les indices de vegetation et de textures et les bandes spectrales de l'image aeroportee ont ete extraits et consideres comme variables independantes. Le niveau de risque de perte de vigueur obtenu par espece d'arbre a travers les inventaires forestiers a ete considere comme variable dependante. En vue d'obtenir la superficie des peuplements forestiers de la region d'etude, une classification dirigee des images a partir de l'algorithme maximum de vraisemblance a ete effectuee. Le niveau de risque de perte de vigueur par type d'arbre a ensuite ete estime a l'aide des reseaux de neurones en utilisant un reseau dit perceptron multicouches. Il s'agit d'un modele de reseau de neurones compose de : 11 neurones sur la couche d'entree, correspondant aux variables independantes, 35 neurones sur la couche cachee et 4 neurones sur la couche de sortie. La prediction a partir des reseaux de neurones produit une matrice de confusion qui permet d'obtenir des mesures quantitatives d'estimation, notamment un pourcentage de classification globale de 91,7% pour la prediction du risque de perte de vigueur du peuplement de resineux et de 89,7% pour celui du peuplement de feuillus. L'evaluation de la performance des reseaux de neurones fournit une valeur de MSE globale de 0,04, et une

  2. Fabrication par injection flexible de pieces coniques pour des applications aerospatiales

    NASA Astrophysics Data System (ADS)

    Shebib Loiselle, Vincent

    Les materiaux composites sont presents dans les tuyeres de moteurs spatiaux depuis les annees soixante. Aujourd'hui, l'avenement des tissus tridimensionnels apporte une solution innovatrice au probleme de delamination qui limitait les proprietes mecaniques de ces composites. L'utilisation de ces tissus necessite toutefois la conception de procedes de fabrication mieux adaptes. Une nouvelle methode de fabrication de pieces composites pour des applications aerospatiales a ete etudiee tout au long de ce travail. Celle-ci applique les principes de l'injection flexible (procede Polyflex) a la fabrication de pieces coniques de fortes epaisseurs. La piece de validation a fabriquer represente un modele reduit de piece de tuyere de moteur spatial. Elle est composee d'un renfort tridimensionnel en fibres de carbone et d'une resine phenolique. La reussite du projet est definie par plusieurs criteres sur la compaction et la formation de plis du renfort et sur la formation de porosites de la piece fabriquee. Un grand nombre d'etapes ont ete necessaires avant la fabrication de deux pieces de validation. Premierement, pour repondre au critere sur la compaction du renfort, la conception d'un outil de caracterisation a ete entreprise. L'etude de la compaction a ete effectuee afin d'obtenir les informations necessaires a la comprehension de la deformation d'un renfort 3D axisymetrique. Ensuite, le principe d'injection de la piece a ete defini pour ce nouveau procede. Pour en valider les concepts proposes, la permeabilite du renfort fibreux ainsi que la viscosite de la resine ont du etre caracterisees. A l'aide de ces donnees, une serie de simulations de l'ecoulement pendant l'injection de la piece ont ete realisees et une approximation du temps de remplissage calculee. Apres cette etape, la conception du moule de tuyere a ete entamee et appuyee par une simulation mecanique de la resistance aux conditions de fabrication. Egalement, plusieurs outillages necessaires pour la fabrication

  3. Developpement d'outils quantitatifs pour le suivi par imagerie TEP/TDM de la reponse a la chimiotherapie et de sa toxicite

    NASA Astrophysics Data System (ADS)

    Croteau, Etienne

    L'objectif de ce projet de doctorat est de developper des outils quantitatifs pour le suivi des traitements de chimiotherapie pour le cancer du sein et de leurs effets cardiotoxiques a l'aide de l'imagerie TEP dynamique. L'analyse cinetique en TEP dynamique permet l'evaluation de parametres biologiques in vivo. Cette analyse peut etre utilise pour caracteriser la reponse tumorale a la chimiotherapie et les effets secondaires nefastes qui peuvent en resulter. Le premier article de cette these decrit la mise au point des techniques d'analyse cinetique qui utilisent la fonction d'entree d'un radiotraceur derive de l'image dynamique. Des corrections de contamination radioactive externe (epanchement) et de l'effet de volume partiel ont ete necessaires pour standardiser l'analyse cinetique et la rendre quantitative. Le deuxieme article porte sur l'evaluation d'un nouveau radiotraceur myocardique. Le 11C-acetoacetate, un nouveau radiotraceur base sur un corps cetonique, a ete compare au 11C-acetate, couramment utilise en imagerie cardiaque TEP. L'utilisation de 3H-acetate et 14C-acetoacetate ont permis d'elucider la cinetique de ces traceurs depuis la fonction d'entree et la captation par les mitochondries cardiaques qui reflete la consommation en oxygene, jusqu'a la liberation de leurs principaux metabolites reciproques (3H20 et 14CO2). Le troisieme et dernier article de cette these presente l'integration d'un modele qui evalue la reserve cardiaque de perfusion et de consommation en oxygene. Un modele de cardiomyopathie a ete etabli a l'aide d'un agent chimiotherapeutique contre le cancer du sein, la doxorubicine, reconnu comme etant cardiotoxique. Un protocole de repos/effort a permis d'evaluer la capacite d'augmentation de perfusion et de consommation en oxygene par le coeur. La demonstration d'une reserve cardiaque reduite caracterise la cardiotoxicite. La derniere contribution de cette these porte sur la mise au point de methodes peu invasives pour mesurer la

  4. Un nouveau cristal laser largement accordable le BOYS dopé à l'ytterbium

    NASA Astrophysics Data System (ADS)

    Chénais, S.; Druon, F.; Balembois, F.; Georges, P.; Gaumé, R.; Aka, G.; Viana, B.; Vivien, D.

    2002-06-01

    Nous avons étudié les performances laser en pompage par diode de puissance d'un nouveau cristal : le Sr3Y(BO3)3 (acronyme : BOYS), dopé à l'ytterbium. Son spectre d'émission particulièrement large en fait un matériau particulièrement prometteur pour la réalisation de lasers femtosecondes directement pompés par diode. Ses performances ont été comparées à celles d'un verre phosphate ainsi qu'à celles du cristal d' Yb:GdCOB dans les mêmes conditions. Nous démontrons que, tant du point de vue de l'efficacité laser que de la tenue aux fortes puissances, GdCOB et BOYS sont supérieurs au verre ; le BOYS est de surcroît plus accordable (sur 50 nm), mais son comportement thermique limite a priori son usage à des puissances de pompe modérées.

  5. Evaluation d'une approche pedagogique respectant les facons d'apprendre des filles en sciences et en TIC en 9e annee au Nouveau-Brunswick

    NASA Astrophysics Data System (ADS)

    Lirette-Pitre, Nicole T.

    2009-07-01

    La reussite scolaire des filles les amene de plus en plus a poursuivre une formation postsecondaire et a exercer des professions qui demandent un haut niveau de connaissances et d'expertise scientifique. Toutefois, les filles demeurent toujours tres peu nombreuses a envisager une carriere en sciences (chimie et physique), en ingenierie ou en TIC (technologie d'information et de la communication), soit une carriere reliee a la nouvelle economie. Pour plusieurs filles, les sciences et les TIC ne sont pas des matieres scolaires qu'elles trouvent interessantes meme si elles y reussissent tres bien. Ces filles admettent que leurs experiences d'apprentissage en sciences et en TIC ne leur ont pas permis de developper un interet ni de se sentir confiante en leurs habiletes a reussir dans ces matieres. Par consequent, peu de filles choisissent de poursuivre leurs etudes postsecondaires dans ces disciplines. La theorie sociocognitive du choix carriere a ete choisie comme modele theorique pour mieux comprendre quelles variables entrent en jeu lorsque les filles choisissent leur carriere. Notre etude a pour objet la conception et l'evaluation de l'efficacite d'un materiel pedagogique concu specifiquement pour ameliorer les experiences d'apprentissage en sciences et en TIC des filles de 9e annee au Nouveau-Brunswick. L'approche pedagogique privilegiee dans notre materiel a mis en oeuvre des strategies pedagogiques issues des meilleures pratiques que nous avons identifiees et qui visaient particulierement l'augmentation du sentiment d'auto-efficacite et de l'interet des filles pour ces disciplines. Ce materiel disponible par Internet a l'adresse http://www.umoncton.ca/lirettn/scientic est directement en lien avec le programme d'etudes en sciences de la nature de 9e annee du Nouveau-Brunswick. L'evaluation de l'efficacite de notre materiel pedagogique a ete faite selon deux grandes etapes methodologiques: 1) l'evaluation de l'utilisabilite et de la convivialite du materiel et 2

  6. Morbidité et mortalité des nouveau-nés hospitalisés sur 10 années à la Clinique El Fateh-Suka (Ouagadougou, Burkina Faso)

    PubMed Central

    Nagalo, Kisito; Dao, Fousséni; Tall, François Housséini; Yé, Diarra

    2013-01-01

    Introduction La mortalité néonatale demeure un problème majeur de santé publique dans les pays en développement. Notre étude avait pour but de déterminer la morbidité et la mortalité des nouveau-nés à Ouagadougou, Burkina Faso. Méthodes Une étude rétrospective sur 10 années a permis d'inclure tous les nouveau-nés admis dans l'Unité de Néonatologie de la Clinique El Fateh-Suka. Résultats Au total, 697 nouveau-nés étaient hospitalisés sur la période d'étude. Les principaux diagnostics étaient les infections néonatales (23.5%), les anomalies liées à la durée de la gestation et à la croissance du fætus (17.9%) et le paludisme congénital (15.1%). Les 91 (13.1%) décès étaient dus aux anomalies liées à la durée de la grossesse et à la croissance du fætus (46.1%), à l'hypoxie intra-utérine et à l'asphyxie obstétricale (20,9%) et aux infections néonatales (17.6%). Ces décès survenaient dans 81.3% dans les 72 heures, dans 93.4% des cas dans la première semaine d'hospitalisation. Le facteur de risque associé à ces décès était la voie basse d'accouchement (p = 0.02). Conclusion Cette étude a identifié des pathologies évitables déjà décrites comme les principales causes d'hospitalisations et de décès néonatals. La voie basse d'accouchement était le facteur de risque associé à ces décès, ce qui n'avait pas encore été rapporté. Les efforts pour améliorer la qualité des services de soins périnatals doivent être intensifiés afin de réduire la mortalité néonatale dans les pays en développement. PMID:23785558

  7. Elaboration de nouvelles approches micromecaniques pour l'optimisation des performances mecaniques des materiaux heterogenes

    NASA Astrophysics Data System (ADS)

    Aboutajeddine, Ahmed

    Les modeles micromecaniques de transition d'echelles qui permettent de determiner les proprietes effectives des materiaux heterogenes a partir de la microstructure sont consideres dans ce travail. L'objectif est la prise en compte de la presence d'une interphase entre la matrice et le renforcement dans les modeles micromecaniques classiques, de meme que la reconsideration des approximations de base de ces modeles, afin de traiter les materiaux multiphasiques. Un nouveau modele micromecanique est alors propose pour tenir compte de la presence d'une interphase elastique mince lors de la determination des proprietes effectives. Ce modele a ete construit grace a l'apport de l'equation integrale, des operateurs interfaciaux de Hill et de la methode de Mori-Tanaka. Les expressions obtenues pour les modules globaux et les champs dans l'enrobage sont de nature analytique. L'approximation de base de ce modele est amelioree par la suite dans un nouveau modele qui s'interesse aux inclusions enrobees avec un enrobage mince ou epais. La resolution utilisee s'appuie sur une double homogeneisation realisee au niveau de l'inclusion enrobee et du materiau. Cette nouvelle demarche, permettra d'apprehender completement les implications des approximations de la modelisation. Les resultats obtenus sont exploites par la suite dans la solution de l'assemblage de Hashin. Ainsi, plusieurs modeles micromecaniques classiques d'origines differentes se voient unifier et rattacher, dans ce travail, a la representation geometrique de Hashin. En plus de pouvoir apprecier completement la pertinence de l'approximation de chaque modele dans cette vision unique, l'extension correcte de ces modeles aux materiaux multiphasiques est rendue possible. Plusieurs modeles analytiques et explicites sont alors proposee suivant des solutions de differents ordres de l'assemblage de Hashin. L'un des modeles explicite apparait comme une correction directe du modele de Mori-Tanaka, dans les cas ou celui ci echoue a

  8. Developpement d'une commande pour une hydrolienne de riviere et optimisation =

    NASA Astrophysics Data System (ADS)

    Tetrault, Philippe

    Suivant le developpement des energies renouvelables, la presente etude se veut une base theorique quant aux principes fondamentaux necessaires au bon fonctionnement et a l'implementation d'une hydrolienne de riviere. La problematique derriere ce nouveau type d'appareil est d'abord presentee. La machine electrique utilisee dans l'application, c'est-a-dire la machine synchrone a aimants permanents, est etudiee : ses equations dynamiques mecaniques et electriques sont developpees, introduisant en meme temps le concept de referentiel tournant. Le fonctionnement de l'onduleur utilise, soit un montage en pont complet a deux niveaux a semi-conducteurs, est explique et mit en equation pour permettre de comprendre les strategies de modulation disponibles. Un bref historique de ces strategies est fait avant de mettre l'emphase sur la modulation vectorielle qui sera celle utilisee pour l'application en cours. Les differents modules sont assembles dans une simulation Matlab pour confirmer leur bon fonctionnement et comparer les resultats de la simulation avec les calculs theoriques. Differents algorithmes permettant de traquer et maintenir un point de fonctionnement optimal sont presentes. Le comportement de la riviere est etudie afin d'evaluer l'ampleur des perturbations que le systeme devra gerer. Finalement, une nouvelle approche est presentee et comparee a une strategie plus conservatrice a l'aide d'un autre modele de simulation Matlab.

  9. Les conjonctivites néonatales dans le canton de Glidji au Sud du Togo: une étude transversale à propos de 159 nouveau-nés

    PubMed Central

    Kokou, Vonor; Nidain, Maneh; Kassoula, Nononsaa Batomguela; Kwassi, Fiaty- Amenouvor; Meba, Banla; Patrice, Balo Komi

    2016-01-01

    Introduction Le but de l’étude était décrire les aspects épidémiologiques des conjonctivites néonatales dans le canton de Glidji au Sud du Togo. Methodes Nous avons mené une étude transversale dans les 4 Unités Sanitaires Périphériques du canton de Glidji du 19 Mars au 13 Mai 2009 soit 8 semaines. Tous les nouveau-nés ont été inclus et la conjonctivite néonatale était définie par la présence chez un nouveau-né d'au moins deux des signes suivants: hyperhémie conjonctivale, œdème palpébral, chémosis, sécrétions purulentes, larmoiement. Les paramètres étudiés étaient l’âge, le sexe, les facteurs de risque, les antécédents, la présence ou non de conjonctivite, les germes en causes et l’évolution sous traitement. Resultats Sur la période, 159 nouveau-nés ont été examinés. L’âge moyen était de 10,9 jours avec des extrêmes de 0 à 28 jours. Il y avait 80 garçons pour 79 filles soit un sex-ratio de 1,01. Sur les 159 nouveau-nés, 7 cas de conjonctivite ont été diagnostiqués soit une prévalence de 4,4%. Les facteurs de risque identifiés étaient l'accouchement par voie basse et la présence d'IST chez la mère pendant la grossesse. Sur les 7 cas de conjonctivite, l'examen cytobactériologique a permis d'isoler le staphylococcus aureus dans 2 cas. L’évolution des cas de conjonctivite sous traitement était favorable avec régression des signes dès le 3è jour. Conclusion Les conjonctivites néonatales avaient une prévalence de 4,4% dans le canton de Glidji au sud du Togo et le staphylocoque doré était le germe en cause. Leur prévention passe par un bon suivi lors de la consultation prénatale et l'instillation de collyre antibiotique à la naissance PMID:27642383

  10. Zsolnai Állami Főreáliskola, Art Nouveau Building and its Painted Decorations

    NASA Astrophysics Data System (ADS)

    Grúňová, Zuzana; Borošová Michalcová, Miloslava

    2017-06-01

    The historic art nouveau building of the former high school in Žilina - Zsolnai Állami Főreáliskola - is nowadays one of the University of Žilina buildings. Empty, awaiting much needed renovation is school building a subject of the various researches of its art-historical and architectural features. Paper deals with wall painting as a one type decoration among preserved ones in this building. Lack of funds during its initial building and decoration works created rather limited amount motifs and simple technologies. If the whole scope of architectural works of Orth and Somló architectural studio (and the whole set of art nouveau buildings in Žilina) is taken into account, even these simple, but elegant painting in well thought palette of colours could be valuable basis for renovation.

  11. Implementation en VHDl/FPGA d'afficheur video numerique (AVN) pour des applications aerospatiales

    NASA Astrophysics Data System (ADS)

    Pelletier, Sebastien

    L'objectif de ce projet est de developper un controleur video en langage VHDL afin de remplacer la composante specialisee presentement utilisee chez CMC Electronique. Une recherche approfondie des tendances et de ce qui se fait actuellement dans le domaine des controleurs video est effectuee afin de definir les specifications du systeme. Les techniques d'entreposage et d'affichage des images sont expliquees afin de mener ce projet a terme. Le nouveau controleur est developpe sur une plateforme electronique possedant un FPGA, un port VGA et de la memoire pour emmagasiner les donnees. Il est programmable et prend peu d'espace dans un FPGA, ce qui lui permet de s'inserer dans n'importe quelle nouvelle technologie de masse a faible cout. Il s'adapte rapidement a toutes les resolutions d'affichage puisqu'il est modulaire et configurable. A court terme, ce projet permettra un controle ameliore des specifications et des normes de qualite liees aux contraintes de l'avionique.

  12. Algorithmes et architectures pour ordinateurs quantiques supraconducteurs

    NASA Astrophysics Data System (ADS)

    Blais, Alexandre

    Depuis sa formulation, la theorie de l'information a ete basee, implicitement, sur les lois de la physique classique. Une telle formulation est toutefois incomplete puisqu'elle ne tient pas compte de la realite quantique. Au cours des vingt dernieres annees, l'expansion de la theorie de l'information englobant les effets purement quantiques a connu un interet grandissant. La realisation d'un systeme de traitement de l'information quantique, un ordinateur quantique, presente toutefois de nombreux defis. Dans ce document, on s'interesse a differents aspects concernant ces defis. On commence par presenter des concepts algorithmiques comme l'optimisation de calculs quantiques et le calcul quantique geometrique. Par la suite, on s'interesse au design et a differents aspects de l'utilisation de qubits bases sur les jonctions Josephson. En particulier, un nouveau design de qubit supraconducteur est suggere. On presente aussi une approche originale pour l'interaction entre qubits. Cette approche est tres generale puisqu'elle peut etre appliquee a differents designs de qubits. Finalement, on s'interesse a la lecture des qubits supraconducteurs de flux. Le detecteur suggere ici a l'avantage de pouvoir etre decouple du qubit lorsqu'il n'y a pas de mesure en cours.

  13. Analyse de L'ancrage des Vortex Intergrains pour le Yttrium BARYUM(2) CUIVRE(3) OXYGENE(7) Polycristallin

    NASA Astrophysics Data System (ADS)

    Fournier, Patrick

    Le Modele de l'Etat Critique Generalise (MECG) est utilise pour decrire les proprietes magnetiques et de transport du YBa_2Cu_3O _7 polycristallin. Ce modele empirique permet de relier la densite de courant critique a la densite de lignes de flux penetrant dans la region intergrain. Deux techniques de mesures sont utilisees pour caracteriser nos materiaux. La premiere consiste a mesurer le champ au centre d'un cylindre creux en fonction du champ magnetique applique pour des temperatures comprises entre 20 et 85K. En variant l'epaisseur de la paroi du cylindre creux, il est possible de suivre l'evolution des cycles d'hysteresis et de determiner des champs caracteristiques qui varient en fonction de cette dimension. En utilisant un lissage des resultats experimentaux, nous determinons J _{co}, H_ {o} et n, les parametres du MECG. La forme des cylindres, avec une longueur comparable au diametre externe, entrai ne la presence d'un champ demagnetisant qui peut etre inclus dans le modele theorique. Ceci nous permet d'evaluer la fraction du volume ecrante, f _{g}, ainsi que le facteur demagnetisant N. Nous trouvons que J_{ co}, H_{o} et f_{g} dependent de la temperature, tandis que n et N (pour une epaisseur de paroi fixe) n'en dependent pas. La deuxieme technique consiste a mesurer le courant critique de lames minces en fonction du champ applique pour differentes temperatures. Nous utilisons un montage que nous avons developpe permettant d'effectuer ces mesures en contact direct avec le liquide refrigerant, i.e. dans l'azote liquide. Nous varions la temperature du liquide en variant la pression du gaz au-dessus du bain d'azote. Cette methode nous permet de balayer des temperatures entre 65K et la temperature critique du materiau ({~ }92K). Nous effectuons le lissage des courbes de courant critique en fonction du champ applique encore a l'aide du MECG, pour a nouveau obtenir ses parametres. Pour trois echantillons avec des traitements thermiques differents, les parametres

  14. Technique distribuee de gestion de la charge sur le reseau electrique et ring-tree: Un nouveau systeme de communication P2P

    NASA Astrophysics Data System (ADS)

    Ayoub, Simon

    suffisant pour les besoins des applications visees. Les protocoles de communication s'appuient sur un protocole de transport qui peut etre un de ceux utilises sur l'Internet comme TCP ou UDP. Pour valider le fonctionnement de de la technique de controle distribuee et le systeme de communiction Ring-Tree, un simulateur a ete developpe; un modele de chauffe-eau, comme exemple de charge, a ete integre au simulateur. La simulation d'une communaute de chauffe-eaux intelligents a montre que la technique de gestion de la charge combinee avec du stockage d'energie sous forme thermique permet d'obtenir, sans affecter le confort de l'utilisateur, des profils de consommation varies dont un profil de consommation uniforme qui represente un facteur de charge de 100%. Mots-cles : Algorithme Distribue, Demand Response, Gestion de la Charge Electrique, M2M (Machine-to-Machine), P2P (Peer-to-Peer), Reseau Electrique Intelligent, Ring-Tree, Smart Grid

  15. Conception, fabrication et validation d'une presse a injection basse pression pour le procede des poudres metalliques =

    NASA Astrophysics Data System (ADS)

    Lamarre, Simon G.

    Le moulage par injection a basse pression de poudre metallique est une technique de mise en forme de pieces de formes complexes. La poudre metallique est melangee avec des polymeres basse viscosite (ex. : cire) pour former un melange homogene a une temperature superieure a la temperature de fusion des polymeres. Pour faciliter l'injection dans la cavite du moule, la composition des melanges est ajustee pour diminuer la viscosite. D'une part, les melanges peu visqueux possedent une bonne moulabilite. D'autre part, le phenomene de la segregation se manifeste rapidement avec les melanges peu visqueux. Les machines commerciales sont munies d'un canal d'injection et d'une valve qui relient le reservoir de melange et la cavite du moule. Le melange reste stationnaire dans ces composantes entre deux sequences d'injection, ce qui le rend propice a la segregation. Plusieurs brevets tentent de resoudre ce probleme en utilisant des pompes et des canaux de recirculation. Ces composantes sont difficiles a nettoyer en raison de leur complexite. Une machine a injection basse pression a ete concue et fabriquee pour l'etude de l'aptitude au moulage des melanges de tres faible viscosite (ex. : 0.1 Pa˙s), qui tient compte du phenomene de segregation et des contraintes de nettoyage. Un piston d'injection puise le volume desire d'un reservoir. Ensuite, un mouvement lateral cisaille le melange a l'intersection entre le reservoir et le cylindre et bouche l'orifice de sortie du reservoir. Le cylindre est degage et peut recevoir le moule. A la suite de l'injection, le piston retourne a la position du reservoir et entre dans son orifice de sortie. Le melange residuel est retourne dans le reservoir, melange et desaere a nouveau. L'appareil a ete valide par des essais d'injectabilite avec un melange de poudre d'acier inoxydable et de liants a basse viscosite. Des essais d'injection ont montre que le melange contenant l'acide stearique a parcouru la plus grande distance dans le moule de forme

  16. Impact of a bladder scan protocol on discharge efficiency within a care pathway for ambulatory inguinal herniorraphy.

    PubMed

    Antonescu, I; Baldini, G; Watson, D; Kaneva, P; Fried, G M; Khwaja, K; Vassiliou, M C; Carli, F; Feldman, L S

    2013-12-01

    Postoperative urinary retention (POUR) is a common complication of ambulatory inguinal herniorraphy, with an incidence reaching 38%, and many surgeons require patients to void before discharge. This study aimed to assess whether the implementation of a bladder scan-based voiding protocol reduces the time until discharge after ambulatory inguinal herniorraphy without increasing the rate of POUR. As part of a perioperative care pathway, a protocol was implemented to standardize decision making after elective inguinal hernia repair (February 2012). Patients were assessed with a bladder scan, and those with <600 mL of urine were discharged home, whereas those with more than 600 mL of urine had an in-and-out catheterization before discharge. The patients received written information about urinary symptoms and instructions to present to the emergency department if they were unable to void at home. An audit of scheduled outpatient inguinal hernia repairs between October 2011 and July 2012 was performed. Comparisons were made using the t test, Fisher's exact test, and Wilcoxon rank sum test where appropriate. Statistical significance was defined a priori as a p value lower than 0.05. During the study period, 124 patients underwent hernia repair: 60 before and 64 after implementation of the protocol. The findings showed no significant differences in patient characteristics, laparoscopic approach (35 vs. 33%; p = 0.80), proportion receiving general anesthesia (70 vs. 73%; p = 0.67), or amount of intravenous fluids given (793 vs. 663 mL; p = 0.07). The proportion of patients voiding before discharge was higher after protocol implementation (73 vs. 89%; p = 0.02). The protocol had no impact on median time to discharge (190 vs. 205 min; p = 0.60). Only one patient in each group presented to the emergency department with POUR (2%). After ambulatory inguinal herniorraphy, implementation of a bladder scan-based voiding protocol did not result in earlier discharge. The incidence of

  17. Developpement d'une methode de Monte Carlo dependante du temps et application au reacteur de type CANDU-6

    NASA Astrophysics Data System (ADS)

    Mahjoub, Mehdi

    La resolution de l'equation de Boltzmann demeure une etape importante dans la prediction du comportement d'un reacteur nucleaire. Malheureusement, la resolution de cette equation presente toujours un defi pour une geometrie complexe (reacteur) tout comme pour une geometrie simple (cellule). Ainsi, pour predire le comportement d'un reacteur nucleaire,un schema de calcul a deux etapes est necessaire. La premiere etape consiste a obtenir les parametres nucleaires d'une cellule du reacteur apres une etape d'homogeneisation et condensation. La deuxieme etape consiste en un calcul de diffusion pour tout le reacteur en utilisant les resultats de la premiere etape tout en simplifiant la geometrie du reacteur a un ensemble de cellules homogenes le tout entoure de reflecteur. Lors des transitoires (accident), ces deux etapes sont insuffisantes pour pouvoir predire le comportement du reacteur. Comme la resolution de l'equation de Boltzmann dans sa forme dependante du temps presente toujours un defi de taille pour tous types de geometries,un autre schema de calcul est necessaire. Afin de contourner cette difficulte, l'hypothese adiabatique est utilisee. Elle se concretise en un schema de calcul a quatre etapes. La premiere et deuxieme etapes demeurent les memes pour des conditions nominales du reacteur. La troisieme etape se resume a obtenir les nouvelles proprietes nucleaires de la cellule a la suite de la perturbation pour les utiliser, au niveau de la quatrieme etape, dans un nouveau calcul de reacteur et obtenir l'effet de la perturbation sur le reacteur. Ce projet vise a verifier cette hypothese. Ainsi, un nouveau schema de calcul a ete defini. La premiere etape de ce projet a ete de creer un nouveau logiciel capable de resoudre l'equation de Boltzmann dependante du temps par la methode stochastique Monte Carlo dans le but d'obtenir des sections efficaces qui evoluent dans le temps. Ce code a ete utilise pour simuler un accident LOCA dans un reacteur nucleaire de type

  18. Integration des sciences et de la langue: Creation et experimentation d'un modele pedagogique pour ameliorer l'apprentissage des sciences en milieu francophone minoritaire

    NASA Astrophysics Data System (ADS)

    Cormier, Marianne

    Les faibles resultats en sciences des eleves du milieu francophone minoritaire, lors d'epreuves au plan national et international, ont interpelle la recherche de solutions. Cette these avait pour but de creer et d'experimenter un modele pedagogique pour l'enseignement des sciences en milieu linguistique minoritaire. En raison de la presence de divers degres de francite chez la clientele scolaire de ce milieu, plusieurs elements langagiers (l'ecriture, la discussion et la lecture) ont ete integres a l'apprentissage scientifique. Nous avions recommande de commencer le processus d'apprentissage avec des elements langagiers plutot informels (redaction dans un journal, discussions en dyades...) pour progresser vers des activites langagieres plus formelles (redaction de rapports ou d'explications scientifiques). En ce qui a trait a l'apprentissage scientifique, le modele preconisait une demarche d'evolution conceptuelle d'inspiration socio-constructiviste tout en s'appuyant fortement sur l'apprentissage experientiel. Lors de l'experimentation du modele, nous voulions savoir si celui-ci provoquait une evolution conceptuelle chez les eleves, et si, simultanement, le vocabulaire scientifique de ces derniers s'enrichissait. Par ailleurs, nous cherchions a comprendre comment les eleves vivaient leurs apprentissages dans le cadre de ce modele pedagogique. Une classe de cinquieme annee de l'ecole de Grande-Digue, dans le Sud-est du Nouveau-Brunswick, a participe a la mise a l'essai du modele en etudiant les marais sales locaux. Lors d'entrevues initiales, nous avons remarque que les connaissances des eleves au sujet des marais sales etaient limitees. En effet, s'ils etaient conscients que les marais etaient des lieux naturels, ils ne pouvaient pas necessairement les decrire avec precision. Nous avons egalement constate que les eleves utilisaient surtout des mots communs (plantes, oiseaux, insectes) pour decrire le marais. Les resultats obtenus indiquent que les eleves ont

  19. Le niobate de lithium a haute temperature pour les applications ultrasons =

    NASA Astrophysics Data System (ADS)

    De Castilla, Hector

    implique de posseder plusieurs echantillons de differentes formes afin d'isoler chaque mode principal de vibration. De plus, ces modeles ne prennent pas bien en compte les harmoniques et modes en cisaillement. C'est pourquoi un nouveau modele analytique couvrant tout le spectre frequentiel a ete developpe afin de predire les resonances en cisaillement, les harmoniques et les couplages entre les modes. Neanmoins, certains modes de resonances et certains couplages ne sont toujours pas modelises. La caracterisation d'echantillons carres a pu etre menee jusqu'a 750°C. Les resultats confirment le caractere prometteur du niobate de lithium. Les coefficients piezoelectriques sont stables en fonction de la temperature et l'elasticite et la permittivite ont le comportement attendu. Un effet thermoelectrique ayant un effet similaire a de la conductivite ionique a ete observe ce qui ne permet pas de quantifier l'impact de ce dernier. Bien que des etudes complementaires soient necessaires, l'intensite des resonances a 750°C semble indiquer que le niobate de lithium peut etre utilise pour des applications ultrasons a hautes frequences (>100 kHz).

  20. Des ballons pour demain

    NASA Astrophysics Data System (ADS)

    Régipa, R.

    A partir d'une théorie sur la détermination des formes et des contraintes globales d'un ballon de révolution, ou s'en rapprochant, une nouvelle famille de ballons a été définie. Les ballons actuels, dits de ``forme naturelle'', sont calculés en général pour une tension circonférencielle nulle. Ainsi, pour une mission donnée, la tension longitudinale et la forme de l'enveloppe sont strictement imposées. Les ballons de la nouvelle génération sont globalement cylindriques et leurs pôles sont réunis par un câble axial, chargé de transmettre une partie des efforts depuis le crochet (pôle inférieur), directement au pôle supérieur. De plus, la zone latérale cylindrique est soumise à un faible champ de tensions circonférencielles. Ainsi, deux paramètres permettent de faire évoluer la distribution des tensions et la forme de l'enveloppe: - la tension du câble de liaison entre pôles (ou la longueur de ce câble) - la tension circonférencielle moyenne désirée (ou le rayon du ballon). On peut donc calculer et réaliser: - soit des ballons de forme adaptée, comme les ballons à fond plat pour le bon fonctionnement des montgolfières infrarouge (projet MIR); - soit des ballons optimisés pour une bonne répartition des contraintes et une meilleure utilisation des matériaux d'enveloppe, pour l'ensemble des programmes stratosphériques. Il s'ensuit une économie sensible des coûts de fabrication, une fiabilité accrue du fonctionnement de ces ballons et une rendement opérationnel bien supérieur, permettant entre autres, d'envisager des vols à très haute altitude en matériaux très légers.

  1. Developpement d'un catalyseur nickel-alumine efficace pour le reformage de diesel a la vapeur d'eau et etude du systeme reactionnel

    NASA Astrophysics Data System (ADS)

    Fauteux-Lefebvre, Clemence

    Le developpement de sources d'energie alternatives fiables et efficaces est aujourd'hui une necessite. L' interet dans le reformage d'hydrocarbures liquides est ainsi croissant puisqu'il s'agit d'une voie pour l'alimentation des piles a combustible. Les piles a combustible ont une efficacite pour la conversion d'energie en electricite plus grande que celle des moteurs a combustion et font ainsi partie de la recherche de solution en efficacite energetique. Ces piles consomment de l'hydrogene comme combustible pour produire de l'electricite, d'ou l'interet pour le reformage. En effet, cette reaction permet de produire de l'hydrogene et du monoxyde de carbone (un autre combustible des piles a combustible a electrolyte solide) a partir d'hydrocarbure liquide, notamment le diesel. Les piles pourraient donc etre integrees avec une unite de reformage leur fournissant directement le combustible necessaire a partir de diesel. Dans ce projet de recherche, un nouveau catalyseur de nickel sous forme de spinelle nickel-alumine (spinelle NiAl2O4 sur support d'alumine et de zircone stabilisee avec yttria) a ete developpe et teste en laboratoire pour du reformage de propane, d'hydrocarbures liquides et de diesel, a la vapeur d'eau. Par ailleurs, une methode d'ajout des reactifs novatrice a ete utilisee afin de diminuer la pyrolyse precedant le reformage, en utilisant une emulsion. Les resultats de reformage d'hydrocarbures purs ont montre des concentrations tres pres de l'equilibre thermodynamique et une activite constante sans desactivation du catalyseur ni formation de carbone, et ce avec des ratios H2O/C de moins de 2.5 et des temperatures d'operation variant entre 630 °C et 750 °C. Lors de tests effectues en utilisant du diesel fossile, a 705°C, avec un debit volumique des reactifs de plus de 50 000 cm3gcat-1h-1 et un ratio H2O/C de moins de 2.5, l'activite a ete maintenue pendant plus de 15 heures, malgre une operation en cycles. L'analyse du catalyseur apres cette

  2. Métamatériaux pour la protection sismique

    NASA Astrophysics Data System (ADS)

    Guenneau, Sébastien; Enoch, Stefan; Colombi, Andrea; Roux, Philippe; Brule, Stéphane

    2018-02-01

    Les physiciens des ondes élaborent des modèles théoriques et numériques pour un contrôle accru de la lumière dans des matériaux structurés à l'échelle nanométrique et s'en inspirent pour contrôler les ondes mécaniques de Rayleigh dans des sols structurés à l'échelle métrique, avec des trous dans un sol ou des arbres en surface savamment agencés. Un transfert de paradigme s'opère entre les métamatériaux électromagnétiques pour la photonique et les métamatériaux sismiques pour le génie civil.

  3. INTERIOR VIEW, LOOKING WEST, WITH CRANE OPERATOR, TED SEALS, POURING ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    INTERIOR VIEW, LOOKING WEST, WITH CRANE OPERATOR, TED SEALS, POURING MOLTEN METAL INTO A 1,300 TON ELECTRIC HOLDING FURNACE OR MIXER. AN ELECTRONIC SCALE RECORDED THAT 50.5 TONS OF METAL WERE POURED INTO THE FURNACE DURING THIS POUR. - American Cast Iron Pipe Company, Mixer Building, 1501 Thirty-first Avenue North, Birmingham, Jefferson County, AL

  4. Development of Measures of Effectiveness and Performance from Cognitive Work Analysis Products

    DTIC Science & Technology

    2012-02-01

    la Reine (en droit du Canada), telle que représentée par le ministre de la Défense nationale, 2012 DRDC Atlantic CR 2011...le nouveau concept du système. Ce rapport vise à déterminer si les résultats du travail de conception peuvent aider à élaborer des mesures de ...l’information (IIDS). Le contrat actuel comportait deux objectifs : élaborer des mesures de l’efficacité (MOE) et du rendement (MOP) pour

  5. AERIAL OF SHUTTLE LANDING FACILITY [SLF] POURING OF CONCRETE

    NASA Technical Reports Server (NTRS)

    1975-01-01

    AERIAL OF SHUTTLE LANDING FACILITY [SLF] POURING OF CONCRETE KSC-375C-10036.31 108-KSC-375C-10036.31, P-21426, ARCHIVE-04502 Aerial oblique of Shuttle runway facilities. Pouring concrete on runway. Direction north - altitude 100'.

  6. The concrete technology of post pouring zone of raft foundation of Hongyun Building B tower

    NASA Astrophysics Data System (ADS)

    Yin, Suhua; Yu, Liu; Wu, Yanli; Zhao, Ying

    2017-08-01

    The foundation of Hongyun building B tower is made of raft board foundation which is 3300mm in the thickness concreted pouring amount of large and the late poured band in the pouring settlement formed. The temperature of the pouring settlement was controlled in order to prevent the crack of the construction of the late poured band. The steel of post pouring band was designed and monitorred. The quality of post pouring band quality is guaranteed in the raft concrete foundation of Hongyun Building B tower.

  7. Big drinkers: how BMI, gender and rules of thumb influence the free pouring of wine.

    PubMed

    Smarandescu, Laura; Walker, Doug; Wansink, Brian

    2014-11-01

    This research examines free pouring behavior and provides an account of how Body Mass Index (BMI) and gender might lead to the overpouring, and consequently the overconsumption of wine. An observational study with young adults investigated how BMI and gender affect free-pouring of wine over a variety of pouring scenarios, and how rules-of-thumb in pouring affect the quantities of alcohol poured by men and women across BMI categories. For men, the amount poured was positively related to BMI. However, BMI did not affect pours by women. The use of the "half glass" rule-of-thumb in pouring reduced the volume of wine poured by over 20% for both men and women. Importantly, this rule-of-thumb substantially attenuated the pours by men at high BMI levels. Increasing awareness of pouring biases represents an early and effective step toward curbing alcohol consumption among men, and especially those who are overweight. Additionally, using a simple "half glass" rule-of-thumb may be an effective way to curb overpouring, despite non-standard glass sizes. Copyright © 2014. Published by Elsevier B.V.

  8. FRONT VIEW OF POURING FROM #61 HOLDING FURNACE AT #02 ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    FRONT VIEW OF POURING FROM #61 HOLDING FURNACE AT #02 STATION INTO THREE VERTICAL MOLDS SUBMERGED IN A WATER-FILLED TANK BELOW THE CASTING FLOOR. THE CASTING CREW'S JOBS DURING THIS PHASE OF THE OPERATION INCLUDE REGULATING THE POURING RATE AND MONITORING THE VALVE RODS THAT CONTROL THE WATER SPRAYS ON THE MOLDS. DIFFERENT ALLOYS REQUIRE SPECIFIC POURING SPEEDS AND WATER PRESSURES. - American Brass Foundry, 70 Sayre Street, Buffalo, Erie County, NY

  9. Ablation laser pour la microélectronique plastique

    NASA Astrophysics Data System (ADS)

    Alloncle, A.-P.; Thomas, B.; Grojo, D.; Delaporte, Ph.; Sentis, M.; Sanaur, S.; Barret, M.; Collot, Ph.

    2006-12-01

    La microélectronique plastique connaît un développement sans précédent dans le domaine de la recherche. Cette étude s'intéresse à l'utilisation des lasers impulsionnels pour la réalisation de composants organiques sur supports souples. Les deux aspects plus particulièrement étudiés sont d'une part la gravure de polymère pour réaliser un canal entre la source et le drain, et d'autre part le développement d'un procédéde dépôt appelé LIFT pour Laser Induced Forward Transfer. Ce dernier pourrait notamment permettre dedéposer des composés organiques non solubles.

  10. A Statistical Treatment of Bioassay Pour Fractions

    NASA Technical Reports Server (NTRS)

    Barengoltz, Jack; Hughes, David W.

    2014-01-01

    The binomial probability distribution is used to treat the statistics of a microbiological sample that is split into two parts, with only one part evaluated for spore count. One wishes to estimate the total number of spores in the sample based on the counts obtained from the part that is evaluated (pour fraction). Formally, the binomial distribution is recharacterized as a function of the observed counts (successes), with the total number (trials) an unknown. The pour fraction is the probability of success per spore (trial). This distribution must be renormalized in terms of the total number. Finally, the new renormalized distribution is integrated and mathematically inverted to yield the maximum estimate of the total number as a function of a desired level of confidence ( P(pour fraction. The extension to recovery efficiency corrections is also presented. Now the product of recovery efficiency and pour fraction may be small enough that the likely value may be much larger than the usual calculation: the number of spores divided by that product. The use of this analysis would not be limited to microbiological data.

  11. AERIAL OF SHUTTLE LANDING FACILITY [SLF] POURING CONCRETE ON RUNWAY

    NASA Technical Reports Server (NTRS)

    1975-01-01

    AERIAL OF SHUTTLE LANDING FACILITY [SLF] POURING CONCRETE ON RUNWAY KSC-375C-10036.32 108-KSC-375C-10036.32, P-21425, ARCHIVE-04501 Aerial oblique of Shuttle Landing Facility. Pouring concrete on runway. Direction North - Altitude 100'.

  12. Dependence of the pour point of diesel fuels on the properties of the initial components

    NASA Technical Reports Server (NTRS)

    Ostashov, V. M.; Bobrovskiy, S. A.

    1979-01-01

    An analytical expression is obtained for the dependence of the pour point of diesel fuels on the pour point and weight relationship of the initial components. For determining the pour point of a multicomponent fuel mixture, it is assumed that the mixture of two components has the pour point of a separate equivalent component, then calculating the pour point of this equivalent component mixed with a third component, etc.

  13. Elastomeric impression materials: a comparison of accuracy of multiple pours.

    PubMed

    Kumar, Dheeraj; Madihalli, Anand U; Reddy, K Rajeev Kumar; Rastogi, Namrataa; Pradeep, N T

    2011-07-01

    The aim of the present study is to compare the various elastomeric impression materials in terms of accuracy and dimensional stability, with respect to obtaining multiple casts from a single elastomeric impression at various times of pours. Three master dies were prepared for the impression making, two of these were made of brass containing a central hole with undercuts. The third die simulated a conventionally prepared typodont maxillary central incisor. Three elastomeric impression materials were chosen for the study. Each impression was poured at various time periods. Casts thus obtained were evaluated under a traveling microscope to evaluate various dimensional changes. Addition silicones provided dies which were shorter in height and bigger in diameter. Polyethers provided dies which were shorter in both height and diameter. Condensation silicones showed insignificant changes from the master die at the immediate pour but deteriorated rapidly after that in subsequent pours. None of the impression material showed a consistent behavior up to the fourth pour. They occasionally showed deviation from the pattern, but all these values were statistically insignificant. Polyethers showed lesser ability than both the addition silicones as well as the condensation silicones to recover from induced deformation. Addition silicones as well as the condensation silicones have better ability to recover from induced deformation when compared to polyether.

  14. Developpement des betons semi autoplacants a rheologie adaptee pour des infrastructures

    NASA Astrophysics Data System (ADS)

    Sotomayor Cruz, Cristian Daniel

    Au cours des dernières décennies, les infrastructures canadiennes et québécoises comportent plusieurs structures en béton armé présentant des problèmes de durabilité dus aux conditions climatiques sévères, à la mauvaise conception des structures, à la qualité des matériaux, aux types des bétons choisis, aux systèmes de construction ou à l'existence d'événements incontrôlables. En ce qui concerne le choix du béton pour la construction des infrastructures, une vaste gamme de béton divisée en deux principaux types peut être utilisée: le béton conventionnel vibré (BCV) et le béton autoplaçant (BAP). Dans le cas d'un BCV, la consolidation inadéquate par vibration a été un problème récurrent, occasionnant des dommages structuraux. Ceci a conduit à une réduction de la durabilité et à une augmentation du coût d'entretien et de réparation des infrastructures. Rien que l'utilisation d'un BAP a des avantages tels que l'élimination de la vibration, la réduction des coûts de main d'oeuvre et l'amélioration de la qualité des structures, néanmoins, le coût initial d'un BAP par rapport à un BCV ne permet pas encore de généraliser son utilisation dans l'industrie de la construction. Ce mémoire présente la conception d'une nouvelle gamme de béton semi-autoplaçant pour la construction des infrastructures (BSAP-I) exigeant une vibration minimale. Il s'agit de trouver un équilibre optimal entre la rhéologie et le coût initial du nouveau béton pour conférer une bonne performance structurale et économique aux structures. Le programme expérimental établi a premièrement permis d'évaluer la faisabilité d'utilisation des BSAP-I pour la mise en place des piliers d'une infrastructure de pont à Sherbrooke. En plus, l'utilisation d'un plan d'expériences a permis l'évaluation de trois paramètres de formulation sur les propriétés des mélanges de BSAP-I à l'état frais et durci. Finalement, l'évaluation de la performance des

  15. Developpement d'un montage simulant l'erosion par la pluie pour l'evaluation des revetements glaciophobes dans le domaine aerospatial

    NASA Astrophysics Data System (ADS)

    Tremblay, Sarah-Eve

    Ce memoire presente le developpement d’un montage simulant l’erosion par la pluie afin d’effectuer l’evaluation de differents revetements glaciophobes dans le domaine aerospatial. Bien que plusieurs revetements presentent une bonne efficacite a reduire l’adherence et/ou l’accumulation de glace, ils ne repondent pas necessairement aux normes de resistance a l’erosion simulee par les gouttes de pluie les frappant a grande vitesse. Il n’existe qu’une installation en Amerique du Nord offrant un service d’essai qui evalue la resistance a l’erosion par la pluie suivant les normes aerospatiales. Etant l’unique institution pouvant faire la certification de peintures utilisees sur les avions en ce qui a trait a l’erosion par la pluie, ce service est donc difficile d’acces et couteux. Le laboratoire international des materiaux antigivre (LIMA) a developpe un essai plus rapide et moins couteux, facilitant ainsi le developpement de revetements glaciophobes devant resister a l’erosion par la pluie. Dans cette etude, le developpement du montage d’erosion par la pluie effectue au laboratoire des materiaux antigivre (LIMA) est presente. En particulier, des essais sur quatre (4) revetements dont la resistance a l’erosion est connue, et sur trois revetements industriels, ont ete effectues afin d’ajuster les differents parametres du montage comme la pression et la temperature de l’eau ainsi que la robustesse du montage. Ensuite, des essais de sensibilite et de reproductibilite des resultats ont egalement ete effectues pour fin de validation du montage et du protocole experimental. Pour ce faire, le montage de type jet d’eau developpe consiste principalement en une pompe a haute pression qui projette un jet d’eau continu passant par les orifices d’un disque tournant. Cette operation permet de generer une goutte de pluie simulee qui est projetee sur un echantillon de revetement statique. L’essai est base sur la norme standard ASTM (Liquid

  16. Analyse de la prise en charge du nouveau-né dans le cadre de la stratégie nationale de subvention des accouchements et des soins obstétricaux et néonatals d'urgence au Centre Hospitalier Universitaire Pédiatrique Charles de Gaulle, Ouagadougou (Burkina Faso)

    PubMed Central

    Ouédraogo, Solange Odile Yugbaré; Yougbaré, Nestor; Kouéta, Fla; Dao; Ouédraogo, Moussa; Lougué, Claudine; Ludovic, Kam; Traoré, Ramata Ouédraogo; Yé, Diarra

    2015-01-01

    Introduction Il s'agit d'analyser la prise en charge du nouveau-né dans le cadre de la stratégie na-tionale de subvention des accouchements et des soins obstétricaux et néonatals d'urgence mis en place par le gouvernement du Burkina Faso en 2006. Méthodes Nous avons menée une étude à visée descriptive et analytique comportant un volet ré-trospectif du 01 janvier 2006 au 31 décembre 2010 portant sur les paramètres épidémiologiques, cliniques des nouveau-nés hospitalisés et un volet prospectif du 3 octobre 2011 au 29 février 2012 par une entrevue des accompagnateurs des nouveau-nés et des prestataires des services de santé. Résultats Les hospitalisations ont augmenté de 43,65% entre 2006 à 2010 Le taux de mortalité néo-natale hospitalière qui était de 11,04% a connu une réduction moyenne annuelle de 3,95%. L'entrevue a porté sur 110 accompagnateurs et 76 prestataires. La majorité des prestataires (97,44%) et des ac-compagnateurs (88,18%) étaient informés de la stratégie mais n'avait pas une connaissance exacte de sa définition. Les prestataires (94,74%) ont signalé des ruptures de médicaments, consommables médicaux et des pannes d’ appareils de laboratoire et d'imagerie. Parmi les accompagnateurs (89%) disaient être satisfaits des services offerts et (72,89%) trouvaient les coûts abordables mais évoquaient les difficultés du transport. Conclusion: La subvention a amélioré la prise en charge du nou-veau-né mais son optimisation nécessiterait une meilleur information et implication de tous les acteurs. Conclusion La subvention a amélioré la prise en charge du nouveau-né mais son optimisation nécessiterait une meilleur information et implication de tous les acteurs. PMID:26161166

  17. Synthesis copolymer use to reduce pour point temperature of diamond crude oil

    NASA Astrophysics Data System (ADS)

    Than, Dao Viet; Chuong, Thai Hong; Tuy, Dao Quoc

    2017-09-01

    Diamond oil field is located in Block 01&02 Offshore Vietnam. Crude oil from Diamond Well Head Platform (WHP) is evacuated to FPSO via 20km 10" subsea flexible pipeline. The lowest seabed temperature in the field is 22°C, while the pour point temperature (PPT) of Diamond crude oil is very high (36°C) due to high paraffin content (25%). So studying to research a suitable Pour Point Depressant (PPD) for the crude oil is very important. The PPD must have ability to reduce pour point temperature of crude oil from 36°C to 21°C.

  18. Validation d'un nouveau calcul de reference en evolution pour les reacteurs thermiques

    NASA Astrophysics Data System (ADS)

    Canbakan, Axel

    Resonance self-shielding calculations are an essential component of a deterministic lattice code calculation. Even if their aim is to correct the cross sections deviation, they introduce a non negligible error in evaluated parameters such as the flux. Until now, French studies for light water reactors are based on effective reaction rates obtained using an equivalence in dilution technique. With the increase of computing capacities, this method starts to show its limits in precision and can be replaced by a subgroup method. Originally used for fast neutron reactor calculations, the subgroup method has many advantages such as using an exact slowing down equation. The aim of this thesis is to suggest a validation as precise as possible without burnup, and then with an isotopic depletion study for the subgroup method. In the end, users interested in implementing a subgroup method in their scheme for Pressurized Water Reactors can rely on this thesis to justify their modelization choices. Moreover, other parameters are validated to suggest a new reference scheme for fast execution and precise results. These new techniques are implemented in the French lattice scheme SHEM-MOC, composed of a Method Of Characteristics flux calculation and a SHEM-like 281-energy group mesh. First, the libraries processed by the CEA are compared. Then, this thesis suggests the most suitable energetic discretization for a subgroup method. Finally, other techniques such as the representation of the anisotropy of the scattering sources and the spatial representation of the source in the MOC calculation are studied. A DRAGON5 scheme is also validated as it shows interesting elements: the DRAGON5 subgroup method is run with a 295-eenergy group mesh (compared to 361 groups for APOLLO2). There are two reasons to use this code. The first involves offering a new reference lattice scheme for Pressurized Water Reactors to DRAGON5 users. The second is to study parameters that are not available in APOLLO2 such as self-shielding in a temperature gradient and using a flux calculation based on MOC in the self-shielding part of the simulation. This thesis concludes that: (1) The subgroup method is at least more precise than a technique based on effective reaction rates, only if we use a 361-energy group mesh; (2) MOC with a linear source in a geometrical region gives better results than a MOC with a constant model. A moderator discretization is compulsory; (3) A P3 choc law is satisfactory, ensuring a coherence with 2D full core calculations; (4) SHEM295 is viable with a Subgroup Projection Method for DRAGON5.

  19. Investigation of pouring temperature and holding time for semisolid metal feedstock production

    NASA Astrophysics Data System (ADS)

    Razak, N. A.; Ahmad, A. H.; Rashidi, M. M.

    2017-10-01

    Semisolid metal (SSM) processing, as a kind of new technology that exploits forming of alloys between solidus and liquidus temperatures, has attracted great attention from investigators for its thixotropic behaviour as well as having advantages in reducing porosity, macrosegregation, and forming forces during shaping process. Various techniques are employed to produce feedstock with fine globular microstructures, and direct thermal method is one of them. In this paper, the effect from different pouring temperatures and holding times using a direct thermal method on microstructure and hardness of aluminium alloy 6061 is presented. Molten aluminium alloy 6061 was poured into a cylindrical copper mould and cooled down to the semisolid temperature before being quenched in water at room temperature. The effect of different pouring temperatures of 660 °C, 680 °C, 700 °C, and holding time of 20 s, and 60 s on the microstructure of aluminium alloy 6061 were investigated. From the micrographs, it was found that the most globular structures were achieved at processing parameters of 660 °C pouring temperature and 60 s holding time. The highest density and hardness of the samples were found at the same processing parameters. It can be concluded that the most spheroidal microstructure, the highest density, and the hardness were recorded at lower pouring temperature and longer holding time.

  20. Effect of storage time of extended-pour and conventional alginate impressions on dimensional accuracy of casts.

    PubMed

    Rohanian, Ahmad; Ommati Shabestari, Ghasem; Zeighami, Somayeh; Samadi, Mohammad Javad; Shamshiri, Ahmad Reza

    2014-11-01

    Some manufacturers claim to have produced new irreversible hydro-colloids that are able to maintain their dimensional stability during storage. The present study evaluated the effect of storage time on dimensional stability of three alginates: Hydrogum 5, Tropicalgin and Alginoplast. In this experimental in-vitro trial, a total of 90 alginate impressions were made from a Dentoform model using Hydrogum 5, Tropicalgin and Alginoplast alginates. The impressions were stored in a sealed plastic bag without a damp paper towel for 0, 24, 48, 72 and 120 hours and then poured with type III dental stone. Cross-arch (facial of 6 to facial of 6 on the opposite side) and antero-posterior (distal of right first molar to the ipsilateral central incisor) measurements were made with a digital caliper on the casts. Data were analyzed by two-way and one-way ANOVA and Tukey's post-hoc test (P<0.05). Alginate type and the pouring time significantly affected the dimensional stability of alginate impressions (both Ps<0.001). Pouring of Hydrogum 5 impressions can be delayed for up to 120 hours without significant dimensional changes. Alginoplast impressions may be poured after 72 hours, but Tropicalgin should be poured immediately and the storage time should not be more than 24 hours. Immediate pouring of alginate impressions provides the highest accuracy in reproducing the teeth and adjacent tissues; however, this study demonstrated that pouring may be delayed for up to five days using extended-pour (Hydrogum 5) alginates.

  1. Modelisation des emissions de particules microniques et nanometriques en usinage

    NASA Astrophysics Data System (ADS)

    Khettabi, Riad

    La mise en forme des pieces par usinage emet des particules, de tailles microscopiques et nanometriques, qui peuvent etre dangereuses pour la sante. Le but de ce travail est d'etudier les emissions de ces particules pour fins de prevention et reduction a la source. L'approche retenue est experimentale et theorique, aux deux echelles microscopique et macroscopique. Le travail commence par des essais permettant de determiner les influences du materiau, de l'outil et des parametres d'usinage sur les emissions de particules. E nsuite un nouveau parametre caracterisant les emissions, nomme Dust unit , est developpe et un modele predictif est propose. Ce modele est base sur une nouvelle theorie hybride qui integre les approches energetiques, tribologiques et deformation plastique, et inclut la geometrie de l'outil, les proprietes du materiau, les conditions de coupe et la segmentation des copeaux. Il ete valide au tournage sur quatre materiaux: A16061-T6, AISI1018, AISI4140 et fonte grise.

  2. Evidence for a jacketed nematic polymer

    NASA Astrophysics Data System (ADS)

    Hardouin, F.; Mery, S.; Achard, M. F.; Noirez, L.; Keller, P.

    1991-05-01

    The evidence for a “jacketed” structure at the scale of the chain dimensions in the nematic phase of a “side-on fixed” liquid crystal polysiloxane is reported by using small angle neutron scattering. We relate this anisotropy of chain conformation to the first measurements of the rotational viscosity coefficient in this new type of liquid crystal side-chain polymer. Par des mesures de diffusion des neutrons aux petits angles nous montrons l'existence, pour un polysiloxane “ en haltère ”, d'une structure “ chemisée ” à l'échelle de l'organisation global d'une chaîne en phase nématique. On constate que cette anisotropie de forme du polymère a des conséquences sur l'évolution du coefficient de viscosité de torsion mesuré pour la première fois dans ce nouveau type de polymère à chaînes latérales.

  3. Effect of Storage Time of Extended-Pour and Conventional Alginate Impressions on Dimensional Accuracy of Casts

    PubMed Central

    Rohanian, Ahmad; Ommati Shabestari, Ghasem; Zeighami, Somayeh; Samadi, Mohammad Javad; Shamshiri, Ahmad Reza

    2014-01-01

    Objectives: Some manufacturers claim to have produced new irreversible hydro-colloids that are able to maintain their dimensional stability during storage. The present study evaluated the effect of storage time on dimensional stability of three alginates: Hydrogum 5, Tropicalgin and Alginoplast. Materials and Methods: In this experimental in-vitro trial, a total of 90 alginate impressions were made from a Dentoform model using Hydrogum 5, Tropicalgin and Alginoplast alginates. The impressions were stored in a sealed plastic bag without a damp paper towel for 0, 24, 48, 72 and 120 hours and then poured with type III dental stone. Cross-arch (facial of 6 to facial of 6 on the opposite side) and antero-posterior (distal of right first molar to the ipsilateral central incisor) measurements were made with a digital caliper on the casts. Data were analyzed by two-way and one-way ANOVA and Tukey’s post-hoc test (P<0.05). Results: Alginate type and the pouring time significantly affected the dimensional stability of alginate impressions (both Ps<0.001). Pouring of Hydrogum 5 impressions can be delayed for up to 120 hours without significant dimensional changes. Alginoplast impressions may be poured after 72 hours, but Tropicalgin should be poured immediately and the storage time should not be more than 24 hours. Conclusion: Immediate pouring of alginate impressions provides the highest accuracy in reproducing the teeth and adjacent tissues; however, this study demonstrated that pouring may be delayed for up to five days using extended-pour (Hydrogum 5) alginates. PMID:25628695

  4. When It Rains, It Pours

    ERIC Educational Resources Information Center

    Mills, Linda

    2012-01-01

    "It's raining, it's pouring, the old man is snoring!" "The itsy, bitsy spider crawled up the waterspout, down came the rain and washed the spider out. Out came the sun and dried up all the rain, and the itsy, bitsy spider went up the spout again." What do children's nursery rhymes have to do with the school library? The author begins by telling a…

  5. A statistical treatment of bioassay pour fractions

    NASA Astrophysics Data System (ADS)

    Barengoltz, Jack; Hughes, David

    A bioassay is a method for estimating the number of bacterial spores on a spacecraft surface for the purpose of demonstrating compliance with planetary protection (PP) requirements (Ref. 1). The details of the process may be seen in the appropriate PP document (e.g., for NASA, Ref. 2). In general, the surface is mechanically sampled with a damp sterile swab or wipe. The completion of the process is colony formation in a growth medium in a plate (Petri dish); the colonies are counted. Consider a set of samples from randomly selected, known areas of one spacecraft surface, for simplicity. One may calculate the mean and standard deviation of the bioburden density, which is the ratio of counts to area sampled. The standard deviation represents an estimate of the variation from place to place of the true bioburden density commingled with the precision of the individual sample counts. The accuracy of individual sample results depends on the equipment used, the collection method, and the culturing method. One aspect that greatly influences the result is the pour fraction, which is the quantity of fluid added to the plates divided by the total fluid used in extracting spores from the sampling equipment. In an analysis of a single sample’s counts due to the pour fraction, one seeks to answer the question: What is the probability that if a certain number of spores are counted with a known pour fraction, that there are an additional number of spores in the part of the rinse not poured. This is given for specific values by the binomial distribution density, where detection (of culturable spores) is success and the probability of success is the pour fraction. A special summation over the binomial distribution, equivalent to adding for all possible values of the true total number of spores, is performed. This distribution when normalized will almost yield the desired quantity. It is the probability that the additional number of spores does not exceed a certain value. Of course

  6. Spectroscopie pompe-sonde pour la détection de bioaérosols

    NASA Astrophysics Data System (ADS)

    Guyon, L.; Courvoisier, F.; Wood, V.; Boutou, V.; Bartelt, A.; Roth, M.; Rabitz, H.; Wolf, J. P.

    2006-10-01

    La fluorescence du Tryptophane excité par une impulsion ultra-brève à 270 nm peut être diminuée d'un facteur deux par une seconde impulsion à 800 nm, à l'aide d'un dispositif pompe-sonde. Cette décroissance est aussi observée pour les bactéries vivantes, dont le Tryptophane est l'un des fluorophores, tandis qu'aucune décroissance n'est observée pour d'autres molécules organiques comme le naphtalène ou le gazole, malgré des spectres d'absorption et de fluorescence similaires. Cette différence remarquable est très prometteuse pour la distinction d'aérosols biologiques et organiques.

  7. Matériaux pour la dépollution des gaz d'échappement automobile

    NASA Astrophysics Data System (ADS)

    Mouaddib-Moral, N.; Gauthier, C.

    2002-04-01

    Les premières législations antipollution ont été mises en place suite à la détection, aux Etats Unis plus particulièrement en Californie, du smog photochimique et des pluies acides, néfastes pour la faune et la flore. Les estimations de la contribution de l'automobile aux émissions de composés, considérés comme précurseurs de ces phénomènes, ont été suffisantes pour provoquer la mise en place de normes draconiennes en matière d'émissions automobiles. Les matériaux catalytiques ont été évalués en tant que solution possible pour réduire les émissions à l'échappement. En Europe, l'utilisation des catalyseurs trois voies a été généralisée sur les véhicules essence fonctionnant à richesse stoechiométrique à partir de 1993. Une nouvelle génération de catalyseurs appelée piège à oxydes d'azote (NOx) est maintenant nécessaire pour le post-traitement des gaz d'échappement des motorisations à essence fonctionnant en mélange pauvre (combustion en présence d'un excès d'oxygène) pour diminuer la consommation et par conséquent réduire les émissions du CO2 connu pour son impact sur l'effet de serre. La dépollution des moteurs diesel via un catalyseur d'oxydation a été généralisée en Europe depuis 1996. La sévérisation des normes européennes impose pour les moteurs diesel le recours à des matériaux spécifiques pour le traitement des oxydes d'azotes et des particules par l'intermédiaire de filtres à particules dont l'efficacité de filtration est supérieure à 95%, mais doivent subir des régénérations périodiques.

  8. Evaluation d'un scenario d'apprentissage favorisant la mobilisation des habiletes reliees au processus d'enquete

    NASA Astrophysics Data System (ADS)

    Blanchard, Samuel F. J.

    Les resultats au Programme international pour le suivi des acquis des eleves (PISA) demontrent que les jeunes neobrunswickois francophones se classent b un niveau significativement inferieur comparaiivement aux eleves anglophones du Nouveau-Brunswick, aux eleves des autres provinces canadiennes et se classent sous la moyenne internationale de tous les pays participants quant b la culture scientifique. L'evaluation de cette culture scientifique est basee sur une serie de savoirs, de savoir-faire et de savoir-etre reliee au processus d'enquete scolaire. Le processus d'enquete scolaire est une approche b l'apprentissage ou les eleves effectuent des recherches d'informations, discutent d'idees et entreprennent des investigations pour augmenter leur comprehension d'un probleme ou d'un sujet. Les recherches demontrent que le processus d'enquete scolaire est rarement une composante pedagogique importante de la salle de classe et les recherches portant sur l'implantation du processus d'enquete scolaire recommandent de rendre ce dernier plus accessible aux enseignantes et aux enseignants. Afin de rendre le processus d'enquete plus accessible aux enseignantes et aux enseignants, notre recherche porte sur l'evaluation de la valeur pedagogique d'un scenario d'apprentissage (PhaRoboS) concu specialement pour creer un environnement dans lequel les eleves auront plusieurs occasions a mobiliser les habiletes reliees au processus d'enquete. Les retombees de cette evaluation nous permettront d'offrir des pistes de remediations afin d'aider plus d'enseignantes et d'enseignants b creer un environnement dans lequel les eleves auront plusieurs occasions b mobiliser les habiletes reliees au processus d'enquete. Cette evaluation s'est faite a partir d'une methodologie inspiree de l'evaluation pour fin d'amelioration d'un objet pedagogique. L'analyse des donnees qualitatives recueillies aupres des eleves et de leur enseignante d'une ecole francophone du Nouveau-Brunswick semble montrer que

  9. Que peut-on voir avec des neutrons? Une introduction pour des non spécialistes

    NASA Astrophysics Data System (ADS)

    Schweizer, J.

    2005-11-01

    Le neutron est une particule élémentaire qui a été découverte en 1932 par James Chadwick. Ses caractéristiques principales sont résumées dans le tableau I. Il a été utilisé pour la première fois par Clifford Shull en 1946 comme outil pour des expériences de diffusion. Cette technique s'est depuis constamment développée pour concerner tous les aspects de la matière condensée: physique, chimie, matériaux, biologie. Il s'agit d'un outil tout à fait exceptionnel car le neutron possède des propriétés uniques et particulièrement adaptées pour ces études.

  10. Treatment of ovarian cancer by targeting the tumor stem cell-associated carbohydrate antigen, Sialyl-Thomsen-nouveau.

    PubMed

    Starbuck, Kristen; Al-Alem, Linah; Eavarone, David A; Hernandez, Silvia Fatima; Bellio, Chiara; Prendergast, Jillian M; Stein, Jenna; Dransfield, Daniel T; Zarrella, Bianca; Growdon, Whitfield B; Behrens, Jeff; Foster, Rosemary; Rueda, Bo R

    2018-05-01

    Recurrent ovarian cancer (OvCa) is thought to result in part from the inability to eliminate rare quiescent cancer stem cells (CSCs) that survive cytotoxic chemotherapy and drive tumor resurgence. The Sialyl-Thomsen-nouveau antigen (STn) is a carbohydrate moiety present on protein markers of CSCs in pancreatic, colon, and gastric malignancies. We have demonstrated that human OvCa cell lines contain varying levels of cells that independently express either STn or the ovarian CSC marker CD133. Here we determine co-expression of STn and CD133 in a subset of human OvCa cell lines. Analyses of colony and sphere forming capacity and of response to standard-of-care cytotoxic therapy suggest a subset of OvCa STn + cells display some CSC features. The effect of the anti-STn antibody-drug conjugates (ADCs) S3F-CL-MMAE and 2G12-2B2-CL-MMAE on OvCa cell viability in vitro and in vivo was also assessed. Treatment with S3F-CL-MMAE reduced the viability of two of three OvCa cell lines in vitro and exposure to either S3F-CL-MMAE or 2G12-2B2-CL-MMAE reduced OVCAR3-derived xenograft volume in vivo , depleting STn + tumor cells. In summary, STn + cells demonstrate some stem-like properties and specific therapeutic targeting of STn in ovarian tumors may be an effective clinical strategy to eliminate both STn + CSC and STn + non-CSC populations.

  11. The Effect of Coded Healing Abutments on Treatment Duration and Clinical Outcome: A Randomized Controlled Clinical Trial Comparing Encode and Conventional Impression Protocols.

    PubMed

    Abduo, Jaafar; Chen, Chen; Le Breton, Eugene; Radu, Alexandra; Szeto, Josephine; Judge, Roy; Darby, Ivan

    To compare the Encode impression protocol (Biomet 3i) with the conventional impression protocol in terms of treatment duration, clinical accuracy, and outcome up to the first postplacement review of single-implant crowns. A total of 45 implants were included in this study. The implants were randomly allocated to the Encode group (23 implants) or the conventional group (22 implants). At the time of surgery, all implants received two-piece Encode healing abutments. The implants were restored 3 months after insertion. In the conventional protocol, open-tray implant-level impressions were taken and the implants were restored with prefabricated abutments and porcelain-fused-to-metal (PFM) crowns. For the implants in the Encode group, closed-tray impressions of the healing abutments were taken. The generated casts were sent to the Biomet 3i scanning/milling center for custom abutment manufacturing on which PFM crowns were fabricated. Treatment duration (laboratory and clinical), clinical accuracy of occlusal and proximal contacts, and outcome (esthetics, patient satisfaction, and crown contour) were evaluated with the aid of a series of questionnaires. The Encode protocol required significantly less laboratory time (18 minutes) than the conventional protocol for adjustment of the abutments. The impression pour time, time for the laboratory to return the crown, time for crown insertion at the final appointment, and total clinical time for crown insertion did not differ significantly between the two protocols. Likewise, clinical accuracy, esthetics, and patient satisfaction were similar for the two protocols. The two protocols were clinically comparable. The Encode protocol is advantageous in reducing the laboratory time before crown fabrication.

  12. Large drinks are no mistake: Glass size, but not shape, affects alcoholic beverage drink pours

    PubMed Central

    Kerr, William C.; Patterson, Deidre; Koenen, Mary Albert; Greenfield, Thomas K.

    2009-01-01

    Introduction and Aims Drink alcohol content has been shown to be variable and is an important determinant of alcohol intake. This study evaluates claims regarding the effects of glass size and glass shape on the amount of alcohol in on-premise drinks. Design and Methods Wine and spirits drinks were purchased and measured in 80 on-premise establishments in 10 Northern California Counties. Drink alcohol content was measured as the liquid volume of the drink multiplied by the percentage alcohol by volume of given brands or from analysis of mixed drink and wine samples. Results Larger glass size was associated with larger on-premise pours of straight shots and mixed drinks served in the relatively large pint glass and variable “other” glass type were found to contain more alcohol than drinks served in a short wide glass. No significant differences were found for other drink types. Drinks poured in short wide glasses were not found to contain more alcohol than drinks poured in tall thin glasses. Bars with mostly black patrons were found to serve spirits drinks with more alcohol than bars with other patron types. Discussion and Conclusions Glass shape does not affect actual drink pours in the US but glass size does in some cases. Drinkers should measure wine and spirits pours at home to achieve standard drink amounts and consumer education programs should foster awareness of the relatively high drink alcohol content of on-premise wine and mixed spirits drinks. More research is needed to evaluate potential differences in drink pours by patron race and ethnicity. PMID:19594789

  13. Pouring rights contracts and childhood overweight: a critical theory perspective.

    PubMed

    Opalinski, Andra

    2006-10-01

    To examine school environments, and in particular, pouring rights contracts and how they relate to childhood overweight from a critical theory perspective. Pouring rights contracts provide a profit to powerful mega-corporations at the expense of children's health. There is a need to move beyond a solely individual approach to addressing childhood overweight and involve a social ecology approach. This would involve a push for social change, including removal of soda machines from schools, and changing marketing practices targeted at children. Nurses are poised in community situations to actively effect social changes to improve health outcomes of our nation's most vulnerable people, but nurses must get involved.

  14. Analyse experimentale des performances d'une batterie au lithium pour l'aeronautique

    NASA Astrophysics Data System (ADS)

    Bonnin, Romain

    Ce memoire a pour objectif d'identifier et d'etudier les performances necessaires pour qu'une batterie au lithium puisse etre utilisee dans le secteur de l'aeronautique. C'est pourquoi dans le cadre de notre recherche, nous allons proposer une procedure de tests permettant d'analyser et de determiner si la batterie au lithium peut etre implantee dans un avion. En vue de repondre a l'analyse des performances, une etude des fonctionnalites demandees par l'avion ainsi que des normes preexistantes vont etre effectuees. Suite a cette etape, nous allons elaborer un banc d'essais. Une fois le banc d'essais acheve, nous allons tester une batterie au lithium qui est supposee disposer de toutes les caracteristiques techniques requises pour etre implantee dans un avion. Ces tests nous permettront donc d'emettre un avis sur l'utilisation des batteries au lithium dans le domaine de l'aeronautique.

  15. Accuracy of Gypsum Casts after Different Impression Techniques and Double Pouring

    PubMed Central

    Silva, Stephania Caroline Rodolfo; Messias, Aion Mangino; Abi-Rached, Filipe de Oliveira; de Souza, Raphael Freitas; Reis, José Maurício dos Santos Nunes

    2016-01-01

    This study evaluated the accuracy of gypsum casts after different impression techniques and double pouring. Ten patients were selected and for each one it was obtained 5 partial putty/wash impressions with vinyl polysiloxane (VPS) material from teeth #13 to #16 with partial metal stock trays. The following techniques were performed: (1) one-step; two-step relief with: (2) PVC film; (3) slow-speed tungsten carbide bur and scalpel blade, (4) small movements of the tray and (5) without relief—negative control. The impressions were disinfected with 0.5% sodium hypochlorite for 10 minutes and stored during 110 and 230 minutes for the first and second pouring, respectively, with type IV gypsum. Three intra-oral lateral photographs of each patient were taken using a tripod and a customized radiographic positioner. The images were imported into ImageJ software and the total area of the buccal surface from teeth #13 to #16 was measured. A 4.0% coefficient of variance was criterion for using these measurements as Baseline values. The casts were photographed and analyzed using the same standardization for the clinical images. The area (mm2) obtained from the difference between the measurements of each gypsum cast and the Baseline value of the respective patient were calculated and analyzed by repeated-measures two way-ANOVA and Mauchly’s Sphericity test (α = 0.05). No significant effect was observed for Impression technique (P = 0.23), Second pouring (P = 0.99) and their interaction (P = 0.25). The impression techniques and double pouring did not influence the accuracy of the gypsum casts. PMID:27736967

  16. Accuracy of Gypsum Casts after Different Impression Techniques and Double Pouring.

    PubMed

    Silva, Stephania Caroline Rodolfo; Messias, Aion Mangino; Abi-Rached, Filipe de Oliveira; de Souza, Raphael Freitas; Reis, José Maurício Dos Santos Nunes

    2016-01-01

    This study evaluated the accuracy of gypsum casts after different impression techniques and double pouring. Ten patients were selected and for each one it was obtained 5 partial putty/wash impressions with vinyl polysiloxane (VPS) material from teeth #13 to #16 with partial metal stock trays. The following techniques were performed: (1) one-step; two-step relief with: (2) PVC film; (3) slow-speed tungsten carbide bur and scalpel blade, (4) small movements of the tray and (5) without relief-negative control. The impressions were disinfected with 0.5% sodium hypochlorite for 10 minutes and stored during 110 and 230 minutes for the first and second pouring, respectively, with type IV gypsum. Three intra-oral lateral photographs of each patient were taken using a tripod and a customized radiographic positioner. The images were imported into ImageJ software and the total area of the buccal surface from teeth #13 to #16 was measured. A 4.0% coefficient of variance was criterion for using these measurements as Baseline values. The casts were photographed and analyzed using the same standardization for the clinical images. The area (mm2) obtained from the difference between the measurements of each gypsum cast and the Baseline value of the respective patient were calculated and analyzed by repeated-measures two way-ANOVA and Mauchly's Sphericity test (α = 0.05). No significant effect was observed for Impression technique (P = 0.23), Second pouring (P = 0.99) and their interaction (P = 0.25). The impression techniques and double pouring did not influence the accuracy of the gypsum casts.

  17. Le kyste hydatique du cordon spermatique: une localisation exceptionnelle

    PubMed Central

    Hamdane, Mohamed Moncef; Bougrine, Fethi; Msakni, Issam; Dhaoui-Ghozzi, Amen; Bouziani, Ammar

    2011-01-01

    L’ hydatidose est une anthropo-zoonose due au développement chez l'homme de la forme larvaire du taenia Echinococcus granulosis. La plupart des kystes hydatiques se localisent dans le foie et les poumons. Le kyste hydatique du cordon spermatique est extrêmement rare avec seulement 4 cas rapportés dans la littérature. Les auteurs rapportent dans cet article un nouveau cas d'hydatidose du cordon spermatique. Il s'agissait d'un homme de 40 ans qui consultait pour des douleurs scrotales évoluant depuis huit mois. L'examen clinique a mis en évidence une tuméfaction mobile, inguino-scrotale, droite. L’échographie testiculaire a objectivé une hernie inguinale droite associée à deux kystes épididymaires bilatéraux. Le patient a été opéré pour cure de son hernie avec découverte en per-opératoire d'un kyste du cordon spermatique qui a été réséqué. L'examen anatomopathologique a conclu à une hydatidose du cordon spermatique. PMID:22384304

  18. Validation of hot-poured crack sealant performance-based guidelines.

    DOT National Transportation Integrated Search

    2017-06-01

    This report summarizes a comprehensive research effort to validate thresholds for performance-based guidelines and : grading system for hot-poured asphalt crack sealants. A series of performance tests were established in earlier research and : includ...

  19. Treatment of ovarian cancer by targeting the tumor stem cell-associated carbohydrate antigen, Sialyl-Thomsen-nouveau

    PubMed Central

    Starbuck, Kristen; Al-Alem, Linah; Eavarone, David A.; Hernandez, Silvia Fatima; Bellio, Chiara; Prendergast, Jillian M.; Stein, Jenna; Dransfield, Daniel T.; Zarrella, Bianca; Growdon, Whitfield B.; Behrens, Jeff; Foster, Rosemary; Rueda, Bo R.

    2018-01-01

    Recurrent ovarian cancer (OvCa) is thought to result in part from the inability to eliminate rare quiescent cancer stem cells (CSCs) that survive cytotoxic chemotherapy and drive tumor resurgence. The Sialyl-Thomsen-nouveau antigen (STn) is a carbohydrate moiety present on protein markers of CSCs in pancreatic, colon, and gastric malignancies. We have demonstrated that human OvCa cell lines contain varying levels of cells that independently express either STn or the ovarian CSC marker CD133. Here we determine co-expression of STn and CD133 in a subset of human OvCa cell lines. Analyses of colony and sphere forming capacity and of response to standard-of-care cytotoxic therapy suggest a subset of OvCa STn+ cells display some CSC features. The effect of the anti-STn antibody-drug conjugates (ADCs) S3F-CL-MMAE and 2G12-2B2-CL-MMAE on OvCa cell viability in vitro and in vivo was also assessed. Treatment with S3F-CL-MMAE reduced the viability of two of three OvCa cell lines in vitro and exposure to either S3F-CL-MMAE or 2G12-2B2-CL-MMAE reduced OVCAR3-derived xenograft volume in vivo, depleting STn+ tumor cells. In summary, STn+ cells demonstrate some stem-like properties and specific therapeutic targeting of STn in ovarian tumors may be an effective clinical strategy to eliminate both STn+ CSC and STn+ non-CSC populations. PMID:29796189

  20. 61. photographer unknown undated FIRST CONCRETE BEING POURED IN DRAFT ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    61. photographer unknown undated FIRST CONCRETE BEING POURED IN DRAFT TUBE FLOOR SLAB. - Bonneville Project, Powerhouse No.1, Spanning Bradford Slough, from Bradford Island, Bonneville, Multnomah County, OR

  1. 60. photographer unknown undated CONCRETE BEING POURED ON CENTER PORTION ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    60. photographer unknown undated CONCRETE BEING POURED ON CENTER PORTION OF DRAFT TUBE FLOOR SLAB. - Bonneville Project, Powerhouse No.1, Spanning Bradford Slough, from Bradford Island, Bonneville, Multnomah County, OR

  2. Chlorhexidine droplet splash from a skin preparation gallipot: effect of height of pouring.

    PubMed

    Evans, L; Cunningham, M; Tilakaratna, P

    2013-12-01

    Chlorhexidine contamination of equipment used in central neuraxial anaesthesia has been implicated in causing adhesive arachnoiditis. We measured the extent of chlorhexidine splash during pouring into a gallipot (antiseptic skin preparation container) from heights of 5 cm, 10 cm, 15 cm and 20 cm. Twenty experiments were performed at each height. Measurements made up to a horizontal distance of 40 cm radius from the gallipot showed a median (IQR [range]) maximum spread of splash droplets ≥ 2 mm diameter of 26.2 (10.2-36.4 [0-40]) cm. The 40-cm radius measurement area was divided into 5-cm-wide zones to assess spread. At pouring heights of 15 cm and 20 cm, all zones were contaminated. These results demonstrate that pouring chlorhexidine into a gallipot generates significant splash, and we recommend that this should be avoided near equipment used for neuraxial anaesthesia. © 2013 The Association of Anaesthetists of Great Britain and Ireland.

  3. 42. Casting floor, "B" furnace, pour in progress; mudgun is ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    42. Casting floor, "B" furnace, pour in progress; mudgun is to right of furnace; operator takes temperature of iron in trough during pout. Looking south - Rouge Steel Company, 3001 Miller Road, Dearborn, MI

  4. INTERIOR VIEW WITH LADLE POURING MOLTEN IRON INTO QBOP FURNACE. ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    INTERIOR VIEW WITH LADLE POURING MOLTEN IRON INTO Q-BOP FURNACE. - U.S. Steel, Fairfield Works, Q-Bop Furnace, North of Valley Road & West of Ensley, Pleasant Grove Road, Fairfield, Jefferson County, AL

  5. 6. VIEW LOOKING WEST FROM THE POURING AISLE OF THE ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    6. VIEW LOOKING WEST FROM THE POURING AISLE OF THE ELECTRIC FURNACE BUILDING AT ELECTRIC FURNACE X-3. - U.S. Steel Duquesne Works, Electric Furnace Steelmaking Plant, Along Monongahela River, Duquesne, Allegheny County, PA

  6. Influence of volume ratio of liquid to solid and low pouring temperature on interface structure of cast Babbitt-steel bimetal composite

    NASA Astrophysics Data System (ADS)

    Fathy, Naglaa; Ramadan, Mohamed

    2018-05-01

    The influence of volume ratio of liquid to Solid and low pouring temperature on interface structure of cast Babbitt-steel bimetal composite was evaluated for static casting technique. At low pouring temperature of 380 °C, Babbitt microstructures are improved to be finer and more globular. On the other side pouring the Babbitt at low pouring temperature of 380 °C increases the chance of present higher unbonded area percent. Increasing the volume ratio of liquid to solid decreases the Sn-Pb interface thicknesses and increases the bonded interface area. In order to optimize the production of Babbitt-steel bimetal composite at low pouring temperature, the volume ratio of liquid Babbitt to solid steel shell should be higher value that could be more than 5 depending on the extrapolation of current data presented.

  7. Le domaine des co-infections et des maladies concomitantes du Réseau canadien pour les essais VIH des IRSC : lignes directrices canadiennes pour la prise en charge et le traitement de la co-infection par le VIH et l’hépatite C chez les adultes

    PubMed Central

    Hull, Mark; Giguère, Pierre; Klein, Marina; Shafran, Stephen; Tseng, Alice; Côté, Pierre; Poliquin, Marc; Cooper, Curtis

    2014-01-01

    HISTORIQUE : De 20 % à 30 % des Canadiens qui vivent avec le VIH sont co-infectés par le virus de l’hépatite C (VHC), lequel est responsable d’une morbidité et d’une mortalité importantes. La prise en charge du VIH et du VHC est plus complexe en raison de l’évolution accélérée de la maladie hépatique, du choix et des critères d’initiation de la thérapie antirétrovirale et du traitement anti-VHC, de la prise en charge de la santé mentale et des toxicomanies, des obstacles socioéconomiques et des interactions entre les nouvelles thérapies antivirales à action directe du VHC et les antirétroviraux OBJECTIF : Élaborer des normes nationales de prise en charge des adultes co-infectés par le VHC et le VIH dans le contexte canadien. MÉTHODOLOGIE : Le Réseau canadien pour les essais VIH des Instituts de recherche en santé du Canada a réuni un groupe d’experts possédant des compétences cliniques en co-infection par le VIH et le VHC pour réviser les publications à jour ainsi que les lignes directrices et les protocoles en place. Après une vaste sollicitation afin d’obtenir des points de vue, le groupe de travail a approuvé des recommandations consensuelles, qu’il a caractérisées au moyen d’une échelle de qualité des preuves fondée sur la classe (bienfaits par rapport aux préjudices) et sur la catégorie (degré de certitude). RÉSULTATS : Toutes les personnes co-infectées par le VIH et le VHC devraient subir une évaluation en vue de recevoir un traitement du VHC. Les personnes qui ne sont pas en mesure d’entreprendre un traitement du VHC devraient être soignées pour le VIH afin de ralentir l’évolution de la maladie hépatique. La norme de traitement du VHC de génotype 1 est un régime comprenant de l’interféron pégylé et de la ribavirine dosée en fonction du poids, associés à un inhibiteur de la protéase du VHC. Pour les génotypes 2 ou 3, une bithérapie classique est recommandée pendant 24 semaines s

  8. POURING IRON FROM ELECTRIC FURNACE INTO BULL LADLE AFTER MAGNESIUM ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    POURING IRON FROM ELECTRIC FURNACE INTO BULL LADLE AFTER MAGNESIUM HAD BEEN ADDED TO GENERATE DUCTILE IRON WHEN IT COOLS IN THE MOLD. - Southern Ductile Casting Company, Casting, 2217 Carolina Avenue, Bessemer, Jefferson County, AL

  9. Revetements antireflet-passivation a base de nitrure de silicium PECVD pour cellules solaires triple-jonction III-V/ Ge

    NASA Astrophysics Data System (ADS)

    Homier, Ram

    Dans le contexte environnemental actuel, le photovoltaïque bénéficie de l'augmentation des efforts de recherche dans le domaine des énergies renouvelables. Pour réduire le coût de la production d'électricité par conversion directe de l'énergie lumineuse en électricité, le photovoltaïque concentré est intéressant. Le principe est de concentrer une grande quantité d'énergie lumineuse sur des petites surfaces de cellules solaires multi-jonction à haute efficacité. Lors de la fabrication d'une cellule solaire, il est essentiel d'inclure une méthode pour réduire la réflexion de la lumière à la surface du dispositif. Le design d'un revêtement antireflet (ARC) pour cellules solaires multi-jonction présente des défis à cause de la large bande d'absorption et du besoin d'égaliser le courant produit par chaque sous-cellule. Le nitrure de silicium déposé par PECVD en utilisant des conditions standards est largement utilisé dans l'industrie des cellules solaires à base de silicium. Cependant, ce diélectrique présente de l'absorption dans la plage des courtes longueurs d'onde. Nous proposons l'utilisation du nitrure de silicium déposé par PECVD basse fréquence (LFSiN) optimisé pour avoir un haut indice de réfraction et une faible absorption optique pour l'ARC pour cellules solaires triple-jonction III-V/Ge. Ce matériau peut aussi servir de couche de passivation/encapsulation. Les simulations montrent que l'ARC double couche SiO2/LFSiN peut être très efficace pour réduire les pertes par réflexion dans la plage de longueurs d'onde de la sous-cellule limitante autant pour des cellules solaires triple-jonction limitées par la sous-cellule du haut que pour celles limitées par la sous-cellule du milieu. Nous démontrons aussi que la performance de la structure est robuste par rapport aux fluctuations des paramètres des couches PECVD (épaisseurs, indice de réfraction). Mots-clés : Photovoltaïque concentré (CPV), cellules solaires

  10. Miroirs multicouches C/SI a incidence normale pour la region spectrale 25-40 nanometres

    NASA Astrophysics Data System (ADS)

    Grigonis, Marius

    Nous avons propose la nouvelle combinaison de materiaux, C/Si, pour la fabrication de miroirs multicouches a incidence normale dans la region spectrale 25-40 nm. Les resultats experimentaux montrent que cette combinaison possede une reflectivite d'environ ~25% dans la region spectrale 25-33 nm et une reflectivite d'environ ~23% dans la region spectrale 33-40 nm. Ces valeurs de reflectivite sont les plus grandes obtenues jusqu'a maintenant dans la region spectrale 25-40 nm. Les miroirs multicouches ont ete par la suite caracterises par microscopie electronique a transmission, par diverses techniques de diffraction des rayons X et par spectroscopies d'electrons AES et ESCA. La resistance des miroirs aux temperatures elevees a ete egalement etudiee. Les resultats fournis par les methodes de caracterisation indiquent que cette combinaison possede des caracteristiques tres prometteuses pour son application comme miroir pour les rayons X mous.

  11. Singaporean college students overpour drinks similar to Western populations: influence of peer presence in a simulated alcohol-pouring task.

    PubMed

    Zandy, Shannon L; Pang, Joyce S; Ho, Moon-Ho Ringo; Matthews, Douglas B

    2013-11-01

    College drinking is a global health concern. However, most studies originate from countries with high alcohol consumption. In the United States, college students overpour a standard alcoholic drink, yet it is unclear if this remains true in countries with low alcohol consumption. Additionally, in college, peer influence is the greatest predictor of drinking behavior, yet it is unknown if social norms affect how students pour drinks. This study examined how male college students, in a country with low alcohol consumption, define standard drinks, and if the presence of an unfamiliar peer affects how students pour during a simulated alcohol-pouring task. Male undergraduate students (n = 105) underwent baseline assessments of impulsivity, self-monitoring, religiosity, and drinking characteristics. Participants poured fluid into empty cups of different sizes to equal a standard serving of beer or shot of liquor. There were 2 groups based on gender of experimenter. Within each group, participants were randomly assigned to Alone or Dyad condition. In the Alone condition, students were instructed to pour only for themselves. In the Dyad condition, students were instructed to pour for themselves and the experimenter. The volumes poured by the students were compared with standards used in Singapore and the United States. Collapsed across container size, students overpoured shots by 50% and beer by 100% when compared to the standard drink definition in Singapore. When using a more liberal definition, students overpoured beer by 25%, but did not overpour shots. In the presence of an unfamiliar peer, overpouring decreased by 10% for beer. The current data show that college students, in a country with low alcohol consumption, overestimate standard alcoholic drinks similar to their Western counterparts and use social norms to determine how much to pour for a drink when confronted with an unfamiliar peer. Efforts toward creating internationally recognized standard drink

  12. POURING FOOTING OF PIER #1. View is to the southwest, ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    POURING FOOTING OF PIER #1. View is to the southwest, looking from Pier 2 in Trinity County toward Pier 1 in Humboldt County - South Fork Trinity River Bridge, State Highway 299 spanning South Fork Trinity River, Salyer, Trinity County, CA

  13. Methodologies nouvelles pour la realisation d'essais dans la soufflerie Price-Paidoussis

    NASA Astrophysics Data System (ADS)

    Flores Salinas, Manuel

    Le present memoire en genie de la production automatisee vise a decrire le travail effectue dans la soufflerie Price-Paidoussis du laboratoire LARCASE pour trouver les methodologies experimentales et les procedures de tests, qui seront utilisees avec les modeles d'ailes actuellement au laboratoire. Les methodologies et procedures presentees ici vont permettre de preparer les tests en soufflerie du projet MDO-505 Architectures et technologies deformables pour l'amelioration des performances des ailes, qui se derouleront durant l'annee 2015. D'abord, un bref historique des souffleries subsoniques sera fait. Les differentes sections de la soufflerie Price-Paidoussis seront decrites en mettant l'emphase sur leur influence dans la qualite de l'ecoulement qui se retrouve dans la chambre d'essai. Ensuite, une introduction a la pression, a sa mesure lors de tests en soufflerie et les instruments utilises pour les tests en soufflerie au laboratoire LARCASE sera presente, en particulier le capteur piezoelectrique XCQ-062. Une attention particuliere sera portee au mode de fonctionnement, a son installation, a la mesure et a la detection des frequences et aux sources d'erreurs lorsqu'on utilise des capteurs de haute precision comme la serie XCQ-062 du fournisseur Kulite. Finalement, les procedures et les methodologies elaborees pour les tests dans la soufflerie Price-Paidoussis seront utilisees sur quatre types d'ailes differentes. L'article New methodology for wind tunnel calibration using neural networks - EGD approch portant sur une nouvelle facon de predire les caracteristiques de l'ecoulement a l'interieur de la soufflerie Price-Paidoussis se trouve dans l'annexe 2 de ce document. Cet article porte sur la creation d'un reseau de neurones multicouche et sur l'entrainement des neurones, Ensuite, une comparaison des resultats du reseau de neurones a ete fait avec des valeurs simules avec le logiciel Fluent.

  14. Instrumentation optique pour l'identification per-operatoire des tissus durant les chirurgies de la thyroide

    NASA Astrophysics Data System (ADS)

    De Montigny, Etienne

    Cette these traite du developpement d'instrumentation pour l'imagerie medicale optique. Ces travaux sont centres sur une application particuliere ; faciliter l'identification des tissus durant les chirurgies de la thyroide et de la parathyroide. La thyroide est une glande situee dans le cou, attachee au larynx a la hauteur de la pomme d'Adam. Elle est entouree de plusieurs structures importantes : muscles, nerfs et glandes parathyroides. Ces dernieres controlent la calcemie et jouent donc un role essentiel dans le corps. Elles sont toutefois de petite taille et sont tres difficiles a distinguer du gras et des ganglions environnants. L'objectif principal de cette these est de developper une instrumentation basee sur la microscopie optique pour permettre l'identification des tissus : thyroide, parathyroide, gras et ganglions, durant les chirurgies. Les choix sont donc faits en fonction de cette application et du contexte specifique des mesures intra-operatoires sur des patients humains. Plusieurs modalites d'imagerie optique sont identifiees pour atteindre l'objectif : microscopie confocale en reflectance, tomographique par coherence optique, et mesure de l'autofluorescence des glandes parathyroides. Dans le but d'ameliorer leur compatibilite avec l'environnement clinique qui requiert stabilite dans le temps et resistance aux vibrations et aux conditions environnementales, ce projet se concentre sur les implementations miniaturisables et basees sur des fibres optiques. Pour implementer un systeme d'imagerie en fluorescence a balayage laser rapide, un systeme d'imagerie en fluorescence par encodage spectral est propose. Bien que l'utilisation de l'encodage spectral semble a priori incompatible avec le contraste en fluorescence, une implementation facile a realiser est proposee. Une seconde version du montage, compatible avec la clinique et facilitant le developpement d'un endoscope, est presentee. La preuve de principe de cette methode est faite a 1300nm, une longueur

  15. Spiral Salmonella assay: validation against the standard pour-plate assay.

    PubMed

    Diehl, M; Fort, F

    1996-01-01

    The spiral Ames assay, an automated approach to bacterial mutagenicity testing which simplifies the test procedure and reduces the amount of drug required to generate mutagenic dose-response information, has been evaluated and validated for routine screening. The spiral plater delivers the Salmonella bacteria, exogenous metabolic activation system and drug to the surface of a rotating agar plate one on top of another in such a way that a uniform density of bacteria is exposed to a logarithmically decreasing volume of drug. Following an incubation of 48 hr at 37 degrees C, the plates are scanned by a laser counter, and the data are subjected to a computerized analysis. Petri plates of 15 cm diameter were used to provide a concentration range of about 250-fold per plate. The Salmonella were concentrated 20-fold to increase sensitivity. Thirty-eight compounds from a variety of chemical classes, including both pharmaceuticals and known mutagens of moderate to strong potency, were tested in both the spiral and the standard pour-plate assays. There was overall test agreement on positive or negative results for 82% of the compounds tested. When only the results from strains TA98 plus TA100 were considered, the agreement was 87%. When positive results were obtained, the fold increase over vehicle control was on average twice as great for the spiral assay compared to the pour-plate assay. It was concluded that the two assay procedures generally provided comparable results, with the spiral assay being somewhat more sensitive in terms of dose-response than the pour-plate assay.

  16. Modelisation de photodetecteurs a base de matrices de diodes avalanche monophotoniques pour tomographie d'emission par positrons

    NASA Astrophysics Data System (ADS)

    Corbeil Therrien, Audrey

    La tomographie d'emission par positrons (TEP) est un outil precieux en recherche preclinique et pour le diagnostic medical. Cette technique permet d'obtenir une image quantitative de fonctions metaboliques specifiques par la detection de photons d'annihilation. La detection des ces photons se fait a l'aide de deux composantes. D'abord, un scintillateur convertit l'energie du photon 511 keV en photons du spectre visible. Ensuite, un photodetecteur convertit l'energie lumineuse en signal electrique. Recemment, les photodiodes avalanche monophotoniques (PAMP) disposees en matrice suscitent beaucoup d'interet pour la TEP. Ces matrices forment des detecteurs sensibles, robustes, compacts et avec une resolution en temps hors pair. Ces qualites en font un photodetecteur prometteur pour la TEP, mais il faut optimiser les parametres de la matrice et de l'electronique de lecture afin d'atteindre les performances optimales pour la TEP. L'optimisation de la matrice devient rapidement une operation difficile, car les differents parametres interagissent de maniere complexe avec les processus d'avalanche et de generation de bruit. Enfin, l'electronique de lecture pour les matrices de PAMP demeure encore rudimentaire et il serait profitable d'analyser differentes strategies de lecture. Pour repondre a cette question, la solution la plus economique est d'utiliser un simulateur pour converger vers la configuration donnant les meilleures performances. Les travaux de ce memoire presentent le developpement d'un tel simulateur. Celui-ci modelise le comportement d'une matrice de PAMP en se basant sur les equations de physique des semiconducteurs et des modeles probabilistes. Il inclut les trois principales sources de bruit, soit le bruit thermique, les declenchements intempestifs correles et la diaphonie optique. Le simulateur permet aussi de tester et de comparer de nouvelles approches pour l'electronique de lecture plus adaptees a ce type de detecteur. Au final, le simulateur vise a

  17. Caracterisation des melanges developpes pour le moulage basse pression des poudres metalliques (LPIM) =

    NASA Astrophysics Data System (ADS)

    Fareh, Fouad

    Le moulage par injection basse pression des poudres metalliques est une technique de fabrication qui permet de fabriquer des pieces possedant la complexite des pieces coulees mais avec les proprietes mecaniques des pieces corroyees. Cependant, l'optimisation des etapes de deliantage et de frittage a ete jusqu'a maintenant effectuee a l'aide de melange pour lesquels la moulabilite optimale n'a pas encore ete demontree. Ainsi, la comprehension des proprietes rheologiques et de la segregation des melanges est tres limitee et cela presente le point faible du processus de LPIM. L'objectif de ce projet de recherche etait de caracteriser l'influence des liants sur le comportement rheologique des melanges en mesurant la viscosite et la segregation des melanges faible viscosite utilises dans le procede LPIM. Afin d'atteindre cet objectif, des essais rheologiques et thermogravimetriques ont ete conduits sur 12 melanges. Ces melanges ont ete prepares a base de poudre d'Inconel 718 de forme spherique (chargement solide constant a 60%) et de cires, d'agents surfactants ou epaississants. Les essais rheologiques ont ete utilises entre autre pour calculer l'indice d'injectabilite ?STV des melanges, tandis que les essais thermogravimetriques ont permis d'evaluer precisement la segregation des poudres dans les melanges. Il a ete demontre que les trois (3) melanges contenant de la cire de paraffine et de l'acide stearique presentent des indices alpha STV plus eleves qui sont avantageux pour le moulage par injection des poudres metalliques (MIM), mais segregent beaucoup trop pour que la piece fabriquee produise de bonnes caracteristiques mecaniques. A l'oppose, le melange contenant de la cire de paraffine et de l'ethylene-vinyle acetate ainsi que le melange contenant seulement de la cire de carnauba segregent peu voire pas du tout, mais possedent de tres faibles indices alphaSTV : ils sont donc difficilement injectables. Le meilleur compromis semble donc etre les melanges contenant de

  18. Refractive Surgery: New Techniques and Usability for Military Personnel (La chirurgie refractive: Nouvelles techniques et leur application pour le personnel militaire)

    DTIC Science & Technology

    2012-11-01

    de loin sans correction, la chirurgie réfractive permet aux jeunes recrues ou militaires du rang de satisfaire aux normes de vision sans...correction exigées pour le métier militaire de leur choix, d’où une augmentation du nombre de candidats et la possibilité pour les individus...réfractive risquent d’engendrer des handicaps visuels et d’écourter des carrières militaires. Pour cette raison, la qualité du service fourni

  19. Advantages and limitations for users of double pit pour-flush latrines: a qualitative study in rural Bangladesh.

    PubMed

    Hussain, Faruqe; Clasen, Thomas; Akter, Shahinoor; Bawel, Victoria; Luby, Stephen P; Leontsini, Elli; Unicomb, Leanne; Barua, Milan Kanti; Thomas, Brittany; Winch, Peter J

    2017-05-25

    In rural Bangladesh, India and elsewhere, pour-flush pit latrines are the most common sanitation system. When a single pit latrine becomes full, users must empty it themselves and risk exposure to fresh feces, pay an emptying service to remove pit contents or build a new latrine. Double pit pour-flush latrines may serve as a long-term sanitation option including high water table areas because the pits do not need to be emptied immediately and the excreta decomposes into reusable soil. Double pit pour-flush latrines were implemented in rural Bangladesh for 'hardcore poor' households by a national NGO, BRAC. We conducted interviews, focus groups, and spot checks in two low-income, rural areas of Bangladesh to explore the advantages and limitations of using double pit latrines compared to single pit latrines. The rural households accepted the double pit pour-flush latrine model and considered it feasible to use and maintain. This latrine design increased accessibility of a sanitation facility for these low-income residents and provided privacy, convenience and comfort, compared to open defecation. Although a double pit latrine is more costly and requires more space than a single pit latrine the households perceived this sanitation system to save resources, because households did not need to hire service workers to empty pits or remove decomposed contents themselves. In addition, the excreta decomposition process produced a reusable soil product that some households used in homestead gardening. The durability of the latrine superstructures was a problem, as most of the bamboo-pole superstructure broke after 6-18 months of use. Double pit pour-flush latrines are a long-term improved sanitation option that offers users several important advantages over single pit pour-flush latrines like in rural Bangladesh which can also be used in areas with high water table. Further research can provide an understanding of the comparative health impacts and effectiveness of the model

  20. Developpement et application d'un systeme mobile de laser terrestre pour quantifier le bilan sedimentaire des plages

    NASA Astrophysics Data System (ADS)

    Van-Wierts, Stefanie

    Au Québec maritime, l'érosion côtière est une problématique d'envergure, notamment sur les côtes de formations meubles. Les plages ont un rôle de zone tampon ayant comme fonction naturelle d'absorber l'énergie des vagues et donc d'assurer l'équilibre de certains écosystèmes et le maintien de l'écoumène en réduisant l'érosion de la côte. Les méthodes d'acquisition conventionnelles ne permettent pas de quantifier convenablement les changements morphosédimentaires d'une plage à l'échelle des cellules hydrosédimentaires. Le manque de méthode d'acquisition fiable et de données quantitatives mène à une surestimation ou à une sous-estimation de la disponibilité sédimentaire d'un système côtier. Pour contrer ces lacunes et afin de minimiser les coûts d'acquisition, un nouveau système mobile de LiDAR terrestre a été mis en place, permettant d'acquérir des données topographiques de l'estran, de la haute plage et des falaises. Le système multicapteurs comprend un LiDAR, un système de navigation à haute précision (IMU et D-GPS) et une caméra. L'ensemble des instruments et capteurs sont montés sur un véhicule de type tout-terrain. Le système a été évalué sur la zone côtière de la péninsule de Manicouagan. La comparaison des données LiDAR avec 1 050 points de référence géopositionnés au D-GPS montre une erreur verticale moyenne de 0,1 m sur les secteurs de plage. Les résultats montrent que le volume sédimentaire moyen des plages devant les zones où la ligne de rivage présente un ouvrage de protection en enrochement (12 m 3/m) est plus de trois fois plus faible que devant les secteurs à l'état naturel (35,5 m3/m). La moyenne des secteurs en transition, constituant les segments où une zone artificielle et une zone naturelle se chevauchent présentent un volume moyen de 28 m3/m. Aussi, les plages devant les secteurs anthropisés sont en moyenne près de 2 fois plus étroites (12,7 m) que devant les secteurs naturels (25

  1. Les métamatériaux, des micro-ondes à l'optique : théorie et applications

    NASA Astrophysics Data System (ADS)

    Kante, B.

    2010-04-01

    Cet article constitue une contribution originale et importante à la compréhension à la fois théorique et expérimentale des métamatériaux en micro-ondes et en infrarouge. Nous avons réalisé et caractérisé sur silicium des nano-structures metallo-diélectriques, briques de base des métamatériaux infrarouge et optique. Des caractérisations optiques exhaustives ont été réalisées pour la première fois sur ces structures en amplitude et en phase par interférométrie. Des topologies plus simples de métamatériaux d’un point de vue technologique et des performances optiques ont été introduites, et leur potentiel démontré dans la réalisation de fonctions aussi complexes que la réfraction négative, le couplage de mode plasmoniques, les nano senseurs pour la biologie et l’invisibilité électromagnétique en infrarouge. Les transformations d’espace, et le nouveau paradigme qu’elles offrent à l’optique, rendant possible une ingénierie de l’espace pour les photons ainsi que leur implémentation par métamatériaux ont été présentés par la première démonstration expérimentale d’une cape d’invisibilité non magnétique.

  2. Un accumulateur echangeur de chaleur hybride pour la gestion simultanee des energies solaire et electrique

    NASA Astrophysics Data System (ADS)

    Ait Hammou, Zouhair

    Cette etude porte sur la conception d'un accumulateur echangeur de chaleur hybride (AECH) pour la gestion simultanee des energies solaire et electrique. Un modele mathematique reposant sur les equations de conservation de la quantite d'energie est expose. Il est developpe pour tester differents materiaux de stockage, entre autres, les materiaux a changement de phase (solide/liquide) et les materiaux de stockage sensible. Un code de calcul est mis en eeuvre sur ordinateur, puis valide a l'aide des resultats analytiques et numeriques de la litterature. En parallele, un prototype experimental a echelle reduite est concu au laboratoire afin de valider le code de calcul. Des simulations sont effectuees pour etudier les effets des parametres de conception et des materiaux de stockage sur le comportement thermique de l'AECH et sur la consommation d'energie electrique. Les resultats des simulations sur quatre mois d'hiver montrent que la paraffine n-octadecane et l'acide caprique sont deux candidats souhaitables pour le stockage d'energie destine au chauffage des habitats. L'utilisation de ces deux materiaux dans l'AECH permet de reduire la consommation d'energie electrique de 32% et d'aplanir le probleme de pointe electrique puisque 90% de l'energie electrique est consommee durant les heures creuses. En plus, en adoptant un tarif preferentiel, le calcul des couts lies a la consommation d'energie electrique montre que le consommateur adoptant ce systeme beneficie d'une reduction de 50% de la facture d'electricite.

  3. Behavior Characteristics of Type I (75/25) Octol during Melt Pouring HE Warhead M250 (Chaparral)

    DTIC Science & Technology

    1979-09-01

    COVERED BEHAVIOR CHARACTERISTICS OF TYPE 1 (75/25) "OCTOL DURING MELT POURING HE WARHEAD I M250 (CHAPARRAL) 6. PERFORMING ORG. APrPORT NUMBER 7. AUTHOR...Military Specification, HMX, MIL-H-45444B, Amendment 2, dated 12 July 1977. 4 6. Military Specification, Warhead, Guided Missile, HE, M250 , Loading...CHARACTERISTICS OF TYPE i (75/25) OCTOL DURING MELT POURING HE WARHEAD M250 (CHAPARRAL) HERMAN J. FRIGAND SEPTEMBER 1979 US ARMY ARMAMENT RESEARCH AND

  4. STEEL BEAMS FOR FIRST FLOOR BEING READIED FOR CONCRETE POUR ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    STEEL BEAMS FOR FIRST FLOOR BEING READIED FOR CONCRETE POUR UNDER WEATHER SHELTER DURING COLD WINTER. NOTE ABUNDANCE OF BEAMS; THE FLOOR WILL SUPPORT HEAVY LOADS. INL NEGATIVE NO. 1175. Unknown Photographer, 12/20/1950 - Idaho National Engineering Laboratory, Test Reactor Area, Materials & Engineering Test Reactors, Scoville, Butte County, ID

  5. Insecticide and Repellent Mixture Pour-On Protects Cattle against Animal Trypanosomosis

    PubMed Central

    Abdoulmoumini, Mamoudou; Zoli, Andre; Cene, Bylah; Adakal, Hassane; Bouyer, Jérémy

    2016-01-01

    Background African animal trypanosomosis (AAT), transmitted by tsetse flies and tick-borne diseases are the main constraints to livestock production in sub-Saharan Africa. Vector control methods such as pour-on offer individual protection against ticks but not against tsetse so far, for which protection has always been communal, through a reduction of their density. The latter requires the treatment of a large part of the herd in a given landscape and is not instantaneous. Methodology/Principal Findings Two prospective surveys were conducted to evaluate the efficacy and persistence of a pour-on formulation composed of cypermetrhin, chlorpyrifos, piperonyl butoxid and citronella (Vectoclor, CEVA Santé Animal). In experimental conditions, tsetse flies were exposed to treated and control cattle. Flies knockdown and engorgement rates were determined and the product persistence was assessed as the time for these parameters to drop below 50% (T50). T50 was 37 days (95%CI: [33–41] days) and 46 days (95%CI: [39–56] days) for the knockdown and engorgement rates respectively. In field conditions, two cattle herds were monitored following a case-control experimental design, in the Adamaoua region of Cameroon. One herd was treated once with Vectoclor pour-on (treated group) and the second used as a control group (not treated). Ticks infestation rate, trypanosomosis prevalence and packed-cell volume were measured over the two months following treatment. The treatment was highly effective against ticks with a complete elimination three days after application in the treated group. Trypanosomosis prevalence was also significantly reduced during the study (by 4, P<0.001) and PCV of the treated group increased significantly in the same time (P<0.001), contrary to the control group. Conclusions/Significance The protection of this new pour-on against tsetse bites and trypanosomosis is demonstrated here for the first time. Moreover, this insecticide and repellent mixture offer a

  6. Topical (pour-on) ivermectin in the treatment of canine scabies.

    PubMed Central

    Paradis, M; de Jaham, C; Pagé, N

    1997-01-01

    The efficacy of a pour-on formulation of ivermectin at 500 micrograms/kg body weight applied on the dorsum on days 1 and 15 was evaluated in 90 dogs from a shelter, naturally infested with Sarcoptes scabiei. This very practical form of treatment was successful in eradicating scabies from this shelter. PMID:9187806

  7. Modelisation frequentielle de la permittivite du beton pour le controle non destructif par georadar

    NASA Astrophysics Data System (ADS)

    Bourdi, Taoufik

    Le georadar (Ground Penetrating Radar (GPR)) constitue une technique de controle non destructif (CND) interessante pour la mesure des epaisseurs des dalles de beton et la caracterisation des fractures, en raison de ses caracteristiques de resolution et de profondeur de penetration. Les equipements georadar sont de plus en plus faciles a utiliser et les logiciels d'interpretation sont en train de devenir plus aisement accessibles. Cependant, il est ressorti dans plusieurs conferences et ateliers sur l'application du georadar en genie civil qu'il fallait poursuivre les recherches, en particulier sur la modelisation et les techniques de mesure des proprietes electriques du beton. En obtenant de meilleures informations sur les proprietes electriques du beton aux frequences du georadar, l'instrumentation et les techniques d'interpretation pourraient etre perfectionnees plus efficacement. Le modele de Jonscher est un modele qui a montre son efficacite dans le domaine geophysique. Pour la premiere fois, son utilisation dans le domaine genie civil est presentee. Dans un premier temps, nous avons valide l'application du modele de Jonscher pour la caracterisation de la permittivite dielectrique du beton. Les resultats ont montre clairement que ce modele est capable de reproduire fidelement la variation de la permittivite de differents types de beton sur la bande de frequence georadar (100 MHz-2 GHz). Dans un deuxieme temps, nous avons montre l'interet du modele de Jonscher en le comparant a d'autres modeles (Debye et Debye-etendu) deja utilises dans le domaine genie civil. Nous avons montre aussi comment le modele de Jonscher peut presenter une aide a la prediction de l'efficacite de blindage et a l'interpretation des ondes de la technique GPR. Il a ete determine que le modele de Jonscher permet de donner une bonne presentation de la variation de la permittivite du beton dans la gamme de frequence georadar consideree. De plus, cette modelisation est valable pour differents

  8. A new portable vibrator for plaster pouring: effect on the marginal fit at cylinder-abutment

    PubMed Central

    de ANDRADE, Pâmela Cândida Aires Ribas; LUTHI, Leonardo Flores; STANLEY, Kyle; CARDOSO, Antônio Carlos

    2012-01-01

    Objective The aim of this study was to test a new portable vibrator for plaster pouring (developed for this purpose), comparing the effect of its use on the accuracy of working cast of implant-supported restorations to the conventional vibrator. Material and methods From a master cast with 2 implants, 30 transfer moldings were made randomly and divided into three groups: Group I (GI): pouring performed in an outsourced dental laboratory with conventional plaster vibrator (10 casts), Group II (GII): pouring performed in the laboratory of the Federal University of Santa Catarina (UFSC) with conventional plaster vibrator (10 casts) and Group III (GIII): pouring performed with the portable vibrator fabricated for this study (10 casts). The position of the analogue and marginal adaptation of the infrastructure were verified by testing the single screw on the master model and on the working model. The measurement of misfit was blindly performed with a precision microscope and analyzing unit, Quadra-Check 200. The data were statistically analyzed by analysis of variance (ANOVA) and the Holm-Sidak test (α=0.05). Results Means±standard deviations were as follows: GI: 19.19±4.73 µm; GII: 21.72±5.41 µm; GIII: 13.5±2.39 µm (P<0.05), with GIII significantly lower as compared to the other groups. Conclusion Within the limitations of this study, it was concluded that a greater accuracy of working cast was achieved when a portable vibrator was used for casting molds. PMID:23138736

  9. Systeme microfluidique d'analyse sanguine en temps reel pour l'imagerie moleculaire chez le petit animal

    NASA Astrophysics Data System (ADS)

    Convert, Laurence

    De nouveaux radiotraceurs sont continuellement développés pour améliorer l'efficacité diagnostique en imagerie moléculaire, principalement en tomographie d'émission par positrons (TEP) et en tomographie d'émission monophotonique (TEM) dans les domaines de l'oncologie, de la cardiologie et de la neurologie. Avant de pouvoir être utilisés chez les humains, ces radiotraceurs doivent être caractérisés chez les petits animaux, principalement les rats et les souris. Pour cela, de nombreux échantillons sanguins doivent être prélevés et analysés (mesure de radioactivité, séparation de plasma, séparation d'espèces chimiques), ce qui représente un défi majeur chez les rongeurs à cause de leur très faible volume sanguin (˜1,4 ml pour une souris). Des solutions fournissant une analyse partielle sont présentées dans la littérature, mais aucune ne permet d'effectuer toutes les opérations dans un même système. Les présents travaux de recherche s'insèrent dans le contexte global d'un projet visant à développer un système microfluidique d'analyse sanguine complète en temps réel pour la caractérisation des nouveaux radiotraceurs TEP et TEM. Un cahier des charges a tout d'abord été établi et a permis de fixer des critères quantitatifs et qualitatifs à respecter pour chacune des fonctions de la puce. La fonction de détection microfluidique a ensuite été développée. Un état de l'art des travaux ayant déjà combiné la microfluidique et la détection de radioactivité a permis de souligner qu'aucune solution existante ne répondait aux critères du projet. Parmi les différentes technologies disponibles, des microcanaux en résine KMPR fabriqués sur des détecteurs semiconducteurs de type p-i-n ont été identifiés comme une solution technologique pour le projet. Des détecteurs p-i-n ont ensuite été fabriqués en utilisant un procédé standard. Les performances encourageantes obtenues ont mené à initier un projet de ma

  10. Urban Combat Advanced Training Technology Architecture (Architecture de technologie avancee pour l’entrainement au combat urbain)

    DTIC Science & Technology

    2018-01-01

    REPORT TR-MSG-098 Urban Combat Advanced Training Technology Architecture (Architecture de technologie avancée pour l’entraînement au combat urbain...REPORT TR-MSG-098 Urban Combat Advanced Training Technology Architecture (Architecture de technologie avancée pour l’entraînement au combat...3 1-2 1.3 Illustration of the Need for UCATT by Contemporary Example Situations 1-3 1.3.1 RNLA: Connection of NLD Mobile Combat Training Centre to

  11. Caracterisation thermique de modules de refroidissement pour la photovoltaique concentree

    NASA Astrophysics Data System (ADS)

    Collin, Louis-Michel

    Pour rentabiliser la technologie des cellules solaires, une reduction du cout d'exploitation et de fabrication est necessaire. L'utilisation de materiaux photovoltaiques a un impact appreciable sur le prix final par quantite d'energie produite. Une technologie en developpement consiste a concentrer la lumiere sur les cellules solaires afin de reduire cette quantite de materiaux. Or, concentrer la lumiere augmente la temperature de la cellule et diminue ainsi son efficacite. Il faut donc assurer a la cellule un refroidissement efficace. La charge thermique a evacuer de la cellule passe au travers du recepteur, soit la composante soutenant physiquement la cellule. Le recepteur transmet le flux thermique de la cellule a un systeme de refroidissement. L'ensemble recepteur-systeme de refroidissement se nomme module de refroidissement. Habituellement, la surface du recepteur est plus grande que celle de la cellule. La chaleur se propage donc lateralement dans le recepteur au fur et a mesure qu'elle traverse le recepteur. Une telle propagation de la chaleur fournit une plus grande surface effective, reduisant la resistance thermique apparente des interfaces thermiques et du systeme de refroidissement en aval vers le module de refroidissement. Actuellement, aucune installation ni methode ne semble exister afin de caracteriser les performances thermiques des recepteurs. Ce projet traite d'une nouvelle technique de caracterisation pour definir la diffusion thermique du recepteur a l'interieur d'un module de refroidissement. Des indices de performance sont issus de resistances thermiques mesurees experimentalement sur les modules. Une plateforme de caracterisation est realisee afin de mesurer experimentalement les criteres de performance. Cette plateforme injecte un flux thermique controle sur une zone localisee de la surface superieure du recepteur. L'injection de chaleur remplace le flux thermique normalement fourni par la cellule. Un systeme de refroidissement est installe

  12. CT protocol management: simplifying the process by using a master protocol concept.

    PubMed

    Szczykutowicz, Timothy P; Bour, Robert K; Rubert, Nicholas; Wendt, Gary; Pozniak, Myron; Ranallo, Frank N

    2015-07-08

    This article explains a method for creating CT protocols for a wide range of patient body sizes and clinical indications, using detailed tube current information from a small set of commonly used protocols. Analytical expressions were created relating CT technical acquisition parameters which can be used to create new CT protocols on a given scanner or customize protocols from one scanner to another. Plots of mA as a function of patient size for specific anatomical regions were generated and used to identify the tube output needs for patients as a function of size for a single master protocol. Tube output data were obtained from the DICOM header of clinical images from our PACS and patient size was measured from CT localizer radiographs under IRB approval. This master protocol was then used to create 11 additional master protocols. The 12 master protocols were further combined to create 39 single and multiphase clinical protocols. Radiologist acceptance rate of exams scanned using the clinical protocols was monitored for 12,857 patients to analyze the effectiveness of the presented protocol management methods using a two-tailed Fisher's exact test. A single routine adult abdominal protocol was used as the master protocol to create 11 additional master abdominal protocols of varying dose and beam energy. Situations in which the maximum tube current would have been exceeded are presented, and the trade-offs between increasing the effective tube output via 1) decreasing pitch, 2) increasing the scan time, or 3) increasing the kV are discussed. Out of 12 master protocols customized across three different scanners, only one had a statistically significant acceptance rate that differed from the scanner it was customized from. The difference, however, was only 1% and was judged to be negligible. All other master protocols differed in acceptance rate insignificantly between scanners. The methodology described in this paper allows a small set of master protocols to be

  13. CT protocol management: simplifying the process by using a master protocol concept

    PubMed Central

    Bour, Robert K.; Rubert, Nicholas; Wendt, Gary; Pozniak, Myron; Ranallo, Frank N.

    2015-01-01

    This article explains a method for creating CT protocols for a wide range of patient body sizes and clinical indications, using detailed tube current information from a small set of commonly used protocols. Analytical expressions were created relating CT technical acquisition parameters which can be used to create new CT protocols on a given scanner or customize protocols from one scanner to another. Plots of mA as a function of patient size for specific anatomical regions were generated and used to identify the tube output needs for patients as a function of size for a single master protocol. Tube output data were obtained from the DICOM header of clinical images from our PACS and patient size was measured from CT localizer radiographs under IRB approval. This master protocol was then used to create 11 additional master protocols. The 12 master protocols were further combined to create 39 single and multiphase clinical protocols. Radiologist acceptance rate of exams scanned using the clinical protocols was monitored for 12,857 patients to analyze the effectiveness of the presented protocol management methods using a two‐tailed Fisher's exact test. A single routine adult abdominal protocol was used as the master protocol to create 11 additional master abdominal protocols of varying dose and beam energy. Situations in which the maximum tube current would have been exceeded are presented, and the trade‐offs between increasing the effective tube output via 1) decreasing pitch, 2) increasing the scan time, or 3) increasing the kV are discussed. Out of 12 master protocols customized across three different scanners, only one had a statistically significant acceptance rate that differed from the scanner it was customized from. The difference, however, was only 1% and was judged to be negligible. All other master protocols differed in acceptance rate insignificantly between scanners. The methodology described in this paper allows a small set of master protocols to be

  14. Surface Detail Reproduction and Dimensional Stability of Contemporary Irreversible Hydrocolloid Alternatives after Immediate and Delayed Pouring.

    PubMed

    Kusugal, Preethi; Chourasiya, Ritu Sunil; Ruttonji, Zarir; Astagi, Preeti; Nayak, Ajay Kumar; Patil, Abhishekha

    2018-01-01

    To overcome the poor dimensional stability of irreversible hydrocolloids, alternative materials were introduced. The dimensional changes of these alternatives after delayed pouring are not well studied and documented in the literature. The purpose of the study is to evaluate and compare the surface detail reproduction and dimensional stability of two irreversible hydrocolloid alternatives with an extended-pour irreversible hydrocolloid at different time intervals. All testing were performed according to the ANSI/ADA specification number 18 for surface detail reproduction and specification number 19 for dimensional change. The test materials used in this study were newer irreversible hydrocolloid alternatives such as AlgiNot FS, Algin-X Ultra FS, and Kromopan 100 which is an extended pour irreversible hydrocolloid as control. The surface detail reproduction was evaluated using stereomicroscope. The dimensional change after storage period of 1 h, 24 h, and 120 h was assessed and compared between the test materials and control. The data were analyzed using one-way ANOVA and post hoc Bonferroni test. Statistically significant results ( P < 0.001) were seen when mean scores of the tested materials were compared with respect to reproduction of 22 μm line from the metal block. Kromopan 100 showed statistically significant differences between different time intervals ( P < 0.001) and exhibited more dimensional change. Algin-X Ultra FS proved to be more accurate and dimensionally stable. Newer irreversible hydrocolloid alternative impression materials were more accurate in surface detail reproduction and exhibited minimal dimensional change after storage period of 1 h, 24 h, and 120 h than extended-pour irreversible hydrocolloid impression material.

  15. Revetements nanostructures pour la protection des metaux dans les environnements marins

    NASA Astrophysics Data System (ADS)

    Brassard, Jean-Denis

    L'objectif de cette recherche est de verifier qu'un materiau superhydrophobe peut diminuer l'adherence et l'accumulation de la glace tout en conservant de bonnes proprietes anticorrosion. Afin de verifier cette assertion, trois familles de nouveaux revetements micros et nanostructures, identifiees par les lettres A, B, et C, ont ete developpes de facon a pouvoir en determiner l'efficacite glaciophobe en relation avec l'angle de contact particulier a chaque structure obtenue. Les revetements ont tous ete optimises pour que l'angle de contact et l'adherence au substrat soient maximaux. Les trois revetements optimises sont les suivants: Le revetement A a ete developpe pour application sur l'acier galvanise. Les microrugosites creees sont celles de la structure de la couche du zinc electrodepose en surface et les nanorugosites sont celles creees par le film de silicone copolymerise nanostructure. Un temps optimal de 10 min a ete retenu pour l'electrodeposition du zinc, ce dernier maximisant l'angle de contact a 155° lorsqu'enduit d'un film de silicone de 100 nm d'epaisseur. Le revetement B a ete developpe pour application sur un alliage d'aluminium. Les microrugosites creees sont celles de la microstructure granulaire obtenue par gravure de l'aluminium immerge dans un bain de HCl et les nanorugosites sont celles creees d'un meme film nanostructure de silicone copolymerise. La valeur optimale du temps de gravure est de 8 minutes et donne l'angle de contact le plus eleve a 154°, lorsqu'enduit du meme film de silicone de 100 nm d'epaisseur depose sur le revetement A. Le revetement C a ete developpe pour etre applique indifferemment sur tout substrat degraisse d'aluminium ou d'acier. Les microrugosites et les nanorugosites sont celles creees par les agregats de nanoparticules de ZnO rendues hydrophobes melangees au silicone qui sont pulverisees sur une couche d'appret composee de silicone et de polymethylhydrosiloxane. On obtient alors un produit composite rigide ou les

  16. Revetements bioactifs a base de chondroitine sulfate et de facteurs de croissance pour applications vasculaires

    NASA Astrophysics Data System (ADS)

    Lequoy, Pauline

    Malgre des avancees technologiques indeniables, l'efficacite des implants biomedicaux est encore limitee par les biomateriaux synthetiques qui les composent, notamment en raison de leur incapacite a generer une reponse biologique adequate. En particulier, la guerison tissulaire autour des implants vasculaires reste problematique. Une etude de la litterature a montre que dans le cas des endoprotheses couvertes (tuyaux polymeriques utilises pour la reparation endovasculaire des anevrismes de l'aorte abdominale), le manque de guerison observe s'explique non seulement par l'inertie des biomateriaux utilises mais aussi par le fait que l'implant est insere dans un vaisseau malade favorisant la mort des cellules par apoptose et presentant une depletion cellulaire marquee. L'hypothese a la base de ce projet est qu'un revetement bioactif pourrait ameliorer la guerison et la colonisation de l'implant par les cellules vasculaires et ainsi favoriser l'attachement de l'implant dans le vaisseau malade afin de prevenir les complications a long terme. Dans ce contexte, deux molecules anti-apoptotiques ont ete selectionnees pour developper le revetement, la chondroitine sulfate (CS), un glycosaminoglycane de la matrice extracellulaire, et le facteur de croissance de l'epiderme (EGF) qui possede egalement un role important dans la guerison tissulaire. L'un des defis de ce projet est de preserver la bioactivite de ces molecules lors de leur immobilisation dans un revetement. Pour etablir une preuve de concept, nous avons demontre qu'un revetement CS+EGF obtenu par greffage covalent permet d'ameliorer significativement la survie des cellules vasculaires humaines (cellules musculaires lisses, CMLV, et fibroblastes) sur les materiaux realistes (PET, ePTFE). Apres avoir transfere ce revetement sur des implants commerciaux en ePTFE, des tests in vivo ont demontre une amelioration de la guerison grâce au revetement bioactif, cependant la guerison n'a pas ete totale dans la cavite

  17. Endectocide activity of a pour-on formulation containing 1.5 per cent ivermectin +0.5 per cent abamectin in cattle.

    PubMed

    Silva, Heloisa Cristina; Prette, Nancy; Lopes, Welber Daniel Zanetti; Sakamoto, Cláudio Alessandro M; Buzzulini, Carolina; Dos Santos, Thais Rabelo; Cruz, Breno Cayeiro; Teixeira, Weslen F Pires; Felippelli, Gustavo; Carvalho, Rafael Silveira; Maciel, Willian Giquelin; Soares, Vando Edésio; da Costa, Alvimar José

    2015-01-01

    The present work aimed to evaluate, through ten different studies, the therapeutic efficacy of a new pour-on formulation, containing 1.5 per cent ivermectin +0.5 per cent abamectin, against parasites of cattle. Results obtained on trials against Rhipicephalus (Boophilus) microplus showed that the pour-on combination of 1.5 per cent ivermectin +0.5 per cent abamectin obtained superior efficacy indexes against this ectoparasite, when compared with formulations containing 0.5 per cent ivermectin, 1 per cent ivermectin and the combination of 1 per cent abamectin +20 per cent levamisole. The results of efficacy of the ivermectin+abamectin and the 0.5 per cent ivermectin against Haematobia irritans were similar. Against Cochliomyia hominivorax larvae, all pour-on formulations tested (1.5 per cent ivermectin +0.5 per cent abamectin, 0.5 per cent ivermectin and 0.5 per cent abamectin), as well as 1 per cent doramectin administered subcutaneously, were considered ineffective. Cattle medicated with 1.5 per cent ivermectin +0.5 per cent abamectin, pour-on, remained free from parasitism by Dermatobia hominis larvae during 42 days (96 per cent efficacy), while values superior to 90 per cent were obtained by 0.5 per cent ivermectin (92 per cent) and 0.5 per cent abamectin (93 per cent) until the 42nd and 35th days post treatment, respectively. Against Haemonchus placei and Oesophagostomum radiatum, the pour-on of ivermectin+abamectin showed better efficacy than the 0.5 per cent ivermectin and 0.5 per cent abamectin. As to Cooperia punctata, there was no difference regarding efficacy results obtained by the avermectins combination and abamectin. The pour-on combination of 1.5 per cent ivermectin +0.5 per cent abamectin obtained high efficacy against R. (B.) microplus, D. hominis and some species of cattle gastrointestinal helminths when compared with formulations of 0.5 per cent ivermectin and 0.5 per cent abamectin administered through the same route.

  18. Surface Detail Reproduction and Dimensional Stability of Contemporary Irreversible Hydrocolloid Alternatives after Immediate and Delayed Pouring

    PubMed Central

    Kusugal, Preethi; Chourasiya, Ritu Sunil; Ruttonji, Zarir; Astagi, Preeti; Nayak, Ajay Kumar; Patil, Abhishekha

    2018-01-01

    Purpose: To overcome the poor dimensional stability of irreversible hydrocolloids, alternative materials were introduced. The dimensional changes of these alternatives after delayed pouring are not well studied and documented in the literature. The purpose of the study is to evaluate and compare the surface detail reproduction and dimensional stability of two irreversible hydrocolloid alternatives with an extended-pour irreversible hydrocolloid at different time intervals. Materials and Methods: All testing were performed according to the ANSI/ADA specification number 18 for surface detail reproduction and specification number 19 for dimensional change. The test materials used in this study were newer irreversible hydrocolloid alternatives such as AlgiNot FS, Algin-X Ultra FS, and Kromopan 100 which is an extended pour irreversible hydrocolloid as control. The surface detail reproduction was evaluated using stereomicroscope. The dimensional change after storage period of 1 h, 24 h, and 120 h was assessed and compared between the test materials and control. The data were analyzed using one-way ANOVA and post hoc Bonferroni test. Results: Statistically significant results (P < 0.001) were seen when mean scores of the tested materials were compared with respect to reproduction of 22 μm line from the metal block. Kromopan 100 showed statistically significant differences between different time intervals (P < 0.001) and exhibited more dimensional change. Algin-X Ultra FS proved to be more accurate and dimensionally stable. Conclusions: Newer irreversible hydrocolloid alternative impression materials were more accurate in surface detail reproduction and exhibited minimal dimensional change after storage period of 1 h, 24 h, and 120 h than extended-pour irreversible hydrocolloid impression material. PMID:29599578

  19. Fabrication et caracterisation de nanocristaux de silicium localises, realises par gravure electrochimique pour des applications nanoelectroniques

    NASA Astrophysics Data System (ADS)

    Ayari-Kanoun, Asma

    Ce travail de these porte sur le developpement d'une nouvelle approche pour la localisation et l'organisation de nanocristaux de silicium realises par gravure electrochimique. Cette derniere represente une technique simple et peu couteuse par rapport aux autres techniques couramment utilisees pour la fabrication de nanocristaux de silicium. L'idee de ce travail a ete d'etudier la nanostructuration de minces couches de nitrure de silicium, d'environ 30 nm d'epaisseur pour permettre par la suite un arrangement periodique des nanocristaux de silicium. Cette pre-structuration est obtenue de facon artificielle en imposant un motif periodique via une technique de lithographie par faisceau d'electrons combinee avec une gravure plasma. Une optimisation des conditions de lithographie et de gravure plasma ont permis d'obtenir des reseaux de trous de 30 nm de diametre debouchant sur le silicium avec un bon controle de leur morphologie (taille, profondeur et forme). En ajustant les conditions de gravure electrochimique (concentration d'acide, temps de gravure et densite de courant), nous avons obtenu des reseaux -2D ordonnes de nanocristaux de silicium de 10 nm de diametre a travers ces masques de nanotrous avec le controle parfait de leur localisation, la distance entre les nanocristaux et leur orientation cristalline. Des etudes electriques preliminaires sur ces nanocristaux ont permis de mettre en evidence des effets de chargement. Ces resultats tres prometteurs confirment l'interet des nanocristaux de silicium realises par gravure electrochimique dans le futur pour la fabrication a grande echelle de dispositifs nanoelectroniques. Mots-cles : localisation, organisation, nanocristaux de silicium, gravure electrochimique, lithographie electronique, gravure plasma, nitrure de silicium.

  20. Gestion des ressources hydriques adaptee aux changements climatiques pour la production optimale d'hydroelectricite. Etude de cas: Bassin versant de la riviere Manicouagan

    NASA Astrophysics Data System (ADS)

    Haguma, Didier

    Il est dorenavant etabli que les changements climatiques auront des repercussions sur les ressources en eau. La situation est preoccupante pour le secteur de production d'energie hydroelectrique, car l'eau constitue le moteur pour generer cette forme d'energie. Il sera important d'adapter les regles de gestion et/ou les installations des systemes hydriques, afin de minimiser les impacts negatifs et/ou pour capitaliser sur les retombees positives que les changements climatiques pourront apporter. Les travaux de la presente recherche s'interessent au developpement d'une methode de gestion des systemes hydriques qui tient compte des projections climatiques pour mieux anticiper les impacts de l'evolution du climat sur la production d'hydroelectricite et d'etablir des strategies d'adaptation aux changements climatiques. Le domaine d'etude est le bassin versant de la riviere Manicouagan situe dans la partie centrale du Quebec. Une nouvelle approche d'optimisation des ressources hydriques dans le contexte des changements climatiques est proposee. L'approche traite le probleme de la saisonnalite et de la non-stationnarite du climat d'une maniere explicite pour representer l'incertitude rattachee a un ensemble des projections climatiques. Cette approche permet d'integrer les projections climatiques dans le probleme d'optimisation des ressources en eau pour une gestion a long terme des systemes hydriques et de developper des strategies d'adaptation de ces systemes aux changements climatiques. Les resultats montrent que les impacts des changements climatiques sur le regime hydrologique du bassin de la riviere Manicouagan seraient le devancement et l'attenuation de la crue printaniere et l'augmentation du volume annuel d'apports. L'adaptation des regles de gestion du systeme hydrique engendrerait une hausse de la production hydroelectrique. Neanmoins, une perte de la performance des installations existantes du systeme hydrique serait observee a cause de l'augmentation des

  1. Conception et optimisation d'une peau en composite pour une aile adaptative =

    NASA Astrophysics Data System (ADS)

    Michaud, Francois

    Les preoccupations economiques et environnementales constituent des enjeux majeurs pour le developpement de nouvelles technologies en aeronautique. C'est dans cette optique qu'est ne le projet MDO-505 intitule Morphing Architectures and Related Technologies for Wing Efficiency Improvement. L'objectif de ce projet vise a concevoir une aile adaptative active servant a ameliorer sa laminarite et ainsi reduire la consommation de carburant et les emissions de l'avion. Les travaux de recherche realises ont permis de concevoir et optimiser une peau en composite adaptative permettant d'assurer l'amelioration de la laminarite tout en conservant son integrite structurale. D'abord, une methode d'optimisation en trois etapes fut developpee avec pour objectif de minimiser la masse de la peau en composite en assurant qu'elle s'adapte par un controle actif de la surface deformable aux profils aerodynamiques desires. Le processus d'optimisation incluait egalement des contraintes de resistance, de stabilite et de rigidite de la peau en composite. Suite a l'optimisation, la peau optimisee fut simplifiee afin de faciliter la fabrication et de respecter les regles de conception de Bombardier Aeronautique. Ce processus d'optimisation a permis de concevoir une peau en composite dont les deviations ou erreurs des formes obtenues etaient grandement reduites afin de repondre au mieux aux profils aerodynamiques optimises. Les analyses aerodynamiques realisees a partir de ces formes ont predit de bonnes ameliorations de la laminarite. Par la suite, une serie de validations analytiques fut realisee afin de valider l'integrite structurale de la peau en composite suivant les methodes generalement utilisees par Bombardier Aeronautique. D'abord, une analyse comparative par elements finis a permis de valider une rigidite equivalente de l'aile adaptative a la section d'aile d'origine. Le modele par elements finis fut par la suite mis en boucle avec des feuilles de calcul afin de valider la

  2. Identification des parametres du moteur de l'avion Cessna Citation X pour la phase de croisiere a partir des tests en vol et a base des reseaux de neurones =

    NASA Astrophysics Data System (ADS)

    Zaag, Mahdi

    La disponibilite des modeles precis des avions est parmi les elements cles permettant d'assurer leurs ameliorations. Ces modeles servent a ameliorer les commandes de vol et de concevoir de nouveaux systemes aerodynamiques pour la conception des ailes deformables des avions. Ce projet consiste a concevoir un systeme d'identification de certains parametres du modele du moteur de l'avion d'affaires americain Cessna Citation X pour la phase de croisiere a partir des essais en vol. Ces essais ont ete effectues sur le simulateur de vol concu et fabrique par CAE Inc. qui possede le niveau D de la dynamique de vol. En effet, le niveau D est le plus haut niveau de precision donne par l'autorite federale de reglementation FAA de l'aviation civile aux Etats-Unis. Une methodologie basee sur les reseaux de neurones optimises a l'aide d'un algorithme intitule le "grand deluge etendu" est utilisee dans la conception de ce systeme d'identification. Plusieurs tests de vol pour differentes altitudes et differents nombres de Mach ont ete realises afin de s'en servir comme bases de donnees pour l'apprentissage des reseaux de neurones. La validation de ce modele a ete realisee a l'aide des donnees du simulateur. Malgre la nonlinearite et la complexite du systeme, les parametres du moteur ont ete tres bien predits pour une enveloppe de vol determinee. Ce modele estime pourrait etre utilise pour des analyses de fonctionnement du moteur et pourrait assurer le controle de l'avion pendant cette phase de croisiere. L'identification des parametres du moteur pourrait etre realisee aussi pour les autres phases de montee et de descente afin d'obtenir son modele complet pour toute l'enveloppe du vol de l'avion Cessna Citation X (montee, croisiere, descente). Cette methode employee dans ce travail pourrait aussi etre efficace pour realiser un modele pour l'identification des coefficients aerodynamiques du meme avion a partir toujours des essais en vol. None None None

  3. Analyzing the effect of routing protocols on media access control protocols in radio networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Barrett, C. L.; Drozda, M.; Marathe, A.

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i)more » number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.« less

  4. APPARATUS FOR MELTING AND POURING METAL

    DOEpatents

    Harris, F.A.

    1958-02-25

    This patent relates to a crucible for melting and pouring a metal under controlled atmospheric conditions. The crucible has a frangible plug in the bottom and a retaining device to prevent the entrance of the broken portions of the plug into the mold without interfering with the flow of the melt. After the charge has been melted, a knockout rod is lowered through the charge and forced against the frangible plug sufficiently to break off the closure disk along a previously scored line. The disk drops onto a retaining grid large enough to permit the flow of metal around the disk and into the mold below. Thts arrangement elimnates the entry of broken portions of the plug into the mold, thereby elimnating a common cause of imperfect castings.

  5. Facteurs de risque de mortalité chez les nouveaux-nés transférés au service de néonatologie de l'Hôpital Jason Sendwe de Lubumbashi, République Démocratique du Congo

    PubMed Central

    Katamea, Tina; Mukuku, Olivier; Kamona, Lewis; Mukelenge, Kethye; Mbula, Otikeke; Baledi, Lambert; Ntambwe, Emile; Mutombo, Augustin Mulangu; Wembonyama, Stanis Okitotsho; Luboya, Oscar Numbi

    2014-01-01

    Introduction La mortalité néonatale reste préoccupante dans notre milieu et plusieurs facteurs dont ceux liés à l'organisation du transfert de nouveau-nés au niveau des structures de prise en charge y contribuent. Les objectifs de notre étude sont de déterminer la fréquence du transfert néonatal extrahospitalier à l'unité de néonatologie et identifier les facteurs de risque de mortalité dans notre milieu. Méthodes Il s'agit d'une étude prospective et analytique menée sur une période de douze mois allant du 1er Janvier 2012 au 31 décembre 2012 ayant ciblé tous les nouveau-nés transférés des maternités extérieurs, traités et suivis dans le service de néonatologie de l'hôpital Sendwe. Les caractéristiques maternelles (âge, parité, état-civil, profession, niveau d’étude, antécédents médicaux et toxicologiques) et perpartales (âge gestationnel, état de la poche des eaux, voie d'accouchement) et néonataux (âge lors du transfert, sexe, poids de naissance, moyen de transfert, motif de transfert et évolution (guérison ou décès)) ont été étudiés. La saisie et l'analyse des données ont été faites sur le logiciel Epi Info 2011 (version 7.0.8.3) et le seuil de signification de 5%. Résultats La fréquence du transfert néonatal extrahospitalier est de 12,9%. La mortalité était significativement liée à la profession (vendeuse ou travailleuse) de la mère (OR = 7,43 (1,38-39,97)), au niveau d’étude élevé (OR = 4,22 (1,18-15,10)), à l’âge gestationnel <37 SA (OR=3,21 (1,46-7,06)), à l’accouchement par voie basse de manière dystocique (OR=6,50 (1,54-27,38)), au sexe masculin du nouveau-né (OR=2,43 (1,08-5,46)), au poids de naissance <1500 grammes (OR=15,3 (5,73-40,78)) et à la prématurité comme motif de transfert (OR=5,56 (1,47-20,98)). Conclusion Le bilan de la mortalité néonatale est lourd dans les pays en développement où les nouveau-nés continuent de mourir pour des causes souvent évitables. La r

  6. Ingenierie de nanoparticules plasmoniques robustes pour la generation de bulles par laser en vue d'applications biomedicales

    NASA Astrophysics Data System (ADS)

    Lachaine, Remi

    Les chirurgiens generent des bulles dans le corps humain a l'aide d'irradiation laser depuis plusieurs decennies. Ils utilisent ces bulles comme de petits scalpels, leur permettant de faire des incisions precises et localisees. Une des applications de cet outil chirurgical est la perforation cellulaire. Au lieu d'utiliser une aiguille pour perforer la membrane des cellules, il est possible de focaliser des impulsions laser en surface d'une cellule, formant un plasma au point focal du laser et generant une bulle qui perfore la membrane cellulaire. Toutefois, ce procede est assez lent et la perforation massive de cellules in-vivo n'est pas envisageable. Pour accelerer le processus, il est possible d'utiliser des nanoparticules plasmoniques. Ces dernieres agissent comme des nano-antennes qui permettent de concentrer la lumiere sur une echelle nanometrique. La possibilite d'irradier un grand nombre de nanoparticules simultanement a donne un nouvel elan a la generation de bulle comme outil de perforation cellulaire. L'utilisation de nanoparticules dans un contexte biomedical comporte toutefois certains risques. En particulier, la fragmentation de nanoparticules peut augmenter la toxicite du traitement. Dans un cas ideal, il est preferable d'utiliser des nanoparticules qui ne sont pas endommagees par l'irradiation laser. Cette these a pour but de developper une methode d'ingenierie de nanoparticules robustes permettant la generation efficace de bulles a des fins biomedicales. Il est tout d'abord demontre experimentalement que la formation de plasma est bel et bien le mecanisme physique principal menant a la generation de bulles lors de l'irradiation infrarouge (longueur d'onde de 800 nm) et ultrarapide (temps d'impulsion entre 45 fs et 1 ps) de nanoparticules d'or de 100 nm. Pour realiser cette demonstration, une methode pompe-sonde de detection de bulles d'environ 1 mum a ete elaboree. Cette methode a permis de mettre en evidence une difference de taille de 18% entre

  7. Effects of Pouring Temperature and Electromagnetic Stirring on Porosity and Mechanical Properties of A357 Aluminum Alloy Rheo-Diecasting

    NASA Astrophysics Data System (ADS)

    Guo, An; Zhao, Junwen; Xu, Chao; Li, Hu; Han, Jing; Zhang, Xu

    2018-05-01

    Semisolid slurry of A357 aluminum alloy was prepared using a temperature-controllable electromagnetic stirrer and rheo-diecast at different temperatures. The effects of pouring temperature and electromagnetic stirring (EMS) on the porosity in rheo-diecast samples, as well as the relation between porosity and mechanical properties, were investigated. The results show that pouring temperature and EMS had minor influences on rheo-diecast microstructure but marked influence on the porosity. With decreasing slurry pouring temperature, the porosity decreased first and then increased, whereas the maximum pore ratio (ratio of shape factor to diameter of the largest pore) increased first and then decreased. The maximum pore ratio determines the level of tensile strength and elongation, and higher mechanical properties can be obtained with smaller and rounder pores in samples. The mechanical properties of the rheo-diecast samples increased linearly with increasing maximum pore ratio. The maximum pore ratio was 1.43 µm-1, and the minimum porosity level was 0.37% under EMS condition for the rheo-diecast samples obtained at a pouring temperature of 608 °C. With this porosity condition, the maximum tensile strength and elongation were achieved at 274 MPa and 4.9%, respectively. It was also revealed that EMS improves mechanical properties by reduction in porosity and an increase in maximum pore ratio.

  8. Evaluation of a Pour-Through Water Treatment Device for Use as Microbiological Purifier

    EPA Science Inventory

    The United States Environmental Protection Agency (EPA) Office of Research and Development has evaluated the performance of a Point-of-Use (POU) pour-through device designed for use in India, developing and emerging market (D&E) countries, and under emergency situations in the Un...

  9. Alternative parallel ring protocols

    NASA Technical Reports Server (NTRS)

    Mukkamala, R.; Foudriat, E. C.; Maly, Kurt J.; Kale, V.

    1990-01-01

    Communication protocols are know to influence the utilization and performance of communication network. The effect of two token ring protocols on a gigabit network with multiple ring structure is investigated. In the first protocol, a mode sends at most one message on receiving a token. In the second protocol, a mode sends all the waiting messages when a token is received. The behavior of these protocols is shown to be highly dependent on the number of rings as well as the load in the network.

  10. Communications protocol

    NASA Technical Reports Server (NTRS)

    Zhou, Xiaoming (Inventor); Baras, John S. (Inventor)

    2010-01-01

    The present invention relates to an improved communications protocol which increases the efficiency of transmission in return channels on a multi-channel slotted Alohas system by incorporating advanced error correction algorithms, selective retransmission protocols and the use of reserved channels to satisfy the retransmission requests.

  11. Hémophilie B mineure révélée par une hémorragie cérébrale: à propos d'un cas

    PubMed Central

    Naji, Abdelhalim; Rkain, Maria; Amrani, Rim; Benajiba, Noufissa

    2015-01-01

    L'hémorragie intracrânienne (HIC) du nouveau-né à terme est une pathologie rare, leur prévalence est estimée à 2% des naissances vivantes. Les manifestations cliniques sont variables et non spécifique. Les causes d'HIC sont multiples et souvent intriquées, les mécanismes physiopathologiques principaux sont la dysrégulation du débit cérébral, une obstruction des vaisseaux ou une coagulation intravasculaire; ou une lésion directe par traumatisme. Nous rapportons le cas d'un nourrisson d'un mois qui a été admis dans notre service pour prendre en charge des convulsions associées à une pâleur cutanéomuqueuse, suite à laquelle l'examen biologique a mis fortuitement en faveur une hémophilie mineure sur une maladie hémorragique tardive. PMID:26491519

  12. Reliable broadcast protocols

    NASA Technical Reports Server (NTRS)

    Joseph, T. A.; Birman, Kenneth P.

    1989-01-01

    A number of broadcast protocols that are reliable subject to a variety of ordering and delivery guarantees are considered. Developing applications that are distributed over a number of sites and/or must tolerate the failures of some of them becomes a considerably simpler task when such protocols are available for communication. Without such protocols the kinds of distributed applications that can reasonably be built will have a very limited scope. As the trend towards distribution and decentralization continues, it will not be surprising if reliable broadcast protocols have the same role in distributed operating systems of the future that message passing mechanisms have in the operating systems of today. On the other hand, the problems of engineering such a system remain large. For example, deciding which protocol is the most appropriate to use in a certain situation or how to balance the latency-communication-storage costs is not an easy question.

  13. Appel pour une allocation intelligente dans le financement du système de santé au Cameroun

    PubMed Central

    Sieleunou, Isidore

    2011-01-01

    Le Cameroun utilise un système de budgétisation historique et une approche «top-down» pour allouer ses ressources de santé publique. Cependant, le pays compte 175 districts de santé dont les fortes disparités de nature épidémiologique, économique, géographique et culturelle, devraient être prises en compte pour réduire les iniquités en matière de sante publique. Comment comprendre alors que dans ces conditions, le budget des administrations publiques alloué aux différents districts de santé au Cameroun soit quasi identique alors que les défis sont si différents? L'inefficience allocative (mauvaise attribution du budget) générée par un tel système conduit vraisemblablement à une inefficience technique (mauvaise utilisation du budget). Pour la marche vers l'atteinte des objectifs du millénaire en matière de sante, il est impératif et urgent que les décideurs du secteur de la santé allouent de manière intelligente les ressources dans le système de santé. PMID:22355420

  14. Formulation de cas dans la psychose débutante : Quels outils pour le travail en équipe?

    PubMed Central

    Elowe, Julien; Mebdouhi, Nadir; Solida, Alessandra; Conus, Philippe

    2017-01-01

    Nous présentons d’abord brièvement le programme TIPP et les concepts généraux de la prise en charge précoce dans la psychose débutante. Un des objectifs de l’intervention dans la phase précoce des troubles psychotiques est notamment de proposer des soins spécifiques adaptés à cette phase de la maladie. En début de prise en charge, l’équipe de soins et en particulier le gestionnaire de cas (case manager), chef d’orchestre de la prise en charge, sont confrontés à une quantité importante d’information dont il faut dégager les lignes de forces pour mettre en place une prise en charge adaptée. Cet article propose un modèle qui peut constituer un outil de travail précieux pour les équipes travaillant dans l’intervention précoce pour faire émerger une formulation de cas et synthétiser les situations cliniques des patients, en extraire une histoire qui fasse sens et ainsi faciliter la mise en place d’un projet thérapeutique. PMID:28558256

  15. Automating Security Protocol Analysis

    DTIC Science & Technology

    2004-03-01

    language that allows easy representation of pattern interaction. Using CSP, Lowe tests whether a protocol achieves authentication. In the case of...only to correctly code whatever protocol they intend to evaluate. The tool, OCaml 3.04 [1], translates the protocol into Horn clauses and then...model protocol transactions. One example of automated modeling software is Maude [19]. Maude was the intended language for this research, but Java

  16. DDN (Defense Data Network) Protocol Handbook. Volume 1. DoD Military Standard Protocols

    DTIC Science & Technology

    1985-12-01

    official Military Standard communication protocols in use on the DDN are included, as are several ARPANET (Advanced Research Projects Agency Network... research protocols which are currently in use, and some protocols currently undergoing review. Tutorial information and auxiliary documents are also...compatible with DoD needs, by researchers wishing to improve the protocols, and by impleroentors of local area networks (LANs) wishing their

  17. Machine for Automatic Bacteriological Pour Plate Preparation

    PubMed Central

    Sharpe, A. N.; Biggs, D. R.; Oliver, R. J.

    1972-01-01

    A fully automatic system for preparing poured plates for bacteriological analyses has been constructed and tested. The machine can make decimal dilutions of bacterial suspensions, dispense measured amounts into petri dishes, add molten agar, mix the dish contents, and label the dishes with sample and dilution numbers at the rate of 2,000 dishes per 8-hr day. In addition, the machine can be programmed to select different media so that plates for different types of bacteriological analysis may be made automatically from the same sample. The machine uses only the components of the media and sterile polystyrene petri dishes; requirements for all other materials, such as sterile pipettes and capped bottles of diluents and agar, are eliminated. Images PMID:4560475

  18. Préface

    NASA Astrophysics Data System (ADS)

    Moncorgé, R.

    2006-12-01

    efficacités de conversion et pour produire des impulsions UVX de quelques dizaines de microjoules. Parallèlement, des progrès notables ont été effectués dans la génération d'impulsions sub-100 as isolées accordables et de large bande spectrale en utilisant des impulsions de pompe ultracourtes bien contrôlée en phase. Il apparaît que la gamme spectrale accessible peut être encore largement étendue en jouant sur la longueur d'onde excitatrice et sur le milieu générateur pour pouvoir atteindre des impulsions de moins de 10 as. Des premiers résultats ont été aussi exposés concernant l'obtention d'un laser X à 18,9 nm pompé en incidence rasante (technique GRIP) à partir d'une cible de molybdène nickelloide et d'un laser Ti:Sa produisant des impulsions de plus de 2 microjoules. L'intérêt des milieux gazeux à excimères a été également de nouveau démontré pour l'amplification d'impulsions ultracourtes intenses TW dans le proche UV avec un contraste élevé (>1011). Bien qu'encore marginale, il faut enfin signaler l'arrivée des fibres optiques microstructurées avec la génération de supercontinuum de longueurs d'onde (spectre blanc) jusque dans le proche UV. Du côté des processus fondamentaux et des applications, sont particulièrement ressortis la caractérisation de plasmas denses utilisant des harmoniques élevées à l'aide d'une expérience interférométrique originale, la caractérisation de plasmas de taille nanométrique émetteurs de rayonnement X produits par interaction d'impulsions laser ultracourtes avec des agrégats de gaz rares ainsi que le dépôt de couches minces de biomolécules à l'aide de la technique MAPLE, technique susceptible d'améliorer la conservation des molécules, en particulier des protéines. Enfin, dans le domaine de la métrologie et de l'imagerie, l'importance des lames de phase dans la mise en forme spatiale des faisceaux, en particulier pour le projet Mega-Joule, a été de nouveau souligné, des progr

  19. Efficient decentralized consensus protocols

    NASA Technical Reports Server (NTRS)

    Lakshman, T. V.; Agrawala, A. K.

    1986-01-01

    Decentralized consensus protocols are characterized by successive rounds of message interchanges. Protocols which achieve a consensus in one round of message interchange require O(N-squared) messages, where N is the number of participants. In this paper, a communication scheme, based on finite projective planes, which requires only O(N sq rt N) messages for each round is presented. Using this communication scheme, decentralized consensus protocols which achieve a consensus within two rounds of message interchange are developed. The protocols are symmetric, and the communication scheme does not impose any hierarchical structure. The scheme is illustrated using blocking and nonblocking commit protocols, decentralized extrema finding, and computation of the sum function.

  20. Lignes directrices canadiennes sur l’utilisation sécuritaire et efficace des opioïdes pour la douleur chronique non cancéreuse

    PubMed Central

    Kahan, Meldon; Mailis-Gagnon, Angela; Wilson, Lynn; Srivastava, Anita

    2011-01-01

    Résumé Objectif Présenter aux médecins de famille un résumé clinique pratique des lignes directrices canadiennes sur l’utilisation sécuritaire et efficace des opioïdes pour la douleur chronique non cancéreuse, produites par le National Opioid Use Guideline Group. Qualité des données Pour produire les lignes directrices, les chercheurs ont effectué une synthèse critique de la littérature médicale sur l’efficacité et l’innocuité des opioïdes pour la douleur chronique non cancéreuse et ont rédigé une série de recommandations. Un panel de 49 cliniciens experts de toutes les régions du Canada ont passé en revue l’ébauche et ont atteint un consensus sur 24 recommandations. Message principal Il est recommandé de faire un dépistage du risque de dépendance avant de prescrire des opioïdes. On recommande des opioïdes faibles (codéine et tramadol) pour une douleur de légère à modérée qui n’a pas répondu aux traitements de première intention. On peut essayer l’oxycodone, l’hydromorphone et la morphine chez les patients qui n’ont pas eu de soulagement avec des opioïdes plus faibles. Une faible dose initiale et une lente hausse du titrage sont recommandées, ainsi qu’une étroite surveillance du patient qu’on a d’abord renseigné. Les médecins doivent surveiller l’apparition de complications comme l’apnée du sommeil. La dose optimale est celle qui améliore le fonctionnement ou atténue les cotes d’évaluation de la douleur d’au moins 30 %. Pour la grande majorité des patients, la dose optimale sera bien en deçà de l’équivalent de 200 mg de morphine par jour. On recommande le sevrage progressif pour les patients qui n’ont pas répondu à un essai d’opioïdes adéquat. Conclusion Les opioïdes jouent un rôle important dans la prise en charge de la douleur chronique non cancéreuse, mais il faut en prescrire avec prudence pour limiter les dommages potentiels. Les nouvelles lignes directrices

  1. SPERTI Reactor Pit Building (PER605) under construction. Poured concrete foundation ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    SPERT-I Reactor Pit Building (PER-605) under construction. Poured concrete foundation will enclosure a "Pit" into which the reactor vessel will be placed. Steel framework has been erected. To left of view is instrument cell (PER-606), constructed of concrete block. Photographer: R.G. Larsen. Date: April 22, 1955. INEEL negative no. 55-1000 - Idaho National Engineering Laboratory, SPERT-I & Power Burst Facility Area, Scoville, Butte County, ID

  2. Alternative Submarine Watch Systems: Recommendation for a New CF Submarine Watch Schedule (Systemes Differents d’Horaire de Garde a Bord des Sous-Marins: Nouvel Horaire Recommande Pour les Sous-Marins des FC)

    DTIC Science & Technology

    2010-01-01

    comparativement à une efficacité cognitive de 96 % pour l’horaire de 1 tour sur trois de quatre heures ainsi que pour l’horaire de 1 tour sur trois de...tour sur 2 (8-4-4-8) comparativement à une efficacité cognitive de 96 % pour l’horaire de 1 tour sur trois de quatre heures ainsi que pour l’horaire...FAST™ (Fatigue Avoidance and Safety Tool), a computer application designed to predict and prevent fatigue in operational settings. The output of FAST

  3. Satellite Communications Using Commercial Protocols

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  4. Pratique de l’analgésie péridurale auprès de 20 parturientes au Centre Hospitalier Universitaire Sylvanus Olympio de Lomé (Togo)

    PubMed Central

    Egbohou, Pilakimwé; Mouzou, Tabana; Sama, Hamza Doles; Tchétike, Pikabalo; Assénouwé, Sarakawabalo; Akala-Yoba, Gnimdou; Tomta, Kadjika

    2017-01-01

    Etude prospective et descriptive sur la pratique de l’analgésie péridurale (APD) obstétricale au CHU Sylvanus Olympio (CHU SO) de Lomé. Etude menée de février à juin 2014. Après accord des gestantes choisies au hasard et en l’absence de contre-indication à l’issue de la consultation d’anesthésie, faite au 8ème mois de la grossesse, des femmes ont été retenues pour l’étude. Sur 29 gestantes retenues, 20 (69%) ont bénéficiées de l’APD. Age moyen 30,6±6,6 ans, primigestes : 35%, multipares 50%, Obèses (BMI>30): 25%. Nombre moyen de ponctions: 1,2±0,5; reflux de sang dans le cathéter: 5%, brèche dure-mérienne : 0. Délai moyen d’installation: 8,5 ±2,2mn. Quantité moyenne de bupivacaine isobare à 0,125%: 28,8±8ml; Echelle Numérique à T10min < 3 pour toutes les parturientes. Bloc moteur: 0. Hypotension: 1cas (5%). Mode d’accouchement: voie basse: 19 (95%), césarienne: 1 (5%). Détresse respiratoire à la naissance du nouveau né: 0. Note de satisfaction: 9,8±0,5 /10. L’APD obstétricale est possible au CHU Sylvanus Olympio de Lomé. En attendant sa vulgarisation à toutes les parturientes par la disponibilité des moyens humains et matériels, la réaliser pour ses indications médicales serait un premier pas. PMID:28451033

  5. Ecological Risks in Residential Premises Arising from Thermal Insulation by Pouring

    NASA Astrophysics Data System (ADS)

    Timofeeva, S. S.; Timofeev, S. S.

    2017-11-01

    The residents of modern megacities are exposed to environmental risks arising both directly in the urban environment and their own dwellings. Modern polymeric building materials are the sources of toxic substances release into the air that have a significant impact on the population health. The objective of the work is the ecological and hygienic study of the air in the apartments of Irkutsk after repair work on the roof and walls insulation using the technology of pouring and calculation of the potential environmental risk for the residents. The object of the research was the indoor air in one of the houses in Irkutsk tested for formaldehyde and other toxic substances. After putting the house into operation, some defects were found - the freezing of the walls of the building attic part. During the repair work, the mansard part of the building was heat-insulated by the pouring method using the composite material “Poroplast CF 02”. High concentrations of formaldehyde and styrene were detected in the apartments exceeding the MPC in 4-8 times. The hazard ratio for inhalation exposure to harmful substances exceeds the safety level by 10 times. Consequently, there is a high probability of obtaining acute and chronic poisoning and developing cancer.

  6. A Family of Quantum Protocols

    NASA Astrophysics Data System (ADS)

    Devetak, Igor; Harrow, Aram W.; Winter, Andreas

    2004-12-01

    We introduce three new quantum protocols involving noisy quantum channels and entangled states, and relate them operationally and conceptually with four well-known old protocols. Two of the new protocols (the mother and father) can generate the other five “child” protocols by direct application of teleportation and superdense coding, and can be derived in turn by making the old protocols “coherent.” This gives very simple proofs for two famous old protocols (the hashing inequality and quantum channel capacity) and provides the basis for optimal trade-off curves in several quantum information processing tasks.

  7. Influence du comportement des accompagnants sur le vécu des patients admis pour hémorragies digestives hautes au CHU campus de Lomé (Togo)

    PubMed Central

    Bagny, Aklesso; Dusabe, Angelique; Bouglouga, Oumboma; Lawson-ananisoh, Mawuli Late; Kaaga, Yeba Laconi; Djibril, Mohaman Awalou; Soedje, Kokou Mensah; Dassa, Simliwa Kolou; Redah, Datouda

    2014-01-01

    Introduction L'hémorragie digestive haute est une urgence, qui constitue souvent pour les patients un danger mortel suscitant inquiétude et agitation. Dans cet état, le patient dépend de ses accompagnants pour ses soins et pour honorer le traitement; mais souvent, il a été observé une discordance entre l'urgence et les comportements des accompagnants. Le but de cette étude était de décrire les facteurs socioéconomiques et psychologiques pouvant influencer les comportements des accompagnants des patients admis pour HDH, estimer l'indice de relation entre ces comportements et les facteurs associés d'une part et le vécu des patients admis pour HDH d'autre part. Méthodes Il s'agit d'une étude prospective menée de Septembre 2010 à Juin 2011 (soit 10 mois). Nous avions utilisé l'entretien semi-dirigé et l'observation directe pour collecter nos données, ces dernières avaient été traitées par les méthodes statistiques et d'analyse de contenu. Résultats Dans la présente étude, les comportements des accompagnants des patients admis pour HDH sont en majorité marqués par l'abandon (84%) et le manque de sollicitude (80,2%). Ces comportements sont souvent stimulés par les facteurs socioéconomiques tels que les difficultés économiques (83,2%), des conflits intrafamiliaux (85,1%) et des représentations (maladie incurable ou envoûtement) de la maladie par les accompagnants (73,3%) des cas. Quant aux patients, ils vivent ces comportements comme étant des menaces de mort ou des rejets (77,20%) et comme étant une dévalorisation ou une humiliation de la part de leurs accompagnants (70,30%). Les résultats confirment l'existence de lien significatif entre les comportements des accompagnants et les facteurs socio économiques, entre les comportements des accompagnants et des facteurs psychologiques, et entre le vécu des patients admis pour l'HDH et les comportements des accompagnants. Conclusion Des études ultérieures devraient aborder les points

  8. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    PubMed

    Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander

    2017-01-01

    Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  9. 21 CFR 58.120 - Protocol.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... FOR NONCLINICAL LABORATORY STUDIES Protocol for and Conduct of a Nonclinical Laboratory Study § 58.120 Protocol. (a) Each study shall have an approved written protocol that clearly indicates the objectives and all methods for the conduct of the study. The protocol shall contain, as applicable, the following...

  10. Coronographie interferéntielle pour la mission spatuale DARWIN: expérience de validation en laboratoire

    NASA Astrophysics Data System (ADS)

    Ollivier, Marc; Mariotti, Jean-Marie; Brunaud, Jacqueline; Michel, Guy; Bouchareine, Patrick; Léger, Alain; Artzner, Guy; Malbet, Fabien; Puget, Pascal; Coudé du Foresto, Vincent; Mennesson, Bertrand

    2018-04-01

    This paper, "Coronographie interferéntielle pour la mission spatuale DARWIN: expérience de validation en laboratoire," was presented as part of International Conference on Space Optics—ICSO 1997, held in Toulouse, France.

  11. Intra-protocol repeatability and inter-protocol agreement for the analysis of scapulo-humeral coordination.

    PubMed

    Parel, I; Cutti, A G; Kraszewski, A; Verni, G; Hillstrom, H; Kontaxis, A

    2014-03-01

    Multi-center clinical trials incorporating shoulder kinematics are currently uncommon. The absence of repeatability and limits of agreement (LoA) studies between different centers employing different motion analysis protocols has led to a lack dataset compatibility. Therefore, the aim of this work was to determine the repeatability and LoA between two shoulder kinematic protocols. The first one uses a scapula tracker (ST), the International Society of Biomechanics anatomical frames and an optoelectronic measurement system, and the second uses a spine tracker, the INAIL Shoulder and Elbow Outpatient protocol (ISEO) and an inertial and magnetic measurement system. First within-protocol repeatability for each approach was assessed on a group of 23 healthy subjects and compared with the literature. Then, the between-protocol agreement was evaluated. The within-protocol repeatability was similar for the ST ([Formula: see text] = 2.35°, [Formula: see text] = 0.97°, SEM = 2.5°) and ISEO ([Formula: see text] = 2.24°, [Formula: see text] = 0.97°, SEM = 2.3°) protocols and comparable with data from published literature. The between-protocol agreement analysis showed comparable scapula medio-lateral rotation measurements for up to 120° of flexion-extension and up to 100° of scapula plane ab-adduction. Scapula protraction-retraction measurements were in agreement for a smaller range of humeral elevation. The results of this study suggest comparable repeatability for the ST and ISEO protocols and between-protocol agreement for two scapula rotations. Different thresholds for repeatability and LoA may be adapted to suit different clinical hypotheses.

  12. Conception et calibration d'un sonoreacteur pour l'oxydation de la cellulose par le systeme TEMPO/NaOCl/NaBr

    NASA Astrophysics Data System (ADS)

    Paquin, Michel

    Avec le contexte economique actuel dans le domaine des pates et papiers au Canada, l'industrie se doit de diversifier ses produits mis en marche. La fermeture de plus de 20 usines depuis 2005, une baisse du PIB de l'industrie de 1,4 milliard CAD entre 1999--2008, une baisse de la demande de 2,4 %, une diminution du prix de la pate de 20,9 % depuis juillet 2009. La delocalisation du secteur vers l'Asie et l'hemisphere sud sont autant de raisons pour laquelle l'industrie se doit d'etre a l'avant plan de nouvelle technologie a base de fibre de bois. Pour augmenter leur rentabilite, l'industrie se doit de diversifier ses produits dans d'autres secteurs que le simple fabricant de papier impression-ecriture. Sa diversification passe par l'elaboration de nouveaux papiers a valeur ajoutee (papier conducteur, papier bioactif, etc.), par l'utilisation de la biomasse forestiere pour la production d'energie, par l'utilisation de la biomasse forestiere pour l'elaboration d'une plateforme de chimie verte, par l'utilisation de la lignine pour le developpement de polymeres et par l'utilisation de la fibre cellulosique pour la fabrication de nanomateriaux. La fabrication de nanofibrille de cellulose peut devenir un des produits qui servira a diversifier la production des usines de pates et papiers. Les nanofibrilles de cellulose possedent des proprietes mecaniques et chimiques exceptionnelles. Les nanofibrilles de cellulose sont fabriquees a partir d'une oxydation selective de la pate kraft de feuillu avec le systeme TEMPO-NaOCl-NaBr. L'oxydation selective de l'alcool primaire en C6 du monomere de glucose sous forme de carboxylates engendre une modification chimique de la cellulose qui accroit l'hydrophilicite des fibrilles. Suite a cette oxydation, nous devons effectuer une desintegration mecanique de la fibre kraft de feuillu oxydee pour separer les fibrilles. Le processus d'oxydation de la fibre par le systeme TEMPO-NaOCl-NaBr et sa defibrillation par la suite engendre une

  13. Integrated Airframe Design Technology (Les Technologies pour la Conception Integree des Cellules)

    DTIC Science & Technology

    1993-12-01

    encourageant ainsi une plus forte interaction entre les organisations, ce qui laisse prevoir une ing~nierie commune concurrente pour Ia conception des...cellules. La co-localisation de personnels de diff~rentes disciplines sera n~cessaire. mais ceci pourrait se faire sous Ia forme d’une "co...integrated analysis tool Their presentation highlighted the development (e.g., ELFINI) for managing aeroelasticity, of an Aeroelastic Design

  14. 2010 Coalition Battle Management Language Workshop (Atelier 2010 sur le langage de gestion du champ de bataille pour les operations en coalition)

    DTIC Science & Technology

    2010-02-01

    Feb 2010 2010 Coalition Battle Management Language Workshop (Atelier 2010 sur le langage de gestion du champ de bataille pour les opérations en...RTO MEETING PROCEEDINGS MP-MSG-079 2010 Coalition Battle Management Language Workshop (Atelier 2010 sur le langage de gestion du champ de ...RTO-MP-MSG-079 ES - 3 Atelier 2010 sur le langage de gestion du champ de bataille pour les opérations en coalition (RTO-MP-MSG-079

  15. Numerical Study of Impingement Location of Liquid Jet Poured from a Tilting Ladle with Lip Spout

    NASA Astrophysics Data System (ADS)

    Castilla, R.; Gamez-Montero, P. J.; Raush, G.; Khamashta, M.; Codina, E.

    2017-04-01

    A new approach for simulating liquid poured from a tilting lip spout is presented, using neither a dynamic mesh nor the moving solid solution method. In this case only the tilting ladle is moving, so we propose to rotate the gravitational acceleration at an angular velocity prescribed by a geometrical and dynamical calculation to keep the poured flow rate constant. This angular velocity is applied to modify the orientation of the gravity vector in computational fluid dynamics (CFD) simulations using the OpenFOAM® toolbox. Also, fictitious forces are considered. The modified solver is used to calculate the impingement location for six spout geometries and compare the jet dispersion there. This method could offer an inexpensive tool to calculate optimal spout geometries to reduce sprue size in the metal casting industry.

  16. Low cracking concretes for the closure pours and overlays of the Dunlap Creek Bridge : final report.

    DOT National Transportation Integrated Search

    2017-10-01

    Joints, wide cracks, and poor-quality concretes facilitate the intrusion of chlorides, causing corrosion in bridge decks and substructures. In this study, joints were replaced with closure pours (link slabs) consisting of low permeability fiber-reinf...

  17. L'optique pour la sécurité sanitaire des aliments

    NASA Astrophysics Data System (ADS)

    Piat, Félix

    2017-12-01

    Il semble aujourd'hui évident que chaque produit alimentaire commercialisé ne représente aucun danger pour la santé. Cet acquis repose pourtant sur un système complexe de règles et de contrôles appliqués quotidiennement dans les coulisses de l'industrie agro-alimentaire. Les technologies optiques y jouent un rôle prépondérant, permettant de séparer le bon grain de l'ivraie.

  18. A Simple XML Producer-Consumer Protocol

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy

    2000-01-01

    This document describes a simple XML-based protocol that can be used for producers of events to communicate with consumers of events. The protocol described here is not meant to be the most efficient protocol, the most logical protocol, or the best protocol in any way. This protocol was defined quickly and it's intent is to give us a reasonable protocol that we can implement relatively easily and then use to gain experience in distributed event services. This experience will help us evaluate proposals for event representations, XML-based encoding of information, and communication protocols. The next section of this document describes how we represent events in this protocol and then defines the two events that we choose to use for our initial experiments. These definitions are made by example so that they are informal and easy to understand. The following section then proceeds to define the producer-consumer protocol we have agreed upon for our initial experiments.

  19. “Counterfactual” quantum protocols

    NASA Astrophysics Data System (ADS)

    Vaidman, L.

    2016-05-01

    The counterfactuality of recently proposed protocols is analyzed. A definition of “counterfactuality” is offered and it is argued that an interaction-free measurement (IFM) of the presence of an opaque object can be named “counterfactual”, while proposed “counterfactual” measurements of the absence of such objects are not counterfactual. The quantum key distribution protocols which rely only on measurements of the presence of the object are counterfactual, but quantum direct communication protocols are not. Therefore, the name “counterfactual” is not appropriate for recent “counterfactual” protocols which transfer quantum states by quantum direct communication.

  20. Modélisation des conséquences possibles de la future demande bioénergétique mondiale pour le bois et les forêts en France

    Treesearch

    Joseph Buongiorno; Ronald Raunikar; Shusuai Zhu

    2011-01-01

    L’accroissement de la demande mondiale et du coût correspondant de l’énergie a conduit à de nombreuses propositions pour augmenter l’utilisation de la biomasse renouvelable. Une étude récente (Raunikar et al., 2010) a examiné les conséquences mondiales pour le bois et pour les forêts de la demande en bioénergie impliquée par les scénarios du Groupe d’experts...

  1. [Multidisciplinary protocol for computed tomography imaging and angiographic embolization of splenic injury due to trauma: assessment of pre-protocol and post-protocol outcomes].

    PubMed

    Koo, M; Sabaté, A; Magalló, P; García, M A; Domínguez, J; de Lama, M E; López, S

    2011-11-01

    To assess conservative treatment of splenic injury due to trauma, following a protocol for computed tomography (CT) and angiographic embolization. To quantify the predictive value of CT for detecting bleeding and need for embolization. The care protocol developed by the multidisciplinary team consisted of angiography with embolization of lesions revealed by contrast extravasation under CT as well as embolization of grade III-V injuries observed, or grade I-II injuries causing hemodynamic instability and/or need for blood transfusion. We collected data on demographic variables, injury severity score (ISS), angiographic findings, and injuries revealed by CT. Pre-protocol and post-protocol outcomes were compared. The sensitivity and specificity of CT findings were calculated for all patients who required angiographic embolization. Forty-four and 30 angiographies were performed in the pre- and post-protocol periods, respectively. The mean (SD) ISSs in the two periods were 25 (11) and 26 (12), respectively. A total of 24 (54%) embolizations were performed in the pre-protocol period and 28 (98%) after implementation of the protocol. Two and 7 embolizations involved the spleen in the 2 periods, respectively; abdominal laparotomies numbered 32 and 25, respectively, and 10 (31%) vs 4 (16%) splenectomies were performed. The specificity and sensitivity values for contrast extravasation found on CT and followed by embolization were 77.7% and 79.5%. The implementation of this multidisciplinary protocol using CT imaging and angiographic embolization led to a decrease in the number of splenectomies. The protocol allows us to take a more conservative treatment approach.

  2. Les nouveaux critères de la Maladie d’Alzheimer – Perspective gériatrique*

    PubMed Central

    Molin, Pierre; Rockwood, Kenneth

    2016-01-01

    RÉSUMÉ Deux nouvelles séries de critères pour le diagnostic de la maladie d’Alzheimer sont maintenant en vigueur, incluant une série publiée en 2014. Un « nouveau lexique » conceptualisant la maladie a également été proposé. En 2012, la Conférence consensuelle canadienne affirmait que, pour l’instant, ni les nouveaux critères ni la nouvelle terminologie ne modifiaient la pratique en première ligne. Néanmoins, pour les consultants spécialisés en démence, l’avènement de ces critères ouvre la porte à de nombreux défis et occasions. En général, les nouveaux critères accordent une place grandissante aux biomarqueurs. Toutefois, les évidences qui sous-tendent leur utilisation demeurent incomplètes. L’étude de sujets provenant de la communauté ayant raffiné notre compréhension des critères neuropathologiques des démences, il est probable que notre expérience avec les biomarqueurs en bénéficierait également. Pour l’instant, ces critères sont réservés à la recherche. Cependant, leur adoption à plus large échelle est pressentie, particulièrement aux États-Unis. Les gériatres canadiens doivent être conscients de la terminologie maintenant utilisée et du changement fondamental qui en découle : un diagnostic de maladie d’Alzheimer ne requiert plus un diagnostic de démence. Dans l’attente de nouvelles données – auxquelles les gériatres peuvent contribuer – il y a lieu de faire preuve de prudence dans l’adoption des nouveaux critères, car ils sont susceptibles de moins bien s’appliquer aux personnes âgées. PMID:27403215

  3. Evaluation of materials and surface treatments for the DWPF melter pour spout bellows protective liner

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Imrich, K.J.; Bickford, D.F.; Wicks, G.G.

    1997-06-27

    A study was undertaken to evaluate a variety of materials and coatings for the DWPF pour spout bellows liner. The intent was to identify materials that would minimize or eliminate adherence of glass on the bellows liner wall and help minimize possible pluggage during glass pouring operations in DWPF. Glass has been observed adhering to the current bellow`s liner, which is made of 304L stainless steel. Materials were identified which successfully allowed molten glass to hit these surfaces and not adhere. Results of this study suggest that if these materials are used in the pouring system glass could still fallmore » into the canister without appreciable plugging, even if an unstable glass stream is produced. The materials should next be evaluated under the most realistic DWPF conditions possible. Other findings of this study include the following: (1) increasing coupon thickness produced a favorable increase in the glass sticking temperature; (2) highly polished surfaces, with the exception of the oxygen-free copper coupon coated with Armoloy dense chromium, did not produce a significant improvement in the glass sticking temperature, increasing angle of contact of the coupon to the falling glass did not yield a significant performance improvement; (3) electroplating with gold and silver and various diffusion coatings did not produce a significant increase in the glass sticking temperature. However, they may provide added oxidation and corrosion resistance for copper and bronze liners. Boron nitride coatings delaminated immediately after contact with the molten glass.« less

  4. A Unified Fault-Tolerance Protocol

    NASA Technical Reports Server (NTRS)

    Miner, Paul; Gedser, Alfons; Pike, Lee; Maddalon, Jeffrey

    2004-01-01

    Davies and Wakerly show that Byzantine fault tolerance can be achieved by a cascade of broadcasts and middle value select functions. We present an extension of the Davies and Wakerly protocol, the unified protocol, and its proof of correctness. We prove that it satisfies validity and agreement properties for communication of exact values. We then introduce bounded communication error into the model. Inexact communication is inherent for clock synchronization protocols. We prove that validity and agreement properties hold for inexact communication, and that exact communication is a special case. As a running example, we illustrate the unified protocol using the SPIDER family of fault-tolerant architectures. In particular we demonstrate that the SPIDER interactive consistency, distributed diagnosis, and clock synchronization protocols are instances of the unified protocol.

  5. Syndrome naviculo-capital de Fenton (à propos d’un nouveau cas)

    PubMed Central

    Bennis, Azzelarab; Benabbouha, Abdellatif; Ouzaa, Mohammed Reda; Lamkhanter, Adil; Benchakroun, Mohammed; Jaafar, Abdelouahab

    2017-01-01

    La fracture scapho-capitale ou syndrome naviculo-capital de Fenton, est une lésion très rare, souvent méconnue. Elle résulte d'un traumatisme du poignet de haute énergie. Son mécanisme est controversé. Les auteurs rapportent l'observation d'un patient,qui a présenté dans les suites d’un accident de la voie publique une fracture du scaphoïde associée à une fracture du capitatum, du triquetrum et de la styloïde cubitale. La voie d'abord dorsale, a permis une réduction et une contention par embrochage de la première rangée, indépendamment de la deuxième rangée. Les ligaments interosseux scapho-lunaire et lunaro-triquétral étaient intacts. Une immobilisation plâtrée antébrachio-palmaire a été mise en place pour 12 semaines. La rééducation a durée six mois. A deux ans de recul, le score fonctionnel de Cooney était bon et l'ensemble des fractures a consolidé sans aucune désaxation intracarpienne. La reprise du travail était au huitième mois après l’accident. Scapho-capitate fracture or Fenton’s naviculo-capitate fracture syndrome is a very rare and often ignored lesion. It is caused by a high-energy traumatic injury to the wrist. Its mechanism is controversial. This study reports the case of a patient with scaphoid fracture associated with fracture of the capitatum, triquetrum and ulnar styloid due to public road accident. Dorsal approach allowed reduction and containment by internal fixation in the first row, regardless the second row. Scapholunate interosseous ligaments and luno-triquetral were intact. The patient underwent antebrachial-palmar plaster immobilization for 12 weeks. Rehabilitation program lasted for six months. Cooney’s wrist function score was good and all fractures consolidated without intracarpal malalignment at 2 years follow up. The patient resumed work in the eighth month after the road accident. PMID:28690721

  6. Internet Protocol Transition Workbook

    DTIC Science & Technology

    1982-03-01

    U N C-* INTERNET PROTOCOL TRANSITION WORKBOOK March 1982 Network Information Canter SRI International Menlo Park, CA 94025 t tv l...Feinler Network Information Center SRI International Menlo Park. California 94025 (415) 859-3695 FEINLEROSRI-NIC (Online mail) [Page ii] I.7 Internet ...31 Postel. J., " Internet Control Message Protocol - DARPA Internet Program Protocol Specification." RFC 792, USC/ Information Sciences Institute

  7. Treatment algorithms and protocolized care.

    PubMed

    Morris, Alan H

    2003-06-01

    Excess information in complex ICU environments exceeds human decision-making limits and likely contributes to unnecessary variation in clinical care, increasing the likelihood of clinical errors. I reviewed recent critical care clinical trials searching for information about the impact of protocol use on clinically pertinent outcomes. Several recently published clinical trials illustrate the importance of distinguishing efficacy and effectiveness trials. One of these trials illustrates the danger of conducting effectiveness trials before the efficacy of an intervention is established. The trials also illustrate the importance of distinguishing guidelines and inadequately explicit protocols from adequately explicit protocols. Only adequately explicit protocols contain enough detail to lead different clinicians to the same decision when faced with the same clinical scenario. Differences between guidelines and protocols are important. Guidelines lack detail and provide general guidance that requires clinicians to fill in many gaps. Computerized or paper-based protocols are detailed and, when used for complex clinical ICU problems, can generate patient-specific, evidence-based therapy instructions that can be carried out by different clinicians with almost no interclinician variability. Individualization of patient therapy can be preserved by these protocols when they are driven by individual patient data. Explicit decision-support tools (eg, guidelines and protocols) have favorable effects on clinician and patient outcomes and can reduce the variation in clinical practice. Guidelines and protocols that aid ICU decision makers should be more widely distributed.

  8. Utilisation de l'essai comete et du biomarqueur gamma-H2AX pour detecter les dommages induits a l'ADN cellulaire par le 5-bromodeoxyuridine post-irradiation

    NASA Astrophysics Data System (ADS)

    La Madeleine, Carole

    Ce memoire est presente a la Faculte de medecine et des sciences de la sante de l'Universite de Sherbrooke en vue de l'obtention du grade de maitre es sciences (M.Sc.) en radiobiologie (2009). Un jury a revise les informations contenues dans ce memoire. Il etait compose de professeurs de la Faculte de medecine et des sciences de la sante soit : Darel Hunting PhD, directeur de recherche (departement de medecine nucleaire et radiobiologie), Leon Sanche PhD, directeur de recherche (departement de medecine nucleaire et radiobiologie), Richard Wagner PhD, membre du programme (departement de medecine nucleaire et radiobiologie) et Guylain Boissonneault PhD, membre exterieur au programme (departement de biochimie). Le 5-bromodeoxyuridine (BrdU), un analogue halogene de la thymidine reconnu depuis les annees 60 comme etant un excellent radiosensibilisateur. L'hypothese la plus repandue au sujet de l'effet radio sensibilisant du BrdU est qu'il augmente le nombre de cassures simple et double brin lorsqu'il est incorpore dans l'ADN de la cellule et expose aux radiations ionisantes. Toutefois, de nouvelles recherches semblent remettre en question les observations precedentes. Ces dernieres etudes ont confirme que le BrdU est un bon radiosensibilisateur, car il augmente les dommages radio-induits dans l'ADN. Mais, c'est en etant incorpore dans une region simple brin que le BrdU radiosensibilise l'ADN. Ces recherches ont egalement revele pour la premiere fois un nouveau type de dommages produits lors de l'irradiation de l'ADN contenant du BrdU : les dimeres interbrins. Le but de ces travaux de recherche est de determiner si la presence de bromodeoxyuridine dans l'ADN augmente l'induction de bris simple et / ou double brin chez les cellules irradiees en utilisant de nouvelles techniques plus sensibles et specifiques que celles utilisees auparavant. Pour ce faire, les essais cometes et la detection des foci H2AX phosphorylee pourraient permettre d'etablir les effets engendres par

  9. Une nouvelle voie pour la conception des implants intervertébraux

    NASA Astrophysics Data System (ADS)

    Gradel, T.; Tabourot, L.; Arrieux, R.; Balland, P.

    2002-12-01

    L'objectif de notre travail est la conception d'une nouvelle génération d'implants intersomatiques qui s'adapte parfaitement à la géométrie des plateaux vertébraux en se déformant. Pour cela, nous avons utilisé une nouvelle démarche qui consiste à simuler entièrement le procédé de fabrication en l'occurrence l'emboutissage, Cette simulation, en concervant l'historique des sollicitations exercées sur le matériau lors de sa mise en œuvre permet de valider très précisément sa résistance mécanique en fin de cycle. Au cours de cette étude, nous avons mené en parallèle deux analyses dites “ coopératives ” : l'une fondée sur un modèle phénoménologique de type HILL et l'autre sur un modèle multi-échelles prenant en compte des phénomènes plus physiques afin d'acquérir une bonne connaissance du comportement du matériau lors de la déformation. C'est pour sa bonne résistance, sa biocompatibilité et ses propriétés radiologiques que nous avons choisi le T40 (titane pur) comme matériau.

  10. Comment on "flexible protocol for quantum private query based on B92 protocol"

    NASA Astrophysics Data System (ADS)

    Chang, Yan; Zhang, Shi-Bin; Zhu, Jing-Min

    2017-03-01

    In a recent paper (Quantum Inf Process 13:805-813, 2014), a flexible quantum private query (QPQ) protocol based on B92 protocol is presented. Here we point out that the B92-based QPQ protocol is insecure in database security when the channel has loss, that is, the user (Alice) will know more records in Bob's database compared with she has bought.

  11. Stabilité et pertes des conducteurs pour régime alternatif

    NASA Astrophysics Data System (ADS)

    Estop, P.; Lacaze, A.

    1994-04-01

    Recent progresses obtained on low-T_c superconductors usable at industrial frequencies allow to envisage a new and innovating application as the current limiter. The device conception determines a cryogenic cost due to the dissipated energy in superconducting wires. In order to reduce the losses sufficiently, fine wires with submicromic filaments must be used. In relation to the need to obtain an infaillible protection during the quench, a new type of conductor, has been worked out, tested and validated. The main technical aspects concerning the losses of low-T_c superconductors have been developed on this paper. Les récents progrès obtenus sur les conducteurs supraconducteurs basse température critique utilisables aux fréquences industrielles permettent d'entrevoir une application nouvelle et innovante comme le limiteur de courant. De la conception d'un tel système résulte un coût cryogénique lié à l'énergie dissipée dans les brins supraconducteurs. La réduction des pertes nécessite l'utilisation de brins suffisamment fins et disposant de filaments submicromiques. Concernant le besoin d'obtenir une protection infaillible au moment de la transition, un conducteur d'un concept nouveau a été élaboré, testé et validé. L'article passe en revue les principaux aspects techniques liés à la stabilité et aux pertes dans les conducteurs supraconducteurs basse température critique.

  12. Problematic protocols: An overview of medical research protocols not approved by the LUMC medical ethics review committee.

    PubMed

    Tersmette, Derek Gideon; Engberts, Dirk Peter

    2017-01-01

    The Committee for Medical Ethics (CME) of Leiden University Medical Center (LUMC) was established as the first medical ethics reviewing committee (MREC) in the Netherlands. In the period 2000-2010 the CME received 2,162 protocols for review. Some of these protocols were never approved. Until now, there has existed neither an overview of these failed protocols nor an overview of the reasons for their failure. This report draws on data from the digital database, the physical archives, and the minutes of the meetings of the CME. Additional information has been obtained from the Central Committee on Research involving Human Subjects (CCRH) and survey-based research. Protocols were itemized based on characteristic features and their reviewing procedures were analyzed. In total, 1,952 out of 2,162 research protocols submitted during 2000-2010 (90.3%) were approved by the CME; 210 of 2,162 protocols (9.7%) were not approved. Of these 210 protocols, 177 failed due to reasons not related to CME reviewing. In 15 cases CME reviewing led to protocol failure, while another 10 protocols were rejected outright. Eight of the 210 submitted protocols without approval had been conducted prior to submission. In the aforementioned period, little protocol failure occurred. For the most part, protocol failure was caused by problems that are not CME related. This type of failure has several identifiable factors, none of which have anything to do with the ethical reviewing procedure by the CME. A mere 1.2% of protocols failed due to ethical review. Unacceptable burden and risks to the subject and an inadequate methodology are the most common reasons for this CME-related protocol failure.

  13. Microcomputer Nurse-Practitioner Protocols

    PubMed Central

    Way, Anthony B.; Rowley, Blair A.; White, Melanie A.

    1982-01-01

    We have developed a set of protocols on a microcomputer to assist in the management of a geographically isolated nurse practitioner. If a mid-level practitioner is supervised by a physician, some system is needed to ensure that approved care is being provided. The currently available paper-based protocols do not adequately serve all the needs for training, auditing, and record keeping. Conversely, adequate systems based on large computers are not feasible for small clinics. We have therefore developed a microcomputer-based system of protocols for a small rural nurse-practitioner's clinic. Our programs are designed for direct use by the practitioners while the patient is in the clinic. The user is given immediate feedback about any errors. The supervisor is later provided with a summary of the protocol uses and errors, and a copy of any erroneous records. The system appears to be easy to use by the nurse practitioner. The protocols are quickly learned and auditing is facilitated.

  14. Evaluation de l'intergiciel de communication DDS pour son utilisation dans le domaine avionique

    NASA Astrophysics Data System (ADS)

    Levesque-Landry, Kevin

    Les aeronefs modernes doivent combler de plus en plus de fonctionnalites afin de satisfaire les besoins de la clientele. De ce fait, les besoins en communications des systemes avioniques sont grandissants. De plus, la portabilite et la reutilisabilite des applications sont des defis d'actualite dans le domaine avionique. De ce fait, ce projet de recherche vise a faire une evaluation de la technologie d'intergiciel de service de distribution de donnees (DDS) pour son utilisation dans le domaine avionique. Cette technologie permettrait de reduire la complexite des communications et faciliter la portabilite et reutilisabilite des applications grâce a son interface standardisee. Dans ce projet de recherche, la norme DDS est tout d'abord etudiee pour cibler les fonctionnalites qui sont utiles au domaine avionique. Les differentes polices de qualite de services sont ainsi etudiees et denotent la flexibilite de la technologie DDS. Un intergiciel DDS est egalement evalue dans un environnement de laboratoire afin de mesurer l'impact de l'utilisation de cette technologie sur les performances de latence ainsi que sur l'utilisation de la bande passante. Les resultats montrent une faible augmentation de la latence moyenne lorsque l'intergiciel DDS est utilise. L'intergiciel DDS est egalement utilise dans une etude de cas avec un AFCS (automatic flight control system) afin de quantifier les effets de son utilisation sur une application avionique. Les resultats montrent que l'utilisation de l'intergiciel DDS n'empeche pas l'AFCS d'atteindre la stabilite, mais qu'elle ralentit l'atteinte de cette derniere. Finalement, une etude de cas est effectuee afin de valider que la technologie DDS peut etre utilisee pour construire des systemes redondants. Les resultats montrent que l'intergiciel DDS permet de faire de la redondance de reserve sans avoir un impact visible sur les performances du systeme redondant.

  15. Protocols — EDRN Public Portal

    Cancer.gov

    EDRN investigators protocols. The following is a list of the EDRN protocols that have been captured and curated. Additional information will be added as it is available. Contact information is provided as part of the detail for each protocol.

  16. Soldiers in Cold Environments (Soldats en environnements froids)

    DTIC Science & Technology

    2009-04-01

    survie par temps froid et en eau froide pour l’essai de divers ensembles d’habillement ; d) envisager l’adoption du procédé d’Ulm pour le traitement des...vêtements d’hiver ; • Les expériences de laboratoire en air froid et sur la morsure du gel; • La modélisation de la survie en eau froide et en air froid...normalisés au sein des pays de l’OTAN ; b) développer un protocole commun pour le traitement de l’hypothermie; c) développer un modèle de prévision de

  17. Efficacy of ivermectin pour-on against Ostertagia ostertagi infection and residues in the American bison, Bison bison.

    PubMed

    Marley, S E; Knapp, S E; Rognlie, M C; Thompson, J R; Stoppa, T M; Button, S M; Wetzlich, S; Arndt, T; Craigmill, A

    1995-01-01

    Sixteen American bison, Bison bison, were artificially infected with 10(5) infective stage larvae of Ostertagia ostertagi on 21 April 1993. At 42 days post-infection eight bison were treated with 0.5% ivermectin pour-on (500 micrograms/kg bodyweight) and eight treated with the carrier only. Bison were necropsied 17 and 18 days post-treatment (21 and 22 June 1993, respectively). Mean (+/- SE) of 5,413 (+/- 1,716) adults and 565 (+/- 305) immature O. ostertagi were recovered at necropsy from bison treated with the carrier. No O. ostertagi were detected in bison treated with ivermectin pour-on. Based on the levels of the ivermectin marker metabolite in liver and adipose tissue 18 days post-treatment, the established bovine withdrawal time of 48 days appears adequate to insure that violative residues do not occur.

  18. Le potentiel de l'asteroseismologie pour les etoiles sous-naines de type B

    NASA Astrophysics Data System (ADS)

    Charpinet, Stephane

    L'objectif principal de cette thèse consiste à évaluer les possibilités que les étoiles sous naines de type B, aussi appelées sdB, puissent développer des variations de luminosité engendrées par des phénomènes de pulsations. Dans la mesure où, au commencement de cette étude, les sdB ne sont pas connues pour montrer ce type de comportement, notre approche s'effectue exclusivement sur des bases théoriques visant à déterminer, par le calcul, si ces étoiles ont le potentiel pour devenir instables. Le cas échéant, il s'agira d'évaluer quels sont les résultats susceptibles d'émerger d'un sondage de la structure interne de ces étoiles avec les méthodes de l'astéroséismologie. Après avoir introduit le contexte et les outils théoriques nécessaires à ce projet (théorie des pulsations stellaires et modèles d'étoiles sous-naines de type B), la démarche passe obligatoirement par une étude exhaustive des propriétés des modes de pulsation dans ces étoiles. Nous l'avons entreprise de manière systématique afin d'évaluer et de comprendre les comportements des oscillations en fonction des différents paramètres physiques qui caractérisent une sdB. Par souci de complétude, nous étudions également les rapports qu'entretiennent évolution et périodes de pulsation au cours de la phase sdB. Par la suite, fort des connaissances nouvellement acquises, nous nous lançons dans l'étude de la stabilité des modes d'oscillation, l'objectif étant d'identifier, le cas échéant, un mécanisme capable de déstabiliser, dans certaines conditions, une fraction de ces étoiles. Par cette approche, nous déterminons qu'un mécanisme κ associé à une région d'ionisation partielle de l'élément fer agit efficacement dans l'enveloppe des sdB si, toutefois, le fer y est présent en quantités extra- solaires. Nous montrons alors que des processus de diffusion, déjà fortement suspectes d'exister dans ces étoiles, sont en mesure d'accumuler des quantit

  19. Using semantics for representing experimental protocols.

    PubMed

    Giraldo, Olga; García, Alexander; López, Federico; Corcho, Oscar

    2017-11-13

    An experimental protocol is a sequence of tasks and operations executed to perform experimental research in biological and biomedical areas, e.g. biology, genetics, immunology, neurosciences, virology. Protocols often include references to equipment, reagents, descriptions of critical steps, troubleshooting and tips, as well as any other information that researchers deem important for facilitating the reusability of the protocol. Although experimental protocols are central to reproducibility, the descriptions are often cursory. There is the need for a unified framework with respect to the syntactic structure and the semantics for representing experimental protocols. In this paper we present "SMART Protocols ontology", an ontology for representing experimental protocols. Our ontology represents the protocol as a workflow with domain specific knowledge embedded within a document. We also present the S ample I nstrument R eagent O bjective (SIRO) model, which represents the minimal common information shared across experimental protocols. SIRO was conceived in the same realm as the Patient Intervention Comparison Outcome (PICO) model that supports search, retrieval and classification purposes in evidence based medicine. We evaluate our approach against a set of competency questions modeled as SPARQL queries and processed against a set of published and unpublished protocols modeled with the SP Ontology and the SIRO model. Our approach makes it possible to answer queries such as Which protocols use tumor tissue as a sample. Improving reporting structures for experimental protocols requires collective efforts from authors, peer reviewers, editors and funding bodies. The SP Ontology is a contribution towards this goal. We build upon previous experiences and bringing together the view of researchers managing protocols in their laboratory work. Website: https://smartprotocols.github.io/ .

  20. Optimizing the Protocol for Pulmonary Cryoablation: A Comparison of a Dual- and Triple-Freeze Protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hinshaw, J. Louis, E-mail: jhinshaw@uwhealth.or; Littrup, Peter J.; Durick, Nathan

    2010-12-15

    The purpose of this study was to compare a double freeze-thaw protocol to a triple freeze-thaw protocol for pulmonary cryoablation utilizing an in vivo porcine lung model. A total of 18 cryoablations were performed in normal porcine lung utilizing percutaneous technique with 9 each in a double- (10-5-10) and triple-freeze (3-3-7-7-5) protocol. Serial noncontrast CT images were obtained during the ablation. CT imaging findings and pathology were reviewed. No imaging changes were identified during the initial freeze cycle with either protocol. However, during the first thaw cycle, a region of ground glass opacity developed around the probe with both protocols.more » Because the initial freeze was shorter with the triple freeze-thaw protocol, the imaging findings were apparent sooner with this protocol (6 vs. 13 min). Also, despite a shorter total freeze time (15 vs. 20 min), the ablation zone identified with the triple freeze-thaw protocol was not significantly different from the double freeze-thaw protocol (mean diameter: 1.67 {+-} 0.41 cm vs. 1.66 {+-} 0.21 cm, P = 0.77; area: 2.1 {+-} 0.48 cm{sup 2} vs. 1.99 {+-} 0.62 cm{sup 2}, P = 0.7; and circularity: 0.95 {+-} 0.04 vs. 0.96 {+-} 0.03, P = 0.62, respectively). This study suggests that there may be several advantages of a triple freeze-thaw protocol for pulmonary cryoablation, including earlier identification of the imaging findings associated with the ablation, the promise of a shorter procedure time or larger zones of ablation, and theoretically, more effective cytotoxicity related to the additional freeze-thaw cycle.« less

  1. FTP Extensions for Variable Protocol Specification

    NASA Technical Reports Server (NTRS)

    Allman, Mark; Ostermann, Shawn

    2000-01-01

    The specification for the File Transfer Protocol (FTP) assumes that the underlying network protocols use a 32-bit network address and a 16-bit transport address (specifically IP version 4 and TCP). With the deployment of version 6 of the Internet Protocol, network addresses will no longer be 32-bits. This paper species extensions to FTP that will allow the protocol to work over a variety of network and transport protocols.

  2. Understanding protocol performance: impact of test performance.

    PubMed

    Turner, Robert G

    2013-01-01

    This is the second of two articles that examine the factors that determine protocol performance. The objective of these articles is to provide a general understanding of protocol performance that can be used to estimate performance, establish limits on performance, decide if a protocol is justified, and ultimately select a protocol. The first article was concerned with protocol criterion and test correlation. It demonstrated the advantages and disadvantages of different criterion when all tests had the same performance. It also examined the impact of increasing test correlation on protocol performance and the characteristics of the different criteria. To examine the impact on protocol performance when individual tests in a protocol have different performance. This is evaluated for different criteria and test correlations. The results of the two articles are combined and summarized. A mathematical model is used to calculate protocol performance for different protocol criteria and test correlations when there are small to large variations in the performance of individual tests in the protocol. The performance of the individual tests that make up a protocol has a significant impact on the performance of the protocol. As expected, the better the performance of the individual tests, the better the performance of the protocol. Many of the characteristics of the different criteria are relatively independent of the variation in the performance of the individual tests. However, increasing test variation degrades some criteria advantages and causes a new disadvantage to appear. This negative impact increases as test variation increases and as more tests are added to the protocol. Best protocol performance is obtained when individual tests are uncorrelated and have the same performance. In general, the greater the variation in the performance of tests in the protocol, the more detrimental this variation is to protocol performance. Since this negative impact is increased as

  3. Responsible health insurance revisited: pouring liberal wine into a conservative bottle.

    PubMed

    Seidman, Laurence

    2005-01-01

    In 1991, an article appeared proposing a plan for "Responsible National Health Insurance" (RHI) that contained three crucial elements supported by economists affiliated with two conservative policy institutions (the American Enterprise Institute and the Heritage Foundation). The central purpose of this article is to revisit RHI in light of developments over the past decade, and to make the case that liberals, rather than reject RHI, now should support it, provided conservatives agree to sufficient funding. In this article, I recommend "pouring liberal wine into this conservative bottle."

  4. Evaluation of high-performance fiber-reinforced concrete for bridge deck connections, closure pours, and joints : final report.

    DOT National Transportation Integrated Search

    2017-01-01

    Connections, closure pours, and joints in bridges are often sources of distress because of cracks and openings. Wide separation facilitates the penetration of harmful solutions that can lead to costly repairs. Cracks are caused by volumetric changes ...

  5. Utilisation de la mélatonine pour le sommeil chez les enfants en bonne santé

    PubMed Central

    Janjua, Irvin; Goldman, Ran D.

    2016-01-01

    Résumé Question Une maman a amené son garçon de 12 ans me consulter à mon bureau. Elle s’inquiète, car il a de la difficulté à s’endormir presque tous les soirs. Elle travaille par quarts et elle prend elle-même de la mélatonine pour l’aider à s’endormir. Elle m’a demandé si son garçon pouvait aussi prendre de la mélatonine. Quels sont les recommandations et les éléments à considérer avant d’utiliser la mélatonine chez les enfants et les adolescents en bonne santé? Réponse L’insomnie est rapportée chez jusqu’à un quart des enfants en bonne santé et chez les trois quarts des enfants atteints d’une affection psychiatrique ou neurodéveloppementale, ce qui entraîne des conséquences négatives. Pour les enfants atteints du syndrome de retard de phase du sommeil, la mélatonine pourrait s’avérer utile lorsque jumelée à une évaluation de l’insomnie et à un suivi régulier. La mélatonine pourrait être envisagée pour des enfants sans diagnostic d’insomnie qui ont une bonne hygiène du sommeil. Bien qu’elle semble sans danger, il n’existe pas de données probantes en faveur de l’emploi systématique de la mélatonine chez les enfants en bonne santé.

  6. Comparison of results of cycles treated with modified mild protocol and short protocol for ovarian stimulation.

    PubMed

    Coelho, F; Aguiar, L F; Cunha, G S P; Cardinot, N; Lucena, E

    2014-01-01

    The ovarian stimulation has been applied in order to increase the number of oocytes to compensate for the poor results of in vitro fertilization, allowing the selection of one or more embryos to be transferred. Our aim is to compare the results obtained in IVF/ICSI cycles using the short protocol for controlled ovarian stimulation to the results from the modified mild protocol used in our department. A total of 240 cycles were conducted from January 2010 to December 2011. When comparing both protocols, it could be observed that there was a significant difference in the quantity of gonadotropins doses in the mild protocol and in the short protocol. No significant difference was observed regarding pregnancy rates per cycle, 22% and 26.2%, in short and mild protocols, respectively. The protocols of controlled ovarian stimulation are often associated with high risk of complications such as ovarian hyperstimulation syndrome, excessive emotional stress, high rates of treatment dropouts, and abdominal discomfort. With the data obtained in this study, one can conclude that there are less risks and complications for the patient when using the mild stimulation protocol. It was also observed that in this group there was a slightly higher rate.

  7. 21 CFR 312.30 - Protocol amendments.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    .... (b) Changes in a protocol. (1) A sponsor shall submit a protocol amendment describing any change in a Phase 1 protocol that significantly affects the safety of subjects or any change in a Phase 2 or 3... forth the provisions under which new protocols may be submitted and changes in previously submitted...

  8. 21 CFR 312.30 - Protocol amendments.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    .... (b) Changes in a protocol. (1) A sponsor shall submit a protocol amendment describing any change in a Phase 1 protocol that significantly affects the safety of subjects or any change in a Phase 2 or 3... forth the provisions under which new protocols may be submitted and changes in previously submitted...

  9. Etude de la performance des radars hautes-frequences CODAR et WERA pour la mesure des courants marins en presence partielle de glace de mer

    NASA Astrophysics Data System (ADS)

    Kamli, Emna

    Les radars hautes-frequences (RHF) mesurent les courants marins de surface avec une portee pouvant atteindre 200 kilometres et une resolution de l'ordre du kilometre. Cette etude a pour but de caracteriser la performance des RHF, en terme de couverture spatiale, pour la mesure des courants de surface en presence partielle de glace de mer. Pour ce faire, les mesures des courants de deux radars de type CODAR sur la rive sud de l'estuaire maritime du Saint-Laurent, et d'un radar de type WERA sur la rive nord, prises pendant l'hiver 2013, ont ete utilisees. Dans un premier temps, l'aire moyenne journaliere de la zone ou les courants sont mesures par chaque radar a ete comparee a l'energie des vagues de Bragg calculee a partir des donnees brutes d'acceleration fournies par une bouee mouillee dans la zone couverte par les radars. La couverture des CODARs est dependante de la densite d'energie de Bragg, alors que la couverture du WERA y est pratiquement insensible. Un modele de fetch appele GENER a ete force par la vitesse du vent predite par le modele GEM d'Environnement Canada pour estimer la hauteur significative ainsi que la periode modale des vagues. A partir de ces parametres, la densite d'energie des vagues de Bragg a ete evaluee pendant l'hiver a l'aide du spectre theorique de Bretschneider. Ces resultats permettent d'etablir la couverture normale de chaque radar en absence de glace de mer. La concentration de glace de mer, predite par le systeme canadien operationnel de prevision glace-ocean, a ete moyennee sur les differents fetchs du vent selon la direction moyenne journaliere des vagues predites par GENER. Dans un deuxieme temps, la relation entre le ratio des couvertures journalieres obtenues pendant l'hiver 2013 et des couvertures normales de chaque radar d'une part, et la concentration moyenne journaliere de glace de mer d'autre part, a ete etablie. Le ratio des couvertures decroit avec l'augmentation de la concentration de glace de mer pour les deux types

  10. Quarantine and protocol

    NASA Technical Reports Server (NTRS)

    1981-01-01

    The purpose of the Orbiting Quarantine Facility is to provide maximum protection of the terrestrial biosphere by ensuring that the returned Martian samples are safe to bring to Earth. The protocol designed to detect the presence of biologically active agents in the Martian soil is described. The protocol determines one of two things about the sample: (1) that it is free from nonterrestrial life forms and can be sent to a terrestrial containment facility where extensive chemical, biochemical, geological, and physical investigations can be conducted; or (2) that it exhibits "biological effects" of the type that dictate second order testing. The quarantine protocol is designed to be conducted on a small portion of the returned sample, leaving the bulk of the sample undisturbed for study on Earth.

  11. Methode d'identification parametrique pour la surveillance in situ des joints a recouvrement par propagation d'ondes vibratoires

    NASA Astrophysics Data System (ADS)

    Francoeur, Dany

    Cette these de doctorat s'inscrit dans le cadre de projets CRIAQ (Consortium de recherche et d'innovation en aerospatiale du Quebec) orientes vers le developpement d'approches embarquees pour la detection de defauts dans des structures aeronautiques. L'originalite de cette these repose sur le developpement et la validation d'une nouvelle methode de detection, quantification et localisation d'une entaille dans une structure de joint a recouvrement par la propagation d'ondes vibratoires. La premiere partie expose l'etat des connaissances sur l'identification d'un defaut dans le contexte du Structural Health Monitoring (SHM), ainsi que la modelisation de joint a recouvrements. Le chapitre 3 developpe le modele de propagation d'onde d'un joint a recouvrement endommage par une entaille pour une onde de flexion dans la plage des moyennes frequences (10-50 kHz). A cette fin, un modele de transmission de ligne (TLM) est realise pour representer un joint unidimensionnel (1D). Ce modele 1D est ensuite adapte a un joint bi-dimensionnel (2D) en faisant l'hypothese d'un front d'onde plan incident et perpendiculaire au joint. Une methode d'identification parametrique est ensuite developpee pour permettre a la fois la calibration du modele du joint a recouvrement sain, la detection puis la caracterisation de l'entaille situee sur le joint. Cette methode est couplee a un algorithme qui permet une recherche exhaustive de tout l'espace parametrique. Cette technique permet d'extraire une zone d'incertitude reliee aux parametres du modele optimal. Une etude de sensibilite est egalement realisee sur l'identification. Plusieurs resultats de mesure sur des joints a recouvrements 1D et 2D sont realisees permettant ainsi l'etude de la repetabilite des resultats et la variabilite de differents cas d'endommagement. Les resultats de cette etude demontrent d'abord que la methode de detection proposee est tres efficace et permet de suivre la progression d'endommagement. De tres bons resultats

  12. An Evaluation of Protocol Enhancing Proxies and File Transport Protocols for Satellite Communication

    NASA Technical Reports Server (NTRS)

    Finch, Patrick Eugene; Sullivan, Donald; Ivancic, William D.

    2012-01-01

    NASA is utilizing Global Hawk aircraft in high-altitude, long-duration Earth science missions. Communications with the onboard research equipment and sensors (the science payload) is via Ku-Band radio utilizing satellites in geostationary orbits. All payload communications use standard Internet Protocols and routing, and much of the data to be transferred is comprised of very large files. The science community is interested in fully utilizing these communication links to retrieve data as quickly and reliably as possible. A test bed was developed at NASA Ames to evaluate modern transport protocols as well as Protocol Enhancing Proxies (PEPs) to determine what tools best fit the needs of the science community. This paper describes the test bed used, the protocols, the PEPs that were evaluated, the particular tests performed and the results and conclusions.

  13. Comparison of Results of Cycles Treated with Modified Mild Protocol and Short Protocol for Ovarian Stimulation

    PubMed Central

    Aguiar, L. F.; Cunha, G. S. P.; Cardinot, N.; Lucena, E.

    2014-01-01

    The ovarian stimulation has been applied in order to increase the number of oocytes to compensate for the poor results of in vitro fertilization, allowing the selection of one or more embryos to be transferred. Our aim is to compare the results obtained in IVF/ICSI cycles using the short protocol for controlled ovarian stimulation to the results from the modified mild protocol used in our department. A total of 240 cycles were conducted from January 2010 to December 2011. When comparing both protocols, it could be observed that there was a significant difference in the quantity of gonadotropins doses in the mild protocol and in the short protocol. No significant difference was observed regarding pregnancy rates per cycle, 22% and 26.2%, in short and mild protocols, respectively. The protocols of controlled ovarian stimulation are often associated with high risk of complications such as ovarian hyperstimulation syndrome, excessive emotional stress, high rates of treatment dropouts, and abdominal discomfort. With the data obtained in this study, one can conclude that there are less risks and complications for the patient when using the mild stimulation protocol. It was also observed that in this group there was a slightly higher rate. PMID:25763398

  14. Protocols for Automated Protist Analysis

    DTIC Science & Technology

    2011-12-01

    Report No: CG-D-14-13 Protocols for Automated Protist Analysis December 2011 Distribution Statement A: Approved for public...release; distribution is unlimited. Protocols for Automated Protist Analysis ii UNCLAS//Public | CG-926 RDC | B. Nelson, et al. | Public...Director United States Coast Guard Research & Development Center 1 Chelsea Street New London, CT 06320 Protocols for Automated Protist Analysis

  15. GENERIC VERIFICATION PROTOCOL: DISTRIBUTED GENERATION AND COMBINED HEAT AND POWER FIELD TESTING PROTOCOL

    EPA Science Inventory

    This report is a generic verification protocol by which EPA’s Environmental Technology Verification program tests newly developed equipment for distributed generation of electric power, usually micro-turbine generators and internal combustion engine generators. The protocol will ...

  16. Diagnostics optiques pour la mesure de fluides critiques en micro-gravité dans les instruments ALICE et DECLIC

    NASA Astrophysics Data System (ADS)

    Durieux, Alain; Babolat, Claude; Dureux, Pierre; Martin, Bernard

    2018-04-01

    This paper, "Diagnostics optiques pour la mesure de fluides critiques en micro-gravité dans les instruments ALICE et DECLIC," was presented as part of International Conference on Space Optics—ICSO 1997, held in Toulouse, France.

  17. Développement d'un capteur optique de pression pour la mesure in-situ des moteurs cryogéniques

    NASA Astrophysics Data System (ADS)

    Girault, Marc; Graindorge, Philippe; Laloux, Bernard; Desforges, Francois-Xavier; Martin, Philippe; Lefevre, Herve; Rouhet, Jacky

    2018-04-01

    This paper, "Développement d'un capteur optique de pression pour la mesure in-situ des moteurs cryogéniques," was presented as part of International Conference on Space Optics—ICSO 1997, held in Toulouse, France.

  18. Objective and automated protocols for the evaluation of biomedical search engines using No Title Evaluation protocols.

    PubMed

    Campagne, Fabien

    2008-02-29

    The evaluation of information retrieval techniques has traditionally relied on human judges to determine which documents are relevant to a query and which are not. This protocol is used in the Text Retrieval Evaluation Conference (TREC), organized annually for the past 15 years, to support the unbiased evaluation of novel information retrieval approaches. The TREC Genomics Track has recently been introduced to measure the performance of information retrieval for biomedical applications. We describe two protocols for evaluating biomedical information retrieval techniques without human relevance judgments. We call these protocols No Title Evaluation (NT Evaluation). The first protocol measures performance for focused searches, where only one relevant document exists for each query. The second protocol measures performance for queries expected to have potentially many relevant documents per query (high-recall searches). Both protocols take advantage of the clear separation of titles and abstracts found in Medline. We compare the performance obtained with these evaluation protocols to results obtained by reusing the relevance judgments produced in the 2004 and 2005 TREC Genomics Track and observe significant correlations between performance rankings generated by our approach and TREC. Spearman's correlation coefficients in the range of 0.79-0.92 are observed comparing bpref measured with NT Evaluation or with TREC evaluations. For comparison, coefficients in the range 0.86-0.94 can be observed when evaluating the same set of methods with data from two independent TREC Genomics Track evaluations. We discuss the advantages of NT Evaluation over the TRels and the data fusion evaluation protocols introduced recently. Our results suggest that the NT Evaluation protocols described here could be used to optimize some search engine parameters before human evaluation. Further research is needed to determine if NT Evaluation or variants of these protocols can fully substitute

  19. Protocol Coordinator | Center for Cancer Research

    Cancer.gov

    PROGRAM DESCRIPTION Within the Leidos Biomedical Research Inc.’s Clinical Research Directorate, the Clinical Monitoring Research Program (CMRP) provides high-quality comprehensive and strategic operational support to the high-profile domestic and international clinical research initiatives of the National Cancer Institute (NCI), National Institute of Allergy and Infectious Diseases (NIAID), Clinical Center (CC), National Institute of Heart, Lung and Blood Institute (NHLBI), National Institute of Arthritis and Musculoskeletal and Skin Diseases (NIAMS), National Center for Advancing Translational Sciences (NCATS), National Institute of Neurological Disorders and Stroke (NINDS), and the National Institute of Mental Health (NIMH). Since its inception in 2001, CMRP’s ability to provide rapid responses, high-quality solutions, and to recruit and retain experts with a variety of backgrounds to meet the growing research portfolios of NCI, NIAID, CC, NHLBI, NIAMS, NCATS, NINDS, and NIMH has led to the considerable expansion of the program and its repertoire of support services. CMRP’s support services are strategically aligned with the program’s mission to provide comprehensive, dedicated support to assist National Institutes of Health researchers in providing the highest quality of clinical research in compliance with applicable regulations and guidelines, maintaining data integrity, and protecting human subjects. For the scientific advancement of clinical research, CMRP services include comprehensive clinical trials, regulatory, pharmacovigilance, protocol navigation and development, and programmatic and project management support for facilitating the conduct of 400+ Phase I, II, and III domestic and international trials on a yearly basis. These trials investigate the prevention, diagnosis, treatment of, and therapies for cancer, influenza, HIV, and other infectious diseases and viruses such as hepatitis C, tuberculosis, malaria, and Ebola virus; heart, lung, and

  20. Quantum Tomography Protocols with Positivity are Compressed Sensing Protocols (Open Access)

    DTIC Science & Technology

    2015-12-08

    ARTICLE OPEN Quantum tomography protocols with positivity are compressed sensing protocols Amir Kalev1, Robert L Kosut2 and Ivan H Deutsch1...Characterising complex quantum systems is a vital task in quantum information science. Quantum tomography, the standard tool used for this purpose, uses a well...designed measurement record to reconstruct quantum states and processes. It is, however, notoriously inefficient. Recently, the classical signal

  1. A kind of universal quantum secret sharing protocol

    NASA Astrophysics Data System (ADS)

    Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian

    2017-01-01

    Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix.

  2. A kind of universal quantum secret sharing protocol.

    PubMed

    Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian

    2017-01-12

    Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix.

  3. A kind of universal quantum secret sharing protocol

    PubMed Central

    Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian

    2017-01-01

    Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix. PMID:28079109

  4. [Computerized clinical protocol for occlusion].

    PubMed

    Salsench, J; Ferrer, J; Nogueras, J

    1988-11-01

    In making a protocol it is necessary that all members of the team who are going to collect information have the same unity of criterion about the different variables that compose it. The drawing up of this document is as much or more necessary than the protocol itself. In this work we all data collected in the protocol and we give the explanations of each concept.

  5. Families of quantum fingerprinting protocols

    NASA Astrophysics Data System (ADS)

    Lovitz, Benjamin; Lütkenhaus, Norbert

    2018-03-01

    We introduce several families of quantum fingerprinting protocols to evaluate the equality function on two n -bit strings in the simultaneous message passing model. The original quantum fingerprinting protocol uses a tensor product of a small number of O (logn ) -qubit high-dimensional signals [H. Buhrman et al., Phys. Rev. Lett. 87, 167902 (2001), 10.1103/PhysRevLett.87.167902], whereas a recently proposed optical protocol uses a tensor product of O (n ) single-qubit signals, while maintaining the O (logn ) information leakage of the original protocol [J. M. Arazola and N. Lütkenhaus, Phys. Rev. A 89, 062305 (2014), 10.1103/PhysRevA.89.062305]. We find a family of protocols which interpolate between the original and optical protocols while maintaining the O (logn ) information leakage, thus demonstrating a tradeoff between the number of signals sent and the dimension of each signal. There has been interest in experimental realization of the recently proposed optical protocol using coherent states [F. Xu et al., Nat. Commun. 6, 8735 (2015), 10.1038/ncomms9735; J.-Y. Guan et al., Phys. Rev. Lett. 116, 240502 (2016), 10.1103/PhysRevLett.116.240502], but as the required number of laser pulses grows linearly with the input size n , eventual challenges for the long-time stability of experimental setups arise. We find a coherent state protocol which reduces the number of signals by a factor 1/2 while also reducing the information leakage. Our reduction makes use of a simple modulation scheme in optical phase space, and we find that more complex modulation schemes are not advantageous. Using a similar technique, we improve a recently proposed coherent state protocol for evaluating the Euclidean distance between two real unit vectors [N. Kumar et al., Phys. Rev. A 95, 032337 (2017), 10.1103/PhysRevA.95.032337] by reducing the number of signals by a factor 1/2 and also reducing the information leakage.

  6. Mise à jour sur le nouveau vaccin 9-valent pour la prévention du virus du papillome humain

    PubMed Central

    Yang, David Yi; Bracken, Keyna

    2016-01-01

    Résumé Objectif Informer les médecins de famille quant à l’efficacité, à l’innocuité, aux effets sur la santé publique et à la rentabilité du vaccin 9-valent contre le virus du papillome humain (VPH). Qualité des données Des articles pertinents publiés dans PubMed jusqu’en mai 2015 ont été examinés et analysés. La plupart des données citées sont de niveau I (essais randomisés et contrôlés et méta-analyses) ou de niveau II (études transversales, cas-témoins et épidémiologiques). Des rapports et recommandations du gouvernement sont aussi cités en référence. Message principal Le vaccin 9-valent contre le VPH, qui offre une protection contre les types 6, 11, 16, 18, 31, 33, 45, 52 et 58 du VPH, est sûr et efficace et réduira encore plus l’incidence des infections à VPH, de même que les cas de cancer lié au VPH. Il peut également protéger indirectement les personnes non immunisées par l’entremise du phénomène d’immunité collective. Un programme d’immunisation efficace peut prévenir la plupart des cancers du col de l’utérus. Les analyses montrent que la rentabilité du vaccin 9-valent chez les femmes est comparable à celle du vaccin quadrivalent original contre le VPH (qui protège contre les types 6, 11, 16 et 18 du VPH) en usage à l’heure actuelle. Toutefois, il faut investiguer plus en profondeur l’utilité d’immuniser les garçons avec le vaccin 9-valent contre le VPH. Conclusion en plus d’être sûr, le vaccin 9-valent protège mieux contre le VPH que le vaccin quadrivalent. Une analyse coûtefficacité en favorise l’emploi, du moins chez les adolescentes. Ainsi, les médecins devraient recommander le vaccin 9-valent à leurs patients plutôt que le vaccin quadrivalent contre le VPH.

  7. Effectiveness of oxaliplatin desensitization protocols.

    PubMed

    Cortijo-Cascajares, Susana; Nacle-López, Inmaculada; García-Escobar, Ignacio; Aguilella-Vizcaíno, María José; Herreros-de-Tejada, Alberto; Cortés-Funes Castro, Hernán; Calleja-Hernández, Miguel-Ángel

    2013-03-01

    Hypersensitivity reaction (HSR) to antineoplastic drugs can force doctors to stop treatment and seek other alternatives. These alternatives may be less effective, not as well tolerated and/or more expensive. Another option is to use desensitization protocols that induce a temporary state of tolerance by gradually administering small quantities of the antineoplastic drug until the therapeutic dosage is reached. The aim of this study is to assess the effectiveness of oxaliplatin desensitization protocols. A retrospective observational study was carried out between January 2006 and May 2011. The inclusion criteria were patients undergoing chemotherapy treatment with oxaliplatin who had developed an HSR to the drug and who were candidates for continuing the treatment using a desensitization protocol. The patients' clinical records were reviewed and variables were gathered relating to the patient, the treatment, the HSR, and the desensitization protocol administered. The data were analysed using version 18.0 of the statistics program SPSS. A total of 53 desensitization protocols were administered to 21 patients. In 89 % of these cases, no new reactions occurred while the drug was being administered. New reactions of mild severity only occurred in 11 % of cases, and none of these reactions were severe enough for treatment to be stopped. All patients were able to complete the desensitization protocol. This study confirms that oxaliplatin desensitization protocols are safe and effective and allow patients to continue with the treatment that initially caused an HSR.

  8. Developing family planning nurse practitioner protocols.

    PubMed

    Hawkins, J W; Roberto, D

    1984-01-01

    This article focuses on the process of development of protocols for family planning nurse practitioners. A rationale for the use of protocols, a definition of the types and examples, and the pros and cons of practice with protocols are presented. A how-to description for the development process follows, including methods and a suggested tool for critique and evaluation. The aim of the article is to assist nurse practitioners in developing protocols for their practice.

  9. Protocol Coordinator | Center for Cancer Research

    Cancer.gov

    PROGRAM DESCRIPTION Within the Leidos Biomedical Research Inc.’s Clinical Research Directorate, the Clinical Monitoring Research Program (CMRP) provides high-quality comprehensive and strategic operational support to the high-profile domestic and international clinical research initiatives of the National Cancer Institute (NCI), National Institute of Allergy and Infectious Diseases (NIAID), Clinical Center (CC), National Institute of Heart, Lung and Blood Institute (NHLBI), National Institute of Arthritis and Musculoskeletal and Skin Diseases (NIAMS), National Center for Advancing Translational Sciences (NCATS), National Institute of Neurological Disorders and Stroke (NINDS), and the National Institute of Mental Health (NIMH). Since its inception in 2001, CMRP’s ability to provide rapid responses, high-quality solutions, and to recruit and retain experts with a variety of backgrounds to meet the growing research portfolios of NCI, NIAID, CC, NHLBI, NIAMS, NCATS, NINDS, and NIMH has led to the considerable expansion of the program and its repertoire of support services. CMRP’s support services are strategically aligned with the program’s mission to provide comprehensive, dedicated support to assist National Institutes of Health researchers in providing the highest quality of clinical research in compliance with applicable regulations and guidelines, maintaining data integrity, and protecting human subjects. For the scientific advancement of clinical research, CMRP services include comprehensive clinical trials, regulatory, pharmacovigilance, protocol navigation and development, and programmatic and project management support for facilitating the conduct of 400+ Phase I, II, and III domestic and international trials on a yearly basis. These trials investigate the prevention, diagnosis, treatment of, and therapies for cancer, influenza, HIV, and other infectious diseases and viruses such as hepatitis C, tuberculosis, malaria, and Ebola virus; heart, lung, and

  10. National Sample Assessment Protocols

    ERIC Educational Resources Information Center

    Ministerial Council on Education, Employment, Training and Youth Affairs (NJ1), 2012

    2012-01-01

    These protocols represent a working guide for planning and implementing national sample assessments in connection with the national Key Performance Measures (KPMs). The protocols are intended for agencies involved in planning or conducting national sample assessments and personnel responsible for administering associated tenders or contracts,…

  11. Phase Transition in Protocols Minimizing Work Fluctuations

    NASA Astrophysics Data System (ADS)

    Solon, Alexandre P.; Horowitz, Jordan M.

    2018-05-01

    For two canonical examples of driven mesoscopic systems—a harmonically trapped Brownian particle and a quantum dot—we numerically determine the finite-time protocols that optimize the compromise between the standard deviation and the mean of the dissipated work. In the case of the oscillator, we observe a collection of protocols that smoothly trade off between average work and its fluctuations. However, for the quantum dot, we find that as we shift the weight of our optimization objective from average work to work standard deviation, there is an analog of a first-order phase transition in protocol space: two distinct protocols exchange global optimality with mixed protocols akin to phase coexistence. As a result, the two types of protocols possess qualitatively different properties and remain distinct even in the infinite duration limit: optimal-work-fluctuation protocols never coalesce with the minimal-work protocols, which therefore never become quasistatic.

  12. Approches pour la reduction de l'impact de defaut dans le transport d'energie du parc eolien offshore via VSC-HVDC =

    NASA Astrophysics Data System (ADS)

    Benadja, Mounir

    Dans ce travail est presente un systeme de generation d'energie d'un parc eolien offshore et un systeme de transport utilisant les stations VSC-HVDC connectees au reseau principal AC onshore. Trois configurations ont ete etudiees, modelisees et validees par simulation. Dans chacune des configurations, des contributions ameliorant les cotes techniques et economiques sont decrites ci-dessous : La premiere contribution concerne un nouvel algorithme MPPT (Maximum Power Point Tracking) utilise pour l'extraction de la puissance maximale disponible dans les eoliennes des parcs offshores. Cette technique d'extraction du MPPT ameliore le rendement energetique de la chaine de conversion des energies renouvelables notamment l'energie eolienne a petite et a grande echelles (parc eolien offshore) qui constitue un probleme pour les constructeurs qui se trouvent confrontes a developper des dispositifs MPPT simples, moins couteux, robustes, fiables et capable d'obtenir un rendement energetique maximal. La deuxieme contribution concerne la reduction de la taille, du cout et de l'impact des defauts electriques (AC et DC) dans le systeme construit pour transporter l'energie d'un parc eolien offshore (OWF) vers le reseau principal AC onshore via deux stations 3L-NPC VSCHVDC. La solution developpee utilise des observateurs non-lineaires bases sur le filtre de Kalman etendu (EKF). Ce filtre permet d'estimer la vitesse de rotation et la position du rotor de chacune des generatrices du parc eolien offshore et de la tension du bus DC de l'onduleur DC-AC offshore et des deux stations 3L-NPC-VSC-HVDC (offshore et onshore). De plus, ce developpement du filtre de Kalman etendu a permis de reduire l'impact des defauts AC et DC. Deux commandes ont ete utilisees, l'une (commande indirect dans le plan abc) avec EKF integre destinee pour controler le convertisseur DC-AC offshore et l'autre (commande d-q) avec EKF integre pour controler les convertisseurs des deux stations AC-DC et DC-AC tout en

  13. A Security Analysis of the 802.11s Wireless Mesh Network Routing Protocol and Its Secure Routing Protocols

    PubMed Central

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-01-01

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP. PMID:24002231

  14. A security analysis of the 802.11s wireless mesh network routing protocol and its secure routing protocols.

    PubMed

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-09-02

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP.

  15. In-memory interconnect protocol configuration registers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cheng, Kevin Y.; Roberts, David A.

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mappingmore » decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.« less

  16. Physical Therapy Protocols for Arthroscopic Bankart Repair.

    PubMed

    DeFroda, Steven F; Mehta, Nabil; Owens, Brett D

    Outcomes after arthroscopic Bankart repair can be highly dependent on compliance and participation in physical therapy. Additionally, there are many variations in physician-recommended physical therapy protocols. The rehabilitation protocols of academic orthopaedic surgery departments vary widely despite the presence of consensus protocols. Descriptive epidemiology study. Level 3. Web-based arthroscopic Bankart rehabilitation protocols available online from Accreditation Council for Graduate Medical Education (ACGME)-accredited orthopaedic surgery programs were included for review. Individual protocols were reviewed to evaluate for the presence or absence of recommended therapies, goals for completion of ranges of motion, functional milestones, exercise start times, and recommended time to return to sport. Thirty protocols from 27 (16.4%) total institutions were identified out of 164 eligible for review. Overall, 9 (30%) protocols recommended an initial period of strict immobilization. Variability existed between the recommended time periods for sling immobilization (mean, 4.8 ± 1.8 weeks). The types of exercises and their start dates were also inconsistent. Goals to full passive range of motion (mean, 9.2 ± 2.8 weeks) and full active range of motion (mean, 12.2 ± 2.8 weeks) were consistent with other published protocols; however, wide ranges existed within the reviewed protocols as a whole. Only 10 protocols (33.3%) included a timeline for return to sport, and only 3 (10%) gave an estimate for return to game competition. Variation also existed when compared with the American Society of Shoulder and Elbow Therapists' (ASSET) consensus protocol. Rehabilitation protocols after arthroscopic Bankart repair were found to be highly variable. They also varied with regard to published consensus protocols. This discrepancy may lead to confusion among therapists and patients. This study highlights the importance of attending surgeons being very clear and specific with

  17. The Network Protocol Analysis Technique in Snort

    NASA Astrophysics Data System (ADS)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  18. Spacelab system analysis: The modified free access protocol: An access protocol for communication systems with periodic and Poisson traffic

    NASA Technical Reports Server (NTRS)

    Ingels, Frank; Owens, John; Daniel, Steven

    1989-01-01

    The protocol definition and terminal hardware for the modified free access protocol, a communications protocol similar to Ethernet, are developed. A MFA protocol simulator and a CSMA/CD math model are also developed. The protocol is tailored to communication systems where the total traffic may be divided into scheduled traffic and Poisson traffic. The scheduled traffic should occur on a periodic basis but may occur after a given event such as a request for data from a large number of stations. The Poisson traffic will include alarms and other random traffic. The purpose of the protocol is to guarantee that scheduled packets will be delivered without collision. This is required in many control and data collection systems. The protocol uses standard Ethernet hardware and software requiring minimum modifications to an existing system. The modification to the protocol only affects the Ethernet transmission privileges and does not effect the Ethernet receiver.

  19. Developpement et validation d'un outil base sur l'acoustique geometrique pour le diagnostic du bruit de nacelle

    NASA Astrophysics Data System (ADS)

    Minard, Benoit

    De nos jours, la problématique du bruit généré par les avions est devenue un point de développement important dans le domaine de l'aéronautique. C'est ainsi que de nombreuses études sont faites dans le domaine et une première approche consiste à modéliser de façon numérique ce bruit de manière à réduire de façon conséquente les coûts lors de la conception. C'est dans ce contexte qu'un motoriste a demandé à l'université de Sherbrooke, et plus particulièrement au groupe d'acoustique de l'Université de Sherbrooke (GAUS), de développer un outil de calcul de la propagation des ondes acoustiques dans les nacelles mais aussi pour l'étude des effets d'installation. Cet outil de prédiction leur permet de réaliser des études afin d'optimiser les traitements acoustiques (« liners »), la géométrie de ces nacelles pour des études portant sur l'intérieur de la nacelle et des études de positionnement des moteurs et de design pour les effets d'installation. L'objectif de ce projet de maîtrise était donc de poursuivre le travail réalisé par [gousset, 2011] sur l'utilisation d'une méthode de lancer de rayons pour l'étude des effets d'installation des moteurs d'avion. L'amélioration du code, sa rapidité, sa fiabilité et sa généralité étaient les objectifs principaux. Le code peut être utilisé avec des traitements acoustiques de surfaces («liners») et peut prendre en compte le phénomène de la diffraction par les arêtes et enfin peut être utilisé pour réaliser des études dans des environnements complexes tels que les nacelles d'avion. Le code développé fonctionne en 3D et procéde en 3 étapes : (1) Calcul des faisceaux initiaux (division d'une sphère, demi-sphère, maillage des surfaces de la géométrie) (2) Propagation des faisceaux dans l'environnement d'étude : calcul de toutes les caractéristiques des rayons convergents (amplitude, phase, nombre de réflexions, ...) (3) Reconstruction du champ de pression en un ou

  20. Incorporating ethical principles into clinical research protocols: a tool for protocol writers and ethics committees

    PubMed Central

    Li, Rebecca H; Wacholtz, Mary C; Barnes, Mark; Boggs, Liam; Callery-D'Amico, Susan; Davis, Amy; Digilova, Alla; Forster, David; Heffernan, Kate; Luthin, Maeve; Lynch, Holly Fernandez; McNair, Lindsay; Miller, Jennifer E; Murphy, Jacquelyn; Van Campen, Luann; Wilenzick, Mark; Wolf, Delia; Woolston, Cris; Aldinger, Carmen; Bierer, Barbara E

    2016-01-01

    A novel Protocol Ethics Tool Kit (‘Ethics Tool Kit’) has been developed by a multi-stakeholder group of the Multi-Regional Clinical Trials Center of Brigham and Women's Hospital and Harvard. The purpose of the Ethics Tool Kit is to facilitate effective recognition, consideration and deliberation of critical ethical issues in clinical trial protocols. The Ethics Tool Kit may be used by investigators and sponsors to develop a dedicated Ethics Section within a protocol to improve the consistency and transparency between clinical trial protocols and research ethics committee reviews. It may also streamline ethics review and may facilitate and expedite the review process by anticipating the concerns of ethics committee reviewers. Specific attention was given to issues arising in multinational settings. With the use of this Tool Kit, researchers have the opportunity to address critical research ethics issues proactively, potentially speeding the time and easing the process to final protocol approval. PMID:26811365

  1. Publication trends of study protocols in rehabilitation.

    PubMed

    Jesus, Tiago S; Colquhoun, Heather L

    2017-09-04

    Growing evidence points for the need to publish study protocols in the health field. To observe whether the growing interest in publishing study protocols in the broader health field has been translated into increased publications of rehabilitation study protocols. Observational study using publication data and its indexation in PubMed. Not applicable. Not applicable. PubMed was searched with appropriate combinations of Medical Subject Headings up to December 2014. The effective presence of study protocols was manually screened. Regression models analyzed the yearly growth of publications. Two-sample Z-tests analyzed whether the proportion of Systematic Reviews (SRs) and Randomized Controlled Trials (RCTs) among study protocols differed from that of the same designs for the broader rehabilitation research. Up to December 2014, 746 publications of rehabilitation study protocols were identified, with an exponential growth since 2005 (r2=0.981; p<0.001). RCT protocols were the most common among rehabilitation study protocols (83%), while RCTs were significantly more prevalent among study protocols than among the broader rehabilitation research (83% vs. 35.8%; p<0.001). For SRs, the picture was reversed: significantly less common among study protocols (2.8% vs. 9.3%; p<0.001). Funding was more often reported by rehabilitation study protocols than the broader rehabilitation research (90% vs. 53.1%; p<0.001). Rehabilitation journals published a significantly lower share of rehabilitation study protocols than they did for the broader rehabilitation research (1.8% vs.16.7%; p<0.001). Identifying the reasons for these discrepancies and reverting unwarranted disparities (e.g. low rate of publication for rehabilitation SR protocols) are likely new avenues for rehabilitation research and its publication. SRs, particularly those aggregating RCT results, are considered the best standard of evidence to guide rehabilitation clinical practice; however, that standard can be improved

  2. ELIMINATION OF THE CHARACTERIZATION OF DWPF POUR STREAM SAMPLE AND THE GLASS FABRICATION AND TESTING OF THE DWPF SLUDGE BATCH QUALIFICATION SAMPLE

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Amoroso, J.; Peeler, D.; Edwards, T.

    2012-05-11

    A recommendation to eliminate all characterization of pour stream glass samples and the glass fabrication and Product Consistency Test (PCT) of the sludge batch qualification sample was made by a Six-Sigma team chartered to eliminate non-value-added activities for the Defense Waste Processing Facility (DWPF) sludge batch qualification program and is documented in the report SS-PIP-2006-00030. That recommendation was supported through a technical data review by the Savannah River National Laboratory (SRNL) and is documented in the memorandums SRNL-PSE-2007-00079 and SRNL-PSE-2007-00080. At the time of writing those memorandums, the DWPF was processing sludge-only waste but, has since transitioned to a coupledmore » operation (sludge and salt). The SRNL was recently tasked to perform a similar data review relevant to coupled operations and re-evaluate the previous recommendations. This report evaluates the validity of eliminating the characterization of pour stream glass samples and the glass fabrication and Product Consistency Test (PCT) of the sludge batch qualification samples based on sludge-only and coupled operations. The pour stream sample has confirmed the DWPF's ability to produce an acceptable waste form from Slurry Mix Evaporator (SME) blending and product composition/durability predictions for the previous sixteen years but, ultimately the pour stream analysis has added minimal value to the DWPF's waste qualification strategy. Similarly, the information gained from the glass fabrication and PCT of the sludge batch qualification sample was determined to add minimal value to the waste qualification strategy since that sample is routinely not representative of the waste composition ultimately processed at the DWPF due to blending and salt processing considerations. Moreover, the qualification process has repeatedly confirmed minimal differences in glass behavior from actual radioactive waste to glasses fabricated from simulants or batch chemicals. In

  3. Development of performance-based guidelines for selection of bituminous-based hot-poured pavement crack sealant : an executive summary report.

    DOT National Transportation Integrated Search

    2009-01-01

    This report summarizes research presented in separate technical reports, papers, and journal articles that collectively document the development of a systematic process to aid in the selection of appropriate bituminous hot-poured sealants for pavemen...

  4. In silico toxicology protocols.

    PubMed

    Myatt, Glenn J; Ahlberg, Ernst; Akahori, Yumi; Allen, David; Amberg, Alexander; Anger, Lennart T; Aptula, Aynur; Auerbach, Scott; Beilke, Lisa; Bellion, Phillip; Benigni, Romualdo; Bercu, Joel; Booth, Ewan D; Bower, Dave; Brigo, Alessandro; Burden, Natalie; Cammerer, Zoryana; Cronin, Mark T D; Cross, Kevin P; Custer, Laura; Dettwiler, Magdalena; Dobo, Krista; Ford, Kevin A; Fortin, Marie C; Gad-McDonald, Samantha E; Gellatly, Nichola; Gervais, Véronique; Glover, Kyle P; Glowienke, Susanne; Van Gompel, Jacky; Gutsell, Steve; Hardy, Barry; Harvey, James S; Hillegass, Jedd; Honma, Masamitsu; Hsieh, Jui-Hua; Hsu, Chia-Wen; Hughes, Kathy; Johnson, Candice; Jolly, Robert; Jones, David; Kemper, Ray; Kenyon, Michelle O; Kim, Marlene T; Kruhlak, Naomi L; Kulkarni, Sunil A; Kümmerer, Klaus; Leavitt, Penny; Majer, Bernhard; Masten, Scott; Miller, Scott; Moser, Janet; Mumtaz, Moiz; Muster, Wolfgang; Neilson, Louise; Oprea, Tudor I; Patlewicz, Grace; Paulino, Alexandre; Lo Piparo, Elena; Powley, Mark; Quigley, Donald P; Reddy, M Vijayaraj; Richarz, Andrea-Nicole; Ruiz, Patricia; Schilter, Benoit; Serafimova, Rositsa; Simpson, Wendy; Stavitskaya, Lidiya; Stidl, Reinhard; Suarez-Rodriguez, Diana; Szabo, David T; Teasdale, Andrew; Trejo-Martin, Alejandra; Valentin, Jean-Pierre; Vuorinen, Anna; Wall, Brian A; Watts, Pete; White, Angela T; Wichard, Joerg; Witt, Kristine L; Woolley, Adam; Woolley, David; Zwickl, Craig; Hasselgren, Catrin

    2018-07-01

    The present publication surveys several applications of in silico (i.e., computational) toxicology approaches across different industries and institutions. It highlights the need to develop standardized protocols when conducting toxicity-related predictions. This contribution articulates the information needed for protocols to support in silico predictions for major toxicological endpoints of concern (e.g., genetic toxicity, carcinogenicity, acute toxicity, reproductive toxicity, developmental toxicity) across several industries and regulatory bodies. Such novel in silico toxicology (IST) protocols, when fully developed and implemented, will ensure in silico toxicological assessments are performed and evaluated in a consistent, reproducible, and well-documented manner across industries and regulatory bodies to support wider uptake and acceptance of the approaches. The development of IST protocols is an initiative developed through a collaboration among an international consortium to reflect the state-of-the-art in in silico toxicology for hazard identification and characterization. A general outline for describing the development of such protocols is included and it is based on in silico predictions and/or available experimental data for a defined series of relevant toxicological effects or mechanisms. The publication presents a novel approach for determining the reliability of in silico predictions alongside experimental data. In addition, we discuss how to determine the level of confidence in the assessment based on the relevance and reliability of the information. Copyright © 2018 The Authors. Published by Elsevier Inc. All rights reserved.

  5. The Decremental Protocol as an Alternative Protocol to Measure Maximal Oxygen Consumption in Athletes.

    PubMed

    Taylor, Katrina; Seegmiller, Jeffrey; Vella, Chantal A

    2016-11-01

    To determine whether a decremental protocol could elicit a higher maximal oxygen consumption (VO 2 max) than an incremental protocol in trained participants. A secondary aim was to examine whether cardiac-output (Q) and stroke-volume (SV) responses differed between decremental and incremental protocols in this sample. Nineteen runners/triathletes were randomized to either the decremental or incremental group. All participants completed an initial incremental VO 2 max test on a treadmill, followed by a verification phase. The incremental group completed 2 further incremental tests. The decremental group completed a second VO 2 max test using the decremental protocol, based on their verification phase. The decremental group then completed a final incremental test. During each test, VO 2 , ventilation, and heart rate were measured, and cardiac variables were estimated with thoracic bioimpedance. Repeated-measures analysis of variance was conducted with an alpha level set at .05. There were no significant main effects for group (P = .37) or interaction (P = .10) over time (P = .45). VO 2 max was similar between the incremental (57.29 ± 8.94 mL · kg -1 · min -1 ) and decremental (60.82 ± 8.49 mL · kg -1 · min -1 ) groups over time. Furthermore, Q and SV were similar between the incremental (Q 22.72 ± 5.85 L/min, SV 119.64 ± 33.02 mL/beat) and decremental groups (Q 20.36 ± 4.59 L/min, SV 109.03 ± 24.27 mL/beat) across all 3 trials. The findings suggest that the decremental protocol does not elicit higher VO 2 max than an incremental protocol but may be used as an alternative protocol to measure VO 2 max in runners and triathletes.

  6. Magnetic levitation and MHD propulsion

    NASA Astrophysics Data System (ADS)

    Tixador, P.

    1994-04-01

    Magnetic levitation and MHD propulsion are now attracting attention in several countries. Different superconducting MagLev and MHD systems will be described concentrating on, above all, the electromagnetic aspect. Some programmes occurring throughout the world will be described. Magnetic levitated trains could be the new high speed transportation system for the 21st century. Intensive studies involving MagLev trains using superconductivity have been carried out in Japan since 1970. The construction of a 43 km long track is to be the next step. In 1991 a six year programme was launched in the United States to evaluate the performances of MagLev systems for transportation. The MHD (MagnetoHydroDynamic) offers some interesting advantages (efficiency, stealth characteristics, ...) for naval propulsion and increasing attention is being paid towards it nowadays. Japan is also up at the top with the tests of Yamato I, a 260 ton MHD propulsed ship. Depuis quelques années nous assistons à un redémarrage de programmes concernant la lévitation et la propulsion supraconductrices. Différents systèmes supraconducteurs de lévitation et de propulsion seront décrits en examinant plus particulièrement l'aspect électromagnétique. Quelques programmes à travers le monde seront abordés. Les trains à sustentation magnétique pourraient constituer un nouveau mode de transport terrestre à vitesse élevée (500 km/h) pour le 21^e siècle. Les japonais n'ont cessé de s'intéresser à ce système avec bobine supraconductrice. Ils envisagent un stade préindustriel avec la construction d'une ligne de 43 km. En 1991 un programme américain pour une durée de six ans a été lancé pour évaluer les performances des systèmes à lévitation pour le transport aux Etats Unis. La MHD (Magnéto- Hydro-Dynamique) présente des avantages intéressants pour la propulsion navale et un regain d'intérêt apparaît à l'heure actuelle. Le japon se situe là encore à la pointe des d

  7. Instructor Handbook for the Protocol Modules on Classroom Management. Utah Protocol Materials Project.

    ERIC Educational Resources Information Center

    Langer, Philip; Borg, Walter R.

    This handbook is designed to acquaint the teacher educator with the training materials in classroom management prepared by the Utah State University Protocol Training Project. It deals with the protocol materials generally and with each module specifically, and includes the following sections: (a) an introduction to and rationale for protocol…

  8. Standards for Environmental Measurement Using GIS: Toward a Protocol for Protocols.

    PubMed

    Forsyth, Ann; Schmitz, Kathryn H; Oakes, Michael; Zimmerman, Jason; Koepp, Joel

    2006-02-01

    Interdisciplinary research regarding how the built environment influences physical activity has recently increased. Many research projects conducted jointly by public health and environmental design professionals are using geographic information systems (GIS) to objectively measure the built environment. Numerous methodological issues remain, however, and environmental measurements have not been well documented with accepted, common definitions of valid, reliable variables. This paper proposes how to create and document standardized definitions for measures of environmental variables using GIS with the ultimate goal of developing reliable, valid measures. Inherent problems with software and data that hamper environmental measurement can be offset by protocols combining clear conceptual bases with detailed measurement instructions. Examples demonstrate how protocols can more clearly translate concepts into specific measurement. This paper provides a model for developing protocols to allow high quality comparative research on relationships between the environment and physical activity and other outcomes of public health interest.

  9. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 9 2014-04-01 2014-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol to conduct research with controlled substances listed in Schedule I shall be in the following form...

  10. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 9 2011-04-01 2011-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol to conduct research with controlled substances listed in Schedule I shall be in the following form...

  11. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol to conduct research with controlled substances listed in Schedule I shall be in the following form...

  12. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 9 2013-04-01 2013-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol to conduct research with controlled substances listed in Schedule I shall be in the following form...

  13. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 9 2012-04-01 2012-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol to conduct research with controlled substances listed in Schedule I shall be in the following form...

  14. Short Review on Quantum Key Distribution Protocols.

    PubMed

    Giampouris, Dimitris

    2017-01-01

    Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.

  15. Prosthesis Prescription Protocol of the Arm (PPP-Arm): The implementation of a national prosthesis prescription protocol.

    PubMed

    Wijdenes, Paula; Brouwers, Michael; van der Sluis, Corry K

    2018-02-01

    In order to create more uniformity in the prescription of upper limb prostheses by Dutch rehabilitation teams, the development and implementation of a Prosthesis Prescription Protocol of the upper limb (PPP-Arm) was initiated. The aim was to create a national digital protocol to structure, underpin, and evaluate the prescription of upper limb prostheses for clients with acquired or congenital arm defects. Prosthesis Prescription Protocol of the Arm (PPP-Arm) was developed on the basis of the International Classification of Functioning and consisted of several layers. All stakeholders (rehabilitation teams, orthopedic workshops, patients, and insurance companies) were involved in development and implementation. A national project coordinator and knowledge brokers in each team were essential for the project. PPP-Arm was successfully developed and implemented in nine Dutch rehabilitation teams. The protocol improved team collaboration, structure, and completeness of prosthesis prescriptions and treatment uniformity and might be interesting for other countries as well. Clinical relevance A national protocol to prescribe upper limb prostheses can be helpful to create uniformity in treatment of patients with upper limb defects. Such a protocol improves quality of care for all patients in the country.

  16. An in silico method to identify computer-based protocols worthy of clinical study: An insulin infusion protocol use case

    PubMed Central

    Wong, Anthony F; Pielmeier, Ulrike; Haug, Peter J; Andreassen, Steen

    2016-01-01

    Objective Develop an efficient non-clinical method for identifying promising computer-based protocols for clinical study. An in silico comparison can provide information that informs the decision to proceed to a clinical trial. The authors compared two existing computer-based insulin infusion protocols: eProtocol-insulin from Utah, USA, and Glucosafe from Denmark. Materials and Methods The authors used eProtocol-insulin to manage intensive care unit (ICU) hyperglycemia with intravenous (IV) insulin from 2004 to 2010. Recommendations accepted by the bedside clinicians directly link the subsequent blood glucose values to eProtocol-insulin recommendations and provide a unique clinical database. The authors retrospectively compared in silico 18 984 eProtocol-insulin continuous IV insulin infusion rate recommendations from 408 ICU patients with those of Glucosafe, the candidate computer-based protocol. The subsequent blood glucose measurement value (low, on target, high) was used to identify if the insulin recommendation was too high, on target, or too low. Results Glucosafe consistently provided more favorable continuous IV insulin infusion rate recommendations than eProtocol-insulin for on target (64% of comparisons), low (80% of comparisons), or high (70% of comparisons) blood glucose. Aggregated eProtocol-insulin and Glucosafe continuous IV insulin infusion rates were clinically similar though statistically significantly different (Wilcoxon signed rank test P = .01). In contrast, when stratified by low, on target, or high subsequent blood glucose measurement, insulin infusion rates from eProtocol-insulin and Glucosafe were statistically significantly different (Wilcoxon signed rank test, P < .001), and clinically different. Discussion This in silico comparison appears to be an efficient nonclinical method for identifying promising computer-based protocols. Conclusion Preclinical in silico comparison analytical framework allows rapid and inexpensive

  17. Incorporating ethical principles into clinical research protocols: a tool for protocol writers and ethics committees.

    PubMed

    Li, Rebecca H; Wacholtz, Mary C; Barnes, Mark; Boggs, Liam; Callery-D'Amico, Susan; Davis, Amy; Digilova, Alla; Forster, David; Heffernan, Kate; Luthin, Maeve; Lynch, Holly Fernandez; McNair, Lindsay; Miller, Jennifer E; Murphy, Jacquelyn; Van Campen, Luann; Wilenzick, Mark; Wolf, Delia; Woolston, Cris; Aldinger, Carmen; Bierer, Barbara E

    2016-04-01

    A novel Protocol Ethics Tool Kit ('Ethics Tool Kit') has been developed by a multi-stakeholder group of the Multi-Regional Clinical Trials Center of Brigham and Women's Hospital and Harvard. The purpose of the Ethics Tool Kit is to facilitate effective recognition, consideration and deliberation of critical ethical issues in clinical trial protocols. The Ethics Tool Kit may be used by investigators and sponsors to develop a dedicated Ethics Section within a protocol to improve the consistency and transparency between clinical trial protocols and research ethics committee reviews. It may also streamline ethics review and may facilitate and expedite the review process by anticipating the concerns of ethics committee reviewers. Specific attention was given to issues arising in multinational settings. With the use of this Tool Kit, researchers have the opportunity to address critical research ethics issues proactively, potentially speeding the time and easing the process to final protocol approval. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  18. Nonblocking and orphan free message logging protocols

    NASA Technical Reports Server (NTRS)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-01-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  19. Nonblocking and orphan free message logging protocols

    NASA Astrophysics Data System (ADS)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-12-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  20. The Quantum Steganography Protocol via Quantum Noisy Channels

    NASA Astrophysics Data System (ADS)

    Wei, Zhan-Hong; Chen, Xiu-Bo; Niu, Xin-Xin; Yang, Yi-Xian

    2015-08-01

    As a promising branch of quantum information hiding, Quantum steganography aims to transmit secret messages covertly in public quantum channels. But due to environment noise and decoherence, quantum states easily decay and change. Therefore, it is very meaningful to make a quantum information hiding protocol apply to quantum noisy channels. In this paper, we make the further research on a quantum steganography protocol for quantum noisy channels. The paper proved that the protocol can apply to transmit secret message covertly in quantum noisy channels, and explicity showed quantum steganography protocol. In the protocol, without publishing the cover data, legal receivers can extract the secret message with a certain probability, which make the protocol have a good secrecy. Moreover, our protocol owns the independent security, and can be used in general quantum communications. The communication, which happen in our protocol, do not need entangled states, so our protocol can be used without the limitation of entanglement resource. More importantly, the protocol apply to quantum noisy channels, and can be used widely in the future quantum communication.

  1. Development of an HPV Educational Protocol for Adolescents

    PubMed Central

    Wetzel, Caitlin; Tissot, Abbigail; Kollar, Linda M.; Hillard, Paula A.; Stone, Rachel; Kahn, Jessica A.

    2007-01-01

    Study Objectives To develop an educational protocol about HPV and Pap tests for adolescents, to evaluate the protocol for understandability and clarity, and to evaluate the protocol for its effectiveness in increasing knowledge about HPV. Design In phase 1, investigators and adolescents developed the protocol. In phase 2, adolescents evaluated the protocol qualitatively, investigators evaluated its effectiveness in increasing HPV knowledge in a sample of adolescents, and the protocol was revised. In phase 3, investigators evaluated the effectiveness of the revised protocol in an additional adolescent sample. Setting Urban, hospital-based teen health center. Participants A total of 252 adolescent girls and boys in the three study phases. Main Outcome Measures Pre- and post-protocol knowledge about HPV, measured using a 10- or 11-item scale. Results Scores on the HPV knowledge scale increased significantly (p<.0001) among adolescents who participated in phases 2 and 3 after they received the protocol. Initial differences in scores based on race, insurance type and condom use were not noted post-protocol. Conclusion The protocol significantly increased knowledge scores about HPV in this population, regardless of sociodemographic characteristics and risk behaviors. Effective, developmentally appropriate educational protocols about HPV and Pap tests are particularly important in clinical settings as cervical cancer screening guidelines evolve, HPV DNA testing is integrated into screening protocols, and HPV vaccines become available. In-depth, one-on-one education about HPV may also prevent adverse psychosocial responses and promote healthy sexual and Pap screening behaviors in adolescents with abnormal HPV or Pap test results. Synopsis The investigators developed an educational protocol about HPV and Pap tests and evaluated its effectiveness in increasing knowledge about HPV among adolescents. PMID:17868894

  2. A Simple XML Producer-Consumer Protocol

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of

  3. Three-step semiquantum secure direct communication protocol

    NASA Astrophysics Data System (ADS)

    Zou, XiangFu; Qiu, DaoWen

    2014-09-01

    Quantum secure direct communication is the direct communication of secret messages without need for establishing a shared secret key first. In the existing schemes, quantum secure direct communication is possible only when both parties are quantum. In this paper, we construct a three-step semiquantum secure direct communication (SQSDC) protocol based on single photon sources in which the sender Alice is classical. In a semiquantum protocol, a person is termed classical if he (she) can measure, prepare and send quantum states only with the fixed orthogonal quantum basis {|0>, |1>}. The security of the proposed SQSDC protocol is guaranteed by the complete robustness of semiquantum key distribution protocols and the unconditional security of classical one-time pad encryption. Therefore, the proposed SQSDC protocol is also completely robust. Complete robustness indicates that nonzero information acquired by an eavesdropper Eve on the secret message implies the nonzero probability that the legitimate participants can find errors on the bits tested by this protocol. In the proposed protocol, we suggest a method to check Eves disturbing in the doves returning phase such that Alice does not need to announce publicly any position or their coded bits value after the photons transmission is completed. Moreover, the proposed SQSDC protocol can be implemented with the existing techniques. Compared with many quantum secure direct communication protocols, the proposed SQSDC protocol has two merits: firstly the sender only needs classical capabilities; secondly to check Eves disturbing after the transmission of quantum states, no additional classical information is needed.

  4. EXACT2: the semantics of biomedical protocols

    PubMed Central

    2014-01-01

    Background The reliability and reproducibility of experimental procedures is a cornerstone of scientific practice. There is a pressing technological need for the better representation of biomedical protocols to enable other agents (human or machine) to better reproduce results. A framework that ensures that all information required for the replication of experimental protocols is essential to achieve reproducibility. Methods We have developed the ontology EXACT2 (EXperimental ACTions) that is designed to capture the full semantics of biomedical protocols required for their reproducibility. To construct EXACT2 we manually inspected hundreds of published and commercial biomedical protocols from several areas of biomedicine. After establishing a clear pattern for extracting the required information we utilized text-mining tools to translate the protocols into a machine amenable format. We have verified the utility of EXACT2 through the successful processing of previously 'unseen' (not used for the construction of EXACT2) protocols. Results The paper reports on a fundamentally new version EXACT2 that supports the semantically-defined representation of biomedical protocols. The ability of EXACT2 to capture the semantics of biomedical procedures was verified through a text mining use case. In this EXACT2 is used as a reference model for text mining tools to identify terms pertinent to experimental actions, and their properties, in biomedical protocols expressed in natural language. An EXACT2-based framework for the translation of biomedical protocols to a machine amenable format is proposed. Conclusions The EXACT2 ontology is sufficient to record, in a machine processable form, the essential information about biomedical protocols. EXACT2 defines explicit semantics of experimental actions, and can be used by various computer applications. It can serve as a reference model for for the translation of biomedical protocols in natural language into a semantically

  5. Contributions to the Mosquito Fauna of Southeast Asia. XI. A Proposed Reclassification of Neoculex Dyar Based Principally on the Male Terminalia

    DTIC Science & Technology

    1971-01-01

    Diptera, CuIicidae) de la region ethiopienne. Description de Culex (neoculex) garioui sp. n. moustique nouveau du Cameroun. Bull. Sot. Path. exot. 59...Description de Neoculex ZupZantei sp. n. Bull. Sot. Path. exot. 48:862-866. HAMON, J., HOLSTEIN, M. & E. RIVOLA 1957. Descri tion d’un nouveau moustique

  6. MR efficiency using automated MRI-desktop eProtocol

    NASA Astrophysics Data System (ADS)

    Gao, Fei; Xu, Yanzhe; Panda, Anshuman; Zhang, Min; Hanson, James; Su, Congzhe; Wu, Teresa; Pavlicek, William; James, Judy R.

    2017-03-01

    MRI protocols are instruction sheets that radiology technologists use in routine clinical practice for guidance (e.g., slice position, acquisition parameters etc.). In Mayo Clinic Arizona (MCA), there are over 900 MR protocols (ranging across neuro, body, cardiac, breast etc.) which makes maintaining and updating the protocol instructions a labor intensive effort. The task is even more challenging given different vendors (Siemens, GE etc.). This is a universal problem faced by all the hospitals and/or medical research institutions. To increase the efficiency of the MR practice, we designed and implemented a web-based platform (eProtocol) to automate the management of MRI protocols. It is built upon a database that automatically extracts protocol information from DICOM compliant images and provides a user-friendly interface to the technologists to create, edit and update the protocols. Advanced operations such as protocol migrations from scanner to scanner and capability to upload Multimedia content were also implemented. To the best of our knowledge, eProtocol is the first MR protocol automated management tool used clinically. It is expected that this platform will significantly improve the radiology operations efficiency including better image quality and exam consistency, fewer repeat examinations and less acquisition errors. These protocols instructions will be readily available to the technologists during scans. In addition, this web-based platform can be extended to other imaging modalities such as CT, Mammography, and Interventional Radiology and different vendors for imaging protocol management.

  7. Santé sexuelle et reproductive des adolescentes de Bobo Dioulasso, Burkina Faso: place de la communication parents-adolescentes pour la réduction des risques

    PubMed Central

    Some, Donmozoun Télesphore; Some, Der Adolphe; Hien, Hervé; Diallo, Ramata; Zingue, Dézémon; Diallo, Ibrahim; Diagbouga, Serge; Dao, Blami

    2012-01-01

    Introduction Les adolescentes sont très vulnérables face aux Infections Sexuellement Transmissibles (IST) et au VIH/SIDA. Notre étude a pour objectifs d’explorer la qualité de la communication entre les adolescentes et leurs parents sur les IST/VIH/SIDA et de recueillir leurs suggestions pour l’amélioration de cette communication. Méthodes L’étude était transversale qualitative sur 2 mois. La population de l’étude était composée par des adolescentes de 13 à 17 ans et leurs parents habitant la ville de Bobo Dioulasso. Vingt (20) adolescentes scolarisées ont été tirés au sort dans trois établissements secondaires et 20 autres non scolarisées choisies de façon accidentelle dans la ville. Les informations ont été collectées à l’aide de 8 focus groups. Les discussions ont été enregistrées sur cassettes, retranscrites en verbatim, et analysées à l’aide du logiciel QSR NVIVO 2.0. Résultats Les adolescentes et leurs parents communiquent très peu ou pas sur les questions des IST/VIH/SIDA; l’auto-information par les paires ou les médias est la première source d’information. Pour les parents, l’information existe et est accessible aux adolescentes alors que pour ces dernières, leurs connaissances de ces maladies sont parfois erronées. L’abstinence, la fidélité et le dépistage volontaire comme moyen de prévention sont très peu évoqués par les adolescentes de même que par leurs parents. Conclusion La communication parents-adolescentes est insuffisante voire absente dans certains milieux. Il est urgent de conduire des actions auprès des adolescentes et leurs parents pour mieux les informer sur les IST/VIH/SIDA et améliorer la communication sur ces maladies. PMID:22655099

  8. SPP: A data base processor data communications protocol

    NASA Technical Reports Server (NTRS)

    Fishwick, P. A.

    1983-01-01

    The design and implementation of a data communications protocol for the Intel Data Base Processor (DBP) is defined. The protocol is termed SPP (Service Port Protocol) since it enables data transfer between the host computer and the DBP service port. The protocol implementation is extensible in that it is explicitly layered and the protocol functionality is hierarchically organized. Extensive trace and performance capabilities have been supplied with the protocol software to permit optional efficient monitoring of the data transfer between the host and the Intel data base processor. Machine independence was considered to be an important attribute during the design and implementation of SPP. The protocol source is fully commented and is included in Appendix A of this report.

  9. THE MASTER PROTOCOL CONCEPT

    PubMed Central

    Allegra, Carmen J.

    2015-01-01

    During the past decade, biomedical technologies have undergone an explosive evolution---from the publication of the first complete human genome in 2003, after more than a decade of effort and at a cost of hundreds of millions of dollars---to the present time, where a complete genomic sequence can be available in less than a day and at a small fraction of the cost of the original sequence. The widespread availability of next generation genomic sequencing has opened the door to the development of precision oncology. The need to test multiple new targeted agents both alone and in combination with other targeted therapies, as well as classic cytotoxic agents, demand the development of novel therapeutic platforms (particularly Master Protocols) capable of efficiently and effectively testing multiple targeted agents or targeted therapeutic strategies in relatively small patient subpopulations. Here, we describe the Master Protocol concept, with a focus on the expected gains and complexities of the use of this design. An overview of Master Protocols currently active or in development is provided along with a more extensive discussion of the Lung Master Protocol (Lung-MAP study). PMID:26433553

  10. BLUE-protocol and FALLS-protocol: two applications of lung ultrasound in the critically ill.

    PubMed

    Lichtenstein, Daniel A

    2015-06-01

    This review article describes two protocols adapted from lung ultrasound: the bedside lung ultrasound in emergency (BLUE)-protocol for the immediate diagnosis of acute respiratory failure and the fluid administration limited by lung sonography (FALLS)-protocol for the management of acute circulatory failure. These applications require the mastery of 10 signs indicating normal lung surface (bat sign, lung sliding, A-lines), pleural effusions (quad and sinusoid sign), lung consolidations (fractal and tissue-like sign), interstitial syndrome (lung rockets), and pneumothorax (stratosphere sign and the lung point). These signs have been assessed in adults, with diagnostic accuracies ranging from 90% to 100%, allowing consideration of ultrasound as a reasonable bedside gold standard. In the BLUE-protocol, profiles have been designed for the main diseases (pneumonia, congestive heart failure, COPD, asthma, pulmonary embolism, pneumothorax), with an accuracy > 90%. In the FALLS-protocol, the change from A-lines to lung rockets appears at a threshold of 18 mm Hg of pulmonary artery occlusion pressure, providing a direct biomarker of clinical volemia. The FALLS-protocol sequentially rules out obstructive, then cardiogenic, then hypovolemic shock for expediting the diagnosis of distributive (usually septic) shock. These applications can be done using simple grayscale machines and one microconvex probe suitable for the whole body. Lung ultrasound is a multifaceted tool also useful for decreasing radiation doses (of interest in neonates where the lung signatures are similar to those in adults), from ARDS to trauma management, and from ICUs to points of care. If done in suitable centers, training is the least of the limitations for making use of this kind of visual medicine.

  11. Soft drink "pouring rights": marketing empty calories to children.

    PubMed

    Nestle, M

    2000-01-01

    Healthy People 2010 objectives call for meals and snacks served in schools to contribute to overall diets that meet federal dietary guidelines. Sales in schools of foods and drinks high in calories and low in nutrients undermine this health objective, as well as participation in the more nutritious, federally sponsored, school lunch programs. Competitive foods also undermine nutrition information taught in the classroom. Lucrative contracts between school districts and soft drink companies for exclusive rights to sell one brand are the latest development in the increasing commercialization of school food. These contracts, intended to elicit brand loyalty among young children who have a lifetime of purchases ahead of them, are especially questionable because they place schools in the position of "pushing" soft drink consumption. "Pouring rights" contracts deserve attention from public health professionals concerned about the nutritional quality of children's diets.

  12. Control of experimental Triatoma infestans populations: effect of pour-on cypermethrin applied to chickens under natural conditions in the Argentinean Chaco region.

    PubMed

    Amelotti, I; Catalá, S S; Gorla, D E

    2014-06-01

    Among peridomestic structures, chicken coops are sites of major importance for the domestic ecology of Triatoma infestans (Hemiptera: Reduviidae). The aim of this study was to evaluate in an experimental context the effects of a cypermethrin pour-on formulation applied to chickens on blood intake, moulting and mortality in T. infestans, under the natural climatic conditions of a region endemic for Chagas' disease. Experimental chicken huts were made of bricks and covered with plastic mosquito nets. Ninety fourth-instar nymphs were maintained in each hut. The study used a completely random design in which chickens in the experimental group were treated with a cypermethrin pour-on formulation. Five replicates (= huts) of the experimental and control groups were conducted. The number of live T. infestans, blood intake and moults to fifth-instar stage were recorded at 1, 5, 20, 35 and 45 days after the application of cypermethrin. Cumulative mortality was higher in nymphs exposed to treated chickens (> 71%) than in control nymphs (< 50%) (P < 0.01). Blood intake and moulting rate were lower in nymphs fed on treated chickens than in control nymphs (P < 0.05). Pour-on cypermethrin was able to cause significant mortality, although it did not eliminate the experimental population of T. infestans. © 2013 The Royal Entomological Society.

  13. Quantum-key-distribution protocol with pseudorandom bases

    NASA Astrophysics Data System (ADS)

    Trushechkin, A. S.; Tregubov, P. A.; Kiktenko, E. O.; Kurochkin, Y. V.; Fedorov, A. K.

    2018-01-01

    Quantum key distribution (QKD) offers a way for establishing information-theoretical secure communications. An important part of QKD technology is a high-quality random number generator for the quantum-state preparation and for post-processing procedures. In this work, we consider a class of prepare-and-measure QKD protocols, utilizing additional pseudorandomness in the preparation of quantum states. We study one of such protocols and analyze its security against the intercept-resend attack. We demonstrate that, for single-photon sources, the considered protocol gives better secret key rates than the BB84 and the asymmetric BB84 protocols. However, the protocol strongly requires single-photon sources.

  14. A Novel Methodology for the Synthesis of Acyloxy Castor Polyol Esters: Low Pour Point Lubricant Base Stocks.

    PubMed

    Kamalakar, Kotte; Mahesh, Goli; Prasad, Rachapudi B N; Karuna, Mallampalli S L

    2015-01-01

    Castor oil, a non-edible oil containing hydroxyl fatty acid, ricinoleic acid (89.3 %) was chemically modified employing a two step procedure. The first step involved acylation (C(2)-C(6) alkanoic anhydrides) of -OH functionality employing a green catalyst, Kieselguhr-G and solvent free medium. The catalyst after reaction was filtered and reused several times without loss in activity. The second step is esterification of acylated castor fatty acids with branched mono alcohol, 2-ethylhexanol and polyols namely neopentyl glycol (NPG), trimethylolpropane (TMP) and pentaerythritol (PE) to obtain 16 novel base stocks. The base stocks when evaluated for different lubricant properties have shown very low pour points (-30 to -45°C) and broad viscosity ranges 20.27 cSt to 370.73 cSt, higher viscosity indices (144-171), good thermal and oxidative stabilities, and high weld load capacities suitable for multi-range industrial applications such as hydraulic fluids, metal working fluids, gear oil, forging and aviation applications. The study revealed that acylated branched mono- and polyol esters rich in monounsaturation is desirable for developing low pour point base stocks.

  15. Special Course on Inverse Methods for Airfoil Design for Aeronautical and Turbomachinery Applications (Methodes Inverses pour la Conception des Profils Porteurs pour des Applications dans les Domaines de l’Aeronautique et des Turbomachines)

    DTIC Science & Technology

    1990-11-01

    engined jet aircraft wing MID PLA CROSS tCTO% taking into account the effects of the propulsive system. -DESIGN PAAMETERS DESTIGE PARAMETERS 5CT 0 (MC 0...AGARD Report No.780 Special Course on Inverse Methods for Airfoil Design for Aeronautical and Turbomachinery Applications (M6thodes Inverses pour la...manufacturing systems. Blade or airfoil designs are normally made in two steps, and the lectures are accordingly grouped into two parts. - - In the

  16. Reliable multicast protocol specifications protocol operations

    NASA Technical Reports Server (NTRS)

    Callahan, John R.; Montgomery, Todd; Whetten, Brian

    1995-01-01

    This appendix contains the complete state tables for Reliable Multicast Protocol (RMP) Normal Operation, Multi-RPC Extensions, Membership Change Extensions, and Reformation Extensions. First the event types are presented. Afterwards, each RMP operation state, normal and extended, is presented individually and its events shown. Events in the RMP specification are one of several things: (1) arriving packets, (2) expired alarms, (3) user events, (4) exceptional conditions.

  17. Cognitive Protocol Stack Design

    DTIC Science & Technology

    2015-12-30

    SECURITY CLASSIFICATION OF: In the ARO “ Cognitive Protocol Stack Design" project we proposed cognitive networking solutions published in international...areas related to cognitive networking, opening also new lines of research that was not possible to forecast at the beginning of the project. In a...Distribution Unlimited Final Report: Cognitive Protocol Stack Design The views, opinions and/or findings contained in this report are those of the author(s

  18. Detecting Hidden Communications Protocols

    DTIC Science & Technology

    2013-02-11

    Protocols FA9550-09-1-0173 Richard R Brooks Clemson University PO Box 340915 Clemson, SC 29634-0915 Air Force Office of Scientific Research/RSL 875...two botnet detection methods: centralized botnet traffic detection using HMMs and probabilistic context-free grammars (PCFGs) for centralized and...final report for the Detecting Hidden Communications Protocols AFOSR grant with R. R. Brooks form Clemson University as PI. The work funded by the

  19. Game-theoretic perspective of Ping-Pong protocol

    NASA Astrophysics Data System (ADS)

    Kaur, Hargeet; Kumar, Atul

    2018-01-01

    We analyse Ping-Pong protocol from the point of view of a game. The analysis helps us in understanding the different strategies of a sender and an eavesdropper to gain the maximum payoff in the game. The study presented here characterizes strategies that lead to different Nash equilibriums. We further demonstrate the condition for Pareto optimality depending on the parameters used in the game. Moreover, we also analysed LM05 protocol and compared it with PP protocol from the point of view of a generic two-way QKD game with or without entanglement. Our results provide a deeper understanding of general two-way QKD protocols in terms of the security and payoffs of different stakeholders in the protocol.

  20. Space Wire Upper Layer Protocols

    NASA Technical Reports Server (NTRS)

    Rakow, Glenn; Schnurr, Richard; Gilley, Daniel; Parkes, Steve

    2004-01-01

    This viewgraph presentation addresses efforts to provide a streamlined approach for developing SpaceWire Upper layer protocols which allows industry to drive standardized communication solutions for real projects. The presentation proposes a simple packet header that will allow flexibility in implementing a diverse range of protocols.

  1. Protocol for a Delay-Tolerant Data-Communication Network

    NASA Technical Reports Server (NTRS)

    Torgerson, Jordan; Hooke, Adrian; Burleigh, Scott; Fall, Kevin

    2004-01-01

    As its name partly indicates, the Delay-Tolerant Networking (DTN) Bundle Protocol is a protocol for delay-tolerant transmission of data via communication networks. This protocol was conceived as a result of studies of how to adapt Internet protocols so that Internet-like services could be provided across interplanetary distances in support of deep-space exploration. The protocol, and software to implement the protocol, is being developed in collaboration among experts at NASA's Jet Propulsion Laboratory and other institutions. No current Internet protocols can accommodate long transmission delay times or intermittent link connectivity. The DTN Bundle Protocol represents a departure from the standard Internet assumption that a continuous path is available from a host computer to a client computer: It provides for routing of data through networks that may be disjointed and may be characterized by long transmission delays. In addition to networks that include deepspace communication links, examples of such networks include terrestrial ones within which branches are temporarily disconnected. The protocol is based partly on the definition of a message-based overlay above the transport layers of the networks on which it is hosted.

  2. 40 CFR 766.14 - Contents of protocols.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Contents of protocols. 766.14 Section 766.14 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT DIBENZO-PARA-DIOXINS/DIBENZOFURANS General Provisions § 766.14 Contents of protocols. Protocols...

  3. Ressources pour les personnes atteintes de démence

    PubMed Central

    Frank, Christopher; Feldman, Sid; Schulz, Mary

    2011-01-01

    Résumé Objectif Résumer les services offerts par la Société Alzheimer et discuter des autres sources de soutien et d’information à la disposition des personnes atteintes de démence. Sources de l’information On a fait une recension dans Ovid MEDLINE à l’aide des expressions dementia, Alzheimer disease, community health services utilization et caregiver stress. Message principal Il a été démontré qu’il est bénéfique aux patients et aux aidants si le diagnostic de la démence est posé tôt dans la maladie. Une consultation auprès de la Société Alzheimer peut aider dans la prise en charge non pharmacologique de la démence au moment du diagnostic et en tout temps durant l’évolution de la maladie. Parmi les services offerts, on peut mentionner des renseignements au sujet de la démence, le soutien aux aidants, la coordination des services communautaires et une grande diversité de ressources écrites à l’intention des patients et des aidants. Là où il est offert, le programme Premier lien peut aider avec l’orientation vers des services en minimisant la nécessité pour les patients ou les aidants de communiquer eux-mêmes avec les filiales locales de la Société. On discute aussi d’autres ressources, y compris les soins de répit et les approches technologiques pour prendre en charge l’errance. Conclusion La Société Alzheimer joue un rôle important dans la prise en charge de la démence et les médecins de famille devraient toujours envisager d’y référer leurs patients au moment du diagnostic, quelle que soit la gravité de l’état. Premier lien, quand il est accessible, peut faciliter le contact avec les services. Des ressources comme les soins de répit et les programmes de jour devraient toujours être considérés lorsqu’ils sont disponibles.

  4. Probability Distributions over Cryptographic Protocols

    DTIC Science & Technology

    2009-06-01

    Artificial Immune Algorithm . . . . . . . . . . . . . . . . . . . 9 3 Design Decisions 11 3.1 Common Ground...creation algorithm for unbounded distribution . . . . . . . 24 4.2 Message creation algorithm for unbounded naive distribution . . . . 24 4.3 Protocol...creation algorithm for intended-run distributions . . . . . . 26 4.4 Protocol and message creation algorithm for realistic distribution . . 32 ix THIS

  5. Routing Protocols in Wireless Sensor Networks

    PubMed Central

    Villalba, Luis Javier García; Orozco, Ana Lucila Sandoval; Cabrera, Alicia Triviño; Abbas, Cláudia Jacy Barenco

    2009-01-01

    The applications of wireless sensor networks comprise a wide variety of scenarios. In most of them, the network is composed of a significant number of nodes deployed in an extensive area in which not all nodes are directly connected. Then, the data exchange is supported by multihop communications. Routing protocols are in charge of discovering and maintaining the routes in the network. However, the appropriateness of a particular routing protocol mainly depends on the capabilities of the nodes and on the application requirements. This paper presents a review of the main routing protocols proposed for wireless sensor networks. Additionally, the paper includes the efforts carried out by Spanish universities on developing optimization techniques in the area of routing protocols for wireless sensor networks. PMID:22291515

  6. Technical Analysis of SSP-21 Protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bromberger, S.

    As part of the California Energy Systems for the Twenty-First Century (CES-21) program, in December 2016 San Diego Gas and Electric (SDG&E) contracted with Lawrence Livermore National Laboratory (LLNL) to perform an independent verification and validation (IV&V) of a white paper describing their Secure SCADA Protocol for the Twenty-First Century (SSP-21) in order to analyze the effectiveness and propriety of cryptographic protocol use within the SSP-21 specification. SSP-21 is designed to use cryptographic protocols to provide (optional) encryption, authentication, and nonrepudiation, among other capabilities. The cryptographic protocols to be used reflect current industry standards; future versions of SSP-21 will usemore » other advanced technologies to provide a subset of security services.« less

  7. Routing protocols in wireless sensor networks.

    PubMed

    Villalba, Luis Javier García; Orozco, Ana Lucila Sandoval; Cabrera, Alicia Triviño; Abbas, Cláudia Jacy Barenco

    2009-01-01

    The applications of wireless sensor networks comprise a wide variety of scenarios. In most of them, the network is composed of a significant number of nodes deployed in an extensive area in which not all nodes are directly connected. Then, the data exchange is supported by multihop communications. Routing protocols are in charge of discovering and maintaining the routes in the network. However, the appropriateness of a particular routing protocol mainly depends on the capabilities of the nodes and on the application requirements. This paper presents a review of the main routing protocols proposed for wireless sensor networks. Additionally, the paper includes the efforts carried out by Spanish universities on developing optimization techniques in the area of routing protocols for wireless sensor networks.

  8. EC 92: Implications for United States Trade Policy

    DTIC Science & Technology

    1990-04-09

    38. 8. Veronique Maurus, "Le Maroc : le Nouveau Dragon aux Portes d’Europe," Le Monde (Paris), 03 November 1989, p. 9. 9. Carl Hamilton...Marx, Bernard. "What 1992 Has in Store for Europe." World Marxist Review, Vol. 32, January 1989, pp. 78-82. 33. Maurus, Veronique. "Le Maroc : le Nouveau

  9. Mars Communication Protocols

    NASA Technical Reports Server (NTRS)

    Kazz, G. J.; Greenberg, E.

    2000-01-01

    Over the next decade, international plans and commitments are underway to develop an infrastructure at Mars to support future exploration of the red planet. The purpose of this infrastructure is to provide reliable global communication and navigation coverage for on-approach, landed, roving, and in-flight assets at Mars. The claim is that this infrastructure will: 1) eliminate the need of these assets to carry Direct to Earth (DTE) communications equipment, 2) significantly increase data return and connectivity, 3) enable small mission exploration of Mars without DTE equipment, 4) provide precision navigation i.e., 10 to 100m position resolution, 5) supply timing reference accurate to 10ms. This paper in particular focuses on two CCSDS recommendations for that infrastructure: CCSDS Proximity-1 Space Link Protocol and CCSDS File Delivery Protocol (CFDP). A key aspect of Mars exploration will be the ability of future missions to interoperate. These protocols establish a framework for interoperability by providing standard communication, navigation, and timing services. In addition, these services include strategies to recover gracefully from communication interruptions and interference while ensuring backward compatibility with previous missions from previous phases of exploration.

  10. A Survey on Underwater Acoustic Sensor Network Routing Protocols.

    PubMed

    Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina

    2016-03-22

    Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research.

  11. A Survey on Underwater Acoustic Sensor Network Routing Protocols

    PubMed Central

    Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina

    2016-01-01

    Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research. PMID:27011193

  12. Protocols for second-generation business satellites systems

    NASA Astrophysics Data System (ADS)

    Evans, B. G.; Coakley, F. P.; El Amin, M. H. M.

    The paper discusses the nature and mix of traffic in business satellite systems and describes the limitations on the protocol imposed by the differing impairments of speech, video, and data. A simple TDMA system protocol is presented which meets the requirements of mixed-service operation. The efficiency of the protocol together with implications for allocation, scheduling and synchronisation are discussed. Future-generation satellites will probably use on-board processing. Some initial work on protocols that make use of on-board processing and the implications for satellite and earth-station equipment are presented.

  13. Processing Protocol for Soil Samples Potentially ...

    EPA Pesticide Factsheets

    Method Operating Procedures This protocol describes the processing steps for 45 g and 9 g soil samples potentially contaminated with Bacillus anthracis spores. The protocol is designed to separate and concentrate the spores from bulk soil down to a pellet that can be used for further analysis. Soil extraction solution and mechanical shaking are used to disrupt soil particle aggregates and to aid in the separation of spores from soil particles. Soil samples are washed twice with soil extraction solution to maximize recovery. Differential centrifugation is used to separate spores from the majority of the soil material. The 45 g protocol has been demonstrated by two laboratories using both loamy and sandy soil types. There were no significant differences overall between the two laboratories for either soil type, suggesting that the processing protocol would be robust enough to use at multiple laboratories while achieving comparable recoveries. The 45 g protocol has demonstrated a matrix limit of detection at 14 spores/gram of soil for loamy and sandy soils.

  14. Internet Protocol Implementation Guide.

    DTIC Science & Technology

    1982-08-01

    RD-R153 624 INTERNET PROTOCOL IMPLEMENTATION GIDE(U) SRI 1/2 INTERNATIONAL MENLO PARK CA NETWORK INFORMATION CENTER AUG 82 DCA2e-83-C-8e25 N... INTERNET PROTOCOL S IMPLEMENTATION GUIDE August 1982 DTICFL. !.ECTE .-" MAY 1 31985 ;z B Q.. Network Information Center SRI International Menlo Park...this is more information than the receiving Internet * module needs. The specified procedure is to take the return route recorded in the first

  15. Explorer : des clés pour mieux comprendre la matière

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ellis, Jonathan R.

    2011-02-14

    Will the LHC upset theories of the infinitely small? Physicists would like the accelerator to shake the standard model. This theory of elementary particles and forces leaves many gray areas. The LHC and its experiments have been designed to enlighten them. [Le LHC va-t-il bouleverser les théories de l'infiniment petit ? Les physiciens aimeraient que l'accélérateur fasse trembler le modèle standard. Cette théorie des particules élémentaires et des forces laisse de nombreuses zones d'ombre. Le LHC et ses expériences ont été conçus pour les éclairer.

  16. The Xpress Transfer Protocol (XTP): A tutorial (expanded version)

    NASA Technical Reports Server (NTRS)

    Sanders, Robert M.; Weaver, Alfred C.

    1990-01-01

    The Xpress Transfer Protocol (XTP) is a reliable, real-time, light weight transfer layer protocol. Current transport layer protocols such as DoD's Transmission Control Protocol (TCP) and ISO's Transport Protocol (TP) were not designed for the next generation of high speed, interconnected reliable networks such as fiber distributed data interface (FDDI) and the gigabit/second wide area networks. Unlike all previous transport layer protocols, XTP is being designed to be implemented in hardware as a VLSI chip set. By streamlining the protocol, combining the transport and network layers and utilizing the increased speed and parallelization possible with a VLSI implementation, XTP will be able to provide the end-to-end data transmission rates demanded in high speed networks without compromising reliability and functionality. This paper describes the operation of the XTP protocol and in particular, its error, flow and rate control; inter-networking addressing mechanisms; and multicast support features, as defined in the XTP Protocol Definition Revision 3.4.

  17. Tuberculose péritonéale pseudo tumorale mimant un cancer ovarien: un diagnostic différentiel important à considérer

    PubMed Central

    Moukit, Mounir; Fadel, Fatimazahra Ait El; Kouach, Jaouad; Babahabib, Abdellah; Dehayni, Mohammed; Rahali, Driss Moussaoui

    2016-01-01

    La tuberculose est une maladie infectieuse curable qui peut simuler dans sa localisation péritonéale un cancer ovarien avancé conduisant ainsi à une chirurgie étendue et inutile souvent chez des femmes en âge de reproduction. Nous rapportons un nouveau cas de tuberculose péritonéale pseudo tumorale chez une patiente âgée de 43 ans chez qui le diagnostic d’un cancer ovarien avec carcinose péritonéale avait été suspecté. La laparotomie exploratrice avec examen histologique extemporané ont permis de confirmer le diagnostic de tuberculose péritonéale. La patiente a bien répondu au traitement antituberculeux selon le protocole 2ERHZ/4RH. PMID:28292155

  18. Protocol for Communication Networking for Formation Flying

    NASA Technical Reports Server (NTRS)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in

  19. A Self-Stabilizing Synchronization Protocol for Arbitrary Digraphs

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.

    2011-01-01

    This paper presents a self-stabilizing distributed clock synchronization protocol in the absence of faults in the system. It is focused on the distributed clock synchronization of an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. This protocol deterministically converges within a time bound that is a linear function of the self-stabilization period. We present an outline of a deductive proof of the correctness of the protocol. A bounded model of the protocol was mechanically verified for a variety of topologies. Results of the mechanical proof of the correctness of the protocol are provided. The model checking results have verified the correctness of the protocol as they apply to the networks with unidirectional and bidirectional links. In addition, the results confirm the claims of determinism and linear convergence. As a result, we conjecture that the protocol solves the general case of this problem. We also present several variations of the protocol and discuss that this synchronization protocol is indeed an emergent system.

  20. Mars Sample Handling Protocol Workshop Series: Workshop 4

    NASA Technical Reports Server (NTRS)

    Race Margaret S. (Editor); DeVincenzi, Donald L. (Editor); Rummel, John D. (Editor); Acevedo, Sara E. (Editor)

    2001-01-01

    In preparation for missions to Mars that will involve the return of samples to Earth, it will be necessary to prepare for the receiving, handling, testing, distributing, and archiving of martian materials here on Earth. Previous groups and committees have studied selected aspects of sample return activities, but specific detailed protocols for the handling and testing of returned samples must still be developed. To further refine the requirements for sample hazard testing and to develop the criteria for subsequent release of sample materials from quarantine, the NASA Planetary Protection Officer convened a series of workshops in 2000-2001. The overall objective of the Workshop Series was to produce a Draft Protocol by which returned martian sample materials can be assessed for biological hazards and examined for evidence of life (extant or extinct) while safeguarding the purity of the samples from possible terrestrial contamination. This report also provides a record of the proceedings of Workshop 4, the final Workshop of the Series, which was held in Arlington, Virginia, June 5-7, 2001. During Workshop 4, the sub-groups were provided with a draft of the protocol compiled in May 2001 from the work done at prior Workshops in the Series. Then eight sub-groups were formed to discuss the following assigned topics: Review and Assess the Draft Protocol for Physical/Chemical Testing Review and Assess the Draft Protocol for Life Detection Testing Review and Assess the Draft Protocol for Biohazard Testing Environmental and Health/Monitoring and Safety Issues Requirements of the Draft Protocol for Facilities and Equipment Contingency Planning for Different Outcomes of the Draft Protocol Personnel Management Considerations in Implementation of the Draft Protocol Draft Protocol Implementation Process and Update Concepts This report provides the first complete presentation of the Draft Protocol for Mars Sample Handling to meet planetary protection needs. This Draft Protocol

  1. Quantum key distribution protocol based on contextuality monogamy

    NASA Astrophysics Data System (ADS)

    Singh, Jaskaran; Bharti, Kishor; Arvind

    2017-06-01

    The security of quantum key distribution (QKD) protocols hinges upon features of physical systems that are uniquely quantum in nature. We explore the role of quantumness, as qualified by quantum contextuality, in a QKD scheme. A QKD protocol based on the Klyachko-Can-Binicioğlu-Shumovsky (KCBS) contextuality scenario using a three-level quantum system is presented. We explicitly show the unconditional security of the protocol by a generalized contextuality monogamy relationship based on the no-disturbance principle. This protocol provides a new framework for QKD which has conceptual and practical advantages over other protocols.

  2. Survey of protocols for the manual segmentation of the hippocampus: preparatory steps towards a joint EADC-ADNI harmonized protocol.

    PubMed

    Boccardi, Marina; Ganzola, Rossana; Bocchetta, Martina; Pievani, Michela; Redolfi, Alberto; Bartzokis, George; Camicioli, Richard; Csernansky, John G; de Leon, Mony J; deToledo-Morrell, Leyla; Killiany, Ronald J; Lehéricy, Stéphane; Pantel, Johannes; Pruessner, Jens C; Soininen, H; Watson, Craig; Duchesne, Simon; Jack, Clifford R; Frisoni, Giovanni B

    2011-01-01

    Manual segmentation from magnetic resonance imaging (MR) is the gold standard for evaluating hippocampal atrophy in Alzheimer's disease (AD). Nonetheless, different segmentation protocols provide up to 2.5-fold volume differences. Here we surveyed the most frequently used segmentation protocols in the AD literature as a preliminary step for international harmonization. The anatomical landmarks (anteriormost and posteriormost slices, superior, inferior, medial, and lateral borders) were identified from 12 published protocols for hippocampal manual segmentation ([Abbreviation] first author, publication year: [B] Bartzokis, 1998; [C] Convit, 1997; [dTM] deToledo-Morrell, 2004; [H] Haller, 1997; [J] Jack, 1994; [K] Killiany, 1993; [L] Lehericy, 1994; [M] Malykhin, 2007; [Pa] Pantel, 2000; [Pr] Pruessner, 2000; [S] Soininen, 1994; [W] Watson, 1992). The hippocampi of one healthy control and one AD patient taken from the 1.5T MR ADNI database were segmented by a single rater according to each protocol. The accuracy of the protocols' interpretation and translation into practice was checked with lead authors of protocols through individual interactive web conferences. Semantically harmonized landmarks and differences were then extracted, regarding: (a) the posteriormost slice, protocol [B] being the most restrictive, and [H, M, Pa, Pr, S] the most inclusive; (b) inclusion [C, dTM, J, L, M, Pr, W] or exclusion [B, H, K, Pa, S] of alveus/fimbria; (c) separation from the parahippocampal gyrus, [C] being the most restrictive, [B, dTM, H, J, Pa, S] the most inclusive. There were no substantial differences in the definition of the anteriormost slice. This survey will allow us to operationalize differences among protocols into tracing units, measure their impact on the repeatability and diagnostic accuracy of manual hippocampal segmentation, and finally develop a harmonized protocol.

  3. Simplified dispatch-assisted CPR instructions outperform standard protocol.

    PubMed

    Dias, J A; Brown, T B; Saini, D; Shah, R C; Cofield, S S; Waterbor, J W; Funkhouser, E; Terndrup, T E

    2007-01-01

    Dispatch-assisted chest compressions only CPR (CC-CPR) has gained widespread acceptance, and recent research suggests that increasing the proportion of compression time during CPR may increase survival from out-of-hospital cardiac arrest. We created a simplified CC-CPR protocol to reduce time to start chest compressions and to increase the proportion of time spent delivering chest compressions. This simplified protocol was compared to a published protocol, Medical Priority Dispatch System (MPDS) Version 11.2, recommended by the National Academies of Emergency Dispatch. Subjects were randomized to the MPDS v11.2 protocol or a simplified protocol. Data was recorded from a Laerdal Resusci Anne Skillreporter manikin. A simulated emergency medical dispatcher, contacted by cell phone, delivered standardized instructions for both protocols. Outcomes included chest compression rate, depth, hand position, full release, overall proportion of compressions without error, time to start of CPR and total hands-off chest time. Proportions were analyzed by Wilcoxon's Rank Sum tests and time variables with Welch ANOVA and Wilcoxon's Rank Sum test. All tests used a two-sided alpha-level of 0.05. One hundred and seventeen subjects were randomized prospectively, 58 to the standard protocol and 59 to the simplified protocol. The average age of subjects in both groups was 25 years old. For both groups, the compression rate was equivalent (104 simplified versus 94 MPDS, p = 0.13), as was the proportion with total release (1.0 simplified versus 1.0 MPDS, p = 0.09). The proportion to the correct depth was greater in the simplified protocol (0.31 versus 0.03, p < 0.01), as was the proportion of compressions done without error (0.05 versus 0.0, p = 0.16). Time to start of chest compressions and total hands-off chest time were better in the simplified protocol (start time 60.9s versus 78.6s, p < 0.0001; hands-off chest time 69 s versus 95 s, p < 0.0001). The proportion with correct hand

  4. Quelle place pour l’anesthésie locorégionale chez les brûlés?

    PubMed Central

    Chaibdraa, A.; Medjelekh, M.S.; Saouli, A.; Bentakouk, M.C.

    2015-01-01

    Summary La pratique de l’anesthésie locorégionale chez les brûlés est limitée par de nombreux facteurs. Elle est considérée comme marginale dans l’approche multimodale du traitement de la douleur par excès de nociception. Ce travail rétrospectif, sur une période de 3 années, porte sur les anesthésies locorégionales (ALR) réalisées. Les résultats obtenus vont permettre, en regard de la rareté des données de la littérature, de formuler quelques suggestions sur la place de cette technique. Il a été recensé 634 ALR, dont 96% chez des adultes. Les membres inférieurs sont les plus concernés (76%). Des anesthésies rachidiennes ont été pratiquées chez 32 patients dont 4 enfants. Les incidents sont peu fréquents (3%) et sans gravité. L’ALR peut représenter une option utile dans la stratégie multimodale de prise en charge de la douleur, la réhabilitation passive précoce et la chirurgie de recouvrement par la greffe de peau. Elle mérite d’être explorée en ambulatoire, dans la mesure où 95% des brûlés ne sont pas hospitalisés. La place de l’anesthésie-locorégionale chez les brûlés devrait susciter plus d’intérêts, pour permettre d’établir des protocoles fondés sur une réflexion pluridisciplinaire. PMID:27279806

  5. Energy-Aware RFID Anti-Collision Protocol.

    PubMed

    Arjona, Laura; Simon, Hugo Landaluce; Ruiz, Asier Perallos

    2018-06-11

    The growing interest in mobile devices is transforming wireless identification technologies. Mobile and battery-powered Radio Frequency Identification (RFID) readers, such as hand readers and smart phones, are are becoming increasingly attractive. These RFID readers require energy-efficient anti-collision protocols to minimize the tag collisions and to expand the reader's battery life. Furthermore, there is an increasing interest in RFID sensor networks with a growing number of RFID sensor tags. Thus, RFID application developers must be mindful of tag anti-collision protocols. Energy-efficient protocols involve a low reader energy consumption per tag. This work presents a thorough study of the reader energy consumption per tag and analyzes the main factor that affects this metric: the frame size update strategy. Using the conclusion of this analysis, the anti-collision protocol Energy-Aware Slotted Aloha (EASA) is presented to decrease the energy consumption per tag. The frame size update strategy of EASA is configured to minimize the energy consumption per tag. As a result, EASA presents an energy-aware frame. The performance of the proposed protocol is evaluated and compared with several state of the art Aloha-based anti-collision protocols based on the current RFID standard. Simulation results show that EASA, with an average of 15 mJ consumed per tag identified, achieves a 6% average improvement in the energy consumption per tag in relation to the strategies of the comparison.

  6. WDM Network and Multicasting Protocol Strategies

    PubMed Central

    Zaim, Abdul Halim

    2014-01-01

    Optical technology gains extensive attention and ever increasing improvement because of the huge amount of network traffic caused by the growing number of internet users and their rising demands. However, with wavelength division multiplexing (WDM), it is easier to take the advantage of optical networks and optical burst switching (OBS) and to construct WDM networks with low delay rates and better data transparency these technologies are the best choices. Furthermore, multicasting in WDM is an urgent solution for bandwidth-intensive applications. In the paper, a new multicasting protocol with OBS is proposed. The protocol depends on a leaf initiated structure. The network is composed of source, ingress switches, intermediate switches, edge switches, and client nodes. The performance of the protocol is examined with Just Enough Time (JET) and Just In Time (JIT) reservation protocols. Also, the paper involves most of the recent advances about WDM multicasting in optical networks. WDM multicasting in optical networks is given as three common subtitles: Broadcast and-select networks, wavelength-routed networks, and OBS networks. Also, in the paper, multicast routing protocols are briefly summarized and optical burst switched WDM networks are investigated with the proposed multicast schemes. PMID:24744683

  7. A More Efficient Contextuality Distillation Protocol

    NASA Astrophysics Data System (ADS)

    Meng, Hui-xian; Cao, Huai-xin; Wang, Wen-hua; Fan, Ya-jing; Chen, Liang

    2018-03-01

    Based on the fact that both nonlocality and contextuality are resource theories, it is natural to ask how to amplify them more efficiently. In this paper, we present a contextuality distillation protocol which produces an n-cycle box B ∗ B ' from two given n-cycle boxes B and B '. It works efficiently for a class of contextual n-cycle ( n ≥ 4) boxes which we termed as "the generalized correlated contextual n-cycle boxes". For any two generalized correlated contextual n-cycle boxes B and B ', B ∗ B ' is more contextual than both B and B '. Moreover, they can be distilled toward to the maximally contextual box C H n as the times of iteration goes to infinity. Among the known protocols, our protocol has the strongest approximate ability and is optimal in terms of its distillation rate. What is worth noting is that our protocol can witness a larger set of nonlocal boxes that make communication complexity trivial than the protocol in Brunner and Skrzypczyk (Phys. Rev. Lett. 102, 160403 2009), this might be helpful for exploring the problem that why quantum nonlocality is limited.

  8. A More Efficient Contextuality Distillation Protocol

    NASA Astrophysics Data System (ADS)

    Meng, Hui-xian; Cao, Huai-xin; Wang, Wen-hua; Fan, Ya-jing; Chen, Liang

    2017-12-01

    Based on the fact that both nonlocality and contextuality are resource theories, it is natural to ask how to amplify them more efficiently. In this paper, we present a contextuality distillation protocol which produces an n-cycle box B ∗ B ' from two given n-cycle boxes B and B '. It works efficiently for a class of contextual n-cycle (n ≥ 4) boxes which we termed as "the generalized correlated contextual n-cycle boxes". For any two generalized correlated contextual n-cycle boxes B and B ', B ∗ B ' is more contextual than both B and B '. Moreover, they can be distilled toward to the maximally contextual box C H n as the times of iteration goes to infinity. Among the known protocols, our protocol has the strongest approximate ability and is optimal in terms of its distillation rate. What is worth noting is that our protocol can witness a larger set of nonlocal boxes that make communication complexity trivial than the protocol in Brunner and Skrzypczyk (Phys. Rev. Lett. 102, 160403 2009), this might be helpful for exploring the problem that why quantum nonlocality is limited.

  9. Tree of Life: Gustav with Gusto

    ERIC Educational Resources Information Center

    Sterling, Joan

    2010-01-01

    Gustav Klimt was born in Vienna in 1862. At age 14, he received a scholarship to the Vienna Public Art School. After graduating, he painted realistic portraits and later began to paint landscapes. Klimt was best known for creating a style known as Art Nouveau, in answer to the Industrial Revolution of the early 20th century. Art Nouveau was a…

  10. Screening Protocol for the Electrochemical Characterization of Potential Supercapacitor Materials

    DTIC Science & Technology

    2009-11-01

    Felix Wong; DRDC Atlantic TM 2009-279; R & D pour la défense Canada – Atlantique; Novembre 2009. Introduction ou contexte : Les forces armées ont... 13 Figure 10: The effect of active material... 13 : Typical Constant Current Charge-Discharge Curve for a 1.34 mg Electrode of PAni-2NSA/MWNT at a Constant Current of 0.2 mA

  11. Modelisation de l'erosion et des sources de pollution dans le bassin versant Iroquois/Blanchette dans un contexte de changements climatiques

    NASA Astrophysics Data System (ADS)

    Coulibaly, Issa

    Principale source d'approvisionnement en eau potable de la municipalite d'Edmundston, le bassin versant Iroquois/Blanchette est un enjeu capital pour cette derniere, d'ou les efforts constants deployes pour assurer la preservation de la qualite de son eau. A cet effet, plusieurs etudes y ont ete menees. Les plus recentes ont identifie des menaces de pollution de diverses origines dont celles associees aux changements climatiques (e.g. Maaref 2012). Au regard des impacts des modifications climatiques annonces a l'echelle du Nouveau-Brunswick, le bassin versant Iroquois/Blanchette pourrait etre fortement affecte, et cela de diverses facons. Plusieurs scenarios d'impacts sont envisageables, notamment les risques d'inondation, d'erosion et de pollution a travers une augmentation des precipitations et du ruissellement. Face a toutes ces menaces eventuelles, l'objectif de cette etude est d'evaluer les impacts potentiels des changements climatiques sur les risques d'erosion et de pollution a l'echelle du bassin versant Iroquois/Blanchette. Pour ce faire, la version canadienne de l'equation universelle revisee des pertes en sol RUSLE-CAN et le modele hydrologique SWAT ( Soil and Water Assessment Tool) ont ete utilises pour modeliser les risques d'erosion et de pollution au niveau dans la zone d'etude. Les donnees utilisees pour realiser ce travail proviennent de sources diverses et variees (teledetections, pedologiques, topographiques, meteorologiques, etc.). Les simulations ont ete realisees en deux etapes distinctes, d'abord dans les conditions actuelles ou l'annee 2013 a ete choisie comme annee de reference, ensuite en 2025 et 2050. Les resultats obtenus montrent une tendance a la hausse de la production de sediments dans les prochaines annees. La production maximale annuelle augmente de 8,34 % et 8,08 % respectivement en 2025 et 2050 selon notre scenario le plus optimiste, et de 29,99 % en 2025 et 29,72 % en 2050 selon le scenario le plus pessimiste par rapport a celle

  12. VIEW OF THE #67 HOLDING FURNACE POURING AT #04 COPPER ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    VIEW OF THE #67 HOLDING FURNACE POURING AT #04 COPPER STATION IN THE CASTING SHOP. (OTHER UNITS MELT BRASS ALLOYS.) THIS IS THE SOUTHERNMOST FURNACE OF THE FOUR PRESENTLY IN SITU. THE CURRENT CASTING SHOP WAS CONSTRUCTED DURING THE EARLY 1970'S, REPLACING THE ORIGINAL PRE-WWI FACILITY. STATIONS #02, 03, AND 04 EACH CONSIST OF A HOLDER FLANKED BY A PAIR OF 800 KW ELECTRIC MELTERS. THE HOLDER IS REHEATED AT 85,000 LBS. SHAKER BOX, LOCATED AT THE REAR OF EACH MELTER SUPPLY THE MIXTURE OF INGREDIENTS REQUIRED FOR EACH PARTICULAR ALLOY. ONE MEMBER OF THE THREE-MAN CASTING TEAMS IS RESPONSIBLE FOR SHAKING METAL INTO THE MELTERS. IN THE LOWER RIGHT ARE SHOWN THE MOLD STORAGE AREA AND THE FURNACE BUILDERS' AREA FOR CHIPPING AND REBRICKING OFF-LINE UNITS. - American Brass Foundry, 70 Sayre Street, Buffalo, Erie County, NY

  13. VIEW OF THE #67 HOLDING FURNACE POURING AT #04 COPPER ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    VIEW OF THE #67 HOLDING FURNACE POURING AT #04 COPPER STATION IN THE CASTING SHOP. (OTHER UNITS MELT BRASS ALLOYS.) THIS IS THE SOUTHERNMOST FURNACE OF THE FOUR PRESENTLY IN SITU. THE CURRENT CASTING SHOP WAS CONSTRUCTED DURING THE EARLY 1970'S, REPLACING THE ORIGINAL PRE-WWI FACILITY. STATIONS #02,03, AND 04 EACH CONSIST OF A HOLDER FLANKED BY A PAIR OF 800 KW ELECTRIC MELTERS. THE HOLDER IS RATED AT 85,000 LBS. SHAKER BOXES, LOCATED AT THE REAR OF EACH MELTER SUPPLY THE MIXTURE OF INGREDIENTS REQUIRED FOR EACH PARTICULAR ALLOY. ONE MEMBER OF THE THREE-MAN CASTING TEAMS IS RESPONSIBLE FOR SHAKING METAL INTO THE MELTERS. IN THE LOWER RIGHT ARE SHOWN THE MOLD STORAGE AREA AND THE FURNACE BUILDERS' AREA FOR CHIPPING AND REBRICKING OFF-LINE UNITS. - American Brass Foundry, 70 Sayre Street, Buffalo, Erie County, NY

  14. Near-optimal protocols in complex nonequilibrium transformations

    DOE PAGES

    Gingrich, Todd R.; Rotskoff, Grant M.; Crooks, Gavin E.; ...

    2016-08-29

    The development of sophisticated experimental means to control nanoscale systems has motivated efforts to design driving protocols that minimize the energy dissipated to the environment. Computational models are a crucial tool in this practical challenge. In this paper, we describe a general method for sampling an ensemble of finite-time, nonequilibrium protocols biased toward a low average dissipation. In addition, we show that this scheme can be carried out very efficiently in several limiting cases. As an application, we sample the ensemble of low-dissipation protocols that invert the magnetization of a 2D Ising model and explore how the diversity of themore » protocols varies in response to constraints on the average dissipation. In this example, we find that there is a large set of protocols with average dissipation close to the optimal value, which we argue is a general phenomenon.« less

  15. An Authentication Protocol for Future Sensor Networks.

    PubMed

    Bilal, Muhammad; Kang, Shin-Gak

    2017-04-28

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN

  16. An Authentication Protocol for Future Sensor Networks

    PubMed Central

    Bilal, Muhammad; Kang, Shin-Gak

    2017-01-01

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN

  17. Prete-moi Ton Logiciel pour Ecrire un Mot (Lend Me Your Software Program So I Can Write a Letter).

    ERIC Educational Resources Information Center

    Mangenot, Francois

    1993-01-01

    A brief discussion and description of one commercially available software package ("Pour Ecrire un Mot") for writing letters of various types uses the love letter as an example of the software's functioning. Answers to the prompting questions on the screen determine the few variable parameters of the text to be generated. (four…

  18. Biometrics based authentication scheme for session initiation protocol.

    PubMed

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.

  19. Protocol Coordinator | Center for Cancer Research

    Cancer.gov

    PROGRAM DESCRIPTION Within the Leidos Biomedical Research Inc.’s Clinical Research Directorate, the Clinical Monitoring Research Program (CMRP) provides high-quality comprehensive and strategic operational support to the high-profile domestic and international clinical research initiatives of the National Cancer Institute (NCI), National Institute of Allergy and Infectious Diseases (NIAID), Clinical Center (CC), National Heart, Lung and Blood Institute (NHLBI), National Institute of Arthritis and Musculoskeletal and Skin Diseases (NIAMS), National Center for Advancing Translational Sciences (NCATS), National Institute of Neurological Disorders and Stroke (NINDS), and the National Institute of Mental Health (NIMH). Since its inception in 2001, CMRP’s ability to provide rapid responses, high-quality solutions, and to recruit and retain experts with a variety of backgrounds to meet the growing research portfolios of NCI, NIAID, CC, NHLBI, NIAMS, NCATS, NINDS, and NIMH has led to the considerable expansion of the program and its repertoire of support services. CMRP’s support services are strategically aligned with the program’s mission to provide comprehensive, dedicated support to assist National Institutes of Health researchers in providing the highest quality of clinical research in compliance with applicable regulations and guidelines, maintaining data integrity, and protecting human subjects. For the scientific advancement of clinical research, CMRP services include comprehensive clinical trials, regulatory, pharmacovigilance, protocol navigation and development, and programmatic and project management support for facilitating the conduct of 400+ Phase I, II, and III domestic and international trials on a yearly basis. These trials investigate the prevention, diagnosis, treatment of, and therapies for cancer, influenza, HIV, and other infectious diseases and viruses such as hepatitis C, tuberculosis, malaria, and Ebola virus; heart, lung, and blood

  20. Entanglement distillation protocols and number theory

    NASA Astrophysics Data System (ADS)

    Bombin, H.; Martin-Delgado, M. A.

    2005-09-01

    We show that the analysis of entanglement distillation protocols for qudits of arbitrary dimension D benefits from applying basic concepts from number theory, since the set ZDn associated with Bell diagonal states is a module rather than a vector space. We find that a partition of ZDn into divisor classes characterizes the invariant properties of mixed Bell diagonal states under local permutations. We construct a very general class of recursion protocols by means of unitary operations implementing these local permutations. We study these distillation protocols depending on whether we use twirling operations in the intermediate steps or not, and we study them both analytically and numerically with Monte Carlo methods. In the absence of twirling operations, we construct extensions of the quantum privacy algorithms valid for secure communications with qudits of any dimension D . When D is a prime number, we show that distillation protocols are optimal both qualitatively and quantitatively.

  1. Guide de pratique clinique pour les lésions cérébrales traumatiques légères et les symptômes persistants

    PubMed Central

    Marshall, Shawn; Bayley, Mark; McCullagh, Scott; Velikonja, Diana; Berrigan, Lindsay

    2012-01-01

    Résumé Objectif Présenter les nouvelles lignes directrices sur la prise en charge des lésions cérébrales traumatiques légères (LCTL) et les symptômes persistants post-commotion (SPPC) afin de renseigner et d’orienter les médecins qui prennent en charge des patients qui se remettent d’une LCTL. Qualité des données On a effectué une recherche des guides de pratique clinique existants portant sur les LCTL et une synthèse critique des ouvrages scientifiques évaluant le traitement des SPPC. Étant donné la rareté des conseils sur la prise en charge des SPPC dans les travaux sur les lésions cérébrales traumatiques, une deuxième recherche documentaire a été faite pour recenser les guides de pratique clinique et les synthèses critiques concernant la prise en charge de ces symptômes communs dans la population en général. On a convoqué des professionnels de la santé provenant de différentes disciplines et régions du Canada et de l’étranger à une conférence consensuelle d’experts pour examiner les lignes directrices et les données probantes existantes et élaborer un guide complet pour la prise en charge des LCTL et des SPPC. Message principal À l’aide d’un processus Delphi modifié, on a produit 71 recommandations portant sur le diagnostic et la prise en charge des LCTL et des SPPC. De plus, on a inclus dans le guide de nombreuses ressources et des outils pour faciliter la mise en œuvre des recommandations. Conclusion Un guide de pratique clinique a été élaboré pour aider les professionnels de la santé à fournir des soins fondés sur les données probantes et les pratiques exemplaires à la population complexe de personnes qui ont des SPPC à la suite d’une LCTL.

  2. Caracterisation des revetements par projection thermique a haute vitesse obtenus a partir de differentes poudres de wc-10co-4cr pour des applications en aeronautique =

    NASA Astrophysics Data System (ADS)

    Quintero Malpica, Alfonso

    Les revetements par projection thermique HVOF (High Velocity Oxy-Fuel) sont communement utilises dans l'industrie aeronautique, notamment au sein du partenaire industriel du projet (Tecnickrome Aeronautique Inc), comme des remplacants pour les revetements produits par l'electrodeposition du chrome dur due aux problemes environnementaux. Ce projet avait pour but de trouver une poudre alternative a celle qui est actuellement utilisee pour la production des revetements de type WC-10Co-4Cr obtenus avec la technologie de projection thermique a haute vitesse HVOF et en utilisant le systeme de projection HVOF-JET KOTERTM III. Dans un premier temps, cinq poudres incluant celle de reference, ayant des distributions granulometriques differentes, ont ete projetees dans le but d'identifier quelles poudres pouvaient etre utilisees avec le systeme de projection HVOF-JET KOTERTM III en gardant des parametres similaires (debit d'hydrogene, debit d'oxygene, debit de poudre et distance de projection) que pour la poudre de reference. Les revetements obtenus a partir des poudres etudiees ont ete evalues selon les criteres d'acceptation des revetements sollicites par les principaux manufacturiers des trains d'atterrissage. Les tests ont porte sur l'epaisseur, l'adhesion, la microstructure, la microdurete, les contraintes residuelles et la rugosite. A partir des resultats obtenus, seulement deux poudres ont rencontre toutes les proprietes demandees par les specifications aeronautiques. L'influence de la variation de la distance de projection sur la qualite des revetements a ete etudiee. Cinq distances (100, 125, 150, 175 et 200 mm) ont ete choisies pour faire la projection des deux poudres selectionnees. Les revetements obtenus ont montre de proprietes des revetements similaires (epaisseur, adhesion, microstructure, microdurete, contraintes residuelles et rugosite). Il a ete trouve que la distance de projection est un parametre indirect du systeme de projection HVOF-JET KOTERTM III et

  3. Security of the arbitrated quantum signature protocols revisited

    NASA Astrophysics Data System (ADS)

    Kejia, Zhang; Dan, Li; Qi, Su

    2014-01-01

    Recently, much attention has been paid to the study of arbitrated quantum signature (AQS). Among these studies, the cryptanalysis of some AQS protocols and a series of improved ideas have been proposed. Compared with the previous analysis, we present a security criterion, which can judge whether an AQS protocol is able to prevent the receiver (i.e. one participant in the signature protocol) from forging a legal signature. According to our results, it can be seen that most AQS protocols which are based on the Zeng and Keitel (ZK) model are susceptible to a forgery attack. Furthermore, we present an improved idea of the ZK protocol. Finally, some supplement discussions and several interesting topics are provided.

  4. An electronic specimen collection protocol schema (eSCPS). Document architecture for specimen management and the exchange of specimen collection protocols between biobanking information systems.

    PubMed

    Eminaga, O; Semjonow, A; Oezguer, E; Herden, J; Akbarov, I; Tok, A; Engelmann, U; Wille, S

    2014-01-01

    The integrity of collection protocols in biobanking is essential for a high-quality sample preparation process. However, there is not currently a well-defined universal method for integrating collection protocols in the biobanking information system (BIMS). Therefore, an electronic schema of the collection protocol that is based on Extensible Markup Language (XML) is required to maintain the integrity and enable the exchange of collection protocols. The development and implementation of an electronic specimen collection protocol schema (eSCPS) was performed at two institutions (Muenster and Cologne) in three stages. First, we analyzed the infrastructure that was already established at both the biorepository and the hospital information systems of these institutions and determined the requirements for the sufficient preparation of specimens and documentation. Second, we designed an eSCPS according to these requirements. Finally, a prospective study was conducted to implement and evaluate the novel schema in the current BIMS. We designed an eSCPS that provides all of the relevant information about collection protocols. Ten electronic collection protocols were generated using the supplementary Protocol Editor tool, and these protocols were successfully implemented in the existing BIMS. Moreover, an electronic list of collection protocols for the current studies being performed at each institution was included, new collection protocols were added, and the existing protocols were redesigned to be modifiable. The documentation time was significantly reduced after implementing the eSCPS (5 ± 2 min vs. 7 ± 3 min; p = 0.0002). The eSCPS improves the integrity and facilitates the exchange of specimen collection protocols in the existing open-source BIMS.

  5. Cirrus: Inducing Subject Models from Protocol Data

    DTIC Science & Technology

    1988-08-16

    behavior scientists, and more recently, by knowledge engineers who wish to embed the knowledge of human experts in an expert system. However, protocol...analysis is notoriously difficult and time comsuming . Several systems have been developed to aid in protocol analysis. Waterman and Newell (1971, 1973...developed a system that could read the natural langauge of the protocol and produce a formal trace of it (a problem behavior graph). The system, however

  6. Security Verification of Secure MANET Routing Protocols

    DTIC Science & Technology

    2012-03-22

    SECURITY VERIFICATION OF SECURE MANET ROUTING PROTOCOLS THESIS Matthew F. Steele, Captain, USAF AFIT/GCS/ ENG /12-03 DEPARTMENT OF THE AIR FORCE AIR...States AFIT/GCS/ ENG /12-03 SECURITY VERIFICATION OF SECURE MANET ROUTING PROTOCOLS THESIS Presented to the Faculty Department of Electrical and Computer...DISTRIBUTION UNLIMITED AFIT/GCS/ ENG /12-03 SECURITY VERIFICATION OF SECURE MANET ROUTING PROTOCOLS Matthew F. Steele, B.S.E.E. Captain, USAF

  7. Establishing treatment protocols for clinical mastitis.

    PubMed

    Roberson, Jerry R

    2003-03-01

    Each farm has a unique mix of mastitis pathogens and management procedures that have evolved over time. The herd veterinarian should work with the manager/owner to systematically develop treatment protocols that meet the needs and management of the farm. To establish a mastitis treatment protocol, it is necessary to develop a system to routinely identify clinical mastitis cases, develop a herd-specific severity level assessment system, manage the clinical mastitis cases based on severity level and culture result (when available), avoid antibiotic residues, and monitor the success of the system and alter the protocol as necessary.

  8. Recommended features of protocols for long-term ecological monitoring

    USGS Publications Warehouse

    Oakley, Karen L.; Boudreau, Susan L.; Humphrey, Sioux-Z

    2001-01-01

    In 1991, the National Park Service (NPS) selected seven parks to serve as prototypes for development of a long-term ecological monitoring program. Denali National Park and Preserve was one of the prototype parks selected. The principal focus of this national program was to detect and document resource changes and to understand the forces driving those changes. One of the major tasks of each prototype park was to develop monitoring protocols. In this paper, we discuss some lessons learned and what we believe to be the most important features of protocols.One of the many lessons we have learned is that monitoring protocols vary greatly in content and format. This variation leads to confusion about what information protocols should contain and how they should be formatted. Problems we have observed in existing protocols include (1) not providing enough detail, (2) omitting critical topics (such as data management), and (3) mixing explanation with instructions. Once written, protocols often sit on the shelf to collect dust, allowing methods changes to occur without being adequately considered, tested, or documented. Because a lengthy and costly research effort is often needed to develop protocols, a vision of what the final product should look like is helpful. Based on our involvement with the prototype monitoring program for Denali (Oakley and Boudreau 2000), we recommend key features of protocols, including a scheme for linking protocols to data in the data management system and for tracking protocol revisions. A protocol system is crucial for producing long-term data sets of known quality that meet program objectives.

  9. The Interplanetary Overlay Networking Protocol Accelerator

    NASA Technical Reports Server (NTRS)

    Pang, Jackson; Torgerson, Jordan L.; Clare, Loren P.

    2008-01-01

    A document describes the Interplanetary Overlay Networking Protocol Accelerator (IONAC) an electronic apparatus, now under development, for relaying data at high rates in spacecraft and interplanetary radio-communication systems utilizing a delay-tolerant networking protocol. The protocol includes provisions for transmission and reception of data in bundles (essentially, messages), transfer of custody of a bundle to a recipient relay station at each step of a relay, and return receipts. Because of limitations on energy resources available for such relays, data rates attainable in a conventional software implementation of the protocol are lower than those needed, at any given reasonable energy-consumption rate. Therefore, a main goal in developing the IONAC is to reduce the energy consumption by an order of magnitude and the data-throughput capability by two orders of magnitude. The IONAC prototype is a field-programmable gate array that serves as a reconfigurable hybrid (hardware/ firmware) system for implementation of the protocol. The prototype can decode 108,000 bundles per second and encode 100,000 bundles per second. It includes a bundle-cache static randomaccess memory that enables maintenance of a throughput of 2.7Gb/s, and an Ethernet convergence layer that supports a duplex throughput of 1Gb/s.

  10. The Space Communications Protocol Standards Program

    NASA Technical Reports Server (NTRS)

    Jeffries, Alan; Hooke, Adrian J.

    1994-01-01

    In the fall of 1992 NASA and the Department of Defense chartered a technical team to explore the possibility of developing a common set of space data communications standards for potential dual-use across the U.S. national space mission support infrastructure. The team focused on the data communications needs of those activities associated with on-lined control of civil and military aircraft. A two-pronged approach was adopted: a top-down survey of representative civil and military space data communications requirements was conducted; and a bottom-up analysis of available standard data communications protocols was performed. A striking intersection of civil and military space mission requirements emerged, and an equally striking consensus on the approach towards joint civil and military space protocol development was reached. The team concluded that wide segments of the U.S. civil and military space communities have common needs for: (1) an efficient file transfer protocol; (2) various flavors of underlying data transport service; (3) an optional data protection mechanism to assure end-to-end security of message exchange; and (4) an efficient internetworking protocol. These recommendations led to initiating a program to develop a suite of protocols based on these findings. This paper describes the current status of this program.

  11. Clomiphene citrate 'stair-step' protocol vs. traditional protocol in patients with polycystic ovary syndrome: a randomized controlled trial.

    PubMed

    Deveci, Canan Dura; Demir, Berfu; Sengul, Ozlem; Dilbaz, Berna; Goktolga, Umit

    2015-01-01

    To evaluate the efficacy of the stair-step protocol using clomiphene citrate (CC) and to assess the uterine and systemic side effects in patients with polycystic ovary syndrome (PCOS). A total of 60 PCOS patients who failed to respond to 50 mg/day for 5 days of CC treatment within the cycle were randomly allocated to the control (traditional protocol) and study (stair-step protocol) groups. In the stair-step protocol,patients were treated with CC 50 mg/day for 5 days and then in nonresponsive patients, the dosage was increased to 100 mg/day for 5 days in the same cycle. Patients who failed the 50 mg/day CC treatment in the previous cycle were stimulated with 100 mg/day CC and were accepted as the control group. Ovulation and pregnancy rates, duration of treatment and uterine and systemic side effects were evaluated. Ovulation and pregnancy rates were similar between the stair-step and the control group (43.3 vs. 33.3 %, respectively) (16.7 vs. 10 %, respectively). The duration of treatment was significantly shorter in stair-step compared to traditional protocol (20.5 ± 2.0 vs. 48.6 ± 2.4 days, respectively). There were no significant differences in the systemic side effects between the groups. Uterine side effects were evaluated with endometrial thickness and uterine artery Doppler ultrasound; no significant differences were observed in stair-step compared to traditional protocol. The stair-step protocol was determined to have a significantly shorter treatment period without any detrimental effect on the ovulation and pregnancy rates.

  12. 50 CFR 600.757 - Operational protocols.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Operational protocols. 600.757 Section 600.757 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC... Operational protocols. (a) Services of conveners and facilitators. A Council or NMFS may employ or enter into...

  13. Survey of Protocols for the Manual Segmentation of the Hippocampus: Preparatory Steps Towards a Joint EADC-ADNI Harmonized Protocol

    PubMed Central

    Boccardi, Marina; Ganzola, Rossana; Bocchetta, Martina; Pievani, Michela; Redolfi, Alberto; Bartzokis, George; Camicioli, Richard; Csernansky, John G.; de Leon, Mony J.; deToledo-Morrell, Leyla; Killiany, Ronald J.; Lehéricy, Stéphane; Pantel, Johannes; Pruessner, Jens C.; Soininen, H.; Watson, Craig; Duchesne, Simon; Jack, Clifford R.; Frisoni, Giovanni B.

    2013-01-01

    Manual segmentation from magnetic resonance imaging (MR) is the gold standard for evaluating hippocampal atrophy in Alzheimer’s disease (AD). Nonetheless, different segmentation protocols provide up to 2.5-fold volume differences. Here we surveyed the most frequently used segmentation protocols in the AD literature as a preliminary step for international harmonization. The anatomical landmarks (anteriormost and posteriormost slices, superior, inferior, medial, and lateral borders) were identified from 12 published protocols for hippocampal manual segmentation ([Abbreviation] first author, publication year: [B] Bartzokis, 1998; [C] Convit, 1997; [dTM] deToledo-Morrell, 2004; [H] Haller, 1997; [J] Jack, 1994; [K] Killiany, 1993; [L] Lehericy, 1994; [M] Malykhin, 2007; [Pa] Pantel, 2000; [Pr] Pruessner, 2000; [S] Soininen, 1994; [W] Watson, 1992). The hippocampi of one healthy control and one AD patient taken from the 1.5T MR ADNI database were segmented by a single rater according to each protocol. The accuracy of the protocols’ interpretation and translation into practice was checked with lead authors of protocols through individual interactive web conferences. Semantically harmonized landmarks and differences were then extracted, regarding: (a) the posteriormost slice, protocol [B] being the most restrictive, and [H, M, Pa, Pr, S] the most inclusive; (b) inclusion [C, dTM, J, L, M, Pr, W] or exclusion [B, H, K, Pa, S] of alveus/fimbria; (c) separation from the parahippocampal gyrus, [C] being the most restrictive, [B, dTM, H, J, Pa, S] the most inclusive. There were no substantial differences in the definition of the anteriormost slice. This survey will allow us to operationalize differences among protocols into tracing units, measure their impact on the repeatability and diagnostic accuracy of manual hippocampal segmentation, and finally develop a harmonized protocol. PMID:21971451

  14. Evaluation of a single-scan protocol for radiochromic film dosimetry.

    PubMed

    Shimohigashi, Yoshinobu; Araki, Fujio; Maruyama, Masato; Nakaguchi, Yuji; Kuwahara, Satoshi; Nagasue, Nozomu; Kai, Yudai

    2015-03-08

    The purpose of this study was to evaluate a single-scan protocol using Gafchromic EBT3 film (EBT3) by comparing it with the commonly used 24-hr measurement protocol for radiochromic film dosimetry. Radiochromic film is generally scanned 24 hr after film exposure (24-hr protocol). The single-scan protocol enables measurement results within a short time using only the verification film, one calibration film, and unirradiated film. The single-scan protocol was scanned 30 min after film irradiation. The EBT3 calibration curves were obtained with the multichannel film dosimetry method. The dose verifications for each protocol were performed with the step pattern, pyramid pattern, and clinical treatment plans for intensity-modulated radiation therapy (IMRT). The absolute dose distributions for each protocol were compared with those calculated by the treatment planning system (TPS) using gamma evaluation at 3% and 3 mm. The dose distribution for the single-scan protocol was within 2% of the 24-hr protocol dose distribution. For the step pattern, the absolute dose discrepancies between the TPS for the single-scan and 24-hr protocols were 2.0 ± 1.8 cGy and 1.4 ± 1.2 cGy at the dose plateau, respectively. The pass rates were 96.0% for the single-scan protocol and 95.9% for the 24-hr protocol. Similarly, the dose discrepancies for the pyramid pattern were 3.6 ± 3.5cGy and 2.9 ± 3.3 cGy, respectively, while the pass rates for the pyramid pattern were 95.3% and 96.4%, respectively. The average pass rates for the four IMRT plans were 96.7% ± 1.8% for the single-scan protocol and 97.3% ± 1.4% for the 24-hr protocol. Thus, the single-scan protocol measurement is useful for dose verification of IMRT, based on its accuracy and efficiency.

  15. Quantum CSMA/CD Synchronous Communication Protocol with Entanglement

    NASA Astrophysics Data System (ADS)

    Zhou, Nanrun; Zeng, Binyang; Gong, Lihua

    By utilizing the characteristics of quantum entanglement, a quantum synchronous communication protocol for Carrier Sense Multiple Access with Collision Detection (CSMA/CD) is presented. The proposed protocol divides the link into the busy time and leisure one, where the data frames are sent via classical channels and the distribution of quantum entanglement is supposed to be completed at leisure time and the quantum acknowledge frames are sent via quantum entanglement channels. The time span between two successfully delivered messages can be significantly reduced in this proposed protocol. It is shown that the performance of the CSMA/CD protocol can be improved significantly since the collision can be reduced to a certain extent. The proposed protocol has great significance in quantum communication.

  16. Optimizing the high-resolution manometry (HRM) study protocol.

    PubMed

    Patel, A; Ding, A; Mirza, F; Gyawali, C P

    2015-02-01

    Intolerance of the esophageal manometry catheter may prolong high-resolution manometry (HRM) studies and increase patient distress. We assessed the impact of obtaining the landmark phase at the end of the study when the patient has acclimatized to the HRM catheter. 366 patients (mean age 55.4 ± 0.8 years, 62.0% female) undergoing esophageal HRM over a 1-year period were studied. The standard protocol consisted of the landmark phase, 10 5 mL water swallows 20-30 s apart, and multiple rapid swallows where 4-6 2 mL swallows were administered in rapid succession. The modified protocol consisted of the landmark phase at the end of the study after test swallows. Study duration, technical characteristics, indications, and motor findings were compared between standard and modified protocols. Of the 366 patients, 89.6% underwent the standard protocol (study duration 12.9 ± 0.3 min). In 10.4% with poor catheter tolerance undergoing the modified protocol, study duration was significantly longer (15.6 ± 1.0 min, p = 0.004) despite similar duration of study maneuvers. Only elevated upper esophageal sphincter basal pressures at the beginning of the study segregated modified protocol patients. The 95th percentile time to landmark phase in the standard protocol patients was 6.1 min; as many as 31.4% of modified protocol patients could not obtain their first study maneuver within this period (p = 0.0003). Interpretation was not impacted by shifting the landmark phase to the end of the study. Modification of the HRM study protocol with the landmark phase obtained at the end of the study optimizes study duration without compromising quality. © 2014 John Wiley & Sons Ltd.

  17. Automated Software Generation Approaches for the Design and Development of Guidance and Control Systems Software (Les Differentes Approches Generation pour la Conception et le Developpement de Logiciels de Guidage et de Pilotage)

    DTIC Science & Technology

    1992-03-01

    de Logiciels") etaient en cours de developpement pour resoudre des problimes similaires dans le monde de la gestion . le Panel... gestion des sp cifications, d’algorithmes et de reprtsentations. Techniques et Sciences Informatiques, 4(3), 1985. 4-21 R. Jacquart, M. Lemoine, and G...Guidance and Control Systems Software (Les Diff~rentes Approches "G6neration" pour la Conception et le D~veloppement de Logiciels de Guidage et de

  18. Ocean Optics Protocols for Satellite Ocean Color Sensor Validation. Volume 6; Special Topics in Ocean Optics Protocols and Appendices; Revised

    NASA Technical Reports Server (NTRS)

    Mueller, J. L. (Editor); Fargion, Giulietta S. (Editor); McClain, Charles R. (Editor)

    2003-01-01

    This document stipulates protocols for measuring bio-optical and radiometric data for the Sensor Intercomparison and Merger for Biological and Interdisciplinary Oceanic Studies (SIMBIOS) Project activities and algorithm development. The document is organized into 6 separate volumes as Ocean Optics Protocols for Satellite Ocean Color Sensor Validation, Revision 4. Volume I: Introduction, Background and Conventions; Volume II: Instrument Specifications, Characterization and Calibration; Volume III: Radiometric Measurements and Data Analysis Methods; Volume IV: Inherent Optical Properties: Instruments, Characterization, Field Measurements and Data Analysis Protocols; Volume V: Biogeochemical and Bio-Optical Measurements and Data Analysis Methods; Volume VI: Special Topics in Ocean Optics Protocols and Appendices. The earlier version of Ocean Optics Protocols for Satellite Ocean Color Sensor Validation, Revision 3 (Mueller and Fargion 2002, Volumes 1 and 2) is entirely superseded by the six volumes of Revision 4 listed above.

  19. 21 CFR 814.19 - Product development protocol (PDP).

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 8 2011-04-01 2011-04-01 false Product development protocol (PDP). 814.19 Section...) MEDICAL DEVICES PREMARKET APPROVAL OF MEDICAL DEVICES General § 814.19 Product development protocol (PDP). A class III device for which a product development protocol has been declared completed by FDA under...

  20. 21 CFR 814.19 - Product development protocol (PDP).

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Product development protocol (PDP). 814.19 Section...) MEDICAL DEVICES PREMARKET APPROVAL OF MEDICAL DEVICES General § 814.19 Product development protocol (PDP). A class III device for which a product development protocol has been declared completed by FDA under...

  1. 42 CFR 438.352 - External quality review protocols.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false External quality review protocols. 438.352 Section... SERVICES (CONTINUED) MEDICAL ASSISTANCE PROGRAMS MANAGED CARE External Quality Review § 438.352 External quality review protocols. Each protocol must specify— (a) The data to be gathered; (b) The sources of the...

  2. Réseaux holographiques à 6000 t/mm pour l'experience fuse de spectroscopie à haute résolution dans l'ultraviolet lolntain

    NASA Astrophysics Data System (ADS)

    Grange, Robert; Dauer, Véronique; Saisse, Michel; Flamand, Jean; Bonnemason, Francis

    2018-04-01

    This paper, "Réseaux holographiques à 6000 t/mm pour l'experience fuse de spectroscopie à haute résolution dans l'ultraviolet lolntain," was presented as part of International Conference on Space Optics—ICSO 1997, held in Toulouse, France.

  3. Passeport pour les deux infinis: an educational project in French

    NASA Astrophysics Data System (ADS)

    Arnaud, Nicolas; Descotes-Genon, Sébastien; Kerhoas-Cavata, Sophie; Paul, Jacques; Robert-Esil, Jean-Luc; Royole-Degieux, Perrine

    2016-04-01

    Passeport pour les deux infinis (;Passport for the two infinities;, in short Pass2i) is a French educational project aiming at promoting the physics of the infinitely small (particle physics) and of the infinitely big (cosmology & astrophysics) to high-school teachers and students. It is managed since 2009 by a small team of outreach experts (physicists and engineers) from the CNRS and the CEA. The Pass2i cornerstone is a reversible book - where each side explores one of the two infinities - and which is given for free to science high school teachers who request it, thanks to the support of French funding agencies. The Pass2i non-profit association wants to be a bridge between science and education: training sessions are organized for teachers, educational resources created and made available for download on the Pass2i website (http://www.passeport2i.fr).

  4. Soft Drink “Pouring Rights”: Marketing Empty Calories to Children

    PubMed Central

    Nestle, Marion

    2000-01-01

    Healthy People 2010 objectives call for meals and snacks served in schools to contribute to overall diets that meet federal dietary guidelines. Sales in schools of foods and drinks high in calories and low in nutrients undermine this health objective, as well as participation in the more nutritious, federally sponsored, school lunch programs. Competitive foods also undermine nutrition information taught in the classroom. Lucrative contracts between school districts and soft drink companies for exclusive rights to sell one brand are the latest development in the increasing commercialization of school food. These contracts, intended to elicit brand loyalty among young children who have a lifetime of purchases ahead of them, are especially questionable because they place schools in the position of “pushing” soft drink consumption. “Pouring rights” contracts deserve attention from public health professionals concerned about the nutritional quality of children's diets. Imagesp308-ap313-a PMID:11059423

  5. A secure RFID authentication protocol adopting error correction code.

    PubMed

    Chen, Chien-Ming; Chen, Shuai-Min; Zheng, Xinying; Chen, Pei-Yu; Sun, Hung-Min

    2014-01-01

    RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our protocol to provide key updating. Based on the secrecy of shared keys, the reader and the tag can establish a mutual authenticity relationship. Further analysis of the protocol showed that it also satisfies integrity, forward secrecy, anonymity, and untraceability. Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. We also compare our protocol with previous works in terms of performance.

  6. A Secure RFID Authentication Protocol Adopting Error Correction Code

    PubMed Central

    Zheng, Xinying; Chen, Pei-Yu

    2014-01-01

    RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our protocol to provide key updating. Based on the secrecy of shared keys, the reader and the tag can establish a mutual authenticity relationship. Further analysis of the protocol showed that it also satisfies integrity, forward secrecy, anonymity, and untraceability. Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. We also compare our protocol with previous works in terms of performance. PMID:24959619

  7. Breaking Megrelishvili protocol using matrix diagonalization

    NASA Astrophysics Data System (ADS)

    Arzaki, Muhammad; Triantoro Murdiansyah, Danang; Adi Prabowo, Satrio

    2018-03-01

    In this article we conduct a theoretical security analysis of Megrelishvili protocol—a linear algebra-based key agreement between two participants. We study the computational complexity of Megrelishvili vector-matrix problem (MVMP) as a mathematical problem that strongly relates to the security of Megrelishvili protocol. In particular, we investigate the asymptotic upper bounds for the running time and memory requirement of the MVMP that involves diagonalizable public matrix. Specifically, we devise a diagonalization method for solving the MVMP that is asymptotically faster than all of the previously existing algorithms. We also found an important counterintuitive result: the utilization of primitive matrix in Megrelishvili protocol makes the protocol more vulnerable to attacks.

  8. MTP: An atomic multicast transport protocol

    NASA Technical Reports Server (NTRS)

    Freier, Alan O.; Marzullo, Keith

    1990-01-01

    Multicast transport protocol (MTP); a reliable transport protocol that utilizes the multicast strategy of applicable lower layer network architectures is described. In addition to transporting data reliably and efficiently, MTP provides the client synchronization necessary for agreement on the receipt of data and the joining of the group of communicants.

  9. 16 CFR 1212.4 - Test protocol.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 2 2012-01-01 2012-01-01 false Test protocol. 1212.4 Section 1212.4... STANDARD FOR MULTI-PURPOSE LIGHTERS Requirements for Child-Resistance § 1212.4 Test protocol. (a) Child test panel. (1) The test to determine if a multi-purpose lighter is resistant to successful operation...

  10. 21 CFR 312.83 - Treatment protocols.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 5 2013-04-01 2013-04-01 false Treatment protocols. 312.83 Section 312.83 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) DRUGS FOR...-debilitating Illnesses § 312.83 Treatment protocols. If the preliminary analysis of phase 2 test results...

  11. 21 CFR 312.83 - Treatment protocols.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 5 2010-04-01 2010-04-01 false Treatment protocols. 312.83 Section 312.83 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) DRUGS FOR...-debilitating Illnesses § 312.83 Treatment protocols. If the preliminary analysis of phase 2 test results...

  12. 21 CFR 312.83 - Treatment protocols.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 5 2012-04-01 2012-04-01 false Treatment protocols. 312.83 Section 312.83 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) DRUGS FOR...-debilitating Illnesses § 312.83 Treatment protocols. If the preliminary analysis of phase 2 test results...

  13. Detailed analysis of routing protocols with different network limitations

    NASA Astrophysics Data System (ADS)

    Masood, Mohsin; Abuhelala, Mohamed; Glesk, Ivan

    2016-12-01

    In network communication field, routing protocols have got a significant role which are not only used in networks to handle the user data but also to monitor the different network environments. Dynamic routing protocols such as OSPF, EIGRP and RIP are used for forwarding user data to its destination by instantly detecting the dynamic changes across the network. The dynamic changes in the network can be in the form of topological changes, congestions, links failure etc. Therefore, it becomes a challenge to develop and implement dynamic routing protocols that fulfills the network requirements. Hence, each routing protocol has its own characteristics such as convergence activity, routing metric, routing table etc. and will perform differently in various network environments. This paper presents a comprehensive study of static and dynamic routing, along with dynamic routing protocols. Experiments that are conducted under various network limitations are presented using the OPNET tool. The performance of each of dynamic routing protocols are monitored and explained in the form of simulated results using network parameters. The results are analyzed, in order to provide a clear understanding of each protocol performance for the selection of the proper protocol for a given network environment.

  14. The Robinson Protocol: a treadmill anaerobic performance test.

    PubMed

    Robinson, Ellyn M; Graham, Louise B; Headley, Samuel A

    2004-08-01

    The current investigation was designed to further examine the reliability of the Robinson protocol, which is a run-to-exhaustion treadmill test. Robinson (10) originally examined this protocol with 5 subjects. The significance of the initial exploratory study was the impetus for expanding the study to examine the reliability of the protocol with a larger sample. Fifteen male subjects participated in 3 trial runs on the treadmill. The first trial was a modified McConnell (7) test to determine the aerobic capacity of each subject. The second and third trials were identical Robinson protocols (10). The first trial run mean, in seconds (262.04 +/- 74.50), was not significantly different from the second trial run mean (257.30 +/- 72.65), p = 0.526 (2 tailed). As expected, trial 1 and trial 2 were highly correlated (intraclass) (r = 0.927, p < 0.001). These results provide additional support for the hypothesis that the Robinson protocol with a greater subject pool is a reliable protocol that can be used in research studies interested in examining various physiological interventions or anaerobic training.

  15. Design and Verification of a Distributed Communication Protocol

    NASA Technical Reports Server (NTRS)

    Munoz, Cesar A.; Goodloe, Alwyn E.

    2009-01-01

    The safety of remotely operated vehicles depends on the correctness of the distributed protocol that facilitates the communication between the vehicle and the operator. A failure in this communication can result in catastrophic loss of the vehicle. To complicate matters, the communication system may be required to satisfy several, possibly conflicting, requirements. The design of protocols is typically an informal process based on successive iterations of a prototype implementation. Yet distributed protocols are notoriously difficult to get correct using such informal techniques. We present a formal specification of the design of a distributed protocol intended for use in a remotely operated vehicle, which is built from the composition of several simpler protocols. We demonstrate proof strategies that allow us to prove properties of each component protocol individually while ensuring that the property is preserved in the composition forming the entire system. Given that designs are likely to evolve as additional requirements emerge, we show how we have automated most of the repetitive proof steps to enable verification of rapidly changing designs.

  16. The reliable multicast protocol application programming interface

    NASA Technical Reports Server (NTRS)

    Montgomery , Todd; Whetten, Brian

    1995-01-01

    The Application Programming Interface for the Berkeley/WVU implementation of the Reliable Multicast Protocol is described. This transport layer protocol is implemented as a user library that applications and software buses link against.

  17. Signature CERN-URSS

    ScienceCinema

    None

    2017-12-09

    Le DG W.Jentschke souhaite la bienvenue à l'assemblée et aux invités pour la signature du protocole entre le Cern et l'URSS qui est un événement important. C'est en 1955 que 55 visiteurs soviétiques ont visité le Cern pour la première fois. Le premier DG au Cern, F.Bloch, et Mons.Amaldi sont aussi présents. Tandis que le discours anglais de W.Jentschke est traduit en russe, le discours russe de Mons.Morozov est traduit en anglais.

  18. Evaluation of a single‐scan protocol for radiochromic film dosimetry

    PubMed Central

    Araki, Fujio; Maruyama, Masato; Nakaguchi, Yuji; Kuwahara, Satoshi; Nagasue, Nozomu; Kai, Yudai

    2015-01-01

    The purpose of this study was to evaluate a single‐scan protocol using Gafchromic EBT3 film (EBT3) by comparing it with the commonly used 24‐hr measurement protocol for radiochromic film dosimetry. Radiochromic film is generally scanned 24 hr after film exposure (24‐hr protocol). The single‐scan protocol enables measurement results within a short time using only the verification film, one calibration film, and unirradiated film. The single‐scan protocol was scanned 30 min after film irradiation. The EBT3 calibration curves were obtained with the multichannel film dosimetry method. The dose verifications for each protocol were performed with the step pattern, pyramid pattern, and clinical treatment plans for intensity‐modulated radiation therapy (IMRT). The absolute dose distributions for each protocol were compared with those calculated by the treatment planning system (TPS) using gamma evaluation at 3% and 3 mm. The dose distribution for the single‐scan protocol was within 2% of the 24‐hr protocol dose distribution. For the step pattern, the absolute dose discrepancies between the TPS for the single‐scan and 24‐hr protocols were 2.0±1.8 cGy and 1.4±1.2 cGy at the dose plateau, respectively. The pass rates were 96.0% for the single‐scan protocol and 95.9% for the 24‐hr protocol. Similarly, the dose discrepancies for the pyramid pattern were 3.6±3.5 cGy and 2.9±3.3 cGy, respectively, while the pass rates for the pyramid pattern were 95.3% and 96.4%, respectively. The average pass rates for the four IMRT plans were 96.7%±1.8% for the single‐scan protocol and 97.3%±1.4% for the 24‐hr protocol. Thus, the single‐scan protocol measurement is useful for dose verification of IMRT, based on its accuracy and efficiency. PACS number: 87.55.Qr PMID:26103194

  19. 16 CFR 1210.4 - Test protocol.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 2 2012-01-01 2012-01-01 false Test protocol. 1210.4 Section 1210.4... STANDARD FOR CIGARETTE LIGHTERS Requirements for Child Resistance § 1210.4 Test protocol. (a) Child test panel. (1) The test to determine if a lighter is resistant to successful operation by children uses a...

  20. Protocol for determining bull trout presence

    Treesearch

    James Peterson; Jason B. Dunham; Philip Howell; Russell Thurow; Scott Bonar

    2002-01-01

    The Western Division of the American Fisheries Society was requested to develop protocols for determining presence/absence and potential habitat suitability for bull trout. The general approach adopted is similar to the process for the marbled murrelet, whereby interim guidelines are initially used, and the protocols are subsequently refined as data are collected....

  1. Exploring the Implementation of Steganography Protocols on Quantum Audio Signals

    NASA Astrophysics Data System (ADS)

    Chen, Kehan; Yan, Fei; Iliyasu, Abdullah M.; Zhao, Jianping

    2018-02-01

    Two quantum audio steganography (QAS) protocols are proposed, each of which manipulates or modifies the least significant qubit (LSQb) of the host quantum audio signal that is encoded as an FRQA (flexible representation of quantum audio) audio content. The first protocol (i.e. the conventional LSQb QAS protocol or simply the cLSQ stego protocol) is built on the exchanges between qubits encoding the quantum audio message and the LSQb of the amplitude information in the host quantum audio samples. In the second protocol, the embedding procedure to realize it implants information from a quantum audio message deep into the constraint-imposed most significant qubit (MSQb) of the host quantum audio samples, we refer to it as the pseudo MSQb QAS protocol or simply the pMSQ stego protocol. The cLSQ stego protocol is designed to guarantee high imperceptibility between the host quantum audio and its stego version, whereas the pMSQ stego protocol ensures that the resulting stego quantum audio signal is better immune to illicit tampering and copyright violations (a.k.a. robustness). Built on the circuit model of quantum computation, the circuit networks to execute the embedding and extraction algorithms of both QAS protocols are determined and simulation-based experiments are conducted to demonstrate their implementation. Outcomes attest that both protocols offer promising trade-offs in terms of imperceptibility and robustness.

  2. Reflux gastro œsophagiens du prématuré: à propos d'un cas

    PubMed Central

    Ndour, Daouda

    2016-01-01

    Le reflux gastro-œsophagien (RGO) est un problème fréquent en néonatologie. Le RGO est souvent incriminé dans diverses manifestations cliniques survenant chez le prématuré. Diverses réponses reflexes physiologiques fournissent un lien biologique possible entre le reflux gastro-œsophagien; l'apnée et les bradycardies du prématuré sans que lien de causalité ne soit clairement établi. En outre les explorations et le traitement proposés chez le prématuré présentant un reflux sont très discutés. Nous rapportons le cas d'un nouveau-né prématuré admis en soins intensifs néonatals et présentant des épisodes d'apnées et de bradycardies. L'examen clinique et les résultats des explorations étaient normaux. Le diagnostic de reflux gastro œsophagien compliqué d'apnée et de bradycardie a été retenu. Le diagnostic de RGO est difficile à confirmer malgré l'arsenal des examens complémentaires. Le traitement médicamenteux n'a pas montré de réel intérêt pour l'amélioration des symptômes et devrait être réservé aux formes sévères. Nous nous proposons à partir de ce cas clinique de faire une revue de la littérature pour une mise au point sur les différents aspects du problème. PMID:28293359

  3. Sortie précoce en post-partum: résultats et facteurs de risque de ré hospitalization

    PubMed Central

    Kehila, Mehdi; Magdoud, Khaoula; Touhami, Omar; Abouda, Hassine Saber; Jeridi, Sara; Marzouk, Sofiène Ben; Mahjoub, Sami; Hmid, Rim Ben; Chanoufi, Mohamed Badis

    2016-01-01

    Cette étude nous permettra d'évaluer la pratique d'une sortie précoce en post-partum en analysant le taux de réadmission maternelle et en essayant d'identifier les facteurs de risque de ré hospitalisation. Il s'agit d'une étude prospective et analytique à propos de 1206 patientes sorties de l'hôpital à J1 du post-partum. Pour chaque patiente, nous avons noté les données épidémiologiques, le déroulement de la grossesse et de l'accouchement. Nous avons identifié les causes des ré hospitalisations ainsi que leur évolution. Le taux de césariennes était de 42%. Le taux de réadmissions maternelles était de 0,99%. La durée moyenne du séjour lors de la ré hospitalisation était de 26 heures. Les troubles du transit ont été le motif de consultation le plus fréquent (50% des cas) suivis par la fièvre (25% des cas). Les facteurs de risque de ré hospitalisation, identifiés dans notre étude étaient: la césarienne (p=0,004), la césarienne en urgence (p=0,016), l'anémie (p<0,001) et la thrombopénie (p=0,003). La sortie précoce en post-partum semble une option sure pour la maman et le nouveau-né sous réserve d'une information claire de la patiente et du respect des critères de sélection. PMID:27795786

  4. Combined Protocol for Acute Malnutrition Study (ComPAS) in rural South Sudan and urban Kenya: study protocol for a randomized controlled trial.

    PubMed

    Bailey, Jeanette; Lelijveld, Natasha; Marron, Bethany; Onyoo, Pamela; Ho, Lara S; Manary, Mark; Briend, André; Opondo, Charles; Kerac, Marko

    2018-04-24

    Acute malnutrition is a continuum condition, but severe and moderate forms are treated separately, with different protocols and therapeutic products, managed by separate United Nations agencies. The Combined Protocol for Acute Malnutrition Study (ComPAS) aims to simplify and unify the treatment of uncomplicated severe and moderate acute malnutrition (SAM and MAM) for children 6-59 months into one protocol in order to improve the global coverage, quality, continuity of care and cost-effectiveness of acute malnutrition treatment in resource-constrained settings. This study is a multi-site, cluster randomized non-inferiority trial with 12 clusters in Kenya and 12 clusters in South Sudan. Participants are 3600 children aged 6-59 months with uncomplicated acute malnutrition. This study will evaluate the impact of a simplified and combined protocol for the treatment of SAM and MAM compared to the standard protocol, which is the national treatment protocol in each country. We will assess recovery rate as a primary outcome and coverage, defaulting, death, length of stay, average weekly weight gain and average weekly mid-upper arm circumference (MUAC) gain as secondary outcomes. Recovery rate is defined across both treatment arms as MUAC ≥125 mm and no oedema for two consecutive visits. Per-protocol and intention-to-treat analyses will be conducted. If the combined protocol is shown to be non-inferior to the standard protocol, updating guidelines to use the combined protocol would eliminate the need for separate products, resources and procedures for MAM treatment. This would likely be more cost-effective, increase availability of services, enable earlier case finding and treatment before deterioration of MAM into SAM, promote better continuity of care and improve community perceptions of the programme. ISRCTN, ISRCTN30393230 . Registered on 16 March 2017.

  5. Electronic Voting Protocol Using Identity-Based Cryptography.

    PubMed

    Gallegos-Garcia, Gina; Tapia-Recillas, Horacio

    2015-01-01

    Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE). With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI). Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps.

  6. Electronic Voting Protocol Using Identity-Based Cryptography

    PubMed Central

    Gallegos-Garcia, Gina; Tapia-Recillas, Horacio

    2015-01-01

    Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE). With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI). Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps. PMID:26090515

  7. L’investigation de la contusion myocardique pour la fracture sternale à l’urgence

    PubMed Central

    Audette, Jean-Sébastien; Émond, Marcel; Scott, Hugh; Lortie, Gilles

    2014-01-01

    Résumé Objectif Décrire la pratique d’acquisition d’un électrocardiogramme (ECG) initial, d’ECG de contrôle ou d’un monitoring équivalent et du dosage des troponines chez les patients avec une fracture sternale évalués au département d’urgence ou par un médecin de première ligne. Type d’étude Étude rétrospective descriptive multicentrique. Contexte Deux centres académiques de traumatologie de la région de Québec au Canada. Participants 54 patients ayant subi une fracture sternale traumatique. Interventions Évaluation de l’acquisition d’ECG initial et à 6 heures post-traumatisme ou un monitoring équivalent ainsi que le dosage des troponines sanguines. Principaux paramètres à l’étude En ce qui concerne l’ECG, les critères de comparaison de qualité furent sélectionnés à partir d’opinions d’experts rapportées dans quatre études. L’utilisation d’un ECG initial et de contrôle 6 heures post-traumatisme ou d’un monitoring cardiaque de 6 heures représente la pratique recommandée par la plupart de ceux-ci pour le diagnostic de la contusion myocardique dans la fracture sternale. L’utilisation des troponines I sanguines, 4 à 8 heures suivant un traumatisme thoracique, a également été proposée par certains auteurs comme méthode de détection efficace des arythmies significatives secondaires à la contusion myocardique. Des analyses descriptives univariées et des tests de chi-carré furent effectués. Une valeur P < ,05 fut considérée significative. Résultats Trente-neuf (72 %) patients ont été évalués initialement avec un ECG, tandis que 18 (33 %) de ces patients ont eu une évaluation par ECG ou monitoring cardiaque après 6 heures à l’urgence. Seize patients (30 %) ont été évalués à l’aide du dosage des troponines I. Deux patients (4 %) ont présenté des anomalies électrocardiographiques et un seul patient (2 %) a présenté des troponines I élevées. Conclusion Les urgentologues

  8. Clean Quantum and Classical Communication Protocols.

    PubMed

    Buhrman, Harry; Christandl, Matthias; Perry, Christopher; Zuiddam, Jeroen

    2016-12-02

    By how much must the communication complexity of a function increase if we demand that the parties not only correctly compute the function but also return all registers (other than the one containing the answer) to their initial states at the end of the communication protocol? Protocols that achieve this are referred to as clean and the associated cost as the clean communication complexity. Here we present clean protocols for calculating the inner product of two n-bit strings, showing that (in the absence of preshared entanglement) at most n+3 qubits or n+O(sqrt[n]) bits of communication are required. The quantum protocol provides inspiration for obtaining the optimal method to implement distributed cnot gates in parallel while minimizing the amount of quantum communication. For more general functions, we show that nearly all Boolean functions require close to 2n bits of classical communication to compute and close to n qubits if the parties have access to preshared entanglement. Both of these values are maximal for their respective paradigms.

  9. Cryptanalysis and Improvement of the Semi-quantum Secret Sharing Protocol

    NASA Astrophysics Data System (ADS)

    Gao, Xiang; Zhang, Shibin; Chang, Yan

    2017-08-01

    Recently, Xie et al. Int. J. Theor. Phys. 54, 3819-3824, (2015) proposed a Semi-quantum secret sharing protocol (SQSS). Yin et al. Int. J. Theor. Phys. 55: 4027-4035, (2016) pointed out that this protocol suffers from the intercept-resend attack. Yin et al. also proposed an improved protocol. However, we find out that Yin et al.'s paper has some problems, we analyze Yin et al.'s paper, then proposed the improved semi-quantum secret sharing protocol. Our protocol is more secure and efficient, most importantly, our protocol satisfies the condition of semi-quantum.

  10. Performance analysis of routing protocols for IoT

    NASA Astrophysics Data System (ADS)

    Manda, Sridhar; Nalini, N.

    2018-04-01

    Internet of Things (IoT) is an arrangement of advancements that are between disciplinary. It is utilized to have compelling combination of both physical and computerized things. With IoT physical things can have personal virtual identities and participate in distributed computing. Realization of IoT needs the usage of sensors based on the sector for which IoT is integrated. For instance, in healthcare domain, IoT needs to have integration with wearable sensors used by patients. As sensor devices produce huge amount of data, often called big data, there should be efficient routing protocols in place. To the extent remote systems is worried there are some current protocols, for example, OLSR, DSR and AODV. It additionally tosses light into Trust based routing protocol for low-power and lossy systems (TRPL) for IoT. These are broadly utilized remote directing protocols. As IoT is developing round the corner, it is basic to investigate routing protocols that and evaluate their execution regarding throughput, end to end delay, and directing overhead. The execution experiences can help in settling on very much educated choices while incorporating remote systems with IoT. In this paper, we analyzed different routing protocols and their performance is compared. It is found that AODV showed better performance than other routing protocols aforementioned.

  11. Network protocols for real-time applications

    NASA Technical Reports Server (NTRS)

    Johnson, Marjory J.

    1987-01-01

    The Fiber Distributed Data Interface (FDDI) and the SAE AE-9B High Speed Ring Bus (HSRB) are emerging standards for high-performance token ring local area networks. FDDI was designed to be a general-purpose high-performance network. HSRB was designed specifically for military real-time applications. A workshop was conducted at NASA Ames Research Center in January, 1987 to compare and contrast these protocols with respect to their ability to support real-time applications. This report summarizes workshop presentations and includes an independent comparison of the two protocols. A conclusion reached at the workshop was that current protocols for the upper layers of the Open Systems Interconnection (OSI) network model are inadequate for real-time applications.

  12. Robust Multi-unit Auction Protocol against False-name Bids

    NASA Astrophysics Data System (ADS)

    Yokoo, Makoto; Sakurai, Yuko; Matsubara, Shigeo

    This paper presents a new multi-unit auction protocol (IR protocol) that is robust against false-name bids. Internet auctions have become an integral part of Electronic Commerce and a promising field for applying agent and Artificial Intelligence technologies. Although the Internet provides an excellent infrastructure for executing auctions, the possibility of a new type of cheating called false-name bids has been pointed out. A false-name bid is a bid submitted under a fictitious name. A protocol called LDS has been developed for combinatorial auctions of multiple different items and has proven to be robust against false-name bids. Although we can modify the LDS protocol to handle multi-unit auctions, in which multiple units of an identical item are auctioned, the protocol is complicated and requires the auctioneer to carefully pre-determine the combination of bundles to obtain a high social surplus or revenue. For the auctioneer, our newly developed IR protocol is easier to use than the LDS, since the combination of bundles is automatically determined in a flexible manner according to the declared evaluation values of agents. The evaluation results show that the IR protocol can obtain a better social surplus than that obtained by the LDS protocol.

  13. Anti-Noise Bidirectional Quantum Steganography Protocol with Large Payload

    NASA Astrophysics Data System (ADS)

    Qu, Zhiguo; Chen, Siyi; Ji, Sai; Ma, Songya; Wang, Xiaojun

    2018-06-01

    An anti-noise bidirectional quantum steganography protocol with large payload protocol is proposed in this paper. In the new protocol, Alice and Bob enable to transmit classical information bits to each other while teleporting secret quantum states covertly. The new protocol introduces the bidirectional quantum remote state preparation into the bidirectional quantum secure communication, not only to expand secret information from classical bits to quantum state, but also extract the phase and amplitude values of secret quantum state for greatly enlarging the capacity of secret information. The new protocol can also achieve better imperceptibility, since the eavesdropper can hardly detect the hidden channel or even obtain effective secret quantum states. Comparing with the previous quantum steganography achievements, due to its unique bidirectional quantum steganography, the new protocol can obtain higher transmission efficiency and better availability. Furthermore, the new algorithm can effectively resist quantum noises through theoretical analysis. Finally, the performance analysis proves the conclusion that the new protocol not only has good imperceptibility, high security, but also large payload.

  14. Anti-Noise Bidirectional Quantum Steganography Protocol with Large Payload

    NASA Astrophysics Data System (ADS)

    Qu, Zhiguo; Chen, Siyi; Ji, Sai; Ma, Songya; Wang, Xiaojun

    2018-03-01

    An anti-noise bidirectional quantum steganography protocol with large payload protocol is proposed in this paper. In the new protocol, Alice and Bob enable to transmit classical information bits to each other while teleporting secret quantum states covertly. The new protocol introduces the bidirectional quantum remote state preparation into the bidirectional quantum secure communication, not only to expand secret information from classical bits to quantum state, but also extract the phase and amplitude values of secret quantum state for greatly enlarging the capacity of secret information. The new protocol can also achieve better imperceptibility, since the eavesdropper can hardly detect the hidden channel or even obtain effective secret quantum states. Comparing with the previous quantum steganography achievements, due to its unique bidirectional quantum steganography, the new protocol can obtain higher transmission efficiency and better availability. Furthermore, the new algorithm can effectively resist quantum noises through theoretical analysis. Finally, the performance analysis proves the conclusion that the new protocol not only has good imperceptibility, high security, but also large payload.

  15. Fault-tolerant quantum blind signature protocols against collective noise

    NASA Astrophysics Data System (ADS)

    Zhang, Ming-Hui; Li, Hui-Fang

    2016-10-01

    This work proposes two fault-tolerant quantum blind signature protocols based on the entanglement swapping of logical Bell states, which are robust against two kinds of collective noises: the collective-dephasing noise and the collective-rotation noise, respectively. Both of the quantum blind signature protocols are constructed from four-qubit decoherence-free (DF) states, i.e., logical Bell qubits. The initial message is encoded on the logical Bell qubits with logical unitary operations, which will not destroy the anti-noise trait of the logical Bell qubits. Based on the fundamental property of quantum entanglement swapping, the receiver simply performs two Bell-state measurements (rather than four-qubit joint measurements) on the logical Bell qubits to verify the signature, which makes the protocols more convenient in a practical application. Different from the existing quantum signature protocols, our protocols can offer the high fidelity of quantum communication with the employment of logical qubits. Moreover, we hereinafter prove the security of the protocols against some individual eavesdropping attacks, and we show that our protocols have the characteristics of unforgeability, undeniability and blindness.

  16. SPIRIT 2013 Statement: defining standard protocol items for clinical trials.

    PubMed

    Chan, An-Wen; Tetzlaff, Jennifer M; Altman, Douglas G; Laupacis, Andreas; Gøtzsche, Peter C; Krle A-Jerić, Karmela; Hrobjartsson, Asbjørn; Mann, Howard; Dickersin, Kay; Berlin, Jesse A; Dore, Caroline J; Parulekar, Wendy R; Summerskill, William S M; Groves, Trish; Schulz, Kenneth F; Sox, Harold C; Rockhold, Frank W; Rennie, Drummond; Moher, David

    2015-12-01

    The protocol of a clinical trial serves as the foundation for study planning, conduct, reporting, and appraisal. However, trial protocols and existing protocol guidelines vary greatly in content and quality. This article describes the systematic development and scope of SPIRIT (Standard Protocol Items: Recommendations for Interventional Trials) 2013, a guideline for the minimum content of a clinical trial protocol. The 33-item SPIRIT checklist applies to protocols for all clinical trials and focuses on content rather than format. The checklist recommends a full description of what is planned; it does not prescribe how to design or conduct a trial. By providing guidance for key content, the SPIRIT recommendations aim to facilitate the drafting of high-quality protocols. Adherence to SPIRIT would also enhance the transparency and completeness of trial protocols for the benefit of investigators, trial participants, patients, sponsors, funders, research ethics committees or institutional review boards, peer reviewers, journals, trial registries, policymakers, regulators, and other key stakeholders.

  17. SPIRIT 2013 Statement: Defining Standard Protocol Items for Clinical Trials

    PubMed Central

    Chan, An-Wen; Tetzlaff, Jennifer M.; Altman, Douglas G.; Laupacis, Andreas; Gøtzsche, Peter C.; Krleža-Jerić, Karmela; Hróbjartsson, Asbjørn; Mann, Howard; Dickersin, Kay; Berlin, Jesse A.; Doré, Caroline J.; Parulekar, Wendy R.; Summerskill, William S.M.; Groves, Trish; Schulz, Kenneth F.; Sox, Harold C.; Rockhold, Frank W.; Rennie, Drummond; Moher, David

    2016-01-01

    The protocol of a clinical trial serves as the foundation for study planning, conduct, reporting, and appraisal. However, trial protocols and existing protocol guidelines vary greatly in content and quality. This article describes the systematic development and scope of SPIRIT (Standard Protocol Items: Recommendations for Interventional Trials) 2013, a guideline for the minimum content of a clinical trial protocol. The 33-item SPIRIT checklist applies to protocols for all clinical trials and focuses on content rather than format. The checklist recommends a full description of what is planned; it does not prescribe how to design or conduct a trial. By providing guidance for key content, the SPIRIT recommendations aim to facilitate the drafting of high-quality protocols. Adherence to SPIRIT would also enhance the transparency and completeness of trial protocols for the benefit of investigators, trial participants, patients, sponsors, funders, research ethics committees or institutional review boards, peer reviewers, journals, trial registries, policymakers, regulators, and other key stakeholders. PMID:23295957

  18. SPIRIT 2013 statement: defining standard protocol items for clinical trials.

    PubMed

    Chan, An-Wen; Tetzlaff, Jennifer M; Altman, Douglas G; Laupacis, Andreas; Gøtzsche, Peter C; Krleža-Jerić, Karmela; Hróbjartsson, Asbjørn; Mann, Howard; Dickersin, Kay; Berlin, Jesse A; Doré, Caroline J; Parulekar, Wendy R; Summerskill, William S M; Groves, Trish; Schulz, Kenneth F; Sox, Harold C; Rockhold, Frank W; Rennie, Drummond; Moher, David

    2013-02-05

    The protocol of a clinical trial serves as the foundation for study planning, conduct, reporting, and appraisal. However, trial protocols and existing protocol guidelines vary greatly in content and quality. This article describes the systematic development and scope of SPIRIT (Standard Protocol Items: Recommendations for Interventional Trials) 2013, a guideline for the minimum content of a clinical trial protocol.The 33-item SPIRIT checklist applies to protocols for all clinical trials and focuses on content rather than format. The checklist recommends a full description of what is planned; it does not prescribe how to design or conduct a trial. By providing guidance for key content, the SPIRIT recommendations aim to facilitate the drafting of high-quality protocols. Adherence to SPIRIT would also enhance the transparency and completeness of trial protocols for the benefit of investigators, trial participants, patients, sponsors, funders, research ethics committees or institutional review boards, peer reviewers, journals, trial registries, policymakers, regulators, and other key stakeholders.

  19. "Tele Pour Tous" in Rural Ivory Coast: Audience, Impact, Perceptions: Report of Two Surveys Conducted in January and April, 1977.

    ERIC Educational Resources Information Center

    Etaix, Mireille; Lenglet, Frans

    This report presents the results of two surveys conducted in January and April 1977 in the Ivory Coast to assess the impact of the "Tele Pour Tous" programs on rural audiences in terms of awareness, learning, and action. Descriptions of the socio-economic characteristics of the audience and their viewing patterns were sought, and…

  20. Rethinking the NTCIP Design and Protocols - Analyzing the Issues

    DOT National Transportation Integrated Search

    1998-03-03

    This working paper discusses the issues involved in changing the current draft NTCIP standard from an X.25-based protocol stack to an Internet-based protocol stack. It contains a methodology which could be used to change NTCIP's base protocols. This ...

  1. Comparison of the ultrashort gonadotropin-releasing hormone agonist-antagonist protocol with microdose flare -up protocol in poor responders: a preliminary study

    PubMed Central

    Berker, Bülent; Duvan, Candan İltemir; Kaya, Cemil; Aytaç, Ruşen; Şatıroğlu, Hakan

    2010-01-01

    Objective To determine the potential effect of the ultrashort gonadotropin-releasing hormone (GnRH) agonist/GnRH antagonist protocol versus the microdose GnRH agonist protocol in poor responders undergoing intracytoplasmic sperm injection (ICSI). Material and Methods The patients in the Agonist-Antagonist Group (n=41) were administered the ultrashort GnRH-agonist/ antagonist protocol, while the patients in the Microdose Group (n=41) were stimulated according to the microdose flare-up protocol. The mean number of mature oocytes retrieved was the primary outcome measure. Fertilization rate, implantation rate per embryo and clinical pregnancy rates were secondary outcome measures. Results There was no differenc between the mean number of mature oocytes retrieved in the two groups. There were also no statistical differences between the two groups in terms of peak serum E2 level, canceled cycles, endometrial thickness on hCG day, number of 2 pronucleus and number of embryos transferred. However, the total gonadotropin consumption and duration of stimulation were significantly higher with the Agonist-Antagonist Group compared with the Microdose Group. The implantation and clinical pregnancy rates were similar between the two groups. Conclusion Despite the high dose of gonadotropin consumption and longer duration of stimulation with the ultrashort GnRH agonist/ antagonist protocol, it seems that the Agonist-Antagonist Protocol is not inferior to the microdose protocol in poor responders undergoing ICSI. PMID:24591934

  2. Comparison of the ultrashort gonadotropin-releasing hormone agonist-antagonist protocol with microdose flare -up protocol in poor responders: a preliminary study.

    PubMed

    Berker, Bülent; Duvan, Candan İltemir; Kaya, Cemil; Aytaç, Ruşen; Satıroğlu, Hakan

    2010-01-01

    To determine the potential effect of the ultrashort gonadotropin-releasing hormone (GnRH) agonist/GnRH antagonist protocol versus the microdose GnRH agonist protocol in poor responders undergoing intracytoplasmic sperm injection (ICSI). The patients in the Agonist-Antagonist Group (n=41) were administered the ultrashort GnRH-agonist/ antagonist protocol, while the patients in the Microdose Group (n=41) were stimulated according to the microdose flare-up protocol. The mean number of mature oocytes retrieved was the primary outcome measure. Fertilization rate, implantation rate per embryo and clinical pregnancy rates were secondary outcome measures. There was no differenc between the mean number of mature oocytes retrieved in the two groups. There were also no statistical differences between the two groups in terms of peak serum E2 level, canceled cycles, endometrial thickness on hCG day, number of 2 pronucleus and number of embryos transferred. However, the total gonadotropin consumption and duration of stimulation were significantly higher with the Agonist-Antagonist Group compared with the Microdose Group. The implantation and clinical pregnancy rates were similar between the two groups. Despite the high dose of gonadotropin consumption and longer duration of stimulation with the ultrashort GnRH agonist/ antagonist protocol, it seems that the Agonist-Antagonist Protocol is not inferior to the microdose protocol in poor responders undergoing ICSI.

  3. Comparison of Ovulation Induction Protocols After Endometrioma Resection

    PubMed Central

    Yasa, Cenk; Dural, Ozlem; Mutlu, Mehmet Firat; Celik, Cem; Ugurlucan, Funda Gungor; Buyru, Faruk

    2014-01-01

    Background and Objectives: The aim of this study was to compare the in vitro fertilization (IVF) outcomes of long gonadotropin-releasing hormone agonist (GnRH-a) and GnRH-antagonist (GnRH-ant) protocols in endometriosis patients who have undergone laparoscopic endometrioma resection surgery. To our knowledge, there is no study in the current literature that compares the effectiveness of long GnRH-a and GnRH-ant protocols in management of IVF cycles in endometriosis patients who underwent laparoscopic endometrioma resection surgery. Methods: Eighty-six patients with stage III to IV endometriosis who had undergone laparoscopic resection surgery for endometrioma were divided into 2 groups: those who had ovarian stimulation with a long GnRH-a protocol (n = 44), and those who had ovarian stimulation with a GnRH-ant protocol (n = 42). Results: The number of follicles on human chorionic gonadotropin injection day, duration of hyperstimulation, number of retrieved metaphase II oocytes, and total number of grade 1 embryos were statically significantly higher in the long GnRH-a protocol. There were no significant differences in positive β-human chorionic gonadotropin pregnancy rates (25% vs 21.4%; P = .269) and ongoing pregnancy rates per patient (20.5% vs 19.1%; P = .302) between the 2 protocols. Conclusions: Long GnRH-a and GnRH-ant protocols both present similar IVF outcomes in patients with endometriosis who have undergone laparoscopic endometrioma resection surgery. A long GnRH-a protocol may lead to a higher number of embryos that can be cryopreserved, providing the possibility of additional embryo transfers without having to go through the process of ovarian stimulation again. PMID:25392665

  4. Méthode d'estimation des tassements des sols fins sous les remblais d'infrastructures ferroviaires pour lignes à grande vitesse

    NASA Astrophysics Data System (ADS)

    Said Alami, Soukaina; Reiffsteck, Philippe; Cuira, Fahd

    2018-02-01

    Le besoin de maîtriser les déformations des sols sous les remblais destinés à recevoir les structures de lignes à grande vitesse, en fait un enjeu important pour ces projets. Toutefois, de nombreuses difficultés ont été soulevées liées principalement au grand nombre d'incertitudes qui entourent le phénomène. En effet, la caractérisation géologique et géotechnique dépend de sondages et d'essais où le risque de remaniement est important et dont l'interprétation est, souvent, délicate. Cet article présente une procédure de calcul qui permettrait en pratique d'évaluer le tassement sous remblai avec une bonne précision et qui a été validée sur un certain nombre d'ouvrages. Pour cela, des corrections sont introduites aux méthodes usuelles de calcul permettant d'approcher les valeurs mesurées sur chantier.

  5. Recommandations pour le dépistage de l’hypertension chez les adultes canadiens

    PubMed Central

    Lindsay, Patrice; Gorber, Sarah Connor; Joffres, Michel; Birtwhistle, Richard; McKay, Donald; Cloutier, Lyne

    2013-01-01

    Résumé Objectif Présenter des recommandations concernant le dépistage de l’hypertension chez les adultes de 18 ans et plus qui n’ont pas reçu antérieurement de diagnostic d’hypertension. Qualité des données Les données probantes sont tirées d’une recension systématique dans MEDLINE, EMBASE et la base de données des synthèses systématiques de la Collaboration Cochrane (EBM Reviews), de janvier 1985 à septembre 2011. Les types d’études retenues se limitaient aux études randomisées contrôlées, aux synthèses systématiques et aux études observationnelles avec groupes témoins. Message principal Trois fortes recommandations se sont dégagées de données probantes de qualité modérée. Il est recommandé de mesurer la pression artérielle à toutes les consultations appropriées en soins primaires, conformément aux techniques actuelles décrites dans les recommandations du Programme éducatif canadien sur l’hypertension pour la mesure de la pression artérielle en cabinet et en soins ambulatoires. Les critères du Programme éducatif canadien sur l’hypertension pour l’évaluation et le diagnostic de l’hypertension devraient s’appliquer aux personnes chez qui on observe une pression artérielle élevée. Conclusion À la suite d’un examen des plus récentes données probantes, le Groupe d’étude canadien sur les soins de santé préventifs continue de recommander la mesure de la pression artérielle lors des consultations périodiques auprès du médecin.

  6. A Logical Analysis of Quantum Voting Protocols

    NASA Astrophysics Data System (ADS)

    Rad, Soroush Rafiee; Shirinkalam, Elahe; Smets, Sonja

    2017-12-01

    In this paper we provide a logical analysis of the Quantum Voting Protocol for Anonymous Surveying as developed by Horoshko and Kilin in (Phys. Lett. A 375, 1172-1175 2011). In particular we make use of the probabilistic logic of quantum programs as developed in (Int. J. Theor. Phys. 53, 3628-3647 2014) to provide a formal specification of the protocol and to derive its correctness. Our analysis is part of a wider program on the application of quantum logics to the formal verification of protocols in quantum communication and quantum computation.

  7. Two-party quantum key agreement protocols under collective noise channel

    NASA Astrophysics Data System (ADS)

    Gao, Hao; Chen, Xiao-Guang; Qian, Song-Rong

    2018-06-01

    Recently, quantum communication has become a very popular research field. The quantum key agreement (QKA) plays an important role in the field of quantum communication, based on its unconditional security in terms of theory. Among all kinds of QKA protocols, QKA protocols resisting collective noise are widely being studied. In this paper, we propose improved two-party QKA protocols resisting collective noise and present a feasible plan for information reconciliation. Our protocols' qubit efficiency has achieved 26.67%, which is the best among all the two-party QKA protocols against collective noise, thus showing that our protocol can improve the transmission efficiency of quantum key agreement.

  8. Combined Heat and Power Protocol for Uniform Methods Project | Advanced

    Science.gov Websites

    Manufacturing Research | NREL Combined Heat and Power Protocol for Uniform Methods Project Combined Heat and Power Protocol for Uniform Methods Project NREL developed a protocol that provides a ; is consistent with the scope and other protocols developed for the Uniform Methods Project (UMP

  9. A model based security testing method for protocol implementation.

    PubMed

    Fu, Yu Long; Xin, Xiao Long

    2014-01-01

    The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.

  10. Refinement for fault-tolerance: An aircraft hand-off protocol

    NASA Technical Reports Server (NTRS)

    Marzullo, Keith; Schneider, Fred B.; Dehn, Jon

    1994-01-01

    Part of the Advanced Automation System (AAS) for air-traffic control is a protocol to permit flight hand-off from one air-traffic controller to another. The protocol must be fault-tolerant and, therefore, is subtle -- an ideal candidate for the application of formal methods. This paper describes a formal method for deriving fault-tolerant protocols that is based on refinement and proof outlines. The AAS hand-off protocol was actually derived using this method; that derivation is given.

  11. Multiple protocol fluorometer and method

    DOEpatents

    Kolber, Zbigniew S.; Falkowski, Paul G.

    2000-09-19

    A multiple protocol fluorometer measures photosynthetic parameters of phytoplankton and higher plants using actively stimulated fluorescence protocols. The measured parameters include spectrally-resolved functional and optical absorption cross sections of PSII, extent of energy transfer between reaction centers of PSII, F.sub.0 (minimal), F.sub.m (maximal) and F.sub.v (variable) components of PSII fluorescence, photochemical and non-photochemical quenching, size of the plastoquinone (PQ) pool, and the kinetics of electron transport between Q.sub.a and PQ pool and between PQ pool and PSI. The multiple protocol fluorometer, in one embodiment, is equipped with an excitation source having a controlled spectral output range between 420 nm and 555 nm and capable of generating flashlets having a duration of 0.125-32 .mu.s, an interval between 0.5 .mu.s and 2 seconds, and peak optical power of up to 2 W/cm.sup.2. The excitation source is also capable of generating, simultaneous with the flashlets, a controlled continuous, background illumination.

  12. Intelligent routing protocol for ad hoc wireless network

    NASA Astrophysics Data System (ADS)

    Peng, Chaorong; Chen, Chang Wen

    2006-05-01

    A novel routing scheme for mobile ad hoc networks (MANETs), which combines hybrid and multi-inter-routing path properties with a distributed topology discovery route mechanism using control agents is proposed in this paper. In recent years, a variety of hybrid routing protocols for Mobile Ad hoc wireless networks (MANETs) have been developed. Which is proactively maintains routing information for a local neighborhood, while reactively acquiring routes to destinations beyond the global. The hybrid protocol reduces routing discovery latency and the end-to-end delay by providing high connectivity without requiring much of the scarce network capacity. On the other side the hybrid routing protocols in MANETs likes Zone Routing Protocol still need route "re-discover" time when a route between zones link break. Sine the topology update information needs to be broadcast routing request on local zone. Due to this delay, the routing protocol may not be applicable for real-time data and multimedia communication. We utilize the advantages of a clustering organization and multi-routing path in routing protocol to achieve several goals at the same time. Firstly, IRP efficiently saves network bandwidth and reduces route reconstruction time when a routing path fails. The IRP protocol does not require global periodic routing advertisements, local control agents will automatically monitor and repair broke links. Secondly, it efficiently reduces congestion and traffic "bottlenecks" for ClusterHeads in clustering network. Thirdly, it reduces significant overheads associated with maintaining clusters. Fourthly, it improves clusters stability due to dynamic topology changing frequently. In this paper, we present the Intelligent Routing Protocol. First, we discuss the problem of routing in ad hoc networks and the motivation of IRP. We describe the hierarchical architecture of IRP. We describe the routing process and illustrate it with an example. Further, we describe the control manage

  13. Efficient model checking of network authentication protocol based on SPIN

    NASA Astrophysics Data System (ADS)

    Tan, Zhi-hua; Zhang, Da-fang; Miao, Li; Zhao, Dan

    2013-03-01

    Model checking is a very useful technique for verifying the network authentication protocols. In order to improve the efficiency of modeling and verification on the protocols with the model checking technology, this paper first proposes a universal formalization description method of the protocol. Combined with the model checker SPIN, the method can expediently verify the properties of the protocol. By some modeling simplified strategies, this paper can model several protocols efficiently, and reduce the states space of the model. Compared with the previous literature, this paper achieves higher degree of automation, and better efficiency of verification. Finally based on the method described in the paper, we model and verify the Privacy and Key Management (PKM) authentication protocol. The experimental results show that the method of model checking is effective, which is useful for the other authentication protocols.

  14. Multi-party quantum key agreement protocol secure against collusion attacks

    NASA Astrophysics Data System (ADS)

    Wang, Ping; Sun, Zhiwei; Sun, Xiaoqiang

    2017-07-01

    The fairness of a secure multi-party quantum key agreement (MQKA) protocol requires that all involved parties are entirely peer entities and can equally influence the outcome of the protocol to establish a shared key wherein no one can decide the shared key alone. However, it is found that parts of the existing MQKA protocols are sensitive to collusion attacks, i.e., some of the dishonest participants can collaborate to predetermine the final key without being detected. In this paper, a multi-party QKA protocol resisting collusion attacks is proposed. Different from previous QKA protocol resisting N-1 coconspirators or resisting 1 coconspirators, we investigate the general circle-type MQKA protocol which can be secure against t dishonest participants' cooperation. Here, t < N. We hope the results of the presented paper will be helpful for further research on fair MQKA protocols.

  15. Delay Tolerant Networking - Bundle Protocol Simulation

    NASA Technical Reports Server (NTRS)

    SeGui, John; Jenning, Esther

    2006-01-01

    In this paper, we report on the addition of MACHETE models needed to support DTN, namely: the Bundle Protocol (BP) model. To illustrate the useof MACHETE with the additional DTN model, we provide an example simulation to benchmark its performance. We demonstrate the use of the DTN protocol and discuss statistics gathered concerning the total time needed to simulate numerous bundle transmissions.

  16. Protocol Development | Division of Cancer Prevention

    Cancer.gov

    The chemoprevention Phase I and II consortia must submit Letters of Intent for review and approval prior to the submission and review of the protocol. Letter of Intent (LOI) Process The chemoprevention Phase I and II consortia must submit Letters of Intent for review and approval prior to the submission and review of the protocol. DCP will solicit Letters of Intent from

  17. Protocols for pressure ulcer prevention: are they evidence-based?

    PubMed

    Chaves, Lidice M; Grypdonck, Mieke H F; Defloor, Tom

    2010-03-01

    This study is a report of a study to determine the quality of protocols for pressure ulcer prevention in home care in the Netherlands. If pressure ulcer prevention protocols are evidence-based and practitioners use them correctly in practice, this will result a reduction in pressure ulcers. Very little is known about the evidence-based content and quality of the pressure ulcer prevention protocols. In 2008, current pressure ulcer prevention protocols from 24 home-care agencies in the Netherlands were evaluated. A checklist developed and validated by two pressure ulcer prevention experts was used to assess the quality of the protocols, and weighted and unweighted quality scores were computed and analysed using descriptive statistics. The 24 pressure ulcer prevention protocols had a mean weighted quality score of 63.38 points out of a maximum of 100 (sd 5). The importance of observing the skin at the pressure points at least once a day was emphasized in 75% of the protocols. Only 42% correctly warned against the use of materials that were 'less effective or that could potentially cause harm'. Pressure ulcer prevention commands a reasonable amount of attention in home care, but the incidence of pressure ulcers and lack of a consistent, standardized document for use in actual practice indicate a need for systematic implementation of national pressure ulcer prevention standards in the Netherlands to ensure adherence to the established protocols.

  18. Détection homodyne pour mémoires holographiques à stockage bit à bit

    NASA Astrophysics Data System (ADS)

    Maire, G.; Pauliat, G.; Roosen, G.

    2006-10-01

    Les mémoires holographiques à stockage bit à bit sont une alternative intéressante à l'approche holographique conventionnelle par pages de données du fait de leur architecture optique simplifiée. Nous proposons et validons ici une procédure de lecture adaptée à de telles mémoires et basée sur une détection homodyne de l'amplitude diffractée par les hologrammes. Ceci permet d'augmenter la quantité de signal utile détecté et s'avère donc prometteur pour accroître le taux de transfert de données de ces mémoires.

  19. A comparative study of routing protocols of heterogeneous wireless sensor networks.

    PubMed

    Han, Guangjie; Jiang, Xu; Qian, Aihua; Rodrigues, Joel J P C; Cheng, Long

    2014-01-01

    Recently, heterogeneous wireless sensor network (HWSN) routing protocols have drawn more and more attention. Various HWSN routing protocols have been proposed to improve the performance of HWSNs. Among these protocols, hierarchical HWSN routing protocols can improve the performance of the network significantly. In this paper, we will evaluate three hierarchical HWSN protocols proposed recently--EDFCM, MCR, and EEPCA--together with two previous classical routing protocols--LEACH and SEP. We mainly focus on the round of the first node dies (also called the stable period) and the number of packets sent to sink, which is an important aspect to evaluate the monitoring ability of a protocol. We conduct a lot of experiments and simulations on Matlab to analyze the performance of the five routing protocols.

  20. A Model Based Security Testing Method for Protocol Implementation

    PubMed Central

    Fu, Yu Long; Xin, Xiao Long

    2014-01-01

    The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation. PMID:25105163

  1. Performance comparison of token ring protocols for hard-real-time communication

    NASA Technical Reports Server (NTRS)

    Kamat, Sanjay; Zhao, Wei

    1992-01-01

    The ability to guarantee the deadlines of synchronous messages while maintaining a good aggregate throughput is an important consideration in the design of distributed real-time systems. In this paper, we study two token ring protocols, the priority driven protocol and the timed token protocol, for their suitability for hard real-time systems. Both these protocols use a token to control access to the transmission medium. In a priority driven protocol, messages are assigned priorities and the protocol ensures that messages are transmitted in the order of their priorities. Timed token protocols do not provide for priority arbitration but ensure that the maximum access delay for a station is bounded. For both protocols, we first derive the schedulability conditions under which the transmission deadlines of a given set of synchronous messages can be guaranteed. Subsequently, we use these schedulability conditions to quantitatively compare the average case behavior of the protocols. This comparison demonstrates that each of the protocols has its domain of superior performance and neither dominates the other for the entire range of operating conditions.

  2. STANDARD MEASUREMENT PROTOCOLS - FLORIDA RADON RESEARCH PROGRAM

    EPA Science Inventory

    The manual, in support of the Florida Radon Research Program, contains standard protocols for key measurements where data quality is vital to the program. t contains two sections. he first section, soil measurements, contains field sampling protocols for soil gas permeability and...

  3. Auto-Configuration Protocols in Mobile Ad Hoc Networks

    PubMed Central

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity. PMID:22163814

  4. Consensus formalisé: recommandations de pratiques cliniques pour la prise en charge de la migraine du patient adulte africain

    PubMed Central

    Ahmed, Mahmoud Ait Kaci; Haddad, Monia; Kouassi, Beugré; Ouhabi, Hamid; Serrie, Alain

    2016-01-01

    La migraine est une céphalée primaire (selon les derniers critères de l'International Headache Society) qui affecte environ 8% de la population africaine. Les femmes sont plus fréquemment touchées que les hommes et les crises apparaissent le plus souvent avant l’âge de 40 ans. Bien qu'un certain nombre de traitements, de mesure hygiéno-diététiques, et d'autres méthodes non pharmacologiques permettent de limiter l'intensité et la fréquence des crises, la prise en charge médicamenteuse de la crise de migraine est très souvent nécessaire. La disponibilité des traitements et l'accès aux soins diffèrent sur le continent africain et ont conduit à la réalisation du 1er consensus d'experts pour la prise en charge du patient adulte africain. Destiné aux praticiens, ce travail collaboratif multinational a pour objectif de fournir 16 recommandations de pratiques cliniques simples, fondées sur les preuves, et adaptées aux conditions de l'exercice médical en Afrique. PMID:27642420

  5. Quantum Dot Solar Cell Fabrication Protocols

    DOE PAGES

    Chernomordik, Boris D.; Marshall, Ashley R.; Pach, Gregory F.; ...

    2016-09-26

    Colloidally synthesized quantum-confined semiconducting spherical nanocrystals, often referred to as quantum dots (QDs), offer a high degree of chemical, optical, and electronic tunability. As a result, there is an increasing interest in employing colloidal QDs for electronic and optical applications that is reflected in a growing number of publications. In this protocol we provide detailed procedures for the fabrication of QD solar cells specifically employing PbSe and PbS QDs. Here we include details that are learned through experience, beyond those in typical methodology sections, and include example pictures and videos to aid in fabricating QD solar cells. Although successful solarmore » cell fabrication is ultimately learned through experience, this protocol is intended to accelerate that process. The protocol developed here is intended to be a general starting point for developing PbS and PbSe QD test bed solar cells. We include steps for forming conductive QD films via dip coating as well as spin coating. Finally, we provide protocols that detail the synthesis of PbS and PbSe QDs through a unique cation exchange reaction and discuss how different QD synthetic routes could impact the resulting solar cell performance.« less

  6. Quantum Dot Solar Cell Fabrication Protocols

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chernomordik, Boris D.; Marshall, Ashley R.; Pach, Gregory F.

    Colloidally synthesized quantum-confined semiconducting spherical nanocrystals, often referred to as quantum dots (QDs), offer a high degree of chemical, optical, and electronic tunability. As a result, there is an increasing interest in employing colloidal QDs for electronic and optical applications that is reflected in a growing number of publications. In this protocol we provide detailed procedures for the fabrication of QD solar cells specifically employing PbSe and PbS QDs. Here we include details that are learned through experience, beyond those in typical methodology sections, and include example pictures and videos to aid in fabricating QD solar cells. Although successful solarmore » cell fabrication is ultimately learned through experience, this protocol is intended to accelerate that process. The protocol developed here is intended to be a general starting point for developing PbS and PbSe QD test bed solar cells. We include steps for forming conductive QD films via dip coating as well as spin coating. Finally, we provide protocols that detail the synthesis of PbS and PbSe QDs through a unique cation exchange reaction and discuss how different QD synthetic routes could impact the resulting solar cell performance.« less

  7. A Study of Shared-Memory Mutual Exclusion Protocols Using CADP

    NASA Astrophysics Data System (ADS)

    Mateescu, Radu; Serwe, Wendelin

    Mutual exclusion protocols are an essential building block of concurrent systems: indeed, such a protocol is required whenever a shared resource has to be protected against concurrent non-atomic accesses. Hence, many variants of mutual exclusion protocols exist in the shared-memory setting, such as Peterson's or Dekker's well-known protocols. Although the functional correctness of these protocols has been studied extensively, relatively little attention has been paid to their non-functional aspects, such as their performance in the long run. In this paper, we report on experiments with the performance evaluation of mutual exclusion protocols using Interactive Markov Chains. Steady-state analysis provides an additional criterion for comparing protocols, which complements the verification of their functional properties. We also carefully re-examined the functional properties, whose accurate formulation as temporal logic formulas in the action-based setting turns out to be quite involved.

  8. Hymenoptera Venom Immunotherapy: Tolerance and Efficacy of an Ultrarush Protocol versus a Rush and a Slow Conventional Protocol

    PubMed Central

    Patella, Vincenzo; Florio, Giovanni; Giuliano, Ada; Oricchio, Carmine; Spadaro, Giuseppe; Marone, Gianni; Genovese, Arturo

    2012-01-01

    Background and Objective. Various venom immunotherapy (VIT) protocols are available for Hymenoptera allergy. Although adverse reactions (ADRs) to VIT are widely reported, controlled trials are still needed. We conducted a randomized prospective study to evaluate ADRs and the efficacy of three VIT regimens. Methods. 76 patients with Hymenoptera allergy, aged 16–76 years, were randomized to receive an ultrarush protocol (group A: 27 patients), a rush protocol (group B: 25), or a slow protocol (group C: 24). Aqueous venom extract was used in incremental phase and an adsorbed depot in maintenance phase. ADRs and accidental Hymenoptera stings during VIT were used to evaluate efficacy. Results. During incremental treatment, ADRs occurred in 1.99%, 3.7%, and 3.9% of patients in groups A, B, and C, and in 0.99%, 1.46%, and 2.7%, respectively, during maintenance. ADRs were significantly fewer in group A (incremental + maintenance phase) than in group C (1.29% versus 3.2%; P = 0.013). Reactions to accidental Hymenoptera stings did not differ among groups (1.1%, 1.2%, and 1.1%). Conclusion. Ultrarush was as effective as the rush and slow protocols and was associated with a low incidence of reactions to stings. This study indicates that ultrarush VIT is a valid therapeutic option for Hymenoptera allergy. PMID:22693521

  9. An efficacious oral health care protocol for immunocompromised patients.

    PubMed

    Solomon, C S; Shaikh, A B; Arendorf, T M

    1995-01-01

    A twice-weekly oral and perioral examination was provided to 120 patients receiving antineoplastic therapy. Sixty patients were monitored while following the traditional hospital oral care protocol (chlorhexidine, hydrogen peroxide, sodium bicarbonate, thymol glycol, benzocaine mouthrinse, and nystatin). The mouth care protocol was then changed (experimental protocol = chlorhexidine, benzocaine lozenges, amphotericin B lozenges), and patients were monitored until the sample size matched that of the hospital mouth care regime. There was a statistically significant reduction in oral complications upon introduction and maintenance of the experimental protocol.

  10. Protocol for determining bull trout presence

    USGS Publications Warehouse

    Peterson, James; Dunham, Jason B.; Howell, Philip; Thurow, Russell; Bonar, Scott

    2002-01-01

    The Western Division of the American Fisheries Society was requested to develop protocols for determining presence/absence and potential habitat suitability for bull trout. The general approach adopted is similar to the process for the marbled murrelet, whereby interim guidelines are initially used, and the protocols are subsequently refined as data are collected. Current data were considered inadequate to precisely identify suitable habitat but could be useful in stratifying sampling units for presence/absence surveys. The presence/absence protocol builds on previous approaches (Hillman and Platts 1993; Bonar et al. 1997), except it uses the variation in observed bull trout densities instead of a minimum threshold density and adjusts for measured differences in sampling efficiency due to gear types and habitat characteristics. The protocol consists of: 1. recommended sample sizes with 80% and 95% detection probabilities for juvenile and resident adult bull trout for day and night snorkeling and electrofishing adjusted for varying habitat characteristics for 50m and 100m sampling units, 2. sampling design considerations, including possible habitat characteristics for stratification, 3. habitat variables to be measured in the sampling units, and 3. guidelines for training sampling crews. Criteria for habitat strata consist of coarse, watershed-scale characteristics (e.g., mean annual air temperature) and fine-scale, reach and habitat-specific features (e.g., water temperature, channel width). The protocols will be revised in the future using data from ongoing presence/absence surveys, additional research on sampling efficiencies, and development of models of habitat/species occurrence.

  11. Effect of an auditory feedback substitution, tactilo-kinesthetic, or visual feedback on kinematics of pouring water from kettle into cup.

    PubMed

    Portnoy, Sigal; Halaby, Orli; Dekel-Chen, Dotan; Dierick, Frédéric

    2015-11-01

    Pouring hot water from a kettle into a cup may prove a hazardous task, especially for the elderly or the visually-impaired. Individuals with deteriorating eyesight may endanger their hands by performing this task with both hands, relaying on tactilo-kinesthetic feedback (TKF). Auditory feedback (AF) may allow them to perform the task singlehandedly, thereby reducing the risk for injury. However since relying on an AF is not intuitive and requires practice, we aimed to determine if AF supplied during the task of pouring water can be used naturally as visual feedback (VF) following practice. For this purpose, we quantified, in young healthy sighted subjects (n = 20), the performance and kinematics of pouring water in the presence of three isolated feedbacks: visual, tactilo-kinesthetic, or auditory. There were no significant differences between the weights of spilled water in the AF condition compared to the TKF condition in the first, fifth or thirteenth trials. The subjectively-reported difficulty levels of using the TKF and the AF were significantly reduced between the first and thirteenth trials for both TKF (p = 0.01) and AF (p = 0.001). Trunk rotation during the first trial using the TKF was significantly lower than the trunk rotation while using VF. Also, shoulder adduction during the first trial using the TKF was significantly higher than the shoulder adduction while using the VF. During the AF trials, the median travel distance of the tip of the kettle was significantly reduced in the first trials so that in the thirtieth trial it did not differ significantly from the median travel distance during the thirtieth trial using TKF and VF. The maximal velocity of the tip of the kettle was constant for each of the feedback conditions but was higher in 10 cm s(-1) using VF than TKF, which was higher in 10 cm s(-1) from using AF. The smoothness of movement of the TKF and AF conditions, expressed by the normalized jerk score (NJSM), was one and two orders

  12. A Lightweight Protocol for Secure Video Streaming.

    PubMed

    Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis

    2018-05-14

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.

  13. Evaluation of counterfactuality in counterfactual communication protocols

    NASA Astrophysics Data System (ADS)

    Arvidsson-Shukur, D. R. M.; Barnes, C. H. W.; Gottfries, A. N. O.

    2017-12-01

    We provide an in-depth investigation of parameter estimation in nested Mach-Zehnder interferometers (NMZIs) using two information measures: the Fisher information and the Shannon mutual information. Protocols for counterfactual communication have, so far, been based on two different definitions of counterfactuality. In particular, some schemes have been based on NMZI devices, and have recently been subject to criticism. We provide a methodology for evaluating the counterfactuality of these protocols, based on an information-theoretical framework. More specifically, we make the assumption that any realistic quantum channel in MZI structures will have some weak uncontrolled interaction. We then use the Fisher information of this interaction to measure counterfactual violations. The measure is used to evaluate the suggested counterfactual communication protocol of H. Salih et al. [Phys. Rev. Lett. 110, 170502 (2013), 10.1103/PhysRevLett.110.170502]. The protocol of D. R. M. Arvidsson-Shukur and C. H. W. Barnes [Phys. Rev. A 94, 062303 (2016), 10.1103/PhysRevA.94.062303], based on a different definition, is evaluated with a probability measure. Our results show that the definition of Arvidsson-Shukur and Barnes is satisfied by their scheme, while that of Salih et al. is only satisfied by perfect quantum channels. For realistic devices the latter protocol does not achieve its objective.

  14. A Lightweight Protocol for Secure Video Streaming

    PubMed Central

    Morkevicius, Nerijus; Bagdonas, Kazimieras

    2018-01-01

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing “Fog Node-End Device” layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard. PMID:29757988

  15. Sciences pour les Exoplanètes et les Systèmes Planétaires

    NASA Astrophysics Data System (ADS)

    Roques, F.; Balança, C.; Bénilan, Y.; Griessmeier, J. M.; Marcq, E.; Navarro, T.; Renner, S.; Schneider, J.; Schott, C.

    2016-12-01

    The websites Sciences pour les Exoplanètes et les Systèmes Planétaires (SESP) and Exoplanètes present planetary and exoplanetary sciences with courses, interactive tools, and a didactic catalogue connected to the Encyclopedia exoplanet.eu. These websites have been created in the context of the LabEx ESEP (Exploration Spatiale des Environnements Planétaires) and they are directed towards undergraduate level. They can be used as support for face-to-face courses and self-training. The websites will be translated and will be used to create e-learning degree courses. SESP: http://sesp.esep.pro/fr/index.html EXOPLANETES: http://exoplanetes.esep.pro/

  16. Implementation of Siemens USS protocol into LabVIEW.

    PubMed

    Hosek, P; Diblik, M

    2011-10-01

    This article gives basic overview of the USS protocol as a communication interface to drive Siemens frequency inverters. It presents our implementation of this protocol into LabVIEW, as there was permanent demand from the community of the users to have native LabVIEW implementation of the USS protocol. It also states encountered problems and their solutions. Copyright © 2011 Society for Laboratory Automation and Screening. Published by Elsevier Inc. All rights reserved.

  17. Cartographie T

    NASA Astrophysics Data System (ADS)

    Cote, Jean-Charles

    Les cartographies T1 par séquences d'échos stimulés et Look- Locker sont les plus communément utilisées pour mesurer les temps de relaxation T 1 en imagerie par résonance magnétique (IRM). Elles ont des performances d'usage clinique, ne prenant que quelques minutes pour produire une carte des valeurs de T1. Ces séquences demeurent cependant très sensibles à la précision des pulses radiofréquences (RF) qui réorientent l'aimantation pour produire les signaux mesurés. Les pulses RF rectangulaires régulièrement utilisés en IRM produisent un basculement de l'aimantation directement proportionnel à l'intensité du champ magnétique B 1 produit par l'antenne émettrice. Les antennes cliniques ont des distributions de champs B1 qui fluctuent énormément. En exemple, l'antenne servant à produire des images de la tête possède un champ B1 qui est distribué dans son volume utile sur une plage allant de 0,5 à 1,2 relativement à son centre. Cette variation spatiale de B1 entraîne des erreurs systématiques sur les valeurs ajustées de T1 dépassant les 50%. Le développement d'un nouveau concept d'excitation RF à approche tangentielle ayant des propriétés adiabatiques pouvant remplacer les demi-passages adiabatiques (AHP) et son utilisation sous la forme d'un BIR-4-S2 (B1-Insensitive Rotation-4 AHP-Sequentialized 2 steps) dans les séquences de cartographie T1 a permis de réduire à moins de 10% les erreurs systématiques dans le cas mesuré par échos stimulés compensés et à moins de 5% pour le Look-Locker. Le BIR-4-S2 possède une imprécision sur l'angle de basculement de moins de 5° sur une plage relative allant de 0,75 à 1,75 autour d'un champ de référence B1 ref, pour un choix de basculement sur 360°. Et, contrairement aux pulses adiabatiques, il demeure un pulse RF tridimentionnel (3D) à faible puissance pouvant être utilisé à répétition cliniquement sans risque d'échauffement dangereux pour les patients. La séquence d

  18. Êtes-vous prêt pour un code bleu en cabinet?

    PubMed Central

    Moore, Simon

    2015-01-01

    Résumé Problème traité Les urgences médicales sont fréquentes dans le cabinet des médecins de famille, mais nombreux sont ceux qui ne sont pas préparés à répondre aux urgences. Une vidéo éducative en ligne traitant des urgences en cabinet pourrait améliorer la réponse des médecins et de leur personnel aux urgences. Un outil comme celui-là n’a jamais été décrit auparavant. Objectif du programme Utiliser les pratiques fondées sur les données probantes pour produire une vidéo éducative expliquant comment se préparer à parer à une urgence dans un cabinet médical, disséminer la vidéo en ligne et évaluer l’attitude des médecins et de leur personnel à l’égard de la vidéo. Description du programme Une vidéo de 6 minutes a été produite en s’appuyant sur une revue de la littérature récente et des politiques des organismes réglementaires canadiens. La vidéo décrit l’équipement d’urgence recommandé, l’amélioration de la réponse à l’urgence et la formation du personnel en cabinet. Les médecins et leur personnel ont été invités à visualiser la vidéo en ligne à www.OfficeEmergencies.ca. L’opinion de l’auditoire sur le format de la vidéo et son contenu a été évaluée par l’entremise d’un sondage (N = 275). Conclusion Les résultats du sondage indiquent que la vidéo était pertinente et bien présentée, et le format en ligne était pratique et satisfaisant. Les participants s’inscriraient à d’autres formations ayant recours à cette technologie et étaient d’accord pour dire que ce programme améliorerait les soins aux patients.

  19. A Mobility-Aware QoS Signaling Protocol for Ambient Networks

    NASA Astrophysics Data System (ADS)

    Jeong, Seong-Ho; Lee, Sung-Hyuck; Bang, Jongho

    Mobility-aware quality of service (QoS) signaling is crucial to provide seamless multimedia services in the ambient environment where mobile nodes may move frequently between different wireless access networks. The mobility of an IP-based node in ambient networks affects routing paths, and as a result, can have a significant impact on the operation and state management of QoS signaling protocols. In this paper, we first analyze the impact of mobility on QoS signaling protocols and how the protocols operate in mobility scenarios. We then propose an efficient mobility-aware QoS signaling protocol which can operate adaptively in ambient networks. The key features of the protocol include the fast discovery of a crossover node where the old and new paths converge or diverge due to handover and the localized state management for seamless services. Our analytical and simulation/experimental results show that the proposed/implemented protocol works better than existing protocols in the IP-based mobile environment.

  20. Appendicite aigue non compliquée: y a-t- il une place pour le traitement conservateur

    PubMed Central

    El Khader, Ahmed; Lahkim, Mohamed; El Barni, Rachid; Achour, Abdessamad

    2015-01-01

    Le but de cette étude a été d’évaluer l'efficacité de l'antibiothérapie seule dans le traitement des appendicites aigues non compliquées. C'est une étude prospective, intéressant 68 patients ayant eu une appendicite aigue simple, de confirmation radiologique, traités par l'amoxicilline associée à l'acide clavulanique pendant 10 jours. L'appendicectomie a été réalisée en cas d'aggravation ou en cas de non amélioration au bout de 48heures de traitement. Le traitement conservateur a été efficace dans 82,35% avec une résolution complète des symptômes chez 56 patients. Les 12 cas restants (17,65%) ont subit une appendicectomie. l'appendicite a été gangréneuse dans 8 cas et phlegmoneuse dans 4 cas. Cinq des 56 patients, qui ont bien évolué sous traitement conservateur, ont été réadmis et opérés pour récidive, soit 8,9%. Deux cas ont eu une appendicite compliquée. L'appendicectomie reste le traitement de référence pour l'appendicite aigue, mais le traitement antibiotique peut être proposé en première intension à des patients présentant une appendicite aigue non compliquée. PMID:26327981

  1. Protocol to Exploit Waiting Resources for UASNs.

    PubMed

    Hung, Li-Ling; Luo, Yung-Jeng

    2016-03-08

    The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN) is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  2. Security of modified Ping-Pong protocol in noisy and lossy channel

    PubMed Central

    Han, Yun-Guang; Yin, Zhen-Qiang; Li, Hong-Wei; Chen, Wei; Wang, Shuang; Guo, Guang-Can; Han, Zheng-Fu

    2014-01-01

    The “Ping-Pong” (PP) protocol is a two-way quantum key protocol based on entanglement. In this protocol, Bob prepares one maximally entangled pair of qubits, and sends one qubit to Alice. Then, Alice performs some necessary operations on this qubit and sends it back to Bob. Although this protocol was proposed in 2002, its security in the noisy and lossy channel has not been proven. In this report, we add a simple and experimentally feasible modification to the original PP protocol, and prove the security of this modified PP protocol against collective attacks when the noisy and lossy channel is taken into account. Simulation results show that our protocol is practical. PMID:24816899

  3. Security of modified Ping-Pong protocol in noisy and lossy channel.

    PubMed

    Han, Yun-Guang; Yin, Zhen-Qiang; Li, Hong-Wei; Chen, Wei; Wang, Shuang; Guo, Guang-Can; Han, Zheng-Fu

    2014-05-12

    The "Ping-Pong" (PP) protocol is a two-way quantum key protocol based on entanglement. In this protocol, Bob prepares one maximally entangled pair of qubits, and sends one qubit to Alice. Then, Alice performs some necessary operations on this qubit and sends it back to Bob. Although this protocol was proposed in 2002, its security in the noisy and lossy channel has not been proven. In this report, we add a simple and experimentally feasible modification to the original PP protocol, and prove the security of this modified PP protocol against collective attacks when the noisy and lossy channel is taken into account. Simulation results show that our protocol is practical.

  4. Legal aspects of therapist-driven protocols. Do therapist-driven protocols place therapists in a legally compromising position?

    PubMed

    Meehan, M J

    1996-03-01

    The recent introduction of therapist-driven protocols has given the appearance of restricting the professional judgment of respiratory therapists with decision-tree robotics while contemporaneously catapulting them into the practice of medicine. This is happening in the midst of a spiraling litigation climate. This article examines the legal aspects--from malpractice to licensure--of this exciting new practice known as therapist-driven respiratory protocols.

  5. Critical Response Protocol

    ERIC Educational Resources Information Center

    Ellingson, Charlene; Roehrig, Gillian; Bakkum, Kris; Dubinsky, Janet M.

    2016-01-01

    This article introduces the Critical Response Protocol (CRP), an arts-based technique that engages students in equitable critical discourse and aligns with the "Next Generation Science Standards" vision for providing students opportunities for language learning while advancing science learning (NGSS Lead States 2013). CRP helps teachers…

  6. Protocol deviations before and after IV tPA in community hospitals

    PubMed Central

    Adelman, Eric E.; Scott, Phillip A.; Skolarus, Lesli E.; Fox, Allison K.; Frederiksen, Shirley M.; Meurer, William J.

    2015-01-01

    Background Protocol deviations before and after tPA treatment for ischemic stroke are common. It is unclear if patient or hospital factors predict protocol deviations. We examined predictors of protocol deviations and the effects of protocol violations on symptomatic intracerebral hemorrhage. Methods We used data from the INSTINCT trial, a cluster-randomized, controlled trial evaluating the efficacy of a barrier assessment and educational intervention to increase appropriate tPA use in 24 Michigan community hospitals, to review tPA treatments between 2007 and 2010. Protocol violations were defined as deviations from the standard tPA protocol, both before and after treatment. Multi-level logistic regression models were fitted to determine if patient and hospital variables were associated with pre-treatment or post-treatment protocol deviations. Results During the study, 557 patients (mean age 70; 52% male; median NIHSS 12) were treated with tPA. Protocol deviations occurred in 233 (42%) patients: 16% had pre-treatment deviations, 35% had post-treatment deviations, and 9% had both. The most common protocol deviations included elevated post-treatment blood pressure, antithrombotic agent use within 24 hours of treatment, and elevated pre-treatment blood pressure. Protocol deviations were not associated with symptomatic intracerebral hemorrhage, stroke severity, or hospital factors. Older age was associated with pre-treatment protocol deviations (adjusted OR 0.52; 95% confidence interval 0.30-0.92). Pre-treatment deviations were associated with post-treatment deviations (adjusted OR 3.20; 95% confidence interval 1.91-5.35). Conclusions Protocol deviations were not associated with symptomatic intracerebral hemorrhage. Aside from age, patient and hospital factors were not associated with protocol deviations. PMID:26419527

  7. OIL SPILL DISPERSANT EFFECTIVENESS PROTOCOL. II: PERFORMANCE OF THE REVISED PROTOCOL

    EPA Science Inventory

    The current U.S. Environmental Protection Agency (EPA) protocol for testing the effectiveness of dispersants for use in treating oil spills on the open water, the swirling flask test (SFT), has been found to give widely varying results in the hands of different testing laborator...

  8. An Argument Approach to Observation Protocol Validity

    ERIC Educational Resources Information Center

    Bell, Courtney A.; Gitomer, Drew H.; McCaffrey, Daniel F.; Hamre, Bridget K.; Pianta, Robert C.; Qi, Yi

    2012-01-01

    This article develops a validity argument approach for use on observation protocols currently used to assess teacher quality for high-stakes personnel and professional development decisions. After defining the teaching quality domain, we articulate an interpretive argument for observation protocols. To illustrate the types of evidence that might…

  9. Advanced orbiting systems test-bedding and protocol verification

    NASA Technical Reports Server (NTRS)

    Noles, James; De Gree, Melvin

    1989-01-01

    The Consultative Committee for Space Data Systems (CCSDS) has begun the development of a set of protocol recommendations for Advanced Orbiting Systems (SOS). The AOS validation program and formal definition of AOS protocols are reviewed, and the configuration control of the AOS formal specifications is summarized. Independent implementations of the AOS protocols by NASA and ESA are discussed, and cross-support/interoperability tests which will allow the space agencies of various countries to share AOS communication facilities are addressed.

  10. Evaluation of an adult insulin infusion protocol at an academic medical center.

    PubMed

    Petrov, Katerina I; Burns, Tammy L; Drincic, Andjela

    2012-05-01

    Acknowledging evidence of possible detrimental effects of tightly controlled blood glucose levels, the American Association of Clinical Endocrinologists and the American Diabetes Association published a consensus statement recommending less strict control for most diabetic patients. As a result of these recommendations, our academic center at Creighton University Medical Center revised its adult insulin infusion protocol to target blood glucose levels ranging from 120 to 180 mg/dL for regular (standard) glycemic control and 80 to 120 mg/dL for tight control; previous targets had ranged from 80 to 180 mg/dL and 70 to 110 mg/dL, respectively. The primary objective was to evaluate the time that blood glucose values were within the target range for patients receiving the new protocol, compared with patients receiving the previous protocol. Our study was designed to evaluate the effectiveness and safety of the revised protocol. Using a retrospective chart review, we collected data for 4 months from patients on the old insulin protocol (May to August 2009) and for 4 months from patients on the new protocol (September to December 2009). Secondary endpoints included the number of hypoglycemic episodes (blood glucose below 70 mg/dL) and severe hypoglycemic episodes (blood glucose 40 mg/dL or lower) experienced by patients receiving the new insulin protocol compared with those receiving the former protocol. Patient characteristics were similar at baseline. Blood glucose values stayed within the target range for a significantly shorter time with the new protocol than with the former protocol (44.6% vs. 56.8%, respectively; P < 0.001), probably because of the narrower target range in the revised protocol. No statistically significant differences in hypoglycemia were observed after the protocol was changed. Hypoglycemia occurred in 31% of the former-protocol patients compared with 18% of the revised-protocol patients. Severe hypoglycemia was experienced by 2.1% of patients on

  11. A Protocol for Advanced Psychometric Assessment of Surveys

    PubMed Central

    Squires, Janet E.; Hayduk, Leslie; Hutchinson, Alison M.; Cranley, Lisa A.; Gierl, Mark; Cummings, Greta G.; Norton, Peter G.; Estabrooks, Carole A.

    2013-01-01

    Background and Purpose. In this paper, we present a protocol for advanced psychometric assessments of surveys based on the Standards for Educational and Psychological Testing. We use the Alberta Context Tool (ACT) as an exemplar survey to which this protocol can be applied. Methods. Data mapping, acceptability, reliability, and validity are addressed. Acceptability is assessed with missing data frequencies and the time required to complete the survey. Reliability is assessed with internal consistency coefficients and information functions. A unitary approach to validity consisting of accumulating evidence based on instrument content, response processes, internal structure, and relations to other variables is taken. We also address assessing performance of survey data when aggregated to higher levels (e.g., nursing unit). Discussion. In this paper we present a protocol for advanced psychometric assessment of survey data using the Alberta Context Tool (ACT) as an exemplar survey; application of the protocol to the ACT survey is underway. Psychometric assessment of any survey is essential to obtaining reliable and valid research findings. This protocol can be adapted for use with any nursing survey. PMID:23401759

  12. Prebreathe Protocol for Extravehicular Activity Technical Consultation Report

    NASA Technical Reports Server (NTRS)

    Ross, Jerry; Duncan, Michael

    2008-01-01

    In the performance of EVA by that National Aeronautics and Space Administration (NASA) astronauts, there exists a risk of DCS as the suit pressure is reduced to 4.3 pounds per square inch, absolute (psia) from the International Space Station (ISS) pressure of 14.7 psia. Several DCS-preventive procedures have been developed and implemented. Each of these procedures involve the use of oxygen (O2) prebreathe to effectively washout tissue nitrogen (N2).The management of the ISS Programs convened an expert independent peer review Team to conduct a review of the Decompression Sickness (DCS) risks associated with the Extra Vehicular Activity (EVA) Campout Prebreathe (PB) protocol for its consideration for use on future missions. The major findings and recommendations of the expert panel are: There is no direct experimental data to confirm the potential DCS risks of the Campout PB protocol. However, based on model data, statistical probability, physiology, and information derived from similar PB protocols, there is no compelling evidence to suggest that the Campout PB protocol is less safe than the other NASA approved PB protocols.

  13. IVOA Credential Delegation Protocol Version 1.0

    NASA Astrophysics Data System (ADS)

    Plante, Raymond; Graham, Matthew; Rixon, Guy; Taffoni, Giuliano; Plante, Raymond; Graham, Matthew

    2010-02-01

    The credential delegation protocol allows a client program to delegate a user's credentials to a service such that that service may make requests of other services in the name of that user. The protocol defines a REST service that works alongside other IVO services to enable such a delegation in a secure manner. In addition to defining the specifics of the service protocol, this document describes how a delegation service is registered in an IVOA registry along with the services it supports. The specification also explains how one can determine from a service registration that it requires the use of a supporting delegation service.

  14. Toward Synthesis, Analysis, and Certification of Security Protocols

    NASA Technical Reports Server (NTRS)

    Schumann, Johann

    2004-01-01

    Implemented security protocols are basically pieces of software which are used to (a) authenticate the other communication partners, (b) establish a secure communication channel between them (using insecure communication media), and (c) transfer data between the communication partners in such a way that these data only available to the desired receiver, but not to anyone else. Such an implementation usually consists of the following components: the protocol-engine, which controls in which sequence the messages of the protocol are sent over the network, and which controls the assembly/disassembly and processing (e.g., decryption) of the data. the cryptographic routines to actually encrypt or decrypt the data (using given keys), and t,he interface to the operating system and to the application. For a correct working of such a security protocol, all of these components must work flawlessly. Many formal-methods based techniques for the analysis of a security protocols have been developed. They range from using specific logics (e.g.: BAN-logic [4], or higher order logics [12] to model checking [2] approaches. In each approach, the analysis tries to prove that no (or at least not a modeled intruder) can get access to secret data. Otherwise, a scenario illustrating the &tack may be produced. Despite the seeming simplicity of security protocols ("only" a few messages are sent between the protocol partners in order to ensure a secure communication), many flaws have been detected. Unfortunately, even a perfect protocol engine does not guarantee flawless working of a security protocol, as incidents show. Many break-ins and security vulnerabilities are caused by exploiting errors in the implementation of the protocol engine or the underlying operating system. Attacks using buffer-overflows are a very common class of such attacks. Errors in the implementation of exception or error handling can open up additional vulnerabilities. For example, on a website with a log-in screen

  15. Medium Access Control Protocols for Cognitive Radio Ad Hoc Networks: A Survey

    PubMed Central

    Islam, A. K. M. Muzahidul; Baharun, Sabariah; Mansoor, Nafees

    2017-01-01

    New wireless network paradigms will demand higher spectrum use and availability to cope with emerging data-hungry devices. Traditional static spectrum allocation policies cause spectrum scarcity, and new paradigms such as Cognitive Radio (CR) and new protocols and techniques need to be developed in order to have efficient spectrum usage. Medium Access Control (MAC) protocols are accountable for recognizing free spectrum, scheduling available resources and coordinating the coexistence of heterogeneous systems and users. This paper provides an ample review of the state-of-the-art MAC protocols, which mainly focuses on Cognitive Radio Ad Hoc Networks (CRAHN). First, a description of the cognitive radio fundamental functions is presented. Next, MAC protocols are divided into three groups, which are based on their channel access mechanism, namely time-slotted protocol, random access protocol and hybrid protocol. In each group, a detailed and comprehensive explanation of the latest MAC protocols is presented, as well as the pros and cons of each protocol. A discussion on future challenges for CRAHN MAC protocols is included with a comparison of the protocols from a functional perspective. PMID:28926952

  16. Quantum protocols within Spekkens' toy model

    NASA Astrophysics Data System (ADS)

    Disilvestro, Leonardo; Markham, Damian

    2017-05-01

    Quantum mechanics is known to provide significant improvements in information processing tasks when compared to classical models. These advantages range from computational speedups to security improvements. A key question is where these advantages come from. The toy model developed by Spekkens [R. W. Spekkens, Phys. Rev. A 75, 032110 (2007), 10.1103/PhysRevA.75.032110] mimics many of the features of quantum mechanics, such as entanglement and no cloning, regarded as being important in this regard, despite being a local hidden variable theory. In this work, we study several protocols within Spekkens' toy model where we see it can also mimic the advantages and limitations shown in the quantum case. We first provide explicit proofs for the impossibility of toy bit commitment and the existence of a toy error correction protocol and consequent k -threshold secret sharing. Then, defining a toy computational model based on the quantum one-way computer, we prove the existence of blind and verified protocols. Importantly, these two last quantum protocols are known to achieve a better-than-classical security. Our results suggest that such quantum improvements need not arise from any Bell-type nonlocality or contextuality, but rather as a consequence of steering correlations.

  17. ZeroCal: Automatic MAC Protocol Calibration

    NASA Astrophysics Data System (ADS)

    Meier, Andreas; Woehrle, Matthias; Zimmerling, Marco; Thiele, Lothar

    Sensor network MAC protocols are typically configured for an intended deployment scenario once and for all at compile time. This approach, however, leads to suboptimal performance if the network conditions deviate from the expectations. We present ZeroCal, a distributed algorithm that allows nodes to dynamically adapt to variations in traffic volume. Using ZeroCal, each node autonomously configures its MAC protocol at runtime, thereby trying to reduce the maximum energy consumption among all nodes. While the algorithm is readily usable for any asynchronous low-power listening or low-power probing protocol, we validate and demonstrate the effectiveness of ZeroCal on X-MAC. Extensive testbed experiments and simulations indicate that ZeroCal quickly adapts to traffic variations. We further show that ZeroCal extends network lifetime by 50% compared to an optimal configuration with identical and static MAC parameters at all nodes.

  18. Bidirectional Teleportation Protocol in Quantum Wireless Multi-hop Network

    NASA Astrophysics Data System (ADS)

    Cai, Rui; Yu, Xu-Tao; Zhang, Zai-Chen

    2018-06-01

    We propose a bidirectional quantum teleportation protocol based on a composite GHZ-Bell state. In this protocol, the composite GHZ-Bell state channel is transformed into two-Bell state channel through gate operations and single qubit measurements. The channel transformation will lead to different kinds of quantum channel states, so a method is proposed to help determine the unitary matrices effectively under different quantum channels. Furthermore, we discuss the bidirectional teleportation protocol in the quantum wireless multi-hop network. This paper is aimed to provide a bidirectional teleportation protocol and study the bidirectional multi-hop teleportation in the quantum wireless communication network.

  19. Bidirectional Teleportation Protocol in Quantum Wireless Multi-hop Network

    NASA Astrophysics Data System (ADS)

    Cai, Rui; Yu, Xu-Tao; Zhang, Zai-Chen

    2018-02-01

    We propose a bidirectional quantum teleportation protocol based on a composite GHZ-Bell state. In this protocol, the composite GHZ-Bell state channel is transformed into two-Bell state channel through gate operations and single qubit measurements. The channel transformation will lead to different kinds of quantum channel states, so a method is proposed to help determine the unitary matrices effectively under different quantum channels. Furthermore, we discuss the bidirectional teleportation protocol in the quantum wireless multi-hop network. This paper is aimed to provide a bidirectional teleportation protocol and study the bidirectional multi-hop teleportation in the quantum wireless communication network.

  20. Analysis of limiting information characteristics of quantum-cryptography protocols

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sych, D V; Grishanin, Boris A; Zadkov, Viktor N

    2005-01-31

    The problem of increasing the critical error rate of quantum-cryptography protocols by varying a set of letters in a quantum alphabet for space of a fixed dimensionality is studied. Quantum alphabets forming regular polyhedra on the Bloch sphere and the continual alphabet equally including all the quantum states are considered. It is shown that, in the absence of basis reconciliation, a protocol with the tetrahedral alphabet has the highest critical error rate among the protocols considered, while after the basis reconciliation, a protocol with the continual alphabet possesses the highest critical error rate. (quantum optics and quantum computation)

  1. An XML-Based Protocol for Distributed Event Services

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    A recent trend in distributed computing is the construction of high-performance distributed systems called computational grids. One difficulty we have encountered is that there is no standard format for the representation of performance information and no standard protocol for transmitting this information. This limits the types of performance analysis that can be undertaken in complex distributed systems. To address this problem, we present an XML-based protocol for transmitting performance events in distributed systems and evaluate the performance of this protocol.

  2. METHODS AND ANALYSES FOR IMPLEMENTING NATURAL ATTENUATION PROTOCOLS

    EPA Science Inventory

    Technical protocols for evaluating natural attenuation at petroleum hydrocarbon and chlorinated solvent contaminated sites specify the analysis of electron acceptors and metabolic by-products for identifying and quantifying natural attenuation processes. However, these protocols ...

  3. A Self-Stabilizing Distributed Clock Synchronization Protocol for Arbitrary Digraphs

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.

    2011-01-01

    This report presents a self-stabilizing distributed clock synchronization protocol in the absence of faults in the system. It is focused on the distributed clock synchronization of an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. We present an outline of a deductive proof of the correctness of the protocol. A model of the protocol was mechanically verified using the Symbolic Model Verifier (SMV) for a variety of topologies. Results of the mechanical proof of the correctness of the protocol are provided. The model checking results have verified the correctness of the protocol as they apply to the networks with unidirectional and bidirectional links. In addition, the results confirm the claims of determinism and linear convergence. As a result, we conjecture that the protocol solves the general case of this problem. We also present several variations of the protocol and discuss that this synchronization protocol is indeed an emergent system.

  4. Compositional mining of multiple object API protocols through state abstraction.

    PubMed

    Dai, Ziying; Mao, Xiaoguang; Lei, Yan; Qi, Yuhua; Wang, Rui; Gu, Bin

    2013-01-01

    API protocols specify correct sequences of method invocations. Despite their usefulness, API protocols are often unavailable in practice because writing them is cumbersome and error prone. Multiple object API protocols are more expressive than single object API protocols. However, the huge number of objects of typical object-oriented programs poses a major challenge to the automatic mining of multiple object API protocols: besides maintaining scalability, it is important to capture various object interactions. Current approaches utilize various heuristics to focus on small sets of methods. In this paper, we present a general, scalable, multiple object API protocols mining approach that can capture all object interactions. Our approach uses abstract field values to label object states during the mining process. We first mine single object typestates as finite state automata whose transitions are annotated with states of interacting objects before and after the execution of the corresponding method and then construct multiple object API protocols by composing these annotated single object typestates. We implement our approach for Java and evaluate it through a series of experiments.

  5. Compositional Mining of Multiple Object API Protocols through State Abstraction

    PubMed Central

    Mao, Xiaoguang; Qi, Yuhua; Wang, Rui; Gu, Bin

    2013-01-01

    API protocols specify correct sequences of method invocations. Despite their usefulness, API protocols are often unavailable in practice because writing them is cumbersome and error prone. Multiple object API protocols are more expressive than single object API protocols. However, the huge number of objects of typical object-oriented programs poses a major challenge to the automatic mining of multiple object API protocols: besides maintaining scalability, it is important to capture various object interactions. Current approaches utilize various heuristics to focus on small sets of methods. In this paper, we present a general, scalable, multiple object API protocols mining approach that can capture all object interactions. Our approach uses abstract field values to label object states during the mining process. We first mine single object typestates as finite state automata whose transitions are annotated with states of interacting objects before and after the execution of the corresponding method and then construct multiple object API protocols by composing these annotated single object typestates. We implement our approach for Java and evaluate it through a series of experiments. PMID:23844378

  6. Unconditional security of a three state quantum key distribution protocol.

    PubMed

    Boileau, J-C; Tamaki, K; Batuwantudawe, J; Laflamme, R; Renes, J M

    2005-02-04

    Quantum key distribution (QKD) protocols are cryptographic techniques with security based only on the laws of quantum mechanics. Two prominent QKD schemes are the Bennett-Brassard 1984 and Bennett 1992 protocols that use four and two quantum states, respectively. In 2000, Phoenix et al. proposed a new family of three-state protocols that offers advantages over the previous schemes. Until now, an error rate threshold for security of the symmetric trine spherical code QKD protocol has been shown only for the trivial intercept-resend eavesdropping strategy. In this Letter, we prove the unconditional security of the trine spherical code QKD protocol, demonstrating its security up to a bit error rate of 9.81%. We also discuss how this proof applies to a version of the trine spherical code QKD protocol where the error rate is evaluated from the number of inconclusive events.

  7. Synthesizing Existing CSMA and TDMA Based MAC Protocols for VANETs

    PubMed Central

    Huang, Jiawei; Li, Qi; Zhong, Shaohua; Liu, Lianhai; Zhong, Ping; Wang, Jianxin; Ye, Jin

    2017-01-01

    Many Carrier Sense Multiple Access (CSMA) and Time Division Multiple Access (TDMA) based medium access control (MAC) protocols for vehicular ad hoc networks (VANETs) have been proposed recently. Contrary to the common perception that they are competitors, we argue that the underlying strategies used in these MAC protocols are complementary. Based on this insight, we design CTMAC, a MAC protocol that synthesizes existing strategies; namely, random accessing channel (used in CSMA-style protocols) and arbitral reserving channel (used in TDMA-based protocols). CTMAC swiftly changes its strategy according to the vehicle density, and its performance is better than the state-of-the-art protocols. We evaluate CTMAC using at-scale simulations. Our results show that CTMAC reduces the channel completion time and increases the network goodput by 45% for a wide range of application workloads and network settings. PMID:28208590

  8. Consensus formalisé: recommandations de pratiques cliniques pour la prise en charge de la lombalgie aiguë du patient africain

    PubMed Central

    Elleuch, Mohamed; El Maghraoui, Abdellah; Griene, Brahim; Nejmi, Mati; Ndongo, Souhaibou; Serrie, Alain

    2015-01-01

    La lombalgie aiguë est la pathologie rhumatismale la plus fréquente en Afrique. L’épidémiologie et la présentation clinique ne diffèrent pas de celles observées sur les autres continents. En revanche, les aspects psycho-sociaux, la disponibilité des traitements, l'accès aux soins et le poids culturel des médecines traditionnelles sont autant de spécificités qui ont conduit à la réalisation du 1er consensus d'experts en rhumatologie pour la prise en charge du patient africain. Destiné aux praticiens, ce travail collaboratif multinational a pour objectif de fournir 11 recommandations de pratiques cliniques simples, fondées sur les preuves, et adaptées aux conditions de l'exercice médical en Afrique. Leur ambition est d'améliorer la prise en charge de la lombalgie aigue par une évaluation initiale clinique pertinente, une diminution des examens radiologiques inutiles, une prescription médicamenteuse adéquate et l'abandon de procédures invasives inappropriées. PMID:26955427

  9. Feasibility of Developing a Protocol for Automated Protist Analysis

    DTIC Science & Technology

    2010-03-01

    Acquisition Directorate Research & Development Center Report No: CG-D-02-ll Feasibility of Developing a Protocol for Automated Protist Analysis...Technical Information Service, Springfield, VA 22161. March 2010 Homeland Security Feasibility of Developing a Protocol for Automated Protist ...March 21)10 Feasibility of Developing a Protocol for Automated Protist Analysis 00 00 o CM Technical Report Documentation Page 1. Report No CG-D

  10. Ocean Optics Protocols for Satellite Ocean Color Sensor Validation. Volume 4; Inherent Optical Properties: Instruments, Characterizations, Field Measurements and Data Analysis Protocols; Revised

    NASA Technical Reports Server (NTRS)

    Mueller, J. L. (Editor); Fargion, Giuletta S. (Editor); McClain, Charles R. (Editor); Pegau, Scott; Zaneveld, J. Ronald V.; Mitchell, B. Gregg; Kahru, Mati; Wieland, John; Stramska, Malgorzat

    2003-01-01

    This document stipulates protocols for measuring bio-optical and radiometric data for the Sensor Intercomparison and Merger for Biological and Interdisciplinary Oceanic Studies (SIMBIOS) Project activities and algorithm development. The document is organized into 6 separate volumes as Ocean Optics Protocols for Satellite Ocean Color Sensor Validation, Revision 4. Volume I: Introduction, Background and Conventions; Volume II: Instrument Specifications, Characterization and Calibration; Volume III: Radiometric Measurements and Data Analysis Methods; Volume IV: Inherent Optical Properties: Instruments, Characterization, Field Measurements and Data Analysis Protocols; Volume V: Biogeochemical and Bio-Optical Measurements and Data Analysis Methods; Volume VI: Special Topics in Ocean Optics Protocols and Appendices. The earlier version of Ocean Optics Protocols for Satellite Ocean Color Sensor Validation, Revision 3 (Mueller and Fargion 2002, Volumes 1 and 2) is entirely superseded by the six volumes of Revision 4 listed above.

  11. Protocols | Office of Cancer Clinical Proteomics Research

    Cancer.gov

    Each reagent on the Antibody Portal has been characterized by a combination of methods specific for that antibody. To view the customized antibody methods and protocols (Standard Operating Procedures) used to generate and characterize each reagent, select an antibody of interest and open the protocols associated with their respective characterization methods along with characterization data.

  12. WE-E-304-00: Implementing SBRT Protocols

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    2015-06-15

    SBRT is having a dramatic impact on radiation therapy of early-stage, locally advanced cancers. A number of national protocols have been and are being developed to assess the clinical efficacy of SBRT for various anatomical sites, such as lung and spine. Physics credentialing for participating and implementation of trial protocols involve a broad spectrum of requirements from image guidance, motion management, to planning technology and dosimetric constrains. For radiation facilities that do not have extensive experiences in SBRT treatment and protocol credentialing, these complex processes of credentialing and implementation could be very challenging and, sometimes, may lead to ineffective evenmore » unsuccessful execution of these processes. In this proposal, we will provide comprehensive review of some current SBRT protocols, explain the requirements and their underline rationales, illustrate representative failed and successful experiences, related to SBRT credentialing, and discuss strategies for effective SBRT credentialing and implementation. Learning Objectives: Understand requirements and challenges of SBRT credentailing and implentation Discuss processes and strategies of effective SBRT credentailing Discuss practical considerations, potential pitfalls and solutions of SBRT implentation.« less

  13. DEVELOPMENT OF MODELING PROTOCOLS FOR USE IN DETERMINING SEDIMENT TMDLS

    EPA Science Inventory

    Modeling protocols for use in determining sediment TMDLs are being developed to provide the Office of Water, Regions and the States with assistance in determining TMDLs for sediment impaired water bodies. These protocols will supplement the protocols developed by the Office of W...

  14. New Protocol for Skin Landmark Registration in Image-Guided Neurosurgery: Technical Note.

    PubMed

    Gerard, Ian J; Hall, Jeffery A; Mok, Kelvin; Collins, D Louis

    2015-09-01

    Newer versions of the commercial Medtronic StealthStation allow the use of only 8 landmark pairs for patient-to-image registration as opposed to 9 landmarks in older systems. The choice of which landmark pair to drop in these newer systems can have an effect on the quality of the patient-to-image registration. To investigate 4 landmark registration protocols based on 8 landmark pairs and compare the resulting registration accuracy with a 9-landmark protocol. Four different protocols were tested on both phantoms and patients. Two of the protocols involved using 4 ear landmarks and 4 facial landmarks and the other 2 involved using 3 ear landmarks and 5 facial landmarks. Both the fiducial registration error and target registration error were evaluated for each of the different protocols to determine any difference between them and the 9-landmark protocol. No difference in fiducial registration error was found between any of the 8-landmark protocols and the 9-landmark protocol. A significant decrease (P < .05) in target registration error was found when using a protocol based on 4 ear landmarks and 4 facial landmarks compared with the other protocols based on 3 ear landmarks. When using 8 landmarks to perform the patient-to-image registration, the protocol using 4 ear landmarks and 4 facial landmarks greatly outperformed the other 8-landmark protocols and 9-landmark protocol, resulting in the lowest target registration error.

  15. Development of Uniform Protocol for Alopecia Areata Clinical Trials.

    PubMed

    Solomon, James A

    2015-11-01

    Developing a successful treatment for alopecia areata (AA), clearly has not been at the forefront of the agenda for new drug/device development among the pharmaceutical and medical device industry. The National Alopecia Areata Foundation (NAAF), a patient advocacy group, initiated a plan to facilitate and drive clinical research toward finding safe and efficacious treatments for AA. As such, Alopecia Areata Uniform Protocols for clinical trials to test new treatments for AA were developed. The design of the uniform protocol is to accomplish the development of a plug-and-play template as well as to provide a framework wherein data from studies utilizing the uniform protocol can be compared through consistency of inclusions/exclusions, safety, and outcome assessment measures. A core uniform protocol for use by pharmaceutical companies in testing proof of concept for investigational products to treat AA. The core protocol includes standardized title, informed consent, inclusion/exclusion criteria, disease outcome assessments, and safety assessments. The statistical methodology to assess successful outcomes will also be standardized. The protocol as well as the informed consent form has been approved in concept by Liberty IRB and is ready to present to pharmaceutical companies.

  16. Effect of different analyte diffusion/adsorption protocols on SERS signals

    NASA Astrophysics Data System (ADS)

    Li, Ruoping; Petschek, Rolfe G.; Han, Junhe; Huang, Mingju

    2018-07-01

    The effect of different analyte diffusion/adsorption protocols was studied which is often overlooked in surface-enhanced Raman scattering (SERS) technique. Three protocols: highly concentrated dilution (HCD) protocol, half-half dilution (HHD) protocol and layered adsorption (LA) protocol were studied and the SERS substrates were monolayer films of 80 nm Ag nanoparticles (NPs) which were modified by polyvinylpyrrolidone. The diffusion/adsorption mechanisms were modelled using the diffusion equation and the electromagnetic field distribution of two adjacent Ag NPs was simulated by the finite-different time-domain method. All experimental data and theoretical analysis suggest that different diffusion/adsorption behaviour of analytes will cause different SERS signal enhancements. HHD protocol could produce the most uniform and reproducible samples, and the corresponding signal intensity of the analyte is the strongest. This study will help to understand and promote the use of SERS technique in quantitative analysis.

  17. Protocols for Copying and Proofreading in Template-Assisted Polymerization

    NASA Astrophysics Data System (ADS)

    Pigolotti, Simone; Sartori, Pablo

    2016-03-01

    We discuss how information encoded in a template polymer can be stochastically copied into a copy polymer. We consider four different stochastic copy protocols of increasing complexity, inspired by building blocks of the mRNA translation pathway. In the first protocol, monomer incorporation occurs in a single stochastic transition. We then move to a more elaborate protocol in which an intermediate step can be used for error correction. Finally, we discuss the operating regimes of two kinetic proofreading protocols: one in which proofreading acts from the final copying step, and one in which it acts from an intermediate step. We review known results for these models and, in some cases, extend them to analyze all possible combinations of energetic and kinetic discrimination. We show that, in each of these protocols, only a limited number of these combinations leads to an improvement of the overall copying accuracy.

  18. Packet-Based Protocol Efficiency for Aeronautical and Satellite Communications

    NASA Technical Reports Server (NTRS)

    Carek, David A.

    2005-01-01

    This paper examines the relation between bit error ratios and the effective link efficiency when transporting data with a packet-based protocol. Relations are developed to quantify the impact of a protocol s packet size and header size relative to the bit error ratio of the underlying link. These relations are examined in the context of radio transmissions that exhibit variable error conditions, such as those used in satellite, aeronautical, and other wireless networks. A comparison of two packet sizing methodologies is presented. From these relations, the true ability of a link to deliver user data, or information, is determined. Relations are developed to calculate the optimal protocol packet size forgiven link error characteristics. These relations could be useful in future research for developing an adaptive protocol layer. They can also be used for sizing protocols in the design of static links, where bit error ratios have small variability.

  19. Quality and Variability of Online Physical Therapy Protocols for Isolated Meniscal Repairs.

    PubMed

    Trofa, David P; Parisien, Robert L; Noticewala, Manish S; Noback, Peter C; Ahmad, Christopher S; Moutzouros, Vasilios; Makhni, Eric C

    2018-05-31

    The ideal meniscal repair postoperative rehabilitation protocol has yet to be determined. Further, patients are attempting to access health care content online at a precipitously increasing rate given the efficiency of modern search engines. The purpose of this investigation was to assess the quality and variability of meniscal repair rehabilitation protocols published online with the hypothesis that there would be a high degree of variability found across available protocols. To this end, Web-based meniscal repair physical therapy protocols from U.S. academic orthopaedic programs as well as the first 10 protocols identified by the Google search engine for the term "meniscal repair physical therapy protocol" were reviewed and assessed via a custom scoring rubric. Twenty protocols were identified from 155 U.S. academic orthopaedic programs for a total of 30 protocols. Twenty-six protocols (86.6%) recommended immediate postoperative bracing. Twelve (40.0%) protocols permitted immediate weight-bearing as tolerated (WBAT) postoperatively, while the remaining protocols permitted WBAT at an average of 4.0 (range, 1-7) weeks. There was considerable variation in range of motion (ROM) goals, with most protocols (73.3%) initiating immediate passive ROM to 90°. The types and timing of strength, proprioception, agility, and pivoting exercises advised were extremely diverse. Only five protocols (16.7%) employed functional testing as a marker for return to athletics. The results of this study indicate that only a minority of academic orthopaedic programs publish meniscal repair physical therapy protocols online and that within the most readily available online protocols there are significant disparities in regards to brace use, ROM, weight-bearing, and strengthening and proprioception exercises. These discrepancies reflect the fact that the best rehabilitation practices after a meniscal repair have yet to be elucidated. This represents a significant area for improved patient

  20. Protocol-based care: the standardisation of decision-making?

    PubMed

    Rycroft-Malone, Jo; Fontenla, Marina; Seers, Kate; Bick, Debra

    2009-05-01

    To explore how protocol-based care affects clinical decision-making. In the context of evidence-based practice, protocol-based care is a mechanism for facilitating the standardisation of care and streamlining decision-making through rationalising the information with which to make judgements and ultimately decisions. However, whether protocol-based care does, in the reality of practice, standardise decision-making is unknown. This paper reports on a study that explored the impact of protocol-based care on nurses' decision-making. Theoretically informed by realistic evaluation and the promoting action on research implementation in health services framework, a case study design using ethnographic methods was used. Two sites were purposively sampled; a diabetic and endocrine unit and a cardiac medical unit. Within each site, data collection included observation, postobservation semi-structured interviews with staff and patients, field notes, feedback sessions and document review. Data were inductively and thematically analysed. Decisions made by nurses in both sites were varied according to many different and interacting factors. While several standardised care approaches were available for use, in reality, a variety of information sources informed decision-making. The primary approach to knowledge exchange and acquisition was person-to-person; decision-making was a social activity. Rarely were standardised care approaches obviously referred to; nurses described following a mental flowchart, not necessarily linked to a particular guideline or protocol. When standardised care approaches were used, it was reported that they were used flexibly and particularised. While the logic of protocol-based care is algorithmic, in the reality of clinical practice, other sources of information supported nurses' decision-making process. This has significant implications for the political goal of standardisation. The successful implementation and judicious use of tools such as

  1. A literature review: polypharmacy protocol for primary care.

    PubMed

    Skinner, Mary

    2015-01-01

    The purpose of this literature review is to critically evaluate published protocols on polypharmacy in adults ages 65 and older that are currently used in primary care settings that may potentially lead to fewer adverse drug events. A review of OVID, CINAHL, EBSCO, Cochrane Library, Medline, and PubMed databases was completed using the following key words: protocol, guideline, geriatrics, elderly, older adult, polypharmacy, and primary care. Inclusion criteria were: articles in medical, nursing, and pharmacology journals with an intervention, protocol, or guideline addressing polypharmacy that lead to fewer adverse drug events. Qualitative and quantitative studies were included. Exclusion criteria were: publications prior to the year 1992. A gap exists in the literature. No standardized protocol for addressing polypharmacy in the primary care setting was found. Mnemonics, algorithms, clinical practice guidelines, and clinical strategies for addressing polypharmacy in a variety of health care settings were found throughout the literature. Several screening instruments for use in primary care to assess potentially inappropriate prescription of medications in the elderly, such as the Beers Criteria and the STOPP screening tool, were identified. However, these screening instruments were not included in a standardized protocol to manage polypharmacy in primary care. Polypharmacy in the elderly is a critical problem that may result in adverse drug events such as falls, hospitalizations, and increased expenditures for both the patient and the health care system. No standardized protocols to address polypharmacy specific to the primary care setting were identified in this review of the literature. Given the growing population of elderly in this country and the high number of medications they consume, it is critical to focus on the utilization of a standardized protocol to address the potential harm of polypharmacy in the primary care setting and evaluate its effects on

  2. Robust Routing Protocol For Digital Messages

    NASA Technical Reports Server (NTRS)

    Marvit, Maclen

    1994-01-01

    Refinement of ditigal-message-routing protocol increases fault tolerance of polled networks. AbNET-3 is latest of generic AbNET protocols for transmission of messages among computing nodes. AbNET concept described in "Multiple-Ring Digital Communication Network" (NPO-18133). Specifically aimed at increasing fault tolerance of network in broadcast mode, in which one node broadcasts message to and receives responses from all other nodes. Communication in network of computers maintained even when links fail.

  3. A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem.

    PubMed

    Zhao, Zhenguo

    2014-05-01

    With the fast advancement of the wireless communication technology and the widespread use of medical systems, the radio frequency identification (RFID) technology has been widely used in healthcare environments. As the first important protocol for ensuring secure communication in healthcare environment, the RFID authentication protocols derive more and more attentions. Most of RFID authentication protocols are based on hash function or symmetric cryptography. To get more security properties, elliptic curve cryptosystem (ECC) has been used in the design of RFID authentication protocol. Recently, Liao and Hsiao proposed a new RFID authentication protocol using ECC and claimed their protocol could withstand various attacks. In this paper, we will show that their protocol suffers from the key compromise problem, i.e. an adversary could get the private key stored in the tag. To enhance the security, we propose a new RFID authentication protocol using ECC. Detailed analysis shows the proposed protocol not only could overcome weaknesses in Liao and Hsiao's protocol but also has the same performance. Therefore, it is more suitable for healthcare environments.

  4. Evaluation of Protocol Uniformity Concerning Laparoscopic Cholecystectomy in The Netherlands

    PubMed Central

    Goossens, Richard H. M.; van Eijk, Daan J.; Lange, Johan F.

    2008-01-01

    Background Iatrogenic bile duct injury remains a current complication of laparoscopic cholecystectomy. One uniform and standardized protocol, based on the “critical view of safety” concept of Strasberg, should reduce the incidence of this complication. Furthermore, owing to the rapid development of minimally invasive surgery, technicians are becoming more frequently involved. To improve communication between the operating team and technicians, standardized actions should also be defined. The aim of this study was to compare existing protocols for laparoscopic cholecystectomy from various Dutch hospitals. Methods Fifteen Dutch hospitals were contacted for evaluation of their protocols for laparoscopic cholecystectomy. All evaluated protocols were divided into six steps and were compared accordingly. Results In total, 13 hospitals responded—5 academic hospitals, 5 teaching hospitals, 3 community hospitals—of which 10 protocols were usable for comparison. Concerning the trocar positions, only minor differences were found. The concept of “critical view of safety” was represented in just one protocol. Furthermore, the order of clipping and cutting the cystic artery and duct differed. Descriptions of instruments and apparatus were also inconsistent. Conclusions Present protocols differ too much to define a universal procedure among surgeons in The Netherlands. The authors propose one (inter)national standardized protocol, including standardized actions. This uniform standardized protocol has to be officially released and recommended by national scientific associations (e.g., the Dutch Society of Surgery) or international societies (e.g., European Association for Endoscopic Surgery and Society of American Gastrointestinal and Endoscopic Surgeons). The aim is to improve patient safety and professional communication, which are necessary for new developments. PMID:18224485

  5. Extra-Vehicular Activity (EVA) glove evaluation test protocol

    NASA Technical Reports Server (NTRS)

    Hinman-Sweeney, E. M.

    1994-01-01

    One of the most critical components of a space suit is the gloves, yet gloves have traditionally presented significant design challenges. With continued efforts at glove development, a method for evaluating glove performance is needed. This paper presents a pressure-glove evaluation protocol. A description of this evaluation protocol, and its development is provided. The protocol allows comparison of one glove design to another, or any one design to bare-handed performance. Gloves for higher pressure suits may be evaluated at current and future design pressures to drive out differences in performance due to pressure effects. Using this protocol, gloves may be evaluated during design to drive out design problems and determine areas for improvement, or fully mature designs may be evaluated with respect to mission requirements. Several different test configurations are presented to handle these cases. This protocol was run on a prototype glove. The prototype was evaluated at two operating pressures and in the unpressurized state, with results compared to bare-handed performance. Results and analysis from this test series are provided, as is a description of the configuration used for this test.

  6. The influence of brewing water characteristic on sensory perception of pour-over local coffee

    NASA Astrophysics Data System (ADS)

    Fibrianto, K.; Ardianti, A. D.; Pradipta, K.; Sunarharum, W. B.

    2018-01-01

    The coffee quality can be characterized by its multisensory perceptions. The content and mineral composition and other substances of brewing water can affect the result of brewed-coffee. The water may influence in extraction capabilities and flavor clarity. The ground Dampit coffee and two commercial instant coffee with pour-over method were used in this study. Various types of commercial drinking water were used to brew the coffee. The result suggests that the different brewing water affects the intensity of sweet and chocolate aroma, as well as oily mouth-feel. Surprisingly, taste and flavour attributes were not affected by the pH of brewing water within the range of 5.5 to 9.1.

  7. Computer-Aided Design and Fabrication of Wire-Wrap (Trademark) Type Circuit Boards: A New Symbolism and Its Implementation (Conception et Fabrication Automatisees de Circuits par Cablage Enroule: un Nouveau Symbolisme et son Application),

    DTIC Science & Technology

    1982-02-01

    facilitant la transition entre les plans d’ing~nierie 6lectronique et la matrice pertinente d’interconnexions requise pour le montage par c~blage enroul6 Wire...Wrap. Le d~veloppement de prototypes 6lectroniques s’est vu consid6rablement acc6l6r6 par la preparation plus rapide des donn~es d’interconnexions...directory, all located in *APL files (Sect. 7.0). A matrix called BANQUE is also formed by the program L to regroup those chip descriptions of the main

  8. Protocols development for security and privacy of radio frequency identification systems

    NASA Astrophysics Data System (ADS)

    Sabbagha, Fatin

    There are benefits to adopting radio frequency identification (RFID) technology, although there are methods of attack that can compromise the system. This research determined how that may happen and what possible solutions can keep that from happening. Protocols were developed to implement better security. In addition, new topologies were developed to handle the problems of the key management. Previously proposed protocols focused on providing mutual authentication and privacy between readers and tags. However, those protocols are still vulnerable to be attacked. These protocols were analyzed and the disadvantages shown for each one. Previous works assumed that the channels between readers and the servers were secure. In the proposed protocols, a compromised reader is considered along with how to prevent tags from being read by that reader. The new protocols provide mutual authentication between readers and tags and, at the same time, remove the compromised reader from the system. Three protocols are proposed. In the first protocol, a mutual authentication is achieved and a compromised reader is not allowed in the network. In the second protocol, the number of times a reader contacts the server is reduced. The third protocol provides authentication and privacy between tags and readers using a trusted third party. The developed topology is implemented using python language and simulates work to check the efficiency regarding the processing time. The three protocols are implemented by writing codes in C language and then compiling them in MSP430. IAR Embedded workbench is used, which is an integrated development environment with the C/C++ compiler to generate a faster code and to debug the microcontroller. In summary, the goal of this research is to find solutions for the problems on previously proposed protocols, handle a compromised reader, and solve key management problems.

  9. SPIRIT 2013 explanation and elaboration: guidance for protocols of clinical trials

    PubMed Central

    Tetzlaff, Jennifer M; Gøtzsche, Peter C; Altman, Douglas G; Mann, Howard; Berlin, Jesse A; Dickersin, Kay; Hróbjartsson, Asbjørn; Schulz, Kenneth F; Parulekar, Wendy R; Krleža-Jerić, Karmela; Laupacis, Andreas; Moher, David

    2013-01-01

    High quality protocols facilitate proper conduct, reporting, and external review of clinical trials. However, the completeness of trial protocols is often inadequate. To help improve the content and quality of protocols, an international group of stakeholders developed the SPIRIT 2013 Statement (Standard Protocol Items: Recommendations for Interventional Trials). The SPIRIT Statement provides guidance in the form of a checklist of recommended items to include in a clinical trial protocol. This SPIRIT 2013 Explanation and Elaboration paper provides important information to promote full understanding of the checklist recommendations. For each checklist item, we provide a rationale and detailed description; a model example from an actual protocol; and relevant references supporting its importance. We strongly recommend that this explanatory paper be used in conjunction with the SPIRIT Statement. A website of resources is also available (www.spirit-statement.org). The SPIRIT 2013 Explanation and Elaboration paper, together with the Statement, should help with the drafting of trial protocols. Complete documentation of key trial elements can facilitate transparency and protocol review for the benefit of all stakeholders. PMID:23303884

  10. SPIRIT 2013 explanation and elaboration: guidance for protocols of clinical trials.

    PubMed

    Chan, An-Wen; Tetzlaff, Jennifer M; Gøtzsche, Peter C; Altman, Douglas G; Mann, Howard; Berlin, Jesse A; Dickersin, Kay; Hróbjartsson, Asbjørn; Schulz, Kenneth F; Parulekar, Wendy R; Krleza-Jeric, Karmela; Laupacis, Andreas; Moher, David

    2013-01-08

    High quality protocols facilitate proper conduct, reporting, and external review of clinical trials. However, the completeness of trial protocols is often inadequate. To help improve the content and quality of protocols, an international group of stakeholders developed the SPIRIT 2013 Statement (Standard Protocol Items: Recommendations for Interventional Trials). The SPIRIT Statement provides guidance in the form of a checklist of recommended items to include in a clinical trial protocol. This SPIRIT 2013 Explanation and Elaboration paper provides important information to promote full understanding of the checklist recommendations. For each checklist item, we provide a rationale and detailed description; a model example from an actual protocol; and relevant references supporting its importance. We strongly recommend that this explanatory paper be used in conjunction with the SPIRIT Statement. A website of resources is also available (www.spirit-statement.org). The SPIRIT 2013 Explanation and Elaboration paper, together with the Statement, should help with the drafting of trial protocols. Complete documentation of key trial elements can facilitate transparency and protocol review for the benefit of all stakeholders.

  11. Data-driven CT protocol review and management—experience from a large academic hospital.

    PubMed

    Zhang, Da; Savage, Cristy A; Li, Xinhua; Liu, Bob

    2015-03-01

    Protocol review plays a critical role in CT quality assurance, but large numbers of protocols and inconsistent protocol names on scanners and in exam records make thorough protocol review formidable. In this investigation, we report on a data-driven cataloging process that can be used to assist in the reviewing and management of CT protocols. We collected lists of scanner protocols, as well as 18 months of recent exam records, for 10 clinical scanners. We developed computer algorithms to automatically deconstruct the protocol names on the scanner and in the exam records into core names and descriptive components. Based on the core names, we were able to group the scanner protocols into a much smaller set of "core protocols," and to easily link exam records with the scanner protocols. We calculated the percentage of usage for each core protocol, from which the most heavily used protocols were identified. From the percentage-of-usage data, we found that, on average, 18, 33, and 49 core protocols per scanner covered 80%, 90%, and 95%, respectively, of all exams. These numbers are one order of magnitude smaller than the typical numbers of protocols that are loaded on a scanner (200-300, as reported in the literature). Duplicated, outdated, and rarely used protocols on the scanners were easily pinpointed in the cataloging process. The data-driven cataloging process can facilitate the task of protocol review. Copyright © 2015 American College of Radiology. Published by Elsevier Inc. All rights reserved.

  12. Assessing the detection, reporting and investigation of adverse events in clinical trial protocols implemented in Cameroon: a documentary review of clinical trial protocols.

    PubMed

    Ebile, Akoh Walter; Ateudjieu, Jerome; Yakum, Martin Ndinakie; Djuidje, Marceline Ngounoue; Watcho, Pierre

    2015-09-29

    International guidelines recommend ethical and scientific quality standards for managing and reporting adverse events occurring during clinical trials to competent research ethics committees and regulatory authorities. The purpose of this study was to determine whether clinical trial protocols in Cameroon are developed in line with national requirements and international guidelines as far as detecting, reporting and investigating of adverse events is concerned. It was a documentary review of all approved clinical trial protocols that were submitted at the Cameroon National Ethics Committee for evaluation from 1997 through 2012. Data were extracted using a preconceived and validated grid. Protocol review process targeted the title, abstract, objectives, methodology, resources, and the chapter on safety. In total, 106 (4.9 %) clinical trial protocols were identified from 2173 protocols seen in the archive and 104 (4.8 %) included for review. Seventy six (73.1 %) trials did not include the surveillance of adverse events as part of their objective. A total of 91 (87.5 %) protocols did not budget for adverse event surveillance, 76 (73.1 %) did not have a data safety management board (DSMB), 11(10.6 %) included insurance for participants, 47 (45.2 %) did not include a case definition for serious adverse events, 33 (31.7 %) described procedures to detect adverse events, 33 (31.7 %) described procedure for reporting and 22 (21.2 %) described procedure for investigating adverse events. Most clinical trial protocols in Cameroon are developed to focus on benefits and pay little attention to harms. The development of national guidelines can improve the surveillance of adverse events in clinical trial research conducted in Cameroon. Adverse events surveillance tools and a budget are critical for an adequate planning for adverse event surveillance when developing trial protocols. Clinical trial protocols submitted in the Cameroon National Ethics Committee do not adequately plan

  13. Evaluation of a Modified Pamidronate Protocol for the Treatment of Osteogenesis Imperfecta.

    PubMed

    Palomo, Telma; Andrade, Maria C; Peters, Barbara S E; Reis, Fernanda A; Carvalhaes, João Tomás A; Glorieux, Francis H; Rauch, Frank; Lazaretti-Castro, Marise

    2016-01-01

    Intravenous pamidronate is widely used to treat children with osteogenesis imperfecta (OI). In a well-studied protocol ('standard protocol'), pamidronate is given at a daily dose of 1 mg per kg body weight over 4 h on 3 successive days; infusion cycles are repeated every 4 months. Here, we evaluated renal safety of a simpler protocol for intravenous pamidronate infusions (2 mg per kg body weight given in a single infusion over 2 h, repeated every 4 months; 'modified protocol'). Results of 18 patients with OI types I, III, or IV treated with the modified protocol for 12 months were compared to 18 historic controls, treated with standard protocol. In the modified protocol, mild transient post-infusion increases in serum creatinine were found during each infusion but after 12 months serum creatinine remained similar from baseline [0.40 mg/dl (SD: 0.13)] to the end of the study [0.41 mg/dl (SD: 0.11)] (P = 0.79). The two protocols led to similar changes in serum creatinine during the first pamidronate infusion [modified protocol: +2% (SD: 21%); standard protocol: -3% (SD: 8%); P = 0.32]. Areal lumbar spine bone mineral density Z-scores increased from -2.7 (SD: 1.5) to -1.8 (SD: 1.4) with the modified protocol, and from -4.1 (SD: 1.4) to -3.1 (SD: 1.1) with standard protocol (P = 0.68 for group differences in bone density Z-score changes). The modified pamidronate protocol is safe and may have similar effects on bone density as the standard pamidronate protocol. More studies are needed with longer follow-up to prove anti-fracture efficacy.

  14. High-Performance CCSDS AOS Protocol Implementation in FPGA

    NASA Technical Reports Server (NTRS)

    Clare, Loren P.; Torgerson, Jordan L.; Pang, Jackson

    2010-01-01

    The Consultative Committee for Space Data Systems (CCSDS) Advanced Orbiting Systems (AOS) space data link protocol provides a framing layer between channel coding such as LDPC (low-density parity-check) and higher-layer link multiplexing protocols such as CCSDS Encapsulation Service, which is described in the following article. Recent advancement in RF modem technology has allowed multi-megabit transmission over space links. With this increase in data rate, the CCSDS AOS protocol implementation needs to be optimized to both reduce energy consumption and operate at a high rate.

  15. Modeling Techniques for High Dependability Protocols and Architecture

    NASA Technical Reports Server (NTRS)

    LaValley, Brian; Ellis, Peter; Walter, Chris J.

    2012-01-01

    This report documents an investigation into modeling high dependability protocols and some specific challenges that were identified as a result of the experiments. The need for an approach was established and foundational concepts proposed for modeling different layers of a complex protocol and capturing the compositional properties that provide high dependability services for a system architecture. The approach centers around the definition of an architecture layer, its interfaces for composability with other layers and its bindings to a platform specific architecture model that implements the protocols required for the layer.

  16. Hybrid protocols plus natural treatments for inflammatory conditions.

    PubMed

    1998-01-01

    Hybrid protocols combine one, two, or three pharmaceutical drugs with several nutritional or immune-based therapies. These protocols are not limited solely to FDA-approved drugs or strictly to alternative therapies. The rationale for using a hybrid protocol is to find an effective antiviral regimen that also restores immune function. The goal is to obtain the benefits of protease inhibitors without viral resistance and side effects which include problems with fat metabolism and cholesterol levels. Natural treatments for inflammatory conditions are also described. Options include licorice root, ginger root, and slippery elm.

  17. Design and Implementation of a Secure Modbus Protocol

    NASA Astrophysics Data System (ADS)

    Fovino, Igor Nai; Carcano, Andrea; Masera, Marcelo; Trombetta, Alberto

    The interconnectivity of modern and legacy supervisory control and data acquisition (SCADA) systems with corporate networks and the Internet has significantly increased the threats to critical infrastructure assets. Meanwhile, traditional IT security solutions such as firewalls, intrusion detection systems and antivirus software are relatively ineffective against attacks that specifically target vulnerabilities in SCADA protocols. This paper describes a secure version of the Modbus SCADA protocol that incorporates integrity, authentication, non-repudiation and anti-replay mechanisms. Experimental results using a power plant testbed indicate that the augmented protocol provides good security functionality without significant overhead.

  18. Development, implementation, and experimentation of parametric routing protocol for sensor networks

    NASA Astrophysics Data System (ADS)

    Nassr, Matthew S.; Jun, Jangeun; Eidenbenz, Stephan J.; Frigo, Janette R.; Hansson, Anders A.; Mielke, Angela M.; Smith, Mark C.

    2006-09-01

    The development of a scalable and reliable routing protocol for sensor networks is traced from a theoretical beginning to positive simulation results to the end of verification experiments in large and heavily loaded networks. Design decisions and explanations as well as implementation hurdles are presented to give a complete picture of protocol development. Additional software and hardware is required to accurately test the performance of our protocol in field experiments. In addition, the developed protocol is tested in TinyOS on Mica2 motes against well-established routing protocols frequently used in sensor networks. Our protocol proves to outperform the standard (MINTRoute) and the trivial (Gossip) in a variety of different scenarios.

  19. Improvement of "Novel Multiparty Quantum Key Agreement Protocol with GHZ States"

    NASA Astrophysics Data System (ADS)

    Gu, Jun; Hwang, Tzonelih

    2017-10-01

    Quantum key agreement (QKA) protocol is a method for negotiating a fair and secure key among mutually untrusted participants. Recently, Xu et al. (Quantum Inf. Process. 13:2587-2594, 2014) proposed a multi-party QKA protocol based on Greenberger-Horne-Zeilinger (GHZ) states. However, this study points out that Xu et al.'s protocol cannot provide the fairness property. That is, the last involved participant in the protocol can manipulate the final shared secret key without being detected by the other participants. Moreover, according to Yu et al.'s research (2015), Xu et al.'s protocol cannot avoid the public discussion attack too. To avoid these weaknesses, an improved QKA protocol is proposed.

  20. Variability of United States Online Rehabilitation Protocols for Proximal Hamstring Tendon Repair.

    PubMed

    Lightsey, Harry M; Kantrowitz, David E; Swindell, Hasani W; Trofa, David P; Ahmad, Christopher S; Lynch, T Sean

    2018-02-01

    The optimal postoperative rehabilitation protocol following repair of complete proximal hamstring tendon ruptures is the subject of ongoing investigation, with a need for more standardized regimens and evidence-based modalities. To assess the variability across proximal hamstring tendon repair rehabilitation protocols published online by United States (US) orthopaedic teaching programs. Cross-sectional study. Online proximal hamstring physical therapy protocols from US academic orthopaedic programs were reviewed. A web-based search using the search term complete proximal hamstring repair rehabilitation protocol provided an additional 14 protocols. A comprehensive scoring rubric was developed after review of all protocols and was used to assess each protocol for both the presence of various rehabilitation components and the point at which those components were introduced. Of 50 rehabilitation protocols identified, 35 satisfied inclusion criteria and were analyzed. Twenty-five protocols (71%) recommended immediate postoperative bracing: 12 (34%) prescribed knee bracing, 8 (23%) prescribed hip bracing, and 5 (14%) did not specify the type of brace recommended. Fourteen protocols (40%) advised immediate nonweightbearing with crutches, while 16 protocols (46%) permitted immediate toe-touch weightbearing. Advancement to full weightbearing was allowed at a mean of 7.1 weeks (range, 4-12 weeks). Most protocols (80%) recommended gentle knee and hip passive range of motion and active range of motion, starting at a mean 1.4 weeks (range, 0-3 weeks) and 4.0 weeks (range, 0-6 weeks), respectively. However, only 6 protocols (17%) provided specific time points to initiate full hip and knee range of motion: a mean 8.0 weeks (range, 4-12 weeks) and 7.8 weeks (range, 0-12 weeks), respectively. Considerable variability was noted in the inclusion and timing of strengthening, stretching, proprioception, and cardiovascular exercises. Fifteen protocols (43%) required completion of

  1. Continuous-variable quantum-key-distribution protocols with a non-Gaussian modulation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Leverrier, Anthony; Grangier, Philippe; Laboratoire Charles Fabry, Institut d'Optique, CNRS, Univ. Paris-Sud, Campus Polytechnique, RD 128, F-91127 Palaiseau Cedex

    2011-04-15

    In this paper, we consider continuous-variable quantum-key-distribution (QKD) protocols which use non-Gaussian modulations. These specific modulation schemes are compatible with very efficient error-correction procedures, hence allowing the protocols to outperform previous protocols in terms of achievable range. In their simplest implementation, these protocols are secure for any linear quantum channels (hence against Gaussian attacks). We also show how the use of decoy states makes the protocols secure against arbitrary collective attacks, which implies their unconditional security in the asymptotic limit.

  2. Protocol compliance and time management in blunt trauma resuscitation.

    PubMed

    Spanjersberg, W R; Bergs, E A; Mushkudiani, N; Klimek, M; Schipper, I B

    2009-01-01

    To study advanced trauma life support (ATLS) protocol adherence prospectively in trauma resuscitation and to analyse time management of daily multidisciplinary trauma resuscitation at a level 1 trauma centre, for both moderately and severely injured patients. All victims of severe blunt trauma were consecutively included. Patients with a revised trauma score (RTS) of 12 were resuscitated by a "minor trauma" team and patients with an RTS of less than 12 were resuscitated by a "severe trauma" team. Digital video recordings were used to analyse protocol compliance and time management during initial assessment. From 1 May to 1 September 2003, 193 resuscitations were included. The "minor trauma" team assessed 119 patients, with a mean injury severity score (ISS) of 7 (range 1-45). Overall protocol compliance was 42%, ranging from 0% for thoracic percussion to 93% for thoracic auscultation. The median resuscitation time was 45.9 minutes (range 39.7-55.9). The "severe team" assessed 74 patients, with a mean ISS of 22 (range 1-59). Overall protocol compliance was 53%, ranging from 4% for thoracic percussion to 95% for thoracic auscultation. Resuscitation took 34.8 minutes median (range 21.6-44.1). Results showed the current trauma resuscitation to be ATLS-like, with sometimes very low protocol compliance rates. Timing of secondary survey and radiology and thus time efficiency remains a challenge in all trauma patients. To assess the effect of trauma resuscitation protocols on outcome, protocol adherence needs to be improved.

  3. Quantitative Comparison of 21 Protocols for Labeling Hippocampal Subfields and Parahippocampal Subregions in In Vivo MRI: Towards a Harmonized Segmentation Protocol

    PubMed Central

    Yushkevich, Paul A.; Amaral, Robert S. C.; Augustinack, Jean C.; Bender, Andrew R.; Bernstein, Jeffrey D.; Boccardi, Marina; Bocchetta, Martina; Burggren, Alison C.; Carr, Valerie A.; Chakravarty, M. Mallar; Chetelat, Gael; Daugherty, Ana M.; Davachi, Lila; Ding, Song-Lin; Ekstrom, Arne; Geerlings, Mirjam I.; Hassan, Abdul; Huang, Yushan; Iglesias, Eugenio; La Joie, Renaud; Kerchner, Geoffrey A.; LaRocque, Karen F.; Libby, Laura A.; Malykhin, Nikolai; Mueller, Susanne G.; Olsen, Rosanna K.; Palombo, Daniela J.; Parekh, Mansi B; Pluta, John B.; Preston, Alison R.; Pruessner, Jens C.; Ranganath, Charan; Raz, Naftali; Schlichting, Margaret L.; Schoemaker, Dorothee; Singh, Sachi; Stark, Craig E. L.; Suthana, Nanthia; Tompary, Alexa; Turowski, Marta M.; Van Leemput, Koen; Wagner, Anthony D.; Wang, Lei; Winterburn, Julie L.; Wisse, Laura E.M.; Yassa, Michael A.; Zeineh, Michael M.

    2015-01-01

    OBJECTIVE An increasing number of human in vivo magnetic resonance imaging (MRI) studies have focused on examining the structure and function of the subfields of the hippocampal formation (the dentate gyrus, CA fields 1–3, and the subiculum) and subregions of the parahippocampal gyrus (entorhinal, perirhinal, and parahippocampal cortices). The ability to interpret the results of such studies and to relate them to each other would be improved if a common standard existed for labeling hippocampal subfields and parahippocampal subregions. Currently, research groups label different subsets of structures and use different rules, landmarks, and cues to define their anatomical extents. This paper characterizes, both qualitatively and quantitatively, the variability in the existing manual segmentation protocols for labeling hippocampal and parahippocampal substructures in MRI, with the goal of guiding subsequent work on developing a harmonized substructure segmentation protocol. METHOD MRI scans of a single healthy adult human subject were acquired both at 3 Tesla and 7 Tesla. Representatives from 21 research groups applied their respective manual segmentation protocols to the MRI modalities of their choice. The resulting set of 21 segmentations was analyzed in a common anatomical space to quantify similarity and identify areas of agreement. RESULTS The differences between the 21 protocols include the region within which segmentation is performed, the set of anatomical labels used, and the extents of specific anatomical labels. The greatest overall disagreement among the protocols is at the CA1/subiculum boundary, and disagreement across all structures is greatest in the anterior portion of the hippocampal formation relative to the body and tail. CONCLUSIONS The combined examination of the 21 protocols in the same dataset suggests possible strategies towards developing a harmonized subfield segmentation protocol and facilitates comparison between published studies. PMID

  4. Guidelines and sample protocol for sampling forest gaps.

    Treesearch

    J.R. Runkle

    1992-01-01

    A protocol for sampling forest canopy gaps is presented. Methods used in published gap studies are reviewed. The sample protocol will be useful in developing a broader understanding of forest structure and dynamics through comparative studies across different forest ecosystems.

  5. ENVIRONMENTAL TECHNOLOGY VERIFICATION TEST PROTOCOL, GENERAL VENTILATION FILTERS

    EPA Science Inventory

    The Environmental Technology Verification Test Protocol, General Ventilation Filters provides guidance for verification tests.

    Reference is made in the protocol to the ASHRAE 52.2P "Method of Testing General Ventilation Air-cleaning Devices for Removal Efficiency by P...

  6. Ocean Optics Protocols for Satellite Ocean Color Sensor Validation, Revision 4, Volume IV: Inherent Optical Properties: Instruments, Characterizations, Field Measurements and Data Analysis Protocols

    NASA Technical Reports Server (NTRS)

    Mueller, J. L.; Fargion, G. S.; McClain, C. R. (Editor); Pegau, S.; Zanefeld, J. R. V.; Mitchell, B. G.; Kahru, M.; Wieland, J.; Stramska, M.

    2003-01-01

    This document stipulates protocols for measuring bio-optical and radiometric data for the Sensor Intercomparision and Merger for Biological and Interdisciplinary Oceanic Studies (SIMBIOS) Project activities and algorithm development. The document is organized into 6 separate volumes as Ocean Optics Protocols for Satellite Ocean Color Sensor Validation, Revision 4. Volume I: Introduction, Background, and Conventions; Volume II: Instrument Specifications, Characterization and Calibration; Volume III: Radiometric Measurements and Data Analysis Methods; Volume IV: Inherent Optical Properties: Instruments, Characterization, Field Measurements and Data Analysis Protocols; Volume V: Biogeochemical and Bio-Optical Measurements and Data Analysis Methods; Volume VI: Special Topics in Ocean Optics Protocols and Appendices. The earlier version of Ocean Optics Protocols for Satellite Ocean Color Sensor Validation, Revision 3 is entirely superseded by the six volumes of Revision 4 listed above.

  7. A randomized trial of protocol-based care for early septic shock.

    PubMed

    Yealy, Donald M; Kellum, John A; Huang, David T; Barnato, Amber E; Weissfeld, Lisa A; Pike, Francis; Terndrup, Thomas; Wang, Henry E; Hou, Peter C; LoVecchio, Frank; Filbin, Michael R; Shapiro, Nathan I; Angus, Derek C

    2014-05-01

    In a single-center study published more than a decade ago involving patients presenting to the emergency department with severe sepsis and septic shock, mortality was markedly lower among those who were treated according to a 6-hour protocol of early goal-directed therapy (EGDT), in which intravenous fluids, vasopressors, inotropes, and blood transfusions were adjusted to reach central hemodynamic targets, than among those receiving usual care. We conducted a trial to determine whether these findings were generalizable and whether all aspects of the protocol were necessary. In 31 emergency departments in the United States, we randomly assigned patients with septic shock to one of three groups for 6 hours of resuscitation: protocol-based EGDT; protocol-based standard therapy that did not require the placement of a central venous catheter, administration of inotropes, or blood transfusions; or usual care. The primary end point was 60-day in-hospital mortality. We tested sequentially whether protocol-based care (EGDT and standard-therapy groups combined) was superior to usual care and whether protocol-based EGDT was superior to protocol-based standard therapy. Secondary outcomes included longer-term mortality and the need for organ support. We enrolled 1341 patients, of whom 439 were randomly assigned to protocol-based EGDT, 446 to protocol-based standard therapy, and 456 to usual care. Resuscitation strategies differed significantly with respect to the monitoring of central venous pressure and oxygen and the use of intravenous fluids, vasopressors, inotropes, and blood transfusions. By 60 days, there were 92 deaths in the protocol-based EGDT group (21.0%), 81 in the protocol-based standard-therapy group (18.2%), and 86 in the usual-care group (18.9%) (relative risk with protocol-based therapy vs. usual care, 1.04; 95% confidence interval [CI], 0.82 to 1.31; P=0.83; relative risk with protocol-based EGDT vs. protocol-based standard therapy, 1.15; 95% CI, 0.88 to 1

  8. Compositional Verification of a Communication Protocol for a Remotely Operated Vehicle

    NASA Technical Reports Server (NTRS)

    Goodloe, Alwyn E.; Munoz, Cesar A.

    2009-01-01

    This paper presents the specification and verification in the Prototype Verification System (PVS) of a protocol intended to facilitate communication in an experimental remotely operated vehicle used by NASA researchers. The protocol is defined as a stack-layered com- position of simpler protocols. It can be seen as the vertical composition of protocol layers, where each layer performs input and output message processing, and the horizontal composition of different processes concurrently inhabiting the same layer, where each process satisfies a distinct requirement. It is formally proven that the protocol components satisfy certain delivery guarantees. Compositional techniques are used to prove these guarantees also hold in the composed system. Although the protocol itself is not novel, the methodology employed in its verification extends existing techniques by automating the tedious and usually cumbersome part of the proof, thereby making the iterative design process of protocols feasible.

  9. Continuous-variable protocol for oblivious transfer in the noisy-storage model.

    PubMed

    Furrer, Fabian; Gehring, Tobias; Schaffner, Christian; Pacher, Christoph; Schnabel, Roman; Wehner, Stephanie

    2018-04-13

    Cryptographic protocols are the backbone of our information society. This includes two-party protocols which offer protection against distrustful players. Such protocols can be built from a basic primitive called oblivious transfer. We present and experimentally demonstrate here a quantum protocol for oblivious transfer for optical continuous-variable systems, and prove its security in the noisy-storage model. This model allows us to establish security by sending more quantum signals than an attacker can reliably store during the protocol. The security proof is based on uncertainty relations which we derive for continuous-variable systems, that differ from the ones used in quantum key distribution. We experimentally demonstrate in a proof-of-principle experiment the proposed oblivious transfer protocol for various channel losses by using entangled two-mode squeezed states measured with balanced homodyne detection. Our work enables the implementation of arbitrary two-party quantum cryptographic protocols with continuous-variable communication systems.

  10. Mesure Objective De L'attenuation et De L'effet D'occlusion Des Protecteurs Auditifs a Partir Des Potentiels Evoques Stationnaires et Multiples =

    NASA Astrophysics Data System (ADS)

    Valentin, Olivier

    Selon l'Organisation mondiale de la sante, le nombre de travailleurs exposes quotidiennement a des niveaux de bruit prejudiciables a leur audition est passe de 120 millions en 1995 a 250 millions en 2004. Meme si la reduction du bruit a la source devrait etre toujours privilegiee, la solution largement utilisee pour lutter contre le bruit au travail reste la protection auditive individuelle. Malheureusement, le port des protecteurs auditifs n'est pas toujours respecte par les travailleurs car il est difficile de fournir un protecteur auditif dont le niveau d'attenuation effective est approprie a l'environnement de travail d'un individu. D'autre part, l'occlusion du canal auditif induit une modification de la perception de la parole, ce qui cree un inconfort incitant les travailleurs a retirer leurs protecteurs. Ces deux problemes existent parce que les methodes actuelles de mesure de l'effet d'occlusion et de l'attenuation sont limitees. Les mesures objectives basees sur des mesures microphoniques intra-auriculaires ne tiennent pas compte de la transmission directe du son a la cochlee par conduction osseuse. Les mesures subjectives au seuil de l'audition sont biaisees a cause de l'effet de masquage aux basses frequences induit par le bruit physiologique. L'objectif principal de ce travail de these de doctorat est d'ameliorer la mesure de l'attenuation et de l'effet d'occlusion des protecteurs auditifs intra-auriculaires. L'approche generale consiste a : (i) verifier s'il est possible de mesurer l'attenuation des protecteurs auditifs grâce au recueil des potentiels evoques stationnaires et multiples (PEASM) avec et sans protecteur auditif (protocole 1), (ii) adapter cette methodologie pour mesurer l'effet d'occlusion induit par le port de protecteur auditifs intra-auriculaires (protocole 2), et (iii) valider chaque protocole par l'intermediaire de mesures realisees sur sujets humains. Les resultats du protocole 1 demontrent que les PEASM peuvent etre utilises pour

  11. A randomized trial of microdose leuprolide acetate protocol versus luteal phase ganirelix protocol in predicted poor responders.

    PubMed

    DiLuigi, Andrea J; Engmann, Lawrence; Schmidt, David W; Benadiva, Claudio A; Nulsen, John C

    2011-06-30

    We performed a randomized trial to compare IVF outcomes in 54 poor responder patients undergoing a microdose leuprolide acetate (LA) protocol or a GnRH antagonist protocol incorporating a luteal phase E(2) patch and GnRH antagonist in the preceding menstrual cycle. Cancellation rates, number of oocytes retrieved, clinical pregnancy rates (PR), and ongoing PRs were similar between the two groups. Copyright © 2011 American Society for Reproductive Medicine. Published by Elsevier Inc. All rights reserved.

  12. Automated monitoring of medical protocols: a secure and distributed architecture.

    PubMed

    Alsinet, T; Ansótegui, C; Béjar, R; Fernández, C; Manyà, F

    2003-03-01

    The control of the right application of medical protocols is a key issue in hospital environments. For the automated monitoring of medical protocols, we need a domain-independent language for their representation and a fully, or semi, autonomous system that understands the protocols and supervises their application. In this paper we describe a specification language and a multi-agent system architecture for monitoring medical protocols. We model medical services in hospital environments as specialized domain agents and interpret a medical protocol as a negotiation process between agents. A medical service can be involved in multiple medical protocols, and so specialized domain agents are independent of negotiation processes and autonomous system agents perform monitoring tasks. We present the detailed architecture of the system agents and of an important domain agent, the database broker agent, that is responsible of obtaining relevant information about the clinical history of patients. We also describe how we tackle the problems of privacy, integrity and authentication during the process of exchanging information between agents.

  13. The importance of the Montreal Protocol in protecting climate.

    PubMed

    Velders, Guus J M; Andersen, Stephen O; Daniel, John S; Fahey, David W; McFarland, Mack

    2007-03-20

    The 1987 Montreal Protocol on Substances that Deplete the Ozone Layer is a landmark agreement that has successfully reduced the global production, consumption, and emissions of ozone-depleting substances (ODSs). ODSs are also greenhouse gases that contribute to the radiative forcing of climate change. Using historical ODSs emissions and scenarios of potential emissions, we show that the ODS contribution to radiative forcing most likely would have been much larger if the ODS link to stratospheric ozone depletion had not been recognized in 1974 and followed by a series of regulations. The climate protection already achieved by the Montreal Protocol alone is far larger than the reduction target of the first commitment period of the Kyoto Protocol. Additional climate benefits that are significant compared with the Kyoto Protocol reduction target could be achieved by actions under the Montreal Protocol, by managing the emissions of substitute fluorocarbon gases and/or implementing alternative gases with lower global warming potentials.

  14. The importance of the Montreal Protocol in protecting climate

    PubMed Central

    Velders, Guus J. M.; Andersen, Stephen O.; Daniel, John S.; Fahey, David W.; McFarland, Mack

    2007-01-01

    The 1987 Montreal Protocol on Substances that Deplete the Ozone Layer is a landmark agreement that has successfully reduced the global production, consumption, and emissions of ozone-depleting substances (ODSs). ODSs are also greenhouse gases that contribute to the radiative forcing of climate change. Using historical ODSs emissions and scenarios of potential emissions, we show that the ODS contribution to radiative forcing most likely would have been much larger if the ODS link to stratospheric ozone depletion had not been recognized in 1974 and followed by a series of regulations. The climate protection already achieved by the Montreal Protocol alone is far larger than the reduction target of the first commitment period of the Kyoto Protocol. Additional climate benefits that are significant compared with the Kyoto Protocol reduction target could be achieved by actions under the Montreal Protocol, by managing the emissions of substitute fluorocarbon gases and/or implementing alternative gases with lower global warming potentials. PMID:17360370

  15. IoT real time data acquisition using MQTT protocol

    NASA Astrophysics Data System (ADS)

    Atmoko, R. A.; Riantini, R.; Hasin, M. K.

    2017-05-01

    The Internet of Things (IoT) provides ease to monitor and to gain sensor data through the Internet [1]. The need of high quality data is increasing to the extent that data monitoring and acquisition system in real time is required, such as smart city or telediagnostic in medical areas [2]. Therefore, an appropriate communication protocol is required to resolve these problems. Lately, researchers have developed a lot of communication protocols for IoT, of which each has advantages and disadvantages. This study proposes the utilization of MQTT as a communication protocol, which is one of data communication protocols for IoT. This study used temperature and humidity sensors because the physical parameters are often needed as parameters of environment condition [3]. Data acquisition was done in real-time and stored in MySQL database. This study is also completed by interface web-based and mobile for online monitoring. This result of this study is the enhancement of data quality and reliability using MQTT protocol.

  16. Developing protocols for obstetric emergencies.

    PubMed

    Roth, Cheryl K; Parfitt, Sheryl E; Hering, Sandra L; Dent, Sarah A

    2014-01-01

    There is potential for important steps to be missed in emergency situations, even in the presence of many health care team members. Developing a clear plan of response for common emergencies can ensure that no tasks are redundant or omitted, and can create a more controlled environment that promotes positive health outcomes. A multidisciplinary team was assembled in a large community hospital to create protocols that would help ensure optimum care and continuity of practice in cases of postpartum hemorrhage, shoulder dystocia, emergency cesarean surgical birth, eclamptic seizure and maternal code. Assignment of team roles and responsibilities led to the evolution of standardized protocols for each emergency situation. © 2014 AWHONN.

  17. Scalable Multicast Protocols for Overlapped Groups in Broker-Based Sensor Networks

    NASA Astrophysics Data System (ADS)

    Kim, Chayoung; Ahn, Jinho

    In sensor networks, there are lots of overlapped multicast groups because of many subscribers, associated with their potentially varying specific interests, querying every event to sensors/publishers. And gossip based communication protocols are promising as one of potential solutions providing scalability in P(Publish)/ S(Subscribe) paradigm in sensor networks. Moreover, despite the importance of both guaranteeing message delivery order and supporting overlapped multicast groups in sensor or P2P networks, there exist little research works on development of gossip-based protocols to satisfy all these requirements. In this paper, we present two versions of causally ordered delivery guaranteeing protocols for overlapped multicast groups. The one is based on sensor-broker as delegates and the other is based on local views and delegates representing subscriber subgroups. In the sensor-broker based protocol, sensor-broker might lead to make overlapped multicast networks organized by subscriber's interests. The message delivery order has been guaranteed consistently and all multicast messages are delivered to overlapped subscribers using gossip based protocols by sensor-broker. Therefore, these features of the sensor-broker based protocol might be significantly scalable rather than those of the protocols by hierarchical membership list of dedicated groups like traditional committee protocols. And the subscriber-delegate based protocol is much stronger rather than fully decentralized protocols guaranteeing causally ordered delivery based on only local views because the message delivery order has been guaranteed consistently by all corresponding members of the groups including delegates. Therefore, this feature of the subscriber-delegate protocol is a hybrid approach improving the inherent scalability of multicast nature by gossip-based technique in all communications.

  18. Theoretical and Experimental Methods in Hypersonic Flows (Les Methodes Theoriques et Experimentales pour l’Etude Des Ecoulements Hypersoniques)

    DTIC Science & Technology

    1993-04-01

    PROCEEDINGS 514 OELECTE f Theoretical and A U Experimental Methods in A Hypersonic Flows (Les Methodes Th6oriques et Experimentales pour 1’Etude des...nitrogen ent for both equilibrium and non -equilibrium chemistry between the two groups . Both groups state that the boundary makes this mode even more...flowfield on control is also m?,ndatory unstable due to the necessary oblate shape of Hermes. when the experimental rebuilding is clearly poor and

  19. On the Composition of Public-Coin Zero-Knowledge Protocols

    DTIC Science & Technology

    2011-05-31

    only languages in BPP have public-coin black-box zero-knowledge protocols that are secure under an unbounded (polynomial) number of parallel...only languages in BPP have public-coin black-box zero-knowledge protocols that are secure under an unbounded (polynomial) number of parallel repetitions...and Krawczyk [GK96b] show that only languages in BPP have constant-round public-coin (stand-alone) black-box ZK protocols with negligible soundness

  20. Secure authentication protocol for Internet applications over CATV network

    NASA Astrophysics Data System (ADS)

    Chin, Le-Pond

    1998-02-01

    An authentication protocol is proposed in this paper to implement secure functions which include two way authentication and key management between end users and head-end. The protocol can protect transmission from frauds, attacks such as reply and wiretap. Location privacy is also achieved. A rest protocol is designed to restore the system once when systems fail. The security is verified by taking several security and privacy requirements into consideration.

  1. Development and validation of a remote home safety protocol.

    PubMed

    Romero, Sergio; Lee, Mi Jung; Simic, Ivana; Levy, Charles; Sanford, Jon

    2018-02-01

    Environmental assessments and subsequent modifications conducted by healthcare professionals can enhance home safety and promote independent living. However, travel time, expense and the availability of qualified professionals can limit the broad application of this intervention. Remote technology has the potential to increase access to home safety evaluations. This study describes the development and validation of a remote home safety protocol that can be used by a caregiver of an elderly person to video-record their home environment for later viewing and evaluation by a trained professional. The protocol was developed based on literature reviews and evaluations from clinical and content experts. Cognitive interviews were conducted with a group of six caregivers to validate the protocol. The final protocol included step-by-step directions to record indoor and outdoor areas of the home. The validation process resulted in modifications related to safety, clarity of the protocol, readability, visual appearance, technical descriptions and usability. Our final protocol includes detailed instructions that a caregiver should be able to follow to record a home environment for subsequent evaluation by a home safety professional. Implications for Rehabilitation The results of this study have several implications for rehabilitation practice The remote home safety evaluation protocol can potentially improve access to rehabilitation services for clients in remote areas and prevent unnecessary delays for needed care. Using our protocol, a patient's caregiver can partner with therapists to quickly and efficiently evaluate a patient's home before they are released from the hospital. Caregiver narration, which reflects a caregiver's own perspective, is critical to evaluating home safety. In-home safety evaluations, currently not available to all who need them due to access barriers, can enhance a patient's independence and provide a safer home environment.

  2. Outdoor Irrigation Measurement and Verification Protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kurnik, Charles W.; Stoughton, Kate M.; Figueroa, Jorge

    This measurement and verification (M&V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings resulting from water conservation measures (WCMs) in energy performance contracts associated with outdoor irrigation efficiency projects. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M&V plan, and details the procedures to use to determine water savings.

  3. Point-to-Point Multicast Communications Protocol

    NASA Technical Reports Server (NTRS)

    Byrd, Gregory T.; Nakano, Russell; Delagi, Bruce A.

    1987-01-01

    This paper describes a protocol to support point-to-point interprocessor communications with multicast. Dynamic, cut-through routing with local flow control is used to provide a high-throughput, low-latency communications path between processors. In addition multicast transmissions are available, in which copies of a packet are sent to multiple destinations using common resources as much as possible. Special packet terminators and selective buffering are introduced to avoid a deadlock during multicasts. A simulated implementation of the protocol is also described.

  4. Ocean fertilization, carbon credits and the Kyoto Protocol

    NASA Astrophysics Data System (ADS)

    Westley, M. B.; Gnanadesikan, A.

    2008-12-01

    Commercial interest in ocean fertilization as a carbon sequestration tool was excited by the December 1997 agreement of the Kyoto Protocol to the United Nations Convention on Climate Change. The Protocol commits industrialized countries to caps on net greenhouse gas emissions and allows for various flexible mechanisms to achieve these caps in the most economically efficient manner possible, including trade in carbon credits from projects that reduce emissions or enhance sinks. The carbon market was valued at 64 billion in 2007, with the bulk of the trading (50 billion) taking place in the highly regulated European Union Emission Trading Scheme, which deals primarily in emission allowances in the energy sector. A much smaller amount, worth $265 million, was traded in the largely unregulated "voluntary" market (Capoor and Ambrosi 2008). As the voluntary market grows, so do calls for its regulation, with several efforts underway to set rules and standards for the sale of voluntary carbon credits using the Kyoto Protocol as a starting point. Four US-based companies and an Australian company currently seek to develop ocean fertilization technologies for the generation of carbon credits. We review these plans through the lens of the Kyoto Protocol and its flexible mechanisms, and examine whether and how ocean fertilization could generate tradable carbon credits. We note that at present, ocean sinks are not included in the Kyoto Protocol, and that furthermore, the Kyoto Protocol only addresses sources and sinks of greenhouse gases within national boundaries, making open-ocean fertilization projects a jurisdictional challenge. We discuss the negotiating history behind the limited inclusion of land use, land use change and forestry in the Kyoto Protocol and the controversy and eventual compromise concerning methodologies for terrestrial carbon accounting. We conclude that current technologies for measuring and monitoring carbon sequestration following ocean fertilization

  5. Device for controlling the pouring of molten materials

    DOEpatents

    Moore, A.F.; Duncan, A.L.

    1994-02-15

    A device is described for controlling the pouring of a molten material from a crucible or other container. The device includes an annular retainer ring for mounting in the drain opening in the bottom of a conventional crucible, the retainer ring defining a opening there through. The device also includes a plug member having an annular forward end portion for force-fit reception in the opening of the retainer ring to selectively seal the opening and for being selectively forced through the opening. The plug member has a rear end portion for being positioned within the crucible, the rear end portion including stop means for prohibiting the rear end portion from passing through the opening in the retainer ring when the forward end portion is selectively forced through the opening. The plug member defines at least one, and preferably a plurality of flutes, each extending from a point rearward the annular forward end portion of the plug member, and forward the stop means, to a point rearward of the stop means. The flutes permit fluid communication between the interior and exterior of the crucible when the forward end portion of the plug member is forced through the opening in the retaining ring such that the molten material is allowed to flow from the crucible. 5 figures.

  6. A Secured Authentication Protocol for SIP Using Elliptic Curves Cryptography

    NASA Astrophysics Data System (ADS)

    Chen, Tien-Ho; Yeh, Hsiu-Lien; Liu, Pin-Chuan; Hsiang, Han-Chen; Shih, Wei-Kuan

    Session initiation protocol (SIP) is a technology regularly performed in Internet Telephony, and Hyper Text Transport Protocol (HTTP) as digest authentication is one of the major methods for SIP authentication mechanism. In 2005, Yang et al. pointed out that HTTP could not resist server spoofing attack and off-line guessing attack and proposed a secret authentication with Diffie-Hellman concept. In 2009, Tsai proposed a nonce based authentication protocol for SIP. In this paper, we demonstrate that their protocol could not resist the password guessing attack and insider attack. Furthermore, we propose an ECC-based authentication mechanism to solve their issues and present security analysis of our protocol to show that ours is suitable for applications with higher security requirement.

  7. PACIFIC NORTHWEST SIDE-BY-SIDE PROTOCOL COMPARISON TEST

    EPA Science Inventory

    Eleven state, tribal, and federal agencies participated during summer 2005 in a side-by-side comparison of protocols used to measure common in-stream physical attributes to help determine which protocols are best for determining status and trend of stream/watershed condition. Th...

  8. An Evaluation Methodology for Protocol Analysis Systems

    DTIC Science & Technology

    2007-03-01

    Main Memory Requirement NS: Needham-Schroeder NSL: Needham-Schroeder-Lowe OCaml : Objective Caml POSIX: Portable Operating System...methodology is needed. A. PROTOCOL ANALYSIS FIELD As with any field, there is a specialized language used within the protocol analysis community. Figure...ProVerif requires that Objective Caml ( OCaml ) be installed on the system, OCaml version 3.09.3 was installed. C. WINDOWS CONFIGURATION OS

  9. A native Bayesian classifier based routing protocol for VANETS

    NASA Astrophysics Data System (ADS)

    Bao, Zhenshan; Zhou, Keqin; Zhang, Wenbo; Gong, Xiaolei

    2016-12-01

    Geographic routing protocols are one of the most hot research areas in VANET (Vehicular Ad-hoc Network). However, there are few routing protocols can take both the transmission efficient and the usage of ratio into account. As we have noticed, different messages in VANET may ask different quality of service. So we raised a Native Bayesian Classifier based routing protocol (Naive Bayesian Classifier-Greedy, NBC-Greedy), which can classify and transmit different messages by its emergency degree. As a result, we can balance the transmission efficient and the usage of ratio with this protocol. Based on Matlab simulation, we can draw a conclusion that NBC-Greedy is more efficient and stable than LR-Greedy and GPSR.

  10. Representing the work of medical protocols for organizational simulation.

    PubMed Central

    Fridsma, D. B.

    1998-01-01

    Developing and implementing patient care protocols within a specific organizational setting requires knowledge of the protocol, the organization, and the way in which the organization does its work. Computer-based simulation tools have been used in many industries to provide managers with prospective insight into problems of work process and organization design mismatch. Many of these simulation tools are designed for well-understood routine work processes in which there are few contingent tasks. In this paper, we describe theoretic that make it possible to simulate medical protocols using an information-processing theory framework. These simulations will allow medical administrators to test different protocol and organizational designs before actually using them within a particular clinical setting. PMID:9929231

  11. Multiparty quantum key agreement protocol based on locally indistinguishable orthogonal product states

    NASA Astrophysics Data System (ADS)

    Jiang, Dong-Huan; Xu, Guang-Bao

    2018-07-01

    Based on locally indistinguishable orthogonal product states, we propose a novel multiparty quantum key agreement (QKA) protocol. In this protocol, the private key information of each party is encoded as some orthogonal product states that cannot be perfectly distinguished by local operations and classical communications. To ensure the security of the protocol with small amount of decoy particles, the different particles of each product state are transmitted separately. This protocol not only can make each participant fairly negotiate a shared key, but also can avoid information leakage in the maximum extent. We give a detailed security proof of this protocol. From comparison result with the existing QKA protocols, we can know that the new protocol is more efficient.

  12. Dysphonia risk screening protocol

    PubMed Central

    Nemr, Katia; Simões-Zenari, Marcia; da Trindade Duarte, João Marcos; Lobrigate, Karen Elena; Bagatini, Flavia Alves

    2016-01-01

    OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors) divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children), 29.25 (adult women), 22.75 (adult men), and 27.10 (seniors). CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics. PMID:27074171

  13. Effectiveness of AODV Protocol under Hidden Node Environment

    NASA Astrophysics Data System (ADS)

    Garg, Ruchi; Sharma, Himanshu; Kumar, Sumit

    IEEE 802.11 is a standard for mobile ad hoc networks (MANET), implemented with various different protocols. Ad Hoc on Demand Distance Vector Routing (AODV) is one of the several protocols of IEEE 802.11, intended to provide various Quality of Service (QOS) parameters under acceptable range. To avoid the collision and interference the MAC protocol has only two solutions, one, to sense the physical carrier and second, to use the RTS/CTS handshake mechanism. But with the help of these methods AODV is not free from the problem of hidden nodes like other several protocols. Under the hidden node environment, performance of AODV depends upon various factors. The position of receiver and sender among the other nodes is very crucial and it affects the performance. Under the various situations the AODV is simulated with the help of NS2 and the outcomes are discussed.

  14. Simple proof of security of the BB84 quantum key distribution protocol

    PubMed

    Shor; Preskill

    2000-07-10

    We prove that the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution is secure. We first give a key distribution protocol based on entanglement purification, which can be proven secure using methods from Lo and Chau's proof of security for a similar protocol. We then show that the security of this protocol implies the security of BB84. The entanglement purification based protocol uses Calderbank-Shor-Steane codes, and properties of these codes are used to remove the use of quantum computation from the Lo-Chau protocol.

  15. Macrosomie fœtale à Lubumbashi: facteurs de risque et pronostic maternel et périnatal

    PubMed Central

    Luhete, Prosper Kakudji; Mukuku, Olivier; Kiopin, Patrick Mubinda; Tambwe, Albert Mwembo; Kayamba, Prosper Kalenga Muenze

    2016-01-01

    Introduction La macrosomie fœtale est habituellement définie par un poids de naissance supérieur ou égal à 4000 grammes. L'objectif de cette étude est de déterminer la fréquence de la macrosomie, d'identifier les facteurs étiologiques et d’évaluer le pronostic maternel et périnatal. Méthodes Il s'agit d'une étude cas-témoins menéeau sein des maternités de 10 hôpitaux généraux de référence de la ville de Lubumbashi en République Démocratique du Congoentre le 1er décembre 2013 et le 31 mars 2014. Les accouchées ont été réparties en deux groupes, en fonction du poids de naissance de leurs nouveau-nés: groupe I (≥4000 grammes ou plus) et groupe II (2500 à 3500 grammes). Les caractéristiques maternelles, l'environnement obstétrical ainsi que le pronostic maternel et périnatal ont été étudiés et comparés dans les deux groupes. Les données ont été analysées à l'aide du logiciel Épi info version 7.1. Les différences étaient jugées significatives pour un seuil de p<0,05. Résultats Au total, 668 mères et leurs nouveau-nés ont été inclus dont 167 macrosomes et 501témoins. L'incidence de la macrosomie fœtale était de 5,7%. Comparativement aux mères de témoins, nous avons trouvé que les mères des nouveau-nés macrosomes étaient plus âgées, multipares, multigestes, obèses, diabétiques et avaient antérieurement donné naissance à un macrosome. Les taux de césarienne et de délivrance pathologique étaient significativement élevés chez les mères de macrosomes que chez celles de témoins. Lesexe masculin était significativement plus prédominant chez macrosomes que chez les témoins. La dystocie des épaules étaitenregistrée uniquement dans le groupe des macrosomes. Conclusion La prévalence de l'accouchement d'un macrosome à Lubumbashi est de 5,7%. La macrosomie est souvent à l'origine de complications maternelles et périnatales. La réduction de ces dernières passe par une meilleure connaissance des

  16. Associations of genetic markers in cattle receiving differing implant protocols.

    PubMed

    King, D A; Shackelford, S D; McDaneld, T G; Kuehn, L A; Kemp, C M; Smith, T P L; Wheeler, T L; Koohmaraie, M

    2012-07-01

    The potential interaction of growth-promoting implants and genetic markers previously reported to be associated with growth, carcass traits, and tenderness was evaluated. Two implant protocols were applied to subsets of steers (n = 383) and heifers (n = 65) that were also genotyped for 47 SNP reported to be associated with variation in growth, fat thickness, LM area, marbling, or tenderness. The "mild" protocol consisted of a single terminal implant [16 mg estradiol benzoate (EB), 80 mg trenbalone acetate (TBA) or 8 mg EB, 80 mg TBA given to steers and heifers, respectively]. The "aggressive" protocol consisted of both a growing implant (8 mg EB, 40 mg TBA) for the lightest half of the animals on the aggressive protocol and 2 successive implants (28 mg EB, 200 mg TBA) given to all animals assigned to the aggressive treatment. Implant protocol had measurable impact on BW and ADG (P < 0.05), with the aggressive protocol increasing these traits before the terminal implant (relative to the mild protocol), whereas the mild protocol increased ADG after the terminal implant so that the final BW and ADG over the experimental period were similar between protocols. Animals on the aggressive protocol had significantly increased (P < 0.05) LM area (1.9 cm(2)), slice shear force (1.4 kg), and intact desmin (0.05 units), but decreased (P < 0.05) marbling score (49 units) and adjusted fat thickness (0.1 cm), and yield grade (0.15 units). Among both treatments, 8 of 9 growth-related SNP were associated with BW or ADG, and 6 of 17 tenderness-related SNP were associated with slice shear force or intact desmin. Favorable growth alleles generally were associated with increased carcass yield traits but decreased tenderness. Similarly, favorable tenderness genotypes for some markers were associated with decreased BW and ADG. Some interactions of implant protocol and genotype were noted, with some growth SNP alleles increasing the effect of the aggressive protocol. In contrast, putative

  17. A software defined RTU multi-protocol automatic adaptation data transmission method

    NASA Astrophysics Data System (ADS)

    Jin, Huiying; Xu, Xingwu; Wang, Zhanfeng; Ma, Weijun; Li, Sheng; Su, Yong; Pan, Yunpeng

    2018-02-01

    Remote terminal unit (RTU) is the core device of the monitor system in hydrology and water resources. Different devices often have different communication protocols in the application layer, which results in the difficulty in information analysis and communication networking. Therefore, we introduced the idea of software defined hardware, and abstracted the common feature of mainstream communication protocols of RTU application layer, and proposed a uniformed common protocol model. Then, various communication protocol algorithms of application layer are modularized according to the model. The executable codes of these algorithms are labeled by the virtual functions and stored in the flash chips of embedded CPU to form the protocol stack. According to the configuration commands to initialize the RTU communication systems, it is able to achieve dynamic assembling and loading of various application layer communication protocols of RTU and complete the efficient transport of sensor data from RTU to central station when the data acquisition protocol of sensors and various external communication terminals remain unchanged.

  18. Security of six-state quantum key distribution protocol with threshold detectors

    PubMed Central

    Kato, Go; Tamaki, Kiyoshi

    2016-01-01

    The security of quantum key distribution (QKD) is established by a security proof, and the security proof puts some assumptions on the devices consisting of a QKD system. Among such assumptions, security proofs of the six-state protocol assume the use of photon number resolving (PNR) detector, and as a result the bit error rate threshold for secure key generation for the six-state protocol is higher than that for the BB84 protocol. Unfortunately, however, this type of detector is demanding in terms of technological level compared to the standard threshold detector, and removing the necessity of such a detector enhances the feasibility of the implementation of the six-state protocol. Here, we develop the security proof for the six-state protocol and show that we can use the threshold detector for the six-state protocol. Importantly, the bit error rate threshold for the key generation for the six-state protocol (12.611%) remains almost the same as the one (12.619%) that is derived from the existing security proofs assuming the use of PNR detectors. This clearly demonstrates feasibility of the six-state protocol with practical devices. PMID:27443610

  19. An economic and feasible Quantum Sealed-bid Auction protocol

    NASA Astrophysics Data System (ADS)

    Zhang, Rui; Shi, Run-hua; Qin, Jia-qi; Peng, Zhen-wan

    2018-02-01

    We present an economic and feasible Quantum Sealed-bid Auction protocol using quantum secure direct communication based on single photons in both the polarization and the spatial-mode degrees of freedom, where each single photon can carry two bits of classical information. Compared with previous protocols, our protocol has higher efficiency. In addition, we propose a secure post-confirmation mechanism without quantum entanglement to guarantee the security and the fairness of the auction.

  20. Eavesdropping on the improved three-party quantum secret sharing protocol

    NASA Astrophysics Data System (ADS)

    Gao, Gan

    2011-02-01

    Lin et al. [Song Lin, Fei Gao, Qiao-yan Wen, Fu-chen Zhu, Opt. Commun. 281 (2008) 4553] pointed out that the multiparty quantum secret sharing protocol [Zhan-jun Zhang, Gan Gao, Xin Wang, Lian-fang Han, Shou-hua Shi, Opt. Commun. 269 (2007) 418] is not secure and proposed an improved three-party quantum secret sharing protocol. In this paper, we study the security of the improved three-party quantum secret sharing protocol and find that it is still not secure. Finally, a further improved three-party quantum secret sharing protocol is proposed.

  1. Verification and validation of a reliable multicast protocol

    NASA Technical Reports Server (NTRS)

    Callahan, John R.; Montgomery, Todd L.

    1995-01-01

    This paper describes the methods used to specify and implement a complex communications protocol that provides reliable delivery of data in multicast-capable, packet-switching telecommunication networks. The protocol, called the Reliable Multicasting Protocol (RMP), was developed incrementally by two complementary teams using a combination of formal and informal techniques in an attempt to ensure the correctness of the protocol implementation. The first team, called the Design team, initially specified protocol requirements using a variant of SCR requirements tables and implemented a prototype solution. The second team, called the V&V team, developed a state model based on the requirements tables and derived test cases from these tables to exercise the implementation. In a series of iterative steps, the Design team added new functionality to the implementation while the V&V team kept the state model in fidelity with the implementation through testing. Test cases derived from state transition paths in the formal model formed the dialogue between teams during development and served as the vehicles for keeping the model and implementation in fidelity with each other. This paper describes our experiences in developing our process model, details of our approach, and some example problems found during the development of RMP.

  2. A Low Cost Key Agreement Protocol Based on Binary Tree for EPCglobal Class 1 Generation 2 RFID Protocol

    NASA Astrophysics Data System (ADS)

    Jeng, Albert; Chang, Li-Chung; Chen, Sheng-Hui

    There are many protocols proposed for protecting Radio Frequency Identification (RFID) system privacy and security. A number of these protocols are designed for protecting long-term security of RFID system using symmetric key or public key cryptosystem. Others are designed for protecting user anonymity and privacy. In practice, the use of RFID technology often has a short lifespan, such as commodity check out, supply chain management and so on. Furthermore, we know that designing a long-term security architecture to protect the security and privacy of RFID tags information requires a thorough consideration from many different aspects. However, any security enhancement on RFID technology will jack up its cost which may be detrimental to its widespread deployment. Due to the severe constraints of RFID tag resources (e. g., power source, computing power, communication bandwidth) and open air communication nature of RFID usage, it is a great challenge to secure a typical RFID system. For example, computational heavy public key and symmetric key cryptography algorithms (e. g., RSA and AES) may not be suitable or over-killed to protect RFID security or privacy. These factors motivate us to research an efficient and cost effective solution for RFID security and privacy protection. In this paper, we propose a new effective generic binary tree based key agreement protocol (called BKAP) and its variations, and show how it can be applied to secure the low cost and resource constraint RFID system. This BKAP is not a general purpose key agreement protocol rather it is a special purpose protocol to protect privacy, un-traceability and anonymity in a single RFID closed system domain.

  3. IMHRP: Improved Multi-Hop Routing Protocol for Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Huang, Jianhua; Ruan, Danwei; Hong, Yadong; Zhao, Ziming; Zheng, Hong

    2017-10-01

    Wireless sensor network (WSN) is a self-organizing system formed by a large number of low-cost sensor nodes through wireless communication. Sensor nodes collect environmental information and transmit it to the base station (BS). Sensor nodes usually have very limited battery energy. The batteries cannot be charged or replaced. Therefore, it is necessary to design an energy efficient routing protocol to maximize the network lifetime. This paper presents an improved multi-hop routing protocol (IMHRP) for homogeneous networks. In the IMHRP protocol, based on the distances to the BS, the CH nodes are divided into internal CH nodes and external CH nodes. The set-up phase of the protocol is based on the LEACH protocol and the minimum distance between CH nodes are limited to a special constant distance, so a more uniform distribution of CH nodes is achieved. In the steady-state phase, the routes of different CH nodes are created on the basis of the distances between the CH nodes. The energy efficiency of communication can be maximized. The simulation results show that the proposed algorithm can more effectively reduce the energy consumption of each round and prolong the network lifetime compared with LEACH protocol and MHT protocol.

  4. The Interlibrary Loan Protocol: An OSI Solution to ILL Messaging.

    ERIC Educational Resources Information Center

    Turner, Fay

    1990-01-01

    Discusses the interlibrary loan (ILL) protocol, a standard based on the principles of the Open Systems Interconnection (OSI) Reference Model. Benefits derived from protocol use are described, the status of the protocol as an international standard is reviewed, and steps taken by the National Library of Canada to facilitate migration to an ILL…

  5. In Brief: Kyoto Protocol moves forward

    NASA Astrophysics Data System (ADS)

    Showstack, Randy

    2004-10-01

    The Russian cabinet's 30 September endorsement of the Kyoto Protocol to the United Nations Framework Convention on Climate Change (UNFCCC) likely clears the way for the treaty's ratification by that country's parliament and for its entry into force. The protocol enters into force when not less than 55 Parties to the Convention, including industrialized countries (so called ``Annex I Parties'') which accounted in total for at least 55 % of the total carbon dioxide emissions for 1990 from that group, officially have agreed to the treaty.

  6. SpaceWire Protocol ID: What Does It Mean To You?

    NASA Technical Reports Server (NTRS)

    Rakow, Glenn; Schnurr, Richard; Gilley, Daniel; Parks, Steve

    2006-01-01

    Spacewire is becoming a popular solution for satellite high-speed data buses because it is a simple standard that provides great flexibility for a wide range of system requirements. It is simple in packet format and protocol, allowing users to easily tailor their implementation for their specific application. Some of the attractive aspects of Spacewire that make it easy to implement also make it hard for future reuse. Protocol reuse is difficult because Spacewire does not have a defined mechanism to communicate with the higher layers of the protocol stack. This has forced users of Spacewire to define unique packet formats and define how these packets are to be processed. Each mission writes their own Interface Control Document (ICD) and tailors Spacewire for their specific requirements making reuse difficult. Part of the reason for this habit may be because engineers typically optimize designs for their own requirements in the absence of a standard. This is an inefficient use of project resources and costs more to develop missions. A new packet format for Spacewire has been defined as a solution for this problem. This new packet format is a compliment to the Spacewire standard that will support protocol development upon Spacewire. The new packet definition does not replace the current packet structure, i.e., does not make the standard obsolete, but merely extends the standard for those who want to develop protocols over Spacewire. The Spacewire packet is defined with the first part being the Destination Address, which may be one or more bytes. This is followed by the packet cargo, which is user defined. The cargo is truncated with an End-Of-Packet (EOP) marker. This packet structure offers low packet overhead and allows the user to define how the contents are to be formatted. It also provides for many different addressing schemes, which provide flexibility in the system. This packet flexibility is typically an attractive part of the Spacewire. The new extended

  7. The Design of Finite State Machine for Asynchronous Replication Protocol

    NASA Astrophysics Data System (ADS)

    Wang, Yanlong; Li, Zhanhuai; Lin, Wei; Hei, Minglei; Hao, Jianhua

    Data replication is a key way to design a disaster tolerance system and to achieve reliability and availability. It is difficult for a replication protocol to deal with the diverse and complex environment. This means that data is less well replicated than it ought to be. To reduce data loss and to optimize replication protocols, we (1) present a finite state machine, (2) run it to manage an asynchronous replication protocol and (3) report a simple evaluation of the asynchronous replication protocol based on our state machine. It's proved that our state machine is applicable to guarantee the asynchronous replication protocol running in the proper state to the largest extent in the event of various possible events. It also can helpful to build up replication-based disaster tolerance systems to ensure the business continuity.

  8. The Geneva Protocol of 1925: Past and Present.

    ERIC Educational Resources Information Center

    Harbison, John L.

    1982-01-01

    Presents a position paper for use in high school social studies class debates on the Geneva Protocol of 1925. The Protocol was an international agreement to restrict chemical and biological warfare (CBW). The author traces the history of U.S. policies dealing with CBW since 1925. (AM)

  9. Implementation of a timed, electronic, assessment-driven potassium-replacement protocol.

    PubMed

    Zielenski, Christopher; Crabtree, Adam; Le, Tien; Marlatt, Alyse; Ng, Dana; Tran, Alan

    2017-06-15

    The adherence to and effectiveness and safety of a timed, electronic, assessment-driven potassium-replacement protocol (TARP) were compared with an electronic nurse-driven replacement protocol (NRP) are reported. A retrospective observational study was conducted in a community hospital evaluating protocol adherence, effectiveness, and safety for 2 potassium-replacement protocols. All adults on medical units with an order for potassium replacement per protocol during the 3-month trial periods were reviewed. All patients requiring potassium replacement per protocol were included in the analysis. Adherence to the protocol was assessed by evaluating the dose of potassium administered and performance of reassessments. Effectiveness of the protocol was assessed by evaluating the time to achieve target potassium levels. Safety was assessed by evaluating the route of administration and occurrence of hyperkalemia. A total of 300 patients treated using potassium-replacement protocols required potassium replacement during the study period, with 148 patients in the NRP group requiring 491 instances of potassium replacement. In the TARP group a total of 564 instances requiring potassium replacement corresponded to 152 patients. Of the 491 instances requiring replacement in the NRP group, the correct dose was administered and reassessment performed 117 times (23.8%). Overall adherence ( p < 0.05), correct dose given ( p < 0.05), average time from blood draw to potassium replacement ( p < 0.0001), use of oral replacement ( p < 0.05), and time to achieve target potassium level within 12 hours ( p < 0.05) were significantly improved in the TARP group. The TARP improved the effectiveness and safety of potassium-replacement therapy over the traditional NRP without negatively affecting timeliness of care. Copyright © 2017 by the American Society of Health-System Pharmacists, Inc. All rights reserved.

  10. A Novel Process Audit for Standardized Perioperative Handoff Protocols.

    PubMed

    Pallekonda, Vinay; Scholl, Adam T; McKelvey, George M; Amhaz, Hassan; Essa, Deanna; Narreddy, Spurthy; Tan, Jens; Templonuevo, Mark; Ramirez, Sasha; Petrovic, Michelle A

    2017-11-01

    A perioperative handoff protocol provides a standardized delivery of communication during a handoff that occurs from the operating room to the postanestheisa care unit or ICU. The protocol's success is dependent, in part, on its continued proper use over time. A novel process audit was developed to help ensure that a perioperative handoff protocol is used accurately and appropriately over time. The Audit Observation Form is used for the Audit Phase of the process audit, while the Audit Averages Form is used for the Data Analysis Phase. Employing minimal resources and using quantitative methods, the process audit provides the necessary means to evaluate the proper execution of any perioperative handoff protocol. Copyright © 2017 The Joint Commission. Published by Elsevier Inc. All rights reserved.

  11. Comparison of protocols measuring diffusion and partition coefficients in the stratum corneum

    PubMed Central

    Rothe, H.; Obringer, C.; Manwaring, J.; Avci, C.; Wargniez, W.; Eilstein, J.; Hewitt, N.; Cubberley, R.; Duplan, H.; Lange, D.; Jacques‐Jamin, C.; Klaric, M.; Schepky, A.

    2017-01-01

    Abstract Partition (K) and diffusion (D) coefficients are important to measure for the modelling of skin penetration of chemicals through the stratum corneum (SC). We compared the feasibility of three protocols for the testing of 50 chemicals in our main studies, using three cosmetics‐relevant model chemicals with a wide range of logP values. Protocol 1: SC concentration‐depth profile using tape‐stripping (measures KSC/v and DSC/HSC 2, where HSC is the SC thickness); Protocol 2A: incubation of isolated SC with chemical (direct measurement of KSC/v only) and Protocol 2B: diffusion through isolated SC mounted on a Franz cell (measures KSC/v and DSC/HSC 2, and is based on Fick's laws). KSC/v values for caffeine and resorcinol using Protocol 1 and 2B were within 30% of each other, values using Protocol 2A were ~two‐fold higher, and all values were within 10‐fold of each other. Only indirect determination of KSC/v by Protocol 2B was different from the direct measurement of KSC/v by Protocol 2A and Protocol 1 for 7‐EC. The variability of KSC/v for all three chemicals using Protocol 2B was higher compared to Protocol 1 and 2A. DSC/HSC 2 values for the three chemicals were of the same order of magnitude using all three protocols. Additionally, using Protocol 1, there was very little difference between parameters measured in pig and human SC. In conclusion, KSC/v, and DSC values were comparable using different methods. Pig skin might be a good surrogate for human skin for the three chemicals tested. Copyright © 2017 The Authors Journal of Applied Toxicology published by John Wiley & Sons Ltd. PMID:28139006

  12. The Wiley Protocol: an analysis of ethical issues.

    PubMed

    Rosenthal, M Sara

    2008-01-01

    : This review explores the ethical issues surrounding an unregulated protocol that is advertised to women through consumer books, the popular press, and the Internet, known as the Wiley Protocol. : A content analysis of relevant documents was conducted, followed by telephone interviews with investigators and former participants to verify facts. : The Wiley Protocol is an example of unregulated research involving potentially unsafe doses of bioidentical hormones applied to an unselected population of women. This protocol fails to use research ethics guidelines such as informed consent, investigator expertise, sound methodology, standardized data collection, and data safety monitoring. : Clinical ethics breaches include lack of full disclosure of risks, coercive influences, as well as misinformation about the study goals and safety. Breaches of professional ethics include conflicts of interest with respect to financial incentives, patient accrual, and inadequate standards of awareness and proficiency among participating investigators. It appears evident that the failure to regulate nutriceuticals and products of compounding pharmacy has provided the opportunity for these ethical violations.

  13. An improved PRoPHET routing protocol in delay tolerant network.

    PubMed

    Han, Seung Deok; Chung, Yun Won

    2015-01-01

    In delay tolerant network (DTN), an end-to-end path is not guaranteed and packets are delivered from a source node to a destination node via store-carry-forward based routing. In DTN, a source node or an intermediate node stores packets in buffer and carries them while it moves around. These packets are forwarded to other nodes based on predefined criteria and finally are delivered to a destination node via multiple hops. In this paper, we improve the dissemination speed of PRoPHET (probability routing protocol using history of encounters and transitivity) protocol by employing epidemic protocol for disseminating message m, if forwarding counter and hop counter values are smaller than or equal to the threshold values. The performance of the proposed protocol was analyzed from the aspect of delivery probability, average delay, and overhead ratio. Numerical results show that the proposed protocol can improve the delivery probability, average delay, and overhead ratio of PRoPHET protocol by appropriately selecting the threshold forwarding counter and threshold hop counter values.

  14. Minimal stimulation protocol using letrozole versus microdose flare up GnRH agonist protocol in women with poor ovarian response undergoing ICSI.

    PubMed

    Mohsen, Iman Abdel; El Din, Rasha Ezz

    2013-02-01

    To compare the IVF outcomes of letrozole/antagonist and microdose GnRH agonist flare up protocols in poor ovarian responders undergoing intracytoplasmic sperm injection. A randomized controlled trial was performed in patients with one or more previous failed IVF cycles in which four or less oocytes were retrieved when the gonadotrophin starting dose was at least 300 IU/day. Sixty patients were randomized by computer-generated list to receive either letrozole/antagonist (mild stimulation) n = 30 or GnRH-a protocol (microdose flare) n = 30. Both groups were similar with respect to background and hormonal characteristics (age, duration of infertility, BMI, FSH, LH and E2). The clinical pregnancy rate per cycle was similar in both groups (13.3 vs. 16.6%; OR = 0.769; 95% CI = 0.185, 3.198). The doses of used gonadotropins and the number of stimulation days were significantly lower in the letrozole/antagonist protocol. The peak E2 level on the day of hCG, the endometrial thickness, the retrieved oocytes, the number of fertilized oocytes, the number of transferred embryos and the cancellation rate were statistically similar in both groups. The letrozole/antagonist protocol is a cost-effective and patient-friendly protocol that may be used in poor ovarian responders for IVF/ICSI.

  15. Optimizing otoacoustic emission protocols for a UNHS program.

    PubMed

    Hatzopoulos, S; Petruccelli, J; Ciorba, A; Martini, A

    2009-01-01

    To identify the optimal test protocol to screen for hearing problems in newborns, an evaluation of three distortion product otoacoustic emission (DPOAE) protocols was conducted in neonates, from a well-baby nursery (WBN) and from a neonatal intensive care unit (NICU) and compared to the performance in newborns of a more standard protocol based on transient-evoked OAEs (TEOAEs). The DPOAE protocols used asymmetrical stimulus intensities (L(1) > L(2)) with a frequency ratio of 1.22, in the following format: (P1), L(1) = 60, L(2) = 50 dB SPL; (P2), L(1) = 65, L(2) = 55 dB SPL, and (P3), L(1) = 75, L(2) = 65 dB SPL. Linear TEOAE responses, evoked by click stimuli of 75 dB peSPL, were used as controls of normal cochlear function. Five frequencies at 1.5, 2.0, 3.0, 4.0 and 5.0 kHz were tested with a common commercially available macro-based software subroutine (Otodynamics Corp, ILO-92). The project evaluated the responses from 1200 WBN infants (average age 48 h) and 350 low-birth-weight NICU infants, all randomly selected. Statistical analyses comparing the signal-to-noise ratios (S/N), at the predefined f(2) frequencies, indicated that the P1 and P2 DPOAE protocols generated similar responses. Significant S/N differences were observed in the P3 to P2 dataset comparisons. DPOAE scoring criteria were estimated from the P3 dataset using a one-sided, distribution-free confidence intervals. The scoring criteria for a 'pass' were estimated as a minimum S/N of 6.0, 7.0 and 6.0 dB at 2.0, 3.0 and 4.0 kHz, respectively. In terms of feasibility, the P3 protocol generated responses in 98% of the WBN and 94.8% of the NICU infants. All three DPOAE protocols demonstrated shorter time-recording requirements than the standard TEOAE test. The false-positive and false-negative rates for the NICU infants were estimated as 0.0028 and 0.003%, respectively.

  16. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography.

    PubMed

    Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen

    2011-01-01

    User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das' protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs.

  17. A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation

    PubMed Central

    Rahayu, Triana Mugia; Lee, Sang-Gon; Lee, Hoon-Jae

    2015-01-01

    The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both. PMID:26131669

  18. A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation.

    PubMed

    Rahayu, Triana Mugia; Lee, Sang-Gon; Lee, Hoon-Jae

    2015-06-26

    The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.

  19. A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

    PubMed Central

    Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen

    2011-01-01

    User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das’ protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs. PMID:22163874

  20. Comparison of seven protocols to identify fecal contamination sources using Escherichia coli

    USGS Publications Warehouse

    Stoeckel, D.M.; Mathes, M.V.; Hyer, K.E.; Hagedorn, C.; Kator, H.; Lukasik, J.; O'Brien, T. L.; Fenger, T.W.; Samadpour, M.; Strickler, K.M.; Wiggins, B.A.

    2004-01-01

    Microbial source tracking (MST) uses various approaches to classify fecal-indicator microorganisms to source hosts. Reproducibility, accuracy, and robustness of seven phenotypic and genotypic MST protocols were evaluated by use of Escherichia coli from an eight-host library of known-source isolates and a separate, blinded challenge library. In reproducibility tests, measuring each protocol's ability to reclassify blinded replicates, only one (pulsed-field gel electrophoresis; PFGE) correctly classified all test replicates to host species; three protocols classified 48-62% correctly, and the remaining three classified fewer than 25% correctly. In accuracy tests, measuring each protocol's ability to correctly classify new isolates, ribotyping with EcoRI and PvuII approached 100% correct classification but only 6% of isolates were classified; four of the other six protocols (antibiotic resistance analysis, PFGE, and two repetitive-element PCR protocols) achieved better than random accuracy rates when 30-100% of challenge isolates were classified. In robustness tests, measuring each protocol's ability to recognize isolates from nonlibrary hosts, three protocols correctly classified 33-100% of isolates as "unknown origin," whereas four protocols classified all isolates to a source category. A relevance test, summarizing interpretations for a hypothetical water sample containing 30 challenge isolates, indicated that false-positive classifications would hinder interpretations for most protocols. Study results indicate that more representation in known-source libraries and better classification accuracy would be needed before field application. Thorough reliability assessment of classification results is crucial before and during application of MST protocols.