Sample records for practice protocol system

  1. Trojan horse attacks on counterfactual quantum key distribution

    NASA Astrophysics Data System (ADS)

    Yang, Xiuqing; Wei, Kejin; Ma, Haiqiang; Sun, Shihai; Du, Yungang; Wu, Lingan

    2016-04-01

    There has been much interest in ;counterfactual quantum cryptography; (T.-G. Noh, 2009 [10]). It seems that the counterfactual quantum key distribution protocol without any photon carrier through the quantum channel provides practical security advantages. However, we show that it is easy to break counterfactual quantum key distribution systems in practical situations. We introduce the two types of Trojan horse attacks that are available for the two-way protocol and become possible for practical counterfactual systems with our eavesdropping schemes.

  2. Compliance with AAPM Practice Guideline 1.a: CT Protocol Management and Review — from the perspective of a university hospital

    PubMed Central

    Bour, Robert K.; Pozniak, Myron; Ranallo, Frank N.

    2015-01-01

    The purpose of this paper is to describe our experience with the AAPM Medical Physics Practice Guideline 1.a: “CT Protocol Management and Review Practice Guideline”. Specifically, we will share how our institution's quality management system addresses the suggestions within the AAPM practice report. We feel this paper is needed as it was beyond the scope of the AAPM practice guideline to provide specific details on fulfilling individual guidelines. Our hope is that other institutions will be able to emulate some of our practices and that this article would encourage other types of centers (e.g., community hospitals) to share their methodology for approaching CT protocol optimization and quality control. Our institution had a functioning CT protocol optimization process, albeit informal, since we began using CT. Recently, we made our protocol development and validation process compliant with a number of the ISO 9001:2008 clauses and this required us to formalize the roles of the members of our CT protocol optimization team. We rely heavily on PACS‐based IT solutions for acquiring radiologist feedback on the performance of our CT protocols and the performance of our CT scanners in terms of dose (scanner output) and the function of the automatic tube current modulation. Specific details on our quality management system covering both quality control and ongoing optimization have been provided. The roles of each CT protocol team member have been defined, and the critical role that IT solutions provides for the management of files and the monitoring of CT protocols has been reviewed. In addition, the invaluable role management provides by being a champion for the project has been explained; lack of a project champion will mitigate the efforts of a CT protocol optimization team. Meeting the guidelines set forth in the AAPM practice guideline was not inherently difficult, but did, in our case, require the cooperation of radiologists, technologists, physicists, IT, administrative staff, and hospital management. Some of the IT solutions presented in this paper are novel and currently unique to our institution. PACS number: 87.57.Q PMID:26103176

  3. Analysis of practical backoff protocols for contention resolution with multiple servers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Goldberg, L.A.; MacKenzie, P.D.

    Backoff protocols are probably the most widely used protocols for contention resolution in multiple access channels. In this paper, we analyze the stochastic behavior of backoff protocols for contention resolution among a set of clients and servers, each server being a multiple access channel that deals with contention like an Ethernet channel. We use the standard model in which each client generates requests for a given server according to a Bemoulli distribution with a specified mean. The client-server request rate of a system is the maximum over all client-server pairs (i, j) of the sum of all request rates associatedmore » with either client i or server j. Our main result is that any superlinear polynomial backoff protocol is stable for any multiple-server system with a sub-unit client-server request rate. We confirm the practical relevance of our result by demonstrating experimentally that the average waiting time of requests is very small when such a system is run with reasonably few clients and reasonably small request rates such as those that occur in actual ethernets. Our result is the first proof of stability for any backoff protocol for contention resolution with multiple servers. Our result is also the first proof that any weakly acknowledgment based protocol is stable for contention resolution with multiple servers and such high request rates. Two special cases of our result are of interest. Hastad, Leighton and Rogoff have shown that for a single-server system with a sub-unit client-server request rate any modified superlinear polynomial backoff protocol is stable. These modified backoff protocols are similar to standard backoff protocols but require more random bits to implement. The special case of our result in which there is only one server extends the result of Hastad, Leighton and Rogoff to standard (practical) backoff protocols. Finally, our result applies to dynamic routing in optical networks.« less

  4. Mirror neuron system and observational learning: behavioral and neurophysiological evidence.

    PubMed

    Lago-Rodriguez, Angel; Lopez-Alonso, Virginia; Fernández-del-Olmo, Miguel

    2013-07-01

    Three experiments were performed to study observational learning using behavioral, perceptual, and neurophysiological data. Experiment 1 investigated whether observing an execution model, during physical practice of a transitive task that only presented one execution strategy, led to performance improvements compared with physical practice alone. Experiment 2 investigated whether performing an observational learning protocol improves subjects' action perception. In experiment 3 we evaluated whether the type of practice performed determined the activation of the Mirror Neuron System during action observation. Results showed that, compared with physical practice, observing an execution model during a task that only showed one execution strategy does not provide behavioral benefits. However, an observational learning protocol allows subjects to predict more precisely the outcome of the learned task. Finally, intersperse observation of an execution model with physical practice results in changes of primary motor cortex activity during the observation of the motor pattern previously practiced, whereas modulations in the connectivity between primary and non primary motor areas (PMv-M1; PPC-M1) were not affected by the practice protocol performed by the observer. Copyright © 2013 Elsevier B.V. All rights reserved.

  5. A proposed protocol for acceptance and constancy control of computed tomography systems: a Nordic Association for Clinical Physics (NACP) work group report.

    PubMed

    Kuttner, Samuel; Bujila, Robert; Kortesniemi, Mika; Andersson, Henrik; Kull, Love; Østerås, Bjørn Helge; Thygesen, Jesper; Tarp, Ivanka Sojat

    2013-03-01

    Quality assurance (QA) of computed tomography (CT) systems is one of the routine tasks for medical physicists in the Nordic countries. However, standardized QA protocols do not yet exist and the QA methods, as well as the applied tolerance levels, vary in scope and extent at different hospitals. To propose a standardized protocol for acceptance and constancy testing of CT scanners in the Nordic Region. Following a Nordic Association for Clinical Physics (NACP) initiative, a group of medical physicists, with representatives from four Nordic countries, was formed. Based on international literature and practical experience within the group, a comprehensive standardized test protocol was developed. The proposed protocol includes tests related to the mechanical functionality, X-ray tube, detector, and image quality for CT scanners. For each test, recommendations regarding the purpose, equipment needed, an outline of the test method, the measured parameter, tolerance levels, and the testing frequency are stated. In addition, a number of optional tests are briefly discussed that may provide further information about the CT system. Based on international references and medical physicists' practical experiences, a comprehensive QA protocol for CT systems is proposed, including both acceptance and constancy tests. The protocol may serve as a reference for medical physicists in the Nordic countries.

  6. Quantum key distribution protocol based on contextuality monogamy

    NASA Astrophysics Data System (ADS)

    Singh, Jaskaran; Bharti, Kishor; Arvind

    2017-06-01

    The security of quantum key distribution (QKD) protocols hinges upon features of physical systems that are uniquely quantum in nature. We explore the role of quantumness, as qualified by quantum contextuality, in a QKD scheme. A QKD protocol based on the Klyachko-Can-Binicioğlu-Shumovsky (KCBS) contextuality scenario using a three-level quantum system is presented. We explicitly show the unconditional security of the protocol by a generalized contextuality monogamy relationship based on the no-disturbance principle. This protocol provides a new framework for QKD which has conceptual and practical advantages over other protocols.

  7. Early warning systems and rapid response to the deteriorating patient in hospital: A realist evaluation.

    PubMed

    McGaughey, Jennifer; O'Halloran, Peter; Porter, Sam; Trinder, John; Blackwood, Bronagh

    2017-12-01

    To test the Rapid Response Systems programme theory against actual practice components of the Rapid Response Systems implemented to identify those contexts and mechanisms which have an impact on the successful achievement of desired outcomes in practice. Rapid Response Systems allow deteriorating patients to be recognized using Early Warning Systems, referred early via escalation protocols and managed at the bedside by competent staff. Realist evaluation. The research design was an embedded multiple case study approach of four wards in two hospitals in Northern Ireland which followed the principles of Realist Evaluation. We used various mixed methods including individual and focus group interviews, observation of nursing practice between June-November 2010 and document analysis of Early Warning Systems audit data between May-October 2010 and hospital acute care training records over 4.5 years from 2003-2008. Data were analysed using NiVivo8 and SPPS. A cross-case analysis highlighted similar patterns of factors which enabled or constrained successful recognition, referral and response to deteriorating patients in practice. Key enabling factors were the use of clinical judgement by experienced nurses and the empowerment of nurses as a result of organizational change associated with implementation of Early Warning System protocols. Key constraining factors were low staffing and inappropriate skill mix levels, rigid implementation of protocols and culturally embedded suboptimal communication processes. Successful implementation of Rapid Response Systems was dependent on adopting organizational and cultural changes that facilitated staff empowerment, flexible implementation of protocols and ongoing experiential learning. © 2017 John Wiley & Sons Ltd.

  8. Randomness determines practical security of BB84 quantum key distribution.

    PubMed

    Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2015-11-10

    Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.

  9. Randomness determines practical security of BB84 quantum key distribution

    PubMed Central

    Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2015-01-01

    Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system. PMID:26552359

  10. Randomness determines practical security of BB84 quantum key distribution

    NASA Astrophysics Data System (ADS)

    Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2015-11-01

    Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.

  11. One-sided measurement-device-independent quantum key distribution

    NASA Astrophysics Data System (ADS)

    Cao, Wen-Fei; Zhen, Yi-Zheng; Zheng, Yu-Lin; Li, Li; Chen, Zeng-Bing; Liu, Nai-Le; Chen, Kai

    2018-01-01

    Measurement-device-independent quantum key distribution (MDI-QKD) protocol was proposed to remove all the detector side channel attacks, while its security relies on the trusted encoding systems. Here we propose a one-sided MDI-QKD (1SMDI-QKD) protocol, which enjoys detection loophole-free advantage, and at the same time weakens the state preparation assumption in MDI-QKD. The 1SMDI-QKD can be regarded as a modified MDI-QKD, in which Bob's encoding system is trusted, while Alice's is uncharacterized. For the practical implementation, we also provide a scheme by utilizing coherent light source with an analytical two decoy state estimation method. Simulation with realistic experimental parameters shows that the protocol has a promising performance, and thus can be applied to practical QKD applications.

  12. TH-E-209-00: Radiation Dose Monitoring and Protocol Management

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    Radiation dose monitoring solutions have opened up new opportunities for medical physicists to be more involved in modern clinical radiology practices. In particular, with the help of comprehensive radiation dose data, data-driven protocol management and informed case follow up are now feasible. Significant challenges remain however and the problems faced by medical physicists are highly heterogeneous. Imaging systems from multiple vendors and a wide range of vintages co-exist in the same department and employ data communication protocols that are not fully standardized or implemented making harmonization complex. Many different solutions for radiation dose monitoring have been implemented by imaging facilitiesmore » over the past few years. Such systems are based on commercial software, home-grown IT solutions, manual PACS data dumping, etc., and diverse pathways can be used to bring the data to impact clinical practice. The speakers will share their experiences with creating or tailoring radiation dose monitoring/management systems and procedures over the past few years, which vary significantly in design and scope. Topics to cover: (1) fluoroscopic dose monitoring and high radiation event handling from a large academic hospital; (2) dose monitoring and protocol optimization in pediatric radiology; and (3) development of a home-grown IT solution and dose data analysis framework. Learning Objectives: Describe the scope and range of radiation dose monitoring and protocol management in a modern radiology practice Review examples of data available from a variety of systems and how it managed and conveyed. Reflect on the role of the physicist in radiation dose awareness.« less

  13. TH-E-209-02: Dose Monitoring and Protocol Optimization: The Pediatric Perspective

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    MacDougall, R.

    Radiation dose monitoring solutions have opened up new opportunities for medical physicists to be more involved in modern clinical radiology practices. In particular, with the help of comprehensive radiation dose data, data-driven protocol management and informed case follow up are now feasible. Significant challenges remain however and the problems faced by medical physicists are highly heterogeneous. Imaging systems from multiple vendors and a wide range of vintages co-exist in the same department and employ data communication protocols that are not fully standardized or implemented making harmonization complex. Many different solutions for radiation dose monitoring have been implemented by imaging facilitiesmore » over the past few years. Such systems are based on commercial software, home-grown IT solutions, manual PACS data dumping, etc., and diverse pathways can be used to bring the data to impact clinical practice. The speakers will share their experiences with creating or tailoring radiation dose monitoring/management systems and procedures over the past few years, which vary significantly in design and scope. Topics to cover: (1) fluoroscopic dose monitoring and high radiation event handling from a large academic hospital; (2) dose monitoring and protocol optimization in pediatric radiology; and (3) development of a home-grown IT solution and dose data analysis framework. Learning Objectives: Describe the scope and range of radiation dose monitoring and protocol management in a modern radiology practice Review examples of data available from a variety of systems and how it managed and conveyed. Reflect on the role of the physicist in radiation dose awareness.« less

  14. Reducing Tobacco Use among Youth: Community-Based Approaches. A Guideline for Prevention Practitioners. Prevention Enhancement Protocols System (PEPS) Series.

    ERIC Educational Resources Information Center

    Birch & Davis Associates, Inc., Silver Spring, MD.

    A substantial knowledge base exists on reduction of tobacco use by youth. Effective prevention in this area can have major health and economic benefits. Information from research and prevention practice, organized by means of the Prevention Enhancement Protocols System (PEPS), is provided in the form of guidelines and recommendations for planning…

  15. Benchmarking pediatric cranial CT protocols using a dose tracking software system: a multicenter study.

    PubMed

    De Bondt, Timo; Mulkens, Tom; Zanca, Federica; Pyfferoen, Lotte; Casselman, Jan W; Parizel, Paul M

    2017-02-01

    To benchmark regional standard practice for paediatric cranial CT-procedures in terms of radiation dose and acquisition parameters. Paediatric cranial CT-data were retrospectively collected during a 1-year period, in 3 different hospitals of the same country. A dose tracking system was used to automatically gather information. Dose (CTDI and DLP), scan length, amount of retakes and demographic data were stratified by age and clinical indication; appropriate use of child-specific protocols was assessed. In total, 296 paediatric cranial CT-procedures were collected. Although the median dose of each hospital was below national and international diagnostic reference level (DRL) for all age categories, statistically significant (p-value < 0.001) dose differences among hospitals were observed. The hospital with lowest dose levels showed smallest dose variability and used age-stratified protocols for standardizing paediatric head exams. Erroneous selection of adult protocols for children still occurred, mostly in the oldest age-group. Even though all hospitals complied with national and international DRLs, dose tracking and benchmarking showed that further dose optimization and standardization is possible by using age-stratified protocols for paediatric cranial CT. Moreover, having a dose tracking system revealed that adult protocols are still applied for paediatric CT, a practice that must be avoided. • Significant differences were observed in the delivered dose between age-groups and hospitals. • Using age-adapted scanning protocols gives a nearly linear dose increase. • Sharing dose-data can be a trigger for hospitals to reduce dose levels.

  16. Experience in Construction and Operation of the Distributed Information Systems on the Basis of the Z39.50 Protocol

    NASA Astrophysics Data System (ADS)

    Zhizhimov, Oleg; Mazov, Nikolay; Skibin, Sergey

    Questions concerned with construction and operation of the distributed information systems on the basis of ANSI/NISO Z39.50 Information Retrieval Protocol are discussed in the paper. The paper is based on authors' practice in developing ZooPARK server. Architecture of distributed information systems, questions of reliability of such systems, minimization of search time and administration are examined. Problems with developing of distributed information systems are also described.

  17. 77 FR 28387 - Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-14

    ... practice recommendations on emergency alerting systems such as promoting E9-1-1 reliability and alerting platforms--Emergency Alert System and Common Alerting Protocol. DATES: June 6, 2012. ADDRESSES: Federal... Advisory Committee that will provide recommendations to the FCC regarding best practices and actions the...

  18. Distributed synchronization of networked drive-response systems: A nonlinear fixed-time protocol.

    PubMed

    Zhao, Wen; Liu, Gang; Ma, Xi; He, Bing; Dong, Yunfeng

    2017-11-01

    The distributed synchronization of networked drive-response systems is investigated in this paper. A novel nonlinear protocol is proposed to ensure that the tracking errors converge to zeros in a fixed-time. By comparison with previous synchronization methods, the present method considers more practical conditions and the synchronization time is not dependent of arbitrary initial conditions but can be offline pre-assign according to the task assignment. Finally, the feasibility and validity of the presented protocol have been illustrated by a numerical simulation. Copyright © 2017. Published by Elsevier Ltd.

  19. Two-dimensional distributed-phase-reference protocol for quantum key distribution

    NASA Astrophysics Data System (ADS)

    Bacco, Davide; Christensen, Jesper Bjerge; Castaneda, Mario A. Usuga; Ding, Yunhong; Forchhammer, Søren; Rottwitt, Karsten; Oxenløwe, Leif Katsuo

    2016-12-01

    Quantum key distribution (QKD) and quantum communication enable the secure exchange of information between remote parties. Currently, the distributed-phase-reference (DPR) protocols, which are based on weak coherent pulses, are among the most practical solutions for long-range QKD. During the last 10 years, long-distance fiber-based DPR systems have been successfully demonstrated, although fundamental obstacles such as intrinsic channel losses limit their performance. Here, we introduce the first two-dimensional DPR-QKD protocol in which information is encoded in the time and phase of weak coherent pulses. The ability of extracting two bits of information per detection event, enables a higher secret key rate in specific realistic network scenarios. Moreover, despite the use of more dimensions, the proposed protocol remains simple, practical, and fully integrable.

  20. Two-dimensional distributed-phase-reference protocol for quantum key distribution.

    PubMed

    Bacco, Davide; Christensen, Jesper Bjerge; Castaneda, Mario A Usuga; Ding, Yunhong; Forchhammer, Søren; Rottwitt, Karsten; Oxenløwe, Leif Katsuo

    2016-12-22

    Quantum key distribution (QKD) and quantum communication enable the secure exchange of information between remote parties. Currently, the distributed-phase-reference (DPR) protocols, which are based on weak coherent pulses, are among the most practical solutions for long-range QKD. During the last 10 years, long-distance fiber-based DPR systems have been successfully demonstrated, although fundamental obstacles such as intrinsic channel losses limit their performance. Here, we introduce the first two-dimensional DPR-QKD protocol in which information is encoded in the time and phase of weak coherent pulses. The ability of extracting two bits of information per detection event, enables a higher secret key rate in specific realistic network scenarios. Moreover, despite the use of more dimensions, the proposed protocol remains simple, practical, and fully integrable.

  1. Two-dimensional distributed-phase-reference protocol for quantum key distribution

    PubMed Central

    Bacco, Davide; Christensen, Jesper Bjerge; Castaneda, Mario A. Usuga; Ding, Yunhong; Forchhammer, Søren; Rottwitt, Karsten; Oxenløwe, Leif Katsuo

    2016-01-01

    Quantum key distribution (QKD) and quantum communication enable the secure exchange of information between remote parties. Currently, the distributed-phase-reference (DPR) protocols, which are based on weak coherent pulses, are among the most practical solutions for long-range QKD. During the last 10 years, long-distance fiber-based DPR systems have been successfully demonstrated, although fundamental obstacles such as intrinsic channel losses limit their performance. Here, we introduce the first two-dimensional DPR-QKD protocol in which information is encoded in the time and phase of weak coherent pulses. The ability of extracting two bits of information per detection event, enables a higher secret key rate in specific realistic network scenarios. Moreover, despite the use of more dimensions, the proposed protocol remains simple, practical, and fully integrable. PMID:28004821

  2. An efficient and secure certificateless authentication protocol for healthcare system on wireless medical sensor networks.

    PubMed

    Guo, Rui; Wen, Qiaoyan; Jin, Zhengping; Zhang, Hua

    2013-01-01

    Sensor networks have opened up new opportunities in healthcare systems, which can transmit patient's condition to health professional's hand-held devices in time. The patient's physiological signals are very sensitive and the networks are extremely vulnerable to many attacks. It must be ensured that patient's privacy is not exposed to unauthorized entities. Therefore, the control of access to healthcare systems has become a crucial challenge. An efficient and secure authentication protocol will thus be needed in wireless medical sensor networks. In this paper, we propose a certificateless authentication scheme without bilinear pairing while providing patient anonymity. Compared with other related protocols, the proposed scheme needs less computation and communication cost and preserves stronger security. Our performance evaluations show that this protocol is more practical for healthcare system in wireless medical sensor networks.

  3. An Efficient and Secure Certificateless Authentication Protocol for Healthcare System on Wireless Medical Sensor Networks

    PubMed Central

    Guo, Rui; Wen, Qiaoyan; Jin, Zhengping; Zhang, Hua

    2013-01-01

    Sensor networks have opened up new opportunities in healthcare systems, which can transmit patient's condition to health professional's hand-held devices in time. The patient's physiological signals are very sensitive and the networks are extremely vulnerable to many attacks. It must be ensured that patient's privacy is not exposed to unauthorized entities. Therefore, the control of access to healthcare systems has become a crucial challenge. An efficient and secure authentication protocol will thus be needed in wireless medical sensor networks. In this paper, we propose a certificateless authentication scheme without bilinear pairing while providing patient anonymity. Compared with other related protocols, the proposed scheme needs less computation and communication cost and preserves stronger security. Our performance evaluations show that this protocol is more practical for healthcare system in wireless medical sensor networks. PMID:23710147

  4. The [Un]Spoken Challenges of Administrator Collaboration: An Exploration of One District Leadership Team's Use of Protocols to Promote Reflection and Shared Theories of Action

    ERIC Educational Resources Information Center

    Szczesiul, Stacy Agee

    2014-01-01

    This article explores the use of protocol-structured dialogue in promoting reflective practices and shared theories of action within a district leadership team. Protocols have been used to make individuals' theories of action visible and subject to evaluation. This is important for leaders trying to establish coherence across a system; in…

  5. Test Protocol for Room-to-Room Distribution of Outside Air by Residential Ventilation Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Barley, C. D.; Anderson, R.; Hendron, B.

    2007-12-01

    This test and analysis protocol has been developed as a practical approach for measuring outside air distribution in homes. It has been used successfully in field tests and has led to significant insights on ventilation design issues. Performance advantages of more sophisticated ventilation systems over simpler, less-costly designs have been verified, and specific problems, such as airflow short-circuiting, have been identified.

  6. Modelling the protocol stack in NCS with deterministic and stochastic petri net

    NASA Astrophysics Data System (ADS)

    Hui, Chen; Chunjie, Zhou; Weifeng, Zhu

    2011-06-01

    Protocol stack is the basis of the networked control systems (NCS). Full or partial reconfiguration of protocol stack offers both optimised communication service and system performance. Nowadays, field testing is unrealistic to determine the performance of reconfigurable protocol stack; and the Petri net formal description technique offers the best combination of intuitive representation, tool support and analytical capabilities. Traditionally, separation between the different layers of the OSI model has been a common practice. Nevertheless, such a layered modelling analysis framework of protocol stack leads to the lack of global optimisation for protocol reconfiguration. In this article, we proposed a general modelling analysis framework for NCS based on the cross-layer concept, which is to establish an efficiency system scheduling model through abstracting the time constraint, the task interrelation, the processor and the bus sub-models from upper and lower layers (application, data link and physical layer). Cross-layer design can help to overcome the inadequacy of global optimisation based on information sharing between protocol layers. To illustrate the framework, we take controller area network (CAN) as a case study. The simulation results of deterministic and stochastic Petri-net (DSPN) model can help us adjust the message scheduling scheme and obtain better system performance.

  7. TH-E-209-01: Fluoroscopic Dose Monitoring and Patient Follow-Up Program at Massachusetts General Hospital

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Liu, B.

    2016-06-15

    Radiation dose monitoring solutions have opened up new opportunities for medical physicists to be more involved in modern clinical radiology practices. In particular, with the help of comprehensive radiation dose data, data-driven protocol management and informed case follow up are now feasible. Significant challenges remain however and the problems faced by medical physicists are highly heterogeneous. Imaging systems from multiple vendors and a wide range of vintages co-exist in the same department and employ data communication protocols that are not fully standardized or implemented making harmonization complex. Many different solutions for radiation dose monitoring have been implemented by imaging facilitiesmore » over the past few years. Such systems are based on commercial software, home-grown IT solutions, manual PACS data dumping, etc., and diverse pathways can be used to bring the data to impact clinical practice. The speakers will share their experiences with creating or tailoring radiation dose monitoring/management systems and procedures over the past few years, which vary significantly in design and scope. Topics to cover: (1) fluoroscopic dose monitoring and high radiation event handling from a large academic hospital; (2) dose monitoring and protocol optimization in pediatric radiology; and (3) development of a home-grown IT solution and dose data analysis framework. Learning Objectives: Describe the scope and range of radiation dose monitoring and protocol management in a modern radiology practice Review examples of data available from a variety of systems and how it managed and conveyed. Reflect on the role of the physicist in radiation dose awareness.« less

  8. A practical method to standardise and optimise the Philips DoseRight 2.0 CT automatic exposure control system.

    PubMed

    Wood, T J; Moore, C S; Stephens, A; Saunderson, J R; Beavis, A W

    2015-09-01

    Given the increasing use of computed tomography (CT) in the UK over the last 30 years, it is essential to ensure that all imaging protocols are optimised to keep radiation doses as low as reasonably practicable, consistent with the intended clinical task. However, the complexity of modern CT equipment can make this task difficult to achieve in practice. Recent results of local patient dose audits have shown discrepancies between two Philips CT scanners that use the DoseRight 2.0 automatic exposure control (AEC) system in the 'automatic' mode of operation. The use of this system can result in drifting dose and image quality performance over time as it is designed to evolve based on operator technique. The purpose of this study was to develop a practical technique for configuring examination protocols on four CT scanners that use the DoseRight 2.0 AEC system in the 'manual' mode of operation. This method used a uniform phantom to generate reference images which form the basis for how the AEC system calculates exposure factors for any given patient. The results of this study have demonstrated excellent agreement in the configuration of the CT scanners in terms of average patient dose and image quality when using this technique. This work highlights the importance of CT protocol harmonisation in a modern Radiology department to ensure both consistent image quality and radiation dose. Following this study, the average radiation dose for a range of CT examinations has been reduced without any negative impact on clinical image quality.

  9. TH-E-209-03: Development of An In-House CT Dose Monitoring and Management System Based On Open-Source Software Resources -- Pearls and Pitfalls

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhang, D.

    Radiation dose monitoring solutions have opened up new opportunities for medical physicists to be more involved in modern clinical radiology practices. In particular, with the help of comprehensive radiation dose data, data-driven protocol management and informed case follow up are now feasible. Significant challenges remain however and the problems faced by medical physicists are highly heterogeneous. Imaging systems from multiple vendors and a wide range of vintages co-exist in the same department and employ data communication protocols that are not fully standardized or implemented making harmonization complex. Many different solutions for radiation dose monitoring have been implemented by imaging facilitiesmore » over the past few years. Such systems are based on commercial software, home-grown IT solutions, manual PACS data dumping, etc., and diverse pathways can be used to bring the data to impact clinical practice. The speakers will share their experiences with creating or tailoring radiation dose monitoring/management systems and procedures over the past few years, which vary significantly in design and scope. Topics to cover: (1) fluoroscopic dose monitoring and high radiation event handling from a large academic hospital; (2) dose monitoring and protocol optimization in pediatric radiology; and (3) development of a home-grown IT solution and dose data analysis framework. Learning Objectives: Describe the scope and range of radiation dose monitoring and protocol management in a modern radiology practice Review examples of data available from a variety of systems and how it managed and conveyed. Reflect on the role of the physicist in radiation dose awareness.« less

  10. 40 CFR 792.130 - Conduct of a study.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 32 2011-07-01 2011-07-01 false Conduct of a study. 792.130 Section... ACT (CONTINUED) GOOD LABORATORY PRACTICE STANDARDS Protocol for and Conduct of A Study § 792.130 Conduct of a study. (a) The study shall be conducted in accordance with the protocol. (b) The test systems...

  11. CT and MR Protocol Standardization Across a Large Health System: Providing a Consistent Radiologist, Patient, and Referring Provider Experience.

    PubMed

    Sachs, Peter B; Hunt, Kelly; Mansoubi, Fabien; Borgstede, James

    2017-02-01

    Building and maintaining a comprehensive yet simple set of standardized protocols for a cross-sectional image can be a daunting task. A single department may have difficulty preventing "protocol creep," which almost inevitably occurs when an organized "playbook" of protocols does not exist and individual radiologists and technologists alter protocols at will and on a case-by-case basis. When multiple departments or groups function in a large health system, the lack of uniformity of protocols can increase exponentially. In 2012, the University of Colorado Hospital formed a large health system (UCHealth) and became a 5-hospital provider network. CT and MR imaging studies are conducted at multiple locations by different radiology groups. To facilitate consistency in ordering, acquisition, and appearance of a given study, regardless of location, we minimized the number of protocols across all scanners and sites of practice with a clinical indication-driven protocol selection and standardization process. Here we review the steps utilized to perform this process improvement task and insure its stability over time. Actions included creation of a standardized protocol template, which allowed for changes in electronic storage and management of protocols, designing a change request form, and formation of a governance structure. We utilized rapid improvement events (1 day for CT, 2 days for MR) and reduced 248 CT protocols into 97 standardized protocols and 168 MR protocols to 66. Additional steps are underway to further standardize output and reporting of imaging interpretation. This will result in an improved, consistent radiologist, patient, and provider experience across the system.

  12. Simulation as a Tool to Facilitate Practice Changes in Teams Taking Care of Patients Under Investigation for Ebola Virus Disease in Spain.

    PubMed

    Rojo, Elena; Oruña, Clara; Sierra, Dolores; García, Gema; Del Moral, Ignacio; Maestre, Jose M

    2016-04-01

    We analyzed the impact of simulation-based training on clinical practice and work processes on teams caring for patients with possible Ebola virus disease (EVD) in Cantabria, Spain. The Government of Spain set up a special committee for the management of EVD, and the Spanish Ministry of Health and foreign health services created an action protocol. Each region is responsible for selecting a reference hospital and an in-house care team to care for patients under investigation. Laboratory-confirmed cases of EVD have to be transferred to the Carlos III Health Institute in Madrid. Predeployment training and follow-up support are required to help personnel work safely and effectively. Simulation-based scenarios were designed to give staff the opportunity to practice before encountering a real-life situation. Lessons learned by each team during debriefings were listed, and a survey administered 3 months later assessed the implementation of practice and system changes. Implemented changes were related to clinical practice (eg, teamwork principles application), protocol implementation (eg, addition of new processes and rewriting of confusing parts), and system and workflow (eg, change of shift schedule and rearrangement of room equipment). Simulation can be used to detect needed changes in protocol or guidelines or can be adapted to meet the needs of a specific team.

  13. Quality: performance improvement, teamwork, information technology and protocols.

    PubMed

    Coleman, Nana E; Pon, Steven

    2013-04-01

    Using the Institute of Medicine framework that outlines the domains of quality, this article considers four key aspects of health care delivery which have the potential to significantly affect the quality of health care within the pediatric intensive care unit. The discussion covers: performance improvement and how existing methods for reporting, review, and analysis of medical error relate to patient care; team composition and workflow; and the impact of information technologies on clinical practice. Also considered is how protocol-driven and standardized practice affects both patients and the fiscal interests of the health care system.

  14. Implementing an intravenous insulin protocol in your practice: practical advice to overcome clinical, administrative, and financial barriers.

    PubMed

    Kelly, Janet L; Hirsch, Irl B; Furnary, Anthony P

    2006-01-01

    Diabetes mellitus is the fourth most common comorbid condition among hospitalized patients, and 30% of patients undergoing open-heart surgery have diabetes. The link between hyperglycemia and poor outcome has been well described, and large clinical trials have shown that aggressive control of blood glucose with an insulin infusion can improve these outcomes. The barriers to implementing an insulin infusion protocol are numerous, despite the fact that doing so is paramount to clinical success. Barriers include safety concerns, such as fear of hypoglycemia, insufficient nursing staff to patient ratios, lack of administrative and physician support, various system and procedural issues, and resistance to change. Key steps to overcome the barriers include building support with multidisciplinary champions, involving key staff, educating staff, and administrators of the clinical and economic benefits of improving glycemic control, setting realistic goals, selecting a validated insulin infusion protocol, and internally marketing the success of the protocol.

  15. Biocoder: A programming language for standardizing and automating biology protocols

    PubMed Central

    2010-01-01

    Background Published descriptions of biology protocols are often ambiguous and incomplete, making them difficult to replicate in other laboratories. However, there is increasing benefit to formalizing the descriptions of protocols, as laboratory automation systems (such as microfluidic chips) are becoming increasingly capable of executing them. Our goal in this paper is to improve both the reproducibility and automation of biology experiments by using a programming language to express the precise series of steps taken. Results We have developed BioCoder, a C++ library that enables biologists to express the exact steps needed to execute a protocol. In addition to being suitable for automation, BioCoder converts the code into a readable, English-language description for use by biologists. We have implemented over 65 protocols in BioCoder; the most complex of these was successfully executed by a biologist in the laboratory using BioCoder as the only reference. We argue that BioCoder exposes and resolves ambiguities in existing protocols, and could provide the software foundations for future automation platforms. BioCoder is freely available for download at http://research.microsoft.com/en-us/um/india/projects/biocoder/. Conclusions BioCoder represents the first practical programming system for standardizing and automating biology protocols. Our vision is to change the way that experimental methods are communicated: rather than publishing a written account of the protocols used, researchers will simply publish the code. Our experience suggests that this practice is tractable and offers many benefits. We invite other researchers to leverage BioCoder to improve the precision and completeness of their protocols, and also to adapt and extend BioCoder to new domains. PMID:21059251

  16. Heterogeneous Gossip

    NASA Astrophysics Data System (ADS)

    Frey, Davide; Guerraoui, Rachid; Kermarrec, Anne-Marie; Koldehofe, Boris; Mogensen, Martin; Monod, Maxime; Quéma, Vivien

    Gossip-based information dissemination protocols are considered easy to deploy, scalable and resilient to network dynamics. Load-balancing is inherent in these protocols as the dissemination work is evenly spread among all nodes. Yet, large-scale distributed systems are usually heterogeneous with respect to network capabilities such as bandwidth. In practice, a blind load-balancing strategy might significantly hamper the performance of the gossip dissemination.

  17. 40 CFR 160.130 - Conduct of a study.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 24 2011-07-01 2011-07-01 false Conduct of a study. 160.130 Section... LABORATORY PRACTICE STANDARDS Protocol for and Conduct of a Study § 160.130 Conduct of a study. (a) The study... conformity with the protocol. (c) Specimens shall be identified by test system, study, nature, and date of...

  18. 40 CFR 160.130 - Conduct of a study.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Conduct of a study. 160.130 Section... LABORATORY PRACTICE STANDARDS Protocol for and Conduct of a Study § 160.130 Conduct of a study. (a) The study... conformity with the protocol. (c) Specimens shall be identified by test system, study, nature, and date of...

  19. 40 CFR 792.130 - Conduct of a study.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 31 2010-07-01 2010-07-01 true Conduct of a study. 792.130 Section 792... (CONTINUED) GOOD LABORATORY PRACTICE STANDARDS Protocol for and Conduct of A Study § 792.130 Conduct of a study. (a) The study shall be conducted in accordance with the protocol. (b) The test systems shall be...

  20. Substance Abuse Treatment For Adults in the Criminal Justice System. Treatment Improvement Protocol (TIP) Series 44

    ERIC Educational Resources Information Center

    Bartlett, Catalina; Dinsmore, Janet; Gilbert, J. Max; Kornblum, Annette; Latham, Joyce; Oliff, Helen; Paisner, Susan; Sutton, David

    2005-01-01

    This Treatment Improvement Protocol (TIP) provides guidelines for counselors and criminal justice personnel who treat offenders with substance use disorders. TIPs are best-practice guidelines that make the latest research in substance abuse treatment available to counselors and educators. The content was generated by a panel of experts in the…

  1. Exploring Multi-Level System Factors Facilitating Educator Training and Implementation of Evidence-Based Practices (EBP): A Study Protocol

    ERIC Educational Resources Information Center

    Stahmer, Aubyn C.; Suhrheinrich, Jessica; Schetter, Patricia L.; Hassrick, Elizabeth McGee

    2018-01-01

    This study examines how system-wide (i.e., region, district, and school) mechanisms such as leadership support, training requirements, structure, collaboration, and education affect the use of evidence-based practices (EBPs) in schools and how this affects the outcomes for students with autism spectrum disorder (ASD). Despite growing evidence for…

  2. Developing an evidence-based practice protocol: implications for midwifery practice.

    PubMed

    Carr, K C

    2000-01-01

    Evidence-based practice is defined and its importance to midwifery practice is presented. Guidelines are provided for the development of an evidence-based practice protocol. These include: identifying the clinical question, obtaining the evidence, evaluating the validity and importance of the evidence, synthesizing the evidence and applying it to the development of a protocol or clinical algorithm, and, finally, developing an evaluation plan or measurement strategy to see if the new protocol is effective.

  3. Research in DRM architecture based on watermarking and PKI

    NASA Astrophysics Data System (ADS)

    Liu, Ligang; Chen, Xiaosu; Xiao, Dao-ju; Yi, Miao

    2005-02-01

    Analyze the virtue and disadvantage of the present digital copyright protecting system, design a kind of security protocol model of digital copyright protection, which equilibrium consider the digital media"s use validity, integrality, security of transmission, and trade equity, make a detailed formalize description to the protocol model, analyze the relationship of the entities involved in the digital work copyright protection. The analysis of the security and capability of the protocol model shows that the model is good at security and practicability.

  4. Impersonation attack on a quantum secure direct communication and authentication protocol with improvement

    NASA Astrophysics Data System (ADS)

    Amerimehr, Ali; Hadain Dehkordi, Massoud

    2018-03-01

    We analyze the security of a quantum secure direct communication and authentication protocol based on single photons. We first give an impersonation attack on the protocol. The cryptanalysis shows that there is a gap in the authentication procedure of the protocol so that an opponent can reveal the secret information by an undetectable attempt. We then propose an improvement for the protocol and show it closes the gap by applying a mutual authentication procedure. In the improved protocol single photons are transmitted once in a session, so it is easy to implement as the primary protocol. Furthermore, we use a novel technique for secret order rearrangement of photons by which not only quantum storage is eliminated also a secret key can be reused securely. So the new protocol is applicable in practical approaches like embedded system devices.

  5. Experimental investigation of practical unforgeable quantum money

    NASA Astrophysics Data System (ADS)

    Bozzio, Mathieu; Orieux, Adeline; Trigo Vidarte, Luis; Zaquine, Isabelle; Kerenidis, Iordanis; Diamanti, Eleni

    2018-01-01

    Wiesner's unforgeable quantum money scheme is widely celebrated as the first quantum information application. Based on the no-cloning property of quantum mechanics, this scheme allows for the creation of credit cards used in authenticated transactions offering security guarantees impossible to achieve by classical means. However, despite its central role in quantum cryptography, its experimental implementation has remained elusive because of the lack of quantum memories and of practical verification techniques. Here, we experimentally implement a quantum money protocol relying on classical verification that rigorously satisfies the security condition for unforgeability. Our system exploits polarization encoding of weak coherent states of light and operates under conditions that ensure compatibility with state-of-the-art quantum memories. We derive working regimes for our system using a security analysis taking into account all practical imperfections. Our results constitute a major step towards a real-world realization of this milestone protocol.

  6. Eavesdropping on counterfactual quantum key distribution with finite resources

    NASA Astrophysics Data System (ADS)

    Liu, Xingtong; Zhang, Bo; Wang, Jian; Tang, Chaojing; Zhao, Jingjing; Zhang, Sheng

    2014-08-01

    A striking scheme called "counterfactual quantum cryptography" gives a conceptually new approach to accomplish the task of key distribution. It allows two legitimate parties to share a secret even though a particle carrying secret information is not, in fact, transmitted through the quantum channel. Since an eavesdropper cannot directly access the entire quantum system of each signal particle, the protocol seems to provide practical security advantages. However, here we propose an eavesdropping method which works on the scheme in a finite key scenario. We show that, for practical systems only generating a finite number of keys, the eavesdropping can obtain all of the secret information without being detected. We also present a improved protocol as a countermeasure against this attack.

  7. A Fresh Look at Internet Protocol Version 6 (IPv6) for Department of Defense (DoD) Networks

    DTIC Science & Technology

    2010-08-01

    since system administration practices (such as the use of security appliances) depend heavily on tools for network management, diagnosis and protection...are mobile ad hoc networks (MANETs) and yet there is limited practical experience with MANETs and their performance. Further, the interaction between...Systems FCS Future Combat System IETF Internet Engineering Task Force ISAT Information Science and Technology BAST Board on Army Science and

  8. Detector-device-independent quantum secret sharing with source flaws.

    PubMed

    Yang, Xiuqing; Wei, Kejin; Ma, Haiqiang; Liu, Hongwei; Yin, Zhenqiang; Cao, Zhu; Wu, Lingan

    2018-04-10

    Measurement-device-independent entanglement witness (MDI-EW) plays an important role for detecting entanglement with untrusted measurement device. We present a double blinding-attack on a quantum secret sharing (QSS) protocol based on GHZ state. Using the MDI-EW method, we propose a QSS protocol against all detector side-channels. We allow source flaws in practical QSS system, so that Charlie can securely distribute a key between the two agents Alice and Bob over long distances. Our protocol provides condition on the extracted key rate for the secret against both external eavesdropper and arbitrary dishonest participants. A tight bound for collective attacks can provide good bounds on the practical QSS with source flaws. Then we show through numerical simulations that using single-photon source a secure QSS over 136 km can be achieved.

  9. Uptake of a web-based oncology protocol system: how do cancer clinicians use eviQ cancer treatments online?

    PubMed Central

    2013-01-01

    Background The use of computerized systems to support evidence-based practice is commonplace in contemporary medicine. Despite the prolific use of electronic support systems there has been relatively little research on the uptake of web-based systems in the oncology setting. Our objective was to examine the uptake of a web-based oncology protocol system (http://www.eviq.org.au) by Australian cancer clinicians. Methods We used web-logfiles and Google Analytics to examine the characteristics of eviQ registrants from October 2009-December 2011 and patterns of use by cancer clinicians during a typical month. Results As of December 2011, there were 16,037 registrants; 85% of whom were Australian health care professionals. During a typical month 87% of webhits occurred in standard clinical hours (08:00 to 18:00 weekdays). Raw webhits were proportional to the size of clinician groups: nurses (47% of Australian registrants), followed by doctors (20%), and pharmacists (14%). However, pharmacists had up to three times the webhit rate of other clinical groups. Clinicians spent five times longer viewing chemotherapy protocol pages than other content and the protocols viewed reflect the most common cancers: lung, breast and colorectal. Conclusions Our results demonstrate eviQ is used by a range of health professionals involved in cancer treatment at the point-of-care. Continued monitoring of electronic decision support systems is vital to understanding how they are used in clinical practice and their impact on processes of care and patient outcomes. PMID:23497080

  10. Developing Best Practices: System-wide Actions for Coastal Resilience

    DTIC Science & Technology

    2015-10-09

    solutions for a safer, better world flooding and major storms in low-lying areas 6 10/9/2015 3 Bayville and Breezy Point, NY - Protocol to move emergency...vehicles and debris removal equipment to high ground before flooding . Best Practices: Examples BUILDING STRONG® Innovative solutions for a safer

  11. Preparing Your Staff for Emergencies.

    ERIC Educational Resources Information Center

    Maurer-Starks, Suanne

    2003-01-01

    Camps should have emergency protocols in place and involve appropriate personnel in their development. Staff should be certified in first aid and CPR, a recordkeeping system should be established, and mock emergencies should be practiced during staff orientation. It may also be advisable to involve campers in practice situations. First aid/CPR…

  12. Compliance with the national palestinian infection prevention and control protocol at governmental paediatric hospitals in gaza governorates.

    PubMed

    Eljedi, Ashraf; Dalo, Shareef

    2014-08-01

    Nosocomial infections are a significant burden for both patients and the healthcare system. For this reason, infection prevention and control (IPC) practices are extremely important. The Palestinian Ministry of Health adopted the national IPC Protocol in 2004. This study aimed to assess the compliance of healthcare providers (HCPs) with the Protocol in three governmental paediatric hospitals in Gaza governorates. This descriptive cross-sectional study was conducted from February to November 2010. Data were collected from a sample of doctors, nurses and physiotherapists (N = 334) using a self-administered questionnaire and observation checklists to record HCP practices and assess the hospital environment. The response rate was 92%. The most important reasons for non-compliance with the IPC Protocol were the absence of an education programme (61.5%), lack of knowledge (52.4%) and the scarcity of required supplies (46.9%). Only 2.3% of respondents had a copy of the IPC Protocol, while 65.8% did not know of its existence. Only 16.9% had participated in training sessions regarding general IPC practices. The observation checklist regarding HCP practices revealed low levels of compliance in hand washing (45.9%), wearing gloves (40.7%) and using antiseptics/disinfectants (49.16%). The health facilities checklist indicated that there was a lack of certain essential equipment and materials, such as covered waste containers and heavy-duty gloves. Due to the lack of HPC knowledge, the authors recommend that the IPC Protocol be made available in all hospitals. In addition, a qualified team should implement intensive IPC education and training programmes and facilities should provide the required equipment and materials.

  13. How system designers think: a study of design thinking in human factors engineering.

    PubMed

    Papantonopoulos, Sotiris

    2004-11-01

    The paper presents a descriptive study of design thinking in human factors engineering. The objective of the study is to analyse the role of interpretation in design thinking and the role of design practice in guiding interpretation. The study involved 10 system designers undertaking the allocation of cognitive functions in three production planning and control task scenarios. Allocation decisions were recorded and verbal protocols of the design process were collected to elicit the subjects' thought processes. Verbal protocol analysis showed that subjects carried out the design of cognitive task allocation as a problem of applying a selected automation technology from their initial design deliberations. This design strategy stands in contrast to the predominant view of system design that stipulates that user requirements should be thoroughly analysed prior to making any decisions about technology. Theoretical frameworks from design research and ontological design showed that the system design process may be better understood by recognizing the role of design hypotheses in system design, as well as the diverse interactions between interpretation and practice, means and ends, and design practice and the designer's pre-understanding which shape the design process. Ways to balance the bias exerted on the design process were discussed.

  14. Colon cleansing protocol in children: research conditions vs. clinical practice.

    PubMed

    Elitsur, Yoram; Balfaqih, Yaslam; Preston, Deborah

    2018-04-01

     Colon preparation rates are the limiting factor for a successful diagnostic colonoscopy in children. Different colon cleansing protocols have been published for use in children. Unfortunately, the applicability of those published research protocols has not been formally evaluated in routine clinical practice. We investigated the success rate of our previously published colon cleansing protocol as utilized in our clinical practice.  This was a retrospective study. In the clinical practice, the colon cleansing protocol included PEG-3350 at a dose of 2 g/kg/day plus Dulcolax (Bisacodyl, Boehringer Ingelheim, TX USA) 5 mg/day for 2 days. Adequate colon preparation was graded between 1 - 5, as previously described, and grade ≥ 4.0 was considered an adequate preparation. Patients were instructed to complete a questionnaire that included PEG-3350 dose, number of stools per day, consistency of each stool, and side effects (vomiting, abdominal pain). Clinical and endoscopic results were compared between the protocol under research conditions and routine practice.  The success rate of the colon preparation in our clinical practice was similar to the results observed under our research protocol (75 % vs. 73.6 %). Moreover, the total number of stools, stool consistency, and the intubation rate of the terminal ileum were also similar. We concluded, that in our experience, the colon cleansing protocol used under research conditions was effective and appropriate for use in routine clinical practice.  We recommend testing each new protocol under the routine conditions of clinical practice to confirm its applicability for general practitioners.

  15. Rationale for the Diabetic Retinopathy Clinical Research Network Treatment Protocol for Center-involved Diabetic Macular Edema

    PubMed Central

    Aiello, Lloyd Paul; Beck, Roy W; Bressler, Neil M.; Browning, David J.; Chalam, KV; Davis, Matthew; Ferris, Frederick L; Glassman, Adam; Maturi, Raj; Stockdale, Cynthia R.; Topping, Trexler

    2011-01-01

    Objective Describe the underlying principles used to develop a web-based algorithm that incorporated intravitreal anti-vascular endothelial growth factor (anti-VEGF) treatment for diabetic macular edema (DME) in a Diabetic Retinopathy Clinical Research Network (DRCR.net) randomized clinical trial. Design Discussion of treatment protocol for DME. Participants Subjects with vision loss from DME involving the center of the macula. Methods The DRCR.net created an algorithm incorporating anti-VEGF injections in a comparative effectiveness randomized clinical trial evaluating intravitreal ranibizumab with prompt or deferred (≥24 weeks) focal/grid laser in eyes with vision loss from center-involved DME. Results confirmed that intravitreal ranibizumab with prompt or deferred laser provides superior visual acuity outcomes, compared with prompt laser alone through at least 2 years. Duplication of this algorithm may not be practical for clinical practice. In order to share their opinion on how ophthalmologists might emulate the study protocol, participating DRCR.net investigators developed guidelines based on the algorithm's underlying rationale. Main Outcome Measures Clinical guidelines based on a DRCR.net protocol. Results The treatment protocol required real time feedback from a web-based data entry system for intravitreal injections, focal/grid laser, and follow-up intervals. Guidance from this system indicated whether treatment was required or given at investigator discretion and when follow-up should be scheduled. Clinical treatment guidelines, based on the underlying clinical rationale of the DRCR.net protocol, include repeating treatment monthly as long as there is improvement in edema compared with the previous month, or until the retina is no longer thickened. If thickening recurs or worsens after discontinuing treatment, treatment is resumed. Conclusions Duplication of the approach used in the DRCR.net randomized clinical trial to treat DME involving the center of the macula with intravitreal ranibizumab may not be practical in clinical practice, but likely can be emulated based on an understanding of the underlying rationale for the study protocol. Inherent differences between a web-based treatment algorithm and a clinical approach may lead to differences in outcomes that are impossible to predict. The closer the clinical approach is to the algorithm used in the study, the more likely the outcomes will be similar to those published. PMID:22136692

  16. Rationale for the diabetic retinopathy clinical research network treatment protocol for center-involved diabetic macular edema.

    PubMed

    Aiello, Lloyd Paul; Beck, Roy W; Bressler, Neil M; Browning, David J; Chalam, K V; Davis, Matthew; Ferris, Frederick L; Glassman, Adam R; Maturi, Raj K; Stockdale, Cynthia R; Topping, Trexler M

    2011-12-01

    To describe the underlying principles used to develop a web-based algorithm that incorporated intravitreal anti-vascular endothelial growth factor (anti-VEGF) treatment for diabetic macular edema (DME) in a Diabetic Retinopathy Clinical Research Network (DRCR.net) randomized clinical trial. Discussion of treatment protocol for DME. Subjects with vision loss resulting from DME involving the center of the macula. The DRCR.net created an algorithm incorporating anti-VEGF injections in a comparative effectiveness randomized clinical trial evaluating intravitreal ranibizumab with prompt or deferred (≥24 weeks) focal/grid laser treatment in eyes with vision loss resulting from center-involved DME. Results confirmed that intravitreal ranibizumab with prompt or deferred laser provides superior visual acuity outcomes compared with prompt laser alone through at least 2 years. Duplication of this algorithm may not be practical for clinical practice. To share their opinion on how ophthalmologists might emulate the study protocol, participating DRCR.net investigators developed guidelines based on the algorithm's underlying rationale. Clinical guidelines based on a DRCR.net protocol. The treatment protocol required real-time feedback from a web-based data entry system for intravitreal injections, focal/grid laser treatment, and follow-up intervals. Guidance from this system indicated whether treatment was required or given at investigator discretion and when follow-up should be scheduled. Clinical treatment guidelines, based on the underlying clinical rationale of the DRCR.net protocol, include repeating treatment monthly as long as there is improvement in edema compared with the previous month or until the retina is no longer thickened. If thickening recurs or worsens after discontinuing treatment, treatment is resumed. Duplication of the approach used in the DRCR.net randomized clinical trial to treat DME involving the center of the macula with intravitreal ranibizumab may not be practical in clinical practice, but likely can be emulated based on an understanding of the underlying rationale for the study protocol. Inherent differences between a web-based treatment algorithm and a clinical approach may lead to differences in outcomes that are impossible to predict. The closer the clinical approach is to the algorithm used in the study, the more likely the outcomes will be similar to those published. Proprietary or commercial disclosure may be found after the references. Copyright © 2011 American Academy of Ophthalmology. Published by Elsevier Inc. All rights reserved.

  17. Development of wide area environment accelerator operation and diagnostics method

    NASA Astrophysics Data System (ADS)

    Uchiyama, Akito; Furukawa, Kazuro

    2015-08-01

    Remote operation and diagnostic systems for particle accelerators have been developed for beam operation and maintenance in various situations. Even though fully remote experiments are not necessary, the remote diagnosis and maintenance of the accelerator is required. Considering remote-operation operator interfaces (OPIs), the use of standard protocols such as the hypertext transfer protocol (HTTP) is advantageous, because system-dependent protocols are unnecessary between the remote client and the on-site server. Here, we have developed a client system based on WebSocket, which is a new protocol provided by the Internet Engineering Task Force for Web-based systems, as a next-generation Web-based OPI using the Experimental Physics and Industrial Control System Channel Access protocol. As a result of this implementation, WebSocket-based client systems have become available for remote operation. Also, as regards practical application, the remote operation of an accelerator via a wide area network (WAN) faces a number of challenges, e.g., the accelerator has both experimental device and radiation generator characteristics. Any error in remote control system operation could result in an immediate breakdown. Therefore, we propose the implementation of an operator intervention system for remote accelerator diagnostics and support that can obviate any differences between the local control room and remote locations. Here, remote-operation Web-based OPIs, which resolve security issues, are developed.

  18. The Hawaii Protocol for Scientific Monitoring of Coffee Berry Borer: a Model for Coffee Agroecosystems Worldwide

    PubMed Central

    Johnson, Melissa Anne; Hollingsworth, Robert; Fortna, Samuel; Aristizábal, Luis F.; Manoukis, Nicholas C.

    2018-01-01

    Coffee berry borer (CBB) is the most devastating insect pest for coffee crops worldwide. We developed a scientific monitoring protocol that is aimed at capturing and quantifying the dynamics and impact of this invasive insect pest as well as the development of its host plant across a heterogeneous landscape. The cornerstone of this comprehensive monitoring system is timely georeferenced data collection on CBB movement, coffee berry infestation, mortality by the fungus Beauveria bassiana, and coffee plant phenology via a mobile electronic data recording application. This electronic data collection system allows field records to be georeferenced through built-in global positioning systems, and is backed by a network of weather stations and records of farm management practices. Comprehensive monitoring of CBB and host plant dynamics is an essential part of an area-wide project in Hawaii to aggregate landscape-level data for research to improve management practices. Coffee agroecosystems in other parts of the world that experience highly variable environmental and socioeconomic factors will also benefit from implementing this protocol, in that it will drive the development of customized integrated pest management (IPM) to manage CBB populations. PMID:29608152

  19. The Hawaii Protocol for Scientific Monitoring of Coffee Berry Borer: a Model for Coffee Agroecosystems Worldwide.

    PubMed

    Johnson, Melissa Anne; Hollingsworth, Robert; Fortna, Samuel; Aristizábal, Luis F; Manoukis, Nicholas C

    2018-03-19

    Coffee berry borer (CBB) is the most devastating insect pest for coffee crops worldwide. We developed a scientific monitoring protocol that is aimed at capturing and quantifying the dynamics and impact of this invasive insect pest as well as the development of its host plant across a heterogeneous landscape. The cornerstone of this comprehensive monitoring system is timely georeferenced data collection on CBB movement, coffee berry infestation, mortality by the fungus Beauveria bassiana, and coffee plant phenology via a mobile electronic data recording application. This electronic data collection system allows field records to be georeferenced through built-in global positioning systems, and is backed by a network of weather stations and records of farm management practices. Comprehensive monitoring of CBB and host plant dynamics is an essential part of an area-wide project in Hawaii to aggregate landscape-level data for research to improve management practices. Coffee agroecosystems in other parts of the world that experience highly variable environmental and socioeconomic factors will also benefit from implementing this protocol, in that it will drive the development of customized integrated pest management (IPM) to manage CBB populations.

  20. Post-task Effects on EEG Brain Activity Differ for Various Differential Learning and Contextual Interference Protocols

    PubMed Central

    Henz, Diana; John, Alexander; Merz, Christian; Schöllhorn, Wolfgang I.

    2018-01-01

    A large body of research has shown superior learning rates in variable practice compared to repetitive practice. More specifically, this has been demonstrated in the contextual interference (CI) and in the differential learning (DL) approach that are both representatives of variable practice. Behavioral studies have indicate different learning processes in CI and DL. Aim of the present study was to examine immediate post-task effects on electroencephalographic (EEG) brain activation patterns after CI and DL protocols that reveal underlying neural processes at the early stage of motor consolidation. Additionally, we tested two DL protocols (gradual DL, chaotic DL) to examine the effect of different degrees of stochastic fluctuations within the DL approach with a low degree of fluctuations in gradual DL and a high degree of fluctuations in chaotic DL. Twenty-two subjects performed badminton serves according to three variable practice protocols (CI, gradual DL, chaotic DL), and a repetitive learning protocol in a within-subjects design. Spontaneous EEG activity was measured before, and immediately after each 20-min practice session from 19 electrodes. Results showed distinguishable neural processes after CI, DL, and repetitive learning. Increases in EEG theta and alpha power were obtained in somatosensory regions (electrodes P3, P7, Pz, P4, P8) in both DL conditions compared to CI, and repetitive learning. Increases in theta and alpha activity in motor areas (electrodes C3, Cz, C4) were found after chaotic DL compared to gradual DL, and CI. Anterior areas (electrodes F3, F7, Fz, F4, F8) showed increased activity in the beta and gamma bands after CI. Alpha activity was increased in occipital areas (electrodes O1, O2) after repetitive learning. Post-task EEG brain activation patterns suggest that DL stimulates the somatosensory and motor system, and engages more regions of the cortex than repetitive learning due to a tighter stimulation of the motor and somatosensory system during DL practice. CI seems to activate specifically executively controlled processing in anterior brain areas. We discuss the obtained patterns of post-training EEG traces as evidence for different underlying neural processes in CI, DL, and repetitive learning at the early stage of motor learning. PMID:29445334

  1. Practical secure quantum communications

    NASA Astrophysics Data System (ADS)

    Diamanti, Eleni

    2015-05-01

    We review recent advances in the field of quantum cryptography, focusing in particular on practical implementations of two central protocols for quantum network applications, namely key distribution and coin flipping. The former allows two parties to share secret messages with information-theoretic security, even in the presence of a malicious eavesdropper in the communication channel, which is impossible with classical resources alone. The latter enables two distrustful parties to agree on a random bit, again with information-theoretic security, and with a cheating probability lower than the one that can be reached in a classical scenario. Our implementations rely on continuous-variable technology for quantum key distribution and on a plug and play discrete-variable system for coin flipping, and necessitate a rigorous security analysis adapted to the experimental schemes and their imperfections. In both cases, we demonstrate the protocols with provable security over record long distances in optical fibers and assess the performance of our systems as well as their limitations. The reported advances offer a powerful toolbox for practical applications of secure communications within future quantum networks.

  2. Best Practices and Testing Protocols for Benchmarking ORR Activities of Fuel Cell Electrocatalysts Using Rotating Disk Electrode

    DOE PAGES

    Kocha, Shyam S.; Shinozaki, Kazuma; Zack, Jason W.; ...

    2017-05-02

    Thin-film-rotating disk electrodes (TF-RDEs) are the half-cell electrochemical system of choice for rapid screening of oxygen reduction reaction (ORR) activity of novel Pt supported on carbon black supports (Pt/C) electrocatalysts. It has been shown that the magnitude of the measured ORR activity and reproducibility are highly dependent on the system cleanliness, evaluation protocols, and operating conditions as well as ink formulation, composition, film drying, and the resultant film thickness and uniformity. Accurate benchmarks of baseline Pt/C catalysts evaluated using standardized protocols and best practices are necessary to expedite ultra-low-platinum group metal (PGM) catalyst development that is crucial for the imminentmore » commercialization of fuel cell vehicles. We report results of evaluation in three independent laboratories of Pt/C electrocatalysts provided by commercial fuel cell catalyst manufacturers (Johnson Matthey, Umicore, Tanaka Kikinzoku Kogyo - TKK). The studies were conducted using identical evaluation protocols/ink formulation/film fabrication albeit employing unique electrochemical cell designs specific to each laboratory. Furthermore, the ORR activities reported in this work provide a baseline and criteria for selection and scale-up of novel high activity ORR electrocatalysts for implementation in proton exchange membrane fuel cells (PEMFCs).« less

  3. Best Practices and Testing Protocols for Benchmarking ORR Activities of Fuel Cell Electrocatalysts Using Rotating Disk Electrode

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kocha, Shyam S.; Shinozaki, Kazuma; Zack, Jason W.

    Abstract Thin-film-rotating disk electrodes (TF-RDEs) are the half-cell electrochemical system of choice for rapid screening of oxygen reduction reaction (ORR) activity of novel Pt supported on carbon black supports (Pt/C) electrocatalysts. It has been shown that the magnitude of the measured ORR activity and reproducibility are highly dependent on the system cleanliness, evaluation protocols, and operating conditions as well as ink formulation, composition, film drying, and the resultant film thickness and uniformity. Accurate benchmarks of baseline Pt/C catalysts evaluated using standardized protocols and best practices are necessary to expedite ultra-low-platinum group metal (PGM) catalyst development that is crucial for themore » imminent commercialization of fuel cell vehicles. We report results of evaluation in three independent laboratories of Pt/C electrocatalysts provided by commercial fuel cell catalyst manufacturers (Johnson Matthey, Umicore, Tanaka Kikinzoku Kogyo—TKK). The studies were conducted using identical evaluation protocols/ink formulation/film fabrication albeit employing unique electrochemical cell designs specific to each laboratory. The ORR activities reported in this work provide a baseline and criteria for selection and scale-up of novel high activity ORR electrocatalysts for implementation in proton exchange membrane fuel cells (PEMFCs).« less

  4. Best Practices and Testing Protocols for Benchmarking ORR Activities of Fuel Cell Electrocatalysts Using Rotating Disk Electrode

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kocha, Shyam S.; Shinozaki, Kazuma; Zack, Jason W.

    Thin-film-rotating disk electrodes (TF-RDEs) are the half-cell electrochemical system of choice for rapid screening of oxygen reduction reaction (ORR) activity of novel Pt supported on carbon black supports (Pt/C) electrocatalysts. It has been shown that the magnitude of the measured ORR activity and reproducibility are highly dependent on the system cleanliness, evaluation protocols, and operating conditions as well as ink formulation, composition, film drying, and the resultant film thickness and uniformity. Accurate benchmarks of baseline Pt/C catalysts evaluated using standardized protocols and best practices are necessary to expedite ultra-low-platinum group metal (PGM) catalyst development that is crucial for the imminentmore » commercialization of fuel cell vehicles. We report results of evaluation in three independent laboratories of Pt/C electrocatalysts provided by commercial fuel cell catalyst manufacturers (Johnson Matthey, Umicore, Tanaka Kikinzoku Kogyo - TKK). The studies were conducted using identical evaluation protocols/ink formulation/film fabrication albeit employing unique electrochemical cell designs specific to each laboratory. Furthermore, the ORR activities reported in this work provide a baseline and criteria for selection and scale-up of novel high activity ORR electrocatalysts for implementation in proton exchange membrane fuel cells (PEMFCs).« less

  5. Formal Logic and Flowchart for Diagnosis Validity Verification and Inclusion in Clinical Decision Support Systems

    NASA Astrophysics Data System (ADS)

    Sosa, M.; Grundel, L.; Simini, F.

    2016-04-01

    Logical reasoning is part of medical practice since its origins. Modern Medicine has included information-intensive tools to refine diagnostics and treatment protocols. We are introducing formal logic teaching in Medical School prior to Clinical Internship, to foster medical practice. Two simple examples (Acute Myocardial Infarction and Diabetes Mellitus) are given in terms of formal logic expression and truth tables. Flowcharts of both diagnostic processes help understand the procedures and to validate them logically. The particularity of medical information is that it is often accompanied by “missing data” which suggests to adapt formal logic to a “three state” logic in the future. Medical Education must include formal logic to understand complex protocols and best practices, prone to mutual interactions.

  6. Bacterial and fungal DNA extraction from blood samples: automated protocols.

    PubMed

    Lorenz, Michael G; Disqué, Claudia; Mühl, Helge

    2015-01-01

    Automation in DNA isolation is a necessity for routine practice employing molecular diagnosis of infectious agents. To this end, the development of automated systems for the molecular diagnosis of microorganisms directly in blood samples is at its beginning. Important characteristics of systems demanded for routine use include high recovery of microbial DNA, DNA-free containment for the reduction of DNA contamination from exogenous sources, DNA-free reagents and consumables, ideally a walkaway system, and economical pricing of the equipment and consumables. Such full automation of DNA extraction evaluated and in use for sepsis diagnostics is yet not available. Here, we present protocols for the semiautomated isolation of microbial DNA from blood culture and low- and high-volume blood samples. The protocols include a manual pretreatment step followed by automated extraction and purification of microbial DNA.

  7. Exploring risk in professional nursing practice: an analysis of work refusal and professional risk.

    PubMed

    Beardwood, Barbara A; Kainer, Jan M

    2015-03-01

    This article explores risk in professional nursing practice. Professional risk refers to the threat of professional discipline if it is found that a registered nurse has violated professional nursing practice standards. We argue professional risk is socially constructed and understood differently by nurse regulatory bodies, unions, professional associations and frontline nurses. Regulatory bodies emphasize professional accountability of nurses; professional associations focus on system problems in health-care; unions undertake protecting nurses' right to health and safety; and frontline nurses experience fear and uncertainty in their attempt to interpret practice standards to avoid professional discipline. Perspectives of professional risk are investigated by analyzing three professional nursing bodies' views of professional codes governing the right of nurses to refuse unsafe work assignments. The workplace dynamics surrounding work refusal experienced by frontline nurses are illustrated primarily through the lens of the 2003 SARS influenza outbreak in Ontario, Canada. We conclude that frontline nurses in Ontario are required to manage risk by following professional protocols prioritizing patient care and professional accountability which disregard the systemic, unpredictable and hazardous circumstances in their everyday practice. Moreover, we argue professional protocols cannot anticipate every eventuality in clinical practice creating the fear of professional discipline for nurses. © 2013 John Wiley & Sons Ltd.

  8. Validation of a real-time wireless telemedicine system, using bluetooth protocol and a mobile phone, for remote monitoring patient in medical practice.

    PubMed

    Yousef, Jasemian; Lars, A N

    2005-06-22

    This paper validates the integration of a generic real-time wireless telemedicine system utilising Global System for Mobile Communications (GSM), BLUETOOTH protocol and General Packet Radio Service (GPRS) for cellular network in clinical practice. In the first experiment, the system was tested on 24 pacemaker patients at Aalborg Hospital (Denmark), in order to see if the pacemaker implant would be affected by the system. I the second experiment, the system was tested on 15 non risky arrhythmia heart patients, in order to evaluate and validate the system application in clinical practice, for patient monitoring. Electrocardiograms were selected as the continuously monitored parameter in the present study. The results showed that the system had no negative effects on the pacemaker implants. The experiment results showed, that in a realistic environment for the patients, the system had 96.1 % up-time, 3.2 (kbps) throughput, 10(-3) (packet/s) Packet Error Rate and 10(-3) (packet/s) Packet Lost Rate. During 24 hours test the network did not respond for 57 minutes, from which 83.1 % was in the range of 0-3 minutes, 15.4 % was in the range of 3-5 minutes, and only 0.7 % of the down-time was > or = 5 and < or = 6 minutes. By a subjective evaluation, it was demonstrated that the system is applicable and the patients as well as the healthcare personals were highly confident with the system. Moreover, the patients had high degree of mobility and freedom, employing the system. In conclusion, this generic telemedicine system showed a high reliability, quality and performance, and the design can provide a basic principle for real-time wireless remote monitoring systems used in clinical practice.

  9. A secure protocol for protecting the identity of providers when disclosing data for disease surveillance

    PubMed Central

    Hu, Jun; Mercer, Jay; Peyton, Liam; Kantarcioglu, Murat; Malin, Bradley; Buckeridge, David; Samet, Saeed; Earle, Craig

    2011-01-01

    Background Providers have been reluctant to disclose patient data for public-health purposes. Even if patient privacy is ensured, the desire to protect provider confidentiality has been an important driver of this reluctance. Methods Six requirements for a surveillance protocol were defined that satisfy the confidentiality needs of providers and ensure utility to public health. The authors developed a secure multi-party computation protocol using the Paillier cryptosystem to allow the disclosure of stratified case counts and denominators to meet these requirements. The authors evaluated the protocol in a simulated environment on its computation performance and ability to detect disease outbreak clusters. Results Theoretical and empirical assessments demonstrate that all requirements are met by the protocol. A system implementing the protocol scales linearly in terms of computation time as the number of providers is increased. The absolute time to perform the computations was 12.5 s for data from 3000 practices. This is acceptable performance, given that the reporting would normally be done at 24 h intervals. The accuracy of detection disease outbreak cluster was unchanged compared with a non-secure distributed surveillance protocol, with an F-score higher than 0.92 for outbreaks involving 500 or more cases. Conclusion The protocol and associated software provide a practical method for providers to disclose patient data for sentinel, syndromic or other indicator-based surveillance while protecting patient privacy and the identity of individual providers. PMID:21486880

  10. Distributed Wireless Power Transfer With Energy Feedback

    NASA Astrophysics Data System (ADS)

    Lee, Seunghyun; Zhang, Rui

    2017-04-01

    Energy beamforming (EB) is a key technique for achieving efficient radio-frequency (RF) transmission enabled wireless energy transfer (WET). By optimally designing the waveforms from multiple energy transmitters (ETs) over the wireless channels, they can be constructively combined at the energy receiver (ER) to achieve an EB gain that scales with the number of ETs. However, the optimal design of EB waveforms requires accurate channel state information (CSI) at the ETs, which is challenging to obtain practically, especially in a distributed system with ETs at separate locations. In this paper, we study practical and efficient channel training methods to achieve optimal EB in a distributed WET system. We propose two protocols with and without centralized coordination, respectively, where distributed ETs either sequentially or in parallel adapt their transmit phases based on a low-complexity energy feedback from the ER. The energy feedback only depends on the received power level at the ER, where each feedback indicates one particular transmit phase that results in the maximum harvested power over a set of previously used phases. Simulation results show that the two proposed training protocols converge very fast in practical WET systems even with a large number of distributed ETs, while the protocol with sequential ET phase adaptation is also analytically shown to converge to the optimal EB design with perfect CSI by increasing the training time. Numerical results are also provided to evaluate the performance of the proposed distributed EB and training designs as compared to other benchmark schemes.

  11. Field validation of protocols developed to evaluate in-line mastitis detection systems.

    PubMed

    Kamphuis, C; Dela Rue, B T; Eastwood, C R

    2016-02-01

    This paper reports on a field validation of previously developed protocols for evaluating the performance of in-line mastitis-detection systems. The protocols outlined 2 requirements of these systems: (1) to detect cows with clinical mastitis (CM) promptly and accurately to enable timely and appropriate treatment and (2) to identify cows with high somatic cell count (SCC) to manage bulk milk SCC levels. Gold standard measures, evaluation tests, performance measures, and performance targets were proposed. The current study validated the protocols on commercial dairy farms with automated in-line mastitis-detection systems using both electrical conductivity (EC) and SCC sensor systems that both monitor at whole-udder level. The protocol for requirement 1 was applied on 3 commercial farms. For requirement 2, the protocol was applied on 6 farms; 3 of them had low bulk milk SCC (128×10(3) cells/mL) and were the same farms as used for field evaluation of requirement 1. Three farms with high bulk milk SCC (270×10(3) cells/mL) were additionally enrolled. The field evaluation methodology and results were presented at a workshop including representation from 7 international suppliers of in-line mastitis-detection systems. Feedback was sought on the acceptance of standardized performance evaluation protocols and recommended refinements to the protocols. Although the methodology for requirement 1 was relatively labor intensive and required organizational skills over an extended period, no major issues were encountered during the field validation of both protocols. The validation, thus, proved the protocols to be practical. Also, no changes to the data collection process were recommended by the technology supplier representatives. However, 4 recommendations were made to refine the protocols: inclusion of an additional analysis that ignores small (low-density) clot observations in the definition of CM, extension of the time window from 4 to 5 milkings for timely alerts for CM, setting a maximum number of 10 milkings for the time window to detect a CM episode, and presentation of sensitivity for a larger range of false alerts per 1,000 milkings replacing minimum performance targets. The recommended refinements are discussed with suggested changes to the original protocols. The information presented is intended to inform further debate toward achieving international agreement on standard protocols to evaluate performance of in-line mastitis-detection systems. Copyright © 2016 American Dairy Science Association. Published by Elsevier Inc. All rights reserved.

  12. A Familiarization Protocol Facilitates the Participation of Children with ASD in Electrophysiological Research.

    PubMed

    Turcios, Jacqueline; Cook, Barbara; Irwin, Julia; Rispoli, Taylor; Landi, Nicole

    2017-07-31

    This paper includes a detailed description of a familiarization protocol, which is used as an integral component of a larger research protocol to collect electroencephalography (EEG) data and Event-Related Potentials (ERPs). At present, the systems available for the collection of high-quality EEG/ERP data make significant demands on children with developmental disabilities, such as those with an Autism Spectrum Disorder (ASD). Children with ASD may have difficulty adapting to novel situations, tolerating uncomfortable sensory stimuli, and sitting quietly. This familiarization protocol uses Evidence-Based Practices (EBPs) to increase research participants' knowledge and understanding of the specific activities and steps of the research protocol. The tools in this familiarization protocol are a social narrative, a visual schedule, the Premack principle, role-playing, and modeling. The goal of this familiarization protocol is to increase understanding and agency and to potentially reduce anxiety for child participants, resulting in a greater likelihood of the successful completion of the research protocol for the collection of EEG/ERP data.

  13. 78 FR 14654 - Standards for Business Practices and Communication Protocols for Public Utilities

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-07

    ... also require each regional transmission organization (RTO) and independent system operator (ISO) to... 20426, (202) 502-6404. Mindi Sauter (legal issues), Office of the General Counsel, Federal Energy... require each regional transmission organization (RTO) and independent system operator (ISO) to address in...

  14. Experimental plug and play quantum coin flipping.

    PubMed

    Pappa, Anna; Jouguet, Paul; Lawson, Thomas; Chailloux, André; Legré, Matthieu; Trinkler, Patrick; Kerenidis, Iordanis; Diamanti, Eleni

    2014-04-24

    Performing complex cryptographic tasks will be an essential element in future quantum communication networks. These tasks are based on a handful of fundamental primitives, such as coin flipping, where two distrustful parties wish to agree on a randomly generated bit. Although it is known that quantum versions of these primitives can offer information-theoretic security advantages with respect to classical protocols, a demonstration of such an advantage in a practical communication scenario has remained elusive. Here we experimentally implement a quantum coin flipping protocol that performs strictly better than classically possible over a distance suitable for communication over metropolitan area optical networks. The implementation is based on a practical plug and play system, developed by significantly enhancing a commercial quantum key distribution device. Moreover, we provide combined quantum coin flipping protocols that are almost perfectly secure against bounded adversaries. Our results offer a useful toolbox for future secure quantum communications.

  15. Automated Planning Enables Complex Protocols on Liquid-Handling Robots.

    PubMed

    Whitehead, Ellis; Rudolf, Fabian; Kaltenbach, Hans-Michael; Stelling, Jörg

    2018-03-16

    Robotic automation in synthetic biology is especially relevant for liquid handling to facilitate complex experiments. However, research tasks that are not highly standardized are still rarely automated in practice. Two main reasons for this are the substantial investments required to translate molecular biological protocols into robot programs, and the fact that the resulting programs are often too specific to be easily reused and shared. Recent developments of standardized protocols and dedicated programming languages for liquid-handling operations addressed some aspects of ease-of-use and portability of protocols. However, either they focus on simplicity, at the expense of enabling complex protocols, or they entail detailed programming, with corresponding skills and efforts required from the users. To reconcile these trade-offs, we developed Roboliq, a software system that uses artificial intelligence (AI) methods to integrate (i) generic formal, yet intuitive, protocol descriptions, (ii) complete, but usually hidden, programming capabilities, and (iii) user-system interactions to automatically generate executable, optimized robot programs. Roboliq also enables high-level specifications of complex tasks with conditional execution. To demonstrate the system's benefits for experiments that are difficult to perform manually because of their complexity, duration, or time-critical nature, we present three proof-of-principle applications for the reproducible, quantitative characterization of GFP variants.

  16. Attacking a practical quantum-key-distribution system with wavelength-dependent beam-splitter and multiwavelength sources

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Li, Hong-Wei; Zhengzhou Information Science and Technology Institute, Zhengzhou, 450004; Wang, Shuang

    2011-12-15

    It is well known that the unconditional security of quantum-key distribution (QKD) can be guaranteed by quantum mechanics. However, practical QKD systems have some imperfections, which can be controlled by the eavesdropper to attack the secret key. With current experimental technology, a realistic beam splitter, made by fused biconical technology, has a wavelength-dependent property. Based on this fatal security loophole, we propose a wavelength-dependent attacking protocol, which can be applied to all practical QKD systems with passive state modulation. Moreover, we experimentally attack a practical polarization encoding QKD system to obtain all the secret key information at the cost ofmore » only increasing the quantum bit error rate from 1.3 to 1.4%.« less

  17. Near-optimal protocols in complex nonequilibrium transformations

    DOE PAGES

    Gingrich, Todd R.; Rotskoff, Grant M.; Crooks, Gavin E.; ...

    2016-08-29

    The development of sophisticated experimental means to control nanoscale systems has motivated efforts to design driving protocols that minimize the energy dissipated to the environment. Computational models are a crucial tool in this practical challenge. In this paper, we describe a general method for sampling an ensemble of finite-time, nonequilibrium protocols biased toward a low average dissipation. In addition, we show that this scheme can be carried out very efficiently in several limiting cases. As an application, we sample the ensemble of low-dissipation protocols that invert the magnetization of a 2D Ising model and explore how the diversity of themore » protocols varies in response to constraints on the average dissipation. In this example, we find that there is a large set of protocols with average dissipation close to the optimal value, which we argue is a general phenomenon.« less

  18. An expert system to advise astronauts during experiments: The protocol manager module

    NASA Technical Reports Server (NTRS)

    Haymann-Haber, Guido; Colombano, Silvano P.; Groleau, Nicolas; Rosenthal, Don; Szolovits, Peter; Young, Laurence R.

    1990-01-01

    Perhaps the scarcest resource for manned flight experiments - on Spacelab or on the Space Station Freedom - will continue to be crew time. To maximize the efficiency of the crew and to make use of their abilities to work as scientist collaborators as well as equipment operators, normally requires more training in a wide variety of disciplines than is practical. The successful application of on-board expert systems, as envisioned by the Principal Investigator in a Box program, should alleviate the training bottleneck and provide the astronaut with the guidance and coaching needed to permit him or her to operate an experiment according to the desires and knowledge of the PI, despite changes in conditions. The Protocol Manager module of the system is discussed. The Protocol Manager receives experiment data that has been summarized and categorized by the other modules. The Protocol Manager acts on the data in real-time, by employing expert system techniques. Its recommendations are based on heuristics provided by the Principal Investigator in charge of the experiment. This prototype was developed on a Macintosh II by employing CLIPS, a forward-chaining rule-based system, and HyperCard as an object-oriented user interface builder.

  19. Participatory design of a collaborative clinical trial protocol writing system.

    PubMed

    Weng, Chunhua; McDonald, David W; Sparks, Dana; McCoy, Jason; Gennari, John H

    2007-06-01

    To explore concrete approaches to socio-technical design of collaborative healthcare information systems and to design a groupware technology for collaborative clinical trial protocol writing. We conducted "quick and dirty ethnography" through semi-structured interviews, observational studies, and work artifacts analysis to understand the group work for protocol development. We used participatory design through evolutionary prototyping to explore the feature space of a collaborative writing system. Our design strategies include role-based user advocacy, formative evaluation, and change management. Quick and dirty ethnography helped us efficiently understand relevant work practice, and participatory design helped us engage users into design and bring out their tacit work knowledge. Our approach that intertwined both techniques helped achieve a "work-informed and user-oriented" design. This research leads to a collaborative writing system that supports in situ communication, group awareness, and effective work progress tracking. The usability evaluation results have been satisfactory. The system design is being transferred to an organizational tool for daily use.

  20. Automating individualized coaching and authentic role-play practice for brief intervention training.

    PubMed

    Hayes-Roth, B; Saker, R; Amano, K

    2010-01-01

    Brief intervention helps to reduce alcohol abuse, but there is a need for accessible, cost-effective training of clinicians. This study evaluated STAR Workshop , a web-based training system that automates efficacious techniques for individualized coaching and authentic role-play practice. We compared STAR Workshop to a web-based, self-guided e-book and a no-treatment control, for training the Engage for Change (E4C) brief intervention protocol. Subjects were medical and nursing students. Brief written skill probes tested subjects' performance of individual protocol steps, in different clinical scenarios, at three test times: pre-training, post-training, and post-delay (two weeks). Subjects also did live phone interviews with a standardized patient, post-delay. STAR subjects performed significantly better than both other groups. They showed significantly greater improvement from pre-training probes to post-training and post-delay probes. They scored significantly higher on post-delay phone interviews. STAR Workshop appears to be an accessible, cost-effective approach for training students to use the E4C protocol for brief intervention in alcohol abuse. It may also be useful for training other clinical interviewing protocols.

  1. Optimal approach to quantum communication using dynamic programming.

    PubMed

    Jiang, Liang; Taylor, Jacob M; Khaneja, Navin; Lukin, Mikhail D

    2007-10-30

    Reliable preparation of entanglement between distant systems is an outstanding problem in quantum information science and quantum communication. In practice, this has to be accomplished by noisy channels (such as optical fibers) that generally result in exponential attenuation of quantum signals at large distances. A special class of quantum error correction protocols, quantum repeater protocols, can be used to overcome such losses. In this work, we introduce a method for systematically optimizing existing protocols and developing more efficient protocols. Our approach makes use of a dynamic programming-based searching algorithm, the complexity of which scales only polynomially with the communication distance, letting us efficiently determine near-optimal solutions. We find significant improvements in both the speed and the final-state fidelity for preparing long-distance entangled states.

  2. Variability in donation after cardiac death protocols: a national survey.

    PubMed

    Fugate, Jennifer E; Stadtler, Maria; Rabinstein, Alejandro A; Wijdicks, Eelco F M

    2011-02-27

    As donation after cardiac death practices expand, the number of institutional policies is increasing. We contacted organ procurement organizations throughout the United States and requested protocols in hospitals in their donor service areas. Sixty-four protocols were obtained with representation from 16 different states. The terminology and recommended practices varied substantially. The methods for death determination were not specified in 28 (44%) protocols. Most adhered to a 2- to 5-min observation time between circulatory arrest and organ procurement, but 10 (16%) provided no information. This variability reveals a need to define a uniform standard in donation after cardiac death protocols and death determination practices.

  3. Achievable rate maximization for decode-and-forward MIMO-OFDM networks with an energy harvesting relay.

    PubMed

    Du, Guanyao; Yu, Jianjun

    2016-01-01

    This paper investigates the system achievable rate for the multiple-input multiple-output orthogonal frequency division multiplexing (MIMO-OFDM) system with an energy harvesting (EH) relay. Firstly we propose two protocols, time switching-based decode-and-forward relaying (TSDFR) and a flexible power splitting-based DF relaying (PSDFR) protocol by considering two practical receiver architectures, to enable the simultaneous information processing and energy harvesting at the relay. In PSDFR protocol, we introduce a temporal parameter to describe the time division pattern between the two phases which makes the protocol more flexible and general. In order to explore the system performance limit, we discuss the system achievable rate theoretically and formulate two optimization problems for the proposed protocols to maximize the system achievable rate. Since the problems are non-convex and difficult to solve, we first analyze them theoretically and get some explicit results, then design an augmented Lagrangian penalty function (ALPF) based algorithm for them. Numerical results are provided to validate the accuracy of our analytical results and the effectiveness of the proposed ALPF algorithm. It is shown that, PSDFR outperforms TSDFR to achieve higher achievable rate in such a MIMO-OFDM relaying system. Besides, we also investigate the impacts of the relay location, the number of antennas and the number of subcarriers on the system performance. Specifically, it is shown that, the relay position greatly affects the system performance of both protocols, and relatively worse achievable rate is achieved when the relay is placed in the middle of the source and the destination. This is different from the MIMO-OFDM DF relaying system without EH. Moreover, the optimal factor which indicates the time division pattern between the two phases in the PSDFR protocol is always above 0.8, which means that, the common division of the total transmission time into two equal phases in previous work applying PS-based receiver is not optimal.

  4. Design Sketches For Optical Crossbar Switches Intended For Large-Scale Parallel Processing Applications

    NASA Astrophysics Data System (ADS)

    Hartmann, Alfred; Redfield, Steve

    1989-04-01

    This paper discusses design of large-scale (1000x 1000) optical crossbar switching networks for use in parallel processing supercom-puters. Alternative design sketches for an optical crossbar switching network are presented using free-space optical transmission with either a beam spreading/masking model or a beam steering model for internodal communications. The performances of alternative multiple access channel communications protocol-unslotted and slotted ALOHA and carrier sense multiple access (CSMA)-are compared with the performance of the classic arbitrated bus crossbar of conventional electronic parallel computing. These comparisons indicate an almost inverse relationship between ease of implementation and speed of operation. Practical issues of optical system design are addressed, and an optically addressed, composite spatial light modulator design is presented for fabrication to arbitrarily large scale. The wide range of switch architecture, communications protocol, optical systems design, device fabrication, and system performance problems presented by these design sketches poses a serious challenge to practical exploitation of highly parallel optical interconnects in advanced computer designs.

  5. Developing family planning nurse practitioner protocols.

    PubMed

    Hawkins, J W; Roberto, D

    1984-01-01

    This article focuses on the process of development of protocols for family planning nurse practitioners. A rationale for the use of protocols, a definition of the types and examples, and the pros and cons of practice with protocols are presented. A how-to description for the development process follows, including methods and a suggested tool for critique and evaluation. The aim of the article is to assist nurse practitioners in developing protocols for their practice.

  6. A Passive Testing Approach for Protocols in Wireless Sensor Networks

    PubMed Central

    Che, Xiaoping; Maag, Stephane; Tan, Hwee-Xian; Tan, Hwee-Pink; Zhou, Zhangbing

    2015-01-01

    Smart systems are today increasingly developed with the number of wireless sensor devices drastically increasing. They are implemented within several contexts throughout our environment. Thus, sensed data transported in ubiquitous systems are important, and the way to carry them must be efficient and reliable. For that purpose, several routing protocols have been proposed for wireless sensor networks (WSN). However, one stage that is often neglected before their deployment is the conformance testing process, a crucial and challenging step. Compared to active testing techniques commonly used in wired networks, passive approaches are more suitable to the WSN environment. While some works propose to specify the protocol with state models or to analyze them with simulators and emulators, we here propose a logic-based approach for formally specifying some functional requirements of a novel WSN routing protocol. We provide an algorithm to evaluate these properties on collected protocol execution traces. Further, we demonstrate the efficiency and suitability of our approach by its application into common WSN functional properties, as well as specific ones designed from our own routing protocol. We provide relevant testing verdicts through a real indoor testbed and the implementation of our protocol. Furthermore, the flexibility, genericity and practicability of our approach have been proven by the experimental results. PMID:26610495

  7. A Passive Testing Approach for Protocols in Wireless Sensor Networks.

    PubMed

    Che, Xiaoping; Maag, Stephane; Tan, Hwee-Xian; Tan, Hwee-Pink; Zhou, Zhangbing

    2015-11-19

    Smart systems are today increasingly developed with the number of wireless sensor devices drastically increasing. They are implemented within several contexts throughout our environment. Thus, sensed data transported in ubiquitous systems are important, and the way to carry them must be efficient and reliable. For that purpose, several routing protocols have been proposed for wireless sensor networks (WSN). However, one stage that is often neglected before their deployment is the conformance testing process, a crucial and challenging step. Compared to active testing techniques commonly used in wired networks, passive approaches are more suitable to the WSN environment. While some works propose to specify the protocol with state models or to analyze them with simulators and emulators, we here propose a logic-based approach for formally specifying some functional requirements of a novel WSN routing protocol. We provide an algorithm to evaluate these properties on collected protocol execution traces. Further, we demonstrate the efficiency and suitability of our approach by its application into common WSN functional properties, as well as specific ones designed from our own routing protocol. We provide relevant testing verdicts through a real indoor testbed and the implementation of our protocol. Furthermore, the flexibility, genericity and practicability of our approach have been proven by the experimental results.

  8. Analysis of Security Protocols for Mobile Healthcare.

    PubMed

    Wazid, Mohammad; Zeadally, Sherali; Das, Ashok Kumar; Odelu, Vanga

    2016-11-01

    Mobile Healthcare (mHealth) continues to improve because of significant improvements and the decreasing costs of Information Communication Technologies (ICTs). mHealth is a medical and public health practice, which is supported by mobile devices (for example, smartphones) and, patient monitoring devices (for example, various types of wearable sensors, etc.). An mHealth system enables healthcare experts and professionals to have ubiquitous access to a patient's health data along with providing any ongoing medical treatment at any time, any place, and from any device. It also helps the patient requiring continuous medical monitoring to stay in touch with the appropriate medical staff and healthcare experts remotely. Thus, mHealth has become a major driving force in improving the health of citizens today. First, we discuss the security requirements, issues and threats to the mHealth system. We then present a taxonomy of recently proposed security protocols for mHealth system based on features supported and possible attacks, computation cost and communication cost. Our detailed taxonomy demonstrates the strength and weaknesses of recently proposed security protocols for the mHealth system. Finally, we identify some of the challenges in the area of security protocols for mHealth systems that still need to be addressed in the future to enable cost-effective, secure and robust mHealth systems.

  9. A Low Cost Key Agreement Protocol Based on Binary Tree for EPCglobal Class 1 Generation 2 RFID Protocol

    NASA Astrophysics Data System (ADS)

    Jeng, Albert; Chang, Li-Chung; Chen, Sheng-Hui

    There are many protocols proposed for protecting Radio Frequency Identification (RFID) system privacy and security. A number of these protocols are designed for protecting long-term security of RFID system using symmetric key or public key cryptosystem. Others are designed for protecting user anonymity and privacy. In practice, the use of RFID technology often has a short lifespan, such as commodity check out, supply chain management and so on. Furthermore, we know that designing a long-term security architecture to protect the security and privacy of RFID tags information requires a thorough consideration from many different aspects. However, any security enhancement on RFID technology will jack up its cost which may be detrimental to its widespread deployment. Due to the severe constraints of RFID tag resources (e. g., power source, computing power, communication bandwidth) and open air communication nature of RFID usage, it is a great challenge to secure a typical RFID system. For example, computational heavy public key and symmetric key cryptography algorithms (e. g., RSA and AES) may not be suitable or over-killed to protect RFID security or privacy. These factors motivate us to research an efficient and cost effective solution for RFID security and privacy protection. In this paper, we propose a new effective generic binary tree based key agreement protocol (called BKAP) and its variations, and show how it can be applied to secure the low cost and resource constraint RFID system. This BKAP is not a general purpose key agreement protocol rather it is a special purpose protocol to protect privacy, un-traceability and anonymity in a single RFID closed system domain.

  10. Connecting Reflective Practice, Dialogic Protocols, and Professional Learning

    ERIC Educational Resources Information Center

    Nehring, James; Laboy, Wilfredo T.; Catarius, Lynn

    2010-01-01

    In recent years, elements of reflective practice have been popularized in state school professional development. As reflective practice has moved into the mainstream, dialogic protocols have been developed by numerous organizations to structure discourse for deep understanding, enhance professional practice and advance organizational learning.…

  11. Spontaneous Breathing Trials and Conservative Sedation Practices Reduce Mechanical Ventilation Duration in Subjects With ARDS.

    PubMed

    Kallet, Richard H; Zhuo, Hanjing; Yip, Vivian; Gomez, Antonio; Lipnick, Michael S

    2018-01-01

    Spontaneous breathing trials (SBTs) and daily sedation interruptions (DSIs) reduce both the duration of mechanical ventilation and ICU length of stay (LOS). The impact of these practices in patients with ARDS has not previously been reported. We examined whether implementation of SBT/DSI protocols reduce duration of mechanical ventilation and ICU LOS in a retrospective group of subjects with ARDS at a large, urban, level-1 trauma center. All ARDS survivors from 2002 to 2016 ( N = 1,053) were partitioned into 2 groups: 397 in the pre-SBT/DSI group (June 2002-December 2007) and 656 in the post-SBT/DSI group (January 2009-April 2016). Patients from 2008, during the protocol implementation period, were excluded. An additional SBT protocol database (2008-2010) was used to assess the efficacy of SBT in transitioning subjects with ARDS to unassisted breathing. Comparisons were assessed by either unpaired t tests or Mann-Whitney tests. Multiple comparisons were made using either one-way analysis of variance or Kruskal-Wallis and Dunn's tests. Linear regression modeling was used to determine variables independently associated with mechanical ventilation duration and ICU LOS; differences were considered statistically significant when P < .05. Compared to the pre-protocol group, subjects with ARDS managed with SBT/DSI protocols experienced pronounced reductions both in median (IQR) mechanical ventilation duration (14 [6-29] vs 9 [4-17] d, respectively, P < .001) and median ICU LOS (18 [8-33] vs 13 [7-22] d, respectively P < .001). In the final model, only treatment in the SBT/DSI period and higher baseline respiratory system compliance were independently associated with reduced mechanical ventilation duration and ICU LOS. Among subjects with ARDS in the SBT performance database, most achieved unassisted breathing with a median of 2 SBTs. Evidenced-based protocols governing weaning and sedation practices were associated with both reduced mechanical ventilation duration and ICU LOS in subjects with ARDS. However, higher respiratory system compliance in the SBT/DSI cohort also contributed to these improved outcomes. Copyright © 2018 by Daedalus Enterprises.

  12. Generation and confirmation of a (100 x 100)-dimensional entangled quantum system.

    PubMed

    Krenn, Mario; Huber, Marcus; Fickler, Robert; Lapkiewicz, Radek; Ramelow, Sven; Zeilinger, Anton

    2014-04-29

    Entangled quantum systems have properties that have fundamentally overthrown the classical worldview. Increasing the complexity of entangled states by expanding their dimensionality allows the implementation of novel fundamental tests of nature, and moreover also enables genuinely new protocols for quantum information processing. Here we present the creation of a (100 × 100)-dimensional entangled quantum system, using spatial modes of photons. For its verification we develop a novel nonlinear criterion which infers entanglement dimensionality of a global state by using only information about its subspace correlations. This allows very practical experimental implementation as well as highly efficient extraction of entanglement dimensionality information. Applications in quantum cryptography and other protocols are very promising.

  13. Generation and confirmation of a (100 × 100)-dimensional entangled quantum system

    PubMed Central

    Krenn, Mario; Huber, Marcus; Fickler, Robert; Lapkiewicz, Radek; Ramelow, Sven; Zeilinger, Anton

    2014-01-01

    Entangled quantum systems have properties that have fundamentally overthrown the classical worldview. Increasing the complexity of entangled states by expanding their dimensionality allows the implementation of novel fundamental tests of nature, and moreover also enables genuinely new protocols for quantum information processing. Here we present the creation of a (100 × 100)-dimensional entangled quantum system, using spatial modes of photons. For its verification we develop a novel nonlinear criterion which infers entanglement dimensionality of a global state by using only information about its subspace correlations. This allows very practical experimental implementation as well as highly efficient extraction of entanglement dimensionality information. Applications in quantum cryptography and other protocols are very promising. PMID:24706902

  14. Recommended Practices for the Safe Design and Operation of Flywheels

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bender, Donald Arthur

    2015-12-01

    Flywheel energy storage systems are in use globally in increasing numbers . No codes pertaining specifically to flywheel energy storage exist. A number of industrial incidents have occurred. This protocol recommends a technical basis for safe flywheel de sign and operation for consideration by flywheel developers, users of flywheel systems and standards setting organizations.

  15. Keeping Scores: Audited Self-Monitoring of High-Stakes Testing Environments

    ERIC Educational Resources Information Center

    Padilla, Raymond; Richards, Michael

    2006-01-01

    To address a public relations problem faced by a large urban public school district in Texas, we conducted action research that resulted in an audited self-monitoring system for high-stakes testing environments. The system monitors violations of testing protocols while identifying and disseminating best practices to improve the education of…

  16. Security analysis on some experimental quantum key distribution systems with imperfect optical and electrical devices

    NASA Astrophysics Data System (ADS)

    Liang, Lin-Mei; Sun, Shi-Hai; Jiang, Mu-Sheng; Li, Chun-Yan

    2014-10-01

    In general, quantum key distribution (QKD) has been proved unconditionally secure for perfect devices due to quantum uncertainty principle, quantum noncloning theorem and quantum nondividing principle which means that a quantum cannot be divided further. However, the practical optical and electrical devices used in the system are imperfect, which can be exploited by the eavesdropper to partially or totally spy the secret key between the legitimate parties. In this article, we first briefly review the recent work on quantum hacking on some experimental QKD systems with respect to imperfect devices carried out internationally, then we will present our recent hacking works in details, including passive faraday mirror attack, partially random phase attack, wavelength-selected photon-number-splitting attack, frequency shift attack, and single-photon-detector attack. Those quantum attack reminds people to improve the security existed in practical QKD systems due to imperfect devices by simply adding countermeasure or adopting a totally different protocol such as measurement-device independent protocol to avoid quantum hacking on the imperfection of measurement devices [Lo, et al., Phys. Rev. Lett., 2012, 108: 130503].

  17. Evolution of a Patient Information Management System in a Local Area Network Environment at Loyola University of Chicago Medical Center

    PubMed Central

    Price, Ronald N; Chandrasekhar, Arcot J; Tamirisa, Balaji

    1990-01-01

    The Department of Medicine at Loyola University Medical Center (LUMC) of Chicago has implemented a local area network (LAN) based Patient Information Management System (PIMS) as part of its integrated departmental database management system. PIMS consists of related database applications encompassing demographic information, current medications, problem lists, clinical data, prior events, and on-line procedure results. Integration into the existing departmental database system permits PIMS to capture and manipulate data in other departmental applications. Standardization of clinical data is accomplished through three data tables that verify diagnosis codes, procedures codes and a standardized set of clinical data elements. The modularity of the system, coupled with standardized data formats, allowed the development of a Patient Information Protocol System (PIPS). PIPS, a userdefinable protocol processor, provides physicians with individualized data entry or review screens customized for their specific research protocols or practice habits. Physician feedback indicates that the PIMS/PIPS combination enhances their ability to collect and review specific patient information by filtering large amount of clinical data.

  18. Clinically Practical Magnetic Resonance Protocol for Improved Specificity in Breast Cancer Diagnosis

    DTIC Science & Technology

    2007-06-01

    Protocol for Improved Specificity in Breast Cancer Diagnosis PRINCIPAL INVESTIGATOR: Luminita Alina Tudorica, Ph.D. CONTRACTING...TITLE AND SUBTITLE 5a. CONTRACT NUMBER Clinically Practical Magnetic Resonance Protocol for Improved Specificity in Breast Cancer Diagnosis 5b... breast cancer study in a clinical setting. This study aims to improve specificity of breast cancer detection by using a combined MRI/MRS protocol. In

  19. Bedside, classroom and bench: collaborative strategies to generate evidence-based knowledge for nursing practice.

    PubMed

    Weaver, Charlotte A; Warren, Judith J; Delaney, Connie

    2005-12-01

    The rise of evidence-base practice (EBP) as a standard for care delivery is rapidly emerging as a global phenomenon that is transcending political, economic and geographic boundaries. Evidence-based nursing (EBN) addresses the growing body of nursing knowledge supported by different levels of evidence for best practices in nursing care. Across all health care, including nursing, we face the challenge of how to most effectively close the gap between what is known and what is practiced. There is extensive literature on the barriers and difficulties of translating research findings into practical application. While the literature refers to this challenge as the "Bench to Bedside" lag, this paper presents three collaborative strategies that aim to minimize this gap. The Bedside strategy proposes to use the data generated from care delivery and captured in the massive data repositories of electronic health record (EHR) systems as empirical evidence that can be analysed to discover and then inform best practice. In the Classroom strategy, we present a description for how evidence-based nursing knowledge is taught in a baccalaureate nursing program. And finally, the Bench strategy describes applied informatics in converting paper-based EBN protocols into the workflow of clinical information systems. Protocols are translated into reference and executable knowledge with the goal of placing the latest scientific knowledge at the fingertips of front line clinicians. In all three strategies, information technology (IT) is presented as the underlying tool that makes this rapid translation of nursing knowledge into practice and education feasible.

  20. Best practices in specialty pharmacy management.

    PubMed

    Patterson, Courtney J

    2013-01-01

    Specialty pharmacy is a growing area of research, utilization, and cost. Because of the unique nature of the diseases treated by specialty pharmaceuticals, such as cancer and rheumatoid arthritis, novel management approaches are needed. Advocate Physician Partners (APP) is an entity within the Advocate Health Care Health System in the Chicago and the central Illinois area. It coordinates the care management and managed care contracting between the Advocate Health Care System and more than 4,000 physicians on the medical staffs of Advocate hospitals. APP has experienced a per-member-per-month (PMPM) increase of less than  3% in oncology intravenous medications spend in 2012. This spend refers to the intravenous medications covered under the medical benefits for APP's health maintenance organization (HMO) population. The spend has consistently been less than national projections, and we believe this is tied to the adoption of several key best practices. Prior to instituting the best practices, the yearly percentage increases for oncology spending were 5.52% (2007 to 2008), 9.39% (2008 to 2009), and 5.29% (2009 to 2010). After instituting best practices during the first quarter of 2011, the increases in PMPM were 3.11% (2010 to 2011) and 2.11% (2011 to 2012), which were below previous years. To describe the best practices of specialty pharmacy management adopted by APP, specifically (a) establishing a content expert and governing bodies, (b) ensuring compliance with policies, and (c) providing educational resources. APP has several key result areas (KRAs). One KRA was compliance with appropriate utilization of intravenous oncology protocols for its HMO population. The protocols for each medication outline the appropriate indication and patient population. These protocols were developed and reviewed by the APP Pharmacy and Technology (PT) committee. The PT-approved indications reflect FDA indications and indications found in national guidelines. The APP KRA target for the utilization of protocols was 80%. The compliance for completing the protocols that correspond to these medications was calculated by tabulating the number of paid claims over the number of completed protocols, resulting in a compliance percentage. APP defined noncompliance as any utilization not outlined in the protocol. Another KRA was physician feedback. APP requires that physicians complete a certain number of continuing medical education (CME) programs provided by APP each year. Feedback from physicians, provided at the end of the CME, were tabulated and utilized for further programs. Additionally, APP strived to increase physician engagement by placing them in key roles that oversaw clinical and business aspects of the organization. In order to meet the KRAs, investigate inappropriate utilization, and become better involved in engaging oncology specialists, APP invested in an oncology clinical pharmacist position. The primary responsibility of the oncology clinical pharmacist was to be a specialty drug resource for the organization with a focus on provider education. The oncology clinical pharmacist was deemed the content expert who developed clinical protocols, educated providers, and encouraged compliance with organizational policies and procedures as it pertained to the KRAs. Since establishing the oncology clinical pharmacist position, APP has seen an increase in protocol compliance. Prior to the institution of this position, the protocol compliance was 62%. In less than 1 year after hiring the oncology clinical pharmacist, the compliance percentage spiked to over 80%. APP has several committees and boards that oversee the clinical and business aspects of the organization. By placing physicians in chairmanship positions of the committees, APP has seen the benefit of handling difficult patient decisions and increased compliance with policies. Lastly, extensive provider education has led to an improved physician satisfaction in the educational initiatives of APP. Greater than 80% of the physicians felt the CME content was relevant to their practices; the content would likely have a positive impact on their practices; and the clinical content was evidence based and accepted by the medical community. By hiring an oncology clinical pharmacist, engaging physicians by placing them in key roles, and providing more specialist-specific education, APP has improved its KRAs and compliance percentages. APP achieved success in containing expenditures for oncology intravenous medications by implementing key best practices combined with traditional management strategies.

  1. Rural Indonesian health care workers' constructs of infection prevention and control knowledge.

    PubMed

    Marjadi, Brahmaputra; McLaws, Mary-Louise

    2010-06-01

    Understanding the constructs of knowledge behind clinical practices in low-resource rural health care settings with limited laboratory facilities and surveillance programs may help in designing resource-appropriate infection prevention and control education. Multiple qualitative methods of direct observations, individual and group focus discussions, and document analysis were used to examine health care workers' knowledge of infection prevention and control practices in intravenous therapy, antibiotic therapy, instrument reprocessing, and hand hygiene in 10 rural Indonesian health care facilities. Awareness of health care-associated infections was low. Protocols were in the main based on verbal instructions handed down through the ranks of health care workers. The evidence-based knowledge gained across professional training was overridden by empiricism, nonscientific modifications, and organizational and societal cultures when resources were restricted or patients demanded inappropriate therapies. This phenomenon remained undetected by accreditation systems and clinical educators. Rural Indonesian health care workers would benefit from a formal introduction to evidence-based practice that would deconstruct individual protocols that include nonscientific knowledge. To achieve levels of acceptable patient safety, protocols would have to be both evidence-based and resource-appropriate. Copyright 2010 Association for Professionals in Infection Control and Epidemiology, Inc. All rights reserved.

  2. School hearing screening programme in the UK: practice and performance

    PubMed Central

    Fonseca, S; Forsyth, H; Neary, W

    2005-01-01

    Background: Paediatric audiology services and screening programmes are currently under review. Aims and Methods: To investigate current practice and performance of the school hearing screening programme (SHSP) by means of a questionnaire. Results: SHSP was found to detect previously unrecognised hearing loss at low cost. Wide variation in practice was shown, and the majority of services had no computerised system for data collection. Conclusion: There is a need for nationally agreed protocols and quality assurance procedures. PMID:15665168

  3. Optical protocols for terabit networks

    NASA Technical Reports Server (NTRS)

    Chua, P. L.; Lambert, J. L.; Morookian, J. M.; Bergman, L. A.

    1991-01-01

    This paper describes a new fiber-optic local area network technology providing 100X improvement over current technology, has full crossbar funtionality, and inherent data security. Based on optical code-division multiple access (CDMA), using spectral phase encoding/decoding of optical pulses, networking protocols are implemented entirely in the optical domain and thus conventional networking bottlenecks are avoided. Component and system issues for a proof-of-concept demonstration are discussed, as well as issues for a more practical and commercially exploitable system. Possible terrestrial and aerospace applications of this technology, and its impact on other technologies are explored. Some initial results toward realization of this concept are also included.

  4. Experimental demonstration of polarization encoding quantum key distribution system based on intrinsically stable polarization-modulated units.

    PubMed

    Wang, Jindong; Qin, Xiaojuan; Jiang, Yinzhu; Wang, Xiaojing; Chen, Liwei; Zhao, Feng; Wei, Zhengjun; Zhang, Zhiming

    2016-04-18

    A proof-of-principle demonstration of a one-way polarization encoding quantum key distribution (QKD) system is demonstrated. This approach can automatically compensate for birefringence and phase drift. This is achieved by constructing intrinsically stable polarization-modulated units (PMUs) to perform the encoding and decoding, which can be used with four-state protocol, six-state protocol, and the measurement-device-independent (MDI) scheme. A polarization extinction ratio of about 30 dB was maintained for several hours over a 50 km optical fiber without any adjustments to our setup, which evidences its potential for use in practical applications.

  5. The Internet for Educators: A User's Guide.

    ERIC Educational Resources Information Center

    Monahan, Brian D.; Dharm, Matthew

    1995-01-01

    Presents a practical guide to use of the Internet. Topics discussed include getting connected; the UNIX operating system; electronic mail; FTP (File Transfer Protocol); Finger; Telnet; Archie; Veronica; Gopher; teacher education; the Yanoff List; and expansion of the Internet. (three references) (LRW)

  6. Practical and secure telemedicine systems for user mobility.

    PubMed

    Rezaeibagha, Fatemeh; Mu, Yi

    2018-02-01

    The application of wireless devices has led to a significant improvement in the quality delivery of care in telemedicine systems. Patients who live in a remote area are able to communicate with the healthcare provider and benefit from the doctor consultations. However, it has been a challenge to provide a secure telemedicine system, which captures users (patients and doctors) mobility and patient privacy. In this work, we present several secure protocols for telemedicine systems, which ensure the secure communication between patients and doctors who are located in different geographical locations. Our protocols are the first of this kind featured with confidentiality of patient information, mutual authentication, patient anonymity, data integrity, freshness of communication, and mobility. Our protocols are based on symmetric-key schemes and capture all desirable security requirements in order to better serve our objectives of research for secure telemedicine services; therefore, they are very efficient in implementation. A comparison with related works shows that our work contributes first comprehensive solution to capture user mobility and patient privacy for telemedicine systems. Copyright © 2018 Elsevier Inc. All rights reserved.

  7. Diversity of faculty practice in workshop classrooms

    NASA Astrophysics Data System (ADS)

    Franklin, Scott V.; Chapman, Tricia

    2013-01-01

    We present a temporally fine-grained characterization of faculty practice in workshop-style introductory physics courses. Practice is binned in five minute intervals and coded through two complementary observational protocols: the Reform Teaching Observation Protocol provides a summative assessment of fidelity to reform-teaching principles, while the Teaching Dimensions Observation Protocol records direct practice. We find that the TDOP's direct coding of practice explains nuances in the holistic RTOP score, with higher RTOP scores corresponding to less lecture, but not necessarily more student-directed activities. Despite using similar materials, faculty show significant differences in practice that manifests in both TDOP and RTOP scores. We also find a significant dependence of practice on course subject reflected in both RTOP and TDOP scores, with Electricity & Magnetism using more instructor-centered practices (lecture, illustration, etc.) than Mechanics courses.

  8. The Interface of Clinical Decision-Making With Study Protocols for Knowledge Translation From a Walking Recovery Trial.

    PubMed

    Hershberg, Julie A; Rose, Dorian K; Tilson, Julie K; Brutsch, Bettina; Correa, Anita; Gallichio, Joann; McLeod, Molly; Moore, Craig; Wu, Sam; Duncan, Pamela W; Behrman, Andrea L

    2017-01-01

    Despite efforts to translate knowledge into clinical practice, barriers often arise in adapting the strict protocols of a randomized, controlled trial (RCT) to the individual patient. The Locomotor Experience Applied Post-Stroke (LEAPS) RCT demonstrated equal effectiveness of 2 intervention protocols for walking recovery poststroke; both protocols were more effective than usual care physical therapy. The purpose of this article was to provide knowledge-translation tools to facilitate implementation of the LEAPS RCT protocols into clinical practice. Participants from 2 of the trial's intervention arms: (1) early Locomotor Training Program (LTP) and (2) Home Exercise Program (HEP) were chosen for case presentation. The two cases illustrate how the protocols are used in synergy with individual patient presentations and clinical expertise. Decision algorithms and guidelines for progression represent the interface between implementation of an RCT standardized intervention protocol and clinical decision-making. In each case, the participant presents with a distinct clinical challenge that the therapist addresses by integrating the participant's unique presentation with the therapist's expertise while maintaining fidelity to the LEAPS protocol. Both participants progressed through an increasingly challenging intervention despite their own unique presentation. Decision algorithms and exercise progression for the LTP and HEP protocols facilitate translation of the RCT protocol to the real world of clinical practice. The two case examples to facilitate translation of the LEAPS RCT into clinical practice by enhancing understanding of the protocols, their progression, and their application to individual participants.Video Abstract available for more insights from the authors (see Supplemental Digital Content 1, available at: http://links.lww.com/JNPT/A147).

  9. Security of six-state quantum key distribution protocol with threshold detectors

    PubMed Central

    Kato, Go; Tamaki, Kiyoshi

    2016-01-01

    The security of quantum key distribution (QKD) is established by a security proof, and the security proof puts some assumptions on the devices consisting of a QKD system. Among such assumptions, security proofs of the six-state protocol assume the use of photon number resolving (PNR) detector, and as a result the bit error rate threshold for secure key generation for the six-state protocol is higher than that for the BB84 protocol. Unfortunately, however, this type of detector is demanding in terms of technological level compared to the standard threshold detector, and removing the necessity of such a detector enhances the feasibility of the implementation of the six-state protocol. Here, we develop the security proof for the six-state protocol and show that we can use the threshold detector for the six-state protocol. Importantly, the bit error rate threshold for the key generation for the six-state protocol (12.611%) remains almost the same as the one (12.619%) that is derived from the existing security proofs assuming the use of PNR detectors. This clearly demonstrates feasibility of the six-state protocol with practical devices. PMID:27443610

  10. Pharmaceutical care for patients with COPD in Belgium and views on protocol implementation.

    PubMed

    Tommelein, Eline; Tollenaere, Kathleen; Mehuys, Els; Boussery, Koen

    2014-08-01

    A protocol-based pharmaceutical care program (the PHARMACOP-protocol) focusing on patient counselling during prescription filling has shown to be effective in patients with chronic obstructive pulmonary disease (COPD). However, implementation of this protocol in daily practice has not yet been studied. To describe current implementation level of the items included in the PHARMACOP-protocol in Belgian community pharmacies and to evaluate pharmacists' perspectives on the implementation of this protocol in daily practice. A cross-sectional study was conducted from April to June 2012, in randomly selected community pharmacies in Flanders. Pharmacists were questionned using structured interviews. 125 pharmacies were contacted and 80 managing pharmacists (64 %) participated. In >70 % of pharmacies, 4/7 protocol items for first prescriptions and 3/5 protocol items for follow-up prescriptions were already routinely implemented. For first and follow-up prescriptions, respectively 39 (49 %) and 34 pharmacists (43 %) stated they would need to spend at least 5 min extra to offer optimal patient counselling. Most mentioned barriers preventing protocol implementation included lack of time (80 %), no integration in pharmacy software (61 %) and too much administrative burden (58 %). Approximately 50 % of the PHARMACOP-protocol items are currently routinely provided in Belgian community pharmacies. Nearly all interviewed pharmacists are willing to implement the protocol fully or partially in daily practice.

  11. Applying Adult Ventilator-associated Pneumonia Bundle Evidence to the Ventilated Neonate.

    PubMed

    Weber, Carla D

    2016-06-01

    Ventilator-associated pneumonia (VAP) in neonates can be reduced by implementing preventive care practices. Implementation of a group, or bundle, of evidence-based practices that improve processes of care has been shown to be cost-effective and to have better outcomes than implementation of individual single practices. The purpose of this article is to describe a safe, effective, and efficient neonatal VAP prevention protocol developed for caregivers in the neonatal intensive care unit (NICU). Improved understanding of VAP causes, effects of care practices, and rationale for interventions can help reduce VAP risk to neonatal patients. In order to improve care practices to affect VAP rates, initial and annual education occurred on improved protocol components after surveying staff practices and auditing documentation compliance. In 2009, a tertiary care level III NICU in the Midwestern United States had 14 VAP cases. Lacking evidence-based VAP prevention practices for neonates, effective adult strategies were modified to meet the complex needs of the ventilated neonate. A protocol was developed over time and resulted in an annual decrease in VAP until rates were zero for 20 consecutive months from October 2012 to May 2014. This article describes a VAP prevention protocol developed to address care practices surrounding hand hygiene, intubation, feeding, suctioning, positioning, oral care, and respiratory equipment in the NICU. Implementation of this VAP prevention protocol in other facilities with appropriate monitoring and tracking would provide broader support for standardization of care. Individual components of this VAP protocol could be studied to strengthen the inclusion of each; however, bundled interventions are often considered stronger when implemented as a whole.

  12. A shared computer-based problem-oriented patient record for the primary care team.

    PubMed

    Linnarsson, R; Nordgren, K

    1995-01-01

    1. INTRODUCTION. A computer-based patient record (CPR) system, Swedestar, has been developed for use in primary health care. The principal aim of the system is to support continuous quality improvement through improved information handling, improved decision-making, and improved procedures for quality assurance. The Swedestar system has evolved during a ten-year period beginning in 1984. 2. SYSTEM DESIGN. The design philosophy is based on the following key factors: a shared, problem-oriented patient record; structured data entry based on an extensive controlled vocabulary; advanced search and query functions, where the query language has the most important role; integrated decision support for drug prescribing and care protocols and guidelines; integrated procedures for quality assurance. 3. A SHARED PROBLEM-ORIENTED PATIENT RECORD. The core of the CPR system is the problem-oriented patient record. All problems of one patient, recorded by different members of the care team, are displayed on the problem list. Starting from this list, a problem follow-up can be made, one problem at a time or for several problems simultaneously. Thus, it is possible to get an integrated view, across provider categories, of those problems of one patient that belong together. This shared problem-oriented patient record provides an important basis for the primary care team work. 4. INTEGRATED DECISION SUPPORT. The decision support of the system includes a drug prescribing module and a care protocol module. The drug prescribing module is integrated with the patient records and includes an on-line check of the patient's medication list for potential interactions and data-driven reminders concerning major drug problems. Care protocols have been developed for the most common chronic diseases, such as asthma, diabetes, and hypertension. The patient records can be automatically checked according to the care protocols. 5. PRACTICAL EXPERIENCE. The Swedestar system has been implemented in a primary care area with 30,000 inhabitants. It is being used by all the primary care team members: 15 general practitioners, 25 district nurses, and 10 physiotherapists. Several years of practical experience of the CPR system shows that it has a positive impact on quality of care on four levels: 1) improved clinical follow-up of individual patients; 2) facilitated follow-up of aggregated data such as practice activity analysis, annual reports, and clinical indicators; 3) automated medical audit; and 4) concurrent audit. Within that primary care area, quality of care has improved substantially in several aspects due to the use of the CPR system [1].

  13. Creation of backdoors in quantum communications via laser damage

    NASA Astrophysics Data System (ADS)

    Makarov, Vadim; Bourgoin, Jean-Philippe; Chaiwongkhot, Poompong; Gagné, Mathieu; Jennewein, Thomas; Kaiser, Sarah; Kashyap, Raman; Legré, Matthieu; Minshull, Carter; Sajeed, Shihan

    2016-09-01

    Practical quantum communication (QC) protocols are assumed to be secure provided implemented devices are properly characterized and all known side channels are closed. We show that this is not always true. We demonstrate a laser-damage attack capable of modifying device behavior on demand. We test it on two practical QC systems for key distribution and coin tossing, and show that newly created deviations lead to side channels. This reveals that laser damage is a potential security risk to existing QC systems, and necessitates their testing to guarantee security.

  14. Multi-server blind quantum computation over collective-noise channels

    NASA Astrophysics Data System (ADS)

    Xiao, Min; Liu, Lin; Song, Xiuli

    2018-03-01

    Blind quantum computation (BQC) enables ordinary clients to securely outsource their computation task to costly quantum servers. Besides two essential properties, namely correctness and blindness, practical BQC protocols also should make clients as classical as possible and tolerate faults from nonideal quantum channel. In this paper, using logical Bell states as quantum resource, we propose multi-server BQC protocols over collective-dephasing noise channel and collective-rotation noise channel, respectively. The proposed protocols permit completely or almost classical client, meet the correctness and blindness requirements of BQC protocol, and are typically practical BQC protocols.

  15. Legal aspects of therapist-driven protocols. Do therapist-driven protocols place therapists in a legally compromising position?

    PubMed

    Meehan, M J

    1996-03-01

    The recent introduction of therapist-driven protocols has given the appearance of restricting the professional judgment of respiratory therapists with decision-tree robotics while contemporaneously catapulting them into the practice of medicine. This is happening in the midst of a spiraling litigation climate. This article examines the legal aspects--from malpractice to licensure--of this exciting new practice known as therapist-driven respiratory protocols.

  16. The Classroom Observation Protocol for Undergraduate STEM (COPUS): a new instrument to characterize university STEM classroom practices.

    PubMed

    Smith, Michelle K; Jones, Francis H M; Gilbert, Sarah L; Wieman, Carl E

    2013-01-01

    Instructors and the teaching practices they employ play a critical role in improving student learning in college science, technology, engineering, and mathematics (STEM) courses. Consequently, there is increasing interest in collecting information on the range and frequency of teaching practices at department-wide and institution-wide scales. To help facilitate this process, we present a new classroom observation protocol known as the Classroom Observation Protocol for Undergraduate STEM or COPUS. This protocol allows STEM faculty, after a short 1.5-hour training period, to reliably characterize how faculty and students are spending their time in the classroom. We present the protocol, discuss how it differs from existing classroom observation protocols, and describe the process by which it was developed and validated. We also discuss how the observation data can be used to guide individual and institutional change.

  17. The Classroom Observation Protocol for Undergraduate STEM (COPUS): A New Instrument to Characterize University STEM Classroom Practices

    PubMed Central

    Smith, Michelle K.; Jones, Francis H. M.; Gilbert, Sarah L.; Wieman, Carl E.

    2013-01-01

    Instructors and the teaching practices they employ play a critical role in improving student learning in college science, technology, engineering, and mathematics (STEM) courses. Consequently, there is increasing interest in collecting information on the range and frequency of teaching practices at department-wide and institution-wide scales. To help facilitate this process, we present a new classroom observation protocol known as the Classroom Observation Protocol for Undergraduate STEM or COPUS. This protocol allows STEM faculty, after a short 1.5-hour training period, to reliably characterize how faculty and students are spending their time in the classroom. We present the protocol, discuss how it differs from existing classroom observation protocols, and describe the process by which it was developed and validated. We also discuss how the observation data can be used to guide individual and institutional change. PMID:24297289

  18. Generation of natural killer cells from hematopoietic stem cells in vitro for immunotherapy

    PubMed Central

    Luevano, Martha; Madrigal, Alejandro; Saudemont, Aurore

    2012-01-01

    Natural killer (NK) cells are part of the innate immune system and are an alluring option for immunotherapy due to their ability to kill infected cells or cancer cells without prior sensitization. Throughout the past 20 years, different groups have been able to reproduce NK cell development in vitro, and NK cell ontogeny studies have provided the basis for the establishment of protocols to produce NK cells in vitro for immunotherapy. Here, we briefly discuss NK cell development and NK cell immunotherapy approaches. We review the factors needed for NK cell differentiation in vitro, which stem cell sources have been used, published protocols, challenges and future directions for Good Manufacturing Practice protocols. PMID:22705914

  19. The Use of Efficient Broadcast Protocols in Asynchronous Distributed Systems. Ph.D. Thesis

    NASA Technical Reports Server (NTRS)

    Schmuck, Frank Bernhard

    1988-01-01

    Reliable broadcast protocols are important tools in distributed and fault-tolerant programming. They are useful for sharing information and for maintaining replicated data in a distributed system. However, a wide range of such protocols has been proposed. These protocols differ in their fault tolerance and delivery ordering characteristics. There is a tradeoff between the cost of a broadcast protocol and how much ordering it provides. It is, therefore, desirable to employ protocols that support only a low degree of ordering whenever possible. This dissertation presents techniques for deciding how strongly ordered a protocol is necessary to solve a given application problem. It is shown that there are two distinct classes of application problems: problems that can be solved with efficient, asynchronous protocols, and problems that require global ordering. The concept of a linearization function that maps partially ordered sets of events to totally ordered histories is introduced. How to construct an asynchronous implementation that solves a given problem if a linearization function for it can be found is shown. It is proved that in general the question of whether a problem has an asynchronous solution is undecidable. Hence there exists no general algorithm that would automatically construct a suitable linearization function for a given problem. Therefore, an important subclass of problems that have certain commutativity properties are considered. Techniques for constructing asynchronous implementations for this class are presented. These techniques are useful for constructing efficient asynchronous implementations for a broad range of practical problems.

  20. The Length of Child Anxiety Treatment in a Regional Health System.

    PubMed

    Whiteside, Stephen P H; Ale, Chelsea M; Young, Brennan; Olsen, Mark W; Biggs, Bridget K; Gregg, Melissa S; Geske, Jennifer R; Homan, Kendra

    2016-12-01

    Anxiety disorders are often undertreated due to unsuccessful dissemination of evidence-based treatments (EBTs). Lack of empirical data regarding the typical length of treatment in clinical settings may hamper the development of clinically relevant protocols. The current study examined billing records for 335 children ages 7-17 years to quantify the treatment received for newly diagnosed anxiety disorders within a regional health system. The vast majority of patients did not receive a sufficient number of appointments to complete the typical cognitive behavioral therapy protocol or reach the sessions introducing exposure. Although half of the sample received pharmacotherapy, the vast majority received fewer follow-up appointments than participants in pharmacotherapy research studies. Further, the type of treatment (i.e., number of sessions and medication) differed depending on utilization of specialty care. These results underscore the need to develop brief and flexible EBT protocols that can be standardized and implemented in community practice.

  1. Developing Intranets: Practical Issues for Implementation and Design.

    ERIC Educational Resources Information Center

    Trowbridge, Dave

    1996-01-01

    An intranet is a system which has "domesticated" the technologies of the Internet for specific organizational settings and goals. Although the adaptability of Hypertext Markup Language to intranets is sometimes limited, implementing various protocols and technologies enable organizations to share files among heterogeneous computers,…

  2. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chan, A.; Tsiounis, Y.; Frankel, Y.

    Recently, there has been an interest in making electronic cash protocols more practical for electronic commerce by developing e-cash which is divisible (e.g., a coin which can be spent incrementally but total purchases are limited to the monetary value of the coin). In Crypto`95, T. Okamoto presented the first practical divisible, untraceable, off-line e-cash scheme, which requires only O(log N) computations for each of the withdrawal, payment and deposit procedures, where N = (total coin value)/(smallest divisible unit). However, Okamoto`s set-up procedure is quite inefficient (on the order of 4,000 multi-exponentiations and depending on the size of the RSA modulus).more » The authors formalize the notion of range-bounded commitment, originally used in Okamoto`s account establishment protocol, and present a very efficient instantiation which allows one to construct the first truly efficient divisible e-cash system. The scheme only requires the equivalent of one (1) exponentiation for set-up, less than 2 exponentiations for withdrawal and around 20 for payment, while the size of the coin remains about 300 Bytes. Hence, the withdrawal protocol is 3 orders of magnitude faster than Okamoto`s, while the rest of the system remains equally efficient, allowing for implementation in smart-cards. Similar to Okamoto`s, the scheme is based on proofs whose cryptographic security assumptions are theoretically clarified.« less

  3. A self-paced motor imagery based brain-computer interface for robotic wheelchair control.

    PubMed

    Tsui, Chun Sing Louis; Gan, John Q; Hu, Huosheng

    2011-10-01

    This paper presents a simple self-paced motor imagery based brain-computer interface (BCI) to control a robotic wheelchair. An innovative control protocol is proposed to enable a 2-class self-paced BCI for wheelchair control, in which the user makes path planning and fully controls the wheelchair except for the automatic obstacle avoidance based on a laser range finder when necessary. In order for the users to train their motor imagery control online safely and easily, simulated robot navigation in a specially designed environment was developed. This allowed the users to practice motor imagery control with the core self-paced BCI system in a simulated scenario before controlling the wheelchair. The self-paced BCI can then be applied to control a real robotic wheelchair using a protocol similar to that controlling the simulated robot. Our emphasis is on allowing more potential users to use the BCI controlled wheelchair with minimal training; a simple 2-class self paced system is adequate with the novel control protocol, resulting in a better transition from offline training to online control. Experimental results have demonstrated the usefulness of the online practice under the simulated scenario, and the effectiveness of the proposed self-paced BCI for robotic wheelchair control.

  4. Extravasation management in the pediatric oncology ward of Children's Hospital of Fudan University: a best practice implementation project.

    PubMed

    Wang, Yingwen; Kong, Meijing; Ge, Youhong

    2016-12-01

    Extravasation in a pediatric patient can cause a serious adverse event, but many nurses have insufficient experience to deal with it during intravenous administration. Our division implemented a best practice project, which included extravasation kit instruction preparation, staff education and an update of institutional policy and procedures. The project focused on auditing the extent to which the protocol was implemented and promoting its implementation. The objective of the project was to establish an evidence-based policy and procedure for extravasation management, improve knowledge regarding best practice of extravasation management among staff and formalize the documentation template for extravasation events. The Joanna Briggs Institute's Practical Application of Clinical Evidence System and Getting Research into Practice were used to examine compliance with criteria based on the best available evidence before and after the implementation of strategies to promote the use of the evidence-based practice protocol. Four criteria showed a noticeable improvement in compliance: increased use of extravasation kit (0-100%), updated policies and procedure (0-94%), staff education (19-94%) and documented outcomes (13-88%). The project successfully established effective strategies for establishing an extravasation kit instruction sheet, updating policies and procedures, continuous staff education and nursing documentation to ensure best practice and improve patient outcomes.

  5. Exploring the Downside of Open Knowledge Resources: The Case of Indigenous Knowledge Systems and Practices in the Philippines

    ERIC Educational Resources Information Center

    Flor, Alexander Gonzalez

    2013-01-01

    The paper is based on the challenges encountered by the researcher while conducting a study titled "Design, Development and Testing of an Indigenous Knowledge Management System Using Mobile Device Video Capture and Web 2.0 Protocols." During the conduct of the study the researcher observed a marked reluctance from organized indigenous…

  6. Finite-key analysis for the 1-decoy state QKD protocol

    NASA Astrophysics Data System (ADS)

    Rusca, Davide; Boaron, Alberto; Grünenfelder, Fadri; Martin, Anthony; Zbinden, Hugo

    2018-04-01

    It has been shown that in the asymptotic case of infinite-key length, the 2-decoy state Quantum Key Distribution (QKD) protocol outperforms the 1-decoy state protocol. Here, we present a finite-key analysis of the 1-decoy method. Interestingly, we find that for practical block sizes of up to 108 bits, the 1-decoy protocol achieves for almost all experimental settings higher secret key rates than the 2-decoy protocol. Since using only one decoy is also easier to implement, we conclude that it is the best choice for QKD, in most common practical scenarios.

  7. Translating evidence-based protocol of wound drain management for total joint arthroplasty into practice: A quasi-experimental study.

    PubMed

    Tsang, Lap Fung; Cheng, Hang Cheong; Ho, Hon Shuen; Hsu, Yung Chak; Chow, Chiu Man; Law, Heung Wah; Fong, Lup Chau; Leung, Lok Ming; Kong, Ivy Ching Yan; Chan, Chi Wai; Sham, Alice So Yuen

    2016-05-01

    Although various drains have long been used in total joint replacement, evidence suggests inconsistent practice exists in the use of drainage systems including intermittently applying suction or free of drainage suction, and variations in the optimal timing for wound drain removal. A comprehensive systematic review of available evidence up to 2013 was conducted in a previous study and a protocol was adapted for clinical application according to the summary of the retrieved information (Tsang, 2015). To determine if the protocol could reduce blood loss and blood transfusion after operation and to develop a record form so as to enhance communication of drainage record amongst surgeons and nurses. A quasi-experimental time-series design was undertaken. In the conventional group, surgeons ordered free drainage if the drain output was more than 300 ml. The time of removal of the drain was based on their professional judgement. In the protocol group the method of drainage was dependant of the drainage output as was the timing of the removal of the drain. A standardized record form was developed to guide operating room and orthopaedic ward nurses to manage the drainage system. The drain was removed significantly earlier in the protocol group. Blood loss rate at the first hour of post-operation was extremely low in the protocol group due to clamping effect. Blood loss in volume during the first three hours in the protocol group was significantly lower than that in the conventional group. Only in 11.1% and 4% of cases was it necessary to clamp at the three and four hour post-operative hours. No clamping was required at the two and eight hour postoperative period. There was no significant difference in blood loss during the removal of the drain and during blood transfusion, which was required for patients upon removal of the drain in the two groups. This is the first clinical study to develop an evidence-based protocol to manage wound drain effectively in Hong Kong. Total blood loss and blood transfusions were not significantly different between the conventional and protocol groups. A standard documentation document is beneficial to enhance communication between doctors and nurses as well as to monitor and observe drainage effectively. Copyright © 2016 Elsevier Ltd. All rights reserved.

  8. Cure Cycle Design Methodology for Fabricating Reactive Resin Matrix Fiber Reinforced Composites: A Protocol for Producing Void-free Quality Laminates

    NASA Technical Reports Server (NTRS)

    Hou, Tan-Hung

    2014-01-01

    For the fabrication of resin matrix fiber reinforced composite laminates, a workable cure cycle (i.e., temperature and pressure profiles as a function of processing time) is needed and is critical for achieving void-free laminate consolidation. Design of such a cure cycle is not trivial, especially when dealing with reactive matrix resins. An empirical "trial and error" approach has been used as common practice in the composite industry. Such an approach is not only costly, but also ineffective at establishing the optimal processing conditions for a specific resin/fiber composite system. In this report, a rational "processing science" based approach is established, and a universal cure cycle design protocol is proposed. Following this protocol, a workable and optimal cure cycle can be readily and rationally designed for most reactive resin systems in a cost effective way. This design protocol has been validated through experimental studies of several reactive polyimide composites for a wide spectrum of usage that has been documented in the previous publications.

  9. A Systemic Approach to the Development of a Sexual Abuse Protocol in a Rural Community: An Examination of Social Work Leadership Theory and Practice. Issues in Clinical Practice.

    ERIC Educational Resources Information Center

    Catalano, Stephen

    The paper presents the multi-factorial problem of sexual abuse of children within their families, provides definitions of relevant terms (incest, sexual abuse, sexual misuse, molestation, sexual assault, rape), reviews the epidemiology of sexual abuse and its effects, and traces development of a Sexual Abuse Resource Team in a rural/resort New…

  10. Moving Triadic Gaze Intervention Into Practice: Measuring Clinician Attitude and Implementation Fidelity

    PubMed Central

    Olswang, Lesley B.; Greenslade, Kathryn; Pinder, Gay Lloyd; Dowden, Patricia; Madden, Jodi

    2017-01-01

    Purpose This research investigated a first step in implementing the dynamic assessment (DA) component of Triadic Gaze Intervention (Olswang, Feuerstein, Pinder, & Dowden, 2013; Olswang et al., 2014), an evidence-based protocol for teaching early signals of communication to young children with physical disabilities. Clinician attitudes about adopting external evidence into practice and implementation fidelity in DA protocol delivery were examined following training. Method Seven early intervention clinicians from multiple disciplines were trained to deliver the four essential elements of the DA protocol: (a) provide communication opportunity, (b) recognize child's potentially communicative signal, (c) shape child's signal toward triadic gaze, and (d) reinforce with play. Clinician attitude regarding adopting evidence into practice was measured at baseline and follow-up, with the Evidence-Based Practice Attitude Scale (Aarons, 2004). Implementation fidelity in delivering the protocol was measured for adherence (accuracy) and competence (quality) during trial implementation. Results Clinicians' attitudes about trying new evidence that at first was perceived as incongruent with their practice improved over the course of the research. Clinicians demonstrated strong adherence to the DA protocol; however, competence varied across clinicians and appeared related to child performance. Conclusions The results provided insight into moving Triadic Gaze Intervention into practice and yielded valuable information regarding the implementation process, with implications for future research. PMID:28525577

  11. An Enhanced LoRaWAN Security Protocol for Privacy Preservation in IoT with a Case Study on a Smart Factory-Enabled Parking System.

    PubMed

    You, Ilsun; Kwon, Soonhyun; Choudhary, Gaurav; Sharma, Vishal; Seo, Jung Taek

    2018-06-08

    The Internet of Things (IoT) utilizes algorithms to facilitate intelligent applications across cities in the form of smart-urban projects. As the majority of devices in IoT are battery operated, their applications should be facilitated with a low-power communication setup. Such facility is possible through the Low-Power Wide-Area Network (LPWAN), but at a constrained bit rate. For long-range communication over LPWAN, several approaches and protocols are adopted. One such protocol is the Long-Range Wide Area Network (LoRaWAN), which is a media access layer protocol for long-range communication between the devices and the application servers via LPWAN gateways. However, LoRaWAN comes with fewer security features as a much-secured protocol consumes more battery because of the exorbitant computational overheads. The standard protocol fails to support end-to-end security and perfect forward secrecy while being vulnerable to the replay attack that makes LoRaWAN limited in supporting applications where security (especially end-to-end security) is important. Motivated by this, an enhanced LoRaWAN security protocol is proposed, which not only provides the basic functions of connectivity between the application server and the end device, but additionally averts these listed security issues. The proposed protocol is developed with two options, the Default Option (DO) and the Security-Enhanced Option (SEO). The protocol is validated through Burrows⁻Abadi⁻Needham (BAN) logic and the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The proposed protocol is also analyzed for overheads through system-based and low-power device-based evaluations. Further, a case study on a smart factory-enabled parking system is considered for its practical application. The results, in terms of network latency with reliability fitting and signaling overheads, show paramount improvements and better performance for the proposed protocol compared with the two handshake options, Pre-Shared Key (PSK) and Elliptic Curve Cryptography (ECC), of Datagram Transport Layer Security (DTLS).

  12. Improvement of pressure ulcer prevention care in private for-profit residential care homes: an action research study.

    PubMed

    Kwong, Enid Wy; Hung, Maria Sy; Woo, Kevin

    2016-11-25

    A need exits to develop a protocol for preventing pressure ulcers (PUs) in private for-profit nursing homes in Hong Kong, where the incidence of PUs is relatively high and which have high proportion of non-professional care staff. The implementation of such protocol would involve changes in the practice of care, likely evoking feelings of fear and uncertainty that may become a barrier to staff adherence. We thus adopted the Systems Model of Action Research in this study to manage the process of change for improving PU prevention care and to develop a pressure ulcer prevention protocol for private for-profit nursing homes. A total of 474 residents and care staff who were health workers, personal care workers, and/or nurses from four private, for-profit nursing homes in Hong Kong participated in this study. Three cyclic stages and steps, namely, unfreezing (planning), changing (action), and refreezing (results) were carried out. During each cycle, focus group interviews, field observations of the care staff's practices and inspections of the skin of the residents for pressure ulcers were conducted to evaluate the implementation of the protocol. Qualitative content analysis was adopted to analyse the data. The data and methodological triangulation used in this study increased the credibility and validity of the results. The following nine themes emerged from this study: prevention practices after the occurrence of PUs, the improper use of pressure ulcer prevention materials, non-compliance with several prevention practices, improper prevention practices, the perception that the preventive care was being performed correctly, inadequate readiness to use the risk assessment tool, an undesirable environment, the supplying of unfavorable resources, and various management styles in the homes with or without nurses. At the end of the third cycle, the changes that were identified included improved compliance with the revised risk assessment method, the timely and appropriate use of PU prevention materials, the empowering of staff to improve the quality of PU care, and improved home management. Through the action research approach, the care staff were empowered and their PU prevention care practices had improved, which contributed to the decreased incidence of pressure ulcers. A PU prevention protocol that was accepted by the staff was finally developed as the standard of care for such homes.

  13. A national evaluation of a dissemination and implementation initiative to enhance primary care practice capacity and improve cardiovascular disease care: the ESCALATES study protocol.

    PubMed

    Cohen, Deborah J; Balasubramanian, Bijal A; Gordon, Leah; Marino, Miguel; Ono, Sarah; Solberg, Leif I; Crabtree, Benjamin F; Stange, Kurt C; Davis, Melinda; Miller, William L; Damschroder, Laura J; McConnell, K John; Creswell, John

    2016-06-29

    The Agency for Healthcare Research and Quality (AHRQ) launched the EvidenceNOW Initiative to rapidly disseminate and implement evidence-based cardiovascular disease (CVD) preventive care in smaller primary care practices. AHRQ funded eight grantees (seven regional Cooperatives and one independent national evaluation) to participate in EvidenceNOW. The national evaluation examines quality improvement efforts and outcomes for more than 1500 small primary care practices (restricted to those with fewer than ten physicians per clinic). Examples of external support include practice facilitation, expert consultation, performance feedback, and educational materials and activities. This paper describes the study protocol for the EvidenceNOW national evaluation, which is called Evaluating System Change to Advance Learning and Take Evidence to Scale (ESCALATES). This prospective observational study will examine the portfolio of EvidenceNOW Cooperatives using both qualitative and quantitative data. Qualitative data include: online implementation diaries, observation and interviews at Cooperatives and practices, and systematic assessment of context from the perspective of Cooperative team members. Quantitative data include: practice-level performance on clinical quality measures (aspirin prescribing, blood pressure and cholesterol control, and smoking cessation; ABCS) collected by Cooperatives from electronic health records (EHRs); practice and practice member surveys to assess practice capacity and other organizational and structural characteristics; and systematic tracking of intervention delivery. Quantitative, qualitative, and mixed methods analyses will be conducted to examine how Cooperatives organize to provide external support to practices, to compare effectiveness of the dissemination and implementation approaches they implement, and to examine how regional variations and other organization and contextual factors influence implementation and effectiveness. ESCALATES is a national evaluation of an ambitious large-scale dissemination and implementation effort focused on transforming smaller primary care practices. Insights will help to inform the design of national health care practice extension systems aimed at supporting practice transformation efforts in the USA. NCT02560428 (09/21/15).

  14. 21 CFR 58.120 - Protocol.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL GOOD LABORATORY PRACTICE..., body weight range, sex, source of supply, species, strain, substrain, and age of the test system. (5... kilogram of body weight or other appropriate units, of the test or control article to be administered and...

  15. 76 FR 59425 - Notice of Lodging of Consent Decree Under The Clean Air Act

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-26

    ... and collection systems, to correctly establish and monitor operating parameters, and to comply with... using model test protocols, adopt new monitoring practices, correct deficiencies in recordkeeping and... Environmental Protection Agency, Ariel Rios Building, 1200 Pennsylvania Avenue, NW., Washington, DC 20460...

  16. Evaluation of a realtime, remote monitoring telemedicine system using the Bluetooth protocol and a mobile phone network.

    PubMed

    Jasemian, Yousef; Arendt-Nielsen, Lars

    2005-01-01

    A generic, realtime wireless telemedicine system has been developed that uses the Bluetooth protocol and the general packet radio service for mobile phones. The system was tested on 10 healthy volunteers, by continuous monitoring of their electrocardiograms (ECGs). Under realistic conditions, the system had 96.5% uptime, a data throughput of 3.3 kbit/s, a mean packet error rate of 8.5x10(-3) packet/s and a mean packet loss rate of 8.2x10(-3) packet/s. During 24 h testing, the total average downtime was 66 min and 90% of the periods of downtime were of only 1-3 min duration. Less than 10% of the ECGs were of unacceptable quality. Thus, the generic telemedicine system showed high reliability and performance, and the design may provide a foundation for realtime monitoring in clinical practice, for example in cardiology.

  17. Clinical Simulation: A Protocol for Evaluation of Mobile Technology.

    PubMed

    Mather, Carey; Jensen, Sanne; Cummings, Elizabeth

    2017-01-01

    For mobile technology to be accepted at point of care in healthcare environments there is a need to demonstrate benefits whilst ameliorating the risks and challenges. To provide a standardised approach to evaluation of mobile technology a simulation protocol was developed to provide guidance for its use in healthcare environments. Simulated conditions provide the opportunity to assess intended and unintended consequences and identify potential workarounds when using technology. The protocol can also be used to demonstrate the importance of the development of digital professionalism by end-users prior to students entering the clinical practice setting. The mobile technology protocol was adapted from a health information systems protocol developed and used at the ITX Lab, Denmark for use in other simulation laboratories. Use case scenarios were developed to enable evaluation of mobile technology for mobile learning of nurses, nurse supervisors, students and patients. The scenarios can be used in a range of simulated environments including hospital bedside, outpatient clinic or community settings. A case study exemplar of a nurse and patient is included to demonstrate how the mobile technology protocol can be applied.

  18. A universal data access and protocol integration mechanism for smart home

    NASA Astrophysics Data System (ADS)

    Shao, Pengfei; Yang, Qi; Zhang, Xuan

    2013-03-01

    With the lack of standardized or completely missing communication interfaces in home electronics, there is no perfect solution to address every aspect in smart homes based on existing protocols and technologies. In addition, the central control unit (CCU) of smart home system working point-to-point between the multiple application interfaces and the underlying hardware interfaces leads to its complicated architecture and unpleasant performance. A flexible data access and protocol integration mechanism is required. The current paper offers a universal, comprehensive data access and protocol integration mechanism for a smart home. The universal mechanism works as a middleware adapter with unified agreements of the communication interfaces and protocols, offers an abstraction of the application level from the hardware specific and decoupling the hardware interface modules from the application level. Further abstraction for the application interfaces and the underlying hardware interfaces are executed based on adaption layer to provide unified interfaces for more flexible user applications and hardware protocol integration. This new universal mechanism fundamentally changes the architecture of the smart home and in some way meets the practical requirement of smart homes more flexible and desirable.

  19. A quality improvement initiative to reduce necrotizing enterocolitis across hospital systems.

    PubMed

    Nathan, Amy T; Ward, Laura; Schibler, Kurt; Moyer, Laurel; South, Andrew; Kaplan, Heather C

    2018-04-20

    Necrotizing enterocolitis (NEC) is a devastating intestinal disease in premature infants. Local rates of NEC were unacceptably high. We hypothesized that utilizing quality improvement methodology to standardize care and apply evidence-based practices would reduce our rate of NEC. A multidisciplinary team used the model for improvement to prioritize interventions. Three neonatal intensive care units (NICUs) developed a standardized feeding protocol for very low birth weight (VLBW) infants, and employed strategies to increase the use of human milk, maximize intestinal perfusion, and promote a healthy microbiome. The primary outcome measure, NEC in VLBW infants, decreased from 0.17 cases/100 VLBW patient days to 0.029, an 83% reduction, while the compliance with a standardized feeding protocol improved. Through reliable implementation of evidence-based practices, this project reduced the regional rate of NEC by 83%. A key outcome and primary driver of success was standardization across multiple NICUs, resulting in consistent application of best practices and reduction in variation.

  20. Practical State Machine Replication with Confidentiality

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Duan, Sisi; Zhang, Haibin

    2016-01-01

    We study how to enable arbitrary randomized algorithms in Byzantine fault-tolerant (BFT) settings. We formalize a randomized BFT protocol and provide a simple and efficient construction that can be built on any existing BFT protocols while adding practically no overhead. We go one step further to revisit a confidential BFT protocol (Yin et al., SOSP '03). We show that their scheme is potentially susceptible to safety and confidentiality attacks. We then present a new protocol that is secure in the stronger model we formalize, by extending the idea of a randomized BFT protocol. Our protocol uses only efficient symmetric cryptography,more » while Yin et al.'s uses costly threshold signatures. We implemented and evaluated our protocols on microbenchmarks and real-world use cases. We show that our randomized BFT protocol is as efficient as conventional BFT protocols, and our confidential BFT protocol is two to three orders of magnitude faster than Yin et al.'s, which is less secure than ours.« less

  1. Research on a Banknote Printing Wastewater Monitoring System based on Wireless Sensor Network

    NASA Astrophysics Data System (ADS)

    Li, B. B.; Yuan, Z. F.

    2006-10-01

    In this paper, a banknote printing wastewater monitoring system based on WSN is presented in line with the system demands and actual condition of the worksite for a banknote printing factory. In Physical Layer, the network node is a nRF9e5-centric embedded instrument, which can realize the multi-function such as data collecting, status monitoring, wireless data transmission and so on. Limited by the computing capability, memory capability, communicating energy and others factors, it is impossible for the node to get every detail information of the network, so the communication protocol on WSN couldn't be very complicated. The competitive-based MACA (Multiple Access with Collision Avoidance) Protocol is introduced in MAC, which can decide the communication process and working mode of the nodes, avoid the collision of data transmission, hidden and exposed station problem of nodes. On networks layer, the routing protocol in charge of the transmitting path of the data, the networks topology structure is arranged based on address assignation. Accompanied with some redundant nodes, the network performances stabile and expandable. The wastewater monitoring system is a tentative practice of WSN theory in engineering. Now, the system has passed test and proved efficiently.

  2. Use of a web-based image reporting and tracking system for assessing abdominal imaging examination quality issues in a single practice.

    PubMed

    Rosenkrantz, Andrew B; Johnson, Evan; Sanger, Joseph J

    2015-10-01

    This article presents our local experience in the implementation of a real-time web-based system for reporting and tracking quality issues relating to abdominal imaging examinations. This system allows radiologists to electronically submit examination quality issues during clinical readouts. The submitted information is e-mailed to a designate for the given modality for further follow-up; the designate may subsequently enter text describing their response or action taken, which is e-mailed back to the radiologist. Review of 558 entries over a 6-year period demonstrated documentation of a broad range of examination quality issues, including specific issues relating to protocol deviation, post-processing errors, positioning errors, artifacts, and IT concerns. The most common issues varied among US, CT, MRI, radiography, and fluoroscopy. In addition, the most common issues resulting in a patient recall for repeat imaging (generally related to protocol deviation in MRI and US) were identified. In addition to submitting quality problems, radiologists also commonly used the tool to provide recognition of a well-performed examination. An electronic log of actions taken in response to radiologists' submissions indicated that both positive and negative feedback were commonly communicated to the performing technologist. Information generated using the tool can be used to guide subsequent quality improvement initiatives within a practice, including continued protocol standardization as well as education of technologists in the optimization of abdominal imaging examinations.

  3. La-CTP: Loop-Aware Routing for Energy-Harvesting Wireless Sensor Networks.

    PubMed

    Sun, Guodong; Shang, Xinna; Zuo, Yan

    2018-02-02

    In emerging energy-harvesting wireless sensor networks (EH-WSN), the sensor nodes can harvest environmental energy to drive their operation, releasing the user's burden in terms of frequent battery replacement, and even enabling perpetual sensing systems. In EH-WSN applications, usually, the node in energy-harvesting or recharging state has to stop working until it completes the energy replenishment. However, such temporary departures of recharging nodes severely impact the packet routing, and one immediate result is the routing loop problem. Controlling loops in connectivity-intermittent EH-WSN in an efficient way is a big challenge in practice, and so far, users still lack of effective and practicable routing protocols with loop handling. Based on the Collection Tree Protocol (CTP) widely used in traditional wireless sensor networks, this paper proposes a loop-aware routing protocol for real-world EH-WSNs, called La-CTP, which involves a new parent updating metric and a proactive, adaptive beaconing scheme to effectively suppress the occurrence of loops and unlock unavoidable loops, respectively. We constructed a 100-node testbed to evaluate La-CTP, and the experimental results showed its efficacy and efficiency.

  4. Performance measures for improving the prevention of venous thromboembolism: achievement in clinical practice.

    PubMed

    Wilson, Kenneth C; Merli, Geno J

    2011-10-01

    Venous thromboembolism (VTE) is a common complication during and after hospitalization for acute medical illness or surgery. Despite the existence of evidence-based guidelines for VTE prevention, real-world prescribing practices are frequently suboptimal. Specific performance measures relating to VTE prevention and treatment have been developed by US health care organizations to increase adherence with best-practice recommendations and ultimately reduce the number of preventable VTE events. Two measures developed by the Surgical Care Improvement Project have been endorsed by the National Quality Forum (NQF) and focus on VTE prevention. In addition, six measures have been developed recently by The Joint Commission in collaboration with the NQF; three measures relate to VTE prevention and three focus on treatment. To attain widespread achievement of these performance goals, it is essential to raise awareness of their existence and specifications. It is also imperative that hospitals develop and implement effective VTE protocols. The use of multiple, active strategies, such as computer decision support systems with regular audit and feedback, may be particularly valuable approaches to improve current practices within an integrated quality improvement program. During practical implementation of VTE protocols at Norton Healthcare (Kentucky's largest healthcare system), strong leadership, physician engagement, and caregiver accountability were identified as key factors influencing the process. As such, more hospitals may be able to increase adherence with guidelines, improve achievement of quality goals, and help to reduce the substantial burden associated with avoidable VTE.

  5. How to write a surgical clinical research protocol: literature review and practical guide.

    PubMed

    Rosenthal, Rachel; Schäfer, Juliane; Briel, Matthias; Bucher, Heiner C; Oertli, Daniel; Dell-Kuster, Salome

    2014-02-01

    The study protocol is the core document of every clinical research project. Clinical research in studies involving surgical interventions presents some specific challenges, which need to be accounted for and described in the study protocol. The aim of this review is to provide a practical guide for developing a clinical study protocol for surgical interventions with a focus on methodologic issues. On the basis of an in-depth literature search of methodologic literature and on some cardinal published surgical trials and observational studies, the authors provides a 10-step guide for developing a clinical study protocol in surgery. This practical guide outlines key methodologic issues important when planning an ethically and scientifically sound research project involving surgical interventions, with the ultimate goal of providing high-level evidence relevant for health care decision making in surgery. Copyright © 2014 Elsevier Inc. All rights reserved.

  6. Prospective Evaluation of a Matrix-Assisted Laser Desorption Ionization–Time of Flight Mass Spectrometry System in a Hospital Clinical Microbiology Laboratory for Identification of Bacteria and Yeasts: a Bench-by-Bench Study for Assessing the Impact on Time to Identification and Cost-Effectiveness

    PubMed Central

    Tan, K. E.; Ellis, B. C.; Lee, R.; Stamper, P. D.; Zhang, S. X.

    2012-01-01

    Matrix-assisted laser desorption ionization–time of flight mass spectrometry (MALDI-TOF MS) has been found to be an accurate, rapid, and inexpensive method for the identification of bacteria and yeasts. Previous evaluations have compared the accuracy, time to identification, and costs of the MALDI-TOF MS method against standard identification systems or commercial panels. In this prospective study, we compared a protocol incorporating MALDI-TOF MS (MALDI protocol) with the current standard identification protocols (standard protocol) to determine the performance in actual practice using a specimen-based, bench-by-bench approach. The potential impact on time to identification (TTI) and costs had MALDI-TOF MS been the first-line identification method was quantitated. The MALDI protocol includes supplementary tests, notably for Streptococcus pneumoniae and Shigella, and indications for repeat MALDI-TOF MS attempts, often not measured in previous studies. A total of 952 isolates (824 bacterial isolates and 128 yeast isolates) recovered from 2,214 specimens were assessed using the MALDI protocol. Compared with standard protocols, the MALDI protocol provided identifications 1.45 days earlier on average (P < 0.001). In our laboratory, we anticipate that the incorporation of the MALDI protocol can reduce reagent and labor costs of identification by $102,424 or 56.9% within 12 months. The model included the fixed annual costs of the MALDI-TOF MS, such as the cost of protein standards and instrument maintenance, and the annual prevalence of organisms encountered in our laboratory. This comprehensive cost analysis model can be generalized to other moderate- to high-volume laboratories. PMID:22855510

  7. Prospective evaluation of a matrix-assisted laser desorption ionization-time of flight mass spectrometry system in a hospital clinical microbiology laboratory for identification of bacteria and yeasts: a bench-by-bench study for assessing the impact on time to identification and cost-effectiveness.

    PubMed

    Tan, K E; Ellis, B C; Lee, R; Stamper, P D; Zhang, S X; Carroll, K C

    2012-10-01

    Matrix-assisted laser desorption ionization-time of flight mass spectrometry (MALDI-TOF MS) has been found to be an accurate, rapid, and inexpensive method for the identification of bacteria and yeasts. Previous evaluations have compared the accuracy, time to identification, and costs of the MALDI-TOF MS method against standard identification systems or commercial panels. In this prospective study, we compared a protocol incorporating MALDI-TOF MS (MALDI protocol) with the current standard identification protocols (standard protocol) to determine the performance in actual practice using a specimen-based, bench-by-bench approach. The potential impact on time to identification (TTI) and costs had MALDI-TOF MS been the first-line identification method was quantitated. The MALDI protocol includes supplementary tests, notably for Streptococcus pneumoniae and Shigella, and indications for repeat MALDI-TOF MS attempts, often not measured in previous studies. A total of 952 isolates (824 bacterial isolates and 128 yeast isolates) recovered from 2,214 specimens were assessed using the MALDI protocol. Compared with standard protocols, the MALDI protocol provided identifications 1.45 days earlier on average (P < 0.001). In our laboratory, we anticipate that the incorporation of the MALDI protocol can reduce reagent and labor costs of identification by $102,424 or 56.9% within 12 months. The model included the fixed annual costs of the MALDI-TOF MS, such as the cost of protein standards and instrument maintenance, and the annual prevalence of organisms encountered in our laboratory. This comprehensive cost analysis model can be generalized to other moderate- to high-volume laboratories.

  8. Optimization of stent implantation using a high pressure inflation protocol.

    PubMed

    Vallurupalli, Srikanth; Bahia, Amit; Ruiz-Rodriguez, Ernesto; Ahmed, Zubair; Hakeem, Abdul; Uretsky, Barry F

    2016-01-01

    High-pressure inflation is the universal standard for stent deployment but a specific protocol for its use is lacking. We developed a standardized "pressure optimization protocol" (POP) using time to inflation pressure stability as an endpoint for determining the required duration of stent inflation. The primary study purpose was to determine the stent inflation time (IT) in a large patient cohort using the standardized inflation protocol, to correlate various patient and lesion characteristics with IT, and ascertain in an in vitro study the time for pressure accommodation within an inflation system. Six hundred fifteen stent implants in 435 patients were studied. Multivariate analysis was performed to determine predictors of longer ITs. In an in vitro study, various stents and balloons were inflated in air to determine the pressure accommodation time of the inflation system. The mean stent IT was 104 ± 41 sec (range 30-380 sec). Stent length was the only predictor of prolonged stent inflation. The "accommodation time" in vitro of the stent inflation system itself was 33 ± 24 sec. The protocol was safe requiring premature inflation termination in <3% of stent implants. No serious adverse events occurred. Achieving stable inflation pressure requires on average over 100 sec and may require several minutes in individual cases. Stent length increases IT. These results suggest that the widespread practice of rapid inflation/deflation may not be sufficient to fully expand the stent and that the use of a pressure stability protocol will allow for safe, predictable, and more complete stent deployment. © 2015 Wiley Periodicals, Inc. © 2015 Wiley Periodicals, Inc.

  9. Clinical decision support systems in child and adolescent psychiatry: a systematic review.

    PubMed

    Koposov, Roman; Fossum, Sturla; Frodl, Thomas; Nytrø, Øystein; Leventhal, Bennett; Sourander, Andre; Quaglini, Silvana; Molteni, Massimo; de la Iglesia Vayá, María; Prokosch, Hans-Ulrich; Barbarini, Nicola; Milham, Michael Peter; Castellanos, Francisco Xavier; Skokauskas, Norbert

    2017-11-01

    Psychiatric disorders are amongst the most prevalent and impairing conditions in childhood and adolescence. Unfortunately, it is well known that general practitioners (GPs) and other frontline health providers (i.e., child protection workers, public health nurses, and pediatricians) are not adequately trained to address these ubiquitous problems (Braddick et al. Child and Adolescent mental health in Europe: infrastructures, policy and programmes, European Communities, 2009; Levav et al. Eur Child Adolesc Psychiatry 13:395-401, 2004). Advances in technology may offer a solution to this problem with clinical decision support systems (CDSS) that are designed to help professionals make sound clinical decisions in real time. This paper offers a systematic review of currently available CDSS for child and adolescent mental health disorders prepared according to the PRISMA-Protocols (Preferred Reporting Items for Systematic Reviews and Meta-Analyses Protocols). Applying strict eligibility criteria, the identified studies (n = 5048) were screened. Ten studies, describing eight original clinical decision support systems for child and adolescent psychiatric disorders, fulfilled inclusion criteria. Based on this systematic review, there appears to be a need for a new, readily available CDSS for child neuropsychiatric disorder which promotes evidence-based, best practices, while enabling consideration of national variation in practices by leveraging data-reuse to generate predictions regarding treatment outcome, addressing a broader cluster of clinical disorders, and targeting frontline practice environments.

  10. Supporting Tablet Configuration, Tracking, and Infection Control Practices in Digital Health Interventions: Study Protocol.

    PubMed

    Furberg, Robert D; Ortiz, Alexa M; Zulkiewicz, Brittany A; Hudson, Jordan P; Taylor, Olivia M; Lewis, Megan A

    2016-06-27

    Tablet-based health care interventions have the potential to encourage patient care in a timelier manner, allow physicians convenient access to patient records, and provide an improved method for patient education. However, along with the continued adoption of tablet technologies, there is a concomitant need to develop protocols focusing on the configuration, management, and maintenance of these devices within the health care setting to support the conduct of clinical research. Develop three protocols to support tablet configuration, tablet management, and tablet maintenance. The Configurator software, Tile technology, and current infection control recommendations were employed to develop three distinct protocols for tablet-based digital health interventions. Configurator is a mobile device management software specifically for iPhone operating system (iOS) devices. The capabilities and current applications of Configurator were reviewed and used to develop the protocol to support device configuration. Tile is a tracking tag associated with a free mobile app available for iOS and Android devices. The features associated with Tile were evaluated and used to develop the Tile protocol to support tablet management. Furthermore, current recommendations on preventing health care-related infections were reviewed to develop the infection control protocol to support tablet maintenance. This article provides three protocols: the Configurator protocol, the Tile protocol, and the infection control protocol. These protocols can help to ensure consistent implementation of tablet-based interventions, enhance fidelity when employing tablets for research purposes, and serve as a guide for tablet deployments within clinical settings.

  11. Recasting a traditional laboratory practical as a "Design-your-own protocol" to teach a universal research skill.

    PubMed

    Whitworth, David E

    2016-07-08

    Laboratory-based practical classes are a common feature of life science teaching, during which students learn how to perform experiments and generate/interpret data. Practical classes are typically instructional, concentrating on providing topic- and technique-specific skills, however to produce research-capable graduates it is also important to develop generic practical skills. To provide an opportunity for students to develop the skills needed to create bespoke protocols for experimental benchwork, a traditional practical was repurposed. Students were given a list of available resources and an experimental goal, and directed to create a bench protocol to achieve the aim (measuring the iron in hemoglobin). In a series of teaching events students received feedback from staff, and peers prototyped the protocols, before protocols were finally implemented. Graduates highlighted this exercise as one of the most important of their degrees, primarily because of the clear relevance of the skills acquired to professional practice. The exercise exemplifies a range of pedagogic principles, but arguably its most important innovation is that it repurposed a pre-existing practical. This had the benefits of automatically providing scaffolding to direct the students' thought processes, while retaining the advantages of a "discovery learning" exercise, and allowing facile adoption of the approach across the sector. © 2016 by The International Union of Biochemistry and Molecular Biology, 44(4):377-380, 2016. © 2016 The International Union of Biochemistry and Molecular Biology.

  12. The Best of Both Worlds: Building on the COPUS and RTOP Observation Protocols to Easily and Reliably Measure Various Levels of Reformed Instructional Practice

    PubMed Central

    Lund, Travis J.; Pilarz, Matthew; Velasco, Jonathan B.; Chakraverty, Devasmita; Rosploch, Kaitlyn; Undersander, Molly; Stains, Marilyne

    2015-01-01

    Researchers, university administrators, and faculty members are increasingly interested in measuring and describing instructional practices provided in science, technology, engineering, and mathematics (STEM) courses at the college level. Specifically, there is keen interest in comparing instructional practices between courses, monitoring changes over time, and mapping observed practices to research-based teaching. While increasingly common observation protocols (Reformed Teaching Observation Protocol [RTOP] and Classroom Observation Protocol in Undergraduate STEM [COPUS]) at the postsecondary level help achieve some of these goals, they also suffer from weaknesses that limit their applicability. In this study, we leverage the strengths of these protocols to provide an easy method that enables the reliable and valid characterization of instructional practices. This method was developed empirically via a cluster analysis using observations of 269 individual class periods, corresponding to 73 different faculty members, 28 different research-intensive institutions, and various STEM disciplines. Ten clusters, called COPUS profiles, emerged from this analysis; they represent the most common types of instructional practices enacted in the classrooms observed for this study. RTOP scores were used to validate the alignment of the 10 COPUS profiles with reformed teaching. Herein, we present a detailed description of the cluster analysis method, the COPUS profiles, and the distribution of the COPUS profiles across various STEM courses at research-intensive universities. PMID:25976654

  13. A new protocol for evaluating the efficacy of some dispensing systems of a packaging in the microbial protection of water-based preservative-free cosmetic products.

    PubMed

    Devlieghere, F; De Loy-Hendrickx, A; Rademaker, M; Pipelers, P; Crozier, A; De Baets, B; Joly, L; Keromen, S

    2015-12-01

    A new protocol is described for assessing the efficacy of the dispenser of some packaging systems (PSs) of preservative-free cosmetic products in protecting both their contained formula and their delivered doses. Practically, aiming at mimicking contacts with a non-sterile skin or fingers, the dispensing system is put into contact with a pre-contaminated fabric by a standardized colonization of P. aeruginosa. When applied to three different types of packaging, results show clear differences in both criteria between these conditioning articles, that is variable efficacies in protecting the contained product and the delivered doses, knowing that the first aspect is of paramount importance. The proposed protocol is proved being able to discriminate between different PSs and provides information on strong and weak features of certain types dispensing technologies prone to efficiently decrease either the dose contamination or to prevent contamination in reaching the contained product. Therefore, the proposed protocol can contribute to an objective selection of a PS for protecting a cosmetic care product with a low content of preservative or preservative free. © 2015 Society of Cosmetic Scientists and the Société Française de Cosmétologie.

  14. Surgeon preferences regarding antibiotic prophylaxis for ballistic fractures.

    PubMed

    Marecek, Geoffrey S; Earhart, Jeffrey S; Gardner, Michael J; Davis, Jason; Merk, Bradley R

    2016-06-01

    Scant evidence exists to support antibiotic use for low velocity ballistic fractures (LVBF). We therefore sought to define current practice patterns. We hypothesized that most surgeons prescribe antibiotics for LVBF, prescribing is not driven by institutional protocols, and that decisions are based on protocols utilized for blunt trauma. A web-based questionnaire was emailed to the membership of the Orthopaedic Trauma Association (OTA). The questionnaire included demographic information and questions about LVBF treatment practices. Two hundred and twenty surgeons responded. One hundred and fifty-four (70 %) respondents worked at a Level-1 trauma center, 176 (80 %) had received fellowship education in orthopaedic trauma and 104 (47 %) treated at least 10 ballistic fractures annually. Responses were analyzed with SAS 9.3 for Windows (SAS Institute Inc, Cary, NC). One hundred eighty-six respondents (86 %) routinely provide antibiotics for LVBF. Those who did not were more apt to do so for intra-articular fractures (8/16, 50 %) and pelvic fractures with visceral injury (10/16, 63 %). Most surgeons (167, 76 %) do not believe the Gustilo-Anderson classification applies to ballistic fractures, and (20/29, 70 %) do not base their antibiotic choice on the classification system. Few institutions (58, 26 %) have protocols guiding antibiotic use for LVBF. Routine antibiotic use for LVBF is common; however, practice is not dictated by institutional protocol. Although antibiotic use generally follows current blunt trauma guidelines, surgeons do not base their treatment decisions the Gustilo-Anderson classification. Given the high rate of antibiotic use for LVBF, further study should focus on providing evidence-based treatment guidelines.

  15. Secure Communications

    NASA Astrophysics Data System (ADS)

    Bellac, Michel Le

    2014-11-01

    The first practical application of quantum physics examined in this book is quantum cryptography. Quantum cryptography is a relatively recent invention (it dates back from the mid 1980s) but I chose it because it allows me to illustrate the fundamental principles with a minimum number of intermediate steps. I shall begin with a short summary of classical cryptography, reviewing briefly the two systems which are currently used today: the secret key system and the public key system. Quantum cryptography is not a new method for dissimulating the meaning of a message, but it allows one to be certain that no spy has accessed it. There exist many quantum cryptography protocols and various experimental devices have been proposed for implementing them. The simplest device is based on polarization, a concept which will be introduced first in the case of of light polarization, and then in that of photon polarization. The use of photon polarization gives the simplest implementation of the protocol proposed in 1984 by Bennett and Brassard, which is known by the acronym formed with their initials, the BB84 protocol.

  16. Electronic data collection for the analysis of surgical maneuvers on patients submitted to rhinoplasty

    PubMed Central

    Berger, Cezar; Freitas, Renato; Malafaia, Osvaldo; Pinto, José Simão de Paula; Mocellin, Marcos; Macedo, Evaldo; Fagundes, Marina Serrato Coelho

    2012-01-01

    Summary Introduction: In the health field, computerization has become increasingly necessary in professional practice, since it facilitates data recovery and assists in the development of research with greater scientific rigor. Objective: the present work aimed to develop, apply, and validate specific electronic protocols for patients referred for rhinoplasty. Methods: The prospective research had 3 stages: (1) preparation of theoretical data bases; (2) creation of a master protocol using Integrated System of Electronic Protocol (SINPE©); and (3) elaboration, application, and validation of a specific protocol for the nose and sinuses regarding rhinoplasty. Results: After the preparation of the master protocol, which dealt with the entire field of otorhinolaryngology, we idealized a specific protocol containing all matters related to the patient. In particular, the aesthetic and functional nasal complaints referred for surgical treatment (i.e., rhinoplasty) were organized into 6 main hierarchical categories: anamnesis, physical examination, complementary exams, diagnosis, treatment, and outcome. This protocol utilized these categories and their sub-items: finality; access; surgical maneuvers on the nasal dorsum, tip, and base; clinical evolution after 3, 6, and 12 months; revisional surgery; and quantitative and qualitative evaluations. Conclusion: The developed electronic-specific protocol is feasible and important for information registration from patients referred to rhinoplasty. PMID:25991979

  17. Virtual reality environments for post-stroke arm rehabilitation.

    PubMed

    Subramanian, Sandeep; Knaut, Luiz A; Beaudoin, Christian; McFadyen, Bradford J; Feldman, Anatol G; Levin, Mindy F

    2007-06-22

    Optimal practice and feedback elements are essential requirements for maximal motor recovery in patients with motor deficits due to central nervous system lesions. A virtual environment (VE) was created that incorporates practice and feedback elements necessary for maximal motor recovery. It permits varied and challenging practice in a motivating environment that provides salient feedback. The VE gives the user knowledge of results feedback about motor behavior and knowledge of performance feedback about the quality of pointing movements made in a virtual elevator. Movement distances are related to length of body segments. We describe an immersive and interactive experimental protocol developed in a virtual reality environment using the CAREN system. The VE can be used as a training environment for the upper limb in patients with motor impairments.

  18. Wireless access to a pharmaceutical database: a demonstrator for data driven Wireless Application Protocol (WAP) applications in medical information processing.

    PubMed

    Schacht Hansen, M; Dørup, J

    2001-01-01

    The Wireless Application Protocol technology implemented in newer mobile phones has built-in facilities for handling much of the information processing needed in clinical work. To test a practical approach we ported a relational database of the Danish pharmaceutical catalogue to Wireless Application Protocol using open source freeware at all steps. We used Apache 1.3 web software on a Linux server. Data containing the Danish pharmaceutical catalogue were imported from an ASCII file into a MySQL 3.22.32 database using a Practical Extraction and Report Language script for easy update of the database. Data were distributed in 35 interrelated tables. Each pharmaceutical brand name was given its own card with links to general information about the drug, active substances, contraindications etc. Access was available through 1) browsing therapeutic groups and 2) searching for a brand name. The database interface was programmed in the server-side scripting language PHP3. A free, open source Wireless Application Protocol gateway to a pharmaceutical catalogue was established to allow dial-in access independent of commercial Wireless Application Protocol service providers. The application was tested on the Nokia 7110 and Ericsson R320s cellular phones. We have demonstrated that Wireless Application Protocol-based access to a dynamic clinical database can be established using open source freeware. The project opens perspectives for a further integration of Wireless Application Protocol phone functions in clinical information processing: Global System for Mobile communication telephony for bilateral communication, asynchronous unilateral communication via e-mail and Short Message Service, built-in calculator, calendar, personal organizer, phone number catalogue and Dictaphone function via answering machine technology. An independent Wireless Application Protocol gateway may be placed within hospital firewalls, which may be an advantage with respect to security. However, if Wireless Application Protocol phones are to become effective tools for physicians, special attention must be paid to the limitations of the devices. Input tools of Wireless Application Protocol phones should be improved, for instance by increased use of speech control.

  19. Wireless access to a pharmaceutical database: A demonstrator for data driven Wireless Application Protocol applications in medical information processing

    PubMed Central

    Hansen, Michael Schacht

    2001-01-01

    Background The Wireless Application Protocol technology implemented in newer mobile phones has built-in facilities for handling much of the information processing needed in clinical work. Objectives To test a practical approach we ported a relational database of the Danish pharmaceutical catalogue to Wireless Application Protocol using open source freeware at all steps. Methods We used Apache 1.3 web software on a Linux server. Data containing the Danish pharmaceutical catalogue were imported from an ASCII file into a MySQL 3.22.32 database using a Practical Extraction and Report Language script for easy update of the database. Data were distributed in 35 interrelated tables. Each pharmaceutical brand name was given its own card with links to general information about the drug, active substances, contraindications etc. Access was available through 1) browsing therapeutic groups and 2) searching for a brand name. The database interface was programmed in the server-side scripting language PHP3. Results A free, open source Wireless Application Protocol gateway to a pharmaceutical catalogue was established to allow dial-in access independent of commercial Wireless Application Protocol service providers. The application was tested on the Nokia 7110 and Ericsson R320s cellular phones. Conclusions We have demonstrated that Wireless Application Protocol-based access to a dynamic clinical database can be established using open source freeware. The project opens perspectives for a further integration of Wireless Application Protocol phone functions in clinical information processing: Global System for Mobile communication telephony for bilateral communication, asynchronous unilateral communication via e-mail and Short Message Service, built-in calculator, calendar, personal organizer, phone number catalogue and Dictaphone function via answering machine technology. An independent Wireless Application Protocol gateway may be placed within hospital firewalls, which may be an advantage with respect to security. However, if Wireless Application Protocol phones are to become effective tools for physicians, special attention must be paid to the limitations of the devices. Input tools of Wireless Application Protocol phones should be improved, for instance by increased use of speech control. PMID:11720946

  20. Toward the modelling of safety violations in healthcare systems.

    PubMed

    Catchpole, Ken

    2013-09-01

    When frontline staff do not adhere to policies, protocols, or checklists, managers often regard these violations as indicating poor practice or even negligence. More often than not, however, these policy and protocol violations reflect the efforts of well intentioned professionals to carry out their work efficiently in the face of systems poorly designed to meet the diverse demands of patient care. Thus, non-compliance with institutional policies and protocols often signals a systems problem, rather than a people problem, and can be influenced among other things by training, competing goals, context, process, location, case complexity, individual beliefs, the direct or indirect influence of others, job pressure, flexibility, rule definition, and clinician-centred design. Three candidates are considered for developing a model of safety behaviour and decision making. The dynamic safety model helps to understand the relationship between systems designs and human performance. The theory of planned behaviour suggests that intention is a function of attitudes, social norms and perceived behavioural control. The naturalistic decision making paradigm posits that decisions are based on a wider view of multiple patients, expertise, systems complexity, behavioural intention, individual beliefs and current understanding of the system. Understanding and predicting behavioural safety decisions could help us to encourage compliance to current processes and to design better interventions.

  1. Finite-data-size study on practical universal blind quantum computation

    NASA Astrophysics Data System (ADS)

    Zhao, Qiang; Li, Qiong

    2018-07-01

    The universal blind quantum computation with weak coherent pulses protocol is a practical scheme to allow a client to delegate a computation to a remote server while the computation hidden. However, in the practical protocol, a finite data size will influence the preparation efficiency in the remote blind qubit state preparation (RBSP). In this paper, a modified RBSP protocol with two decoy states is studied in the finite data size. The issue of its statistical fluctuations is analyzed thoroughly. The theoretical analysis and simulation results show that two-decoy-state case with statistical fluctuation is closer to the asymptotic case than the one-decoy-state case with statistical fluctuation. Particularly, the two-decoy-state protocol can achieve a longer communication distance than the one-decoy-state case in this statistical fluctuation situation.

  2. Pace: Privacy-Protection for Access Control Enforcement in P2P Networks

    NASA Astrophysics Data System (ADS)

    Sánchez-Artigas, Marc; García-López, Pedro

    In open environments such as peer-to-peer (P2P) systems, the decision to collaborate with multiple users — e.g., by granting access to a resource — is hard to achieve in practice due to extreme decentralization and the lack of trusted third parties. The literature contains a plethora of applications in which a scalable solution for distributed access control is crucial. This fact motivates us to propose a protocol to enforce access control, applicable to networks consisting entirely of untrusted nodes. The main feature of our protocol is that it protects both sensitive permissions and sensitive policies, and does not rely on any centralized authority. We analyze the efficiency (computational effort and communication overhead) as well as the security of our protocol.

  3. Development and Application of a Structural Health Monitoring System Based on Wireless Smart Aggregates

    PubMed Central

    Ma, Haoyan; Li, Peng; Song, Gangbing; Wu, Jianxin

    2017-01-01

    Structural health monitoring (SHM) systems can improve the safety and reliability of structures, reduce maintenance costs, and extend service life. Research on concrete SHMs using piezoelectric-based smart aggregates have reached great achievements. However, the newly developed techniques have not been widely applied in practical engineering, largely due to the wiring problems associated with large-scale structural health monitoring. The cumbersome wiring requires much material and labor work, and more importantly, the associated maintenance work is also very heavy. Targeting a practical large scale concrete crack detection (CCD) application, a smart aggregates-based wireless sensor network system is proposed for the CCD application. The developed CCD system uses Zigbee 802.15.4 protocols, and is able to perform dynamic stress monitoring, structural impact capturing, and internal crack detection. The system has been experimentally validated, and the experimental results demonstrated the effectiveness of the proposed system. This work provides important support for practical CCD applications using wireless smart aggregates. PMID:28714927

  4. Development and Application of a Structural Health Monitoring System Based on Wireless Smart Aggregates.

    PubMed

    Yan, Shi; Ma, Haoyan; Li, Peng; Song, Gangbing; Wu, Jianxin

    2017-07-17

    Structural health monitoring (SHM) systems can improve the safety and reliability of structures, reduce maintenance costs, and extend service life. Research on concrete SHMs using piezoelectric-based smart aggregates have reached great achievements. However, the newly developed techniques have not been widely applied in practical engineering, largely due to the wiring problems associated with large-scale structural health monitoring. The cumbersome wiring requires much material and labor work, and more importantly, the associated maintenance work is also very heavy. Targeting a practical large scale concrete crack detection (CCD) application, a smart aggregates-based wireless sensor network system is proposed for the CCD application. The developed CCD system uses Zigbee 802.15.4 protocols, and is able to perform dynamic stress monitoring, structural impact capturing, and internal crack detection. The system has been experimentally validated, and the experimental results demonstrated the effectiveness of the proposed system. This work provides important support for practical CCD applications using wireless smart aggregates.

  5. MANEMO Routing in Practice: Protocol Selection, Expected Performance, and Experimental Evaluation

    NASA Astrophysics Data System (ADS)

    Tazaki, Hajime; van Meter, Rodney; Wakikawa, Ryuji; Wongsaardsakul, Thirapon; Kanchanasut, Kanchana; Dias de Amorim, Marcelo; Murai, Jun

    Motivated by the deployment of post-disaster MANEMO (MANET for NEMO) composed of mobile routers and stations, we evaluate two candidate routing protocols through network simulation, theoretical performance analysis, and field experiments. The first protocol is the widely adopted Optimized Link State Routing protocol (OLSR) and the second is the combination of the Tree Discovery Protocol (TDP) with Network In Node Advertisement (NINA). To the best of our knowledge, this is the first time that these two protocols are compared in both theoretical and practical terms. We focus on the control overhead generated when mobile routers perform a handover. Our results confirm the correctness and operational robustness of both protocols. More interestingly, although in the general case OLSR leads to better results, TDP/NINA outperforms OLSR both in the case of sparse networks and in highly mobile networks, which correspond to the operation point of a large set of post-disaster scenarios.

  6. SU-E-I-68: Practical Considerations On Implementation of the Image Gently Pediatric CT Protocols

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhang, J; Adams, C; Lumby, C

    Purpose: One limitation associated with the Image Gently pediatric CT protocols is practical implementation of the recommended manual techniques. Inconsistency as a result of different practice is a possibility among technologist. An additional concern is the added risk of data error that would result in over or underexposure. The Automatic Exposure Control (AEC) features automatically reduce radiation for children. However, they do not work efficiently for the patients of very small size and relative large size. This study aims to implement the Image Gently pediatric CT protocols in the practical setting while maintaining the use of AEC features for pediatricmore » patients of varying size. Methods: Anthropomorphological abdomen phantoms were scanned in a CT scanner using the Image Gently pediatric protocols, the AEC technique with a fixed adult baseline, and automatic protocols with various baselines. The baselines were adjusted corresponding to patient age, weight and posterioranterior thickness to match the Image Gently pediatric CT manual techniques. CTDIvol was recorded for each examination. Image noise was measured and recorded for image quality comparison. Clinical images were evaluated by pediatric radiologists. Results: By adjusting vendor default baselines used in the automatic techniques, radiation dose and image quality can match those of the Image Gently manual techniques. In practice, this can be achieved by dividing pediatric patients into three major groups for technologist reference: infant, small child, and large child. Further division can be done but will increase the number of CT protocols. For each group, AEC can efficiently adjust acquisition techniques for children. This implementation significantly overcomes the limitation of the Image Gently manual techniques. Conclusion: Considering the effectiveness in clinical practice, Image Gently Pediatric CT protocols can be implemented in accordance with AEC techniques, with adjusted baselines, to achieve the goal of providing the most appropriate radiation dose for pediatric patients of varying sizes.« less

  7. Training Engineers for the Ambient Intelligence Challenge

    ERIC Educational Resources Information Center

    Corno, Fulvio; De Russis, Luigi

    2017-01-01

    The increasing complexity of the new breed of distributed intelligent systems, such as the Internet of Things, which require a diversity of languages and protocols, can only be tamed with design and programming best practices. Interest is also growing for including the human factor, as advocated by the "ambient intelligence" (AmI)…

  8. Sizing Single Cantilever Beam Specimens for Characterizing Facesheet/Core Peel Debonding in Sandwich Structure

    NASA Technical Reports Server (NTRS)

    Ratcliffe, James G.

    2010-01-01

    This technical publication details part of an effort focused on the development of a standardized facesheet/core peel debonding test procedure. The purpose of the test is to characterize facesheet/core peel in sandwich structure, accomplished through the measurement of the critical strain energy release rate associated with the debonding process. Following an examination of previously developed tests and a recent evaluation of a selection of these methods, a single cantilever beam (SCB) specimen was identified as being a promising candidate for establishing such a standardized test procedure. The objective of the work described here was to begin development of a protocol for conducting a SCB test that will render the procedure suitable for standardization. To this end, a sizing methodology was developed to ensure appropriate SCB specimen dimensions are selected for a given sandwich system. Application of this method to actual sandwich systems yielded SCB specimen dimensions that would be practical for use. This study resulted in the development of a practical SCB specimen sizing method, which should be well-suited for incorporation into a standardized testing protocol.

  9. How will greenhouse gas observations meet changing requirements, laws, and demands?

    NASA Astrophysics Data System (ADS)

    Butler, J. H.; Tans, P. P.; Sweeney, C.; Andrews, A. E.; Miller, J. B.; Montzka, S. A.

    2010-12-01

    Recent efforts to develop a global greenhouse gas information system (GHGIS) have been driven by an anticipated need to support future national emission reduction policies or international treaties with observations. Such an effort would be similar to that done in support of the Montreal Protocol on Substances that Deplete Ozone, but more complex. However, greenhouse gas emissions are much more difficult to manage and may not be controlled by international agreement. The Kyoto Protocol has been fraught with political and practical difficulties, not the least of which is the absence of an independent observation and analysis requirement. Nevertheless, no unifying agreement was reached at the much heralded 2009 Conference of Parties (COP-15) in Copenhagen. Thus, it is quite possible (likely?) that greenhouse gas emissions may be reduced owing to other, uncoordinated policies that have their own merits, e.g., energy efficiency, alternative energy development, air quality improvement, forest development, agricultural practices, etc. If this is the future, then what observations and observation system design are needed and to what end? This presentation will discuss those needs in light of critical observations, analytical approaches, and evolving, disparate policies.

  10. Standards-Based Wireless Sensor Networking Protocols for Spaceflight Applications

    NASA Technical Reports Server (NTRS)

    Wagner, Raymond S.

    2010-01-01

    Wireless sensor networks (WSNs) have the capacity to revolutionize data gathering in both spaceflight and terrestrial applications. WSNs provide a huge advantage over traditional, wired instrumentation since they do not require wiring trunks to connect sensors to a central hub. This allows for easy sensor installation in hard to reach locations, easy expansion of the number of sensors or sensing modalities, and reduction in both system cost and weight. While this technology offers unprecedented flexibility and adaptability, implementing it in practice is not without its difficulties. Recent advances in standards-based WSN protocols for industrial control applications have come a long way to solving many of the challenges facing practical WSN deployments. In this paper, we will overview two of the more promising candidates - WirelessHART from the HART Communication Foundation and ISA100.11a from the International Society of Automation - and present the architecture for a new standards-based sensor node for networking and applications research.

  11. Practical Computer Security through Cryptography

    NASA Technical Reports Server (NTRS)

    McNab, David; Twetev, David (Technical Monitor)

    1998-01-01

    The core protocols upon which the Internet was built are insecure. Weak authentication and the lack of low level encryption services introduce vulnerabilities that propagate upwards in the network stack. Using statistics based on CERT/CC Internet security incident reports, the relative likelihood of attacks via these vulnerabilities is analyzed. The primary conclusion is that the standard UNIX BSD-based authentication system is by far the most commonly exploited weakness. Encryption of Sensitive password data and the adoption of cryptographically-based authentication protocols can greatly reduce these vulnerabilities. Basic cryptographic terminology and techniques are presented, with attention focused on the ways in which technology such as encryption and digital signatures can be used to protect against the most commonly exploited vulnerabilities. A survey of contemporary security software demonstrates that tools based on cryptographic techniques, such as Kerberos, ssh, and PGP, are readily available and effectively close many of the most serious security holes. Nine practical recommendations for improving security are described.

  12. Phase-encoded measurement device independent quantum key distribution without a shared reference frame

    NASA Astrophysics Data System (ADS)

    Zhuo-Dan, Zhu; Shang-Hong, Zhao; Chen, Dong; Ying, Sun

    2018-07-01

    In this paper, a phase-encoded measurement device independent quantum key distribution (MDI-QKD) protocol without a shared reference frame is presented, which can generate secure keys between two parties while the quantum channel or interferometer introduces an unknown and slowly time-varying phase. The corresponding secret key rate and single photons bit error rate is analysed, respectively, with single photons source (SPS) and weak coherent source (WCS), taking finite-key analysis into account. The numerical simulations show that the modified phase-encoded MDI-QKD protocol has apparent superiority both in maximal secure transmission distance and key generation rate while possessing the improved robustness and practical security in the high-speed case. Moreover, the rejection of the frame-calibrating part will intrinsically reduce the consumption of resources as well as the potential security flaws of practical MDI-QKD systems.

  13. 76 FR 55841 - Extension of Comment Period for Notice of Proposed Rulemaking on Changes in Requirements for...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-09

    ... and the Rules of Practice for Filings Pursuant to the Madrid Protocol to permit the USPTO to require... Rules of Practice (37 CFR part 2) and the Rules of Practice for Filings Pursuant to the Madrid Protocol (``Madrid Rules'') (37 CFR part 7) to provide for the USPTO to require: (1) Any information, exhibits, and...

  14. Supporting Tablet Configuration, Tracking, and Infection Control Practices in Digital Health Interventions: Study Protocol

    PubMed Central

    Furberg, Robert D; Zulkiewicz, Brittany A; Hudson, Jordan P; Taylor, Olivia M; Lewis, Megan A

    2016-01-01

    Background Tablet-based health care interventions have the potential to encourage patient care in a timelier manner, allow physicians convenient access to patient records, and provide an improved method for patient education. However, along with the continued adoption of tablet technologies, there is a concomitant need to develop protocols focusing on the configuration, management, and maintenance of these devices within the health care setting to support the conduct of clinical research. Objective Develop three protocols to support tablet configuration, tablet management, and tablet maintenance. Methods The Configurator software, Tile technology, and current infection control recommendations were employed to develop three distinct protocols for tablet-based digital health interventions. Configurator is a mobile device management software specifically for iPhone operating system (iOS) devices. The capabilities and current applications of Configurator were reviewed and used to develop the protocol to support device configuration. Tile is a tracking tag associated with a free mobile app available for iOS and Android devices. The features associated with Tile were evaluated and used to develop the Tile protocol to support tablet management. Furthermore, current recommendations on preventing health care–related infections were reviewed to develop the infection control protocol to support tablet maintenance. Results This article provides three protocols: the Configurator protocol, the Tile protocol, and the infection control protocol. Conclusions These protocols can help to ensure consistent implementation of tablet-based interventions, enhance fidelity when employing tablets for research purposes, and serve as a guide for tablet deployments within clinical settings. PMID:27350013

  15. Study of consensus-based time synchronization in wireless sensor networks.

    PubMed

    He, Jianping; Li, Hao; Chen, Jiming; Cheng, Peng

    2014-03-01

    Recently, various consensus-based protocols have been developed for time synchronization in wireless sensor networks. However, due to the uncertainties lying in both the hardware fabrication and network communication processes, it is not clear how most of the protocols will perform in real implementations. In order to reduce such gap, this paper investigates whether and how the typical consensus-based time synchronization protocols can tolerate the uncertainties in practical sensor networks through extensive testbed experiments. For two typical protocols, i.e., Average Time Synchronization (ATS) and Maximum Time Synchronization (MTS), we first analyze how the time synchronization accuracy will be affected by various uncertainties in the system. Then, we implement both protocols on our sensor network testbed consisted of Micaz nodes, and investigate the time synchronization performance and robustness under various network settings. Noticing that the synchronized clocks under MTS may be slightly faster than the desirable clock, by adopting both maximum consensus and minimum consensus, we propose a modified protocol, MMTS, which is able to drive the synchronized clocks closer to the desirable clock while maintaining the convergence rate and synchronization accuracy of MTS. © 2013 ISA. Published by ISA. All rights reserved.

  16. Design and Practical Evaluation of a Family of Lightweight Protocols for Heterogeneous Sensing through BLE Beacons in IoT Telemetry Applications.

    PubMed

    Hernández-Rojas, Dixys L; Fernández-Caramés, Tiago M; Fraga-Lamas, Paula; Escudero, Carlos J

    2017-12-27

    The Internet of Things (IoT) involves a wide variety of heterogeneous technologies and resource-constrained devices that interact with each other. Due to such constraints, IoT devices usually require lightweight protocols that optimize the use of resources and energy consumption. Among the different commercial IoT devices, Bluetooth and Bluetooth Low Energy (BLE)-based beacons, which broadcast periodically certain data packets to notify their presence, have experienced a remarkable growth, specially due to their application in indoor positioning systems. This article proposes a family of protocols named Lightweight Protocol for Sensors (LP4S) that provides fast responses and enables plug-and-play mechanisms that allow IoT telemetry systems to discover new nodes and to describe and auto-register the sensors and actuators connected to a beacon. Thus, three protocols are defined depending on the beacon hardware characteristics: LP4S-6 (for resource-constraint beacons), LP4S-X (for more powerful beacons) and LP4S-J (for beacons able to run complex firmware). In order to demonstrate the capabilities of the designed protocols, the most restrictive (LP4S-6) is tested after implementing it for a telemetry application in a beacon based on Eddystone (Google's open beacon format). Thus, the beacon specification is extended in order to increase its ability to manage unlimited sensors in a telemetry system without interfering in its normal operation with Eddystone frames. The performed experiments show the feasibility of the proposed solution and its superiority, in terms of latency and energy consumption, with respect to approaches based on Generic Attribute Profile (GATT) when multiple users connect to a mote or in scenarios where latency is not a restriction, but where low-energy consumption is essential.

  17. Design and Practical Evaluation of a Family of Lightweight Protocols for Heterogeneous Sensing through BLE Beacons in IoT Telemetry Applications

    PubMed Central

    2017-01-01

    The Internet of Things (IoT) involves a wide variety of heterogeneous technologies and resource-constrained devices that interact with each other. Due to such constraints, IoT devices usually require lightweight protocols that optimize the use of resources and energy consumption. Among the different commercial IoT devices, Bluetooth and Bluetooth Low Energy (BLE)-based beacons, which broadcast periodically certain data packets to notify their presence, have experienced a remarkable growth, specially due to their application in indoor positioning systems. This article proposes a family of protocols named Lightweight Protocol for Sensors (LP4S) that provides fast responses and enables plug-and-play mechanisms that allow IoT telemetry systems to discover new nodes and to describe and auto-register the sensors and actuators connected to a beacon. Thus, three protocols are defined depending on the beacon hardware characteristics: LP4S-6 (for resource-constraint beacons), LP4S-X (for more powerful beacons) and LP4S-J (for beacons able to run complex firmware). In order to demonstrate the capabilities of the designed protocols, the most restrictive (LP4S-6) is tested after implementing it for a telemetry application in a beacon based on Eddystone (Google’s open beacon format). Thus, the beacon specification is extended in order to increase its ability to manage unlimited sensors in a telemetry system without interfering in its normal operation with Eddystone frames. The performed experiments show the feasibility of the proposed solution and its superiority, in terms of latency and energy consumption, with respect to approaches based on Generic Attribute Profile (GATT) when multiple users connect to a mote or in scenarios where latency is not a restriction, but where low-energy consumption is essential. PMID:29280975

  18. An adaptation method to improve secret key rates of time-frequency QKD in atmospheric turbulence channels

    NASA Astrophysics Data System (ADS)

    Sun, Xiaole; Djordjevic, Ivan B.; Neifeld, Mark A.

    2016-03-01

    Free-space optical (FSO) channels can be characterized by random power fluctuations due to atmospheric turbulence, which is known as scintillation. Weak coherent source based FSO quantum key distribution (QKD) systems suffer from the scintillation effect because during the deep channel fading the expected detection rate drops, which then gives an eavesdropper opportunity to get additional information about protocol by performing photon number splitting (PNS) attack and blocking single-photon pulses without changing QBER. To overcome this problem, in this paper, we study a large-alphabet QKD protocol, which is achieved by using pulse-position modulation (PPM)-like approach that utilizes the time-frequency uncertainty relation of the weak coherent photon state, called here TF-PPM-QKD protocol. We first complete finite size analysis for TF-PPM-QKD protocol to give practical bounds against non-negligible statistical fluctuation due to finite resources in practical implementations. The impact of scintillation under strong atmospheric turbulence regime is studied then. To overcome the secure key rate performance degradation of TF-PPM-QKD caused by scintillation, we propose an adaptation method for compensating the scintillation impact. By changing source intensity according to the channel state information (CSI), obtained by classical channel, the adaptation method improves the performance of QKD system with respect to the secret key rate. The CSI of a time-varying channel can be predicted using stochastic models, such as autoregressive (AR) models. Based on the channel state predictions, we change the source intensity to the optimal value to achieve a higher secret key rate. We demonstrate that the improvement of the adaptation method is dependent on the prediction accuracy.

  19. Safety risks with investigational drugs: Pharmacy practices and perceptions in the veterans affairs health system.

    PubMed

    Cruz, Jennifer L; Brown, Jamie N

    2015-06-01

    Rigorous practices for safe dispensing of investigational drugs are not standardized. This investigation sought to identify error-prevention processes utilized in the provision of investigational drug services (IDS) and to characterize pharmacists' perceptions about safety risks posed by investigational drugs. An electronic questionnaire was distributed to an audience of IDS pharmacists within the Veteran Affairs Health System. Multiple facets were examined including demographics, perceptions of medication safety, and standard processes used to support investigational drug protocols. Twenty-one respondents (32.8% response rate) from the Northeast, Midwest, South, West, and Non-contiguous United States participated. The mean number of pharmacist full-time equivalents (FTEs) dedicated to the IDS was 0.77 per site with 0.2 technician FTEs. The mean number of active protocols was 22. Seventeen respondents (81%) indicated some level of concern for safety risks. Concerns related to the packaging of medications were expressed, most notably lack of product differentiation, expiration dating, barcodes, and choice of font size or color. Regarding medication safety practices, the majority of sites had specific procedures in place for storing and securing drug supply, temperature monitoring, and prescription labeling. Repackaging bulk items and proactive error-identification strategies were less common. Sixty-seven percent of respondents reported that an independent double check was not routinely performed. Medication safety concerns exist among pharmacists in an investigational drug service; however, a variety of measures have been employed to improve medication safety practices. Best practices for the safe dispensing of investigational medications should be developed in order to standardize these error-prevention strategies.

  20. Safety risks with investigational drugs: Pharmacy practices and perceptions in the veterans affairs health system

    PubMed Central

    Brown, Jamie N.

    2015-01-01

    Objectives: Rigorous practices for safe dispensing of investigational drugs are not standardized. This investigation sought to identify error-prevention processes utilized in the provision of investigational drug services (IDS) and to characterize pharmacists’ perceptions about safety risks posed by investigational drugs. Methods: An electronic questionnaire was distributed to an audience of IDS pharmacists within the Veteran Affairs Health System. Multiple facets were examined including demographics, perceptions of medication safety, and standard processes used to support investigational drug protocols. Results: Twenty-one respondents (32.8% response rate) from the Northeast, Midwest, South, West, and Non-contiguous United States participated. The mean number of pharmacist full-time equivalents (FTEs) dedicated to the IDS was 0.77 per site with 0.2 technician FTEs. The mean number of active protocols was 22. Seventeen respondents (81%) indicated some level of concern for safety risks. Concerns related to the packaging of medications were expressed, most notably lack of product differentiation, expiration dating, barcodes, and choice of font size or color. Regarding medication safety practices, the majority of sites had specific procedures in place for storing and securing drug supply, temperature monitoring, and prescription labeling. Repackaging bulk items and proactive error-identification strategies were less common. Sixty-seven percent of respondents reported that an independent double check was not routinely performed. Conclusions: Medication safety concerns exist among pharmacists in an investigational drug service; however, a variety of measures have been employed to improve medication safety practices. Best practices for the safe dispensing of investigational medications should be developed in order to standardize these error-prevention strategies. PMID:26240744

  1. Evaluation of sexual history-based screening of anatomic sites for chlamydia trachomatis and neisseria gonorrhoeae infection in men having sex with men in routine practice.

    PubMed

    Peters, Remco P H; Verweij, Stephan P; Nijsten, Noëmi; Ouburg, Sander; Mutsaers, Johan; Jansen, Casper L; van Leeuwen, A Petra; Morré, Servaas A

    2011-07-26

    Sexually transmitted infection (STI) screening programmes are implemented in many countries to decrease burden of STI and to improve sexual health. Screening for Chlamydia trachomatis and Neisseria gonorrhoeae has a prominent role in these protocols. Most of the screening programmes concerning men having sex with men (MSM) are based on opportunistic urethral testing. In The Netherlands, a history-based approach is used. The aim of this study is to evaluate the protocol of screening anatomic sites for C. trachomatis and N. gonorrhoeae infection based on sexual history in MSM in routine practice in The Netherlands. All MSM visiting the clinic for STI in The Hague are routinely asked about their sexual practice during consulting. As per protocol, tests for urogenital, oropharyngeal and anorectal infection are obtained based on reported site(s) of sexual contact. All consultations are entered into a database as part of the national STI monitoring system. Data of an 18 months period were retrieved from this database and analysed. A total of 1455 consultations in MSM were registered during the study period. The prevalence of C. trachomatis and N. gonorrhoeae per anatomic site was: urethral infection 4.0% respectively and 2.8%, oropharynx 1.5% and 4.2%, and anorectum 8.2% and 6.0%. The majority of chlamydia cases (72%) involved a single anatomic site, which was especially manifest for anorectal infections (79%), while 42% of gonorrhoea cases were single site. Twenty-six percent of MSM with anorectal chlamydia and 17% with anorectal gonorrhoea reported symptoms of proctitis; none of the oropharyngeal infections were symptomatic. Most cases of anorectal infection (83%) and oropharyngeal infection (100%) would have remained undiagnosed with a symptom-based protocol. The current strategy of sexual-history based screening of multiple anatomic sites for chlamydia and gonorrhoea in MSM is a useful and valid guideline which is to be preferred over a symptom-based screening protocol.

  2. Practical Quantum Private Database Queries Based on Passive Round-Robin Differential Phase-shift Quantum Key Distribution.

    PubMed

    Li, Jian; Yang, Yu-Guang; Chen, Xiu-Bo; Zhou, Yi-Hua; Shi, Wei-Min

    2016-08-19

    A novel quantum private database query protocol is proposed, based on passive round-robin differential phase-shift quantum key distribution. Compared with previous quantum private database query protocols, the present protocol has the following unique merits: (i) the user Alice can obtain one and only one key bit so that both the efficiency and security of the present protocol can be ensured, and (ii) it does not require to change the length difference of the two arms in a Mach-Zehnder interferometer and just chooses two pulses passively to interfere with so that it is much simpler and more practical. The present protocol is also proved to be secure in terms of the user security and database security.

  3. [Identification of difficulties at the beginning of breastfeeding by means of protocol application].

    PubMed

    Carvalhaes, Maria Antonieta de Barros Leite; Corrêa, Cláudia Regina Hostin

    2003-01-01

    To assess a group of mothers/newborns with the necessity of special support at the beginning of breastfeeding by means of protocol application recommended by UNICEF and to verify assisting practices associated with difficulties of breastfeeding.\\par In this descriptive study, the sample comprised 50 mother/newborn pairs randomly selected in a maternity where low risk deliveries are cared by SUS (Brazilian Unified Health System). The breastfeeding observation protocol was used to record the behavior of each pair, including the frequency of negative behavior regarding breastfeeding. Next, each aspect was scored as good, regular or poor. The association between negative scores and particular assisting practices was also investigated. A critical level of p < 0.05 was used.\\par The frequency of pairs presenting evidence of severe problems (poor score) at the beginning of breastfeeding ranged from 2% to 22% according to the aspects assessed. The most frequently observed difficulties were mother and infant's bad positioning during breastfeeding and inappropriate mother/newborn interaction. These problems were significantly more frequent after surgical deliveries (p < 0.05). Milk formula and/or glucose solution was also associated with the worst scores in some breastfeeding aspects. \\par The protocol application to observe and evaluate breastfeeding identified a high prevalence of mothers/newborn pairs with difficulties to begin breastfeeding, especially when the delivery was surgically performed and when the newborn was offered supplementary liquids.

  4. Preservice Teachers' Teacher Efficacy Beliefs and Constructivist-Based Teaching Practice

    ERIC Educational Resources Information Center

    Temiz, Tugba; Topcu, Mustafa Sami

    2013-01-01

    The purpose of this paper is to explore the relationship between preservice teachers' (PTs) teacher efficacy beliefs and their constructivist-based teaching practices. Data were gathered through the questionnaire (Teachers' Sense of Efficacy Scale) and the observation protocol (Reformed Teaching Observation Protocol) administered to the…

  5. Quantum and classical noise in practical quantum-cryptography systems based on polarization-entangled photons

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Castelletto, S.; Degiovanni, I.P.; Rastello, M.L.

    2003-02-01

    Quantum-cryptography key distribution (QCKD) experiments have been recently reported using polarization-entangled photons. However, in any practical realization, quantum systems suffer from either unwanted or induced interactions with the environment and the quantum measurement system, showing up as quantum and, ultimately, statistical noise. In this paper, we investigate how an ideal polarization entanglement in spontaneous parametric down-conversion (SPDC) suffers quantum noise in its practical implementation as a secure quantum system, yielding errors in the transmitted bit sequence. Since all SPDC-based QCKD schemes rely on the measurement of coincidence to assert the bit transmission between the two parties, we bundle up themore » overall quantum and statistical noise in an exhaustive model to calculate the accidental coincidences. This model predicts the quantum-bit error rate and the sifted key and allows comparisons between different security criteria of the hitherto proposed QCKD protocols, resulting in an objective assessment of performances and advantages of different systems.« less

  6. Towards Interactive Medical Content Delivery Between Simulated Body Sensor Networks and Practical Data Center.

    PubMed

    Shi, Xiaobo; Li, Wei; Song, Jeungeun; Hossain, M Shamim; Mizanur Rahman, Sk Md; Alelaiwi, Abdulhameed

    2016-10-01

    With the development of IoT (Internet of Thing), big data analysis and cloud computing, traditional medical information system integrates with these new technologies. The establishment of cloud-based smart healthcare application gets more and more attention. In this paper, semi-physical simulation technology is applied to cloud-based smart healthcare system. The Body sensor network (BSN) of system transmit has two ways of data collection and transmission. The one is using practical BSN to collect data and transmitting it to the data center. The other is transmitting real medical data to practical data center by simulating BSN. In order to transmit real medical data to practical data center by simulating BSN under semi-physical simulation environment, this paper designs an OPNET packet structure, defines a gateway node model between simulating BSN and practical data center and builds a custom protocol stack. Moreover, this paper conducts a large amount of simulation on the real data transmission through simulation network connecting with practical network. The simulation result can provides a reference for parameter settings of fully practical network and reduces the cost of devices and personnel involved.

  7. Global Land Product Validation Protocols: An Initiative of the CEOS Working Group on Calibration and Validation to Evaluate Satellite-derived Essential Climate Variables

    NASA Astrophysics Data System (ADS)

    Guillevic, P. C.; Nickeson, J. E.; Roman, M. O.; camacho De Coca, F.; Wang, Z.; Schaepman-Strub, G.

    2016-12-01

    The Global Climate Observing System (GCOS) has specified the need to systematically produce and validate Essential Climate Variables (ECVs). The Committee on Earth Observation Satellites (CEOS) Working Group on Calibration and Validation (WGCV) and in particular its subgroup on Land Product Validation (LPV) is playing a key coordination role leveraging the international expertise required to address actions related to the validation of global land ECVs. The primary objective of the LPV subgroup is to set standards for validation methods and reporting in order to provide traceable and reliable uncertainty estimates for scientists and stakeholders. The Subgroup is comprised of 9 focus areas that encompass 10 land surface variables. The activities of each focus area are coordinated by two international co-leads and currently include leaf area index (LAI) and fraction of absorbed photosynthetically active radiation (FAPAR), vegetation phenology, surface albedo, fire disturbance, snow cover, land cover and land use change, soil moisture, land surface temperature (LST) and emissivity. Recent additions to the focus areas include vegetation indices and biomass. The development of best practice validation protocols is a core activity of CEOS LPV with the objective to standardize the evaluation of land surface products. LPV has identified four validation levels corresponding to increasing spatial and temporal representativeness of reference samples used to perform validation. Best practice validation protocols (1) provide the definition of variables, ancillary information and uncertainty metrics, (2) describe available data sources and methods to establish reference validation datasets with SI traceability, and (3) describe evaluation methods and reporting. An overview on validation best practice components will be presented based on the LAI and LST protocol efforts to date.

  8. Therapeutic hypothermia for neonatal encephalopathy: JSPNM & MHLW Japan Working Group Practice Guidelines Consensus Statement from the Working Group on Therapeutic Hypothermia for Neonatal Encephalopathy, Ministry of Health, Labor and Welfare (MHLW), Japan, and Japan Society for Perinatal and Neonatal Medicine (JSPNM).

    PubMed

    Takenouchi, Toshiki; Iwata, Osuke; Nabetani, Makoto; Tamura, Masanori

    2012-02-01

    Neonatal encephalopathy (NE) secondary to intrapartum asphyxia remains a major cause of post-natal death and permanent neurological deficits worldwide. Supportive therapy has been the mainstay of the treatment until recent series of large clinical trials demonstrating benefit of therapeutic hypothermia (TH) in this high risk population. Now the International Liaison Committee on Resuscitation (ILCOR) recommends TH as a standard of care with the protocols used in the large clinical trials as tentative standard protocols. Our goal is to develop a nationwide consensus practice guideline not only consistent with the international standard protocols but also practical and compatible with the current medical system in Japan. In summary, TH should be offered to newborn infants born ≥36 weeks gestational age and birth weight ≥1800 g exhibiting clinical signs of moderate to severe NE as well as evidence of hypoxia-ischemia, i.e. 10 min Apgar score ≤5, a need for resuscitation at 10 min, blood pH<7.00, or base deficit ≥16 mmol/L. TH should be conducted in the NICUs capable of multidisciplinary care and under the standard protocols, i.e. utilization of cooling device, target (rectal or esophageal) temperatures at 33.5±0.5 and 34.5±0.5°C for whole body and selective head cooling respectively, duration of TH for 72 h, gradual rewarming not exceeding the rate of 0.5°C/h. Long term follow-up with multidisciplinary approach including standardized psychological assessment is warranted. Copyright © 2011 The Japanese Society of Child Neurology. Published by Elsevier B.V. All rights reserved.

  9. Optimal control of complex atomic quantum systems

    PubMed Central

    van Frank, S.; Bonneau, M.; Schmiedmayer, J.; Hild, S.; Gross, C.; Cheneau, M.; Bloch, I.; Pichler, T.; Negretti, A.; Calarco, T.; Montangero, S.

    2016-01-01

    Quantum technologies will ultimately require manipulating many-body quantum systems with high precision. Cold atom experiments represent a stepping stone in that direction: a high degree of control has been achieved on systems of increasing complexity. However, this control is still sub-optimal. In many scenarios, achieving a fast transformation is crucial to fight against decoherence and imperfection effects. Optimal control theory is believed to be the ideal candidate to bridge the gap between early stage proof-of-principle demonstrations and experimental protocols suitable for practical applications. Indeed, it can engineer protocols at the quantum speed limit – the fastest achievable timescale of the transformation. Here, we demonstrate such potential by computing theoretically and verifying experimentally the optimal transformations in two very different interacting systems: the coherent manipulation of motional states of an atomic Bose-Einstein condensate and the crossing of a quantum phase transition in small systems of cold atoms in optical lattices. We also show that such processes are robust with respect to perturbations, including temperature and atom number fluctuations. PMID:27725688

  10. Optimal control of complex atomic quantum systems.

    PubMed

    van Frank, S; Bonneau, M; Schmiedmayer, J; Hild, S; Gross, C; Cheneau, M; Bloch, I; Pichler, T; Negretti, A; Calarco, T; Montangero, S

    2016-10-11

    Quantum technologies will ultimately require manipulating many-body quantum systems with high precision. Cold atom experiments represent a stepping stone in that direction: a high degree of control has been achieved on systems of increasing complexity. However, this control is still sub-optimal. In many scenarios, achieving a fast transformation is crucial to fight against decoherence and imperfection effects. Optimal control theory is believed to be the ideal candidate to bridge the gap between early stage proof-of-principle demonstrations and experimental protocols suitable for practical applications. Indeed, it can engineer protocols at the quantum speed limit - the fastest achievable timescale of the transformation. Here, we demonstrate such potential by computing theoretically and verifying experimentally the optimal transformations in two very different interacting systems: the coherent manipulation of motional states of an atomic Bose-Einstein condensate and the crossing of a quantum phase transition in small systems of cold atoms in optical lattices. We also show that such processes are robust with respect to perturbations, including temperature and atom number fluctuations.

  11. La-CTP: Loop-Aware Routing for Energy-Harvesting Wireless Sensor Networks

    PubMed Central

    Sun, Guodong; Shang, Xinna; Zuo, Yan

    2018-01-01

    In emerging energy-harvesting wireless sensor networks (EH-WSN), the sensor nodes can harvest environmental energy to drive their operation, releasing the user’s burden in terms of frequent battery replacement, and even enabling perpetual sensing systems. In EH-WSN applications, usually, the node in energy-harvesting or recharging state has to stop working until it completes the energy replenishment. However, such temporary departures of recharging nodes severely impact the packet routing, and one immediate result is the routing loop problem. Controlling loops in connectivity-intermittent EH-WSN in an efficient way is a big challenge in practice, and so far, users still lack of effective and practicable routing protocols with loop handling. Based on the Collection Tree Protocol (CTP) widely used in traditional wireless sensor networks, this paper proposes a loop-aware routing protocol for real-world EH-WSNs, called La-CTP, which involves a new parent updating metric and a proactive, adaptive beaconing scheme to effectively suppress the occurrence of loops and unlock unavoidable loops, respectively. We constructed a 100-node testbed to evaluate La-CTP, and the experimental results showed its efficacy and efficiency. PMID:29393876

  12. OVERVIEW, PRACTICAL TIPS AND POTENTIAL PITFALLS OF USING AUTOMATIC EXPOSURE CONTROL IN CT: SIEMENS CARE DOSE 4D.

    PubMed

    Söderberg, Marcus

    2016-06-01

    Today, computed tomography (CT) systems routinely use automatic exposure control (AEC), which modulates the tube current. However, for optimal use, there are several aspects of an AEC system that need to be considered. The purpose of this study was to provide an overview of the Siemens CARE Dose 4D AEC system, discuss practical tips and demonstrate potential pitfalls. Two adult anthropomorphic phantoms were examined using two different Siemens CT systems. When optimising the CT radiation dose and image quality, the projection angle of the localiser, patient centring, protocol selection, scanning direction and the use of protective devices requires special attention. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  13. Emissions trading: principles and practice. 2nd

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Tietenberg, T.H.

    2006-02-15

    The author demonstrates how emissions trading became an attractive alternative to command-and-control policies that would have required the EPA to disallow the opening of new plants in the middle of the recession-burdened 1970s. His examination of the evolution of this system includes, among other applications, the largest multinational trading system ever conceived, the European Union's Greenhouse Gas Emission Trading Scheme (EUETG), and the use of emissions trading in the Kyoto Protocol.

  14. Aggregating quantum repeaters for the quantum internet

    NASA Astrophysics Data System (ADS)

    Azuma, Koji; Kato, Go

    2017-09-01

    The quantum internet holds promise for accomplishing quantum teleportation and unconditionally secure communication freely between arbitrary clients all over the globe, as well as the simulation of quantum many-body systems. For such a quantum internet protocol, a general fundamental upper bound on the obtainable entanglement or secret key has been derived [K. Azuma, A. Mizutani, and H.-K. Lo, Nat. Commun. 7, 13523 (2016), 10.1038/ncomms13523]. Here we consider its converse problem. In particular, we present a universal protocol constructible from any given quantum network, which is based on running quantum repeater schemes in parallel over the network. For arbitrary lossy optical channel networks, our protocol has no scaling gap with the upper bound, even based on existing quantum repeater schemes. In an asymptotic limit, our protocol works as an optimal entanglement or secret-key distribution over any quantum network composed of practical channels such as erasure channels, dephasing channels, bosonic quantum amplifier channels, and lossy optical channels.

  15. National best management practices monitoring summary report, program phase-in period fiscal years 2013-2014

    Treesearch

    Joan Carlson; Pam Edwards; Todd Ellsworth; Michael Eberle

    2015-01-01

    The National BMP Program provides National Core BMPs, standardized monitoring protocols to evaluate implementation and effectiveness of the National Core BMPs, and a data management system to store and analyze the resulting monitoring data. BMP evaluations are completed by interdisciplinary teams of resource specialists and include assessments of whether BMP...

  16. The Contextual Nature of Scientists' Views of Theories, Experimentation, and Their Coordination

    ERIC Educational Resources Information Center

    Sandoval, William A.; Redman, Elizabeth H.

    2015-01-01

    Practicing scientists' views of science recently have become a topic of interest to nature of science researchers. Using an interview protocol developed by Carey and Smith that assumes respondents' views cohere into a single belief system, we asked 15 research chemists to discuss their views of theories and experimentation. Respondents expressed a…

  17. Fever management in the emergency department of the Children's Hospital of Fudan University: a best practice implementation project.

    PubMed

    Hu, Fei; Zhang, Jiayan; Shi, Shupeng; Zhou, Zhang

    2016-09-01

    Febrile illness in young children usually indicates an underlying infection and is a cause of concern for parents and carers. It is very important that healthcare professionals know how to recognize fever, assess children with fever, treat children with fever and role of nurses and parents. This paper outlines a best practice implementation project on the management of fever in children in an emergency department. To audit current practice of fever management for children in an emergency department and to implement strategies to standardize pediatric fever management based on evidence-based practice guidelines. We used the Joanna Briggs Institute's Practical Application of Clinical Evidence System and Getting Research into Practice to examine compliance with fever management criteria based on the best available evidence before and after the implementation of strategies to spread the use of evidence-based practice protocols. We found significant improvements in pediatric fever management as measured by the knowledge scores of parents (54.5-83.7) and nurses (67.6-90.3). This suggested a need for continuous education. We found a noticeable improvement in compliance across all the five criteria; using correct methods to measure temperature (86-98%), staff education (0-100%), parents education (0-100%), using assessment tools (0-100%) and observed management (0-98%). This best practice implementation project demonstrated the use of effective strategies to standardize the protocol for fever management, implement assessment tool, develop multimedia materials, deliver continuous staff education and update nursing documentation and patient education pamphlets to ensure best practice is delivered by nurses to improve patient outcomes.

  18. From workshop to work practice: An exploration of context and facilitation in the development of evidence-based practice.

    PubMed

    Ellis, Isabelle; Howard, Peter; Larson, Ann; Robertson, Jeanette

    2005-01-01

    This article examines the process of translating evidence into practice using a facilitation model developed by the Western Australian Centre for Evidence Based Nursing and Midwifery. Using the conceptual framework Promoting Action on Research Implementation in Health Services (PARIHS), the aims of the study were (1) to explore the relative and combined importance of context and facilitation in the successful implementation of a new evidence-based clinical practice protocol and (2) to examine the establishment of more lasting change to individuals and organizations that resulted in greater incorporation of the principles of evidence-based practice (EBP). A pre-workshop, semi-structured telephone survey with 16 nurse managers in six rural hospitals; a summative evaluation immediately post-workshop with 54 participants; and follow-up, semi-structured interviews with 23 workshop participants. The contexts in each of the participating hospitals were very different; of the six hospitals, only one had not implemented the new protocol. Five had reviewed their practices and brought them in line with the protocol developed at the workshop. The rate of adoption varied considerably from 2 weeks to months. The participants reported being better informed about EBP in general and were positive about their ability to improve their practice and search more efficiently for best practice information. Underlying motivations for protocol development should be included in the PARIHS framework. IMPLICATIONS FOR EDUCATION: Good facilitation appears to be more influential than context in overcoming the barriers to the uptake of EBP.

  19. Development of the Diabetes Technology Society Blood Glucose Monitor System Surveillance Protocol

    PubMed Central

    Klonoff, David C.; Lias, Courtney; Beck, Stayce; Parkes, Joan Lee; Kovatchev, Boris; Vigersky, Robert A.; Arreaza-Rubin, Guillermo; Burk, Robert D.; Kowalski, Aaron; Little, Randie; Nichols, James; Petersen, Matt; Rawlings, Kelly; Sacks, David B.; Sampson, Eric; Scott, Steve; Seley, Jane Jeffrie; Slingerland, Robbert; Vesper, Hubert W.

    2015-01-01

    Background: Inaccurate blood glucsoe monitoring systems (BGMSs) can lead to adverse health effects. The Diabetes Technology Society (DTS) Surveillance Program for cleared BGMSs is intended to protect people with diabetes from inaccurate, unreliable BGMS products that are currently on the market in the United States. The Surveillance Program will provide an independent assessment of the analytical performance of cleared BGMSs. Methods: The DTS BGMS Surveillance Program Steering Committee included experts in glucose monitoring, surveillance testing, and regulatory science. Over one year, the committee engaged in meetings and teleconferences aiming to describe how to conduct BGMS surveillance studies in a scientifically sound manner that is in compliance with good clinical practice and all relevant regulations. Results: A clinical surveillance protocol was created that contains performance targets and analytical accuracy-testing studies with marketed BGMS products conducted by qualified clinical and laboratory sites. This protocol entitled “Protocol for the Diabetes Technology Society Blood Glucose Monitor System Surveillance Program” is attached as supplementary material. Conclusion: This program is needed because currently once a BGMS product has been cleared for use by the FDA, no systematic postmarket Surveillance Program exists that can monitor analytical performance and detect potential problems. This protocol will allow identification of inaccurate and unreliable BGMSs currently available on the US market. The DTS Surveillance Program will provide BGMS manufacturers a benchmark to understand the postmarket analytical performance of their products. Furthermore, patients, health care professionals, payers, and regulatory agencies will be able to use the results of the study to make informed decisions to, respectively, select, prescribe, finance, and regulate BGMSs on the market. PMID:26481642

  20. Development of the Diabetes Technology Society Blood Glucose Monitor System Surveillance Protocol.

    PubMed

    Klonoff, David C; Lias, Courtney; Beck, Stayce; Parkes, Joan Lee; Kovatchev, Boris; Vigersky, Robert A; Arreaza-Rubin, Guillermo; Burk, Robert D; Kowalski, Aaron; Little, Randie; Nichols, James; Petersen, Matt; Rawlings, Kelly; Sacks, David B; Sampson, Eric; Scott, Steve; Seley, Jane Jeffrie; Slingerland, Robbert; Vesper, Hubert W

    2016-05-01

    Inaccurate blood glucsoe monitoring systems (BGMSs) can lead to adverse health effects. The Diabetes Technology Society (DTS) Surveillance Program for cleared BGMSs is intended to protect people with diabetes from inaccurate, unreliable BGMS products that are currently on the market in the United States. The Surveillance Program will provide an independent assessment of the analytical performance of cleared BGMSs. The DTS BGMS Surveillance Program Steering Committee included experts in glucose monitoring, surveillance testing, and regulatory science. Over one year, the committee engaged in meetings and teleconferences aiming to describe how to conduct BGMS surveillance studies in a scientifically sound manner that is in compliance with good clinical practice and all relevant regulations. A clinical surveillance protocol was created that contains performance targets and analytical accuracy-testing studies with marketed BGMS products conducted by qualified clinical and laboratory sites. This protocol entitled "Protocol for the Diabetes Technology Society Blood Glucose Monitor System Surveillance Program" is attached as supplementary material. This program is needed because currently once a BGMS product has been cleared for use by the FDA, no systematic postmarket Surveillance Program exists that can monitor analytical performance and detect potential problems. This protocol will allow identification of inaccurate and unreliable BGMSs currently available on the US market. The DTS Surveillance Program will provide BGMS manufacturers a benchmark to understand the postmarket analytical performance of their products. Furthermore, patients, health care professionals, payers, and regulatory agencies will be able to use the results of the study to make informed decisions to, respectively, select, prescribe, finance, and regulate BGMSs on the market. © 2015 Diabetes Technology Society.

  1. MR efficiency using automated MRI-desktop eProtocol

    NASA Astrophysics Data System (ADS)

    Gao, Fei; Xu, Yanzhe; Panda, Anshuman; Zhang, Min; Hanson, James; Su, Congzhe; Wu, Teresa; Pavlicek, William; James, Judy R.

    2017-03-01

    MRI protocols are instruction sheets that radiology technologists use in routine clinical practice for guidance (e.g., slice position, acquisition parameters etc.). In Mayo Clinic Arizona (MCA), there are over 900 MR protocols (ranging across neuro, body, cardiac, breast etc.) which makes maintaining and updating the protocol instructions a labor intensive effort. The task is even more challenging given different vendors (Siemens, GE etc.). This is a universal problem faced by all the hospitals and/or medical research institutions. To increase the efficiency of the MR practice, we designed and implemented a web-based platform (eProtocol) to automate the management of MRI protocols. It is built upon a database that automatically extracts protocol information from DICOM compliant images and provides a user-friendly interface to the technologists to create, edit and update the protocols. Advanced operations such as protocol migrations from scanner to scanner and capability to upload Multimedia content were also implemented. To the best of our knowledge, eProtocol is the first MR protocol automated management tool used clinically. It is expected that this platform will significantly improve the radiology operations efficiency including better image quality and exam consistency, fewer repeat examinations and less acquisition errors. These protocols instructions will be readily available to the technologists during scans. In addition, this web-based platform can be extended to other imaging modalities such as CT, Mammography, and Interventional Radiology and different vendors for imaging protocol management.

  2. Relativistic quantum private database queries

    NASA Astrophysics Data System (ADS)

    Sun, Si-Jia; Yang, Yu-Guang; Zhang, Ming-Ou

    2015-04-01

    Recently, Jakobi et al. (Phys Rev A 83, 022301, 2011) suggested the first practical private database query protocol (J-protocol) based on the Scarani et al. (Phys Rev Lett 92, 057901, 2004) quantum key distribution protocol. Unfortunately, the J-protocol is just a cheat-sensitive private database query protocol. In this paper, we present an idealized relativistic quantum private database query protocol based on Minkowski causality and the properties of quantum information. Also, we prove that the protocol is secure in terms of the user security and the database security.

  3. Practical Quantum Private Database Queries Based on Passive Round-Robin Differential Phase-shift Quantum Key Distribution

    PubMed Central

    Li, Jian; Yang, Yu-Guang; Chen, Xiu-Bo; Zhou, Yi-Hua; Shi, Wei-Min

    2016-01-01

    A novel quantum private database query protocol is proposed, based on passive round-robin differential phase-shift quantum key distribution. Compared with previous quantum private database query protocols, the present protocol has the following unique merits: (i) the user Alice can obtain one and only one key bit so that both the efficiency and security of the present protocol can be ensured, and (ii) it does not require to change the length difference of the two arms in a Mach-Zehnder interferometer and just chooses two pulses passively to interfere with so that it is much simpler and more practical. The present protocol is also proved to be secure in terms of the user security and database security. PMID:27539654

  4. Sedation, sleep promotion, and delirium screening practices in the care of mechanically ventilated children: a wake-up call for the pediatric critical care community*.

    PubMed

    Kudchadkar, Sapna R; Yaster, Myron; Punjabi, Naresh M

    2014-07-01

    To examine pediatric intensivist sedation management, sleep promotion, and delirium screening practices for intubated and mechanically ventilated children. An international, online survey of questions regarding sedative and analgesic medication choices and availability, sedation protocols, sleep optimization, and delirium recognition and treatment. Member societies of the World Federation of Pediatric Intensive and Critical Care Societies were asked to send the survey to their mailing lists; responses were collected from July 2012 to January 2013. Pediatric critical care providers. Survey. The survey was completed by 341 respondents, the majority of whom were from North America (70%). Twenty-seven percent of respondents reported having written sedation protocols. Most respondents worked in PICUs with sedation scoring systems (70%), although only 42% of those with access to scoring systems reported routine daily use for goal-directed sedation management. The State Behavioral Scale was the most commonly used scoring system in North America (22%), with the COMFORT score more prevalent in all other countries (39%). The most commonly used sedation regimen for intubated children was a combination of opioid and benzodiazepine (72%). Most intensivists chose fentanyl as their first-line opioid (66%) and midazolam as their first-line benzodiazepine (86%) and prefer to administer these medications as continuous infusions. Propofol and dexmedetomidine were the most commonly restricted medications in PICUs internationally. Use of earplugs, eye masks, noise reduction, and lighting optimization for sleep promotion was uncommon. Delirium screening was not practiced in 71% of respondent's PICUs, and only 2% reported routine screening at least twice a day. The results highlight the heterogeneity in sedation practices among intensivists who care for critically ill children as well as a paucity of sleep promotion and delirium screening in PICUs worldwide.

  5. Description and effects of sequential behavior practice in teacher education.

    PubMed

    Sharpe, T; Lounsbery, M; Bahls, V

    1997-09-01

    This study examined the effects of a sequential behavior feedback protocol on the practice-teaching experiences of undergraduate teacher trainees. The performance competencies of teacher trainees were analyzed using an alternative opportunities for appropriate action measure. Data support the added utility of sequential (Sharpe, 1997a, 1997b) behavior analysis information in systematic observation approaches to teacher education. One field-based undergraduate practicum using sequential behavior (i.e., field systems analysis) principles was monitored. Summarized are the key elements of the (a) classroom instruction provided as a precursor to the practice teaching experience, (b) practice teaching experience, and (c) field systems observation tool used for evaluation and feedback, including multiple-baseline data (N = 4) to support this approach to teacher education. Results point to (a) the strong relationship between sequential behavior feedback and the positive change in four preservice teachers' day-to-day teaching practices in challenging situational contexts, and (b) the relationship between changes in teacher practices and positive changes in the behavioral practices of gymnasium pupils. Sequential behavior feedback was also socially validated by the undergraduate participants and Professional Development School teacher supervisors in the study.

  6. Breast reconstruction with tissue expanders: implementation of a standardized best-practices protocol to reduce infection rates.

    PubMed

    Khansa, Ibrahim; Hendrick, Russell G; Shore, Alison; Meyerson, Joseph; Yang, Maelee; Boehmler, James H

    2014-07-01

    Periprosthetic infection remains a frustrating and costly complication of breast reconstruction with tissue expanders. Although some specific steps have been previously shown to reduce periprosthetic infections, no comprehensive protocol addressing all aspects of preoperative, intraoperative, and postoperative patient management has been evaluated in the literature. The authors' goal was to evaluate the effectiveness of their protocol at reducing periprosthetic infections. A comprehensive, best-practices protocol was introduced and implemented in November of 2010. All patients undergoing breast reconstruction using tissue expanders at the authors' institution in the 5 years before the protocol, and in the 2 years after, were analyzed. Three hundred five patients underwent 456 tissue expander reconstructions in the 5 years before the protocol, and 198 patients underwent 313 reconstructions in the 2 years after. Significantly fewer patients developed periprosthetic infection after protocol (11.6 percent versus 18.4 percent; p=0.042), and the number of infected tissue expanders trended toward a decrease (9.3 percent versus 13.2 percent; p=0.097). On multivariate analysis, the protocol significantly reduced the odds of periprosthetic infection (OR, 0.45; p=0.022). Predictors of infection included obesity (OR, 2.01; p=0.045) and preoperative breast size larger than C cup (OR, 2.83; p=0.006). The authors' comprehensive, best-practices protocol allowed them to reduce the odds of tissue expander infections by 55 percent (OR, 0.45; p=0.022). The authors were able to identify several potential areas of improvement that may help them lower the rate of infection further in the future. Therapeutic, III.

  7. Movement towards transdiagnostic psychotherapeutic practices for the affective disorders.

    PubMed

    Gros, Daniel F; Allan, Nicholas P; Szafranski, Derek D

    2016-08-01

    Evidence-based cognitive behavioural therapy (CBT) practices were first developed in the 1960s. Over the decades, refinements and alternative symptom foci resulted in the development of several CBT protocols/manuals for each of the many disorders, especially in the affective disorders. Although shown to be effective in highly trained providers, the proliferation of CBT protocols also has shown to demonstrate challenges in dissemination and implementation efforts due to the sheer number of CBT protocols and their related training requirements (eg, 6 months per protocol) and their related cost (eg, over US$2000 each; lost days/hours at work). To address these concerns, newer transdiagnostic CBT protocols have been developed to reduce the number of disorder-specific CBT protocols needed to treat patients with affective disorders. Transdiagnostic treatments are based on the notion that various disorder-specific CBT protocols contain important but overlapping treatment components that can be distilled into a single treatment and therefore address the symptoms and comorbidities across all of the disorders at once. 3 examples of transdiagnostic treatments include group CBT of anxiety, unified protocol for transdiagnostic treatment for emotional disorders and transdiagnostic behaviour therapy. Each transdiagnostic protocol is designed for a different set of disorders, contains a varied amount of CBT treatment components and is tested in different types of samples. However, together, these 3 transdiagnostic psychotherapies represent the future of CBT practice. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  8. Diagnostic and Therapeutic Knowledge and Practices in the Management of Congenital Syphilis by Pediatricians in Public Maternity Hospitals in Brazil.

    PubMed

    Dos Santos, Raquel Rodrigues; Niquini, Roberta Pereira; Bastos, Francisco Inácio; Domingues, Rosa Maria Soares Madeira

    2017-01-01

    The study aimed to assess conformity with Brazil's standard protocol for diagnostic and therapeutic practices in the management of congenital syphilis by pediatricians in public maternity hospitals. A cross-sectional study was conducted in 2015 with 41 pediatricians working in all the public maternity hospitals in Teresina, the capital of Piauí State, Northeast Brazil, through self-completed questionnaires. The study assessed the conformity of knowledge and practices according to the Brazilian Ministry of Health protocols. The study has made evident low access to training courses (54%) and insufficient knowledge of the case definition of congenital syphilis (42%) and rapid tests for syphilis (39%). Flaws were observed in the diagnostic workup and treatment of newborns. Requesting VDRL (88%) and correct treatment of neurosyphilis (88%) were the practices that showed the highest conformity with standard protocols. Low conformity with protocols leads to missed opportunities for identifying and adequately treating congenital syphilis. Based on the barriers identified in the study, better access to diagnostic and treatment protocols, improved recording on prenatal cards and hospital patient charts, availability of tests and medicines, and educational work with pregnant women should be urgently implemented, aiming to reverse the currently inadequate management of congenital syphilis and to curb its spread.

  9. An investigation into the bacterial contamination of goniolenses in use in clinical practice.

    PubMed

    Grundon, Rachael; Scurrell, Emma; Mould, John; Hayton-Lee, Emma; Heinrich, Christine

    2017-12-18

    Objectives To report the incidence and evaluate the clinical significance of goniolens bacterial contamination in clinical use in dogs with three different usage protocols and one with an added cleaning protocol. Animals Studied and Methods Three groups of twenty dogs undergoing gonioscopy at a private practice in the UK had the goniolenses swabbed for bacteriology culture and identification prior to placement on the cornea. Three protocols of lens use, with 2 different types of goniolens, were studied. One protocol was then repeated with 21 dogs with a lens cleaning protocol prior to storage. Results Low levels of bacterial contamination were found in all 3 initial groups (10-15%). No correlation was found between usage protocol used and rate of contamination and no correlation was found between length of storage between use and contamination. All bacteria cultured were considered naturally occurring commensals for the canine eye and environment. The group with a cleaning protocol had a 4.7% contamination rate. This was not statistically different from the non-cleaning groups. Conclusions The rate of bacterial contamination of goniolenses in clinical practice is low and the bacterial contaminants consist of commensal bacteria, unlikely to be of detriment to the eye. Minimal contamination of the goniolenses was found and this did not appear to be of clinical significance. The introduction of a simple cleaning protocol did not produce a statistically significant reduction in bacterial contamination. © 2017 American College of Veterinary Ophthalmologists.

  10. Upgrading physical activity counselling in primary care in the Netherlands.

    PubMed

    Verwey, Renée; van der Weegen, Sanne; Spreeuwenberg, Marieke; Tange, Huibert; van der Weijden, Trudy; de Witte, Luc

    2016-06-01

    The systematic development of a counselling protocol in primary care combined with a monitoring and feedback tool to support chronically ill patients to achieve a more active lifestyle. An iterative user-centred design method was used to develop a counselling protocol: the Self-management Support Programme (SSP). The needs and preferences of future users of this protocol were identified by analysing the literature, through qualitative research, and by consulting an expert panel. The counselling protocol is based on the Five A's model. Practice nurses apply motivational interviewing, risk communication and goal setting to support self-management of patients in planning how to achieve a more active lifestyle. The protocol consists of a limited number of behaviour change consultations intertwined with interaction with and responses from the It's LiFe! monitoring and feedback tool. This tool provides feedback on patients' physical activity levels via an app on their smartphone. A summary of these levels is automatically sent to the general practice so that practice nurses can respond to this information. A SSP to stimulate physical activity was defined based on user requirements of care providers and patients, followed by a review by a panel of experts. By following this user-centred approach, the organization of care was carefully taken into account, which has led to a practical and affordable protocol for physical activity counselling combined with mobile technology. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  11. Explanation of the Nagoya Protocol on Access and Benefit Sharing and its implication for microbiology.

    PubMed

    Smith, David; da Silva, Manuela; Jackson, Julian; Lyal, Christopher

    2017-03-01

    Working with genetic resources and associated data requires greater attention since the Nagoya Protocol on Access and Benefit Sharing (ABS) came into force in October 2014. Biologists must ensure that they have legal clarity in how they can and cannot use the genetic resources on which they carry out research. Not only must they work within the spirit in the Convention on Biological Diversity (https://www.cbd.int/convention/articles/default.shtml?a=cbd-02) but also they may have regulatory requirements to meet. Although the Nagoya Protocol was negotiated and agreed globally, it is the responsibility of each country that ratifies it to introduce their individual implementing procedures and practices. Many countries in Europe, such as the UK, have chosen not to put access controls in place at this time, but others already have laws enacted providing ABS measures under the Convention on Biological Diversity or specifically to implement the Nagoya Protocol. Access legislation is in place in many countries and information on this can be found at the ABS Clearing House (https://absch.cbd.int/). For example, Brazil, although not a Party to the Nagoya Protocol at the time of writing, has Law 13.123 which entered into force on 17 November 2015, regulated by Decree 8.772 which was published on 11 May 2016. In this case, export of Brazilian genetic resources is not allowed unless the collector is registered in the National System for Genetic Heritage and Associated Traditional Knowledge Management (SisGen). The process entails that a foreign scientist must first of all be registered working with someone in Brazil and have authorization to collect. The enactment of European Union Regulation po. 511/2014 implements Nagoya Protocol elements that govern compliance measures for users and offers the opportunity to demonstrate due diligence in sourcing their organisms by selecting from holdings of 'registered collections'. The UK has introduced a Statutory Instrument that puts in place enforcement measures within the UK to implement this European Union Regulation; this is regulated by Regulatory Delivery, Department for Business, Energy and Industrial Strategies. Scientific communities, including the private sector, individual institutions and organizations, have begun to design policy and best practices for compliance. Microbiologists and culture collections alike need to be aware of the legislation of the source country of the materials they use and put in place best practices for compliance; such best practice has been drafted by the Microbial Resource Research Infrastructure, and other research communities such as the Consortium of European Taxonomic Facilities, the Global Genome Biodiversity Network and the International Organisation for Biological Control have published best practice and/or codes of conduct to ensure legitimate exchange and use of genetic resources.

  12. Efficiency Improvement in a Busy Radiology Practice: Determination of Musculoskeletal Magnetic Resonance Imaging Protocol Using Deep-Learning Convolutional Neural Networks.

    PubMed

    Lee, Young Han

    2018-04-04

    The purposes of this study are to evaluate the feasibility of protocol determination with a convolutional neural networks (CNN) classifier based on short-text classification and to evaluate the agreements by comparing protocols determined by CNN with those determined by musculoskeletal radiologists. Following institutional review board approval, the database of a hospital information system (HIS) was queried for lists of MRI examinations, referring department, patient age, and patient gender. These were exported to a local workstation for analyses: 5258 and 1018 consecutive musculoskeletal MRI examinations were used for the training and test datasets, respectively. The subjects for pre-processing were routine or tumor protocols and the contents were word combinations of the referring department, region, contrast media (or not), gender, and age. The CNN Embedded vector classifier was used with Word2Vec Google news vectors. The test set was tested with each classification model and results were output as routine or tumor protocols. The CNN determinations were evaluated using the receiver operating characteristic (ROC) curves. The accuracies were evaluated by a radiologist-confirmed protocol as the reference protocols. The optimal cut-off values for protocol determination between routine protocols and tumor protocols was 0.5067 with a sensitivity of 92.10%, a specificity of 95.76%, and an area under curve (AUC) of 0.977. The overall accuracy was 94.2% for the ConvNet model. All MRI protocols were correct in the pelvic bone, upper arm, wrist, and lower leg MRIs. Deep-learning-based convolutional neural networks were clinically utilized to determine musculoskeletal MRI protocols. CNN-based text learning and applications could be extended to other radiologic tasks besides image interpretations, improving the work performance of the radiologist.

  13. Image registration for a UV-Visible dual-band imaging system

    NASA Astrophysics Data System (ADS)

    Chen, Tao; Yuan, Shuang; Li, Jianping; Xing, Sheng; Zhang, Honglong; Dong, Yuming; Chen, Liangpei; Liu, Peng; Jiao, Guohua

    2018-06-01

    The detection of corona discharge is an effective way for early fault diagnosis of power equipment. UV-Visible dual-band imaging can detect and locate corona discharge spot at all-weather condition. In this study, we introduce an image registration protocol for this dual-band imaging system. The protocol consists of UV image denoising and affine transformation model establishment. We report the algorithm details of UV image preprocessing, affine transformation model establishment and relevant experiments for verification of their feasibility. The denoising algorithm was based on a correlation operation between raw UV images, a continuous mask and the transformation model was established by using corner feature and a statistical method. Finally, an image fusion test was carried out to verify the accuracy of affine transformation model. It has proved the average position displacement error between corona discharge and equipment fault at different distances in a 2.5m-20 m range are 1.34 mm and 1.92 mm in the horizontal and vertical directions, respectively, which are precise enough for most industrial applications. The resultant protocol is not only expected to improve the efficiency and accuracy of such imaging system for locating corona discharge spot, but also supposed to provide a more generalized reference for the calibration of various dual-band imaging systems in practice.

  14. Integration of a Computer-Based Consultant into the Clinical Setting*

    PubMed Central

    Bischoff, Miriam B.; Shortliffe, Edward H.

    1983-01-01

    Studies of the attitudes of medical personnel regarding computer-based clinical consultation systems have shown that successful programs must be designed not only to satisfy a need for expert level advice but also to fit smoothly into the dally routine of physician/users. Planning for system use should accordingly be emphasized in all aspects of the system design. ONCOCIN is an oncology protocol management system that assists physicians with the management of outpatients enrolled in experimental cancer chemotherapy protocols. ONCOCIN was designed for initial implementation in the Stanford Oncology Day Care Center, where it has been in limited use since May of 1981. The clinic's physicians currently use the system dally in the management of patients with Hodgkin's and non-Hodgkin's lymphoma. This work has allowed us to study physician-computer interaction and to explore artificial intelligence research issues. This paper discusses the practical issues to consider when designing a consultation system for physicians and the logistical issues to address when integrating such a system into a clinic setting. We describe how ONCOCIN has addressed these issues, the problems encountered, their resolution, and the lessons learned.

  15. Living better with dementia: strengths-based social work practice and dementia care.

    PubMed

    McGovern, Justine

    2015-01-01

    This article first argues that quality of life is possible despite the onset of dementia in late life. It also demonstrates how core concepts of social work practice, such as family systems theory, the strengths perspective, and use of self, can be applied to practice with dementia-affected persons. In addition, it provides practical suggestions for supporting care partners in nurturing "we-ness", focusing on what remains rather than was is lost, and remaining authentic. When strengths-based social work practice is integrated into dementia care protocols, wellbeing can increase. As a result, the more than 40 million persons worldwide who are affected by dementia do not have to resign themselves to the despair, devastation and inevitable demise of quality of life that dominate perception of the illness.

  16. Quantum private query based on single-photon interference

    NASA Astrophysics Data System (ADS)

    Xu, Sheng-Wei; Sun, Ying; Lin, Song

    2016-08-01

    Quantum private query (QPQ) has become a research hotspot recently. Specially, the quantum key distribution (QKD)-based QPQ attracts lots of attention because of its practicality. Various such kind of QPQ protocols have been proposed based on different technologies of quantum communications. Single-photon interference is one of such technologies, on which the famous QKD protocol GV95 is just based. In this paper, we propose two QPQ protocols based on single-photon interference. The first one is simpler and easier to realize, and the second one is loss tolerant and flexible, and more practical than the first one. Furthermore, we analyze both the user privacy and the database privacy in the proposed protocols.

  17. Speech transport for packet telephony and voice over IP

    NASA Astrophysics Data System (ADS)

    Baker, Maurice R.

    1999-11-01

    Recent advances in packet switching, internetworking, and digital signal processing technologies have converged to allow realizable practical implementations of packet telephony systems. This paper provides a tutorial on transmission engineering for packet telephony covering the topics of speech coding/decoding, speech packetization, packet data network transport, and impairments which may negatively impact end-to-end system quality. Particular emphasis is placed upon Voice over Internet Protocol given the current popularity and ubiquity of IP transport.

  18. Practical implementation of multilevel quantum cryptography

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kulik, S. P.; Maslennikov, G. A.; Moreva, E. V.

    2006-05-15

    The physical principles of a quantum key distribution protocol using four-level optical systems are discussed. Quantum information is encoded into polarization states created by frequency-nondegenerate spontaneous parametric down-conversion in collinear geometry. In the scheme under analysis, the required nonorthogonal states are generated in a single nonlinear crystal. All states in the selected basis are measured deterministically. The results of initial experiments on transformation of the basis polarization states of a four-level optical system are discussed.

  19. A Practical Approach to Implementing Real-Time Semantics

    NASA Technical Reports Server (NTRS)

    Luettgen, Gerald; Bhat, Girish; Cleaveland, Rance

    1999-01-01

    This paper investigates implementations of process algebras which are suitable for modeling concurrent real-time systems. It suggests an approach for efficiently implementing real-time semantics using dynamic priorities. For this purpose a proces algebra with dynamic priority is defined, whose semantics corresponds one-to-one to traditional real-time semantics. The advantage of the dynamic-priority approach is that it drastically reduces the state-space sizes of the systems in question while preserving all properties of their functional and real-time behavior. The utility of the technique is demonstrated by a case study which deals with the formal modeling and verification of the SCSI-2 bus-protocol. The case study is carried out in the Concurrency Workbench of North Carolina, an automated verification tool in which the process algebra with dynamic priority is implemented. It turns out that the state space of the bus-protocol model is about an order of magnitude smaller than the one resulting from real-time semantics. The accuracy of the model is proved by applying model checking for verifying several mandatory properties of the bus protocol.

  20. The Aeronautical Data Link: Taxonomy, Architectural Analysis, and Optimization

    NASA Technical Reports Server (NTRS)

    Morris, A. Terry; Goode, Plesent W.

    2002-01-01

    The future Communication, Navigation, and Surveillance/Air Traffic Management (CNS/ATM) System will rely on global satellite navigation, and ground-based and satellite based communications via Multi-Protocol Networks (e.g. combined Aeronautical Telecommunications Network (ATN)/Internet Protocol (IP)) to bring about needed improvements in efficiency and safety of operations to meet increasing levels of air traffic. This paper will discuss the development of an approach that completely describes optimal data link architecture configuration and behavior to meet the multiple conflicting objectives of concurrent and different operations functions. The practical application of the approach enables the design and assessment of configurations relative to airspace operations phases. The approach includes a formal taxonomic classification, an architectural analysis methodology, and optimization techniques. The formal taxonomic classification provides a multidimensional correlation of data link performance with data link service, information protocol, spectrum, and technology mode; and to flight operations phase and environment. The architectural analysis methodology assesses the impact of a specific architecture configuration and behavior on the local ATM system performance. Deterministic and stochastic optimization techniques maximize architectural design effectiveness while addressing operational, technology, and policy constraints.

  1. Copper- and copper–N-heterocyclic carbene-catalyzed C─H activating carboxylation of terminal alkynes with CO2 at ambient conditions

    PubMed Central

    Yu, Dingyi; Zhang, Yugen

    2010-01-01

    The use of carbon dioxide as a renewable and environmentally friendly source of carbon in organic synthesis is a highly attractive approach, but its real world applications remain a great challenge. The major obstacles for commercialization of most current protocols are their low catalytic performances, harsh reaction conditions, and limited substrate scope. It is important to develop new reactions and new protocols for CO2 transformations at mild conditions and in cost-efficient ways. Herein, a copper-catalyzed and copper–N-heterocyclic carbene-cocatalyzed transformation of CO2 to carboxylic acids via C─H bond activation of terminal alkynes with or without base additives is reported. Various propiolic acids were synthesized in good to excellent yields under ambient conditions without consumption of any organometallic or organic reagent additives. This system has a wide scope of substrates and functional group tolerances and provides a powerful tool for the synthesis of highly functionalized propiolic acids. This catalytic system is a simple and economically viable protocol with great potential in practical applications. PMID:21059950

  2. Motor imagery practice for improving sit to stand and reaching to grasp in individuals with poststroke hemiparesis.

    PubMed

    Guttman, Avia; Burstin, Arie; Brown, Riki; Bril, Shai; Dickstein, Ruth

    2012-01-01

    Motor imagery practice refers to the mental rehearsal of motor acts in the absence of actual movement production. To evaluate the effect of motor imagery practice on the performance of sit to stand (STS) and reaching to grasp in subjects with post stroke chronic hemiparesis. The study was designed as a crossover intervention. Participants were 13 individuals (mean age, 68.9 [±4.9] years) with chronic hemiparesis enrolled in a day center at the Bet-Rivka Rehabilitation Hospital in Petach Tikvah, Israel. Following 1 week of baseline measurements of the performance of STS and reaching to grasp, these functions were mentally practiced for 15 minutes 3 times a week for 4 weeks. Half of the subjects mentally practiced STS, while the other half practiced the reaching imagery protocol. Subsequently, the participants in each group crossed over to practice the second function for the next 4 weeks. All practice sessions were performed according to a pre-established protocol under supervision. Measurements of real performance took place twice before and twice immediately following each practice session. For STS, the Tetrax Balance System was used to measure the speed of performance and weight distribution between the legs. Reaching to grasp was appraised via a "kinematic" glove and included speed variables of the hand. A significant decrease was found in the values of STS duration. Weight distribution between the legs was not affected by the intervention. For reaching to grasp, a significant improvement was found in the mean and the maximum reaching velocity. In individuals with chronic hemiparesis, the imagery practice of meaningful motor tasks can positively affect real performance.

  3. Implementation of an attack scheme on a practical QKD system

    NASA Astrophysics Data System (ADS)

    Lamas-Linares, Antia; Liu, Qin; Gerhardt, Ilja; Makarov, Vadim; Kurtsiefer, Christian

    2010-03-01

    We report on an experimental implementation of an attack of a practical quantum key distribution system [1], based on a vulnerability of single photon detectors [2]. An intercept/resend-like attack has been carried out which revealed 100% of the raw key generated between the legitimate communication partners. No increase of the error ratio was observed, which is usually considered a reliable witness for any eavesdropping attempt. We also present an experiment which shows that this attack is not revealed by key distribution protocols probing for eavesdroppers by testing a Bell inequality [3], and discuss implications for practical quantum key distribution.[4pt] [1] I. Marcikic, A. Lamas-Linares, C. Kurtsiefer, Appl. Phys. Lett. 89, 101122 (2006); [2] V. Makarov, New J. Phys. 11, 065003 (2009); [3] A. Ling et al., Phys. Rev. A 78, 020301(R), (2008)

  4. Development of a waste management protocol based on assessment of knowledge and practice of healthcare personnel in surgical departments.

    PubMed

    Mostafa, Gehan M A; Shazly, Mona M; Sherief, Wafaa I

    2009-01-01

    Good healthcare waste management in a hospital depends on a dedicated waste management team, good administration, careful planning, sound organization, underpinning legislation, adequate financing, and full participation by trained staff. Hence, waste management protocols must be convenient and sensible. To assess the knowledge and practice related to waste management among doctors, nurses, and housekeepers in the surgical departments at Al-Mansoura University Hospital, and to design and validate a waste management protocol for the health team in these settings. This cross-sectional study was carried out in the eight surgical departments at Al-Mansoura University Hospital. All health care personnel and their assistants were included: 38 doctors, 106 nurses, and 56 housekeepers. Two groups of jury were included for experts' opinions validation of the developed protocol, one from academia (30 members) and the other from service providers (30 members). Data were collected using a self-administered knowledge questionnaire for nurses and doctors, and an interview questionnaire for housekeepers. Observation checklists were used for assessment of performance. The researchers developed the first draft of the waste management protocol according to the results of the analysis of the data collected in the assessment phase. Then, the protocol was presented to the jury group for validation, and then was implemented. Only 27.4% of the nurses, 32.1% of the housekeepers, and 36.8% of the doctors had satisfactory knowledge. Concerning practice, 18.9% of the nurses, 7.1% of the housekeepers, and none of the doctors had adequate practice. Nurses' knowledge score had a statistically significant weak positive correlation with the attendance of training courses (r=0.23, p<0.05). Validation of the developed protocol was done, and the percent of agreement ranged between 60.0% and 96.7% for the service group, and 60.0% and 90.0% for the academia group. The majority of the doctors, nurses, and housekeepers have unsatisfactory knowledge and inadequate practice related to health care waste management. The knowledge among nurses is positively affected by attendance of training programs. Based on the findings, a protocol for healthcare waste management was developed and validated. It is recommended to implement the developed waste management protocol for the surgical departments in the designed hospital, with establishment of waste management audits.

  5. Beating the photon-number-splitting attack in practical quantum cryptography.

    PubMed

    Wang, Xiang-Bin

    2005-06-17

    We propose an efficient method to verify the upper bound of the fraction of counts caused by multiphoton pulses in practical quantum key distribution using weak coherent light, given whatever type of Eve's action. The protocol simply uses two coherent states for the signal pulses and vacuum for the decoy pulse. Our verified upper bound is sufficiently tight for quantum key distribution with a very lossy channel, in both the asymptotic and nonasymptotic case. So far our protocol is the only decoy-state protocol that works efficiently for currently existing setups.

  6. Exploring the Relationship between Beginning Science Teachers' Practices, Institutional Constraints, and Adult Development

    NASA Astrophysics Data System (ADS)

    Wilcox, Jesse Lee

    This year-long study explored how ten teachers--five first year, five second year--acclimated to their new school environment after leaving a master's level university science teacher preparation program known for being highly effective. Furthermore, this study sought to explore if a relationship existed between teachers' understanding and implementation of research-based science teaching practices, the barriers to enacting these practices--known as institutional constraints, and the constructive-developmental theory which explores meaning-making systems known as orders of consciousness. As a naturalistic inquiry mixed methods study, data were collected using both qualitative (e.g., semi-structured interviews, field notes) as well as quantitative methods (e.g., observation protocols, subject/object protocol). These data sources were used to construct participant summaries and a cross-case analysis. The findings from provide evidence that teachers' orders of consciousness might help to explain why understanding research-based science teaching practices are maintained by some new teachers and not others. Additionally, this study found the orders of consciousness of teachers relates to the perceptions of institutional constraints as well as how a teacher chooses to navigate those constraints. Finally, the extent to which teachers implement research-based science teaching practices is related to orders of consciousness. While many studies have focused on what meaning teachers make, this study highlights the importance of considering how teachers make meaning.

  7. Universal blind quantum computation for hybrid system

    NASA Astrophysics Data System (ADS)

    Huang, He-Liang; Bao, Wan-Su; Li, Tan; Li, Feng-Guang; Fu, Xiang-Qun; Zhang, Shuo; Zhang, Hai-Long; Wang, Xiang

    2017-08-01

    As progress on the development of building quantum computer continues to advance, first-generation practical quantum computers will be available for ordinary users in the cloud style similar to IBM's Quantum Experience nowadays. Clients can remotely access the quantum servers using some simple devices. In such a situation, it is of prime importance to keep the security of the client's information. Blind quantum computation protocols enable a client with limited quantum technology to delegate her quantum computation to a quantum server without leaking any privacy. To date, blind quantum computation has been considered only for an individual quantum system. However, practical universal quantum computer is likely to be a hybrid system. Here, we take the first step to construct a framework of blind quantum computation for the hybrid system, which provides a more feasible way for scalable blind quantum computation.

  8. Finite-time and fixed-time leader-following consensus for multi-agent systems with discontinuous inherent dynamics

    NASA Astrophysics Data System (ADS)

    Ning, Boda; Jin, Jiong; Zheng, Jinchuan; Man, Zhihong

    2018-06-01

    This paper is concerned with finite-time and fixed-time consensus of multi-agent systems in a leader-following framework. Different from conventional leader-following tracking approaches where inherent dynamics satisfying the Lipschitz continuous condition is required, a more generalised case is investigated: discontinuous inherent dynamics. By nonsmooth techniques, a nonlinear protocol is first proposed to achieve the finite-time leader-following consensus. Then, based on fixed-time stability strategies, the fixed-time leader-following consensus problem is solved. An upper bound of settling time is obtained by using a new protocol, and such a bound is independent of initial states, thereby providing additional options for designers in practical scenarios where initial conditions are unavailable. Finally, numerical simulations are provided to demonstrate the effectiveness of the theoretical results.

  9. Experimental quantum fingerprinting with weak coherent pulses

    PubMed Central

    Xu, Feihu; Arrazola, Juan Miguel; Wei, Kejin; Wang, Wenyuan; Palacios-Avila, Pablo; Feng, Chen; Sajeed, Shihan; Lütkenhaus, Norbert; Lo, Hoi-Kwong

    2015-01-01

    Quantum communication holds the promise of creating disruptive technologies that will play an essential role in future communication networks. For example, the study of quantum communication complexity has shown that quantum communication allows exponential reductions in the information that must be transmitted to solve distributed computational tasks. Recently, protocols that realize this advantage using optical implementations have been proposed. Here we report a proof-of-concept experimental demonstration of a quantum fingerprinting system that is capable of transmitting less information than the best-known classical protocol. Our implementation is based on a modified version of a commercial quantum key distribution system using off-the-shelf optical components over telecom wavelengths, and is practical for messages as large as 100 Mbits, even in the presence of experimental imperfections. Our results provide a first step in the development of experimental quantum communication complexity. PMID:26515586

  10. Experimental quantum fingerprinting with weak coherent pulses.

    PubMed

    Xu, Feihu; Arrazola, Juan Miguel; Wei, Kejin; Wang, Wenyuan; Palacios-Avila, Pablo; Feng, Chen; Sajeed, Shihan; Lütkenhaus, Norbert; Lo, Hoi-Kwong

    2015-10-30

    Quantum communication holds the promise of creating disruptive technologies that will play an essential role in future communication networks. For example, the study of quantum communication complexity has shown that quantum communication allows exponential reductions in the information that must be transmitted to solve distributed computational tasks. Recently, protocols that realize this advantage using optical implementations have been proposed. Here we report a proof-of-concept experimental demonstration of a quantum fingerprinting system that is capable of transmitting less information than the best-known classical protocol. Our implementation is based on a modified version of a commercial quantum key distribution system using off-the-shelf optical components over telecom wavelengths, and is practical for messages as large as 100 Mbits, even in the presence of experimental imperfections. Our results provide a first step in the development of experimental quantum communication complexity.

  11. Experimental quantum fingerprinting with weak coherent pulses

    NASA Astrophysics Data System (ADS)

    Xu, Feihu; Arrazola, Juan Miguel; Wei, Kejin; Wang, Wenyuan; Palacios-Avila, Pablo; Feng, Chen; Sajeed, Shihan; Lütkenhaus, Norbert; Lo, Hoi-Kwong

    2015-10-01

    Quantum communication holds the promise of creating disruptive technologies that will play an essential role in future communication networks. For example, the study of quantum communication complexity has shown that quantum communication allows exponential reductions in the information that must be transmitted to solve distributed computational tasks. Recently, protocols that realize this advantage using optical implementations have been proposed. Here we report a proof-of-concept experimental demonstration of a quantum fingerprinting system that is capable of transmitting less information than the best-known classical protocol. Our implementation is based on a modified version of a commercial quantum key distribution system using off-the-shelf optical components over telecom wavelengths, and is practical for messages as large as 100 Mbits, even in the presence of experimental imperfections. Our results provide a first step in the development of experimental quantum communication complexity.

  12. An Open Source Low-Cost Wireless Control System for a Forced Circulation Solar Plant

    PubMed Central

    Salamone, Francesco; Belussi, Lorenzo; Danza, Ludovico; Ghellere, Matteo; Meroni, Italo

    2015-01-01

    The article describes the design phase, development and practical application of a low-cost control system for a forced circulation solar plant in an outdoor test cell located near Milan. Such a system provides for the use of an electric pump for the circulation of heat transfer fluid connecting the solar thermal panel to the storage tank. The running plant temperatures are the fundamental parameter to evaluate the system performance such as proper operation, and the control and management system has to consider these parameters. A solar energy-powered wireless-based smart object was developed, able to monitor the running temperatures of a solar thermal system and aimed at moving beyond standard monitoring approaches to achieve a low-cost and customizable device, even in terms of installation in different environmental conditions. To this end, two types of communications were used: the first is a low-cost communication based on the ZigBee protocol used for control purposes, so that it can be customized according to specific needs, while the second is based on a Bluetooth protocol used for data display. PMID:26556356

  13. An Open Source Low-Cost Wireless Control System for a Forced Circulation Solar Plant.

    PubMed

    Salamone, Francesco; Belussi, Lorenzo; Danza, Ludovico; Ghellere, Matteo; Meroni, Italo

    2015-11-05

    The article describes the design phase, development and practical application of a low-cost control system for a forced circulation solar plant in an outdoor test cell located near Milan. Such a system provides for the use of an electric pump for the circulation of heat transfer fluid connecting the solar thermal panel to the storage tank. The running plant temperatures are the fundamental parameter to evaluate the system performance such as proper operation, and the control and management system has to consider these parameters. A solar energy-powered wireless-based smart object was developed, able to monitor the running temperatures of a solar thermal system and aimed at moving beyond standard monitoring approaches to achieve a low-cost and customizable device, even in terms of installation in different environmental conditions. To this end, two types of communications were used: the first is a low-cost communication based on the ZigBee protocol used for control purposes, so that it can be customized according to specific needs, while the second is based on a Bluetooth protocol used for data display.

  14. Toward a Descriptive Science of Teaching: How the TDOP Illuminates the Multidimensional Nature of Active Learning in Postsecondary Classrooms

    ERIC Educational Resources Information Center

    Hora, Matthew T.

    2015-01-01

    Detailed accounts of teaching can shed light on the nature and prevalence of active learning, yet common approaches reduce teaching to unidimensional descriptors or binary categorizations. In this paper, I use the instructional systems-of-practice framework and the Teaching Dimensions Observation Protocol (TDOP) to advance an approach to thinking…

  15. Applying airline safety practices to medication administration.

    PubMed

    Pape, Theresa M

    2003-04-01

    Medication administration errors (MAE) continue as major problems for health care institutions, nurses, and patients. However, MAEs are often the result of system failures leading to patient injury, increased hospital costs, and blaming. Costs include those related to increased hospital length of stay and legal expenses. Contributing factors include distractions, lack of focus, poor communication, and failure to follow standard protocols during medication administration.

  16. Helping Pre-Service Mathematics Teachers Connect Theory and Practice: Using Reading, Writing, and Observation Protocols to Structure Field Experiences

    ERIC Educational Resources Information Center

    Cross, Stephanie Behm; Bayazit, Nermin Tosmur

    2014-01-01

    The authors designed the project described her in order to address their students' expressed frustrations at the perceived disconnect between theory and practice. The project combined course readings, journaling, collaboratively created observation protocols, and classroom observation into a semester-long iterative assignment. The students' work…

  17. Opportunistic detection of atrial fibrillation in subjects aged 65 years or older in primare care: a randomised clinical trial of efficacy. DOFA-AP study protocol.

    PubMed

    Pérula-de-Torres, Luis Á; Martínez-Adell, Miguel Á; González-Blanco, Virginia; Baena-Díez, José M; Martín-Rioboó, Enrique; Parras-Rejano, Juan M; González-Lama, Jesús; Martín-Alvarez, Remedios; Ruiz-Moral, Roger; Fernández-García, José Á; Pérez-Díaz, Modesto; Ruiz-de-Castroviejo, Joaquin; Pérula-de-Torres, Carlos; Valero-Martín, Antonio; Roldán-Villalobos, Ana; Criado-Larumbe, Margarita; Burdoy-Joaquín, Emili; Coma-Solé, Montserrat; Cervera-León, Mercè; Cuixart-Costa, Lluís

    2012-10-30

    Clinical Practice Guidelines recommend using peripheral blood pulse measuring as a screening test for Atrial Fibrillation. However, there is no adequate evidence supporting the efficacy of such procedure in primary care clinical practice. This paper describes a study protocol designed to verify whether early opportunistic screening for Atrial Fibrillation by measuring blood pulse is more effective than regular practice in subjects aged 65 years attending primary care centers. An cluster-randomized controlled trial conducted in Primary Care Centers of the Spanish National Health Service. A total of 269 physicians and nurses will be allocated to one of the two arms of the trial by stratified randomization with a 3:2 ratio (three practitioners will be assigned to the Control Group for every two practitioners assigned to the Experimental Group). As many as 12 870 patients aged 65 years or older and meeting eligibility criteria will be recruited (8 580 will be allocated to the Experimental Group and 4 290 to the Control Group). Randomization and allocation to trial groups will be carried out by a central computer system. The Experimental Group practitioners will conduct an opportunistic case finding for patients with Atrial Fibrillation, while the Control Group practitioners will follow the regular guidelines. The first step will be finding new Atrial Fibrillation cases. A descriptive inferential analysis will be performed (bivariate and multivariate by multilevel logistic regression analysis). If our hypothesis is confirmed, we expect Primary Care professionals to take a more proactive approach and adopt a new protocol when a patient meeting the established screening criteria is identified. Finally, we expect this measure to be incorporated into Clinical Practice Guidelines. The study is registered as NCT01291953 (ClinicalTrials.gob).

  18. Knowledge, attitudes and practices of dental hygienists regarding caries management by risk assessment.

    PubMed

    Urban, Ruth A; Rowe, Dorothy J

    2015-02-01

    The purpose of this study was to survey dental hygienists to determine their knowledge, attitudes and practices regarding the implementation of caries risk assessment, particularly caries management by risk assessment (CAMBRA), in private dental practices. A 17 item survey was developed to evaluate dental hygienists' knowledge, attitudes and practices related to CAMBRA and perceived barriers to CAMBRA implementation in private dental practice. Surveys were mailed to a randomized sample of 1,000 dental hygienists licensed to practice in California. Responses were tabulated for each respondent, and the response frequency for each survey item was calculated. Respondents' comments to the open-ended question were compiled, according to themes. The response rate was 18%. Only 66% of the respondents were familiar with the term CAMBRA, although 89% agreed with its underlying principles of risk assessment. CAMBRA protocol had been implemented in 40% of the respondents' employment sites. Respondents disagreed that time (45%) and cost of products (68%) were barriers to implementation. Many did not know their employers' knowledge or attitudes about CAMBRA and its implementation, as evidenced by a "don't know" response range of 29 to 48% for the 4 relevant statements. Respondents' comments included both successes and barriers implementing CAMBRA. CAMBRA protocol has not been widely implemented in private practice, although the current data do not indicate insurmountable barriers. Broader dissemination may be feasible if dental hygienists would obtain more comprehensive knowledge of evidence-based risk assessment protocols and would assume a leadership role in implementing CAMBRA protocols and procedures in private dental practices. Copyright © 2015 The American Dental Hygienists’ Association.

  19. Finite-key security analysis of quantum key distribution with imperfect light sources

    DOE PAGES

    Mizutani, Akihiro; Curty, Marcos; Lim, Charles Ci Wen; ...

    2015-09-09

    In recent years, the gap between theory and practice in quantum key distribution (QKD) has been significantly narrowed, particularly for QKD systems with arbitrarily flawed optical receivers. The status for QKD systems with imperfect light sources is however less satisfactory, in the sense that the resulting secure key rates are often overly dependent on the quality of state preparation. This is especially the case when the channel loss is high. Very recently, to overcome this limitation, Tamaki et al proposed a QKD protocol based on the so-called 'rejected data analysis', and showed that its security in the limit of infinitelymore » long keys is almost independent of any encoding flaw in the qubit space, being this protocol compatible with the decoy state method. Here, as a step towards practical QKD, we show that a similar conclusion is reached in the finite-key regime, even when the intensity of the light source is unstable. More concretely, we derive security bounds for a wide class of realistic light sources and show that the bounds are also efficient in the presence of high channel loss. Our results strongly suggest the feasibility of long distance provably secure communication with imperfect light sources.« less

  20. Implementing the information prescription protocol in a family medicine practice: a case study*†‡

    PubMed Central

    Carey, Peggy; Haines, Laura; Lampson, Alan P; Pond, Fred

    2010-01-01

    Question: Can an information prescription protocol be successfully integrated into a family medicine practice seeking to enhance patient education and self-management? Setting: Milton Family Practice, an outpatient clinic and resident teaching site of the University of Vermont and Fletcher Allen Health Care, is located in a semirural area fifteen miles from main campus. Objectives: The objectives were to increase physicians' knowledge and use of information prescriptions, sustain integration of information prescription use, and increase physicians' ability to provide patient education information. Methods: Methods used were promotion of the National Library of Medicine's Information Rx, physician instruction, installation of patient and provider workstations, and a collaborative approach to practice integration. Main Results: A post-intervention survey showed increased physician knowledge and use of the Information Rx protocol. Support procedures were integrated at the practice. Conclusions: Sustainable integration of Information Rx in a primary care clinic requires not only promotion and education, but also attention to clinic organization and procedures. PMID:20648257

  1. Implementing Internet of Things in a military command and control environment

    NASA Astrophysics Data System (ADS)

    Raglin, Adrienne; Metu, Somiya; Russell, Stephen; Budulas, Peter

    2017-05-01

    While the term Internet of Things (IoT) has been coined relatively recently, it has deep roots in multiple other areas of research including cyber-physical systems, pervasive and ubiquitous computing, embedded systems, mobile ad-hoc networks, wireless sensor networks, cellular networks, wearable computing, cloud computing, big data analytics, and intelligent agents. As the Internet of Things, these technologies have created a landscape of diverse heterogeneous capabilities and protocols that will require adaptive controls to effect linkages and changes that are useful to end users. In the context of military applications, it will be necessary to integrate disparate IoT devices into a common platform that necessarily must interoperate with proprietary military protocols, data structures, and systems. In this environment, IoT devices and data will not be homogeneous and provenance-controlled (i.e. single vendor/source/supplier owned). This paper presents a discussion of the challenges of integrating varied IoT devices and related software in a military environment. A review of contemporary commercial IoT protocols is given and as a practical example, a middleware implementation is proffered that provides transparent interoperability through a proactive message dissemination system. The implementation is described as a framework through which military applications can integrate and utilize commercial IoT in conjunction with existing military sensor networks and command and control (C2) systems.

  2. The best of both worlds: Building on the COPUS and RTOP observation protocols to easily and reliably measure various levels of reformed instructional practice.

    PubMed

    Lund, Travis J; Pilarz, Matthew; Velasco, Jonathan B; Chakraverty, Devasmita; Rosploch, Kaitlyn; Undersander, Molly; Stains, Marilyne

    2015-01-01

    Researchers, university administrators, and faculty members are increasingly interested in measuring and describing instructional practices provided in science, technology, engineering, and mathematics (STEM) courses at the college level. Specifically, there is keen interest in comparing instructional practices between courses, monitoring changes over time, and mapping observed practices to research-based teaching. While increasingly common observation protocols (Reformed Teaching Observation Protocol [RTOP] and Classroom Observation Protocol in Undergraduate STEM [COPUS]) at the postsecondary level help achieve some of these goals, they also suffer from weaknesses that limit their applicability. In this study, we leverage the strengths of these protocols to provide an easy method that enables the reliable and valid characterization of instructional practices. This method was developed empirically via a cluster analysis using observations of 269 individual class periods, corresponding to 73 different faculty members, 28 different research-intensive institutions, and various STEM disciplines. Ten clusters, called COPUS profiles, emerged from this analysis; they represent the most common types of instructional practices enacted in the classrooms observed for this study. RTOP scores were used to validate the alignment of the 10 COPUS profiles with reformed teaching. Herein, we present a detailed description of the cluster analysis method, the COPUS profiles, and the distribution of the COPUS profiles across various STEM courses at research-intensive universities. © 2015 T. J. Lund et al. CBE—Life Sciences Education © 2015 The American Society for Cell Biology. This article is distributed by The American Society for Cell Biology under license from the author(s). It is available to the public under an Attribution–Noncommercial–Share Alike 3.0 Unported Creative Commons License (http://creativecommons.org/licenses/by-nc-sa/3.0).

  3. Endodontic 'solutions' part 1: a literature review on the use of endodontic lubricants, irrigants and medicaments.

    PubMed

    Good, Melissa; El, Karim Ikhlas A; Hussey, David L

    2012-05-01

    Endodontic lubricants, irrigants and medicaments help prepare and disinfect root canal systems (RCS) but primary and secondary cases involve different microbes and therefore it is unlikely that one protocol will be effective for both case types. Each individual 'solution' or sequence of'solutions' could play a significant role in each case type, but there are no detailed published guidelines in existence. To help inform clinical practice it was decided to undertake a literature review followed by a UK and Republic of Ireland wide audit on current endodontic'solution' usage within dental schools. The literature review was undertaken under the following headings: pre-op oral rinse; file lubricants; root canal irrigants and intracanal medicaments and provides an evidence base for protocol development for both primary and retreatment cases.The audit project and the protocols developed from the findings of both the literature review and audit will be presented in Part 2.

  4. High-rate measurement-device-independent quantum cryptography

    NASA Astrophysics Data System (ADS)

    Pirandola, Stefano; Ottaviani, Carlo; Spedalieri, Gaetana; Weedbrook, Christian; Braunstein, Samuel L.; Lloyd, Seth; Gehring, Tobias; Jacobsen, Christian S.; Andersen, Ulrik L.

    2015-06-01

    Quantum cryptography achieves a formidable task—the remote distribution of secret keys by exploiting the fundamental laws of physics. Quantum cryptography is now headed towards solving the practical problem of constructing scalable and secure quantum networks. A significant step in this direction has been the introduction of measurement-device independence, where the secret key between two parties is established by the measurement of an untrusted relay. Unfortunately, although qubit-implemented protocols can reach long distances, their key rates are typically very low, unsuitable for the demands of a metropolitan network. Here we show, theoretically and experimentally, that a solution can come from the use of continuous-variable systems. We design a coherent-state network protocol able to achieve remarkably high key rates at metropolitan distances, in fact three orders of magnitude higher than those currently achieved. Our protocol could be employed to build high-rate quantum networks where devices securely connect to nearby access points or proxy servers.

  5. Experimental study on all-fiber-based unidimensional continuous-variable quantum key distribution

    NASA Astrophysics Data System (ADS)

    Wang, Xuyang; Liu, Wenyuan; Wang, Pu; Li, Yongmin

    2017-06-01

    We experimentally demonstrated an all-fiber-based unidimensional continuous-variable quantum key distribution (CV QKD) protocol and analyzed its security under collective attack in realistic conditions. A pulsed balanced homodyne detector, which could not be accessed by eavesdroppers, with phase-insensitive efficiency and electronic noise, was considered. Furthermore, a modulation method and an improved relative phase-locking technique with one amplitude modulator and one phase modulator were designed. The relative phase could be locked precisely with a standard deviation of 0.5° and a mean of almost zero. Secret key bit rates of 5.4 kbps and 700 bps were achieved for transmission fiber lengths of 30 and 50 km, respectively. The protocol, which simplified the CV QKD system and reduced the cost, displayed a performance comparable to that of a symmetrical counterpart under realistic conditions. It is expected that the developed protocol can facilitate the practical application of the CV QKD.

  6. Increasing value and reducing waste: addressing inaccessible research.

    PubMed

    Chan, An-Wen; Song, Fujian; Vickers, Andrew; Jefferson, Tom; Dickersin, Kay; Gøtzsche, Peter C; Krumholz, Harlan M; Ghersi, Davina; van der Worp, H Bart

    2014-01-18

    The methods and results of health research are documented in study protocols, full study reports (detailing all analyses), journal reports, and participant-level datasets. However, protocols, full study reports, and participant-level datasets are rarely available, and journal reports are available for only half of all studies and are plagued by selective reporting of methods and results. Furthermore, information provided in study protocols and reports varies in quality and is often incomplete. When full information about studies is inaccessible, billions of dollars in investment are wasted, bias is introduced, and research and care of patients are detrimentally affected. To help to improve this situation at a systemic level, three main actions are warranted. First, academic institutions and funders should reward investigators who fully disseminate their research protocols, reports, and participant-level datasets. Second, standards for the content of protocols and full study reports and for data sharing practices should be rigorously developed and adopted for all types of health research. Finally, journals, funders, sponsors, research ethics committees, regulators, and legislators should endorse and enforce policies supporting study registration and wide availability of journal reports, full study reports, and participant-level datasets. Copyright © 2014 Elsevier Ltd. All rights reserved.

  7. Increasing value and reducing waste: addressing inaccessible research

    PubMed Central

    Chan, An-Wen; Song, Fujian; Vickers, Andrew; Jefferson, Tom; Dickersin, Kay; Gøtzsche, Peter C.; Krumholz, Harlan M.; Ghersi, Davina; van der Worp, H. Bart

    2015-01-01

    The study protocol, publications, full study report detailing all analyses, and participant-level dataset constitute the main documentation of methods and results for health research. However, journal publications are available for only half of all studies and are plagued by selective reporting of methods and results. The protocol, full study report, and participant-level dataset are rarely available. The quality of information provided in study protocols and reports is variable and often incomplete. Inaccessibility of full information for the vast majority of studies wastes billions of dollars, introduces bias, and has a detrimental impact on patient care and research. To help improve this situation at a systemic level, three main actions are warranted. Firstly, it is important that academic institutions and funders reward investigators who fully disseminate their research protocols, reports, and participant-level datasets. Secondly, standards for the content of protocols, full study reports, and data sharing practices should be rigorously developed and adopted for all types of health research. Finally, journals, funders, sponsors, research ethics committees, regulators, and legislators should implement and enforce policies supporting study registration and availability of journal publications, full study reports, and participant-level datasets. PMID:24411650

  8. Load balancing for massively-parallel soft-real-time systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hailperin, M.

    1988-09-01

    Global load balancing, if practical, would allow the effective use of massively-parallel ensemble architectures for large soft-real-problems. The challenge is to replace quick global communications, which is impractical in a massively-parallel system, with statistical techniques. In this vein, the author proposes a novel approach to decentralized load balancing based on statistical time-series analysis. Each site estimates the system-wide average load using information about past loads of individual sites and attempts to equal that average. This estimation process is practical because the soft-real-time systems of interest naturally exhibit loads that are periodic, in a statistical sense akin to seasonality in econometrics.more » It is shown how this load-characterization technique can be the foundation for a load-balancing system in an architecture employing cut-through routing and an efficient multicast protocol.« less

  9. Report on July 2015 Additional Protocol Coordinators Best Practices Workshop

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gitau, Ernest T.N.; Burbank, Roberta L.; Finch, Valerie A.

    After 10 years of implementation experience, the Office of Nonproliferation and Arms Control (NPAC) within the Department of Energy/National Nuclear Security Administration (DOE/NNSA) conducted the Additional Protocol (AP) Coordinators Best Practices Workshop at Oak Ridge National Laboratory from July 29-30, 2015. The goal of this workshop was to identify implementation best practices, lessons learned, and compliance challenges from the various Additional Protocol Coordinators (APCs) at each laboratory in the DOE/NNSA complex and associated sites. The workshop provided the opportunity for participants to share their insights and establish networks that APCs can utilize to continue to discuss challenges (new and old),more » identify best practices, and enhance communication and coordination for reporting multi-lab research projects during review activities. Workshop participants included DOE/NNSA HQ, laboratory and site APCs, seasoned experts, members of the original implementation outreach team, and Field Element and site security representatives.« less

  10. The implementation of biosecurity practices and visitor protocols on non-commercial horse properties in New Zealand.

    PubMed

    Rosanowski, S M; Rogers, C W; Cogger, N; Benschop, J; Stevenson, M A

    2012-11-01

    A survey was conducted to investigate biosecurity practices on non-commercial horse properties, to describe the number of visits by horse professionals and any protocols that visitors were required to follow before interacting with resident horses. Data were collected in November 2009 during a cross-sectional study of non-commercial horse properties, in New Zealand, selected using generalised random-tessellated stratified design and a self-administered postal questionnaire. Data were described and the associations between property-level factors and biosecurity practices were analysed using logistic regression analysis. In total there were 791 respondents from non-commercial horse properties, of which 660 (83%) answer at least one question relating to biosecurity practices. Of the respondents, 95% had at least one biosecurity practice for arriving horses. Only 31% of properties isolated horses for more than four days, and few respondents checked for pyrexia or other clinical signs of infectious disease in new horses. Moving horses from a property was associated with the implementation of biosecurity practices and practices specific to the clinical signs of respiratory disease. Overall, 79% of properties had horse professional's visit, but only 33% of respondents reported biosecurity protocols for these visitors. Most properties had some knowledge about newly arriving horses, but the effectiveness of these practices for biosecurity were questionable, as few practices would stop disease spread to resident horses. Horse professionals are likely candidates for disease spread due to contact with horses, limited visitor protocols and the frequency of visits. The development of a plan to improve biosecurity for endemic and exotic disease is recommended. Copyright © 2012 Elsevier B.V. All rights reserved.

  11. Management systems, patient quality improvement, resource availability, and substance abuse treatment quality.

    PubMed

    Fields, Dail; Roman, Paul M; Blum, Terry C

    2012-06-01

    To examine the relationships among general management systems, patient-focused quality management/continuous process improvement (TQM/CPI) processes, resource availability, and multiple dimensions of substance use disorder (SUD) treatment. Data are from a nationally representative sample of 221 SUD treatment centers through the National Treatment Center Study (NTCS). The design was a cross-sectional field study using latent variable structural equation models. The key variables are management practices, TQM/continuous quality improvement (CQI) practices, resource availability, and treatment center performance. Interviews and questionnaires provided data from treatment center administrative directors and clinical directors in 2007-2008. Patient-focused TQM/CQI practices fully mediated the relationship between internal management practices and performance. The effects of TQM/CQI on performance are significantly larger for treatment centers with higher levels of staff per patient. Internal management practices may create a setting that supports implementation of specific patient-focused practices and protocols inherent to TQM/CQI processes. However, the positive effects of internal management practices on treatment center performance occur through use of specific patient-focused TQM/CPI practices and have more impact when greater amounts of supporting resources are present. © Health Research and Educational Trust.

  12. Management Systems, Patient Quality Improvement, Resource Availability, and Substance Abuse Treatment Quality

    PubMed Central

    Fields, Dail; Roman, Paul M; Blum, Terry C

    2012-01-01

    Objective To examine the relationships among general management systems, patient-focused quality management/continuous process improvement (TQM/CPI) processes, resource availability, and multiple dimensions of substance use disorder (SUD) treatment. Data Sources/Study Setting Data are from a nationally representative sample of 221 SUD treatment centers through the National Treatment Center Study (NTCS). Study Design The design was a cross-sectional field study using latent variable structural equation models. The key variables are management practices, TQM/continuous quality improvement (CQI) practices, resource availability, and treatment center performance. Data Collection Interviews and questionnaires provided data from treatment center administrative directors and clinical directors in 2007–2008. Principal Findings Patient-focused TQM/CQI practices fully mediated the relationship between internal management practices and performance. The effects of TQM/CQI on performance are significantly larger for treatment centers with higher levels of staff per patient. Conclusions Internal management practices may create a setting that supports implementation of specific patient-focused practices and protocols inherent to TQM/CQI processes. However, the positive effects of internal management practices on treatment center performance occur through use of specific patient-focused TQM/CPI practices and have more impact when greater amounts of supporting resources are present. PMID:22098342

  13. Evidence-based protocol for structural rehabilitation of the spine and posture: review of clinical biomechanics of posture (CBP®) publications

    PubMed Central

    Oakley, Paul A.; Harrison, Donald D.; Harrison, Deed E.; Haas, Jason W.

    2005-01-01

    BACKGROUND Although practice protocols exist for SMT and functional rehabilitation, no practice protocols exist for structural rehabilitation. Traditional chiropractic practice guidelines have been limited to acute and chronic pain treatment, with limited inclusion of functional and exclusion of structural rehabilitation procedures. OBJECTIVE (1) To derive an evidence-based practice protocol for structural rehabilitation from publications on Clinical Biomechanics of Posture (CBP®) methods, and (2) to compare the evidence for Diversified, SMT, and CBP®. METHODS Clinical control trials utilizing CBP® methods and spinal manipulative therapy (SMT) were obtained from searches in Mantis, CINAHL, and Index Medicus. Using data from SMT review articles, evidence for Diversified Technique (as taught in chiropractic colleges), SMT, and CBP® were rated and compared. RESULTS From the evidence from Clinical Control Trials on SMT and CBP®, there is very little evidence support for Diversified (our rating = 18), as taught in chiropractic colleges, for the treatment of pain subjects, while CBP® (our rating = 46) and SMT for neck pain (rating = 58) and low back pain (our rating = 202) have evidence-based support. CONCLUSIONS While CBP® Technique has approximately as much evidence-based support as SMT for neck pain, CBP® has more evidence to support its methods than the Diversified technique taught in chiropractic colleges, but not as much as SMT for low back pain. The evolution of chiropractic specialization has occurred, and doctors providing structural-based chiropractic care require protocol guidelines for patient quality assurance and standardization. A structural rehabilitation protocol was developed based on evidence from CBP® publications. PMID:17549209

  14. Standardized quality-assessment system to evaluate pressure ulcer care in the nursing home.

    PubMed

    Bates-Jensen, Barbara M; Cadogan, Mary; Jorge, Jennifer; Schnelle, John F

    2003-09-01

    To demonstrate reliability and feasibility of a standardized protocol to assess and score quality indicators relevant to pressure ulcer (PU) care processes in nursing homes (NHs). Descriptive. Eight NHs. One hundred ninety-one NH residents for whom the PU Resident Assessment Protocol of the Minimum Data Set was initiated. Nine quality indicators (two related to screening and prevention of PU, two focused on assessment, and five addressing management) were scored using medical record data, direct human observation, and wireless thigh monitor observation data. Feasibility and reliability of medical record, observation, and thigh monitor protocols were determined. The percentage of participants who passed each of the indicators, indicating care consistent with practice guidelines, ranged from 0% to 98% across all indicators. In general, participants in NHs passed fewer indicators and had more problems with medical record accuracy before a PU was detected (screening/prevention indicators) than they did once an ulcer was documented (assessment and management indicators). Reliability of the medical record protocol showed kappa statistics ranging from 0.689 to 1.00 and percentage agreement from 80% to 100%. Direct observation protocols yielded kappa statistics of 0.979 and 0.928. Thigh monitor protocols showed kappa statistics ranging from 0.609 to 0.842. Training was variable, with the observation protocol requiring 1 to 2 hours, medical records requiring joint review of 20 charts with average time to complete the review of 20 minutes, and the thigh monitor data requiring 1 week for training in data preparation and interpretation. The standardized quality assessment system generated scores for nine PU quality indicators with good reliability and provided explicit scoring rules that permit reproducible conclusions about PU care. The focus of the indicators on care processes that are under the control of NH staff made the protocol useful for external survey and internal quality improvement purposes, and the thigh monitor observational technology provided a method for monitoring repositioning care processes that were otherwise difficult to monitor and manage.

  15. The international experience of bacterial screen testing of platelet components with an automated microbial detection system: a need for consensus testing and reporting guidelines.

    PubMed

    Benjamin, Richard J; McDonald, Carl P

    2014-04-01

    The BacT/ALERT microbial detection system (bioMerieux, Inc, Durham, NC) is in routine use in many blood centers as a prerelease test for platelet collections. Published reports document wide variation in practices and outcomes. A systematic review of the English literature was performed to describe publications assessing the use of the BacT/ALERT culture system on platelet collections as a routine screen test of more than 10000 platelet components. Sixteen publications report the use of confirmatory testing to substantiate initial positive culture results but use varying nomenclature to classify the results. Preanalytical and analytical variables that may affect the outcomes differ widely between centers. Incomplete description of protocol details complicates comparison between sites. Initial positive culture results range from 539 to 10606 per million (0.054%-1.061%) and confirmed positive from 127 to 1035 per million (0.013%-0.104%) donations. False-negative results determined by outdate culture range from 662 to 2173 per million (0.066%-0.217%) and by septic reactions from 0 to 66 per million (0%-0.007%) collections. Current culture protocols represent pragmatic compromises between optimizing analytical sensitivity and ensuring the timely availability of platelets for clinical needs. Insights into the effect of protocol variations on outcomes are generally restricted to individual sites that implement limited changes to their protocols over time. Platelet manufacturers should reassess the adequacy of their BacT/ALERT screening protocols in light of the growing international experience and provide detailed documentation of all variables that may affect culture outcomes when reporting results. We propose a framework for a standardized nomenclature for reporting of the results of BacT/ALERT screening. Copyright © 2014 Elsevier Inc. All rights reserved.

  16. Ozone Therapy in Dentistry

    PubMed Central

    Domb, William C

    2014-01-01

    Summary The 21st century dental practice is quite dynamic. New treatment protocols and new materials are being developed at a rapid pace. Ozone dental therapy falls into the category of new treatment protocols in dentistry, yet ozone is not new at all. Ozone therapy is already a major treatment modality in Europe, South America and a number of other countries. What is provided here will not be an exhaustive scientific treatise so much as a brief general introduction into what dentists are now doing with ozone therapies and the numerous oral/systemic links that make this subject so important for physicians so that, ultimately, they may serve their patients more effectively and productively. PMID:25363268

  17. Ozone therapy in dentistry. A brief review for physicians.

    PubMed

    Domb, William C

    2014-10-31

    The 21(st) century dental practice is quite dynamic. New treatment protocols and new materials are being developed at a rapid pace. Ozone dental therapy falls into the category of new treatment protocols in dentistry, yet ozone is not new at all. Ozone therapy is already a major treatment modality in Europe, South America and a number of other countries. What is provided here will not be an exhaustive scientific treatise so much as a brief general introduction into what dentists are now doing with ozone therapies and the numerous oral/systemic links that make this subject so important for physicians so that, ultimately, they may serve their patients more effectively and productively.

  18. Laboratory Testing Protocols for Heparin-Induced Thrombocytopenia (HIT) Testing.

    PubMed

    Lau, Kun Kan Edwin; Mohammed, Soma; Pasalic, Leonardo; Favaloro, Emmanuel J

    2017-01-01

    Heparin-induced thrombocytopenia (HIT) represents a significant high morbidity complication of heparin therapy. The clinicopathological diagnosis of HIT remains challenging for many reasons; thus, laboratory testing represents an important component of an accurate diagnosis. Although there are many assays available to assess HIT, these essentially fall into two categories-(a) immunological assays, and (b) functional assays. The current chapter presents protocols for several HIT assays, being those that are most commonly performed in laboratory practice and have the widest geographic distribution. These comprise a manual lateral flow-based system (STiC), a fully automated latex immunoturbidimetric assay, a fully automated chemiluminescent assay (CLIA), light transmission aggregation (LTA), and whole blood aggregation (Multiplate).

  19. Diagnosis Protocol of Stomach Distemperament for Clinical Practice in Iranian Traditional Medicine: A Narrative Review

    PubMed Central

    ALIZADEH, Mahdi; KHADEM, Ebrahim; ALIASL, Jale

    2017-01-01

    Background: In Iranian traditional medicine (ITM) stomach is the important organ in the body. Its disorders can affect other organs such as liver, heart and also can cause depression. Stomach distemperaments can cause some disorders. The purpose of this study was to provide a diagnostic method of stomach distemperament for clinical practice. Methods: In this study authoritative ITM books such as Canon of Avicenna, Zakhirah-E-Kharazm Shahi by Hakim Esmail Jorjani, Kamel al-Sina’ah al-Tibbiyah by Ali ibn al-‘Abbas al-Majusi were assessed and symptoms and signs of stomach distemperament were collected. Results: Stomach has some normal temperament. The imbalance in temperament and humor can cause distemperments. There are 12 types of stomach distemperament and based on symptoms and signs a primary protocol is designed for diagnosis of stomach distemperament. Conclusion: There is no available guideline for gastric distemperamet diagnosis protocol. As a result, the presented protocol should be considered for use in clinical practice. PMID:28845397

  20. [Problematizing the multidisciplinary residency in oncology: a practical teaching protocol from the perspective of nurse residents].

    PubMed

    Melo, Myllena Cândida de; Queluci, Gisella de Carvalho; Gouvêa, Mônica Villela

    2014-08-01

    To investigate practical teaching of nurse residents in a multidisciplinary residency in oncology. A qualitative descriptive study grounded in the problematization methodology and its steps, represented by the Maguerez Arch. Data were analyzed using content analysis. Potentiating and limiting elements of the residency guided the design of a practical teaching protocol from the perspective of residents, structured in three stages: Welcoming and ambience; Nursing care for problem situations; and, Evaluation process. Systematization of practical teaching promoted the autonomy of individuals and the approximation of teaching to reality, making residency less strenuous, stressful and distressing.

  1. Practical passive decoy state measurement-device-independent quantum key distribution with unstable sources.

    PubMed

    Liu, Li; Guo, Fen-Zhuo; Wen, Qiao-Yan

    2017-09-12

    Measurement-device-independent quantum key distribution (MDI-QKD) with the active decoy state method can remove all detector loopholes, and resist the imperfections of sources. But it may lead to side channel attacks and break the security of QKD system. In this paper, we apply the passive decoy state method to the MDI-QKD based on polarization encoding mode. Not only all attacks on detectors can be removed, but also the side channel attacks on sources can be overcome. We get that the MDI-QKD with our passive decoy state method can have a performance comparable to the protocol with the active decoy state method. To fit for the demand of practical application, we discuss intensity fluctuation in the security analysis of MDI-QKD protocol using passive decoy state method, and derive the key generation rate for our protocol with intensity fluctuation. It shows that intensity fluctuation has an adverse effect on the key generation rate which is non-negligible, especially in the case of small data size of total transmitting signals and long distance transmission. We give specific simulations on the relationship between intensity fluctuation and the key generation rate. Furthermore, the statistical fluctuation due to the finite length of data is also taken into account.

  2. Instruments for Assessment of Instructional Practices in Standards-Based Teaching

    NASA Astrophysics Data System (ADS)

    Wainwright, Camille L.

    2006-12-01

    This paper describes the development of two forms of an instrument used as a classroom observation protocol, designed to document the impact of reform-based professional development with undergraduate mathematics and science faculty and its impact on the resultant preparation of teachers (PreK 12). A rationale for the development and utilization of this instrument (known as the OTOP, or the Oregon Teacher Observation Protocol) is provided. Constructed upon review of the research on teaching and standards documents in mathematics and science, the protocol formed the basis for data collection in a three-year longitudinal study of teaching practice among early career teachers as well as undergraduate college faculty. In addition, this paper suggests further applications of the observation protocol beyond the original research study purpose. One prominent use for the protocol is in supervisor observations of mathematics and science student teachers.

  3. A Protocol for Collecting Human Cardiac Tissue for Research.

    PubMed

    Blair, Cheavar A; Haynes, Premi; Campbell, Stuart G; Chung, Charles; Mitov, Mihail I; Dennis, Donna; Bonnell, Mark R; Hoopes, Charles W; Guglin, Maya; Campbell, Kenneth S

    2016-01-01

    This manuscript describes a protocol at the University of Kentucky that allows a translational research team to collect human myocardium that can be used for biological research. We have gained a great deal of practical experience since we started this protocol in 2008, and we hope that other groups might be able to learn from our endeavors. To date, we have procured ~4000 samples from ~230 patients. The tissue that we collect comes from organ donors and from patients who are receiving a heart transplant or a ventricular assist device because they have heart failure. We begin our manuscript by describing the importance of human samples in cardiac research. Subsequently, we describe the process for obtaining consent from patients, the cost of running the protocol, and some of the issues and practical difficulties that we have encountered. We conclude with some suggestions for other researchers who may be considering starting a similar protocol.

  4. A Protocol for Collecting Human Cardiac Tissue for Research

    PubMed Central

    Blair, Cheavar A.; Haynes, Premi; Campbell, Stuart G.; Chung, Charles; Mitov, Mihail I.; Dennis, Donna; Bonnell, Mark R.; Hoopes, Charles W.; Guglin, Maya; Campbell, Kenneth S.

    2016-01-01

    This manuscript describes a protocol at the University of Kentucky that allows a translational research team to collect human myocardium that can be used for biological research. We have gained a great deal of practical experience since we started this protocol in 2008, and we hope that other groups might be able to learn from our endeavors. To date, we have procured ~4000 samples from ~230 patients. The tissue that we collect comes from organ donors and from patients who are receiving a heart transplant or a ventricular assist device because they have heart failure. We begin our manuscript by describing the importance of human samples in cardiac research. Subsequently, we describe the process for obtaining consent from patients, the cost of running the protocol, and some of the issues and practical difficulties that we have encountered. We conclude with some suggestions for other researchers who may be considering starting a similar protocol. PMID:28042604

  5. Prevention and treatment of hand oedema after stroke.

    PubMed

    Kuppens, Stefanie P M; Pijlman, Hanneke C P; Hitters, Minou W M G C; van Heugten, Caroline M

    2014-01-01

    As there is no evidence for a specific treatment for post-stroke-induced hand oedema, rehabilitation centre Blixembosch formalized a best practice protocol. We investigated whether the Blixembosch hand oedema protocol is usable in daily practice and leads to lower incidence (prevention) and shorter duration (treatment) compared with care as usual. In a non-randomised comparative trial, we investigated 206 post-stroke patients admitted to two Dutch rehabilitation centres. Hand volumes were measured at least bi-weekly using a volumeter. Treatment was started according the protocol (Blixembosch) or following care as usual (Leijpark). Usability was assessed with a survey among professionals. In the Blixembosch group, 16% developed oedema after admission, compared with 21% in the control group (p = 0.019). Average duration of oedema (both developed before and after admission) was 6.5 weeks in the Blixembosch group compared with 3.1 weeks in the control group (p = 0.000). Professionals were positive about the protocol. The study showed that the protocol is usable in daily practice and has a small beneficial effect on hand oedema incidence rates compared with care as usual. The negative effect on duration of hand oedema could also be caused by the difference in prognosis between the two groups.

  6. Desensitization to Mycofenolate Mofetil: a novel 12 step protocol.

    PubMed

    Smith, M; Gonzalez-Estrada, A; Fernandez, J; Subramanian, A

    2016-07-01

    The use of MMF has become standard practice in many solid organ transplant recipients due its efficacy and favorable risk profile compared to other immunosuppressants. There has been a single case report of successful MMF desensitization. However, this protocol did not follow current Drug practice parameters. We report a successful desensitization to MMF in a double heart-kidney transplant recipient.

  7. ASRM standard embryo transfer protocol template: a committee opinion.

    PubMed

    Penzias, Alan; Bendikson, Kristin; Butts, Samantha; Coutifaris, Christos; Falcone, Tommaso; Fossum, Gregory; Gitlin, Susan; Gracia, Clarisa; Hansen, Karl; Mersereau, Jennifer; Odem, Randall; Rebar, Robert; Reindollar, Richard; Rosen, Mitchell; Sandlow, Jay; Vernon, Michael

    2017-04-01

    Standardization improves performance and safety. A template for standardizing the embryo transfer procedure is presented here with 12 basic steps supported by published scientific literature and a survey of common practice of SART programs; it can be used by ART practices to model their own standard protocol. Copyright © 2017 American Society for Reproductive Medicine. Published by Elsevier Inc. All rights reserved.

  8. Clarifying uncertainty in biogeochemical response to land management

    NASA Astrophysics Data System (ADS)

    Tonitto, C.; Gurwick, N. P.; Woodbury, P. B.

    2013-12-01

    We examined the ability of contemporary simulation and empirical modeling tools to describe net greenhouse gas (GHG) emissions as a result of agricultural and forest ecosystem land management, and we looked at how key policy institutions use these tools. We focused on quantification of nitrous oxide (N2O) emissions from agricultural systems, as agriculture is the dominant source of anthropogenic N2O emissions. Agricultural management impact on N2O emissions is especially challenging because controls on N2O emissions (soil aerobic status, inorganic N availability, and C substrate availability) vary as a function of site soil type, climate, and cropping system; available measurements do not cover all relevant combinations of these controlling system features. Furthermore, N2O emissions are highly non-linear, and threshold values of controlling soil environmental conditions are not defined across most agricultural site properties. We also examined the multi-faceted challenges regarding the quantification of increased soil organic carbon (SOC) storage as a result of land management in both agricultural and forest systems. Quantifying changes in SOC resulting from land management is difficult because mechanisms of SOC stabilization are not fully understood, SOC measurements have been concentrated in the upper 30cm of soil, erosion is often ignored when estimating SOC, and few long-term studies exist to track system response to diverse management practices. Furthermore, the permanence of SOC accumulating management practices is not easily established. For instance, under the Regional Greenhouse Gas Initiative (RGGI), forest land managed for SOC accumulation must remain under permanent conservation easement to ensure that SOC accumulation is not reversed due to changes in land cover. For agricultural protocols, given that many farmers rent land and that agriculture is driven by an annual management time scale, the ability to ensure SOC-accumulating land management would be maintained indefinitely has delayed the implementation of SOC accumulating practices for compliance with the California Global Warming Solutions Act (AB 32). GHG accounting tools are increasingly applied to implement GHG reduction policies. In this policy context, data limitation has impacted the implementation of GHG accounting strategies. For example, protocol design in support of AB 32 initially sought to apply simulation models to determine N2O emissions across all major U.S. agricultural landscapes. After discussion with ecosystem scientists, the lack of observations and model validation in most U.S. arable landscapes led to protocol definition based on simple empirical models and limited to corn management in 12 states. The distribution of protocol participants is also a potential source of inaccuracy in GHG accounting. Land management protocols are often structured assuming that in the aggregate policy achieves an average improvement by promoting specific management. However it is unclear that current policy incentives promote participation from a truly random distribution of landscapes. Participation in policy development to support improved land management challenges ecosystem scientists with making recommendations based on best-available information while acknowledging that uncertainty limits accurate quantification of impacts via analysis using either observations or simulation modeling.

  9. Qualification of computerized monitoring systems in a cell therapy facility compliant with the good manufacturing practices.

    PubMed

    Del Mazo-Barbara, Anna; Mirabel, Clémentine; Nieto, Valentín; Reyes, Blanca; García-López, Joan; Oliver-Vila, Irene; Vives, Joaquim

    2016-09-01

    Computerized systems (CS) are essential in the development and manufacture of cell-based medicines and must comply with good manufacturing practice, thus pushing academic developers to implement methods that are typically found within pharmaceutical industry environments. Qualitative and quantitative risk analyses were performed by Ishikawa and Failure Mode and Effects Analysis, respectively. A process for qualification of a CS that keeps track of environmental conditions was designed and executed. The simplicity of the Ishikawa analysis permitted to identify critical parameters that were subsequently quantified by Failure Mode Effects Analysis, resulting in a list of test included in the qualification protocols. The approach presented here contributes to simplify and streamline the qualification of CS in compliance with pharmaceutical quality standards.

  10. The relationship between processes and outcomes for injured older adults: a study of a statewide trauma system.

    PubMed

    Saillant, N N; Earl-Royal, E; Pascual, J L; Allen, S R; Kim, P K; Delgado, M K; Carr, B G; Wiebe, D; Holena, D N

    2017-02-01

    Age is a risk factor for death, adverse outcomes, and health care use following trauma. The American College of Surgeons' Trauma Quality Improvement Program (TQIP) has published "best practices" of geriatric trauma care; adoption of these guidelines is unknown. We sought to determine which evidence-based geriatric protocols, including TQIP guidelines, were correlated with decreased mortality in Pennsylvania's trauma centers. PA's level I and II trauma centers self-reported adoption of geriatric protocols. Survey data were merged with risk-adjusted mortality data for patients ≥65 from a statewide database, the Pennsylvania Trauma Systems Foundation (PTSF), to compare mortality outlier status and processes of care. Exposures of interest were center-specific processes of care; outcome of interest was PTSF mortality outlier status. 26 of 27 eligible trauma centers participated. There was wide variation in care processes. Four trauma centers were low outliers; three centers were high outliers for risk-adjusted mortality rates in adults ≥65. Results remained consistent when accounting for center volume. The only process associated with mortality outlier status was age-specific solid organ injury protocols (p = 0.04). There was no cumulative effect of multiple evidence-based processes on mortality rate (p = 0.50). We did not see a link between adoption of geriatric best-practices trauma guidelines and reduced mortality at PA trauma centers. The increased susceptibility of elderly to adverse consequences of injury, combined with the rapid growth rate of this demographic, emphasizes the importance of identifying interventions tailored to this population. III. Descriptive.

  11. 16 CFR 1210.4 - Test protocol.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 2 2012-01-01 2012-01-01 false Test protocol. 1210.4 Section 1210.4... STANDARD FOR CIGARETTE LIGHTERS Requirements for Child Resistance § 1210.4 Test protocol. (a) Child test panel. (1) The test to determine if a lighter is resistant to successful operation by children uses a...

  12. 16 CFR 1212.4 - Test protocol.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 2 2012-01-01 2012-01-01 false Test protocol. 1212.4 Section 1212.4... STANDARD FOR MULTI-PURPOSE LIGHTERS Requirements for Child-Resistance § 1212.4 Test protocol. (a) Child test panel. (1) The test to determine if a multi-purpose lighter is resistant to successful operation...

  13. 40 CFR 721.4472 - Phenyl, alkyl, hydroxyalkyl substituted imidazole (generic).

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... percent), and (c). (ii) Hazard communication program. Requirements as specified in § 721.72 (a), (b), (c... protocol. (3) TSCA Good Laboratory Practice Standards at 40 CFR part 792. (4) Using methodologies generally..., the person must obtain approval of test protocols from EPA by submitting written protocols. EPA will...

  14. Profile and birthing practices of Maranao traditional birth attendants.

    PubMed

    Maghuyop-Butalid, Roselyn; Mayo, Norhanifa A; Polangi, Hania T

    2015-01-01

    This study determined the profile and birthing practices in both modern and traditional ways among Maranao traditional birth attendants (TBAs) in Lanao del Norte, Philippines. It employed a descriptive research design. The respondents were 50 Maranao TBAs selected through the snowball sampling technique. A questionnaire was developed by the researchers to identify the respondents' modern birthing practices utilizing the Essential Intrapartum and Newborn Care (EINC) Protocol. To determine their profile and traditional birthing practices, items from a previous study and the respondents' personal claims were adapted. This study shows that Maranao TBAs have less compliance to the EINC Protocol and they often practice the traditional birthing interventions, thus increasing the risk of complications to both mother and newborn.

  15. A survey of system architecture requirements for health care-based wireless sensor networks.

    PubMed

    Egbogah, Emeka E; Fapojuwo, Abraham O

    2011-01-01

    Wireless Sensor Networks (WSNs) have emerged as a viable technology for a vast number of applications, including health care applications. To best support these health care applications, WSN technology can be adopted for the design of practical Health Care WSNs (HCWSNs) that support the key system architecture requirements of reliable communication, node mobility support, multicast technology, energy efficiency, and the timely delivery of data. Work in the literature mostly focuses on the physical design of the HCWSNs (e.g., wearable sensors, in vivo embedded sensors, et cetera). However, work towards enhancing the communication layers (i.e., routing, medium access control, et cetera) to improve HCWSN performance is largely lacking. In this paper, the information gleaned from an extensive literature survey is shared in an effort to fortify the knowledge base for the communication aspect of HCWSNs. We highlight the major currently existing prototype HCWSNs and also provide the details of their routing protocol characteristics. We also explore the current state of the art in medium access control (MAC) protocols for WSNs, for the purpose of seeking an energy efficient solution that is robust to mobility and delivers data in a timely fashion. Furthermore, we review a number of reliable transport layer protocols, including a network coding based protocol from the literature, that are potentially suitable for delivering end-to-end reliability of data transmitted in HCWSNs. We identify the advantages and disadvantages of the reviewed MAC, routing, and transport layer protocols as they pertain to the design and implementation of a HCWSN. The findings from this literature survey will serve as a useful foundation for designing a reliable HCWSN and also contribute to the development and evaluation of protocols for improving the performance of future HCWSNs. Open issues that required further investigations are highlighted.

  16. Protocol for audit of current Filipino practice in rehabilitation of stroke inpatients.

    PubMed

    Gonzalez-Suarez, Consuelo B; Dizon, Janine Margarita R; Grimmer, Karen; Estrada, Myrna S; Liao, Lauren Anne S; Malleta, Anne-Rochelle D; Tan, Ma Elena R; Marfil, Vero; Versales, Cristina S; Suarez, Jimah L; So, Kleon C; Uyehara, Edgardo D

    2015-01-01

    Stroke is one of the leading medical conditions in the Philippines. Over 500,000 Filipinos suffer from stroke annually. Provision of evidence-based medical and rehabilitation management for stroke patients has been a challenge due to existing environmental, social, and local health system issues. Thus, existing western guidelines on stroke rehabilitation were contextualized to draft recommendations relevant to the local Philippine setting. Prior to fully implementing the guidelines, an audit of current practice needs to be undertaken, thus the purpose of this audit protocol. A clinical audit of current practices in stroke rehabilitation in the Philippines will be undertaken. A consensus list of data items to be captured was identified by the audit team during a 2-day meeting in 2012. These items, including patient demographics, type of stroke, time to referral for rehabilitation management, length of hospital stay, and other relevant descriptors of stroke management were included as part of the audit. Hospitals in the Philippines will be recruited to take part in the audit activity. Recruitment will be via the registry of the Philippine Academy of Rehabilitation Medicine, where 90% of physiatrists (medical doctors specialized in rehabilitation medicine) are active members and are affiliated with various hospitals in the Philippines. Data collectors will be identified and trained in the audit process. A pilot audit will be conducted to test the feasibility of the audit protocol, and refinements to the protocol will be undertaken as necessary. The comprehensive audit process will take place for a period of 3 months. Data will be encoded using MS Excel(®). Data will be reported as means and percentages as appropriate. Subgroup analysis will be undertaken to look into differences and variability of stroke patient descriptors and rehabilitation activities. This audit study is an ambitious project, but given the "need" to conduct the audit to identify "gaps" in current practice, and the value it can bring to serve as a platform for implementation of evidence-based stroke management in the Philippines to achieve best patient and health outcomes, the audit team is more than ready to take up the challenge.

  17. Practical purification scheme for decohered coherent-state superpositions via partial homodyne detection

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Suzuki, Shigenari; Department of Electronics and Electrical Engineering, Keio University, 3-14-1, Hiyoshi, Kohoku-ku, Yokohama, 223-8522; Takeoka, Masahiro

    2006-04-15

    We present a simple protocol to purify a coherent-state superposition that has undergone a linear lossy channel. The scheme constitutes only a single beam splitter and a homodyne detector, and thus is experimentally feasible. In practice, a superposition of coherent states is transformed into a classical mixture of coherent states by linear loss, which is usually the dominant decoherence mechanism in optical systems. We also address the possibility of producing a larger amplitude superposition state from decohered states, and show that in most cases the decoherence of the states are amplified along with the amplitude.

  18. Design of Secure ECG-Based Biometric Authentication in Body Area Sensor Networks

    PubMed Central

    Peter, Steffen; Pratap Reddy, Bhanu; Momtaz, Farshad; Givargis, Tony

    2016-01-01

    Body area sensor networks (BANs) utilize wireless communicating sensor nodes attached to a human body for convenience, safety, and health applications. Physiological characteristics of the body, such as the heart rate or Electrocardiogram (ECG) signals, are promising means to simplify the setup process and to improve security of BANs. This paper describes the design and implementation steps required to realize an ECG-based authentication protocol to identify sensor nodes attached to the same human body. Therefore, the first part of the paper addresses the design of a body-area sensor system, including the hardware setup, analogue and digital signal processing, and required ECG feature detection techniques. A model-based design flow is applied, and strengths and limitations of each design step are discussed. Real-world measured data originating from the implemented sensor system are then used to set up and parametrize a novel physiological authentication protocol for BANs. The authentication protocol utilizes statistical properties of expected and detected deviations to limit the number of false positive and false negative authentication attempts. The result of the described holistic design effort is the first practical implementation of biometric authentication in BANs that reflects timing and data uncertainties in the physical and cyber parts of the system. PMID:27110785

  19. Design of Secure ECG-Based Biometric Authentication in Body Area Sensor Networks.

    PubMed

    Peter, Steffen; Reddy, Bhanu Pratap; Momtaz, Farshad; Givargis, Tony

    2016-04-22

    Body area sensor networks (BANs) utilize wireless communicating sensor nodes attached to a human body for convenience, safety, and health applications. Physiological characteristics of the body, such as the heart rate or Electrocardiogram (ECG) signals, are promising means to simplify the setup process and to improve security of BANs. This paper describes the design and implementation steps required to realize an ECG-based authentication protocol to identify sensor nodes attached to the same human body. Therefore, the first part of the paper addresses the design of a body-area sensor system, including the hardware setup, analogue and digital signal processing, and required ECG feature detection techniques. A model-based design flow is applied, and strengths and limitations of each design step are discussed. Real-world measured data originating from the implemented sensor system are then used to set up and parametrize a novel physiological authentication protocol for BANs. The authentication protocol utilizes statistical properties of expected and detected deviations to limit the number of false positive and false negative authentication attempts. The result of the described holistic design effort is the first practical implementation of biometric authentication in BANs that reflects timing and data uncertainties in the physical and cyber parts of the system.

  20. A Hierarchical Modulation Coherent Communication Scheme for Simultaneous Four-State Continuous-Variable Quantum Key Distribution and Classical Communication

    NASA Astrophysics Data System (ADS)

    Yang, Can; Ma, Cheng; Hu, Linxi; He, Guangqiang

    2018-06-01

    We present a hierarchical modulation coherent communication protocol, which simultaneously achieves classical optical communication and continuous-variable quantum key distribution. Our hierarchical modulation scheme consists of a quadrature phase-shifting keying modulation for classical communication and a four-state discrete modulation for continuous-variable quantum key distribution. The simulation results based on practical parameters show that it is feasible to transmit both quantum information and classical information on a single carrier. We obtained a secure key rate of 10^{-3} bits/pulse to 10^{-1} bits/pulse within 40 kilometers, and in the meantime the maximum bit error rate for classical information is about 10^{-7}. Because continuous-variable quantum key distribution protocol is compatible with standard telecommunication technology, we think our hierarchical modulation scheme can be used to upgrade the digital communication systems to extend system function in the future.

  1. Revealing of photon-number splitting attack on quantum key distribution system by photon-number resolving devices

    NASA Astrophysics Data System (ADS)

    Gaidash, A. A.; Egorov, V. I.; Gleim, A. V.

    2016-08-01

    Quantum cryptography allows distributing secure keys between two users so that any performed eavesdropping attempt would be immediately discovered. However, in practice an eavesdropper can obtain key information from multi-photon states when attenuated laser radiation is used as a source of quantum states. In order to prevent actions of an eavesdropper, it is generally suggested to implement special cryptographic protocols, like decoy states or SARG04. In this paper, we describe an alternative method based on monitoring photon number statistics after detection. We provide a useful rule of thumb to estimate approximate order of difference of expected distribution and distribution in case of attack. Formula for calculating a minimum value of total pulses or time-gaps to resolve attack is shown. Also formulas for actual fraction of raw key known to Eve were derived. This method can therefore be used with any system and even combining with mentioned special protocols.

  2. Knowledge, attitudes, beliefs and behaviour intentions for three bowel management practices in intensive care: effects of a targeted protocol implementation for nursing and medical staff.

    PubMed

    Knowles, Serena; Lam, Lawrence T; McInnes, Elizabeth; Elliott, Doug; Hardy, Jennifer; Middleton, Sandy

    2015-01-01

    Bowel management protocols have the potential to minimize complications for critically ill patients. Targeted implementation can increase the uptake of protocols by clinicians into practice. The theory of planned behaviour offers a framework in which to investigate clinicians' intention to perform the behaviour of interest. This study aimed to evaluate the effect of implementing a bowel management protocol on intensive care nursing and medical staffs' knowledge, attitude, subjective norms, perceived behavioural control, behaviour intentions, role perceptions and past behaviours in relation to three bowel management practices. A descriptive before and after survey using a self-administered questionnaire sent to nursing and medical staff working within three intensive care units before and after implementation of our bowel management protocol (pre: May - June 2008; post: Feb - May 2009). Participants had significantly higher knowledge scores post-implementation of our protocol (pre mean score 17.6; post mean score 19.3; p = 0.004). Post-implementation there was a significant increase in: self-reported past behaviour (pre mean score 5.38; post mean score 7.11; p = 0.002) and subjective norms scores (pre mean score 3.62; post mean score 4.18; p = 0.016) for bowel assessment; and behaviour intention (pre mean score 5.22; post mean score 5.65; p = 0.048) for administration of enema. This evaluation, informed by the theory of planned behaviour, has provided useful insights into factors that influence clinician intentions to perform evidence-based bowel management practices in intensive care. Addressing factors such as knowledge, attitudes and beliefs can assist in targeting implementation strategies to positively affect clinician behaviour change. Despite an increase in clinicians' knowledge scores, our implementation strategy did not, however, significantly change clinician behaviour intentions for all three bowel management practices. Further research is required to explore the influence of opinion leaders and organizational culture on clinicians' behaviour intentions related to bowel management for intensive care patients.

  3. A detailed description of the implementation of inpatient insulin orders with a commercial electronic health record system.

    PubMed

    Neinstein, Aaron; MacMaster, Heidemarie Windham; Sullivan, Mary M; Rushakoff, Robert

    2014-07-01

    In the setting of Meaningful Use laws and professional society guidelines, hospitals are rapidly implementing electronic glycemic management order sets. There are a number of best practices established in the literature for glycemic management protocols and programs. We believe that this is the first published account of the detailed steps to be taken to design, implement, and optimize glycemic management protocols in a commercial computerized provider order entry (CPOE) system. Prior to CPOE implementation, our hospital already had a mature glycemic management program. To transition to CPOE, we underwent the following 4 steps: (1) preparation and requirements gathering, (2) design and build, (3) implementation and dissemination, and (4) optimization. These steps required more than 2 years of coordinated work between physicians, nurses, pharmacists, and programmers. With the move to CPOE, our complex glycemic management order sets were successfully implemented without any significant interruptions in care. With feedback from users, we have continued to refine the order sets, and this remains an ongoing process. Successful implementation of glycemic management protocols in CPOE is dependent on broad stakeholder input and buy-in. When using a commercial CPOE system, there may be limitations of the system, necessitating workarounds. There should be an upfront plan to apply resources for continuous process improvement and optimization after implementation. © 2014 Diabetes Technology Society.

  4. Practical quantum coin flipping

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pappa, Anna; Diamanti, Eleni; Chailloux, Andre

    2011-11-15

    We show that in the unconditional security model, a single quantum strong coin flip with security guarantees that are strictly better than in any classical protocol is possible to implement with current technology. Our protocol takes into account all aspects of an experimental implementation, including losses, multiphoton pulses emitted by practical photon sources, channel noise, detector dark counts, and finite quantum efficiency. We calculate the abort probability when both players are honest, as well as the probability of one player forcing his desired outcome. For a channel length up to 21 km and commonly used parameter values, we can achievemore » honest abort and cheating probabilities that are better than in any classical protocol. Our protocol is, in principle, implementable using attenuated laser pulses, with no need for entangled photons or any other specific resources.« less

  5. Communication-Gateway Software For NETEX, DECnet, And TCP/IP

    NASA Technical Reports Server (NTRS)

    Keith, B.; Ferry, D.; Fendler, E.

    1990-01-01

    Communications gateway software, GATEWAY, provides process-to-process communication between remote applications programs in different protocol domains. Communicating peer processes may be resident on any paired combination of NETEX, DECnet, or TCP/IP hosts. Provides necessary mapping from one protocol to another and facilitates practical intermachine communications in cost-effective manner by eliminating need to standardize on single protocol or to implement multiple protocols in host computers. Written in Ada.

  6. Automatic Determination of the Need for Intravenous Contrast in Musculoskeletal MRI Examinations Using IBM Watson's Natural Language Processing Algorithm.

    PubMed

    Trivedi, Hari; Mesterhazy, Joseph; Laguna, Benjamin; Vu, Thienkhai; Sohn, Jae Ho

    2018-04-01

    Magnetic resonance imaging (MRI) protocoling can be time- and resource-intensive, and protocols can often be suboptimal dependent upon the expertise or preferences of the protocoling radiologist. Providing a best-practice recommendation for an MRI protocol has the potential to improve efficiency and decrease the likelihood of a suboptimal or erroneous study. The goal of this study was to develop and validate a machine learning-based natural language classifier that can automatically assign the use of intravenous contrast for musculoskeletal MRI protocols based upon the free-text clinical indication of the study, thereby improving efficiency of the protocoling radiologist and potentially decreasing errors. We utilized a deep learning-based natural language classification system from IBM Watson, a question-answering supercomputer that gained fame after challenging the best human players on Jeopardy! in 2011. We compared this solution to a series of traditional machine learning-based natural language processing techniques that utilize a term-document frequency matrix. Each classifier was trained with 1240 MRI protocols plus their respective clinical indications and validated with a test set of 280. Ground truth of contrast assignment was obtained from the clinical record. For evaluation of inter-reader agreement, a blinded second reader radiologist analyzed all cases and determined contrast assignment based on only the free-text clinical indication. In the test set, Watson demonstrated overall accuracy of 83.2% when compared to the original protocol. This was similar to the overall accuracy of 80.2% achieved by an ensemble of eight traditional machine learning algorithms based on a term-document matrix. When compared to the second reader's contrast assignment, Watson achieved 88.6% agreement. When evaluating only the subset of cases where the original protocol and second reader were concordant (n = 251), agreement climbed further to 90.0%. The classifier was relatively robust to spelling and grammatical errors, which were frequent. Implementation of this automated MR contrast determination system as a clinical decision support tool may save considerable time and effort of the radiologist while potentially decreasing error rates, and require no change in order entry or workflow.

  7. Developing a Web-Based Nursing Practice and Research Information Management System: A Pilot Study.

    PubMed

    Choi, Jeeyae; Lapp, Cathi; Hagle, Mary E

    2015-09-01

    Many hospital information systems have been developed and implemented to collect clinical data from the bedside and have used the information to improve patient care. Because of a growing awareness that the use of clinical information improves quality of care and patient outcomes, measuring tools (electronic and paper based) have been developed, but most of them require multiple steps of data collection and analysis. This necessitated the development of a Web-based Nursing Practice and Research Information Management System that processes clinical nursing data to measure nurses' delivery of care and its impact on patient outcomes and provides useful information to clinicians, administrators, researchers, and policy makers at the point of care. This pilot study developed a computer algorithm based on a falls prevention protocol and programmed the prototype Web-based Nursing Practice and Research Information Management System. It successfully measured performance of nursing care delivered and its impact on patient outcomes successfully using clinical nursing data from the study site. Although Nursing Practice and Research Information Management System was tested with small data sets, results of study revealed that it has the potential to measure nurses' delivery of care and its impact on patient outcomes, while pinpointing components of nursing process in need of improvement.

  8. Security of modified Ping-Pong protocol in noisy and lossy channel

    PubMed Central

    Han, Yun-Guang; Yin, Zhen-Qiang; Li, Hong-Wei; Chen, Wei; Wang, Shuang; Guo, Guang-Can; Han, Zheng-Fu

    2014-01-01

    The “Ping-Pong” (PP) protocol is a two-way quantum key protocol based on entanglement. In this protocol, Bob prepares one maximally entangled pair of qubits, and sends one qubit to Alice. Then, Alice performs some necessary operations on this qubit and sends it back to Bob. Although this protocol was proposed in 2002, its security in the noisy and lossy channel has not been proven. In this report, we add a simple and experimentally feasible modification to the original PP protocol, and prove the security of this modified PP protocol against collective attacks when the noisy and lossy channel is taken into account. Simulation results show that our protocol is practical. PMID:24816899

  9. Security of modified Ping-Pong protocol in noisy and lossy channel.

    PubMed

    Han, Yun-Guang; Yin, Zhen-Qiang; Li, Hong-Wei; Chen, Wei; Wang, Shuang; Guo, Guang-Can; Han, Zheng-Fu

    2014-05-12

    The "Ping-Pong" (PP) protocol is a two-way quantum key protocol based on entanglement. In this protocol, Bob prepares one maximally entangled pair of qubits, and sends one qubit to Alice. Then, Alice performs some necessary operations on this qubit and sends it back to Bob. Although this protocol was proposed in 2002, its security in the noisy and lossy channel has not been proven. In this report, we add a simple and experimentally feasible modification to the original PP protocol, and prove the security of this modified PP protocol against collective attacks when the noisy and lossy channel is taken into account. Simulation results show that our protocol is practical.

  10. Comparing Usual Care With a Warfarin Initiation Protocol After Mechanical Heart Valve Replacement.

    PubMed

    Roberts, Gregory; Razooqi, Rasha; Quinn, Stephen

    2017-03-01

    The immediate postoperative warfarin sensitivity for patients receiving heart valve prostheses is increased. Established warfarin initiation protocols may lack clinical applicability, resulting in dosing based on clinical judgment. To compare current practice for warfarin initiation with a known warfarin initiation protocol, with doses proportionally reduced to account for the increased postoperative sensitivity. We compared the Mechanical Heart Valve Warfarin Initiation Protocol (Protocol group) with current practice (clinical judgment-Empirical group) for patients receiving mechanical heart valves in an observational before-and-after format. End points were the time to achieve a stable therapeutic international normalized ratio (INR), doses held in the first 6 days, and overanticoagulation in the first 6 days. The Protocol group (n = 37) achieved a stable INR more rapidly than the Empirical group (n = 77; median times 5.1 and 8.7 days, respectively; P = 0.002). Multivariable analysis indicated that the Protocol group (hazard ratio [HR] = 2.22; P = 0.005) and men (HR = 1.76; P = 0.043) more rapidly achieved a stable therapeutic INR. Age, serum albumin, amiodarone, presence of severe heart failure, and surgery type had no impact. Protocol patients had fewer doses held (1.1% vs 10.1%, P < 0.001) and no difference in overanticoagulation (2.7% vs 9.1%, P = 0.27). The Mechanical Heart Valve Warfarin Initiation Protocol provided a reliable approach to initiating warfarin in patients receiving mechanical aortic or mitral valves.

  11. Protocols for pressure ulcer prevention: are they evidence-based?

    PubMed

    Chaves, Lidice M; Grypdonck, Mieke H F; Defloor, Tom

    2010-03-01

    This study is a report of a study to determine the quality of protocols for pressure ulcer prevention in home care in the Netherlands. If pressure ulcer prevention protocols are evidence-based and practitioners use them correctly in practice, this will result a reduction in pressure ulcers. Very little is known about the evidence-based content and quality of the pressure ulcer prevention protocols. In 2008, current pressure ulcer prevention protocols from 24 home-care agencies in the Netherlands were evaluated. A checklist developed and validated by two pressure ulcer prevention experts was used to assess the quality of the protocols, and weighted and unweighted quality scores were computed and analysed using descriptive statistics. The 24 pressure ulcer prevention protocols had a mean weighted quality score of 63.38 points out of a maximum of 100 (sd 5). The importance of observing the skin at the pressure points at least once a day was emphasized in 75% of the protocols. Only 42% correctly warned against the use of materials that were 'less effective or that could potentially cause harm'. Pressure ulcer prevention commands a reasonable amount of attention in home care, but the incidence of pressure ulcers and lack of a consistent, standardized document for use in actual practice indicate a need for systematic implementation of national pressure ulcer prevention standards in the Netherlands to ensure adherence to the established protocols.

  12. Measuring Reform Practices in Science and Mathematics Classrooms: The Reformed Teaching Observation Protocol.

    ERIC Educational Resources Information Center

    Sawada, Daiyo; Piburn, Michael D.; Judson, Eugene; Turley, Jeff; Falconer, Kathleen; Benford, Russell; Bloom, Irene

    2002-01-01

    Describes the Reformed Teaching Observation Protocol (RTOP), a 25-item classroom observation protocol that is standards-based, inquiry-oriented, and student-centered. Provides the definition for reform and the basis for evaluation of the Arizona Collaborative for Excellence in the Preparation of Teachers (ACEPT). Concludes that reform, as defined…

  13. Methodology capture: discriminating between the "best" and the rest of community practice

    PubMed Central

    Eales, James M; Pinney, John W; Stevens, Robert D; Robertson, David L

    2008-01-01

    Background The methodologies we use both enable and help define our research. However, as experimental complexity has increased the choice of appropriate methodologies has become an increasingly difficult task. This makes it difficult to keep track of available bioinformatics software, let alone the most suitable protocols in a specific research area. To remedy this we present an approach for capturing methodology from literature in order to identify and, thus, define best practice within a field. Results Our approach is to implement data extraction techniques on the full-text of scientific articles to obtain the set of experimental protocols used by an entire scientific discipline, molecular phylogenetics. Our methodology for identifying methodologies could in principle be applied to any scientific discipline, whether or not computer-based. We find a number of issues related to the nature of best practice, as opposed to community practice. We find that there is much heterogeneity in the use of molecular phylogenetic methods and software, some of which is related to poor specification of protocols. We also find that phylogenetic practice exhibits field-specific tendencies that have increased through time, despite the generic nature of the available software. We used the practice of highly published and widely collaborative researchers ("expert" researchers) to analyse the influence of authority on community practice. We find expert authors exhibit patterns of practice common to their field and therefore act as useful field-specific practice indicators. Conclusion We have identified a structured community of phylogenetic researchers performing analyses that are customary in their own local community and significantly different from those in other areas. Best practice information can help to bridge such subtle differences by increasing communication of protocols to a wider audience. We propose that the practice of expert authors from the field of evolutionary biology is the closest to contemporary best practice in phylogenetic experimental design. Capturing best practice is, however, a complex task and should also acknowledge the differences between fields such as the specific context of the analysis. PMID:18761740

  14. Framework and indicator testing protocol for developing and piloting quality indicators for the UK quality and outcomes framework.

    PubMed

    Campbell, Stephen M; Kontopantelis, Evangelos; Hannon, Kerin; Burke, Martyn; Barber, Annette; Lester, Helen E

    2011-08-10

    Quality measures should be subjected to a testing protocol before being used in practice using key attributes such as acceptability, feasibility and reliability, as well as identifying issues derived from actual implementation and unintended consequences. We describe the methodologies and results of an indicator testing protocol (ITP) using data from proposed quality indicators for the United Kingdom Quality and Outcomes Framework (QOF). The indicator testing protocol involved a multi-step and methodological process: 1) The RAND/UCLA Appropriateness Method, to test clarity and necessity, 2) data extraction from patients' medical records, to test technical feasibility and reliability, 3) diaries, to test workload, 4) cost-effectiveness modelling, and 5) semi-structured interviews, to test acceptability, implementation issues and unintended consequences. Testing was conducted in a sample of representative family practices in England. These methods were combined into an overall recommendation for each tested indicator. Using an indicator testing protocol as part of piloting was seen as a valuable way of testing potential indicators in 'real world' settings. Pilot 1 (October 2009-March 2010) involved thirteen indicators across six clinical domains and twelve indicators passed the indicator testing protocol. However, the indicator testing protocol identified a number of implementation issues and unintended consequences that can be rectified or removed prior to national roll out. A palliative care indicator is used as an exemplar of the value of piloting using a multiple attribute indicator testing protocol - while technically feasible and reliable, it was unacceptable to practice staff and raised concerns about potentially causing actual patient harm. This indicator testing protocol is one example of a protocol that may be useful in assessing potential quality indicators when adapted to specific country health care settings and may be of use to policy-makers and researchers worldwide to test the likely effect of implementing indicators prior to roll out. It builds on and codifies existing literature and other testing protocols to create a field testing methodology that can be used to produce country specific quality indicators for pay-for-performance or quality improvement schemes.

  15. Are emergency medical technician-basics able to use a selective immobilization of the cervical spine protocol?: a preliminary report.

    PubMed

    Dunn, Thomas M; Dalton, Alice; Dorfman, Todd; Dunn, William W

    2004-01-01

    To be a first step in determining whether emergency medicine technician (EMT)-Basics are capable of using a protocol that allows for selective immobilization of the cervical spine. Such protocols are coming into use at an advanced life support level and could be beneficial when used by basic life support providers. A convenience sample of participants (n=95) from 11 emergency medical services agencies and one college class participated in the study. All participants evaluated six patients in written scenarios and decided which should be placed into spinal precautions according to a selective spinal immobilization protocol. Systems without an existing selective spinal immobilization protocol received a one-hour continuing education lecture regarding the topic. College students received a similar lecture written so laypersons could understand the protocol. All participants showed proficiency when applying a selective immobilization protocol to patients in paper-based scenarios. Furthermore, EMT-Basics performed at the same level as paramedics when following the protocol. Statistical analysis revealed no significant differences between EMT-Basics and paramedics. A follow-up group of college students (added to have a non-EMS comparison group) also performed as well as paramedics when making decisions to use spinal precautions. Differences between college students and paramedics were also statistically insignificant. The results suggest that EMT-Basics are as accurate as paramedics when making decisions regarding selective immobilization of the cervical spine during paper-based scenarios. That laypersons are also proficient when using the protocol could indicate that it is extremely simple to follow. This study is a first step toward the necessary additional studies evaluating the efficacy of EMT-Basics using selective immobilization as a regular practice.

  16. A Guide to Writing a Qualitative Systematic Review Protocol to Enhance Evidence-Based Practice in Nursing and Health Care.

    PubMed

    Butler, Ashleigh; Hall, Helen; Copnell, Beverley

    2016-06-01

    The qualitative systematic review is a rapidly developing area of nursing research. In order to present trustworthy, high-quality recommendations, such reviews should be based on a review protocol to minimize bias and enhance transparency and reproducibility. Although there are a number of resources available to guide researchers in developing a quantitative review protocol, very few resources exist for qualitative reviews. To guide researchers through the process of developing a qualitative systematic review protocol, using an example review question. The key elements required in a systematic review protocol are discussed, with a focus on application to qualitative reviews: Development of a research question; formulation of key search terms and strategies; designing a multistage review process; critical appraisal of qualitative literature; development of data extraction techniques; and data synthesis. The paper highlights important considerations during the protocol development process, and uses a previously developed review question as a working example. This paper will assist novice researchers in developing a qualitative systematic review protocol. By providing a worked example of a protocol, the paper encourages the development of review protocols, enhancing the trustworthiness and value of the completed qualitative systematic review findings. Qualitative systematic reviews should be based on well planned, peer reviewed protocols to enhance the trustworthiness of results and thus their usefulness in clinical practice. Protocols should outline, in detail, the processes which will be used to undertake the review, including key search terms, inclusion and exclusion criteria, and the methods used for critical appraisal, data extraction and data analysis to facilitate transparency of the review process. Additionally, journals should encourage and support the publication of review protocols, and should require reference to a protocol prior to publication of the review results. © 2016 Sigma Theta Tau International.

  17. Polarization entanglement purification of nonlocal microwave photons based on the cross-Kerr effect in circuit QED

    NASA Astrophysics Data System (ADS)

    Zhang, Hao; Liu, Qian; Xu, Xu-Sheng; Xiong, Jun; Alsaedi, Ahmed; Hayat, Tasawar; Deng, Fu-Guo

    2017-11-01

    Microwave photons have become very important qubits in quantum communication, as the first quantum satellite has been launched successfully. Therefore, it is a necessary and meaningful task for ensuring the high security and efficiency of microwave-based quantum communication in practice. Here, we present an original polarization entanglement purification protocol for nonlocal microwave photons based on the cross-Kerr effect in circuit quantum electrodynamics (QED). Our protocol can solve the problem that the purity of maximally entangled states used for constructing quantum channels will decrease due to decoherence from environment noise. This task is accomplished by means of the polarization parity-check quantum nondemolition (QND) detector, the bit-flipping operation, and the linear microwave elements. The QND detector is composed of several cross-Kerr effect systems which can be realized by coupling two superconducting transmission line resonators to a superconducting molecule with the N -type level structure. We give the applicable experimental parameters of QND measurement system in circuit QED and analyze the fidelities. Our protocol has good applications in long-distance quantum communication assisted by microwave photons in the future, such as satellite quantum communication.

  18. [Radiological knowledge management with the help of departmental wikis].

    PubMed

    Schuster, A; Brachthäuser, D; Mansour, M; Alfke, H

    2016-09-01

    In times of RIS (radiology information system) and KIS (hospital information system) systems, patient-related data are at the radiologist's disposal at the push of a button. However, this is not the case for other important data. The increasing complexity of modern medicine demands that up-to-date information like protocols, SOPs (Standards of Practice), news and modifications are constantly accessible to all employees. This aspect of quality assurance becomes increasingly important in the context of certification. For such knowledge management purposes we have built a wiki in our department. Here we report our positive experiences with this technology.

  19. External evaluation of the Dimension Vista 1500® intelligent lab system.

    PubMed

    Bruneel, Arnaud; Dehoux, Monique; Barnier, Anne; Boutten, Anne

    2012-09-01

    Dimension Vista® analyzer combines four technologies (photometry, nephelometry, V-LYTE® integrated multisensor potentiometry, and LOCI® chemiluminescence) into one high-throughput system. We assessed analytical performance of assays routinely performed in our emergency laboratory according to the VALTEC protocol, and practicability. Precision was good for most parameters. Analytical domain was large and suitable for undiluted analysis in most clinical settings encountered in our hospital. Data were comparable and correlated to our routine analyzers (Roche Modular DP®, Abbott AXSYM®, Siemens Dimension® RxL, and BN ProSpec®). Performance of nephelometric and LOCI modules was excellent. Functional sensitivity of high-sensitivity C-reactive protein and cardiac troponin I were 0.165 mg/l and 0.03 ng/ml, respectively (coefficient of variation; CV < 10%). The influence of interfering substances (i.e., hemoglobin, bilirubin, or lipids) was moderate, and Dimension Vista® specifically alerted for interference according to HIL (hemolysis, icterus, lipemia) indices. Good instrument performance and full functionality (no reagent or sample carryover in the conditions evaluated, effective sample-volume detection, and clot detection) were confirmed. Simulated routine testing demonstrated excellent practicability, throughput, ease of use of software and security. Performance and practicability of Dimension Vista® are highly suitable for both routine and emergency use. Since no volume detection and thus no warning is available on limited sample racks, pediatric samples require special caution to the Siemens protocol to be analyzed in secured conditions. Our experience in routine practice is also discussed, i.e., the impact of daily workload, "manual" steps resulting from dilutions and pediatric samples, maintenances, flex hydration on instrument's performance on throughput and turnaround time. © 2012 Wiley Periodicals, Inc.

  20. The Impact of a Universal Decolonization Protocol on Hospital-Acquired Methicillin-Resistant Staphylococcus aureus in a Burn Population.

    PubMed

    Johnson, Arthur T; Nygaard, Rachel M; Cohen, Ellie M; Fey, Ryan M; Wagner, Anne Lambert

    Hospital-acquired (HA) methicillin-resistant Staphylococcus aureus (MRSA) is a leading cause of HA infections and a significant concern for burn centers. The use of 2% chlorhexidine-impregnated wipes and nasal mupirocin significantly decreases the rate of HA-MRSA in adult intensive care units. The aim of this study was to examine the impact of universal decolonization on the rate of MRSA conversion in an American Burn Association verified adult and pediatric burn center. Universal decolonization protocol consisting of daily chlorhexidine baths and a 5-day course of nasal mupirocin was implemented in the burn unit. MRSA screening both on admission and weekly and contact isolation practices were in place in pre-decolonization and post-decolonization periods. Patient data were analyzed 2 years before and 1 year after implementation of the protocol. The incidence rate of MRSA was significantly decreased after the implementation of the decolonization protocol (11.8 vs 1.0 per 1000 patient days, P < .001). Secondary to the loss of the skin barrier and suppressed immune systems, burn patients are at greater risk for invasive infection leading to severe complications and death. The prevalence of HA-MRSA at our institution's burn center was significantly decreased after the implementation of a universal decolonization protocol.

  1. Implementing AORN recommended practices for prevention of deep vein thrombosis.

    PubMed

    Van Wicklin, Sharon A

    2011-11-01

    One to two people per 1,000 are affected by deep vein thrombosis (DVT) or pulmonary embolism in the United States each year. AORN published its new "Recommended practices for prevention of deep vein thrombosis" to guide perioperative RNs in establishing organization-wide protocols for DVT prevention. Strategies for successful implementation of the recommended practices include taking a multidisciplinary approach to protocol development, providing education and guidance for performing preoperative patient assessments and administering DVT prophylaxis, and having appropriate resources and the facility's policy and procedure for DVT prevention readily available in the practice setting. Hospital and ambulatory patient scenarios have been included as examples of appropriate execution of the recommended practices. Copyright © 2011 AORN, Inc. Published by Elsevier Inc. All rights reserved.

  2. Virtual Sensorimotor Balance Training for Children With Fetal Alcohol Spectrum Disorders: Feasibility Study.

    PubMed

    McCoy, Sarah Westcott; Jirikowic, Tracy; Price, Robert; Ciol, Marcia A; Hsu, Lin-Ya; Dellon, Brian; Kartin, Deborah

    2015-11-01

    Diminished sensory adaptation has been associated with poor balance control for children with fetal alcohol spectrum disorders (FASD). A virtual reality system, Sensorimotor Training to Affect Balance, Engagement and Learning (STABEL), was developed to train sensory control for balance. The purpose of this study was to examine the STABEL system in children with FASD and children with typical development (TD) to (1) determine the feasibility of the STABEL system and (2) explore the immediate effects of the STABEL system on sensory attention and postural control. This is a technical report with observational study data. Eleven children with FASD and 11 children with TD, aged 8 to 16 years, completed 30 minutes of STABEL training. The children answered questions about their experience using STABEL. Sensory attention and postural control were measured pre- and post-STABEL training with the Multimodal Balance Entrainment Response system and compared using repeated-measures analysis of variance. All children engaged in game play and tolerated controlled sensory input during the STABEL protocol. Immediate effects post-STABEL training in both groups were increased postural sway velocity and some changes in entrainment gain. Children with FASD showed higher entrainment gain to vestibular stimuli. There were no significant changes in sensory attention fractions. The small sample size, dose of STABEL training, and exploratory statistical analyses are study limitations, but findings warrant larger systematic study to examine therapeutic effects. Children completed the training protocol, demonstrating the feasibility of the STABEL system. Differences in postural sway velocity post-STABEL training may have been affected by fatigue, warranting further investigation. Limited immediate effects suggest more practice is needed to affect sensory attention; however, entrainment gain changes suggest the STABEL system provoked vestibular responses during balance practice. © 2015 American Physical Therapy Association.

  3. The offer network protocol: Mathematical foundations and a roadmap for the development of a global brain

    NASA Astrophysics Data System (ADS)

    Heylighen, Francis

    2017-01-01

    The world is confronted with a variety of interdependent problems, including scarcity, unsustainability, inequality, pollution and poor governance. Tackling such complex challenges requires coordinated action. The present paper proposes the development of a self-organizing system for coordination, called an "offer network", that would use the distributed intelligence of the Internet to match the offers and needs of all human, technological and natural agents on the planet. This would maximize synergy and thus minimize waste and scarcity of resources. Implementing such coordination requires a protocol that formally defines agents, offers, needs, and the network of condition-action rules or reactions that interconnect them. Matching algorithms can then determine self-sustaining subnetworks in which each consumed resource (need) is also produced (offer). After sketching the elements of a mathematical foundation for offer networks, the paper proposes a roadmap for their practical implementation. This includes step-by-step integration with technologies such as the Semantic Web, ontologies, the Internet of Things, reputation and recommendation systems, reinforcement learning, governance through legal constraints and nudging, and ecosystem modeling. The resulting intelligent platform should be able to tackle nearly all practical and theoretical problems in a bottom-up, distributed manner, thus functioning like a Global Brain for humanity.

  4. Practical decoy state for quantum key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ma Xiongfeng; Qi Bing; Zhao Yi

    2005-07-15

    Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution (QKD). Here, we present a general theory of the decoy state protocol based on only two decoy states and one signal state. We perform optimization on the choice of intensities of the two decoy states and the signal state. Our result shows that a decoy state protocol with only two types of decoy states - the vacuum and a weak decoy state - asymptotically approaches the theoretical limit of the most general type of decoy state protocol (with an infinite numbermore » of decoy states). We also present a one-decoy-state protocol. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long-distance (larger than 100 km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical.« less

  5. Sedation, Sleep Promotion, and Delirium Screening Practices in the Care of Mechanically Ventilated Children: A Wake-up Call for the Pediatric Critical Care Community

    PubMed Central

    Yaster, Myron; Punjabi, Naresh M.

    2014-01-01

    Objective To examine pediatric intensivist sedation management, sleep promotion, and delirium screening practices for intubated and mechanically ventilated children. Design An international, online survey of questions regarding sedative and analgesic medication choices and availability, sedation protocols, sleep optimization, and delirium recognition and treatment. Setting Member societies of the World Federation of Pediatric Intensive and Critical Care Societies were asked to send the survey to their mailing lists; responses were collected from July 2012 to January 2013. Interventions Survey Measurements and Main Results The survey was completed by 341 respondents, the majority of whom were from North America (70%). Twenty-seven percent of respondents reported having written sedation protocols. Most respondents worked in pediatric intensive care units (PICUs) with sedation scoring systems (70%), although only 42% of those with access to scoring systems reported routine daily use for goal-directed sedation management. The State Behavioral Scale was the most commonly used scoring system in North America (22%), with the COMFORT score more prevalent in all other countries (39%). The most commonly used sedation regimen for intubated children was a combination of opioid and benzodiazepine (72%). Most intensivists chose fentanyl as their first-line opioid (66%) and midazolam as their first-line benzodiazepine (86%), and prefer to administer these medications as continuous infusions. Propofol and dexmedetomidine were the most commonly restricted medications in PICUs internationally. Use of earplugs, eye masks, noise reduction, and lighting optimization for sleep promotion was uncommon. Delirium screening was not practiced in 71% of respondent’s PICUs, and only 2% reported routine screening at least twice a day. Conclusions The results highlight the heterogeneity in sedation practices among intensivists who care for critically ill children, as well as a paucity of sleep promotion and delirium screening in PICUs worldwide. PMID:24717461

  6. National Football League Head, Neck and Spine Committee's Concussion Diagnosis and Management Protocol: 2017-18 season.

    PubMed

    Ellenbogen, Richard G; Batjer, Hunt; Cardenas, Javier; Berger, Mitchel; Bailes, Julian; Pieroth, Elizabeth; Heyer, Robert; Theodore, Nicholas; Hsu, Wellington; Nabel, Elizabeth; Maroon, Joe; Cantu, Robert; Barnes, Ronnie; Collins, James; Putukian, Margot; Lonser, Russell; Solomon, Gary; Sills, Allen

    2018-03-16

    One of the National Football League's (NFL) Head, Neck and Spine Committee's principal goals is to create a 'best practice' protocol for concussion diagnosis and management for its players. The science related to concussion diagnosis and management continues to evolve, thus the protocol has evolved contemporaneously. The Fifth International Conference on Concussion in Sport was held in Berlin in 2016, and guidelines for sports concussion diagnosis and management were revised and refined. The NFL Head, Neck and Spine Committee has synthesised the most recent empirical evidence for sports concussion diagnosis and management including the Berlin consensus statement and tailored it to the game played in the NFL. One of the goals of the Committee is to provide a standardised, reliable, efficient and evidence-based protocol for concussion diagnosis and management that can be applied in this professional sport during practice and game day. In this article, the end-of-season version of the 2017-18 NFL Concussion Diagnosis and Management Protocol is described along with its clinical rationale. Immediate actions for concussion programme enhancement and research are reviewed. It is the Committee's expectation that the protocol will undergo refinement and revision over time as the science and clinical practice related to concussion in sports crystallise. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  7. Practical quantum appointment scheduling

    NASA Astrophysics Data System (ADS)

    Touchette, Dave; Lovitz, Benjamin; Lütkenhaus, Norbert

    2018-04-01

    We propose a protocol based on coherent states and linear optics operations for solving the appointment-scheduling problem. Our main protocol leaks strictly less information about each party's input than the optimal classical protocol, even when considering experimental errors. Along with the ability to generate constant-amplitude coherent states over two modes, this protocol requires the ability to transfer these modes back-and-forth between the two parties multiple times with very low losses. The implementation requirements are thus still challenging. Along the way, we develop tools to study quantum information cost of interactive protocols in the finite regime.

  8. Writing Interview Protocols and Conducting Interviews: Tips for Students New to the Field of Qualitative Research

    ERIC Educational Resources Information Center

    Jacob, Stacy A.; Furgerson, S. Paige

    2012-01-01

    Students new to doing qualitative research in the ethnographic and oral traditions, often have difficulty creating successful interview protocols. This article offers practical suggestions for students new to qualitative research for both writing interview protocol that elicit useful data and for conducting the interview. This piece was originally…

  9. Issues of diagnostic review in brain tumor studies: from the Brain Tumor Epidemiology Consortium.

    PubMed

    Davis, Faith G; Malmer, Beatrice S; Aldape, Ken; Barnholtz-Sloan, Jill S; Bondy, Melissa L; Brännström, Thomas; Bruner, Janet M; Burger, Peter C; Collins, V Peter; Inskip, Peter D; Kruchko, Carol; McCarthy, Bridget J; McLendon, Roger E; Sadetzki, Siegal; Tihan, Tarik; Wrensch, Margaret R; Buffler, Patricia A

    2008-03-01

    Epidemiologists routinely conduct centralized single pathology reviews to minimize interobserver diagnostic variability, but this practice does not facilitate the combination of studies across geographic regions and institutions where diagnostic practices differ. A meeting of neuropathologists and epidemiologists focused on brain tumor classification issues in the context of protocol needs for consortial studies (http://epi.grants.cancer.gov/btec/). It resulted in recommendations relevant to brain tumors and possibly other rare disease studies. Two categories of brain tumors have enough general agreement over time, across regions, and between individual pathologists that one can consider using existing diagnostic data without further review: glioblastomas and meningiomas (as long as uniform guidelines such as those provided by the WHO are used). Prospective studies of these tumors benefit from collection of pathology reports, at a minimum recording the pathology department and classification system used in the diagnosis. Other brain tumors, such as oligodendroglioma, are less distinct and require careful histopathologic review for consistent classification across study centers. Epidemiologic study protocols must consider the study specific aims, diagnostic changes that have taken place over time, and other issues unique to the type(s) of tumor being studied. As diagnostic changes are being made rapidly, there are no readily available answers on disease classification issues. It is essential that epidemiologists and neuropathologists collaborate to develop appropriate study designs and protocols for specific hypothesis and populations.

  10. Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols

    PubMed Central

    Nam, Junghyun; Kim, Moonseong

    2014-01-01

    We revisit the SM2 protocol, which is widely used in Chinese commercial applications and by Chinese government agencies. Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order to assure protocol implementers of their security properties, the SM2 protocol does not have a proof of security. In this paper, we prove the security of the SM2 protocol in the widely accepted indistinguishability-based Bellare-Rogaway model under the elliptic curve discrete logarithm problem (ECDLP) assumption. We also present a simplified and more efficient version of the SM2 protocol with an accompanying security proof. PMID:25276863

  11. Importance of Standardized DXA Protocol for Assessing Physique Changes in Athletes.

    PubMed

    Nana, Alisa; Slater, Gary J; Hopkins, Will G; Halson, Shona L; Martin, David T; West, Nicholas P; Burke, Louise M

    2016-06-01

    The implications of undertaking DXA scans using best practice protocols (subjects fasted and rested) or a less precise but more practical protocol in assessing chronic changes in body composition following training and a specialized recovery technique were investigated. Twenty-one male cyclists completed an overload training program, in which they were randomized to four sessions per week of either cold water immersion therapy or control groups. Whole-body DXA scans were undertaken with best practice protocol (Best) or random activity protocol (Random) at baseline, after 3 weeks of overload training, and after a 2-week taper. Magnitudes of changes in total, lean and fat mass from baseline-overload, overload-taper and baseline-taper were assessed by standardization (Δmean/SD). The standard deviations of change scores for total and fat-free soft tissue mass (FFST) from Random scans (2-3%) were approximately double those observed in the Best (1-2%), owing to extra random errors associated with Random scans at baseline. There was little difference in change scores for fat mass. The effect of cold water immersion therapy on baseline-taper changes in FFST was possibly harmful (-0.7%; 90% confidence limits ±1.2%) with Best scans but unclear with Random scans (0.9%; ±2.0%). Both protocols gave similar possibly harmful effects of cold water immersion therapy on changes in fat mass (6.9%; ±13.5% and 5.5%; ±14.3%, respectively). An interesting effect of cold water immersion therapy on training-induced changes in body composition might have been missed with a less precise scanning protocol. DXA scans should be undertaken with Best.

  12. Emergency airway management in critically injured patients: a survey of U.S. aero-medical transport programs.

    PubMed

    James, Dorsha N; Voskresensky, Igor V; Jack, Meg; Cotton, Bryan A

    2009-06-01

    Pre-hospital airway management represents the intervention most likely to impact outcomes in critically injured patients. As such, airway management issues dominate quality improvement (QI) reviews of aero-medical programs. The purpose of this study was to evaluate current practice patterns of airway management in trauma among U.S. aero-medical service (AMS) programs. The Association of Air Medical Services (AAMS) Resource Guide from 2005 to 2006 was utilized to identify the e-mail addresses of all directors of U.S. aero-medical transport programs. Program directors from 182 U.S. aero-medical programs were asked to participate in an anonymous, web-based survey of emergency airway management protocols and practices. Non-responders to the initial request were contacted a second time by e-mail. 89 programs responded. 98.9% have rapid sequence intubation (RSI) protocols. 90% use succinylcholine, 70% use long-acting neuromuscular blockers (NMB) within their RSI protocol. 77% have protocols for mandatory in-flight sedation but only 13% have similar protocols for maintenance paralytics. 60% administer long-acting NMB immediately after RSI, 13% after confirmation of neurological activity. Given clinical scenarios, however, 97% administer long-acting NMB to patients with scene and in-flight Glasgow Coma Scale (GCS) of 3, even for brief transport times. The majority of AMS programs have well defined RSI and in-flight sedation protocols, while protocols for in-flight NMB are uncommon. Despite this, nearly all programs administer long-acting NMB following RSI, irrespective of GCS or flight time. Given the impact of in-flight NMB on initial assessment, early intervention, and injury severity scoring, a critical appraisal of current AMS airway management practices appears warranted.

  13. A model for (re)building consumer trust in the food system.

    PubMed

    Wilson, Annabelle M; Withall, Elizabeth; Coveney, John; Meyer, Samantha B; Henderson, Julie; McCullum, Dean; Webb, Trevor; Ward, Paul R

    2017-12-01

    The article presents a best practice model that can be utilized by food system actors to assist with (re)building trust in the food system, before, during and after a food incident defined as 'any situation within the food supply chain where there is a risk or potential risk of illness or confirmed illness or injury associated with the consumption of a food or foods' (Commonwealth of Australia. National Food Incident Response Protocol. Commonwealth of Australia, Canberra, 2012). Interviews were undertaken with 105 actors working within the media, food industry and food regulatory settings across Australia, New Zealand (NZ) and the United Kingdom (UK). Interview data produced strategy statements, which indicated participant views on how to (re)build consumer trust in the food system. These included: (i) be transparent, (ii) have protocols and procedures in place, (iii) be credible, (iv) be proactive, (v) put consumers first, (vi) collaborate with stakeholders, (vii) be consistent, (viii) educate stakeholders and consumers, (ix) build your reputation and (x) keep your promises. A survey was designed to enable participants to indicate their agreement/disagreement with the ideas, rate their importance and provide further comment. The five strategies considered key to (re)building consumer trust were used to develop a model demonstrating best practice strategies for (re)building consumer trust in the food system before, during and after a food incident. In a world where the food system is increasingly complex, strategies for (re)building and fostering consumer trust are important. This study offers a model to do so which is derived from the views and experiences of actors working across the food industry, food regulation and the media. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  14. Improving Continuous-Variable Measurement-Device-Independent Multipartite Quantum Communication with Optical Amplifiers*

    NASA Astrophysics Data System (ADS)

    Guo, Ying; Zhao, Wei; Li, Fei; Huang, Duan; Liao, Qin; Xie, Cai-Lang

    2017-08-01

    The developing tendency of continuous-variable (CV) measurement-device-independent (MDI) quantum cryptography is to cope with the practical issue of implementing scalable quantum networks. Up to now, most theoretical and experimental researches on CV-MDI QKD are focused on two-party protocols. However, we suggest a CV-MDI multipartite quantum secret sharing (QSS) protocol use the EPR states coupled with optical amplifiers. More remarkable, QSS is the real application in multipartite CV-MDI QKD, in other words, is the concrete implementation method of multipartite CV-MDI QKD. It can implement a practical quantum network scheme, under which the legal participants create the secret correlations by using EPR states connecting to an untrusted relay via insecure links and applying the multi-entangled Greenberger-Horne-Zeilinger (GHZ) state analysis at relay station. Even if there is a possibility that the relay may be completely tampered, the legal participants are still able to extract a secret key from network communication. The numerical simulation indicates that the quantum network communication can be achieved in an asymmetric scenario, fulfilling the demands of a practical quantum network. Additionally, we illustrate that the use of optical amplifiers can compensate the partial inherent imperfections of detectors and increase the transmission distance of the CV-MDI quantum system.

  15. Using Practice-Based Evidence to Improve Supportive Care Practices to Reduce Central Line-Associated Bloodstream Infections in a Pediatric Oncology Unit [Formula: see text].

    PubMed

    Linder, Lauri A; Gerdy, Cheryl; Abouzelof, Rouett; Wilson, Andrew

    Children with cancer are a subset of patients with central lines with distinct risk factors for infection including periods of prolonged neutropenia and compromised mucous membrane integrity. This article relates the implementation of principles of practice-based evidence to identify interventions in addition to best practice maintenance care bundles to reduce central line-associated bloodstream infections involving viridans group streptococci and coagulase-negative staphylococci on an inpatient pediatric oncology unit. Review of individual events combined with review of current clinical practice guided the development of structured protocols emphasizing routine oral care and general supportive cares. Key principles of the protocols emphasized a 1-2-3 mnemonic and included daily bathing, twice daily oral care, and out-of-bed activity 3 times daily. Poisson regression identified a significant main effect for time period for central line-associated bloodstream infection rates involving both viridans group streptococci and coagulase-negative staphylococci. Significant differences were present between the preintervention baseline and implementation of the supportive care protocols. Project outcomes demonstrate the added value of using principles of practice-based evidence to guide the development of interventions to improve clinical care when evidence-based sources are limited.

  16. Organ donation in the ICU: A document analysis of institutional policies, protocols, and order sets.

    PubMed

    Oczkowski, Simon J W; Centofanti, John E; Durepos, Pamela; Arseneau, Erika; Kelecevic, Julija; Cook, Deborah J; Meade, Maureen O

    2018-04-01

    To better understand how local policies influence organ donation rates. We conducted a document analysis of our ICU organ donation policies, protocols and order sets. We used a systematic search of our institution's policy library to identify documents related to organ donation. We used Mindnode software to create a publication timeline, basic statistics to describe document characteristics, and qualitative content analysis to extract document themes. Documents were retrieved from Hamilton Health Sciences, an academic hospital system with a high volume of organ donation, from database inception to October 2015. We retrieved 12 active organ donation documents, including six protocols, two policies, two order sets, and two unclassified documents, a majority (75%) after the introduction of donation after circulatory death in 2006. Four major themes emerged: organ donation process, quality of care, patient and family-centred care, and the role of the institution. These themes indicate areas where documented institutional standards may be beneficial. Further research is necessary to determine the relationship of local policies, protocols, and order sets to actual organ donation practices, and to identify barriers and facilitators to improving donation rates. Copyright © 2017 Elsevier Ltd. All rights reserved.

  17. An Examination of Effective Practice: Moving Toward Elimination of Achievement Gaps in Science

    NASA Astrophysics Data System (ADS)

    Johnson, Carla C.

    2009-06-01

    This longitudinal study of middle school science teachers explored the relationship between effective science instruction, as defined by the National Science Education Standards (NRC in National science education standards. National Academy Press, Washington, DC, 1996), and student achievement in science. Eleven teachers participated in a three year study of teacher effectiveness, determined by the LSC Classroom Observation Protocol (Horizon Research, Inc. in Local Systemic Change Classroom Observation Protocol. May 1, 2002) and student achievement, which was assessed using the Discovery Inquiry Test in Science. Findings in this study revealed the positive impact that effective science teachers have on student learning, eliminating achievement gaps between White and Non-White students. Case studies of three teachers, both effective and ineffective explore the beliefs and experiences that influence teachers to change, or not to change practice. This study provides justification for teaching science effectively to narrow achievement gaps in science and provides insight to stakeholders in science education as to how to support teachers in becoming more effective, through addressing existing teacher beliefs and providing experiences that challenge those beliefs.

  18. Practical quantum digital signature

    NASA Astrophysics Data System (ADS)

    Yin, Hua-Lei; Fu, Yao; Chen, Zeng-Bing

    2016-03-01

    Guaranteeing nonrepudiation, unforgeability as well as transferability of a signature is one of the most vital safeguards in today's e-commerce era. Based on fundamental laws of quantum physics, quantum digital signature (QDS) aims to provide information-theoretic security for this cryptographic task. However, up to date, the previously proposed QDS protocols are impractical due to various challenging problems and most importantly, the requirement of authenticated (secure) quantum channels between participants. Here, we present the first quantum digital signature protocol that removes the assumption of authenticated quantum channels while remaining secure against the collective attacks. Besides, our QDS protocol can be practically implemented over more than 100 km under current mature technology as used in quantum key distribution.

  19. The Association Between Daytime Intensivist Physician Staffing and Mortality in the Context of Other ICU Organizational Practices: A Multicenter Cohort Study.

    PubMed

    Costa, Deena Kelly; Wallace, David J; Kahn, Jeremy M

    2015-11-01

    Daytime intensivist physician staffing is associated with improved outcomes in the ICU. However, it is unclear whether this association persists in the era of interprofessional, protocol-directed critical care. We sought to reexamine the association between daytime intensivist physician staffing and ICU mortality and determine if interprofessional rounding and protocols for mechanical ventilation in part mediate this relationship. Retrospective cohort study of ICUs in the Acute Physiology and Chronic Health Evaluation clinical information system from 2009 to 2010. Forty-nine ICUs in 25 U.S. hospitals. Adults (17 yr and older) admitted to a study ICU. None. We defined high-intensity daytime intensivist staffing as either a mandatory consult or closed ICU model; interprofessional rounds as rounds that included a respiratory therapist, pharmacist, physician and nurse; and protocol use as having protocols for liberation from mechanical ventilation and lung protective mechanical ventilation. Using multivariable logistic regression, we estimated the independent effect of daytime intensivist physician staffing on in-hospital mortality controlling for interprofessional rounds and protocols for mechanical ventilation, as well as other patient and hospital characteristics. Twenty-seven ICUs (55%) reported high-intensity daytime physician staffing, 42 ICUs (85%) reported daily interprofessional rounds, and 31 (63%) reported having protocols for mechanical ventilation. There was no association between daytime intensivist physician staffing and in-hospital mortality (adjusted odds ratio, 0.86; 95% CI, 0.65-1.14). After adjusting for interprofessional rounds and protocols for mechanical ventilation, the effect of daytime intensivist physician staffing remained nonsignificant (adjusted odds ratio, 0.90; 95% CI, 0.70-1.17). High-intensity daytime physician staffing in the ICU was not significantly associated with lower mortality in a modern cohort. This association was not affected by interprofessional rounds or protocols for mechanical ventilation.

  20. Usefulness of an injectable anaesthetic protocol for semen collection through urethral catheterisation in domestic cats.

    PubMed

    Pisu, Maria Carmela; Ponzio, Patrizia; Rovella, Chiara; Baravalle, Michela; Veronesi, Maria Cristina

    2017-10-01

    Objectives Although less often requested in comparison with dogs, the collection of semen in cats can be necessary for artificial insemination, for semen evaluation in tom cats used for breeding and for semen storage. Urethral catheterisation after pharmacological induction with medetomidine has proved to be useful for the collection of semen in domestic cats. However, most of the previously used protocols require the administration of high doses of medetomidine that can increase the risk of side effects, especially on the cardiovascular system. In routine clinical practice, one safe and useful injectable anaesthetic protocol for short-term clinical investigations or surgery in cats involves premedication with low intramuscular doses of dexmedetomidine with methadone, followed by intravenous propofol bolus injection. We aimed to assess the usefulness of this injectable anaesthetic protocol for semen collection, via urethral catheterisation, in domestic cats. Methods The study was performed on 38 purebred, adult cats, during the breeding season, and semen was collected via urethral catheterisation using an injectable anaesthesia protocol with methadone (0.2 mg/kg) and dexmedetomidine (5 µg/kg) premedication, followed by induction with propofol. Results The anaesthetic protocol used in the present study allowed the collection of large-volume semen samples, characterised by good parameters and without side effects. Conclusions and relevance The results from the present study suggest that the injectable anaesthetic protocol using methadone and dexmedetomidine premedication, followed by induction with propofol, could be suitable and safe for the collection of a good-quality semen sample, via urethral catheterisation, in domestic cats. It can therefore be used as an alternative to previous medetomidine-based sedation protocols.

  1. A literature review: polypharmacy protocol for primary care.

    PubMed

    Skinner, Mary

    2015-01-01

    The purpose of this literature review is to critically evaluate published protocols on polypharmacy in adults ages 65 and older that are currently used in primary care settings that may potentially lead to fewer adverse drug events. A review of OVID, CINAHL, EBSCO, Cochrane Library, Medline, and PubMed databases was completed using the following key words: protocol, guideline, geriatrics, elderly, older adult, polypharmacy, and primary care. Inclusion criteria were: articles in medical, nursing, and pharmacology journals with an intervention, protocol, or guideline addressing polypharmacy that lead to fewer adverse drug events. Qualitative and quantitative studies were included. Exclusion criteria were: publications prior to the year 1992. A gap exists in the literature. No standardized protocol for addressing polypharmacy in the primary care setting was found. Mnemonics, algorithms, clinical practice guidelines, and clinical strategies for addressing polypharmacy in a variety of health care settings were found throughout the literature. Several screening instruments for use in primary care to assess potentially inappropriate prescription of medications in the elderly, such as the Beers Criteria and the STOPP screening tool, were identified. However, these screening instruments were not included in a standardized protocol to manage polypharmacy in primary care. Polypharmacy in the elderly is a critical problem that may result in adverse drug events such as falls, hospitalizations, and increased expenditures for both the patient and the health care system. No standardized protocols to address polypharmacy specific to the primary care setting were identified in this review of the literature. Given the growing population of elderly in this country and the high number of medications they consume, it is critical to focus on the utilization of a standardized protocol to address the potential harm of polypharmacy in the primary care setting and evaluate its effects on patient outcomes. Copyright © 2015 Elsevier Inc. All rights reserved.

  2. Opportunistic detection of atrial fibrillation in subjects aged 65 years or older in primare care: a randomised clinical trial of efficacy. DOFA-AP study protocol

    PubMed Central

    2012-01-01

    Background Clinical Practice Guidelines recommend using peripheral blood pulse measuring as a screening test for Atrial Fibrillation. However, there is no adequate evidence supporting the efficacy of such procedure in primary care clinical practice. This paper describes a study protocol designed to verify whether early opportunistic screening for Atrial Fibrillation by measuring blood pulse is more effective than regular practice in subjects aged 65 years attending primary care centers. Methods/design An cluster-randomized controlled trial conducted in Primary Care Centers of the Spanish National Health Service. A total of 269 physicians and nurses will be allocated to one of the two arms of the trial by stratified randomization with a 3:2 ratio (three practitioners will be assigned to the Control Group for every two practitioners assigned to the Experimental Group). As many as 12 870 patients aged 65 years or older and meeting eligibility criteria will be recruited (8 580 will be allocated to the Experimental Group and 4 290 to the Control Group). Randomization and allocation to trial groups will be carried out by a central computer system. The Experimental Group practitioners will conduct an opportunistic case finding for patients with Atrial Fibrillation, while the Control Group practitioners will follow the regular guidelines. The first step will be finding new Atrial Fibrillation cases. A descriptive inferential analysis will be performed (bivariate and multivariate by multilevel logistic regression analysis). Discussion If our hypothesis is confirmed, we expect Primary Care professionals to take a more proactive approach and adopt a new protocol when a patient meeting the established screening criteria is identified. Finally, we expect this measure to be incorporated into Clinical Practice Guidelines. Trial registration The study is registered as NCT01291953 (ClinicalTrials.gob) PMID:23130754

  3. Low-dose computed tomography scans with automatic exposure control for patients of different ages undergoing cardiac PET/CT and SPECT/CT.

    PubMed

    Yang, Ching-Ching; Yang, Bang-Hung; Tu, Chun-Yuan; Wu, Tung-Hsin; Liu, Shu-Hsin

    2017-06-01

    This study aimed to evaluate the efficacy of automatic exposure control (AEC) in order to optimize low-dose computed tomography (CT) protocols for patients of different ages undergoing cardiac PET/CT and single-photon emission computed tomography/computed tomography (SPECT/CT). One PET/CT and one SPECT/CT were used to acquire CT images for four anthropomorphic phantoms representative of 1-year-old, 5-year-old and 10-year-old children and an adult. For the hybrid systems investigated in this study, the radiation dose and image quality of cardiac CT scans performed with AEC activated depend mainly on the selection of a predefined image quality index. Multiple linear regression methods were used to analyse image data from anthropomorphic phantom studies to investigate the effects of body size and predefined image quality index on CT radiation dose in cardiac PET/CT and SPECT/CT scans. The regression relationships have a coefficient of determination larger than 0.9, indicating a good fit to the data. According to the regression models, low-dose protocols using the AEC technique were optimized for patients of different ages. In comparison with the standard protocol with AEC activated for adult cardiac examinations used in our clinical routine practice, the optimized paediatric protocols in PET/CT allow 32.2, 63.7 and 79.2% CT dose reductions for anthropomorphic phantoms simulating 10-year-old, 5-year-old and 1-year-old children, respectively. The corresponding results for cardiac SPECT/CT are 8.4, 51.5 and 72.7%. AEC is a practical way to reduce CT radiation dose in cardiac PET/CT and SPECT/CT, but the AEC settings should be determined properly for optimal effect. Our results show that AEC does not eliminate the need for paediatric protocols and CT examinations using the AEC technique should be optimized for paediatric patients to reduce the radiation dose as low as reasonably achievable.

  4. Healthy Indoor Environment Protocols for Home Energy Upgrades

    EPA Pesticide Factsheets

    This page contains the EPA-developed Healthy Indoor Environment Protocols for Home Energy Upgrades, a PDF guide that provides a set of best practices for improving indoor air quality in conjunction with energy upgrade work in homes.

  5. Development of Protocol Materials in Teacher Education: A Case Study in Relating Theory and Practice.

    ERIC Educational Resources Information Center

    University of South Florida, Tampa.

    A protocol materials program was developed to (1) train personnel who produce, use, and make budgetary decisions about protocol materials and (2) produce and disseminate effective materials and knowledge acquired as a result of the program. Two groups were selected to meet the goals of the program--one group consisting of project directors who…

  6. Amplification of Chloroplast DNA Using the Polymerase Chain Reaction (PCR): A Practical Activity for Secondary School Students

    ERIC Educational Resources Information Center

    Hamilton, Kenny; Barfoot, Jan; Crawford, Kathleen E.; Simpson, Craig G.; Beaumont, Paul C.; Bownes, Mary

    2006-01-01

    We describe a polymerase chain reaction (PCR) protocol suitable for use in secondary schools and colleges. This PCR protocol can be used to investigate genetic variation between plants. The protocol makes use of primers which are complementary to sequences of nucleotides that are highly conserved across different plant genera. The regions of…

  7. Protocol-based care: the standardisation of decision-making?

    PubMed

    Rycroft-Malone, Jo; Fontenla, Marina; Seers, Kate; Bick, Debra

    2009-05-01

    To explore how protocol-based care affects clinical decision-making. In the context of evidence-based practice, protocol-based care is a mechanism for facilitating the standardisation of care and streamlining decision-making through rationalising the information with which to make judgements and ultimately decisions. However, whether protocol-based care does, in the reality of practice, standardise decision-making is unknown. This paper reports on a study that explored the impact of protocol-based care on nurses' decision-making. Theoretically informed by realistic evaluation and the promoting action on research implementation in health services framework, a case study design using ethnographic methods was used. Two sites were purposively sampled; a diabetic and endocrine unit and a cardiac medical unit. Within each site, data collection included observation, postobservation semi-structured interviews with staff and patients, field notes, feedback sessions and document review. Data were inductively and thematically analysed. Decisions made by nurses in both sites were varied according to many different and interacting factors. While several standardised care approaches were available for use, in reality, a variety of information sources informed decision-making. The primary approach to knowledge exchange and acquisition was person-to-person; decision-making was a social activity. Rarely were standardised care approaches obviously referred to; nurses described following a mental flowchart, not necessarily linked to a particular guideline or protocol. When standardised care approaches were used, it was reported that they were used flexibly and particularised. While the logic of protocol-based care is algorithmic, in the reality of clinical practice, other sources of information supported nurses' decision-making process. This has significant implications for the political goal of standardisation. The successful implementation and judicious use of tools such as protocols and guidelines will likely be dependant on approaches that facilitate the development of nurses' decision-making processes in parallel to paying attention to the influence of context.

  8. Development of a Comprehensive Programme to Prevent and Reduce the Negative Impact of Railway Fatalities, Injuries and Close Calls on Railway Employees.

    PubMed

    Bardon, Cécile; Mishara, Brian L

    2015-09-01

    This article presents a strategy to prevent trauma, support and care for railway personnel who experience critical incidents (CI) on the job, usually fatalities by accident or suicide. We reviewed all publications on CI management, support and care practices in the railway industry, as well as practices in place in Canada (unpublished protocols). Semi structured interviews were conducted with 40 train engineers and conductors involved in CIs and the content was coded and analysed quantitatively. Employees' satisfaction with the help received after the incident varies according to the behaviour of the local manager, company officers and police, the level of compliance with existing company protocols to help them, the presence of unmet expectations for support and care, their perceived competency of clinicians they consulted and the level of trust toward their employers. On the basis of the interview results, the review of existing railway practices and discussions with railway stakeholders, a model protocol was developed for a comprehensive workplace prevention, support and care protocol to reduce the negative impact of railway critical incidents on employees. This protocol includes preventive actions before traumatic events occur, immediate responses at the site of incident, interventions within the first few days after the incident and longer term support and interventions provided by the company and by outsourced experts.

  9. Comparison of IPSM 1990 photon dosimetry code of practice with IAEA TRS‐398 and AAPM TG‐51.

    PubMed Central

    Henríquez, Francisco Cutanda

    2009-01-01

    Several codes of practice for photon dosimetry are currently used around the world, supported by different organizations. A comparison of IPSM 1990 with both IAEA TRS‐398 and AAPM TG‐51 has been performed. All three protocols are based on the calibration of ionization chambers in terms of standards of absorbed dose to water, as it is the case with other modern codes of practice. This comparison has been carried out for photon beams of nominal energies: 4 MV, 6 MV, 8 MV, 10 MV and 18 MV. An NE 2571 graphite ionization chamber was used in this study, cross‐calibrated against an NE 2611A Secondary Standard, calibrated in the National Physical Laboratory (NPL). Absolute dose in reference conditions was obtained using each of these three protocols including: beam quality indices, beam quality conversion factors both theoretical and NPL experimental ones, correction factors for influence quantities and absolute dose measurements. Each protocol recommendations have been strictly followed. Uncertainties have been obtained according to the ISO Guide to the Expression of Uncertainty in Measurement. Absorbed dose obtained according to all three protocols agree within experimental uncertainty. The largest difference between absolute dose results for two protocols is obtained for the highest energy: 0.7% between IPSM 1990 and IAEA TRS‐398 using theoretical beam quality conversion factors. PACS number: 87.55.tm

  10. A technique for automatically extracting useful field of view and central field of view images.

    PubMed

    Pandey, Anil Kumar; Sharma, Param Dev; Aheer, Deepak; Kumar, Jay Prakash; Sharma, Sanjay Kumar; Patel, Chetan; Kumar, Rakesh; Bal, Chandra Sekhar

    2016-01-01

    It is essential to ensure the uniform response of the single photon emission computed tomography gamma camera system before using it for the clinical studies by exposing it to uniform flood source. Vendor specific acquisition and processing protocol provide for studying flood source images along with the quantitative uniformity parameters such as integral and differential uniformity. However, a significant difficulty is that the time required to acquire a flood source image varies from 10 to 35 min depending both on the activity of Cobalt-57 flood source and the pre specified counts in the vendors protocol (usually 4000K-10,000K counts). In case the acquired total counts are less than the total prespecified counts, and then the vendor's uniformity processing protocol does not precede with the computation of the quantitative uniformity parameters. In this study, we have developed and verified a technique for reading the flood source image, remove unwanted information, and automatically extract and save the useful field of view and central field of view images for the calculation of the uniformity parameters. This was implemented using MATLAB R2013b running on Ubuntu Operating system and was verified by subjecting it to the simulated and real flood sources images. The accuracy of the technique was found to be encouraging, especially in view of practical difficulties with vendor-specific protocols. It may be used as a preprocessing step while calculating uniformity parameters of the gamma camera in lesser time with fewer constraints.

  11. A Standardized Shift Handover Protocol: Improving Nurses’ Safe Practice in Intensive Care Units

    PubMed Central

    Malekzadeh, Javad; Mazluom, Seyed Reza; Etezadi, Toktam; Tasseri, Alireza

    2013-01-01

    Introduction: For maintaining the continuity of care and improving the quality of care, effective inter-shift information communication is necessary. Any handover error can endanger patient safety. Despite the importance of shift handover, there is no standard handover protocol in our healthcare settings. Methods: In this one-group pretest-posttest quasi-experimental study conducted in spring and summer of 2011, we recruited a convenience sample of 56 ICU nurses. The Nurses’ Safe Practice Evaluation Checklist was used for data collection. The Content Validity Index and the inter-rater correlation coefficient of the checklist was 0.92 and 89, respectively. We employed the SPSS 11.5 software and the Mc Nemar and paired-samples t test for data analysis. Results: Study findings revealed that nurses’ mean score on the Safe Practice Evaluation Checklist increased significantly from 11.6 (2.7) to 17.0 (1.8) (P < 0.001). Conclusion: using a standard handover protocol for communicating patient’s needs and information improves nurses’ safe practice in the area of basic nursing care. PMID:25276725

  12. [Development of clinical trial education program for pharmaceutical science students through small group discussion and role-playing using protocol].

    PubMed

    Imakyure, Osamu; Shuto, Hideki; Nishikawa, Fumi; Hagiwara, Yoshifuka; Inoue, Sachiko; Koyanagi, Taeko; Hirakawa, Masaaki; Kataoka, Yasufumi

    2010-08-01

    The acquirement of basic knowledge of clinical trials and professional attitude in their practices is a general instructional objective in the Model Core Curriculum for Pharmaceutical Education. Unfortunately, the previous program of clinical trial education was not effective in the acquirement of a professional attitude in their practices. Then, we developed the new clinical trial education program using protocol through small group discussion (SGD) and roll-playing. Our program consists of 7 steps of practical training. In step 1, the students find some problems after presentation of the protocol including case and prescription. In step 2, they analyse the extracted problems and share the information obtained in SGD. In steps 3 and 5, five clinical case scenarios are presented to the students and they discuss which case is suitable for entry to the clinical trial or which case corresponds to the discontinuance criteria in the present designed protocol. In steps 4 and 6, the roll-playing is performed by teachers and students as doctors and clinical research coordinators (CRC) respectively. Further, we conducted a trial practice based on this program for the students. In the student's self-evaluation into five grades, the average score of the skill acquisition level in each step was 3.8-4.7 grade. Our clinical trial education program could be effective in educating the candidates for CRC or clinical pharmacists.

  13. John M. Eisenberg Patient Safety Awards. System innovation: Concord Hospital.

    PubMed

    Uhlig, Paul N; Brown, Jeffrey; Nason, Anne K; Camelio, Addie; Kendall, Elise

    2002-12-01

    The Cardiac Surgery Program at Concord Hospital (Concord, NH) restructured clinical teamwork for improved safety and effectiveness on the basis of theory and practice from human factors science, aviation safety, and high-reliability organization theory. A team-based, collaborative rounds process--the Concord Collaborative Care Model--that involved use of a structured communications protocol was conducted daily at each patient's bedside. The entire care team agreed to meet at the same time each day (8:45 AM to 9:30 AM) to share information and develop a plan of care for each patient, with patient and family members as active participants. The cardiac surgery team developed a structured communications protocol adapted from human factors science. To provide a forum for discussion of team goals and progress and to address system-level concerns, a biweekly system rounds process was established. Following implementation of collaborative rounds, mortality of Concord Hospital's cardiac surgery patients declined significantly from expected rates. Satisfaction rates of open heart patients scores were consistently in the 97th-99th percentile nationally. A quality of work life survey indicated that in every category, providers expressed greater satisfaction with the collaborative care process than with the traditional rounds process. Practice patterns in the Cardiac Surgery Program at Concord Hospital have changed to a much more collaborative and participatory process, with improved outcomes, happier patients, and more satisfied practitioners. A culture of continuous program improvement has been implemented that continues to evolve and produce benefits.

  14. [Clinical practice guidelines for assessment and treatment of transsexualism. SEEN Identity and Sexual Differentiation Group (GIDSEEN)].

    PubMed

    Moreno-Pérez, Oscar; Esteva De Antonio, Isabel

    2012-01-01

    Transsexual patients can only be diagnosed and treated at functional gender identity Units with provision of high quality care, development of clinical practice guidelines, and interdisciplinary working groups. The therapeutic process has three mainstays: initial psychological diagnostic evaluation and psychotherapy, endocrinological evaluation and hormone therapy, and sex reassignment surgery. Cross-sex hormone therapy is essential for the anatomical and psychological transition process in duly selected patients. Hormones help optimize real-life sex identity, improve quality of life, and limit psychiatric co-morbidities often associated to lack of treatment. Development of this clinical practice guideline addresses the need for implementing a coordinated action protocol for comprehensive health care for transgender people in the National Health System. Copyright © 2012 SEEN. Published by Elsevier Espana. All rights reserved.

  15. Assessing older drivers: a primary care protocol to evaluate driving safety risk.

    PubMed

    Murden, Robert A; Unroe, Kathleen

    2005-08-01

    Most articles on elder drivers offer either general advice, or review testing protocols that divide drivers into two distinct groups: safe or unsafe. We believe it is unreasonable to expect any testing to fully separate drivers into just these two mutually exclusive groups, so we offer a protocol for a more practical approach. This protocol can be applied by primary care physicians. We review the justification for the many steps of this protocol, which have branches that lead to identifying drivers as low risk, high risk (for accidents) or needing further evaluation. Options for further evaluation are provided.

  16. Copper(I)/TEMPO Catalyzed Aerobic Oxidation of Primary Alcohols to Aldehydes with Ambient Air

    PubMed Central

    Hoover, Jessica M.; Steves, Janelle E.; Stahl, Shannon S.

    2012-01-01

    This protocol describes a practical laboratory-scale method for aerobic oxidation of primary alcohols to aldehydes, using a chemoselective CuI/TEMPO catalyst system. The catalyst is prepared in situ from commercially available reagents, and the reactions are performed in a common organic solvent (acetonitrile) with ambient air as the oxidant. Three different reaction conditions and three procedures for the isolation and purification of the aldehyde product are presented. The oxidations of eight different alcohols, described here, include representative examples of each reaction condition and purification method. Reaction times vary from 20 min to 24 h, depending on the alcohol, while the purification methods each take about 2 h. The total time necessary for the complete protocol ranges from 3 – 26 h. PMID:22635108

  17. Venous Thoracic Outlet Compression and the Paget-Schroetter Syndrome: A Review and Recommendations for Management

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Thompson, J. F., E-mail: j.f.thompson@exeter.ac.uk; Winterborn, R. J.; Bays, S.

    2011-10-15

    Paget Schroetter syndrome, or effort thrombosis of the axillosubclavian venous system, is distinct from other forms of upper limb deep vein thrombosis. It occurs in younger patients and often is secondary to competitive sport, music, or strenuous occupation. If untreated, there is a higher incidence of disabling venous hypertension than was previously appreciated. Anticoagulation alone or in combination with thrombolysis leads to a high rate of rethrombosis. We have established a multidisciplinary protocol over 15 years, based on careful patient selection and a combination of lysis, decompressive surgery, and postoperative percutaneous venoplasty. During the past 10 years, a total ofmore » 232 decompression procedures have been performed. This article reviews the literature and presents the Exeter Protocol along with practical recommendations for management.« less

  18. Development of FWD procedures manual.

    DOT National Transportation Integrated Search

    2010-04-01

    In this project, the state-of-practice in FWD testing and analysis procedures were examined : by looking at the standard protocols of a number of other highway agencies. The specific : needs of NJDOT were also examined and a protocol was developed th...

  19. Spacelab system analysis: The modified free access protocol: An access protocol for communication systems with periodic and Poisson traffic

    NASA Technical Reports Server (NTRS)

    Ingels, Frank; Owens, John; Daniel, Steven

    1989-01-01

    The protocol definition and terminal hardware for the modified free access protocol, a communications protocol similar to Ethernet, are developed. A MFA protocol simulator and a CSMA/CD math model are also developed. The protocol is tailored to communication systems where the total traffic may be divided into scheduled traffic and Poisson traffic. The scheduled traffic should occur on a periodic basis but may occur after a given event such as a request for data from a large number of stations. The Poisson traffic will include alarms and other random traffic. The purpose of the protocol is to guarantee that scheduled packets will be delivered without collision. This is required in many control and data collection systems. The protocol uses standard Ethernet hardware and software requiring minimum modifications to an existing system. The modification to the protocol only affects the Ethernet transmission privileges and does not effect the Ethernet receiver.

  20. Challenges for Preclinical Investigations of Human Biofield Modalities

    PubMed Central

    Gronowicz, Gloria; Bengston, William

    2015-01-01

    Preclinical models for studying the effects of the human biofield have great potential to advance our understanding of human biofield modalities, which include external qigong, Johrei, Reiki, therapeutic touch, healing touch, polarity therapy, pranic healing, and other practices. A short history of Western biofield studies using preclinical models is presented and demonstrates numerous and consistent examples of human biofields significantly affecting biological systems both in vitro and in vivo. Methodological issues arising from these studies and practical solutions in experimental design are presented. Important questions still left unanswered with preclinical models include variable reproducibility, dosing, intentionality of the practitioner, best preclinical systems, and mechanisms. Input from the biofield practitioners in the experimental design is critical to improving experimental outcomes; however, the development of standard criteria for uniformity of practice and for inclusion of multiple practitioners is needed. Research in human biofield studies involving preclinical models promises a better understanding of the mechanisms underlying the efficacy of biofield therapies and will be important in guiding clinical protocols and integrating treatments with conventional medical therapies. PMID:26665042

  1. Sources of influence on medical practice

    PubMed Central

    Fernandez, L. A.; Martin, J. M.; del Castillo, J. d. D. L.; Gaspar, O. S.; Millan, J. I.; Lozano, M. J.; Keenoy, E. D.

    2000-01-01

    OBJECTIVES—To explore the opinion of general practitioners on the importance and legitimacy of sources of influence on medical practice.
METHODS—General practitioners (n=723) assigned to Primary Care Teams (PCTs) in two Spanish regions were randomly selected to participate in this study. A self administered questionnaire was sent by mail and collected by hand. The dependent variable collected the opinion on different sources that exert influence on medical practice. Importance was measured with a 9 item scale while legitimacy was evaluated with 16 items measured with a 1 to 7 point Likert scale.
RESULTS—The most important and legitimate sources of influence according to general practitioners were: training courses and scientific articles, designing self developed protocols and discussing with colleagues. The worst evaluated were: financial incentives and the role played by the pharmaceutical industry.
CONCLUSIONS—The development of medical practice is determined by many factors, grouped around three big areas: organisational setting, professional system and social setting. The medical professional system is the one considered as being the most important and legitimate by general practitioners. Other strategies of influence, considered to be very important by the predominant management culture (financial incentives), are not considered to be so by general practitioners. These results, however, are not completely reliable as regards the real network of influences existing in medical practice, which reflect instead different "value systems".


Keywords: primary health care; physicians' practice patterns; medical practice management; physicians' incentive plans PMID:10890875

  2. Using risk assessment in periodontics.

    PubMed

    Woodman, Alan J

    2014-08-01

    Risk assessment has become a regular feature in both dental practice and society as a whole, and principles used to assess risk in society are similar to those used in a clinical setting. Although the concept of risk assessment as a prognostic indicator for periodontal disease incidence and activity is well established in the management of periodontitis, the use of risk assessment to manage the practical treatment of periodontitis and its sequelae appears to have less foundation. A simple system of initial risk assessment - building on the use of the Basic Periodontal Examination (BPE), clinical, medical and social factors - is described, linked to protocols for delivering care suited to general dental practice and stressing the role of long-term supportive care. The risks of not treating the patient are considered, together with the possible causes of failure, and the problems of successful treatment are illustrated by the practical management of post-treatment recession.

  3. Ambulatory surgery centers best practices for the 90s.

    PubMed

    Hoover, J A

    1994-05-01

    Outpatient surgery will be the driving force in the continued growth of ambulatory care in the 1990s. Providing efficient, high-quality ambulatory surgical services should therefore be a priority among healthcare providers. Arthur Andersen conducted a survey to discover best practices in ambulatory surgical service. General success characteristics of best performers were business-focused relationships with physicians, the use of clinical protocols, patient convenience, cost management, strong leadership, teamwork, streamlined processes and efficient design. Other important factors included scheduling to maximize OR room use; achieving surgical efficiencies through reduced case pack assembly errors and equipment availability; a focus on cost capture rather than charge capture; sound materiel management practices, such as standardization and vendor teaming; and the appropriate use of automated systems. It is important to evaluate whether the best practices are applicable to your environment and what specific changes to your current processes would be necessary to adopt them.

  4. Practical quantum private query of blocks based on unbalanced-state Bennett-Brassard-1984 quantum-key-distribution protocol

    NASA Astrophysics Data System (ADS)

    Wei, Chun-Yan; Gao, Fei; Wen, Qiao-Yan; Wang, Tian-Yin

    2014-12-01

    Until now, the only kind of practical quantum private query (QPQ), quantum-key-distribution (QKD)-based QPQ, focuses on the retrieval of a single bit. In fact, meaningful message is generally composed of multiple adjacent bits (i.e., a multi-bit block). To obtain a message from database, the user Alice has to query l times to get each ai. In this condition, the server Bob could gain Alice's privacy once he obtains the address she queried in any of the l queries, since each ai contributes to the message Alice retrieves. Apparently, the longer the retrieved message is, the worse the user privacy becomes. To solve this problem, via an unbalanced-state technique and based on a variant of multi-level BB84 protocol, we present a protocol for QPQ of blocks, which allows the user to retrieve a multi-bit block from database in one query. Our protocol is somewhat like the high-dimension version of the first QKD-based QPQ protocol proposed by Jacobi et al., but some nontrivial modifications are necessary.

  5. Practical quantum private query of blocks based on unbalanced-state Bennett-Brassard-1984 quantum-key-distribution protocol

    PubMed Central

    Wei, Chun-Yan; Gao, Fei; Wen, Qiao-Yan; Wang, Tian-Yin

    2014-01-01

    Until now, the only kind of practical quantum private query (QPQ), quantum-key-distribution (QKD)-based QPQ, focuses on the retrieval of a single bit. In fact, meaningful message is generally composed of multiple adjacent bits (i.e., a multi-bit block). To obtain a message from database, the user Alice has to query l times to get each ai. In this condition, the server Bob could gain Alice's privacy once he obtains the address she queried in any of the l queries, since each ai contributes to the message Alice retrieves. Apparently, the longer the retrieved message is, the worse the user privacy becomes. To solve this problem, via an unbalanced-state technique and based on a variant of multi-level BB84 protocol, we present a protocol for QPQ of blocks, which allows the user to retrieve a multi-bit block from database in one query. Our protocol is somewhat like the high-dimension version of the first QKD-based QPQ protocol proposed by Jacobi et al., but some nontrivial modifications are necessary. PMID:25518810

  6. Teaching by videoconference: a commentary on best practice for rural education in health professions.

    PubMed

    Birden, Hudson; Page, Sue

    2005-01-01

    This article offers a primer on how to get started in videoconferencing, focusing on practical approaches to technical and protocol issues. The technical capabilities of videoconferencing systems, linked with initiatives supporting greater rural access to broadband, means videoconferencing is expanding rapidly as a health education tool. Forethought allows the purchase of the most appropriate equipment, reducing costs overall and increasing the functionality of the system. Adherence to simple matters, including etiquette, ensures the experience is enjoyable as well as educational. Consideration should be given to the role of videoconferencing in expanding the social as well as academic opportunities for rural clinicians and students. Videoconferencing is a useful adjunct to traditional educational delivery modes, and can enable quality education opportunities that would be prohibitive due to time, travel, and cost constraints.

  7. Failure mode and effects analysis of witnessing protocols for ensuring traceability during IVF.

    PubMed

    Rienzi, Laura; Bariani, Fiorenza; Dalla Zorza, Michela; Romano, Stefania; Scarica, Catello; Maggiulli, Roberta; Nanni Costa, Alessandro; Ubaldi, Filippo Maria

    2015-10-01

    Traceability of cells during IVF is a fundamental aspect of treatment, and involves witnessing protocols. Failure mode and effects analysis (FMEA) is a method of identifying real or potential breakdowns in processes, and allows strategies to mitigate risks to be developed. To examine the risks associated with witnessing protocols, an FMEA was carried out in a busy IVF centre, before and after implementation of an electronic witnessing system (EWS). A multidisciplinary team was formed and moderated by human factors specialists. Possible causes of failures, and their potential effects, were identified and risk priority number (RPN) for each failure calculated. A second FMEA analysis was carried out after implementation of an EWS. The IVF team identified seven main process phases, 19 associated process steps and 32 possible failure modes. The highest RPN was 30, confirming the relatively low risk that mismatches may occur in IVF when a manual witnessing system is used. The introduction of the EWS allowed a reduction in the moderate-risk failure mode by two-thirds (highest RPN = 10). In our experience, FMEA is effective in supporting multidisciplinary IVF groups to understand the witnessing process, identifying critical steps and planning changes in practice to enable safety to be enhanced. Copyright © 2015 Reproductive Healthcare Ltd. Published by Elsevier Ltd. All rights reserved.

  8. Protocols for sagebrush seed processing and seedling production at the Lucky Peak Nursery

    Treesearch

    Clark D. Fleege

    2010-01-01

    This paper presents the production protocols currently practiced at the USDA Forest Service Lucky Peak Nursery (Boise, ID) for seed processing and bareroot and container seedling production for three subspecies of big sagebrush (Artemisia tridentata).

  9. Protecting single-photon entanglement with practical entanglement source

    NASA Astrophysics Data System (ADS)

    Zhou, Lan; Ou-Yang, Yang; Wang, Lei; Sheng, Yu-Bo

    2017-06-01

    Single-photon entanglement (SPE) is important for quantum communication and quantum information processing. However, SPE is sensitive to photon loss. In this paper, we discuss a linear optical amplification protocol for protecting SPE. Different from the previous protocols, we exploit the practical spontaneous parametric down-conversion (SPDC) source to realize the amplification, for the ideal entanglement source is unavailable in current quantum technology. Moreover, we prove that the amplification using the entanglement generated from SPDC source as auxiliary is better than the amplification assisted with single photons. The reason is that the vacuum state from SPDC source will not affect the amplification, so that it can be eliminated automatically. This protocol may be useful in future long-distance quantum communications.

  10. Deterministic entanglement distillation for secure double-server blind quantum computation.

    PubMed

    Sheng, Yu-Bo; Zhou, Lan

    2015-01-15

    Blind quantum computation (BQC) provides an efficient method for the client who does not have enough sophisticated technology and knowledge to perform universal quantum computation. The single-server BQC protocol requires the client to have some minimum quantum ability, while the double-server BQC protocol makes the client's device completely classical, resorting to the pure and clean Bell state shared by two servers. Here, we provide a deterministic entanglement distillation protocol in a practical noisy environment for the double-server BQC protocol. This protocol can get the pure maximally entangled Bell state. The success probability can reach 100% in principle. The distilled maximally entangled states can be remaind to perform the BQC protocol subsequently. The parties who perform the distillation protocol do not need to exchange the classical information and they learn nothing from the client. It makes this protocol unconditionally secure and suitable for the future BQC protocol.

  11. Deterministic entanglement distillation for secure double-server blind quantum computation

    PubMed Central

    Sheng, Yu-Bo; Zhou, Lan

    2015-01-01

    Blind quantum computation (BQC) provides an efficient method for the client who does not have enough sophisticated technology and knowledge to perform universal quantum computation. The single-server BQC protocol requires the client to have some minimum quantum ability, while the double-server BQC protocol makes the client's device completely classical, resorting to the pure and clean Bell state shared by two servers. Here, we provide a deterministic entanglement distillation protocol in a practical noisy environment for the double-server BQC protocol. This protocol can get the pure maximally entangled Bell state. The success probability can reach 100% in principle. The distilled maximally entangled states can be remaind to perform the BQC protocol subsequently. The parties who perform the distillation protocol do not need to exchange the classical information and they learn nothing from the client. It makes this protocol unconditionally secure and suitable for the future BQC protocol. PMID:25588565

  12. Recyclable amplification for single-photon entanglement from photon loss and decoherence

    NASA Astrophysics Data System (ADS)

    Zhou, Lan; Chen, Ling-Quan; Zhong, Wei; Sheng, Yu-Bo

    2018-01-01

    We put forward a highly efficient recyclable single-photon assisted amplification protocol, which can protect single-photon entanglement (SPE) from photon loss and decoherence. Making use of quantum nondemolition detection gates constructed with the help of cross-Kerr nonlinearity, our protocol has some attractive advantages. First, the parties can recover less-entangled SPE to be maximally entangled SPE, and reduce photon loss simultaneously. Second, if the protocol fails, the parties can repeat the protocol to reuse some discarded items, which can increase the success probability. Third, when the protocol is successful, they can similarly repeat the protocol to further increase the fidelity of the SPE. Thereby, our protocol provides a possible way to obtain high entanglement, high fidelity and high success probability simultaneously. In particular, our protocol shows higher success probability in the practical high photon loss channel. Based on the above features, our amplification protocol has potential for future application in long-distance quantum communication.

  13. An Electricity Price-Aware Open-Source Smart Socket for the Internet of Energy.

    PubMed

    Blanco-Novoa, Óscar; Fernández-Caramés, Tiago M; Fraga-Lamas, Paula; Castedo, Luis

    2017-03-21

    The Internet of Energy (IoE) represents a novel paradigm where electrical power systems work cooperatively with smart devices to increase the visibility of energy consumption and create safer, cleaner and sustainable energy systems. The implementation of IoE services involves the use of multiple components, like embedded systems, power electronics or sensors, which are an essential part of the infrastructure dedicated to the generation and distribution energy and the one required by the final consumer. This article focuses on the latter and presents a smart socket system that collects the information about energy price and makes use of sensors and actuators to optimize home energy consumption according to the user preferences. Specifically, this article provides three main novel contributions. First, what to our knowledge is the first hardware prototype that manages in a practical real-world scenario the price values obtained from a public electricity operator is presented. The second contribution is related to the definition of a novel wireless sensor network communications protocol based on Wi-Fi that allows for creating an easy-to-deploy smart plug system that self-organizes and auto-configures to collect the sensed data, minimizing user intervention. Third, it is provided a thorough description of the design of one of the few open-source smart plug systems, including its communications architecture, the protocols implemented, the main sensing and actuation components and the most relevant pieces of the software. Moreover, with the aim of illustrating the capabilities of the smart plug system, the results of different experiments performed are shown. Such experiments evaluate in real-world scenarios the system's ease of use, its communications range and its performance when using HTTPS. Finally, the economic savings are estimated for different appliances, concluding that, in the practical situation proposed, the smart plug system allows certain energy-demanding appliances to save almost €70 per year.

  14. An adaptive toolkit for image quality evaluation in system performance test of digital breast tomosynthesis

    NASA Astrophysics Data System (ADS)

    Zhang, Guozhi; Petrov, Dimitar; Marshall, Nicholas; Bosmans, Hilde

    2017-03-01

    Digital breast tomosynthesis (DBT) is a relatively new diagnostic imaging modality for women. Currently, various models of DBT systems are available on the market and the number of installations is rapidly increasing. EUREF, the European Reference Organization for Quality Assured Breast Screening and Diagnostic Services, has proposed a preliminary Guideline - protocol for the quality control of the physical and technical aspects of digital breast tomosynthesis systems, with an ultimate aim of providing limiting values guaranteeing proper performance for different applications of DBT. In this work, we introduce an adaptive toolkit developed in accordance with this guideline to facilitate the process of image quality evaluation in DBT performance test. This toolkit implements robust algorithms to quantify various technical parameters of DBT images and provides a convenient user interface in practice. Each test is built into a separate module with configurations set corresponding to the European guideline, which can be easily adapted to different settings and extended with additional tests. This toolkit largely improves the efficiency for image quality evaluation of DBT. It is also going to evolve with the development of protocols in quality control of DBT systems.

  15. Use of virtual reality to promote hand therapy post-stroke

    NASA Astrophysics Data System (ADS)

    Tsoupikova, Daria; Stoykov, Nikolay; Vick, Randy; Li, Yu; Kamper, Derek; Listenberger, Molly

    2013-03-01

    A novel artistic virtual reality (VR) environment was developed and tested for use as a rehabilitation protocol for post-stroke hand rehabilitation therapy. The system was developed by an interdisciplinary team of engineers, art therapists, occupational therapists, and VR artists to improve patients' motivation and engagement. Specific exercises were developed to explicitly promote the practice of therapeutic tasks requiring hand and arm coordination for upper extremity rehabilitation. Here we describe system design, development, and user testing for efficiency, subject's satisfaction and clinical feasibility. We report results of the completed qualitative, pre-clinical pilot study of the system effectiveness for therapy. Fourteen stroke survivors with chronic hemiparesis participated in a single training session within the environment to gauge user response to the protocol through a custom survey. Results indicate that users found the system comfortable, enjoyable, tiring; instructions clear, and reported a high level of satisfaction with the VR environment and rehabilitation task variety and difficulty. Most patients reported very positive impressions of the VR environment and rated it highly, appreciating its engagement and motivation. We are currently conducting a longitudinal intervention study over 6 weeks in stroke survivors with chronic hemiparesis. Initial results following use of the system on the first subjects demonstrate that the system is operational and can facilitate therapy for post stroke patients with upper extremity impairment.

  16. Identifying the domains of context important to implementation science: a study protocol.

    PubMed

    Squires, Janet E; Graham, Ian D; Hutchinson, Alison M; Michie, Susan; Francis, Jill J; Sales, Anne; Brehaut, Jamie; Curran, Janet; Ivers, Noah; Lavis, John; Linklater, Stefanie; Fenton, Shannon; Noseworthy, Thomas; Vine, Jocelyn; Grimshaw, Jeremy M

    2015-09-28

    There is growing recognition that "context" can and does modify the effects of implementation interventions aimed at increasing healthcare professionals' use of research evidence in clinical practice. However, conceptual clarity about what exactly comprises "context" is lacking. The purpose of this research program is to develop, refine, and validate a framework that identifies the key domains of context (and their features) that can facilitate or hinder (1) healthcare professionals' use of evidence in clinical practice and (2) the effectiveness of implementation interventions. A multi-phased investigation of context using mixed methods will be conducted. The first phase is a concept analysis of context using the Walker and Avant method to distinguish between the defining and irrelevant attributes of context. This phase will result in a preliminary framework for context that identifies its important domains and their features according to the published literature. The second phase is a secondary analysis of qualitative data from 13 studies of interviews with 312 healthcare professionals on the perceived barriers and enablers to their application of research evidence in clinical practice. These data will be analyzed inductively using constant comparative analysis. For the third phase, we will conduct semi-structured interviews with key health system stakeholders and change agents to elicit their knowledge and beliefs about the contextual features that influence the effectiveness of implementation interventions and healthcare professionals' use of evidence in clinical practice. Results from all three phases will be synthesized using a triangulation protocol to refine the context framework drawn from the concept analysis. The framework will then be assessed for content validity using an iterative Delphi approach with international experts (researchers and health system stakeholders/change agents). This research program will result in a framework that identifies the domains of context and their features that can facilitate or hinder: (1) healthcare professionals' use of evidence in clinical practice and (2) the effectiveness of implementation interventions. The framework will increase the conceptual clarity of the term "context" for advancing implementation science, improving healthcare professionals' use of evidence in clinical practice, and providing greater understanding of what interventions are likely to be effective in which contexts.

  17. Partnering with health care systems to assess tobacco treatment practices and beliefs among clinicians: evaluating the process.

    PubMed

    Celestin, Michael D; Hart, Alton; Moody-Thomas, Sarah

    2014-05-29

    Tobacco is a major cause of preventable illness and death. However, clinician use of an evidence-based guideline for treatment of tobacco use is low. This case study describes the process for conducting a pre-intervention assessment of clinician practices and beliefs regarding treatment of tobacco use. Louisiana State University Health System, one of the largest safety-net public hospital systems in the United States, consists of 10 facilities in population centers across the state of Louisiana. The system serves a large proportion of the state's underinsured and uninsured, low-income, and racial/ethnic minority populations, groups that have high rates of tobacco use. Activities included 1) partnering with hospital administrators to generate support for conducting a clinician assessment, 2) identifying and adapting a survey tool to assess clinicians' practices and beliefs regarding treatment of tobacco use, 3) developing a survey protocol and obtaining approval from the institutional review board, and 4) administering the survey electronically, using the hospital's e-mail system. Existing partnerships and system resources aided survey administration. Use of the hospital's internal e-mail system and distribution of an online survey were effective means to engage clinicians. Following notification, 43.6% of 4,508 clinicians opened their e-mail containing the invitation letter with a Web link to the survey; of these, 83.1% (1,634) completed the survey. Partnering with stakeholders and using existing resources within the health care system are essential to successful implementation of a system-wide survey of clinician practices and beliefs regarding treatment of tobacco use.

  18. ECC-based grouping-proof RFID for inpatient medication safety.

    PubMed

    Lin, Qiping; Zhang, Fangguo

    2012-12-01

    Several papers were proposed in which symmetric cryptography was used to design RFID grouping-proof for medication safety in the Journal of Medical Systems. However, if we want to ensure privacy, authentication and protection against the tracking of RFID-tags without losing system scalability, we must design an asymmetric cryptography-based RFID. This paper will propose a new ECC-based grouping-proof for RFID. Our ECC-based grouping-proof reduces the computation of tags and prevents timeout problems from occurring in n-party grouping-proof protocol. Based on asymmetric cryptography, the proposed scheme is practical, secure and efficient for medication applications.

  19. Ship to Shore Data Communication and Prioritization

    DTIC Science & Technology

    2011-12-01

    First Out FTP File Transfer Protocol GCCS-M Global Command and Control System Maritime HAIPE High Assurance Internet Protocol Encryptor HTTP Hypertext...Transfer Protocol (world wide web protocol ) IBS Integrated Bar Code System IDEF0 Integration Definition IER Information Exchange Requirements...INTEL Intelligence IP Internet Protocol IPT Integrated Product Team ISEA In-Service Engineering Agent ISNS Integrated Shipboard Network System IT

  20. Learning Management Systems: Practical Considerations for the Selection and Implementation of an E-learning Platform for the Navy

    DTIC Science & Technology

    2007-01-28

    is interested in B2B and B2C e-commerce, enterprise resource planning, e-procurement, supply-chain management, data mining, and knowledge discovery... social networking tools, collaborative spaces, knowledge management, “connecting-enabling” protocols like RSS, and other tools. The intent of the ILE...delivered to them, what learning pedagogy is appropriate for them, the optimal level of social interaction for learning, and available resources

  1. The Consensus Problem in Unreliable Distributed Systems (A Brief Survey).

    DTIC Science & Technology

    1983-06-01

    they might also reach conflicting conclusions about the outcome of the election and hence fail to reach agreement. Davies and Wakerly [21 realized this...15], and part (b) was shown by Dolev and Reischuk [10]. For practical applications , these bounds are not very encouraging, especially the t+I bound on...solutions is f2(n + t2)). Theorem 7, part (b) shows this bound "best possible" for authenticated algorithms. 6. Applications of Agreement Protocols The

  2. [Food Security in Europe: comparison between the "Hygiene Package" and the British Retail Consortium (BRC) & International Food Standard (IFS) protocols].

    PubMed

    Stilo, A; Parisi, S; Delia, S; Anastasi, F; Bruno, G; Laganà, P

    2009-01-01

    The birth of Hygiene Package and of the Reg. CE no 2073/2005 in the food production field signalled a change in Italy. This process started in Italy in 1997 with the legislative decree no 155 on Self-control but in reality, it was implemented in the UK in 1990 with the promulgation of the Food Safety Act. This legal act was influenced by some basic rules corresponding to the application of HACCP standards. Since 1990 the British chains of distribution (Retailers) have involved all aspects of the food line in this type of responsibility. Due to this growing awareness for a need for greater regulation, a protocol, edited by British Retail Consortium was created in 1998. This protocol acted as a "stamp" of approval for food products and it is now known as the BRC Global Food Standard. In July 2008, this protocol became effective in its fifth version. After the birth of BRC, also French and German Retailers have established a standard practically equivalent and perhaps more pertinent to safety food, that is International Food Standard (IFS). The new approach is specific to the food field and strictly applies criteria which will ensure "safety, quality and legality" of food products, similarly to ISO 22000:2005 (mainly based on BRC & IFS past experiences). New standards aim to create a sort of green list with fully "proper and fit" Suppliers only, because of comprehensible exigencies of Retailers. It is expected, as we have shown, that Auditor authorities who are responsible for ensuring that inspections are now carried out like the Hygiene Package, will find these new standards useful. The advantages of streamlining this system is that it will allow enterprises to diligently enforce food safety practices without fear of upset or legal consequence, to improve the quality (HACCP) of management & traceability system; to restrict wastes, reprocessing and withdrawal of products. However some discordances about the interpretation of certain sub-field norms (e.g., water management) are evident and should be carefully discussed once more.

  3. Designing a Technology Enhanced Practice for Home Nursing Care of Patients with Congestive Heart Failure

    PubMed Central

    Casper, Gail R.; Karsh, Ben-Tzion; K.L., Calvin; Carayon, Pascale; Grenier, Anne-Sophie; Sebern, Margaret; Burke, Laura J.; Brennan, Patricia F.

    2005-01-01

    This paper describes the process we used to design the HeartCare website to support Technology Enhanced Practice (TEP) for home care nurses engaged in providing care for patients with Congestive Heart Failure (CHF). Composed of communication, information, and self-monitoring functions, the HeartCare website is aimed at supporting best practice nursing care for these patients. Its unique focus is professional practice, thus the scope of this project is greater and more abstract than those focusing on a task or set of activities. A modified macroergonomic analysis, design work system analysis, and focus groups utilizing participatory design methodology were undertaken to characterize the nursing practice model. Design of the HeartCare website required synthesizing the extant practice model and the agency’s evidence-based heart failure protocols, identifying aspects of practice that could be enhanced by supporting technology, and delineation of functional requirements of the Enhanced HeartCare technology. Validation and refinement of the website and planning for user training activities will be accomplished through a two-stage usability testing strategy. PMID:16779013

  4. Voice over Internet protocol for the orthodontic practice: a sensible switch from plain old telephone service.

    PubMed

    Mupparapu, Muralidhar

    2008-03-01

    Voice over Internet protocol (VoIP) is a revolutionary new technology that is causing a stir in the telecommunications industry and threatening the existence of traditional telephone service providers. Based on a simple method of converting analog audio signals into digital data before being transmitted over the Internet, VoIP has gained immense popularity among consumers. The technology is now regarded as an alternative to traditional telephone service for the orthodontic office. When the economics are considered, it is cost-effective, especially for a busy orthodontic practice where the call volumes both in and out are always high. VoIP has the potential to reduce costs, break the barriers between local vs long-distance calling, and make life easier for the office staff. However, deploying VoIP requires a cautious and thought-out process. Users should fully understand the risks and benefits before switching from the public switched telephone network. VoIP customers and service providers are vulnerable to many of the same impersonation-based attacks by those who attempt toll fraud, and identity and information theft. In this article, VoIP is introduced to orthodontic practitioners, who might be unfamiliar with this technology. Internet protocol based private branch exchange systems that are currently marketed as open-source technologies are also reviewed. Additionally, VoIP is compared with the traditional public switched telephone network technology and evaluated for its potential applications in an orthodontic office for both increased efficiency and cost savings.

  5. A comparative study of the use of the Istanbul Protocol amongst civil society organizations in low-income countries.

    PubMed

    Kelly, Toby; Jensen, Steffen; Koch Andersen, Morten; Christiansen, Catrine; Sharma, Jeevan Raj

    2016-01-01

    The Istanbul Protocol (IP) is one of the great success stories of the global anti-torture movement, setting out universal guidelines for the production of rigorous, objective and reliable evidence about allegations of torture and ill-treatment. The IP is explicitly designed to outline 'minimum standards for States'. However, it is all too often left to civil society organizations to investigate allegations of torture and ill-treatment. In this context, important questions remain as to how and where the IP can be used best by such organizations. These questions are particularly acute in situations where human rights groups may have limited institutional capacity. This paper explores the practical challenges faced by civil society in using the IP in Low-Income Countries. It is based on qualitative research in three case studies: Nepal, Kenya and Bangladesh. This research involved over 80 interviews with human rights practitioners. The conclusions of the paper are that the Istanbul Protocol provides a useful framework for documentation, but more comprehensive forms of documentation will often be limited to a very small - albeit important - number of legal cases. In many cases, the creation of precise and standardized forms of evidence is not necessarily the most effective form of documentation for redress or accountability. In the absence of legal systems willing and able to respond effectively to allegations of torture and ill-treatment, there are severe limitations on the practical effectiveness of detailed and technical forms of documentation.

  6. Energy Efficiency Maximization of Practical Wireless Communication Systems

    NASA Astrophysics Data System (ADS)

    Eraslan, Eren

    Energy consumption of the modern wireless communication systems is rapidly growing due to the ever-increasing data demand and the advanced solutions employed in order to address this demand, such as multiple-input multiple-output (MIMO) and orthogonal frequency division multiplexing (OFDM) techniques. These MIMO systems are power hungry, however, they are capable of changing the transmission parameters, such as number of spatial streams, number of transmitter/receiver antennas, modulation, code rate, and transmit power. They can thus choose the best mode out of possibly thousands of modes in order to optimize an objective function. This problem is referred to as the link adaptation problem. In this work, we focus on the link adaptation for energy efficiency maximization problem, which is defined as choosing the optimal transmission mode to maximize the number of successfully transmitted bits per unit energy consumed by the link. We model the energy consumption and throughput performances of a MIMO-OFDM link and develop a practical link adaptation protocol, which senses the channel conditions and changes its transmission mode in real-time. It turns out that the brute force search, which is usually assumed in previous works, is prohibitively complex, especially when there are large numbers of transmit power levels to choose from. We analyze the relationship between the energy efficiency and transmit power, and prove that energy efficiency of a link is a single-peaked quasiconcave function of transmit power. This leads us to develop a low-complexity algorithm that finds a near-optimal transmit power and take this dimension out of the search space. We further prune the search space by analyzing the singular value decomposition of the channel and excluding the modes that use higher number of spatial streams than the channel can support. These algorithms and our novel formulations provide simpler computations and limit the search space into a much smaller set; hence reducing the computational complexity by orders of magnitude without sacrificing the performance. The result of this work is a highly practical link adaptation protocol for maximizing the energy efficiency of modern wireless communication systems. Simulation results show orders of magnitude gain in the energy efficiency of the link. We also implemented the link adaptation protocol on real-time MIMO-OFDM radios and we report on the experimental results. To the best of our knowledge, this is the first reported testbed that is capable of performing energy-efficient fast link adaptation using PHY layer information.

  7. Decisions Made in the Practice Room: A Qualitative Study of Middle School Students' Thought Processes while Practicing

    ERIC Educational Resources Information Center

    Oare, Steve

    2012-01-01

    The purpose of this study is to describe the decision-making processes of novice band students while engaged in individual practice. Five seventh- through ninth-grade students were videotaped while practicing and subsequently interviewed using retrospective verbal protocol. Students were asked to discuss the goals they had while practicing, their…

  8. Managing barriers to empathy in the clinical encounter: a qualitative interview study with GPs.

    PubMed

    Derksen, Frans Awm; Olde Hartman, Tim C; Bensing, Jozien M; Lagro-Janssen, Antoine Lm

    2016-12-01

    Current daily general practice has become increasingly technical and somatically oriented (where attention to patients' feelings is decreased) due to an increase in protocol-based guidelines. Priorities in GP-patient communication have shifted from a focus on listening and empathy to task-oriented communication. To explore what barriers GPs experience when applying empathy in daily practice, and how these barriers are managed. Thirty Dutch GPs with sufficient heterogeneity in sex, age, type of practice, and rural or urban setting were interviewed. The consolidated criteria for reporting qualitative research (COREQ) were applied. The verbatim transcripts were then analysed. According to participating GPs, the current emphasis on protocol-driven care can be a significant barrier to genuineness in communication. Other potential barriers mentioned were time pressures and constraints, and dealing with patients displaying 'unruly behaviour' or those with personality disorders. GPs indicated that it can be difficult to balance emotional involvement and professional distance. Longer consulting times, smaller practice populations, and efficient practice organisation were described as practical solutions. In order to focus on a patient-as-person approach, GPs strongly suggested that deviating from guidelines should be possible when necessary as an element of good-quality care. Joining intercollegiate counselling groups was also discussed. In addition to practical solutions for barriers to behaving empathically, GPs indicated that they needed more freedom to balance working with protocols and guidelines, as well as a patient-as-person and patient-as-partner approach. This balance is necessary to remain connected with patients and to deliver care that is truly personal. © British Journal of General Practice 2016.

  9. An Electricity Price-Aware Open-Source Smart Socket for the Internet of Energy

    PubMed Central

    Blanco-Novoa, Óscar; Fernández-Caramés, Tiago M.; Fraga-Lamas, Paula; Castedo, Luis

    2017-01-01

    The Internet of Energy (IoE) represents a novel paradigm where electrical power systems work cooperatively with smart devices to increase the visibility of energy consumption and create safer, cleaner and sustainable energy systems. The implementation of IoE services involves the use of multiple components, like embedded systems, power electronics or sensors, which are an essential part of the infrastructure dedicated to the generation and distribution energy and the one required by the final consumer. This article focuses on the latter and presents a smart socket system that collects the information about energy price and makes use of sensors and actuators to optimize home energy consumption according to the user preferences. Specifically, this article provides three main novel contributions. First, what to our knowledge is the first hardware prototype that manages in a practical real-world scenario the price values obtained from a public electricity operator is presented. The second contribution is related to the definition of a novel wireless sensor network communications protocol based on Wi-Fi that allows for creating an easy-to-deploy smart plug system that self-organizes and auto-configures to collect the sensed data, minimizing user intervention. Third, it is provided a thorough description of the design of one of the few open-source smart plug systems, including its communications architecture, the protocols implemented, the main sensing and actuation components and the most relevant pieces of the software. Moreover, with the aim of illustrating the capabilities of the smart plug system, the results of different experiments performed are shown. Such experiments evaluate in real-world scenarios the system’s ease of use, its communications range and its performance when using HTTPS. Finally, the economic savings are estimated for different appliances, concluding that, in the practical situation proposed, the smart plug system allows certain energy-demanding appliances to save almost €70 per year. PMID:28335568

  10. [Breastfeeding: nurses' practice under the perspective of the International Classification of Collective Health Nursing Practices].

    PubMed

    Chaves, Maria Marta Nolasco; de Senna Ávila Farias, Fabiana Costa; Apostólico, Maíra Rosa; Cubas, Marcia Regina; Egry, Emiko Yoshikawa

    2011-03-01

    This descriptive and exploratory study aimed to describe nursing diagnoses and interventions under the International Nursing Practice Classification in Collective Health--CIPESC®--in Women's Health Care, sub-theme Pre-Natal and Puerperium, correlating them to nurses' competences at Curitiba's Mother Program. Data used were diagnoses and interventions during nursing consultation from April to July/ 2005. Basic Statistics was used for data treatment. Proper Breastfeeding was the most frequent diagnosis and most interventions are related to strengthening the user to face the health-disease process (68.9%). In spite of nurses' practice during puerperium, such a competence is not part of the Program Protocol. In conclusion, minor adjustments are necessary in the analyzed diagnoses and the Protocol should be reviewed to entail nurses' competences that are developed in their practice in health services according to CIPESC' s registers.

  11. Sharing What We Know about Living a Good Life: Indigenous Approaches to Knowledge Translation

    PubMed Central

    Smylie, Janet; Olding, Michelle; Ziegler, Carolyn

    2015-01-01

    Knowledge Translation (KT), a core priority in Canadian health research, policy, and practice for the past decade, has a long and rich tradition within Indigenous communities. In Indigenous knowledge systems the processes of “knowing” and “doing” are often intertwined and indistinguishable. However, dominant KT models in health science do not typically recognize Indigenous knowledge conceptualizations, sharing systems, or protocols and will likely fall short in Indigenous contexts. There is a need to move towards KT theory and practice that embraces diverse understandings of knowledge and that recognizes, respects, and builds on pre-existing knowledge systems. This will not only result in better processes and outcomes for Indigenous communities, it will also provide rich learning for mainstream KT scholarship and practice. As professionals deeply engaged in KT work, health librarians are uniquely positioned to support the development and implementation of Indigenous KT. This article provides information that will enhance the ability of readers from diverse backgrounds to promote and support Indigenous KT efforts, including an introduction to Indigenous knowledge conceptualizations and knowledge systems; key contextual issues to consider in planning, implementing, or evaluating KT in Indigenous settings; and contemporary examples of Indigenous KT in action. The authors pose critical reflection questions throughout the article that encourage readers to connect the content with their own practices and underlying knowledge assumptions. PMID:26793244

  12. myPace: an integrative health platform for supporting weight loss and maintenance behaviors.

    PubMed

    Barnett, Julie; Harricharan, Michelle; Fletcher, Dave; Gilchrist, Becky; Coughlan, Jane

    2015-01-01

    Obesity is a major health concern caused by unhealthy eating behaviors. Digital weight loss interventions have adopted mobile technology primarily in order to support self-monitoring. However, many available apps are not designed as a part of dietetic practice; therefore, a distinct gap in the research exists relating to technology that supports the patient-practitioner relationship. This paper presents myPace, which is a complete weight loss and management system that is deployed via a smartphone and a PC. It connects dietitians and patients between face-to-face consultations and extends the relationship through patients' regular progress updates and dietitians' tailored and timely advice, for sustained behavior change. The prototype was developed from research into behavior change for weight loss, which furthermore was underpinned by theory and tenets of human support models, such as the supportive accountability framework. We report on an early-phase system design goals via a formative research process, which aimed to implement theoretical principles and match practical dietetic practice. To that end, only the clinical end user's perspective was sought through a coaching think-aloud protocol on the first iteration of the prototype and interviews with dietitians. Findings show that the system has many positive design features, but which require further development in order for the system to be fully acceptable within dietetic practice and motivate patient engagement.

  13. Effectiveness of the implementation of an evidence-based nursing model using participatory action research in oncohematology: research protocol.

    PubMed

    Abad-Corpa, Eva; Meseguer-Liza, Cristobal; Martínez-Corbalán, José Tomás; Zárate-Riscal, Lourdes; Caravaca-Hernández, Amor; Paredes-Sidrach de Cardona, Antonio; Carrillo-Alcaraz, Andrés; Delgado-Hito, Pilar; Cabrero-García, Julio

    2010-08-01

    To generate changes in nursing practice introducing an evidence-based clinical practice (EBCP) model through a participatory process. To evaluate the effectiveness of the changes in terms of nurse-sensitive outcome (NSO). For international nursing science, it is necessary to explore the reasons for supporting EBCP and evaluate the real repercussions and effectiveness. A mixed methods study with a sequential transformative design will be conducted in the bone marrow transplant unit of a tertiary-level Spanish hospital, in two time periods >12 months (date of approval of the protocol: 2006). To evaluate the effectiveness of the intervention, we will use a prospective quasi-experimental design with two non-equivalent and non-concurrent groups. NSO and patient health data will be collected: (a) impact of psycho-social adjustment; (b) patient satisfaction; (c) symptom control; (d) adverse effects. All patients admitted during the period of time will be included, and all staff working on the unit during a participatory action research (PAR). The PAR design will be adopted from a constructivist paradigm perspective, following Checkland's "Soft Systems" theoretical model. Qualitative techniques will be used: 2-hour group meetings with nursing professionals, to be recorded and transcribed. Field diaries (participants and researchers) will be drawn up and data analysis will be carried out by content analysis. PAR is a rigorous research method for introducing changes into practice to improve NSO.

  14. Biased decoy-state measurement-device-independent quantum cryptographic conferencing with finite resources.

    PubMed

    Chen, RuiKe; Bao, WanSu; Zhou, Chun; Li, Hongwei; Wang, Yang; Bao, HaiZe

    2016-03-21

    In recent years, a large quantity of work have been done to narrow the gap between theory and practice in quantum key distribution (QKD). However, most of them are focus on two-party protocols. Very recently, Yao Fu et al proposed a measurement-device-independent quantum cryptographic conferencing (MDI-QCC) protocol and proved its security in the limit of infinitely long keys. As a step towards practical application for MDI-QCC, we design a biased decoy-state measurement-device-independent quantum cryptographic conferencing protocol and analyze the performance of the protocol in both the finite-key and infinite-key regime. From numerical simulations, we show that our decoy-state analysis is tighter than Yao Fu et al. That is, we can achieve the nonzero asymptotic secret key rate in long distance with approximate to 200km and we also demonstrate that with a finite size of data (say 1011 to 1013 signals) it is possible to perform secure MDI-QCC over reasonable distances.

  15. Considerations in reporting palliative care clinical trials: Standardizing information reported and authorship practices

    PubMed Central

    LeBlanc, Thomas W.; Abernethy, Amy P.; Currow, David C.; Kutner, Jean S.

    2014-01-01

    Purpose of Review The nature of palliative care practice, especially the reliance on referrals and differing models of service delivery, poses unique challenges for the creation and interpretation of an evidence base, frequently limiting the applicability of data to patient care. Here we discuss two core aspects of clinical trials reporting in palliative medicine: 1) proposed standards governing the collection and reporting of data, and 2) rules governing authorship and publication. Recent Findings Existing literature often inadequately describes the characteristics of patients, caregivers, clinicians, systems, and interventions included in studies, thereby limiting the utility of results. Summary A generalizability framework is needed to ensure a robust evidence base that advances practice. Lessons learned through the development of research cooperative groups in palliative care reinforce the importance of an authorship protocol for large trials and working groups. PMID:23080306

  16. Coliform Bacteria Monitoring in Fish Systems: Current Practices in Public Aquaria.

    PubMed

    Culpepper, Erin E; Clayton, Leigh A; Hadfield, Catherine A; Arnold, Jill E; Bourbon, Holly M

    2016-06-01

    Public aquaria evaluate coliform indicator bacteria levels in fish systems, but the purpose of testing, testing methods, and management responses are not standardized, unlike with the coliform bacteria testing for marine mammal enclosures required by the U.S. Department of Agriculture. An online survey was sent to selected aquaria to document current testing and management practices in fish systems without marine mammals. The information collected included indicator bacteria species, the size and type of systems monitored, the primary purpose of testing, sampling frequency, test methods, the criteria for interpreting results, corrective actions, and management changes to limit human exposure. Of the 25 institutions to which surveys were sent, 19 (76%) responded. Fourteen reported testing for fecal indicator bacteria in fish systems. The most commonly tested indicator species were total (86%) and fecal (79%) coliform bacteria, which were detected by means of the membrane filtration method (64%). Multiple types and sizes of systems were tested, and the guidelines for testing and corrective actions were highly variable. Only three institutions performed additional tests to confirm the identification of indicator organisms. The results from this study can be used to compare bacterial monitoring practices and protocols in fish systems, as an aid to discussions relating to the accuracy and reliability of test results, and to help implement appropriate management responses. Received August 23, 2015; accepted December 29, 2015.

  17. Wireless Energy Harvesting Two-Way Relay Networks with Hardware Impairments.

    PubMed

    Peng, Chunling; Li, Fangwei; Liu, Huaping

    2017-11-13

    This paper considers a wireless energy harvesting two-way relay (TWR) network where the relay has energy-harvesting abilities and the effects of practical hardware impairments are taken into consideration. In particular, power splitting (PS) receiver is adopted at relay to harvests the power it needs for relaying the information between the source nodes from the signals transmitted by the source nodes, and hardware impairments is assumed suffered by each node. We analyze the effect of hardware impairments [-20]on both decode-and-forward (DF) relaying and amplify-and-forward (AF) relaying networks. By utilizing the obtained new expressions of signal-to-noise-plus-distortion ratios, the exact analytical expressions of the achievable sum rate and ergodic capacities for both DF and AF relaying protocols are derived. Additionally, the optimal power splitting (OPS) ratio that maximizes the instantaneous achievable sum rate is formulated and solved for both protocols. The performances of DF and AF protocols are evaluated via numerical results, which also show the effects of various network parameters on the system performance and on the OPS ratio design.

  18. Digital Motion Imagery, Interoperability Challenges for Space Operations

    NASA Technical Reports Server (NTRS)

    Grubbs, Rodney

    2012-01-01

    With advances in available bandwidth from spacecraft and between terrestrial control centers, digital motion imagery and video is becoming more practical as a data gathering tool for science and engineering, as well as for sharing missions with the public. The digital motion imagery and video industry has done a good job of creating standards for compression, distribution, and physical interfaces. Compressed data streams can easily be transmitted or distributed over radio frequency, internet protocol, and other data networks. All of these standards, however, can make sharing video between spacecraft and terrestrial control centers a frustrating and complicated task when different standards and protocols are used by different agencies. This paper will explore the challenges presented by the abundance of motion imagery and video standards, interfaces and protocols with suggestions for common formats that could simplify interoperability between spacecraft and ground support systems. Real-world examples from the International Space Station will be examined. The paper will also discuss recent trends in the development of new video compression algorithms, as well likely expanded use of Delay (or Disruption) Tolerant Networking nodes.

  19. LC-MS based analysis of endogenous steroid hormones in human hair.

    PubMed

    Gao, Wei; Kirschbaum, Clemens; Grass, Juliane; Stalder, Tobias

    2016-09-01

    The quantification of endogenous steroid hormone concentrations in hair is increasingly used as a method for obtaining retrospective information on long-term integrated hormone exposure. Several different analytical procedures have been employed for hair steroid analysis, with liquid chromatography-mass spectrometry (LC-MS) being recognized as a particularly powerful analytical tool. Several methodological aspects affect the performance of LC-MS systems for hair steroid analysis, including sample preparation and pretreatment, steroid extraction, post-incubation purification, LC methodology, ionization techniques and MS specifications. Here, we critically review the differential value of such protocol variants for hair steroid hormones analysis, focusing on both analytical quality and practical feasibility issues. Our results show that, when methodological challenges are adequately addressed, LC-MS protocols can not only yield excellent sensitivity and specificity but are also characterized by relatively simple sample processing and short run times. This makes LC-MS based hair steroid protocols particularly suitable as a high-quality option for routine application in research contexts requiring the processing of larger numbers of samples. Copyright © 2016 Elsevier Ltd. All rights reserved.

  20. Coexistence of WiFi and WiMAX systems based on PS-request protocols.

    PubMed

    Kim, Jongwoo; Park, Suwon; Rhee, Seung Hyong; Choi, Yong-Hoon; Chung, Young-uk; Hwang, Ho Young

    2011-01-01

    We introduce both the coexistence zone within the WiMAX frame structure and a PS-Request protocol for the coexistence of WiFi and WiMAX systems sharing a frequency band. Because we know that the PS-Request protocol has drawbacks, we propose a revised PS-Request protocol to improve the performance. Two PS-Request protocols are based on the time division operation (TDO) of WiFi system and WiMAX system to avoid the mutual interference, and use the vestigial power management (PwrMgt) bit within the Frame Control field of the frames transmitted by a WiFi AP. The performance of the revised PS-Request protocol is evaluated by computer simulation, and compared to those of the cases without a coexistence protocol and to the original PS-Request protocol.

  1. A CAD system and quality assurance protocol for bone age assessment utilizing digital hand atlas

    NASA Astrophysics Data System (ADS)

    Gertych, Arakadiusz; Zhang, Aifeng; Ferrara, Benjamin; Liu, Brent J.

    2007-03-01

    Determination of bone age assessment (BAA) in pediatric radiology is a task based on detailed analysis of patient's left hand X-ray. The current standard utilized in clinical practice relies on a subjective comparison of the hand with patterns in the book atlas. The computerized approach to BAA (CBAA) utilizes automatic analysis of the regions of interest in the hand image. This procedure is followed by extraction of quantitative features sensitive to skeletal development that are further converted to a bone age value utilizing knowledge from the digital hand atlas (DHA). This also allows providing BAA results resembling current clinical approach. All developed methodologies have been combined into one CAD module with a graphical user interface (GUI). CBAA can also improve the statistical and analytical accuracy based on a clinical work-flow analysis. For this purpose a quality assurance protocol (QAP) has been developed. Implementation of the QAP helped to make the CAD more robust and find images that cannot meet conditions required by DHA standards. Moreover, the entire CAD-DHA system may gain further benefits if clinical acquisition protocol is modified. The goal of this study is to present the performance improvement of the overall CAD-DHA system with QAP and the comparison of the CAD results with chronological age of 1390 normal subjects from the DHA. The CAD workstation can process images from local image database or from a PACS server.

  2. Biometrics IRB best practices and data protection

    NASA Astrophysics Data System (ADS)

    Boehnen, Christopher; Bolme, David; Flynn, Patrick

    2015-05-01

    The collection of data from human subjects for biometrics research in the United States requires the development of a data collection protocol that is reviewed by a Human Subjects Institutional Review Board (IRB). The IRB reviews the protocol for risks and approves it if it meets the criteria for approval specified in the relevant Federal regulations (45 CFR 46). Many other countries operate similar mechanisms for the protection of human subjects. IRBs review protocols for safety, confidentiality, and for minimization of risk associated with identity disclosure. Since biometric measurements are potentially identifying, IRB scrutiny of biometrics data collection protocols can be expected to be thorough. This paper discusses the intricacies of IRB best practices within the worldwide biometrics community. This is important because research decisions involving human subjects are made at a local level and do not set a precedent for decisions made by another IRB board. In many cases, what one board approves is not approved by another board, resulting in significant inconsistencies that prove detrimental to both researchers and human subjects. Furthermore, the level of biometrics expertise may be low on IRBs, which can contribute to the unevenness of reviews. This publication will suggest possible best practices for designing and seeking IRB approval for human subjects research involving biometrics measurements. The views expressed are the opinions of the authors.

  3. Practical device-independent quantum cryptography via entropy accumulation.

    PubMed

    Arnon-Friedman, Rotem; Dupuis, Frédéric; Fawzi, Omar; Renner, Renato; Vidick, Thomas

    2018-01-31

    Device-independent cryptography goes beyond conventional quantum cryptography by providing security that holds independently of the quality of the underlying physical devices. Device-independent protocols are based on the quantum phenomena of non-locality and the violation of Bell inequalities. This high level of security could so far only be established under conditions which are not achievable experimentally. Here we present a property of entropy, termed "entropy accumulation", which asserts that the total amount of entropy of a large system is the sum of its parts. We use this property to prove the security of cryptographic protocols, including device-independent quantum key distribution, while achieving essentially optimal parameters. Recent experimental progress, which enabled loophole-free Bell tests, suggests that the achieved parameters are technologically accessible. Our work hence provides the theoretical groundwork for experimental demonstrations of device-independent cryptography.

  4. Preparation of swine for the laboratory.

    PubMed

    Smith, Alison C; Swindle, M Michael

    2006-01-01

    Swine are an important model in many areas of biomedical research. These animals have been used predominantly as preclinical models involving surgical and interventional protocols. The systems most commonly studied include cardiovascular, integumentary, digestive, and urological. Swine are intelligent social animals and require species-specific socialization and handling techniques. It is important to acclimate the animals to the facility and to personnel before they are placed on chronic protocols. Gentle handling techniques instead of forceful procedures are essential to their socialization. They require sturdy caging with specific construction standards, and toys for environmental enrichment. Because the species is covered by both the Animal Welfare Act and the US Department of Agriculture, interstate transport requires a health certificate with destination state-specific disease screening standards. This manuscript provides an overview of best practices that have been utilized in the authors' facility.

  5. The cumulative effect of multiple critical care protocols on length of stay in a geriatric trauma population.

    PubMed

    Frederickson, Tiffany A; Renner, Catherine Hackett; Swegle, James R; Sahr, Sheryl M

    2013-01-01

    The elderly individuals are the most rapidly growing cohort within the US population, and a corresponding increase is being seen in elderly trauma patients. Elderly patients are more likely to have a hospital length of stay (LOS) in excess of 10 days. They account for 60% of total ICU days. Length of stay is frequently used as a proxy measure for improvement in injury outcomes, changes in quality of care, and hospital outcomes. Patient care protocols are typically created from evidence-based guidelines that serve to reduce variation in care from patient to patient. Patient care protocols have been found to positively impact patient care with reduced duration of mechanical ventilation, shorter LOS in the ICU and shorter overall hospitalization time, reduced mortality, and reduced health care costs. The following study was designed to assess the impact of the implementation of 4 patient care protocols within an elderly trauma population. We hypothesized that the implementation of these protocols would have a beneficial impact on patient care that could be measured by a decrease in hospital LOS. An archival, retrospective pretest/posttest study was performed on elderly trauma patients. The new protocols helped guide practical changes in care that resulted in a 32% decrease in LOS for our elderly trauma patients which exceeds the 25% decrease found in other studies. Additionally, the "Other" category for each variable was less frequently used in the post-protocol phase than in the pre-protocol phase, suggesting a spillover effect on the level of detail recorded in the patient chart. With less variation in practices in the post-protocol phase, Injury Severity score, and admission systolic blood pressure emerged as significant predictors of LOS.

  6. Wound-healing outcomes using standardized assessment and care in clinical practice.

    PubMed

    Bolton, Laura; McNees, Patrick; van Rijswijk, Lia; de Leon, Jean; Lyder, Courtney; Kobza, Laura; Edman, Kelly; Scheurich, Anne; Shannon, Ron; Toth, Michelle

    2004-01-01

    Wound-healing outcomes applying standardized protocols have typically been measured within controlled clinical trials, not natural settings. Standardized protocols of wound care have been validated for clinical use, creating an opportunity to measure the resulting outcomes. Wound-healing outcomes were explored during clinical use of standardized validated protocols of care based on patient and wound assessments. This was a prospective multicenter study of wound-healing outcomes management in real-world clinical practice. Healing outcomes from March 26 to October 31, 2001, were recorded on patients in 3 long-term care facilities, 1 long-term acute care hospital, and 12 home care agencies for wounds selected by staff to receive care based on computer-generated validated wound care algorithms. After diagnosis, wound dimensions and status were assessed using a tool adapted from the Pressure Sore Status Toolfor use on all wounds. Wound, ostomy, and continence nursing professionals accessed consistent protocols of care, via telemedicine in home care or paper forms in long-term care. A physician entered assessments into a desktop computer in the wound clinic. Based on evidence that healing proceeds faster with fewer infections in environments without gauze, the protocols generally avoided gauze dressings. Most of the 767 wounds selected to receive the standardized-protocols of care were stage III-IV pressure ulcers (n = 373; mean healing time 62 days) or full-thickness venous ulcers (n = 124; mean healing time 57 days). Partial-thickness wounds healed faster than same-etiology full-thickness wounds. These results provide benchmarks for natural-setting healing outcomes and help to define and address wound care challenges. Outcomes primarily using nongauze protocols of care matched or surpassed best previously published results on similar wounds using gauze-based protocols of care, including protocols applying gauze impregnated with growth factors or other agents.

  7. Community of Practice: A Path to Strategic Learning

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nancy M. Carlson

    2003-04-01

    To explore the concept of community of practice, the research initially concentrates on a strategic business process in a research and applied engineering laboratory discovering essential communication tools and processes needed to cultivate a high functioning cross-disciplinary team engaged in proposal preparation. Qualitative research in the human ecology of the proposal process blends topic-oriented ethnography and grounded theory and includes an innovative addition to qualitative interviewing, called meta-inquiry. Meta-inquiry uses an initial interview protocol with a homogeneous pool of informants to enhance the researcher's sensitivity to the unique cultures involved in the proposal process before developing a formal interview protocol.more » In this study the preanalysis process uses data from editors, graphic artists, text processors, and production coordinators to assess, modify, enhance, and focus the formal interview protocol with scientists, engineers, and technical managers-the heterogeneous informants. Thus this human ecology-based interview protocol values homogeneous and heterogeneous informant data and acquires data from which concepts, categories, properties, and both substantive and formal theory emerges. The research discovers the five essential processes of owning, visioning, reviewing, producing, and contributing for strategic learning to occur in a proposal community of practice. The apprenticeship, developmental, and nurturing perspectives of adult learning provide the proposal community of practice with cohesion, interdependence, and caring, while core and boundary practices provide insight into the tacit and explicit dimensions of the proposal process. By making these dimensions explicit, the necessary competencies, absorptive capacity, and capabilities needed for strategic learning are discovered. Substantive theory emerges and provides insight into the ability of the proposal community of practice to evolve, flourish, and adapt to the strategic advantage of the laboratory. The substantive theory explores the dimensions of owning, visioning, reviewing, producing, and contributing and their interrelationship to community learning dynamics. Through dialogue, creative tension, and imagination, the proposal community of practice focuses on actionable goals linked by proactively participating in practice, creating possibilities, evaluating and enhancing potential, producing a valued product, and confirming strategic value. Lastly, a formal theory emerges linking competency-capacity-capability, cohesion, interdependence, and caring as essential attributes of strategic learning communities.« less

  8. Prevalence, Etiology and Treatment of Peri-Implant Mucositis and Peri-Implantitis: A Survey of Periodontists in the United States.

    PubMed

    Papathanasiou, Evangelos; Finkelman, Matthew; Hanley, James; Parashis, Andreas O

    2016-05-01

    Currently, information available on the exact prevalence and standard therapeutic protocol of peri-implant diseases is insufficient. The aim of this survey was to investigate the perceived prevalence, etiology, and management of peri-implant mucositis and peri-implantitis by periodontists in the United States. A twenty-question survey was developed. Periodontists currently practicing in the United States were contacted by an e-mail that contained a link to access the survey. Two hundred eighty periodontists (79.3% males; 62.9% with >10 years in practice, 75.7% in private practice) completed the survey. Most (96.1%) of the participants were placing implants (58.3% for >10 years and 32.4% >150 implants/year). The majority reported that the prevalence of peri-implant mucositis and peri-implantitis in their practices is up to 25% but is higher in the general US population and that up to 10% of implants must be removed due to peri-implantitis. There was agreement among contributing etiologic factors such as: 1) plaque; 2) smoking; 3) adverse loading; 4) oral hygiene; 5) use of antimicrobial gel/mouthrinse; 6) non-surgical debridement; 7) use of systemic antibiotics; and 8) 3-month supportive care for treatment of peri-implantitis. Significant heterogeneity was recorded in relation to the instruments used for debridement, use and type of surgical treatment, and materials used for regeneration. Only 5.1% believed that treatment is very effective. This survey indicates that peri-implant diseases are a frequently encountered problem in periodontal practices and that the absence of a standard therapeutic protocol results in significant empirical use of therapeutic modalities and a moderately effective treatment outcome.

  9. Collaborating with community-based services to promote evidence-based practice: Process description of a national initiative to improve services for youth with mental health and substance use problems.

    PubMed

    Henderson, Joanna L; Chaim, Gloria; Brownlie, E B

    2017-08-01

    Many youth with significant mental health (MH) and/or substance use (SU) difficulties do not receive specialized services. Collaboration between service providers, researchers, and other stakeholders is essential to improve youth service system capacity to provide evidence-based services to meet the complex array of needs of youth. Facilitators and barriers of implementing evidence-based practice have been identified, but few studies provide examples of the processes of collaboration and implementation for youth MH services. This study explicates the design features and implementation processes of a project to improve screening activities in youth services. These processes supported the building of 16 collaborative networks of service providers from diverse youth-serving sectors (e.g., MH, youth justice, child welfare) in urban, rural, suburban, and remote Canadian communities. These cross-sectoral networks implemented an evidence-based practice (screening youth aged 12-24 years for MH and SU problems using the Global Assessment of Individual Needs-Short Screener [GAIN-SS]) across their services. Materials and resources were provided by a centralized research team. Core project components were standardized and adherence to these components was monitored. Over 800 service providers participated in cross-sectoral networks, capacity-building events, joint data analysis, or interpretation and recommendation sessions. Across the 89 participating agencies, service providers for 84% of participating youth implemented the evidence-based practice accurately in accordance with project protocols, with 98% of positive screens reviewed and addressed according to organizational protocols. Service provider feedback is reported. Facilitators, barriers, and implications of promoting implementation of evidence-based practices across sites and sectors are discussed. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  10. Evaluation of a tailored implementation strategy to improve the management of patients with chronic obstructive pulmonary disease in primary care: a study protocol of a cluster randomized trial.

    PubMed

    Godycki-Cwirko, Maciek; Zakowska, Izabela; Kosiek, Katarzyna; Wensing, Michel; Krawczyk, Jaroslaw; Kowalczyk, Anna

    2014-04-04

    Chronic obstructive pulmonary disease (COPD) remains a major health problem, strongly related to smoking. Despite the publication of practice guidelines on prevention and treatment, not all patients with the disease receive the recommended healthcare, particularly with regard to smoking cessation advice where applicable. We have developed a tailored implementation strategy for enhancing general practitioners' adherence to the disease management guidelines. The primary aim of the study is to evaluate the effects of this tailored implementation intervention on general practitioners' adherence to guidelines. A pragmatic two-arm cluster randomized trial has been planned to compare care following the implementation of tailored interventions of four recommendations in COPD patients against usual care. The study will involve 18 general practices (9 in the intervention group and 9 in the control group) in Poland, each with at least 80 identified (at the baseline) patients with diagnosed COPD. The nine control practices will provide usual care without any interventions. Tailored interventions to implement four recommendations will be delivered in the remaining nine practices. At follow-up after nine months, data will be collected for all 18 general practices. The primary outcome measure is physicians' adherence to all four recommendations: brief anti-smoking advice, dyspnea assessment, care checklist utilization and demonstration to patients of correct inhaler use. This measurement will be based on data extracted from identified patients' records. Additionally, we will survey and interview patients with chronic obstructive pulmonary disease about the process of care. The results of this trial will be directly applicable to primary care in Poland and add to the growing body of evidence on interventions to improve chronic illness care. This trial has been registered with Clinical Trials Protocol Registration System. NCT01893476.

  11. On shaky ground - A study of security vulnerabilities in control protocols

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Byres, E. J.; Huffman, D.; Kube, N.

    2006-07-01

    The recent introduction of information technologies such as Ethernet R into nuclear industry control devices has resulted in significantly less isolation from the outside world. This raises the question of whether these systems could be attacked by malware, network hackers or professional criminals to cause disruption to critical operations in a manner similar to the impacts now felt in the business world. To help answer this question, a study was undertaken to test a representative control protocol to determine if it had vulnerabilities that could be exploited. A framework was created in which a test could express a large numbermore » of test cases in very compact formal language. This in turn, allowed for the economical automation of both the generation of selectively malformed protocol traffic and the measurement of device under test's (DUT) behavior in response to this traffic. Approximately 5000 protocol conformance tests were run against two major brands of industrial controller. More than 60 categories of errors were discovered, the majority of which were in the form of incorrect error responses to malformed traffic. Several malformed packets however, caused the device to respond or communicate in inappropriate ways. These would be relatively simple for an attacker to inject into a system and could result in the plant operator losing complete view or control of the control device. Based on this relatively small set of devices, we believe that the nuclear industry urgently needs to adopt better security robustness testing of control devices as standard practice. (authors)« less

  12. [The intervention mapping protocol: A structured process to develop, implement and evaluate health promotion programs].

    PubMed

    Fassier, J-B; Lamort-Bouché, M; Sarnin, P; Durif-Bruckert, C; Péron, J; Letrilliart, L; Durand, M-J

    2016-02-01

    Health promotion programs are expected to improve population health and reduce social inequalities in health. However, their theoretical foundations are frequently ill-defined, and their implementation faces many obstacles. The aim of this article is to describe the intervention mapping protocol in health promotion programs planning, used recently in several countries. The challenges of planning health promotion programs are presented, and the six steps of the intervention mapping protocol are described with an example. Based on a literature review, the use of this protocol, its requirements and potential limitations are discussed. The intervention mapping protocol has four essential characteristics: an ecological perspective (person-environment), a participative approach, the use of theoretical models in human and social sciences and the use of scientific evidence. It comprises six steps: conduct a health needs assessment, define change objectives, select theory-based change techniques and practical applications, organize techniques and applications into an intervention program (logic model), plan for program adoption, implementation, and sustainability, and generate an evaluation plan. This protocol was used in different countries and domains such as obesity, tobacco, physical activity, cancer and occupational health. Although its utilization requires resources and a critical stance, this protocol was used to develop interventions which efficacy was demonstrated. The intervention mapping protocol is an integrated process that fits the scientific and practical challenges of health promotion. It could be tested in France as it was used in other countries, in particular to reduce social inequalities in health. Copyright © 2016. Published by Elsevier Masson SAS.

  13. Effect of various practical warm-up protocols on acute lower-body power.

    PubMed

    Buttifant, David; Hrysomallis, Con

    2015-03-01

    The purpose of this study was to compare the acute effect of box squats with barbell (BBSquat), box squats with elastic resistance bands (BandSquat), and static stretches (SStretch) on external power during a 20-kg weighted jump squat. Twelve male athletes performed each of the 3 warm-up protocols on separate occasions in a randomized order. Weighted jump squat power was assessed using a linear position transducer attached to the bar of a Smith machine. Jump power was measured pre-warm-up and 5 and 10 minutes post-warm-up protocol. The BBSquat protocol involved 3 sets of 3RM, BandSquat involved 3 sets of 3 repetitions using highest resistance elastic bands, and the SStretch protocol comprises two 30-second stretches for muscles of the lower limbs. Jump power significantly increased from pre-warm-up to 5 and 10 minutes post-warm-up for both the BandSquat and BBSquat protocols. There was no statistical difference in power values between BandSquat and BBSquat. Power output significantly decreased from pre-warm-up to 5 and 10 minutes post-warm-up for the SStretch protocol. The BandSquat was just as effective as BBSquat in augmenting acute jump power. The SStretch was detrimental to jump performance. A practical warm-up using relatively inexpensive and portable equipment such as elastic resistance bands was just as effective as a warm-up protocol that requires more substantial and less transportable equipment such as a squat rack and associated free weights. The BandSquat warm-up may be considered more accessible for athletes at various competition levels.

  14. Systems consultation: protocol for a novel implementation strategy designed to promote evidence-based practice in primary care.

    PubMed

    Quanbeck, Andrew; Brown, Randall T; E Zgierska, Aleksandra; A Johnson, Roberta; Robinson, James M; Jacobson, Nora

    2016-01-27

    Adoption of evidence-based practices takes place at a glacial place in healthcare. This research will pilot test an innovative implementation strategy - systems consultation -intended to speed the adoption of evidence-based practice in primary care. The strategy is based on tenets of systems engineering and has been extensively tested in addiction treatment. Three innovations have been included in the strategy - translation of a clinical practice guideline into a checklist-based implementation guide, the use of physician peer coaches ('systems consultants') to help clinics implement the guide, and a focus on reducing variation in practices across prescribers and clinics. The implementation strategy will be applied to improving opioid prescribing practices in primary care, which may help ultimately mitigate the increasing prevalence of opioid abuse and addiction. The pilot test will compare four intervention clinics to four control clinics in a matched-pairs design. A leading clinical guideline for opioid prescribing has been translated into a checklist-based implementation guide in a systematic process that involved experts who wrote the guideline in consultation with implementation experts and primary care physicians. Two physicians with expertise in family and addiction medicine are serving as the systems consultants. Each systems consultant will guide two intervention clinics, using two site visits and follow-up communication by phone and email, to implement the translated guideline. Mixed methods will be used to test the feasibility, acceptability, and preliminary effectiveness of the implementation strategy in an evaluation that meets standards for 'fully developed use' of the RE-AIM framework (Reach, Effectiveness, Adoption, Implementation, Maintenance). The clinic will be the primary unit of analysis. The systems consultation implementation strategy is intended to generalize to the adoption of other clinical guidelines. This pilot test is intended to prepare for a large randomized clinical trial that will test the strategy against other implementation strategies, such as audit/feedback and academic detailing, used to close the gap between knowledge and practice. The systems consultation approach has the potential to shorten the famously long time it takes to implement evidence-based practices and clinical guidelines in healthcare.

  15. Security of two-state and four-state practical quantum bit-commitment protocols

    NASA Astrophysics Data System (ADS)

    Loura, Ricardo; Arsenović, Dušan; Paunković, Nikola; Popović, Duška B.; Prvanović, Slobodan

    2016-12-01

    We study cheating strategies against a practical four-state quantum bit-commitment protocol [A. Danan and L. Vaidman, Quant. Info. Proc. 11, 769 (2012)], 10.1007/s11128-011-0284-4 and its two-state variant [R. Loura et al., Phys. Rev. A 89, 052336 (2014)], 10.1103/PhysRevA.89.052336 when the underlying quantum channels are noisy and the cheating party is constrained to using single-qubit measurements only. We show that simply inferring the transmitted photons' states by using the Breidbart basis, optimal for ambiguous (minimum-error) state discrimination, does not directly produce an optimal cheating strategy for this bit-commitment protocol. We introduce a strategy, based on certain postmeasurement processes and show it to have better chances at cheating than the direct approach. We also study to what extent sending forged geographical coordinates helps a dishonest party in breaking the binding security requirement. Finally, we investigate the impact of imperfect single-photon sources in the protocols. Our study shows that, in terms of the resources used, the four-state protocol is advantageous over the two-state version. The analysis performed can be straightforwardly generalized to any finite-qubit measurement, with the same qualitative results.

  16. Practical quantum private query of blocks based on unbalanced-state Bennett-Brassard-1984 quantum-key-distribution protocol.

    PubMed

    Wei, Chun-Yan; Gao, Fei; Wen, Qiao-Yan; Wang, Tian-Yin

    2014-12-18

    Until now, the only kind of practical quantum private query (QPQ), quantum-key-distribution (QKD)-based QPQ, focuses on the retrieval of a single bit. In fact, meaningful message is generally composed of multiple adjacent bits (i.e., a multi-bit block). To obtain a message a1a2···al from database, the user Alice has to query l times to get each ai. In this condition, the server Bob could gain Alice's privacy once he obtains the address she queried in any of the l queries, since each a(i) contributes to the message Alice retrieves. Apparently, the longer the retrieved message is, the worse the user privacy becomes. To solve this problem, via an unbalanced-state technique and based on a variant of multi-level BB84 protocol, we present a protocol for QPQ of blocks, which allows the user to retrieve a multi-bit block from database in one query. Our protocol is somewhat like the high-dimension version of the first QKD-based QPQ protocol proposed by Jacobi et al., but some nontrivial modifications are necessary.

  17. Cognitive Hypnotherapy as a Transdiagnostic Protocol for Emotional Disorders.

    PubMed

    Alladin, Assen; Amundson, Jon

    2016-01-01

    This article describes cognitive hypnotherapy (CH), an integrative treatment that provides an evidence-based framework for synthesizing clinical practice and research. CH combines hypnotherapy with cognitive-behavior therapy in the management of emotional disorders. This blended version of clinical practice meets criteria for an assimilative model of integrative psychotherapy, which incorporates both theory and empirical findings. Issues related to (a) additive effect of hypnosis in treatment, (b) transdiagnostic consideration, and (c) unified treatment protocols in the treatment of emotional disorders are considered in light of cognitive hypnotherapy.

  18. Instituting the Updated CPR Protocol: The Team Physician's Role.

    ERIC Educational Resources Information Center

    Araujo, David

    1994-01-01

    Summarizes recommendations from the 1992 National Conference on Cardiopulmonary Resuscitation (CPR) and Emergency Cardiac Care. Because team physicians may have to provide basic life support for athletes or spectators, knowing current (CPR) protocol is essential in developing emergency response plans and training personnel. Practice removing…

  19. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Glosser, D.; Kutchko, B.; Benge, G.

    Foamed cement is a critical component for wellbore stability. The mechanical performance of a foamed cement depends on its microstructure, which in turn depends on the preparation method and attendant operational variables. Determination of cement stability for field use is based on laboratory testing protocols governed by API Recommended Practice 10B-4 (API RP 10B-4, 2015). However, laboratory and field operational variables contrast considerably in terms of scale, as well as slurry mixing and foaming processes. Here in this paper, laboratory and field operational processes are characterized within a physics-based framework. It is shown that the “atomization energy” imparted by themore » high pressure injection of nitrogen gas into the field mixed foamed cement slurry is – by a significant margin – the highest energy process, and has a major impact on the void system in the cement slurry. There is no analog for this high energy exchange in current laboratory cement preparation and testing protocols. Quantifying the energy exchanges across the laboratory and field processes provides a basis for understanding relative impacts of these variables on cement structure, and can ultimately lead to the development of practices to improve cement testing and performance.« less

  20. [Equipment qualification].

    PubMed

    Le Vacon, F

    2005-06-01

    The qualification of the equipment is a particularly important stage in the transfusional process. On the one hand, of many standards such as those of certification or that of accreditation require it, just as the good transfusional practices; in addition, the practices of steps of quality assurance develop this aspect. Indeed, the absence of the realization of this qualification of material having an influence on the finished product, can lead to an error in the product. This qualification passes by various stages of which some are major such as the drafting of the schedule of conditions, the drafting of the operational protocol of qualification, the decision made for the setting in routine. Finally so that this qualification takes all its dimensions it is necessary to carry out methods linked to the international system of measurement. Moreover certain questions after reflexions must find response such as which unit to check, and only this one, the equipment is - it a complex one, is there a maintenance contract? Once all these elements taken into account, the questions having found their answer, the operational protocol will then well be built, the decisions of settings in routine could be done and the sets of the finalized stages.

  1. In-Space Networking on NASA's SCAN Testbed

    NASA Technical Reports Server (NTRS)

    Brooks, David E.; Eddy, Wesley M.; Clark, Gilbert J.; Johnson, Sandra K.

    2016-01-01

    The NASA Space Communications and Navigation (SCaN) Testbed, an external payload onboard the International Space Station, is equipped with three software defined radios and a flight computer for supporting in-space communication research. New technologies being studied using the SCaN Testbed include advanced networking, coding, and modulation protocols designed to support the transition of NASAs mission systems from primarily point to point data links and preplanned routes towards adaptive, autonomous internetworked operations needed to meet future mission objectives. Networking protocols implemented on the SCaN Testbed include the Advanced Orbiting Systems (AOS) link-layer protocol, Consultative Committee for Space Data Systems (CCSDS) Encapsulation Packets, Internet Protocol (IP), Space Link Extension (SLE), CCSDS File Delivery Protocol (CFDP), and Delay-Tolerant Networking (DTN) protocols including the Bundle Protocol (BP) and Licklider Transmission Protocol (LTP). The SCaN Testbed end-to-end system provides three S-band data links and one Ka-band data link to exchange space and ground data through NASAs Tracking Data Relay Satellite System or a direct-to-ground link to ground stations. The multiple data links and nodes provide several upgradable elements on both the space and ground systems. This paper will provide a general description of the testbeds system design and capabilities, discuss in detail the design and lessons learned in the implementation of the network protocols, and describe future plans for continuing research to meet the communication needs for evolving global space systems.

  2. Merging video coaching and an anthropologic approach to understand health care provider behavior toward hand hygiene protocols.

    PubMed

    Boudjema, Sophia; Tarantini, Clément; Peretti-Watel, Patrick; Brouqui, Philippe

    2017-05-01

    We used videorecordings of routine care to analyze health care providers' deviance from protocols and organized follow-up interviews that were conducted by an anthropologist and a nurse. After consent, health care workers were recorded during routine care by an automatic video remote control. Each participant was invited to watch her or his recorded behaviors on 2 different videos showing routine practices and her or his deviance from protocols, and to comment on them. After this step an in-depth interview based on preestablished guidelines was organized and explanations regarding the observed deviance was discussed. This design was intended to reveal the HCWs' subjectivity; that is, how they perceive hand hygiene issues in their daily routine, what concrete difficulties they face, and how they try to resolve them. We selected 43 of 250 videorecordings created during the study, which allowed us to study 15 out of 20 health care professionals. Twenty out of 43 videos showed 1 or more breaches in the hand hygiene protocol. The breaches were frequently linked to glove abuse. Deviance from protocols was explained by the health care workers as the result of an adaptive behavior; that is, facing work constraints that were disconnected from infection control protocols. Professional practices and protocols should be revisited to create simple messages that are adapted to the mandatory needs in a real life clinic environment. Copyright © 2017 Association for Professionals in Infection Control and Epidemiology, Inc. Published by Elsevier Inc. All rights reserved.

  3. An efficient RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography.

    PubMed

    Zhang, Zezhong; Qi, Qingqing

    2014-05-01

    Medication errors are very dangerous even fatal since it could cause serious even fatal harm to patients. In order to reduce medication errors, automated patient medication systems using the Radio Frequency Identification (RFID) technology have been used in many hospitals. The data transmitted in those medication systems is very important and sensitive. In the past decade, many security protocols have been proposed to ensure its secure transition attracted wide attention. Due to providing mutual authentication between the medication server and the tag, the RFID authentication protocol is considered as the most important security protocols in those systems. In this paper, we propose a RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography (ECC). The analysis shows the proposed protocol could overcome security weaknesses in previous protocols and has better performance. Therefore, the proposed protocol is very suitable for automated patient medication systems.

  4. Practical quantum retrieval games

    NASA Astrophysics Data System (ADS)

    Arrazola, Juan Miguel; Karasamanis, Markos; Lütkenhaus, Norbert

    2016-06-01

    Complex cryptographic protocols are often constructed from simpler building blocks. In order to advance quantum cryptography, it is important to study practical building blocks that can be used to develop new protocols. An example is quantum retrieval games (QRGs), which have broad applicability and have already been used to construct quantum money schemes. In this work, we introduce a general construction of quantum retrieval games based on the hidden matching problem and show how they can be implemented in practice using available technology. More precisely, we provide a general method to construct (1-out-of-k ) QRGs, proving that their cheating probabilities decrease exponentially in k . In particular, we define QRGs based on coherent states of light, which can be implemented even in the presence of experimental imperfections. Our results constitute a tool in the arsenal of the practical quantum cryptographer.

  5. Development of an HIV Postexposure Prophylaxis (PEP) Protocol for Trainees Engaging in Academic Global Health Experiences.

    PubMed

    Arora, Gitanjli; Hoffman, Risa M

    2017-11-01

    Global health (GH) education programs have become increasingly common in U.S. medical schools and graduate medical education programs, with growing numbers of medical students, residents, and fellows participating in clinical experiences in settings with high HIV prevalence and limited resources. However, there are no guidelines for provision of HIV postexposure prophylaxis (PEP) to trainees engaging in these academic GH experiences. Faculty of the Global Health Education Programs (GHEP) at the David Geffen School of Medicine at UCLA and GH partner institutions recognized the need for PEP access for trainees engaged in GH experiences. In 2013-2014, key UCLA faculty collaborated in the development of the UCLA GHEP PEP Protocol, which includes provision of PEP medications to trainees prior to departure, an on-call infectious disease/HIV specialist to advise trainees who have exposures, and a system for following up with exposed trainees while on the GH rotation and after their return. Between February 2014 and September 2016, 112 medical students and 110 residents received education on the PEP protocol during their predeparture orientation. The protocol was used for 28 exposures (27 occupational, 1 nonoccupational), with PEP recommended in 3 occupational cases (all needlesticks) and the single nonoccupational case. There were no reported HIV seroconversions. The authors plan to formally evaluate the PEP protocol, conduct a qualitative assessment with trainees and both UCLA and GH partner faculty, and discuss best practices with institutions across the United States and with GH partners.

  6. Rational prescribing in paediatrics in a resource-limited setting.

    PubMed

    Risk, Rachel; Naismith, Hamish; Burnett, Alexander; Moore, Sophie E; Cham, Mamady; Unger, Stefan

    2013-07-01

    There is evidence of inappropriate medication use, causing unnecessary costs for health systems, particularly those with limited resources. Overprescription is commonly reported and can lead to antibiotic resistance. Prescribing patterns differ between countries; little is known about paediatric prescribing practices in Africa. To investigate prescribing practices in children in The Gambia, West Africa. A retrospective survey of prescribing practices in children under 5 years of age based on WHO protocol DAP/93.1 was conducted. Twenty government-run health centres across all six regions in The Gambia were assessed. The first 10 encounters each month in 2010 were recorded. For each encounter, patient demographics, diagnoses and medications were recorded as per protocol. Two thousand and four hundred patient encounters were included. The mean number of medications per encounter was 2.2 (median 2.0, IQR 2.0-3.0). Across different geographical regions within The Gambia antibiotics were prescribed in 63.4% (IQR 62.8-65.8%) and micronutrients in 21.7% (IQR 15.3-27.1%) of patient encounters. There was evidence of high antibiotic prescription in children with cough and coryzal symptoms (54.5%; IQR 35.8-59.0%) and simple diarrhoea without dehydration (44.8%; IQR 36.7-61.3%). 74.8% (IQR 71.8-76.1%) of medications were prescribed generically. The study showed an overprescription of antibiotics and substantial usage of micronutrients despite a lack of international evidence-based guidelines. Cost-effective interventions to improve prescribing practices are called for and more studies with a focus on rational prescribing in paediatrics in low-income settings are urgently required to fill the gap in current knowledge.

  7. Agroforestry: a sustainable environmental practice for carbon sequestration under the climate change scenarios-a review.

    PubMed

    Abbas, Farhat; Hammad, Hafiz Mohkum; Fahad, Shah; Cerdà, Artemi; Rizwan, Muhammad; Farhad, Wajid; Ehsan, Sana; Bakhat, Hafiz Faiq

    2017-04-01

    Agroforestry is a sustainable land use system with a promising potential to sequester atmospheric carbon into soil. This system of land use distinguishes itself from the other systems, such as sole crop cultivation and afforestation on croplands only through its potential to sequester higher amounts of carbon (in the above- and belowground tree biomass) than the aforementioned two systems. According to Kyoto protocol, agroforestry is recognized as an afforestation activity that, in addition to sequestering carbon dioxide (CO 2 ) to soil, conserves biodiversity, protects cropland, works as a windbreak, and provides food and feed to human and livestock, pollen for honey bees, wood for fuel, and timber for shelters construction. Agroforestry is more attractive as a land use practice for the farming community worldwide instead of cropland and forestland management systems. This practice is a win-win situation for the farming community and for the environmental sustainability. This review presents agroforestry potential to counter the increasing concentration of atmospheric CO 2 by sequestering it in above- and belowground biomass. The role of agroforestry in climate change mitigation worldwide might be recognized to its full potential by overcoming various financial, technical, and institutional barriers. Carbon sequestration in soil by various agricultural systems can be simulated by various models but literature lacks reports on validated models to quantify the agroforestry potential for carbon sequestration.

  8. Fast, efficient error reconciliation for quantum cryptography

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Buttler, W.T.; Lamoreaux, S.K.; Torgerson, J.R.

    2003-05-01

    We describe an error-reconciliation protocol, which we call Winnow, based on the exchange of parity and Hamming's 'syndrome' for N-bit subunits of a large dataset. The Winnow protocol was developed in the context of quantum-key distribution and offers significant advantages and net higher efficiency compared to other widely used protocols within the quantum cryptography community. A detailed mathematical analysis of the Winnow protocol is presented in the context of practical implementations of quantum-key distribution; in particular, the information overhead required for secure implementation is one of the most important criteria in the evaluation of a particular error-reconciliation protocol. The increasemore » in efficiency for the Winnow protocol is largely due to the reduction in authenticated public communication required for its implementation.« less

  9. Cirrus: Inducing Subject Models from Protocol Data

    DTIC Science & Technology

    1988-08-16

    behavior scientists, and more recently, by knowledge engineers who wish to embed the knowledge of human experts in an expert system. However, protocol...analysis is notoriously difficult and time comsuming . Several systems have been developed to aid in protocol analysis. Waterman and Newell (1971, 1973...developed a system that could read the natural langauge of the protocol and produce a formal trace of it (a problem behavior graph). The system, however

  10. A New Signaling Architecture THREP with Autonomous Radio-Link Control for Wireless Communications Systems

    NASA Astrophysics Data System (ADS)

    Hirono, Masahiko; Nojima, Toshio

    This paper presents a new signaling architecture for radio-access control in wireless communications systems. Called THREP (for THREe-phase link set-up Process), it enables systems with low-cost configurations to provide tetherless access and wide-ranging mobility by using autonomous radio-link controls for fast cell searching and distributed call management. A signaling architecture generally consists of a radio-access part and a service-entity-access part. In THREP, the latter part is divided into two steps: preparing a communication channel, and sustaining it. Access control in THREP is thus composed of three separated parts, or protocol phases. The specifications of each phase are determined independently according to system requirements. In the proposed architecture, the first phase uses autonomous radio-link control because we want to construct low-power indoor wireless communications systems. Evaluation of channel usage efficiency and hand-over loss probability in the personal handy-phone system (PHS) shows that THREP makes the radio-access sub-system operations in a practical application model highly efficient, and the results of a field experiment show that THREP provides sufficient protection against severe fast CNR degradation in practical indoor propagation environments.

  11. A secure distributed logistic regression protocol for the detection of rare adverse drug events

    PubMed Central

    El Emam, Khaled; Samet, Saeed; Arbuckle, Luk; Tamblyn, Robyn; Earle, Craig; Kantarcioglu, Murat

    2013-01-01

    Background There is limited capacity to assess the comparative risks of medications after they enter the market. For rare adverse events, the pooling of data from multiple sources is necessary to have the power and sufficient population heterogeneity to detect differences in safety and effectiveness in genetic, ethnic and clinically defined subpopulations. However, combining datasets from different data custodians or jurisdictions to perform an analysis on the pooled data creates significant privacy concerns that would need to be addressed. Existing protocols for addressing these concerns can result in reduced analysis accuracy and can allow sensitive information to leak. Objective To develop a secure distributed multi-party computation protocol for logistic regression that provides strong privacy guarantees. Methods We developed a secure distributed logistic regression protocol using a single analysis center with multiple sites providing data. A theoretical security analysis demonstrates that the protocol is robust to plausible collusion attacks and does not allow the parties to gain new information from the data that are exchanged among them. The computational performance and accuracy of the protocol were evaluated on simulated datasets. Results The computational performance scales linearly as the dataset sizes increase. The addition of sites results in an exponential growth in computation time. However, for up to five sites, the time is still short and would not affect practical applications. The model parameters are the same as the results on pooled raw data analyzed in SAS, demonstrating high model accuracy. Conclusion The proposed protocol and prototype system would allow the development of logistic regression models in a secure manner without requiring the sharing of personal health information. This can alleviate one of the key barriers to the establishment of large-scale post-marketing surveillance programs. We extended the secure protocol to account for correlations among patients within sites through generalized estimating equations, and to accommodate other link functions by extending it to generalized linear models. PMID:22871397

  12. Evaluation of Vitamin D Standardization Program protocols for standardizing serum 25-hydroxyvitamin D data: a case study of the program's potential for national nutrition and health surveys12345

    PubMed Central

    Cashman, Kevin D; Kiely, Mairead; Kinsella, Michael; Durazo-Arvizu, Ramón A; Tian, Lu; Zhang, Yue; Lucey, Alice; Flynn, Albert; Gibney, Michael J; Vesper, Hubert W; Phinney, Karen W; Coates, Paul M; Picciano, Mary F; Sempos, Christopher T

    2013-01-01

    Background: The Vitamin D Standardization Program (VDSP) has developed protocols for standardizing procedures of 25-hydroxyvitamin D [25(OH)D] measurement in National Health/Nutrition Surveys to promote 25(OH)D measurements that are accurate and comparable over time, location, and laboratory procedure to improve public health practice. Objective: We applied VDSP protocols to existing ELISA-derived serum 25(OH)D data from the Irish National Adult Nutrition Survey (NANS) as a case-study survey and evaluated their effectiveness by comparison of the protocol-projected estimates with those from a reanalysis of survey serums by using liquid chromatography–tandem mass spectrometry (LC–tandem MS). Design: The VDSP reference system and protocols were applied to ELISA-based serum 25(OH)D data from the representative NANS sample (n = 1118). A reanalysis of 99 stored serums by using standardized LC–tandem MS and resulting regression equations yielded predicted standardized serum 25(OH)D values, which were then compared with LC–tandem MS reanalyzed values for all serums. Results: Year-round prevalence rates for serum 25(OH)D concentrations <30, <40, and <50 nmol/L were 6.5%, 21.9%, and 40.0%, respectively, via original ELISA measurements and 11.4%, 25.3%, and 43.7%, respectively, when VDSP protocols were applied. Differences in estimates at <30- and <40-nmol/L thresholds, but not at the <50-nmol/L threshold, were significant (P < 0.05). A reanalysis of all serums by using LC–tandem MS confirmed prevalence estimates as 11.2%, 27.2%, and 45.0%, respectively. Prevalences of serum 25(OH)D concentrations >125 nmol/L were 1.2%, 0.3%, and 0.6% by means of ELISA, VDSP protocols, and LC–tandem MS, respectively. Conclusion: VDSP protocols hold a major potential for national nutrition and health surveys in terms of the standardization of serum 25(OH)D data. PMID:23615829

  13. A secure distributed logistic regression protocol for the detection of rare adverse drug events.

    PubMed

    El Emam, Khaled; Samet, Saeed; Arbuckle, Luk; Tamblyn, Robyn; Earle, Craig; Kantarcioglu, Murat

    2013-05-01

    There is limited capacity to assess the comparative risks of medications after they enter the market. For rare adverse events, the pooling of data from multiple sources is necessary to have the power and sufficient population heterogeneity to detect differences in safety and effectiveness in genetic, ethnic and clinically defined subpopulations. However, combining datasets from different data custodians or jurisdictions to perform an analysis on the pooled data creates significant privacy concerns that would need to be addressed. Existing protocols for addressing these concerns can result in reduced analysis accuracy and can allow sensitive information to leak. To develop a secure distributed multi-party computation protocol for logistic regression that provides strong privacy guarantees. We developed a secure distributed logistic regression protocol using a single analysis center with multiple sites providing data. A theoretical security analysis demonstrates that the protocol is robust to plausible collusion attacks and does not allow the parties to gain new information from the data that are exchanged among them. The computational performance and accuracy of the protocol were evaluated on simulated datasets. The computational performance scales linearly as the dataset sizes increase. The addition of sites results in an exponential growth in computation time. However, for up to five sites, the time is still short and would not affect practical applications. The model parameters are the same as the results on pooled raw data analyzed in SAS, demonstrating high model accuracy. The proposed protocol and prototype system would allow the development of logistic regression models in a secure manner without requiring the sharing of personal health information. This can alleviate one of the key barriers to the establishment of large-scale post-marketing surveillance programs. We extended the secure protocol to account for correlations among patients within sites through generalized estimating equations, and to accommodate other link functions by extending it to generalized linear models.

  14. Quantum gambling using three nonorthogonal states

    NASA Astrophysics Data System (ADS)

    Hwang, Won-Young; Matsumoto, Keiji

    2002-11-01

    We provide a quantum gambling protocol using three (symmetric) nonorthogonal states. The bias of the proposed protocol is less than that of previous ones, making it more practical. We show that the proposed scheme is secure against nonentanglement attacks. The security of the proposed scheme against entanglement attacks is shown heuristically.

  15. 78 FR 40815 - Self-Regulatory Organizations; The NASDAQ Stock Market LLC; Notice of Filing and Immediate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-08

    ... using the NASDAQ Information Exchange (``QIX'') protocol,\\7\\ (ii) Financial Information Exchange (``FIX'') trading ports,\\8\\ and (iii) ports using other trading telecommunications protocols.\\9\\ Beginning July 1... because market participants may readily adjust their order routing practices, NASDAQ believes that the...

  16. Effectiveness of a virtual intervention for primary healthcare professionals aimed at improving attitudes towards the empowerment of patients with chronic diseases: study protocol for a cluster randomized controlled trial (e-MPODERA project).

    PubMed

    González-González, Ana Isabel; Orrego, Carola; Perestelo-Perez, Lilisbeth; Bermejo-Caja, Carlos Jesús; Mora, Nuria; Koatz, Débora; Ballester, Marta; Del Pino, Tasmania; Pérez-Ramos, Jeannet; Toledo-Chavarri, Ana; Robles, Noemí; Pérez-Rivas, Francisco Javier; Ramírez-Puerta, Ana Belén; Canellas-Criado, Yolanda; Del Rey-Granado, Yolanda; Muñoz-Balsa, Marcos José; Becerril-Rojas, Beatriz; Rodríguez-Morales, David; Sánchez-Perruca, Luis; Vázquez, José Ramón; Aguirre, Armando

    2017-10-30

    Communities of practice are based on the idea that learning involves a group of people exchanging experiences and knowledge. The e-MPODERA project aims to assess the effectiveness of a virtual community of practice aimed at improving primary healthcare professional attitudes to the empowerment of patients with chronic diseases. This paper describes the protocol for a cluster randomized controlled trial. We will randomly assign 18 primary-care practices per participating region of Spain (Catalonia, Madrid and Canary Islands) to a virtual community of practice or to usual training. The primary-care practice will be the randomization unit and the primary healthcare professional will be the unit of analysis. We will need a sample of 270 primary healthcare professionals (general practitioners and nurses) and 1382 patients. We will perform randomization after professionals and patients are selected. We will ask the intervention group to participate for 12 months in a virtual community of practice based on a web 2.0 platform. We will measure the primary outcome using the Patient-Provider Orientation Scale questionnaire administered at baseline and after 12 months. Secondary outcomes will be the sociodemographic characteristics of health professionals, sociodemographic and clinical characteristics of patients, the Patient Activation Measure questionnaire for patient activation and outcomes regarding use of the virtual community of practice. We will calculate a linear mixed-effects regression to estimate the effect of participating in the virtual community of practice. This cluster randomized controlled trial will show whether a virtual intervention for primary healthcare professionals improves attitudes to the empowerment of patients with chronic diseases. ClicalTrials.gov, NCT02757781 . Registered on 25 April 2016. Protocol Version. PI15.01 22 January 2016.

  17. Practical quantum private query with better performance in resisting joint-measurement attack

    NASA Astrophysics Data System (ADS)

    Wei, Chun-Yan; Wang, Tian-Yin; Gao, Fei

    2016-04-01

    As a kind of practical protocol, quantum-key-distribution (QKD)-based quantum private queries (QPQs) have drawn lots of attention. However, joint-measurement (JM) attack poses a noticeable threat to the database security in such protocols. That is, by JM attack a malicious user can illegally elicit many more items from the database than the average amount an honest one can obtain. Taking Jacobi et al.'s protocol as an example, by JM attack a malicious user can obtain as many as 500 bits, instead of the expected 2.44 bits, from a 104-bit database in one query. It is a noticeable security flaw in theory, and would also arise in application with the development of quantum memories. To solve this problem, we propose a QPQ protocol based on a two-way QKD scheme, which behaves much better in resisting JM attack. Concretely, the user Alice cannot get more database items by conducting JM attack on the qubits because she has to send them back to Bob (the database holder) before knowing which of them should be jointly measured. Furthermore, JM attack by both Alice and Bob would be detected with certain probability, which is quite different from previous protocols. Moreover, our protocol retains the good characters of QKD-based QPQs, e.g., it is loss tolerant and robust against quantum memory attack.

  18. Suppression of work fluctuations by optimal control: An approach based on Jarzynski's equality

    NASA Astrophysics Data System (ADS)

    Xiao, Gaoyang; Gong, Jiangbin

    2014-11-01

    Understanding and manipulating work fluctuations in microscale and nanoscale systems are of both fundamental and practical interest. For example, aspects of work fluctuations will be an important factor in designing nanoscale heat engines. In this work, an optimal control approach directly exploiting Jarzynski's equality is proposed to effectively suppress the fluctuations in the work statistics, for systems (initially at thermal equilibrium) subject to a work protocol but isolated from a bath during the protocol. The control strategy is to minimize the deviations of individual values of e-β W from their ensemble average given by e-β Δ F, where W is the work, β is the inverse temperature, and Δ F is the free energy difference between two equilibrium states. It is further shown that even when the system Hamiltonian is not fully known, it is still possible to suppress work fluctuations through a feedback loop, by refining the control target function on the fly through Jarzynski's equality itself. Numerical experiments are based on linear and nonlinear parametric oscillators. Optimal control results for linear parametric oscillators are also benchmarked with early results based on shortcuts to adiabaticity.

  19. Programmatic assessment of a university-based implant training program using patient-reported outcomes.

    PubMed

    Al-Sabbagh, Mohanad; Jenkins, Diane W; de Leeuw, Reny; Nihill, Patricia; Robinson, Fonda G; Thomas, Mark V

    2014-11-01

    The University of Kentucky College of Dentistry (UKCD) established an implant training program that provides training in the use of a single implant system, evidence-based diagnostic and treatment protocols (standardized work practices), and a total quality management system (Implant Quality Assurance Program). The aim of this study was to assess the programmatic effectiveness of the UKCD implant training program by reporting the success and survival of implants placed, using patient-reported outcomes and comparing them to previously established benchmarks. A total of 415 patients (963 implants) were interviewed, approximately 50 percent of all qualified patients. The implant survival rate was 97 percent, and 88 percent of the implants were considered successful (as determined by patient-centric criteria). These outcomes were consistent with the program's previously established benchmarks of 90 percent. These results suggest that work standardization (in the form of specific treatment protocols) and the use of a formal, incremental learning system can result in positive patient outcomes. Clinical outcomes should be monitored in academic dental settings as part of clinical process improvement, and these outcomes can provide a means of assessing the effectiveness of the training program.

  20. Peri-procedural protocols for interventional pain management techniques: a survey of US pain centers.

    PubMed

    Ahmed, Shihab U; Tonidandel, William; Trella, Jason; Martin, Nicole M; Chang, Yuchiao

    2005-04-01

    Interventional techniques are now an integral part of chronic pain management. As new procedures are arising at a rapid pace, decisions regarding patient safety and comfort are becoming more challenging. No peri-procedural consensus protocol currently addresses issues such as 1. nulla per os (NPO) status, 2. sedation, 3. monitoring, or 4. recovery. In establishing safety guidelines for interventional pain procedures, the knowledge of current peri-procedural protocols is required. To survey interventional pain practices and to obtain current peri-procedural protocols. We faxed a one-page questionnaire to 105 United States pain practices identified using the directory of the American Pain Society. Fifty-seven academic and private pain practices (54%) responded and were included in the analysis. Monitoring devices such as electrocardiogram (EKG), blood pressure, and pulse oximetry are not universally employed for cervical or lumbar spinal procedures. Even procedures that are often performed by anesthesiologists in operating rooms, such as Bier blocks, are not monitored in a uniform manner when performed in pain clinics. Establishment of intravenous access for procedures also varies among practitioners. Most (72%) practices had treated patients with vasovagal reactions over the past 12 months, but only 42% had simulated cardiac arrests to prepare for these situations. While various trends in peri-procedural care are observable, standards of care are not well established. In order to minimize complications associated with interventional pain management techniques, the pain management community should agree on safety guidelines for all procedures, much as these advocated by the American Society of Anesthesiology for surgical anesthetic care.

  1. Protocol: the effect of 12 weeks of Tai Chi practice on anxiety in healthy but stressed people compared to exercise and wait-list comparison groups: a randomized controlled trial.

    PubMed

    Zheng, Shuai; Lal, Sara; Meier, Peter; Sibbritt, David; Zaslawski, Chris

    2014-06-01

    Stress is a major problem in today's fast-paced society and can lead to serious psychosomatic complications. The ancient Chinese mind-body exercise of Tai Chi may provide an alternative and self-sustaining option to pharmaceutical medication for stressed individuals to improve their coping mechanisms. The protocol of this study is designed to evaluate whether Tai Chi practice is equivalent to standard exercise and whether the Tai Chi group is superior to a wait-list control group in improving stress coping levels. This study is a 6-week, three-arm, parallel, randomized, clinical trial designed to evaluate Tai Chi practice against standard exercise and a Tai Chi group against a nonactive control group over a period of 6 weeks with a 6-week follow-up. A total of 72 healthy adult participants (aged 18-60 years) who are either Tai Chi naïve or have not practiced Tai Chi in the past 12 months will be randomized into a Tai Chi group (n = 24), an exercise group (n = 24) or a wait-list group (n = 24). The primary outcome measure will be the State Trait Anxiety Inventory with secondary outcome measures being the Perceived Stress Scale 14, heart rate variability, blood pressure, Short Form 36 and a visual analog scale. The protocol is reported using the appropriate Standard Protocol Items: Recommendations for Interventional Trials (SPIRIT) items. Copyright © 2014. Published by Elsevier B.V.

  2. A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System.

    PubMed

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi

    2015-08-01

    Radio Frequency Identification (RFID) based solutions are widely used for providing many healthcare applications include patient monitoring, object traceability, drug administration system and telecare medicine information system (TMIS) etc. In order to reduce malpractices and ensure patient privacy, in 2015, Srivastava et al. proposed a hash based RFID tag authentication protocol in TMIS. Their protocol uses lightweight hash operation and synchronized secret value shared between back-end server and tag, which is more secure and efficient than other related RFID authentication protocols. Unfortunately, in this paper, we demonstrate that Srivastava et al.'s tag authentication protocol has a serious security problem in that an adversary may use the stolen/lost reader to connect to the medical back-end server that store information associated with tagged objects and this privacy damage causing the adversary could reveal medical data obtained from stolen/lost readers in a malicious way. Therefore, we propose a secure and efficient RFID tag authentication protocol to overcome security flaws and improve the system efficiency. Compared with Srivastava et al.'s protocol, the proposed protocol not only inherits the advantages of Srivastava et al.'s authentication protocol for TMIS but also provides better security with high system efficiency.

  3. Coexistence of WiFi and WiMAX Systems Based on PS-Request Protocols†

    PubMed Central

    Kim, Jongwoo; Park, Suwon; Rhee, Seung Hyong; Choi, Yong-Hoon; Chung, Young-uk; Hwang, Ho Young

    2011-01-01

    We introduce both the coexistence zone within the WiMAX frame structure and a PS-Request protocol for the coexistence of WiFi and WiMAX systems sharing a frequency band. Because we know that the PS-Request protocol has drawbacks, we propose a revised PS-Request protocol to improve the performance. Two PS-Request protocols are based on the time division operation (TDO) of WiFi system and WiMAX system to avoid the mutual interference, and use the vestigial power management (PwrMgt) bit within the Frame Control field of the frames transmitted by a WiFi AP. The performance of the revised PS-Request protocol is evaluated by computer simulation, and compared to those of the cases without a coexistence protocol and to the original PS-Request protocol. PMID:22163721

  4. EOS microdose protocol for the radiological follow-up of adolescent idiopathic scoliosis.

    PubMed

    Ilharreborde, Brice; Ferrero, Emmanuelle; Alison, Marianne; Mazda, Keyvan

    2016-02-01

    Imaging plays a key role in adolescent idiopathic scoliosis (AIS) to determine the prognosis and accordingly define the best therapeutic strategy to follow. Conventional radiographs with ionizing radiation have been associated with 1-2 % increased lifetime risk of developing cancer in children, and physicians, therefore, need a sensitive but harmless way to explore patients at risk, according to the "as low as reasonably achievable" concept. The EOS system (EOS imaging, Paris, France) is available in routine clinical use since 2007, and allows 3D reconstructions of the trunk in standing position with significant radiation reduction. With recent technical advances, further dose reduction can be obtained, but at the cost of image quality that might alter the reliability of 3D reconstructions. The aim of the present study was to analyze the reproducibility of a "microdose" protocol, and evaluate its use in clinical practice. 32 consecutive patients followed for AIS were prospectively included. Biplanar radiographs were obtained with the EOS system according to the new microdose protocol. From the microdose images obtained, three experienced operators performed 3D reconstructions, two times for each subject in a random order (total, 192 reconstructions). The intraoperator repeatability and interoperator reproducibility were evaluated, as recommended by the International Organization for Standardization, for the most clinically relevant 3D radiological parameters. The identification of the required anatomical landmarks for the "fast spine" reconstruction process was possible in all cases. None of the patients required a second acquisition for 3D analysis. Mean time for reconstruction was 5 ± 2 min. The intraoperator repeatability was better than interoperator reproducibility for all parameters, with values ranging between 3° and 8° for frontal and sagittal spinal parameters, and between 1° and 8° for pelvic measurements. The agreement was very good for all clinical measurements. No correlation was found between the BMI and the reliability of the measurements. Because children are notably more sensitive to the carcinogenic effects of ionizing radiation, judicious use of imaging methods and a search for newer technologies remain necessary. Results of the current study show that the new microdose acquisition protocol can be used in clinical practice without altering the quality of the images. Relevant clinical measurements can be made manually, but the landmarks are also visible enough to allow accurate 3D reconstructions (ICC >0.91 for all parameters). The resulting radiation exposure was 5.5 times lower than that received with the prior protocol, corresponding now to a 45-fold reduction compared to conventional radiographs, and can, therefore, almost be considered negligible.

  5. Distilling entanglement with noisy operations

    NASA Astrophysics Data System (ADS)

    Chang, Jinho; Bae, Joonwoo; Kwon, Younghun

    Entanglement distillation is a fundamental task in quantum information processing. It not only extracts entanglement out of corrupted systems but also leads to protecting systems of interest against intervention with environment. In this work, we consider a realistic scenario of entanglement distillation where noisy quantum operations are applied. In particular, the two-way distillation protocol that tolerates the highest error rate is considered. We show that among all types of noise there are only four equivalence classes according to the distillability condition. Since the four classes are connected by local unitary transformations, our results can be used to improve entanglement distillability in practice when entanglement distillation is performed in a realistic setting.

  6. Transforming care delivery through health information technology.

    PubMed

    Wheatley, Benjamin

    2013-01-01

    The slow but progressive adoption of health information technology (IT) nationwide promises to usher in a new era in health care. Electronic health record systems provide a complete patient record at the point of care and can help to alleviate some of the challenges of a fragmented delivery system, such as drug-drug interactions. Moreover, health IT promotes evidence-based practice by identifying gaps in recommended treatment and providing clinical decision-support tools. In addition, the data collected through digital records can be used to monitor patient outcomes and identify potential improvements in care protocols. Kaiser Permanente continues to advance its capability in each of these areas.

  7. The prevention access and risk taking in young people (PARTY) project protocol: a cluster randomised controlled trial of health risk screening and motivational interviewing for young people presenting to general practice.

    PubMed

    Sanci, Lena; Grabsch, Brenda; Chondros, Patty; Shiell, Alan; Pirkis, Jane; Sawyer, Susan; Hegarty, Kelsey; Patterson, Elizabeth; Cahill, Helen; Ozer, Elizabeth; Seymour, Janelle; Patton, George

    2012-06-06

    There are growing worldwide concerns about the ability of primary health care systems to manage the major burden of illness in young people. Over two thirds of premature adult deaths result from risks that manifest in adolescence, including injury, neuropsychiatric problems and consequences of risky behaviours. One policy response is to better reorientate primary health services towards prevention and early intervention. Currently, however, there is insufficient evidence to support this recommendation for young people. This paper describes the design and implementation of a trial testing an intervention to promote psychosocial risk screening of all young people attending general practice and to respond to identified risks using motivational interviewing. clinicians' detection of risk-taking and emotional distress, young people's intention to change and reduction of risk taking. pathways to care, trust in the clinician and likelihood of returning for future visits. The design of the economic and process evaluation are not detailed in this protocol. PARTY is a cluster randomised trial recruiting 42 general practices in Victoria, Australia. Baseline measures include: youth friendly practice characteristics; practice staff's self-perceived competency in young people's care and clinicians' detection and response to risk taking behaviours and emotional distress in 14-24 year olds, attending the practice. Practices are then stratified by a social disadvantage index and billing methods and randomised. Intervention practices receive: nine hours of training and tools; feedback of their baseline data and two practice visits over six weeks. Comparison practices receive a three hour seminar in youth friendly practice only. Six weeks post-intervention, 30 consecutive young people are interviewed post-consultation from each practice and followed-up for self-reported risk taking behaviour and emotional distress three and 12 months post consultation. The PARTY trial is the first to examine the effectiveness and efficiency of a psychosocial risk screening and counselling intervention for young people attending primary care. It will provide important data on health risk profiles of young people attending general practice and on the effects of the intervention on engagement with primary care and health outcomes over 12 months. ISRCTN16059206.

  8. The prevention access and risk taking in young people (PARTY) project protocol: A cluster randomised controlled trial of health risk screening and motivational interviewing for young people presenting to general practice

    PubMed Central

    2012-01-01

    Background There are growing worldwide concerns about the ability of primary health care systems to manage the major burden of illness in young people. Over two thirds of premature adult deaths result from risks that manifest in adolescence, including injury, neuropsychiatric problems and consequences of risky behaviours. One policy response is to better reorientate primary health services towards prevention and early intervention. Currently, however, there is insufficient evidence to support this recommendation for young people. This paper describes the design and implementation of a trial testing an intervention to promote psychosocial risk screening of all young people attending general practice and to respond to identified risks using motivational interviewing. Main outcomes: clinicians’ detection of risk-taking and emotional distress, young people’s intention to change and reduction of risk taking. Secondary outcomes: pathways to care, trust in the clinician and likelihood of returning for future visits. The design of the economic and process evaluation are not detailed in this protocol. Methods PARTY is a cluster randomised trial recruiting 42 general practices in Victoria, Australia. Baseline measures include: youth friendly practice characteristics; practice staff’s self-perceived competency in young people’s care and clinicians’ detection and response to risk taking behaviours and emotional distress in 14–24 year olds, attending the practice. Practices are then stratified by a social disadvantage index and billing methods and randomised. Intervention practices receive: nine hours of training and tools; feedback of their baseline data and two practice visits over six weeks. Comparison practices receive a three hour seminar in youth friendly practice only. Six weeks post-intervention, 30 consecutive young people are interviewed post-consultation from each practice and followed-up for self-reported risk taking behaviour and emotional distress three and 12 months post consultation. Discussion The PARTY trial is the first to examine the effectiveness and efficiency of a psychosocial risk screening and counselling intervention for young people attending primary care. It will provide important data on health risk profiles of young people attending general practice and on the effects of the intervention on engagement with primary care and health outcomes over 12 months. Trial registration ISRCTN16059206 PMID:22672481

  9. Primary care Identification and Referral to Improve Safety of women experiencing domestic violence (IRIS): protocol for a pragmatic cluster randomised controlled trial

    PubMed Central

    2010-01-01

    Background Domestic violence, which may be psychological, physical, sexual, financial or emotional, is a major public health problem due to the long-term health consequences for women who have experienced it and for their children who witness it. In populations of women attending general practice, the prevalence of physical or sexual abuse in the past year from a partner or ex-partner ranges from 6 to 23%, and lifetime prevalence from 21 to 55%. Domestic violence is particularly important in general practice because women have many contacts with primary care clinicians and because women experiencing abuse identify doctors and nurses as professionals from whom they would like to get support. Yet health professionals rarely ask about domestic violence and have little or no training in how to respond to disclosure of abuse. Methods/Design This protocol describes IRIS, a pragmatic cluster randomised controlled trial with the general practice as unit of randomisation. Our trial tests the effectiveness and cost-effectiveness of a training and support programme targeted at general practice teams. The primary outcome is referral of women to specialist domestic violence agencies. Forty-eight practices in two UK cities (Bristol and London) are randomly allocated, using minimisation, into intervention and control groups. The intervention, based on an adult learning model in an educational outreach framework, has been designed to address barriers to asking women about domestic violence and to encourage appropriate responses to disclosure and referral to specialist domestic violence agencies. Multidisciplinary training sessions are held with clinicians and administrative staff in each of the intervention practices, with periodic feedback of identification and referral data to practice teams. Intervention practices have a prompt to ask about abuse integrated in the electronic medical record system. Other components of the intervention include an IRIS champion in each practice and a direct referral pathway to a named domestic violence advocate. Discussion This is the first European randomised controlled trial of an intervention to improve the health care response to domestic violence. The findings will have the potential to inform training and service provision. Trial registration ISRCTN74012786 PMID:20122266

  10. Ilaj bil hijamah (cupping therapy) in the Unani system of medicine: anecdotal practice to evidence based therapy.

    PubMed

    Abbas Zaidi, S M; Jameel, S S; Jafri, Kehkashan; Khan, Shariq A; Ahmad, Ehsan

    2016-08-01

    Cupping (Hijamah) therapy is very well documented as a result of several thousand years of clinical experiences in Unani medicine. In this procedure, suction is created by various means either with or without bloodletting. Though this therapy is being widely practiced across the globe for treating many chronic and intractable ailments but many reports reveal its unscientific and improper practices which results in many complications. Therefore to develop standard operative procedures and to propose protocols of cupping therapy in various diseases is the need of hour. A thorough literature review of relevant journals and textbooks was performed to gather the maximum available data on cupping therapy. This paper seeks to introduce the general concepts of cupping therapy in Unani medicine and other traditional systems of medicine, shortcomings and limitations of the currently published studies and suggest ways to improve these technical/methodological flaws. In addition, the authors have also attempted to provide the cupping related materials, hypotheses, observations which will provide the researchers the base for evaluating their usefulness in future clinical trials.

  11. Reading for Understanding: Methodist Youths' Shared Scripture-Reading Practices

    ERIC Educational Resources Information Center

    Rackley, Eric D.

    2018-01-01

    Informed by reading comprehension and comprehension strategies research, this study explores the Scripture-reading practices of four Methodist youths. Several rounds of inductive thematic analyses of Scripture-reading protocols revealed a set of five strategic reading practices youths used to understand Scripture. They drew inferences about the…

  12. School Indoor Air Quality Best Management Practices Manual.

    ERIC Educational Resources Information Center

    Hall, Richard; Ellis, Richard; Hardin, Tim

    This manual, written in response to requirements of the Washington State legislature, focuses on practices which can be undertaken during the siting, design, construction, or renovation of a school, recommends practices to help ensure good indoor air quality during building occupancy, and suggests protocols and useful reference documents for…

  13. Comparing a Mobile Decision Support System Versus the Use of Printed Materials for the Implementation of an Evidence-Based Recommendation: Protocol for a Qualitative Evaluation.

    PubMed

    Camacho, Jhon; Medina Ch, Ana María; Landis-Lewis, Zach; Douglas, Gerald; Boyce, Richard

    2018-04-13

    The distribution of printed materials is the most frequently used strategy to disseminate and implement clinical practice guidelines, although several studies have shown that the effectiveness of this approach is modest at best. Nevertheless, there is insufficient evidence to support the use of other strategies. Recent research has shown that the use of computerized decision support presents a promising approach to address some aspects of this problem. The aim of this study is to provide qualitative evidence on the potential effect of mobile decision support systems to facilitate the implementation of evidence-based recommendations included in clinical practice guidelines. We will conduct a qualitative study with two arms to compare the experience of primary care physicians while they try to implement an evidence-based recommendation in their clinical practice. In the first arm, we will provide participants with a printout of the guideline article containing the recommendation, while in the second arm, we will provide participants with a mobile app developed after formalizing the recommendation text into a clinical algorithm. Data will be collected using semistructured and open interviews to explore aspects of behavioral change and technology acceptance involved in the implementation process. The analysis will be comprised of two phases. During the first phase, we will conduct a template analysis to identify barriers and facilitators in each scenario. Then, during the second phase, we will contrast the findings from each arm to propose hypotheses about the potential impact of the system. We have formalized the narrative in the recommendation into a clinical algorithm and have developed a mobile app. Data collection is expected to occur during 2018, with the first phase of analysis running in parallel. The second phase is scheduled to conclude in July 2019. Our study will further the understanding of the role of mobile decision support systems in the implementation of clinical practice guidelines. Furthermore, we will provide qualitative evidence to aid decisions made by low- and middle-income countries' ministries of health about investments in these technologies. ©Jhon Camacho, Ana María Medina Ch, Zach Landis-Lewis, Gerald Douglas, Richard Boyce. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 13.04.2018.

  14. Experimental Measurement-Device-Independent Quantum Key Distribution

    NASA Astrophysics Data System (ADS)

    Liu, Yang; Chen, Teng-Yun; Wang, Liu-Jun; Liang, Hao; Shentu, Guo-Liang; Wang, Jian; Cui, Ke; Yin, Hua-Lei; Liu, Nai-Le; Li, Li; Ma, Xiongfeng; Pelc, Jason S.; Fejer, M. M.; Peng, Cheng-Zhi; Zhang, Qiang; Pan, Jian-Wei

    2013-09-01

    Quantum key distribution is proven to offer unconditional security in communication between two remote users with ideal source and detection. Unfortunately, ideal devices never exist in practice and device imperfections have become the targets of various attacks. By developing up-conversion single-photon detectors with high efficiency and low noise, we faithfully demonstrate the measurement-device-independent quantum-key-distribution protocol, which is immune to all hacking strategies on detection. Meanwhile, we employ the decoy-state method to defend attacks on a nonideal source. By assuming a trusted source scenario, our practical system, which generates more than a 25 kbit secure key over a 50 km fiber link, serves as a stepping stone in the quest for unconditionally secure communications with realistic devices.

  15. Experimental measurement-device-independent quantum key distribution.

    PubMed

    Liu, Yang; Chen, Teng-Yun; Wang, Liu-Jun; Liang, Hao; Shentu, Guo-Liang; Wang, Jian; Cui, Ke; Yin, Hua-Lei; Liu, Nai-Le; Li, Li; Ma, Xiongfeng; Pelc, Jason S; Fejer, M M; Peng, Cheng-Zhi; Zhang, Qiang; Pan, Jian-Wei

    2013-09-27

    Quantum key distribution is proven to offer unconditional security in communication between two remote users with ideal source and detection. Unfortunately, ideal devices never exist in practice and device imperfections have become the targets of various attacks. By developing up-conversion single-photon detectors with high efficiency and low noise, we faithfully demonstrate the measurement-device-independent quantum-key-distribution protocol, which is immune to all hacking strategies on detection. Meanwhile, we employ the decoy-state method to defend attacks on a nonideal source. By assuming a trusted source scenario, our practical system, which generates more than a 25 kbit secure key over a 50 km fiber link, serves as a stepping stone in the quest for unconditionally secure communications with realistic devices.

  16. Phase-Reference-Free Experiment of Measurement-Device-Independent Quantum Key Distribution

    NASA Astrophysics Data System (ADS)

    Wang, Chao; Song, Xiao-Tian; Yin, Zhen-Qiang; Wang, Shuang; Chen, Wei; Zhang, Chun-Mei; Guo, Guang-Can; Han, Zheng-Fu

    2015-10-01

    Measurement-device-independent quantum key distribution (MDI QKD) is a substantial step toward practical information-theoretic security for key sharing between remote legitimate users (Alice and Bob). As with other standard device-dependent quantum key distribution protocols, such as BB84, MDI QKD assumes that the reference frames have been shared between Alice and Bob. In practice, a nontrivial alignment procedure is often necessary, which requires system resources and may significantly reduce the secure key generation rate. Here, we propose a phase-coding reference-frame-independent MDI QKD scheme that requires no phase alignment between the interferometers of two distant legitimate parties. As a demonstration, a proof-of-principle experiment using Faraday-Michelson interferometers is presented. The experimental system worked at 1 MHz, and an average secure key rate of 8.309 bps was obtained at a fiber length of 20 km between Alice and Bob. The system can maintain a positive key generation rate without phase compensation under normal conditions. The results exhibit the feasibility of our system for use in mature MDI QKD devices and its value for network scenarios.

  17. Clinical Strategies for Integrating Medication Interventions Into Behavioral Treatment for Adolescent ADHD: The Medication Integration Protocol

    PubMed Central

    Hogue, Aaron; Bobek, Molly; Tau, Gregory Z.; Levin, Frances R.

    2014-01-01

    Attention-Deficit/Hyperactivity Disorder (ADHD) is highly prevalent among adolescents enrolled in behavioral health services but remains undertreated in this age group. Also the first-line treatment for adolescent ADHD, stimulant medication, is underutilized in routine practice. This article briefly describes three behavioral interventions designed to promote stronger integration of medication interventions into treatment planning for adolescent ADHD: family ADHD psychoeducation, family-based medication decision-making, and behavior therapist leadership in coordinating medication integration. It then introduces the Medication Integration Protocol (MIP), which incorporates all three interventions into a five-task protocol: ADHD Assessment and Medication Consult; ADHD Psychoeducation and Client Acceptance; ADHD Symptoms and Family Relations; ADHD Medication and Family Decision-Making; and Medication Management and Integration Planning. The article concludes by highlighting what behavior therapists should know about best practices for medication integration across diverse settings and populations: integrating medication interventions into primary care, managing medication priorities and polypharmacy issues for adolescents with multiple diagnoses, providing ADHD medications to adolescent substance users, and the compatibility of MIP intervention strategies with everyday practice conditions. PMID:25505817

  18. Clinical Strategies for Integrating Medication Interventions Into Behavioral Treatment for Adolescent ADHD: The Medication Integration Protocol.

    PubMed

    Hogue, Aaron; Bobek, Molly; Tau, Gregory Z; Levin, Frances R

    2014-10-01

    Attention-Deficit/Hyperactivity Disorder (ADHD) is highly prevalent among adolescents enrolled in behavioral health services but remains undertreated in this age group. Also the first-line treatment for adolescent ADHD, stimulant medication, is underutilized in routine practice. This article briefly describes three behavioral interventions designed to promote stronger integration of medication interventions into treatment planning for adolescent ADHD: family ADHD psychoeducation, family-based medication decision-making, and behavior therapist leadership in coordinating medication integration. It then introduces the Medication Integration Protocol (MIP), which incorporates all three interventions into a five-task protocol: ADHD Assessment and Medication Consult; ADHD Psychoeducation and Client Acceptance; ADHD Symptoms and Family Relations; ADHD Medication and Family Decision-Making; and Medication Management and Integration Planning. The article concludes by highlighting what behavior therapists should know about best practices for medication integration across diverse settings and populations: integrating medication interventions into primary care, managing medication priorities and polypharmacy issues for adolescents with multiple diagnoses, providing ADHD medications to adolescent substance users, and the compatibility of MIP intervention strategies with everyday practice conditions.

  19. Intersession consistency of single-trial classification of the prefrontal response to mental arithmetic and the no-control state by NIRS.

    PubMed

    Power, Sarah D; Kushki, Azadeh; Chau, Tom

    2012-01-01

    Near-infrared spectroscopy (NIRS) has been recently investigated for use in noninvasive brain-computer interface (BCI) technologies. Previous studies have demonstrated the ability to classify patterns of neural activation associated with different mental tasks (e.g., mental arithmetic) using NIRS signals. Though these studies represent an important step towards the realization of an NIRS-BCI, there is a paucity of literature regarding the consistency of these responses, and the ability to classify them on a single-trial basis, over multiple sessions. This is important when moving out of an experimental context toward a practical system, where performance must be maintained over longer periods. When considering response consistency across sessions, two questions arise: 1) can the hemodynamic response to the activation task be distinguished from a baseline (or other task) condition, consistently across sessions, and if so, 2) are the spatiotemporal characteristics of the response which best distinguish it from the baseline (or other task) condition consistent across sessions. The answers will have implications for the viability of an NIRS-BCI system, and the design strategies (especially in terms of classifier training protocols) adopted. In this study, we investigated the consistency of classification of a mental arithmetic task and a no-control condition over five experimental sessions. Mixed model linear regression on intrasession classification accuracies indicate that the task and baseline states remain differentiable across multiple sessions, with no significant decrease in accuracy (p = 0.67). Intersession analysis, however, revealed inconsistencies in spatiotemporal response characteristics. Based on these results, we investigated several different practical classifier training protocols, including scenarios in which the training and test data come from 1) different sessions, 2) the same session, and 3) a combination of both. Results indicate that when selecting optimal classifier training protocols for NIRS-BCI, a compromise between accuracy and convenience (e.g., in terms of duration/frequency of training data collection) must be considered.

  20. Software-codec-based full motion video conferencing on the PC using visual pattern image sequence coding

    NASA Astrophysics Data System (ADS)

    Barnett, Barry S.; Bovik, Alan C.

    1995-04-01

    This paper presents a real time full motion video conferencing system based on the Visual Pattern Image Sequence Coding (VPISC) software codec. The prototype system hardware is comprised of two personal computers, two camcorders, two frame grabbers, and an ethernet connection. The prototype system software has a simple structure. It runs under the Disk Operating System, and includes a user interface, a video I/O interface, an event driven network interface, and a free running or frame synchronous video codec that also acts as the controller for the video and network interfaces. Two video coders have been tested in this system. Simple implementations of Visual Pattern Image Coding and VPISC have both proven to support full motion video conferencing with good visual quality. Future work will concentrate on expanding this prototype to support the motion compensated version of VPISC, as well as encompassing point-to-point modem I/O and multiple network protocols. The application will be ported to multiple hardware platforms and operating systems. The motivation for developing this prototype system is to demonstrate the practicality of software based real time video codecs. Furthermore, software video codecs are not only cheaper, but are more flexible system solutions because they enable different computer platforms to exchange encoded video information without requiring on-board protocol compatible video codex hardware. Software based solutions enable true low cost video conferencing that fits the `open systems' model of interoperability that is so important for building portable hardware and software applications.

  1. BCI2000: a general-purpose brain-computer interface (BCI) system.

    PubMed

    Schalk, Gerwin; McFarland, Dennis J; Hinterberger, Thilo; Birbaumer, Niels; Wolpaw, Jonathan R

    2004-06-01

    Many laboratories have begun to develop brain-computer interface (BCI) systems that provide communication and control capabilities to people with severe motor disabilities. Further progress and realization of practical applications depends on systematic evaluations and comparisons of different brain signals, recording methods, processing algorithms, output formats, and operating protocols. However, the typical BCI system is designed specifically for one particular BCI method and is, therefore, not suited to the systematic studies that are essential for continued progress. In response to this problem, we have developed a documented general-purpose BCI research and development platform called BCI2000. BCI2000 can incorporate alone or in combination any brain signals, signal processing methods, output devices, and operating protocols. This report is intended to describe to investigators, biomedical engineers, and computer scientists the concepts that the BC12000 system is based upon and gives examples of successful BCI implementations using this system. To date, we have used BCI2000 to create BCI systems for a variety of brain signals, processing methods, and applications. The data show that these systems function well in online operation and that BCI2000 satisfies the stringent real-time requirements of BCI systems. By substantially reducing labor and cost, BCI2000 facilitates the implementation of different BCI systems and other psychophysiological experiments. It is available with full documentation and free of charge for research or educational purposes and is currently being used in a variety of studies by many research groups.

  2. A metadata reporting framework (FRAMES) for synthesis of ecohydrological observations

    DOE PAGES

    Christianson, Danielle S.; Varadharajan, Charuleka; Christoffersen, Bradley; ...

    2017-06-20

    Metadata describe the ancillary information needed for data interpretation, comparison across heterogeneous datasets, and quality control and quality assessment (QA/QC). Metadata enable the synthesis of diverse ecohydrological and biogeochemical observations, an essential step in advancing a predictive understanding of earth systems. Environmental observations can be taken across a wide range of spatiotemporal scales in a variety of measurement settings and approaches, and saved in multiple formats. Thus, well-organized, consistent metadata are required to produce usable data products from diverse observations collected in disparate field sites. However, existing metadata reporting protocols do not support the complex data synthesis needs of interdisciplinarymore » earth system research. We developed a metadata reporting framework (FRAMES) to enable predictive understanding of carbon cycling in tropical forests under global change. FRAMES adheres to best practices for data and metadata organization, enabling consistent data reporting and thus compatibility with a variety of standardized data protocols. We used an iterative scientist-centered design process to develop FRAMES. The resulting modular organization streamlines metadata reporting and can be expanded to incorporate additional data types. The flexible data reporting format incorporates existing field practices to maximize data-entry efficiency. With FRAMES’s multi-scale measurement position hierarchy, data can be reported at observed spatial resolutions and then easily aggregated and linked across measurement types to support model-data integration. FRAMES is in early use by both data providers and users. Here in this article, we describe FRAMES, identify lessons learned, and discuss areas of future development.« less

  3. Approximate Model Checking of PCTL Involving Unbounded Path Properties

    NASA Astrophysics Data System (ADS)

    Basu, Samik; Ghosh, Arka P.; He, Ru

    We study the problem of applying statistical methods for approximate model checking of probabilistic systems against properties encoded as PCTL formulas. Such approximate methods have been proposed primarily to deal with state-space explosion that makes the exact model checking by numerical methods practically infeasible for large systems. However, the existing statistical methods either consider a restricted subset of PCTL, specifically, the subset that can only express bounded until properties; or rely on user-specified finite bound on the sample path length. We propose a new method that does not have such restrictions and can be effectively used to reason about unbounded until properties. We approximate probabilistic characteristics of an unbounded until property by that of a bounded until property for a suitably chosen value of the bound. In essence, our method is a two-phase process: (a) the first phase is concerned with identifying the bound k 0; (b) the second phase computes the probability of satisfying the k 0-bounded until property as an estimate for the probability of satisfying the corresponding unbounded until property. In both phases, it is sufficient to verify bounded until properties which can be effectively done using existing statistical techniques. We prove the correctness of our technique and present its prototype implementations. We empirically show the practical applicability of our method by considering different case studies including a simple infinite-state model, and large finite-state models such as IPv4 zeroconf protocol and dining philosopher protocol modeled as Discrete Time Markov chains.

  4. A metadata reporting framework (FRAMES) for synthesis of ecohydrological observations

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Christianson, Danielle S.; Varadharajan, Charuleka; Christoffersen, Bradley

    Metadata describe the ancillary information needed for data interpretation, comparison across heterogeneous datasets, and quality control and quality assessment (QA/QC). Metadata enable the synthesis of diverse ecohydrological and biogeochemical observations, an essential step in advancing a predictive understanding of earth systems. Environmental observations can be taken across a wide range of spatiotemporal scales in a variety of measurement settings and approaches, and saved in multiple formats. Thus, well-organized, consistent metadata are required to produce usable data products from diverse observations collected in disparate field sites. However, existing metadata reporting protocols do not support the complex data synthesis needs of interdisciplinarymore » earth system research. We developed a metadata reporting framework (FRAMES) to enable predictive understanding of carbon cycling in tropical forests under global change. FRAMES adheres to best practices for data and metadata organization, enabling consistent data reporting and thus compatibility with a variety of standardized data protocols. We used an iterative scientist-centered design process to develop FRAMES. The resulting modular organization streamlines metadata reporting and can be expanded to incorporate additional data types. The flexible data reporting format incorporates existing field practices to maximize data-entry efficiency. With FRAMES’s multi-scale measurement position hierarchy, data can be reported at observed spatial resolutions and then easily aggregated and linked across measurement types to support model-data integration. FRAMES is in early use by both data providers and users. Here in this article, we describe FRAMES, identify lessons learned, and discuss areas of future development.« less

  5. Finite-time containment control of perturbed multi-agent systems based on sliding-mode control

    NASA Astrophysics Data System (ADS)

    Yu, Di; Ji, Xiang Yang

    2018-01-01

    Aimed at faster convergence rate, this paper investigates finite-time containment control problem for second-order multi-agent systems with norm-bounded non-linear perturbation. When topology between the followers are strongly connected, the nonsingular fast terminal sliding-mode error is defined, corresponding discontinuous control protocol is designed and the appropriate value range of control parameter is obtained by applying finite-time stability analysis, so that the followers converge to and move along the desired trajectories within the convex hull formed by the leaders in finite time. Furthermore, on the basis of the sliding-mode error defined, the corresponding distributed continuous control protocols are investigated with fast exponential reaching law and double exponential reaching law, so as to make the followers move to the small neighbourhoods of their desired locations and keep within the dynamic convex hull formed by the leaders in finite time to achieve practical finite-time containment control. Meanwhile, we develop the faster control scheme according to comparison of the convergence rate of these two different reaching laws. Simulation examples are given to verify the correctness of theoretical results.

  6. Standardisation of neonatal clinical practice.

    PubMed

    Bhutta, Z A; Giuliani, F; Haroon, A; Knight, H E; Albernaz, E; Batra, M; Bhat, B; Bertino, E; McCormick, K; Ochieng, R; Rajan, V; Ruyan, P; Cheikh Ismail, L; Paul, V

    2013-09-01

    The International Fetal and Newborn Growth Consortium for the 21(st) Century (INTERGROWTH-21(st) ) is a large-scale, population-based, multicentre project involving health institutions from eight geographically diverse countries, which aims to assess fetal, newborn and preterm growth under optimal conditions. Given the multicentre nature of the project and the expected number of preterm births, it is vital that all centres follow the same standardised clinical care protocols to assess and manage preterm infants, so as to ensure maximum validity of the resulting standards as indicators of growth and nutrition with minimal confounding. Moreover, it is well known that evidence-based clinical practice guidelines can reduce the delivery of inappropriate care and support the introduction of new knowledge into clinical practice. The INTERGROWTH-21(st) Neonatal Group produced an operations manual, which reflects the consensus reached by members of the group regarding standardised definitions of neonatal morbidities and the minimum standards of care to be provided by all centres taking part in the project. The operational definitions and summary management protocols were developed by consensus through a Delphi process based on systematic reviews of relevant guidelines and management protocols by authoritative bodies. This paper describes the process of developing the Basic Neonatal Care Manual, as well as the morbidity definitions and standardised neonatal care protocols applied across all the INTERGROWTH-21(st) participating centres. Finally, thoughts about implementation strategies are presented. © 2013 Royal College of Obstetricians and Gynaecologists.

  7. Automatic control of pressure support for ventilator weaning in surgical intensive care patients.

    PubMed

    Schädler, Dirk; Engel, Christoph; Elke, Gunnar; Pulletz, Sven; Haake, Nils; Frerichs, Inéz; Zick, Günther; Scholz, Jens; Weiler, Norbert

    2012-03-15

    Despite its ability to reduce overall ventilation time, protocol-guided weaning from mechanical ventilation is not routinely used in daily clinical practice. Clinical implementation of weaning protocols could be facilitated by integration of knowledge-based, closed-loop controlled protocols into respirators. To determine whether automated weaning decreases overall ventilation time compared with weaning based on a standardized written protocol in an unselected surgical patient population. In this prospective controlled trial patients ventilated for longer than 9 hours were randomly allocated to receive either weaning with automatic control of pressure support ventilation (automated-weaning group) or weaning based on a standardized written protocol (control group) using the same ventilation mode. The primary end point of the study was overall ventilation time. Overall ventilation time (median [25th and 75th percentile]) did not significantly differ between the automated-weaning (31 [19-101] h; n = 150) and control groups (39 [20-118] h; n = 150; P = 0.178). Patients who underwent cardiac surgery (n = 132) exhibited significantly shorter overall ventilation times in the automated-weaning (24 [18-57] h) than in the control group (35 [20-93] h; P = 0.035). The automated-weaning group exhibited shorter ventilation times until the first spontaneous breathing trial (1 [0-15] vs. 9 [1-51] h; P = 0.001) and a trend toward fewer tracheostomies (17 vs. 28; P = 0.075). Overall ventilation times did not significantly differ between weaning using automatic control of pressure support ventilation and weaning based on a standardized written protocol. Patients after cardiac surgery may benefit from automated weaning. Implementation of additional control variables besides the level of pressure support may further improve automated-weaning systems. Clinical trial registered with www.clinicaltrials.gov (NCT 00445289).

  8. Fundamental rate-loss trade-off for the quantum internet

    NASA Astrophysics Data System (ADS)

    Azuma, Koji; Mizutani, Akihiro; Lo, Hoi-Kwong

    2016-11-01

    The quantum internet holds promise for achieving quantum communication--such as quantum teleportation and quantum key distribution (QKD)--freely between any clients all over the globe, as well as for the simulation of the evolution of quantum many-body systems. The most primitive function of the quantum internet is to provide quantum entanglement or a secret key to two points efficiently, by using intermediate nodes connected by optical channels with each other. Here we derive a fundamental rate-loss trade-off for a quantum internet protocol, by generalizing the Takeoka-Guha-Wilde bound to be applicable to any network topology. This trade-off has essentially no scaling gap with the quantum communication efficiencies of protocols known to be indispensable to long-distance quantum communication, such as intercity QKD and quantum repeaters. Our result--putting a practical but general limitation on the quantum internet--enables us to grasp the potential of the future quantum internet.

  9. Riding the dragon: enhancing resilient leadership and sensible self-care in the healthcare executive.

    PubMed

    Wicks, Robert J; Buck, Tina C

    2013-01-01

    With challenges in the healthcare system growing, strengthened leader and organizational resilience is often overlooked as a factor that can support staff morale and sustain performance improvement and quality. Here we examine resilience-building practices related to self-awareness, alone time, mindfulness, and a healthy perspective. A key aspect of management resilience is weighing the costs and benefits to the executive personally and to the organization if the warning signals of impairment are left untended. To that end, we propose a leader self-care protocol, which even the busy healthcare executive can find time to undertake. Ifimplemented, the protocol will allow leaders to lessen their vulnerability to burnout and help teammates whose resilience may be stretched thin. Finally, we present healthy coping skills for daily stressors and for the sudden and overwhelming situations that can negatively affect resilience.

  10. Donation after circulatory death: burying the dead donor rule.

    PubMed

    Rodríguez-Arias, David; Smith, Maxwell J; Lazar, Neil M

    2011-08-01

    Despite continuing controversies regarding the vital status of both brain-dead donors and individuals who undergo donation after circulatory death (DCD), respecting the dead donor rule (DDR) remains the standard moral framework for organ procurement. The DDR increases organ supply without jeopardizing trust in transplantation systems, reassuring society that donors will not experience harm during organ procurement. While the assumption that individuals cannot be harmed once they are dead is reasonable in the case of brain-dead protocols, we argue that the DDR is not an acceptable strategy to protect donors from harm in DCD protocols. We propose a threefold alternative to justify organ procurement practices: (1) ensuring that donors are sufficiently protected from harm; (2) ensuring that they are respected through informed consent; and (3) ensuring that society is fully informed of the inherently debatable nature of any criterion to declare death.

  11. A novel dynamic mechanical testing technique for reverse shoulder replacements.

    PubMed

    Dabirrahmani, Danè; Bokor, Desmond; Appleyard, Richard

    2014-04-01

    In vitro mechanical testing of orthopedic implants provides information regarding their mechanical performance under simulated biomechanical conditions. Current in vitro component stability testing methods for reverse shoulder implants are based on anatomical shoulder designs, which do not capture the dynamic nature of these loads. With glenoid component loosening as one of the most prevalent modes of failure in reverse shoulder replacements, it is important to establish a testing protocol with a more realistic loading regime. This paper introduces a novel method of mechanically testing reverse shoulder implants, using more realistic load magnitudes and vectors, than is currently practiced. Using a custom made jig setup within an Instron mechanical testing system, it is possible to simulate the change in magnitude and direction of the joint load during arm abduction. This method is a step towards a more realistic testing protocol for measuring reverse shoulder implant stability.

  12. Fundamental rate-loss trade-off for the quantum internet

    PubMed Central

    Azuma, Koji; Mizutani, Akihiro; Lo, Hoi-Kwong

    2016-01-01

    The quantum internet holds promise for achieving quantum communication—such as quantum teleportation and quantum key distribution (QKD)—freely between any clients all over the globe, as well as for the simulation of the evolution of quantum many-body systems. The most primitive function of the quantum internet is to provide quantum entanglement or a secret key to two points efficiently, by using intermediate nodes connected by optical channels with each other. Here we derive a fundamental rate-loss trade-off for a quantum internet protocol, by generalizing the Takeoka–Guha–Wilde bound to be applicable to any network topology. This trade-off has essentially no scaling gap with the quantum communication efficiencies of protocols known to be indispensable to long-distance quantum communication, such as intercity QKD and quantum repeaters. Our result—putting a practical but general limitation on the quantum internet—enables us to grasp the potential of the future quantum internet. PMID:27886172

  13. Fundamental rate-loss trade-off for the quantum internet.

    PubMed

    Azuma, Koji; Mizutani, Akihiro; Lo, Hoi-Kwong

    2016-11-25

    The quantum internet holds promise for achieving quantum communication-such as quantum teleportation and quantum key distribution (QKD)-freely between any clients all over the globe, as well as for the simulation of the evolution of quantum many-body systems. The most primitive function of the quantum internet is to provide quantum entanglement or a secret key to two points efficiently, by using intermediate nodes connected by optical channels with each other. Here we derive a fundamental rate-loss trade-off for a quantum internet protocol, by generalizing the Takeoka-Guha-Wilde bound to be applicable to any network topology. This trade-off has essentially no scaling gap with the quantum communication efficiencies of protocols known to be indispensable to long-distance quantum communication, such as intercity QKD and quantum repeaters. Our result-putting a practical but general limitation on the quantum internet-enables us to grasp the potential of the future quantum internet.

  14. Experimental loss-tolerant quantum coin flipping

    PubMed Central

    Berlín, Guido; Brassard, Gilles; Bussières, Félix; Godbout, Nicolas; Slater, Joshua A.; Tittel, Wolfgang

    2011-01-01

    Coin flipping is a cryptographic primitive in which two distrustful parties wish to generate a random bit to choose between two alternatives. This task is impossible to realize when it relies solely on the asynchronous exchange of classical bits: one dishonest player has complete control over the final outcome. It is only when coin flipping is supplemented with quantum communication that this problem can be alleviated, although partial bias remains. Unfortunately, practical systems are subject to loss of quantum data, which allows a cheater to force a bias that is complete or arbitrarily close to complete in all previous protocols and implementations. Here we report on the first experimental demonstration of a quantum coin-flipping protocol for which loss cannot be exploited to cheat better. By eliminating the problem of loss, which is unavoidable in any realistic setting, quantum coin flipping takes a significant step towards real-world applications of quantum communication. PMID:22127057

  15. ASSESSMENT PROTOCOLS - DURABILITY OF PERFORMANCE OF A HOME RADON REDUCTION SYSTEM FOR SUB-SLAB DEPRESSURIZA- TION SYSTEMS

    EPA Science Inventory

    This handbook contains protocols that compare the immediate performance of subslab depressurization (SSD) mitigation system with performance months or years later. These protocols provide a methodology to test SSD radon mitigation systems in situ to determine long-term performanc...

  16. Quantum Transduction with Adaptive Control

    NASA Astrophysics Data System (ADS)

    Zhang, Mengzhen; Zou, Chang-Ling; Jiang, Liang

    2018-01-01

    Quantum transducers play a crucial role in hybrid quantum networks. A good quantum transducer can faithfully convert quantum signals from one mode to another with minimum decoherence. Most investigations of quantum transduction are based on the protocol of direct mode conversion. However, the direct protocol requires the matching condition, which in practice is not always feasible. Here we propose an adaptive protocol for quantum transducers, which can convert quantum signals without requiring the matching condition. The adaptive protocol only consists of Gaussian operations, feasible in various physical platforms. Moreover, we show that the adaptive protocol can be robust against imperfections associated with finite squeezing, thermal noise, and homodyne detection, and it can be implemented to realize quantum state transfer between microwave and optical modes.

  17. A proportional integral estimator-based clock synchronization protocol for wireless sensor networks.

    PubMed

    Yang, Wenlun; Fu, Minyue

    2017-11-01

    Clock synchronization is an issue of vital importance in applications of WSNs. This paper proposes a proportional integral estimator-based protocol (EBP) to achieve clock synchronization for wireless sensor networks. As each local clock skew gradually drifts, synchronization accuracy will decline over time. Compared with existing consensus-based approaches, the proposed synchronization protocol improves synchronization accuracy under time-varying clock skews. Moreover, by restricting synchronization error of clock skew into a relative small quantity, it could reduce periodic re-synchronization frequencies. At last, a pseudo-synchronous implementation for skew compensation is introduced as synchronous protocol is unrealistic in practice. Numerical simulations are shown to illustrate the performance of the proposed protocol. Copyright © 2017 ISA. Published by Elsevier Ltd. All rights reserved.

  18. Quantum Transduction with Adaptive Control.

    PubMed

    Zhang, Mengzhen; Zou, Chang-Ling; Jiang, Liang

    2018-01-12

    Quantum transducers play a crucial role in hybrid quantum networks. A good quantum transducer can faithfully convert quantum signals from one mode to another with minimum decoherence. Most investigations of quantum transduction are based on the protocol of direct mode conversion. However, the direct protocol requires the matching condition, which in practice is not always feasible. Here we propose an adaptive protocol for quantum transducers, which can convert quantum signals without requiring the matching condition. The adaptive protocol only consists of Gaussian operations, feasible in various physical platforms. Moreover, we show that the adaptive protocol can be robust against imperfections associated with finite squeezing, thermal noise, and homodyne detection, and it can be implemented to realize quantum state transfer between microwave and optical modes.

  19. Establishing rational networking using the DL04 quantum secure direct communication protocol

    NASA Astrophysics Data System (ADS)

    Qin, Huawang; Tang, Wallace K. S.; Tso, Raylin

    2018-06-01

    The first rational quantum secure direct communication scheme is proposed, in which we use the game theory with incomplete information to model the rational behavior of the participant, and give the strategy space and utility function. The rational participant can get his maximal utility when he performs the protocol faithfully, and then the Nash equilibrium of the protocol can be achieved. Compared to the traditional schemes, our scheme will be more practical in the presence of rational participant.

  20. Goal-setting protocol in adherence to exercise by Italian adults.

    PubMed

    Annesi, James J

    2002-04-01

    A goal-setting protocol, based on research in goal setting and performance and personal construct theory, was tested for its effect on adherence to a new exercise program. The Goal-setting group (n = 50) had significantly less dropout (30%) than the control group (n = 50) (74%). The Goal-setting group also had significantly better attendance (p<.0001). Suggestions for increasing confidence in findings through further research and practical implications of using the protocol to improve exercise maintenance across settings were discussed.

  1. Hydrogen Hazards Assessment Protocol (HHAP): Approach and Methodology

    NASA Technical Reports Server (NTRS)

    Woods, Stephen

    2009-01-01

    This viewgraph presentation reviews the approach and methodology to develop a assessment protocol for hydrogen hazards. Included in the presentation are the reasons to perform hazards assessment, the types of hazard assessments that exist, an analysis of hydrogen hazards, specific information about the Hydrogen Hazards Assessment Protocol (HHAP). The assessment is specifically tailored for hydrogen behavior. The end product of the assesment is a compilation of hazard, mitigations and associated factors to facilitate decision making and achieve the best practice.

  2. Elective ventilation for organ donation: law, policy and public ethics.

    PubMed

    Coggon, John

    2013-03-01

    This paper examines questions concerning elective ventilation, contextualised within English law and policy. It presents the general debate with reference both to the Exeter Protocol on elective ventilation, and the considerable developments in legal principle since the time that that protocol was declared to be unlawful. I distinguish different aspects of what might be labelled elective ventilation policies under the following four headings: 'basic elective ventilation'; 'epistemically complex elective ventilation'; 'practically complex elective ventilation'; and 'epistemically and practically complex elective ventilation'. I give a legal analysis of each. In concluding remarks on their potential practical viability, I emphasise the importance not just of ascertaining the legal and ethical acceptability of these and other forms of elective ventilation, but also of assessing their professional and political acceptability. This importance relates both to the successful implementation of the individual practices, and to guarding against possible harmful effects in the wider efforts to increase the rates of posthumous organ donation.

  3. Survey of Usual Practice: Dysphagia Therapy in Head & Neck Cancer Patients

    PubMed Central

    Krisciunas, Gintas P.; Sokoloff, William; Stepas, Katherine; Langmore, Susan E.

    2012-01-01

    There is no standardized dysphagia therapy for head and neck cancer patients and scant evidence to support any particular protocol, leaving institutions and individual speech language pathologists (SLPs) to determine their own protocols based on “typical” practices or anecdotal evidence. To gain an understanding of current usual practices, a national internet-based survey was developed and disseminated to SLPs who treat HNC patients. From a random sample of 4,000 ASHA SID 13 members, 1,931 fit the inclusion criteria, and 759 complete responses were recorded for a 39.3% response rate. Results were analyzed by institution type as well as by individual clinical experience. While some interesting trends emerged from the data, a lack of uniformity and consensus regarding best practices was apparent. This is undoubtedly due to a paucity of research adequately addressing the efficacy of any one therapy for dysphagia in the HNC population. PMID:22456699

  4. Guest Editor's Introduction: Special section on dependable distributed systems

    NASA Astrophysics Data System (ADS)

    Fetzer, Christof

    1999-09-01

    We rely more and more on computers. For example, the Internet reshapes the way we do business. A `computer outage' can cost a company a substantial amount of money. Not only with respect to the business lost during an outage, but also with respect to the negative publicity the company receives. This is especially true for Internet companies. After recent computer outages of Internet companies, we have seen a drastic fall of the shares of the affected companies. There are multiple causes for computer outages. Although computer hardware becomes more reliable, hardware related outages remain an important issue. For example, some of the recent computer outages of companies were caused by failed memory and system boards, and even by crashed disks - a failure type which can easily be masked using disk mirroring. Transient hardware failures might also look like software failures and, hence, might be incorrectly classified as such. However, many outages are software related. Faulty system software, middleware, and application software can crash a system. Dependable computing systems are systems we can rely on. Dependable systems are, by definition, reliable, available, safe and secure [3]. This special section focuses on issues related to dependable distributed systems. Distributed systems have the potential to be more dependable than a single computer because the probability that all computers in a distributed system fail is smaller than the probability that a single computer fails. However, if a distributed system is not built well, it is potentially less dependable than a single computer since the probability that at least one computer in a distributed system fails is higher than the probability that one computer fails. For example, if the crash of any computer in a distributed system can bring the complete system to a halt, the system is less dependable than a single-computer system. Building dependable distributed systems is an extremely difficult task. There is no silver bullet solution. Instead one has to apply a variety of engineering techniques [2]: fault-avoidance (minimize the occurrence of faults, e.g. by using a proper design process), fault-removal (remove faults before they occur, e.g. by testing), fault-evasion (predict faults by monitoring and reconfigure the system before failures occur), and fault-tolerance (mask and/or contain failures). Building a system from scratch is an expensive and time consuming effort. To reduce the cost of building dependable distributed systems, one would choose to use commercial off-the-shelf (COTS) components whenever possible. The usage of COTS components has several potential advantages beyond minimizing costs. For example, through the widespread usage of a COTS component, design failures might be detected and fixed before the component is used in a dependable system. Custom-designed components have to mature without the widespread in-field testing of COTS components. COTS components have various potential disadvantages when used in dependable systems. For example, minimizing the time to market might lead to the release of components with inherent design faults (e.g. use of `shortcuts' that only work most of the time). In addition, the components might be more complex than needed and, hence, potentially have more design faults than simpler components. However, given economic constraints and the ability to cope with some of the problems using fault-evasion and fault-tolerance, only for a small percentage of systems can one justify not using COTS components. Distributed systems built from current COTS components are asynchronous systems in the sense that there exists no a priori known bound on the transmission delay of messages or the execution time of processes. When designing a distributed algorithm, one would like to make sure (e.g. by testing or verification) that it is correct, i.e. satisfies its specification. Many distributed algorithms make use of consensus (eventually all non-crashed processes have to agree on a value), leader election (a crashed leader is eventually replaced by a new leader, but at any time there is at most one leader) or a group membership detection service (a crashed process is eventually suspected to have crashed but only crashed processes are suspected). From a theoretical point of view, the service specifications given for such services are not implementable in asynchronous systems. In particular, for each implementation one can derive a counter example in which the service violates its specification. From a practical point of view, the consensus, the leader election, and the membership detection problem are solvable in asynchronous distributed systems. In this special section, Raynal and Tronel show how to bridge this difference by showing how to implement the group membership detection problem with a negligible probability [1] to fail in an asynchronous system. The group membership detection problem is specified by a liveness condition (L) and a safety property (S): (L) if a process p crashes, then eventually every non-crashed process q has to suspect that p has crashed; and (S) if a process q suspects p, then p has indeed crashed. One can show that either (L) or (S) is implementable, but one cannot implement both (L) and (S) at the same time in an asynchronous system. In practice, one only needs to implement (L) and (S) such that the probability that (L) or (S) is violated becomes negligible. Raynal and Tronel propose and analyse a protocol that implements (L) with certainty and that can be tuned such that the probability that (S) is violated becomes negligible. Designing and implementing distributed fault-tolerant protocols for asynchronous systems is a difficult but not an impossible task. A fault-tolerant protocol has to detect and mask certain failure classes, e.g. crash failures and message omission failures. There is a trade-off between the performance of a fault-tolerant protocol and the failure classes the protocol can tolerate. One wants to tolerate as many failure classes as needed to satisfy the stochastic requirements of the protocol [1] while still maintaining a sufficient performance. Since clients of a protocol have different requirements with respect to the performance/fault-tolerance trade-off, one would like to be able to customize protocols such that one can select an appropriate performance/fault-tolerance trade-off. In this special section Hiltunen et al describe how one can compose protocols from micro-protocols in their Cactus system. They show how a group RPC system can be tailored to the needs of a client. In particular, they show how considering additional failure classes affects the performance of a group RPC system. References [1] Cristian F 1991 Understanding fault-tolerant distributed systems Communications of ACM 34 (2) 56-78 [2] Heimerdinger W L and Weinstock C B 1992 A conceptual framework for system fault tolerance Technical Report 92-TR-33, CMU/SEI [3] Laprie J C (ed) 1992 Dependability: Basic Concepts and Terminology (Vienna: Springer)

  5. Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources.

    PubMed

    Song, Ting-Ting; Qin, Su-Juan; Wen, Qiao-Yan; Wang, Yu-Kun; Jia, Heng-Yue

    2015-10-16

    In quantum communication, passive decoy-state QKD protocols can eliminate many side channels, but the protocols without any finite-key analyses are not suitable for in practice. The finite-key securities of passive decoy-state (PDS) QKD protocols with two different unstable sources, type-II parametric down-convention (PDC) and phase randomized weak coherent pulses (WCPs), are analyzed in our paper. According to the PDS QKD protocols, we establish an optimizing programming respectively and obtain the lower bounds of finite-key rates. Under some reasonable values of quantum setup parameters, the lower bounds of finite-key rates are simulated. The simulation results show that at different transmission distances, the affections of different fluctuations on key rates are different. Moreover, the PDS QKD protocol with an unstable PDC source can resist more intensity fluctuations and more statistical fluctuation.

  6. Cryptography in the Bounded-Quantum-Storage Model

    NASA Astrophysics Data System (ADS)

    Schaffner, Christian

    2007-09-01

    This thesis initiates the study of cryptographic protocols in the bounded-quantum-storage model. On the practical side, simple protocols for Rabin Oblivious Transfer, 1-2 Oblivious Transfer and Bit Commitment are presented. No quantum memory is required for honest players, whereas the protocols can only be broken by an adversary controlling a large amount of quantum memory. The protocols are efficient, non-interactive and can be implemented with today's technology. On the theoretical side, new entropic uncertainty relations involving min-entropy are established and used to prove the security of protocols according to new strong security definitions. For instance, in the realistic setting of Quantum Key Distribution (QKD) against quantum-memory-bounded eavesdroppers, the uncertainty relation allows to prove the security of QKD protocols while tolerating considerably higher error rates compared to the standard model with unbounded adversaries.

  7. Moving the Learning of Teaching Closer to Practice: Teacher Education Implications of School-Based Inquiry Teams

    ERIC Educational Resources Information Center

    Gallimore, Ronald; Ermeling, Bradley A.; Saunders, William M.; Goldenberg, Claude

    2009-01-01

    A 5-year prospective, quasi-experimental investigation demonstrated that grade-level teams in 9 Title 1 schools using an inquiry-focused protocol to solve instructional problems significantly increased achievement. Teachers applying the inquiry protocol shifted attribution of improved student performance to their teaching rather than external…

  8. The Power of Protocols: An Educator's Guide to Better Practice. The Series on School Reform.

    ERIC Educational Resources Information Center

    McDonald, Joseph P.; Mohr, Nancy; Dichter, Alan; McDonald, Elizabeth C.

    This book describes nearly 30 protocols or "scripts" for conducting meetings, conversations, and other learning experiences among educators. Chapter 1, "The Basic Ideas," explains the basic ideas underlying the rest of the book, discussing why educators should educate themselves and making the case for exploring student work as…

  9. "Sexual Health Assessment" for Mental Health and Medical Practitioners: Teaching Notes

    ERIC Educational Resources Information Center

    Barratt, Barnaby B.; Rand, Marsha A.

    2009-01-01

    The importance of including sexual health assessment (SHA) within the biopsychosocial evaluations of mental health and medical practice is discussed, and various protocols available in the extant literature are reviewed. Six principles for SHA are presented as well as a model protocol consisting of six basic lines of questioning with specific…

  10. The Efficacy of Sheltered Instruction Observation Protocol (SIOP) in Mathematics Instruction on English Language Learner Students

    ERIC Educational Resources Information Center

    Vidot, Jose L.

    2011-01-01

    Studies by the National Association for Educational Progress found that English Language Learner (ELL) students perform poorly compared to other students on standardized mathematics exams. The research problem addressed how Sheltered Instruction Observation Protocol (SIOP) affected the instructional practices of high school mathematics teachers.…

  11. Practical Qualitative Research Strategies: Training Interviewers and Coders.

    PubMed

    Goodell, L Suzanne; Stage, Virginia C; Cooke, Natalie K

    2016-09-01

    The increased emphasis on incorporating qualitative methodologies into nutrition education development and evaluation underscores the importance of using rigorous protocols to enhance the trustworthiness of the findings. A 5-phase protocol for training qualitative research assistants (data collectors and coders) was developed as an approach to increase the consistency of the data produced. This training provides exposure to the core principles of qualitative research and then asks the research assistant to apply those principles through practice in a setting structured on critical reflection. Copyright © 2016 Society for Nutrition Education and Behavior. Published by Elsevier Inc. All rights reserved.

  12. Perceptual learning of basic visual features remains task specific with Training-Plus-Exposure (TPE) training.

    PubMed

    Cong, Lin-Juan; Wang, Ru-Jie; Yu, Cong; Zhang, Jun-Yun

    2016-01-01

    Visual perceptual learning is known to be specific to the trained retinal location, feature, and task. However, location and feature specificity can be eliminated by double-training or TPE training protocols, in which observers receive additional exposure to the transfer location or feature dimension via an irrelevant task besides the primary learning task Here we tested whether these new training protocols could even make learning transfer across different tasks involving discrimination of basic visual features (e.g., orientation and contrast). Observers practiced a near-threshold orientation (or contrast) discrimination task. Following a TPE training protocol, they also received exposure to the transfer task via performing suprathreshold contrast (or orientation) discrimination in alternating blocks of trials in the same sessions. The results showed no evidence for significant learning transfer to the untrained near-threshold contrast (or orientation) discrimination task after discounting the pretest effects and the suprathreshold practice effects. These results thus do not support a hypothetical task-independent component in perceptual learning of basic visual features. They also set the boundary of the new training protocols in their capability to enable learning transfer.

  13. Electronically delivered, multicomponent intervention to reduce unnecessary antibiotic prescribing for respiratory infections in primary care: a cluster randomised trial using electronic health records—REDUCE Trial study original protocol

    PubMed Central

    Juszczyk, Dorota; Charlton, Judith; McDermott, Lisa; Soames, Jamie; Sultana, Kirin; Ashworth, Mark; Fox, Robin; Hay, Alastair D; Little, Paul; Moore, Michael V; Yardley, Lucy; Prevost, A Toby; Gulliford, Martin C

    2016-01-01

    Introduction Respiratory tract infections (RTIs) account for about 60% of antibiotics prescribed in primary care. This study aims to test the effectiveness, in a cluster randomised controlled trial, of electronically delivered, multicomponent interventions to reduce unnecessary antibiotic prescribing when patients consult for RTIs in primary care. The research will specifically evaluate the effectiveness of feeding back electronic health records (EHRs) data to general practices. Methods and analysis 2-arm cluster randomised trial using the EHRs of the Clinical Practice Research Datalink (CPRD). General practices in England, Scotland, Wales and Northern Ireland are being recruited and the general population of all ages represents the target population. Control trial arm practices will continue with usual care. Practices in the intervention arm will receive complex multicomponent interventions, delivered remotely to information systems, including (1) feedback of each practice's antibiotic prescribing through monthly antibiotic prescribing reports estimated from CPRD data; (2) delivery of educational and decision support tools; (3) a webinar to explain and promote effective usage of the intervention. The intervention will continue for 12 months. Outcomes will be evaluated from CPRD EHRs. The primary outcome will be the number of antibiotic prescriptions for RTIs per 1000 patient years. Secondary outcomes will be: the RTI consultation rate; the proportion of consultations for RTI with an antibiotic prescribed; subgroups of age; different categories of RTI and quartiles of intervention usage. There will be more than 80% power to detect an absolute reduction in antibiotic prescription for RTI of 12 per 1000 registered patient years. Total healthcare usage will be estimated from CPRD data and compared between trial arms. Ethics and dissemination Trial protocol was approved by the National Research Ethics Service Committee (14/LO/1730). The pragmatic design of the trial will enable subsequent translation of effective interventions at scale in order to achieve population impact. Trial registration number ISRCTN95232781; Pre-results. PMID:27491663

  14. Model Checking a Byzantine-Fault-Tolerant Self-Stabilizing Protocol for Distributed Clock Synchronization Systems

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.

    2007-01-01

    This report presents the mechanical verification of a simplified model of a rapid Byzantine-fault-tolerant self-stabilizing protocol for distributed clock synchronization systems. This protocol does not rely on any assumptions about the initial state of the system. This protocol tolerates bursts of transient failures, and deterministically converges within a time bound that is a linear function of the self-stabilization period. A simplified model of the protocol is verified using the Symbolic Model Verifier (SMV) [SMV]. The system under study consists of 4 nodes, where at most one of the nodes is assumed to be Byzantine faulty. The model checking effort is focused on verifying correctness of the simplified model of the protocol in the presence of a permanent Byzantine fault as well as confirmation of claims of determinism and linear convergence with respect to the self-stabilization period. Although model checking results of the simplified model of the protocol confirm the theoretical predictions, these results do not necessarily confirm that the protocol solves the general case of this problem. Modeling challenges of the protocol and the system are addressed. A number of abstractions are utilized in order to reduce the state space. Also, additional innovative state space reduction techniques are introduced that can be used in future verification efforts applied to this and other protocols.

  15. Using Patient Flow Information to Determine Risk of Hospital Presentation: Protocol for a Proof-of-Concept Study.

    PubMed

    Pearce, Christopher M; McLeod, Adam; Patrick, Jon; Boyle, Douglas; Shearer, Marianne; Eustace, Paula; Pearce, Mary Catherine

    2016-12-20

    Every day, patients are admitted to the hospital with conditions that could have been effectively managed in the primary care sector. These admissions are expensive and in many cases are possible to avoid if early intervention occurs. General practitioners are in the best position to identify those at risk of imminent hospital presentation and admission; however, it is not always possible for all the factors to be considered. A lack of shared information contributes significantly to the challenge of understanding a patient's full medical history. Some health care systems around the world use algorithms to analyze patient data in order to predict events such as emergency presentation; however, those responsible for the design and use of such systems readily admit that the algorithms can only be used to assess the populations used to design the algorithm in the first place. The United Kingdom health care system has contributed data toward algorithm development, which is possible through the unified health care system in place there. The lack of unified patient records in Australia has made building an algorithm for local use a significant challenge. Our objective is to use linked patient records to track patient flow through primary and secondary health care in order to develop a tool that can be applied in real time at the general practice level. This algorithm will allow the generation of reports for general practitioners that indicate the relative risk of patients presenting to an emergency department. A previously designed tool was used to deidentify the general practice and hospital records of approximately 100,000 patients. Records were pooled for patients who had attended emergency departments within the Eastern Health Network of hospitals and general practices within the Eastern Health Network catchment. The next phase will involve development of a model using a predictive analytic machine learning algorithm. The model will be developed iteratively, testing the combination of variables that will provide the best predictive model. Records of approximately 97,000 patients who have attended both a general practice and an emergency department have been identified within the database. These records are currently being used to develop the predictive model. Records from general practice and emergency department visits have been identified and pooled for development of the algorithm. The next phase in the project will see validation and live testing of the algorithm in a practice setting. The algorithm will underpin a clinical decision support tool for general practitioners which will be tested for face validity in this initial study into its efficacy. ©Christopher M Pearce, Adam McLeod, Jon Patrick, Douglas Boyle, Marianne Shearer, Paula Eustace, Mary Catherine Pearce. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 20.12.2016.

  16. Preoperative Planning in Orthopaedic Surgery. Current Practice and Evolving Applications.

    PubMed

    Atesok, Kivanc; Galos, David; Jazrawi, Laith M; Egol, Kenneth A

    2015-12-01

    Preoperative planning is an essential prerequisite for the success of orthopaedic procedures. Traditionally, the exercise has involved the written down, step by step "blueprint" of the surgical procedure. Preoperative planning of the technical aspects of the orthopaedic procedure has been performed on hardcopy radiographs using various methods such as copying the radiographic image on tracing papers to practice the planned interventions. This method has become less practical due to variability in radiographic magnification and increasing implementation of digital imaging systems. Advances in technology along with recognition of the importance of surgical safety protocols resulted in widespread changes in orthopaedic preoperative planning approaches. Nowadays, perioperative "briefings" have gained particular importance and novel planning methods have started to integrate into orthopaedic practice. These methods include using software that enables surgeons to perform preoperative planning on digital radiographs and to construct 3D digital models or prototypes of various orthopaedic pathologies from a patient's CT scans to practice preoperatively. Evidence-to-date suggests that preoperative planning and briefings are effective means of favorably influencing the outcomes of orthopaedic procedures.

  17. Protocols for second-generation business satellites systems

    NASA Astrophysics Data System (ADS)

    Evans, B. G.; Coakley, F. P.; El Amin, M. H. M.

    The paper discusses the nature and mix of traffic in business satellite systems and describes the limitations on the protocol imposed by the differing impairments of speech, video, and data. A simple TDMA system protocol is presented which meets the requirements of mixed-service operation. The efficiency of the protocol together with implications for allocation, scheduling and synchronisation are discussed. Future-generation satellites will probably use on-board processing. Some initial work on protocols that make use of on-board processing and the implications for satellite and earth-station equipment are presented.

  18. Quantum processing by remote quantum control

    NASA Astrophysics Data System (ADS)

    Qiang, Xiaogang; Zhou, Xiaoqi; Aungskunsiri, Kanin; Cable, Hugo; O'Brien, Jeremy L.

    2017-12-01

    Client-server models enable computations to be hosted remotely on quantum servers. We present a novel protocol for realizing this task, with practical advantages when using technology feasible in the near term. Client tasks are realized as linear combinations of operations implemented by the server, where the linear coefficients are hidden from the server. We report on an experimental demonstration of our protocol using linear optics, which realizes linear combination of two single-qubit operations by a remote single-qubit control. In addition, we explain when our protocol can remain efficient for larger computations, as well as some ways in which privacy can be maintained using our protocol.

  19. Managing barriers to empathy in the clinical encounter: a qualitative interview study with GPs

    PubMed Central

    Derksen, Frans AWM; Hartman, Tim C olde; Bensing, Jozien M; Lagro-Janssen, Antoine LM

    2016-01-01

    Background Current daily general practice has become increasingly technical and somatically oriented (where attention to patients’ feelings is decreased) due to an increase in protocol-based guidelines. Priorities in GP–patient communication have shifted from a focus on listening and empathy to task-oriented communication. Aim To explore what barriers GPs experience when applying empathy in daily practice, and how these barriers are managed. Design and setting Thirty Dutch GPs with sufficient heterogeneity in sex, age, type of practice, and rural or urban setting were interviewed. Method The consolidated criteria for reporting qualitative research (COREQ) were applied. The verbatim transcripts were then analysed. Results According to participating GPs, the current emphasis on protocol-driven care can be a significant barrier to genuineness in communication. Other potential barriers mentioned were time pressures and constraints, and dealing with patients displaying ‘unruly behaviour’ or those with personality disorders. GPs indicated that it can be difficult to balance emotional involvement and professional distance. Longer consulting times, smaller practice populations, and efficient practice organisation were described as practical solutions. In order to focus on a patient-as-person approach, GPs strongly suggested that deviating from guidelines should be possible when necessary as an element of good-quality care. Joining intercollegiate counselling groups was also discussed. Conclusion In addition to practical solutions for barriers to behaving empathically, GPs indicated that they needed more freedom to balance working with protocols and guidelines, as well as a patient-as-person and patient-as-partner approach. This balance is necessary to remain connected with patients and to deliver care that is truly personal. PMID:27884917

  20. Alternatives to the face-to-face consultation in general practice: focused ethnographic case study.

    PubMed

    Atherton, Helen; Brant, Heather; Ziebland, Sue; Bikker, Annemieke; Campbell, John; Gibson, Andy; McKinstry, Brian; Porqueddu, Tania; Salisbury, Chris

    2018-04-01

    NHS policy encourages general practices to introduce alternatives to the face-to-face consultation, such as telephone, email, e-consultation systems, or internet video. Most have been slow to adopt these, citing concerns about workload. This project builds on previous research by focusing on the experiences of patients and practitioners who have used one or more of these alternatives. To understand how, under what conditions, for which patients, and in what ways, alternatives to face-to-face consultations present benefits and challenges to patients and practitioners in general practice. Focused ethnographic case studies took place in eight UK general practices between June 2015 and March 2016. Non-participant observation, informal conversations with staff, and semi-structured interviews with staff and patients were conducted. Practice documents and protocols were reviewed. Data were analysed through charting and the 'one sheet of paper' mind-map method to identify the line of argument in each thematic report. Case study practices had different rationales for offering alternatives to the face-to-face consultation. Beliefs varied about which patients and health issues were suitable. Co-workers were often unaware of each other's practice; for example, practice policies for use of e-consultations systems with patients were not known about or followed. Patients reported benefits including convenience and access. Staff and some patients regarded the face-to-face consultation as the ideal. Experience of implementing alternatives to the face-to-face consultation suggests that changes in patient access and staff workload may be both modest and gradual. Practices planning to implement them should consider carefully their reasons for doing so and involve the whole practice team. © British Journal of General Practice 2018.

  1. Survey of Sedation and Analgesia Practice Among Canadian Pediatric Critical Care Physicians.

    PubMed

    Garcia Guerra, Gonzalo; Joffe, Ari R; Cave, Dominic; Duff, Jonathan; Duncan, Shannon; Sheppard, Cathy; Tawfik, Gerda; Hartling, Lisa; Jou, Hsing; Vohra, Sunita

    2016-09-01

    Despite the fact that almost all critically ill children experience some degree of pain or anxiety, there is a lack of high-quality evidence to inform preferred approaches to sedation, analgesia, and comfort measures in this environment. We conducted this survey to better understand current comfort and sedation practices among Canadian pediatric intensivists. The survey was conducted after a literature review and initial focus groups. The survey was then pretested and validated. The final survey was distributed by email to 134 intensivists from 17 PICUs across Canada using the Research Electronic Data Capture system. The response rate was 73% (98/134). The most commonly used sedation scores are Face, Legs, Activity, Cry, and Consolability (42%) and COMFORT (41%). Withdrawal scores are commonly used (65%). In contrast, delirium scores are used by only 16% of the respondents. Only 36% of respondents have routinely used sedation protocols. The majority (66%) do not use noise reduction methods, whereas only 23% of respondents have a protocol to promote day/night cycles. Comfort measures including music, swaddling, soother, television, and sucrose solutions are frequently used. The drugs most commonly used to provide analgesia are morphine and acetaminophen. Midazolam and chloral hydrate were the most frequent sedatives. Our survey demonstrates great variation in practice in the management of pain and anxiety in Canadian PICUs. Standardized strategies for sedation, delirium and withdrawal, and sleep promotion are lacking. There is a need for research in this field and the development of evidence-based, pediatric sedation and analgesia guidelines.

  2. Programming and Reprogramming Sequence Timing Following High and Low Contextual Interference Practice

    ERIC Educational Resources Information Center

    Wright, David L.; Magnuson, Curt E.; Black, Charles B.

    2005-01-01

    Individuals practiced two unique discrete sequence production tasks that differed in their relative time profile in either a blocked or random practice schedule. Each participant was subsequently administered a "precuing" protocol to examine the cost of initially compiling or modifying the plan for an upcoming movement's relative timing. The…

  3. Safety, efficacy and clinical generalization of the STAR protocol: a retrospective analysis.

    PubMed

    Stewart, Kent W; Pretty, Christopher G; Tomlinson, Hamish; Thomas, Felicity L; Homlok, József; Noémi, Szabó Némedi; Illyés, Attila; Shaw, Geoffrey M; Benyó, Balázs; Chase, J Geoffrey

    2016-12-01

    The changes in metabolic pathways and metabolites due to critical illness result in a highly complex and dynamic metabolic state, making safe, effective management of hyperglycemia and hypoglycemia difficult. In addition, clinical practices can vary significantly, thus making GC protocols difficult to generalize across units.The aim of this study was to provide a retrospective analysis of the safety, performance and workload of the stochastic targeted (STAR) glycemic control (GC) protocol to demonstrate that patient-specific, safe, effective GC is possible with the STAR protocol and that it is also generalizable across/over different units and clinical practices. Retrospective analysis of STAR GC in the Christchurch Hospital Intensive Care Unit (ICU), New Zealand (267 patients), and the Gyula Hospital, Hungary (47 patients), is analyzed (2011-2015). STAR Christchurch (BG target 4.4-8.0 mmol/L) is also compared to the Specialized Relative Insulin and Nutrition Tables (SPRINT) protocol (BG target 4.4-6.1 mmol/L) implemented in the Christchurch Hospital ICU, New Zealand (292 patients, 2005-2007). Cohort mortality, effectiveness and safety of glycemic control and nutrition delivered are compared using nonparametric statistics. Both STAR implementations and SPRINT resulted in over 86 % of time per episode in the blood glucose (BG) band of 4.4-8.0 mmol/L. Patients treated using STAR in Christchurch ICU spent 36.7 % less time on protocol and were fed significantly more than those treated with SPRINT (73 vs. 86 % of caloric target). The results from STAR in both Christchurch and Gyula were very similar, with the BG distributions being almost identical. STAR provided safe GC with very few patients experiencing severe hypoglycemia (BG < 2.2 mmol/L, <5 patients, 1.5 %). STAR outperformed its predecessor, SPRINT, by providing higher nutrition and equally safe, effective control for all the days of patient stay, while lowering the number of measurements and interventions required. The STAR protocol has the ability to deliver high performance and high safety across patient types, time, clinical practice culture (Christchurch and Gyula) and clinical resources.

  4. VERSATILE, HIGH-RESOLUTION ANTEROGRADE LABELING OF VAGAL EFFERENT PROJECTIONS WITH DEXTRAN AMINES

    PubMed Central

    Walter, Gary C.; Phillips, Robert J.; Baronowsky, Elizabeth A.; Powley, Terry L.

    2009-01-01

    None of the anterograde tracers used to label and investigate vagal preganglionic neurons projecting to the viscera has proved optimal for routine and extensive labeling of autonomic terminal fields. To identify an alternative tracer protocol, the present experiment evaluated whether dextran conjugates, which have produced superior results in the CNS, might yield widespread and effective labeling of long, fine-caliber vagal efferents in the peripheral nervous system. The dextran conjugates that were evaluated proved reliable and versatile for labeling the motor neuron pool in its entirety, for single- and multiple-labeling protocols, for both conventional and confocal fluorescence microscopy, and for permanent labeling protocols for brightfield microscopy of the projections to the gastrointestinal (GI) tract. Using a standard ABC kit followed by visualization with DAB as the chromagen, Golgi-like labeling of the vagal efferent terminal fields in the GI wall was achieved with the biotinylated dextrans. The definition of individual terminal varicosities was so sharp and detailed that it was routinely practical to examine the relationship of putative vagal efferent contacts (by the criteria of high magnification light microscopy) with the dendritic and somatic architecture of counterstained neurons in the myenteric plexus. Overall, dextran conjugates provide high-definition labeling of an extensive vagal motor pool in the GI tract, and offer considerable versatility when multiple-staining protocols are needed to elucidate the complexities of the innervation of the gut. PMID:19056424

  5. Impact of Contrast Media Concentration on Low-Kilovolt Computed Tomography Angiography: A Systematic Preclinical Approach.

    PubMed

    Fleischmann, Ulrike; Pietsch, Hubertus; Korporaal, Johannes G; Flohr, Thomas G; Uder, Michael; Jost, Gregor; Lell, Michael M

    2018-05-01

    Low peak kilovoltage (kVp) protocols in computed tomography angiography (CTA) demand a review of contrast media (CM) administration practices. The aim of this study was to systematically evaluate different iodine concentrations of CM in a porcine model. Dynamic 70 kVp CTA was performed on 7 pigs using a third-generation dual-source CT system. Three CM injection protocols (A-C) with an identical total iodine dose and iodine delivery rate (150 mg I/kg, 12 s, 0.75 g I/s) differed in iodine concentration and flow rate (protocol A: 400 mg I/mL, 1.9 mL/s; B: 300 mg I/mL, 2.5 mL/s; C: 150 mg I/mL, 5 mL/s). All protocols were applied in a randomized order and compared intraindividually. Arterial enhancement at different locations in the pulmonary artery, the aorta, and aortic branches was measured over time. Time attenuation curves, peak enhancement, time to peak, and bolus tracking delay times needed for static CTA were calculated. The reproducibility of optimal parameters was tested in single-phase CTA. The heart rates of the pigs were comparable for all protocols (P > 0.7). The injection pressure was significantly higher for protocol A (64 ± 5 psi) and protocol C (55 ± 3 psi) compared with protocol B (39 ± 2 psi) (P < 0.001). Average arterial peak enhancement in the dynamic scans was 359 ± 51 HU (protocol A), 382 ± 36 HU (B), and 382 ± 60 HU (C) (A compared with B and C: P < 0.01; B compared with C: P = 0.995). Time to peak enhancement decreased with increasing injection rate. The delay time for bolus tracking depended on the injection rate as well and was highest for protocol A (4.7 seconds) and lowest for protocol C (3.9 seconds) (P = 0.038). The peak enhancement values of the dynamic scans highly correlated with those of the single-phase CTA scans. In 70 kVp CTA, 300 mg I/mL iodine concentrations showed to be superior to high-concentration CM when keeping the iodine delivery rate constant. Besides, iodine concentrations as low as 150 mg I/mL can be administered without compromising vascular enhancement. This opens up new possibilities in CM administration.

  6. Quality assurance of the SCOPE 1 trial in oesophageal radiotherapy.

    PubMed

    Wills, Lucy; Maggs, Rhydian; Lewis, Geraint; Jones, Gareth; Nixon, Lisette; Staffurth, John; Crosby, Tom

    2017-11-15

    SCOPE 1 was the first UK based multi-centre trial involving radiotherapy of the oesophagus. A comprehensive radiotherapy trials quality assurance programme was launched with two main aims: 1. To assist centres, where needed, to adapt their radiotherapy techniques in order to achieve protocol compliance and thereby enable their participation in the trial. 2. To support the trial's clinical outcomes by ensuring the consistent planning and delivery of radiotherapy across all participating centres. A detailed information package was provided and centres were required to complete a benchmark case in which the delineated target volumes and organs at risk, dose distribution and completion of a plan assessment form were assessed prior to recruiting patients into the trial. Upon recruiting, the quality assurance (QA) programme continued to monitor the outlining and planning of radiotherapy treatments. Completion of a questionnaire was requested in order to gather information about each centre's equipment and techniques relating to their trial participation and to assess the impact of the trial nationally on standard practice for radiotherapy of the oesophagus. During the trial, advice was available for individual planning issues, and was circulated amongst the SCOPE 1 community in response to common areas of concern using bulletins. 36 centres were supported through QA processes to enable their participation in SCOPE1. We discuss the issues which have arisen throughout this process and present details of the benchmark case solutions, centre questionnaires and on-trial protocol compliance. The range of submitted benchmark case GTV volumes was 29.8-67.8cm 3 ; and PTV volumes 221.9-513.3 cm 3 . For the dose distributions associated with these volumes, the percentage volume of the lungs receiving 20Gy (V20Gy) ranged from 20.4 to 33.5%. Similarly, heart V40Gy ranged from 16.1 to 33.0%. Incidence of incorrect outlining of OAR volumes increased from 50% of centres at benchmark case, to 64% on trial. Sixty-five percent of centres, who returned the trial questionnaire, stated that their standard practice had changed as a result of their participation in the SCOPE1 trial. The SCOPE 1 QA programme outcomes lend support to the trial's clinical conclusions. The range of patient planning outcomes for the benchmark case indicated, at the outset of the trial, the significant degree of variation present in UK oesophageal radiotherapy planning outcomes, despite the presence of a protocol. This supports the case for increasingly detailed definition of practice by means of consensus protocols, training and peer review. The incidence of minor inconsistencies of technique highlights the potential for improved QA systems and the need for sufficient resource for this to be addressed within future trials. As indicated in questionnaire responses, the QA exercise as a whole has contributed to greater consistency of oesophageal radiotherapy in the UK via the adoption into standard practice of elements of the protocol. The SCOPE1 trial is an International Standard Randomized Controlled Trial, ISRCTN47718479 .

  7. Loss-tolerant measurement-device-independent quantum private queries

    NASA Astrophysics Data System (ADS)

    Zhao, Liang-Yuan; Yin, Zhen-Qiang; Chen, Wei; Qian, Yong-Jun; Zhang, Chun-Mei; Guo, Guang-Can; Han, Zheng-Fu

    2017-01-01

    Quantum private queries (QPQ) is an important cryptography protocol aiming to protect both the user’s and database’s privacy when the database is queried privately. Recently, a variety of practical QPQ protocols based on quantum key distribution (QKD) have been proposed. However, for QKD-based QPQ the user’s imperfect detectors can be subjected to some detector- side-channel attacks launched by the dishonest owner of the database. Here, we present a simple example that shows how the detector-blinding attack can damage the security of QKD-based QPQ completely. To remove all the known and unknown detector side channels, we propose a solution of measurement-device-independent QPQ (MDI-QPQ) with single- photon sources. The security of the proposed protocol has been analyzed under some typical attacks. Moreover, we prove that its security is completely loss independent. The results show that practical QPQ will remain the same degree of privacy as before even with seriously uncharacterized detectors.

  8. Quantum key distribution using basis encoding of Gaussian-modulated coherent states

    NASA Astrophysics Data System (ADS)

    Huang, Peng; Huang, Jingzheng; Zhang, Zheshen; Zeng, Guihua

    2018-04-01

    The continuous-variable quantum key distribution (CVQKD) has been demonstrated to be available in practical secure quantum cryptography. However, its performance is restricted strongly by the channel excess noise and the reconciliation efficiency. In this paper, we present a quantum key distribution (QKD) protocol by encoding the secret keys on the random choices of two measurement bases: the conjugate quadratures X and P . The employed encoding method can dramatically weaken the effects of channel excess noise and reconciliation efficiency on the performance of the QKD protocol. Subsequently, the proposed scheme exhibits the capability to tolerate much higher excess noise and enables us to reach a much longer secure transmission distance even at lower reconciliation efficiency. The proposal can work alternatively to strengthen significantly the performance of the known Gaussian-modulated CVQKD protocol and serve as a multiplier for practical secure quantum cryptography with continuous variables.

  9. Loss-tolerant measurement-device-independent quantum private queries.

    PubMed

    Zhao, Liang-Yuan; Yin, Zhen-Qiang; Chen, Wei; Qian, Yong-Jun; Zhang, Chun-Mei; Guo, Guang-Can; Han, Zheng-Fu

    2017-01-04

    Quantum private queries (QPQ) is an important cryptography protocol aiming to protect both the user's and database's privacy when the database is queried privately. Recently, a variety of practical QPQ protocols based on quantum key distribution (QKD) have been proposed. However, for QKD-based QPQ the user's imperfect detectors can be subjected to some detector- side-channel attacks launched by the dishonest owner of the database. Here, we present a simple example that shows how the detector-blinding attack can damage the security of QKD-based QPQ completely. To remove all the known and unknown detector side channels, we propose a solution of measurement-device-independent QPQ (MDI-QPQ) with single- photon sources. The security of the proposed protocol has been analyzed under some typical attacks. Moreover, we prove that its security is completely loss independent. The results show that practical QPQ will remain the same degree of privacy as before even with seriously uncharacterized detectors.

  10. Continuous-variable protocol for oblivious transfer in the noisy-storage model.

    PubMed

    Furrer, Fabian; Gehring, Tobias; Schaffner, Christian; Pacher, Christoph; Schnabel, Roman; Wehner, Stephanie

    2018-04-13

    Cryptographic protocols are the backbone of our information society. This includes two-party protocols which offer protection against distrustful players. Such protocols can be built from a basic primitive called oblivious transfer. We present and experimentally demonstrate here a quantum protocol for oblivious transfer for optical continuous-variable systems, and prove its security in the noisy-storage model. This model allows us to establish security by sending more quantum signals than an attacker can reliably store during the protocol. The security proof is based on uncertainty relations which we derive for continuous-variable systems, that differ from the ones used in quantum key distribution. We experimentally demonstrate in a proof-of-principle experiment the proposed oblivious transfer protocol for various channel losses by using entangled two-mode squeezed states measured with balanced homodyne detection. Our work enables the implementation of arbitrary two-party quantum cryptographic protocols with continuous-variable communication systems.

  11. Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Conover, David R.; Crawford, Aladsair J.; Viswanathan, Vilayanur V.

    2014-06-01

    The Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems (PNNL-22010) was first issued in November 2012 as a first step toward providing a foundational basis for developing an initial standard for the uniform measurement and expression of energy storage system (ESS) performance. Its subsequent use in the field and review by the protocol working group and most importantly the users’ subgroup and the thermal subgroup has led to the fundamental modifications reflected in this update of the 2012 Protocol. As an update of the 2012 Protocol, this document (the June 2014 Protocol) is intended to supersedemore » its predecessor and be used as the basis for measuring and expressing ESS performance. The foreword provides general and specific details about what additions, revisions, and enhancements have been made to the 2012 Protocol and the rationale for them in arriving at the June 2014 Protocol.« less

  12. Evaluation of an electronic health record-supported obesity management protocol implemented in a community health center: a cautionary note.

    PubMed

    Steglitz, Jeremy; Sommers, Mary; Talen, Mary R; Thornton, Louise K; Spring, Bonnie

    2015-07-01

    Primary care clinicians are well-positioned to intervene in the obesity epidemic. We studied whether implementation of an obesity intake protocol and electronic health record (EHR) form to guide behavior modification would facilitate identification and management of adult obesity in a Federally Qualified Health Center serving low-income, Hispanic patients. In three studies, we examined clinician and patient outcomes before and after the addition of the weight management protocol and form. In the Clinician Study, 12 clinicians self-reported obesity management practices. In the Population Study, BMI and order data from 5000 patients and all 40 clinicians in the practice were extracted from the EHR preintervention and postintervention. In the Exposure Study, EHR-documented outcomes for a sub-sample of 46 patients actually exposed to the obesity management form were compared to matched controls. Clinicians reported that the intake protocol and form increased their performance of obesity-related assessments and their confidence in managing obesity. However, no improvement in obesity management practices or patient weight-loss was evident in EHR records for the overall clinic population. Further analysis revealed that only 55 patients were exposed to the form. Exposed patients were twice as likely to receive weight-loss counseling following the intervention, as compared to before, and more likely than matched controls. However, their obesity outcomes did not differ. Results suggest that an obesity intake protocol and EHR-based weight management form may facilitate clinician weight-loss counseling among those exposed to the form. Significant implementation barriers can limit exposure, however, and need to be addressed. © The Author 2015. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  13. Safety Profile of Good Manufacturing Practice Manufactured Interferon γ-Primed Mesenchymal Stem/Stromal Cells for Clinical Trials.

    PubMed

    Guess, Adam J; Daneault, Beth; Wang, Rongzhang; Bradbury, Hillary; La Perle, Krista M D; Fitch, James; Hedrick, Sheri L; Hamelberg, Elizabeth; Astbury, Caroline; White, Peter; Overolt, Kathleen; Rangarajan, Hemalatha; Abu-Arja, Rolla; Devine, Steven M; Otsuru, Satoru; Dominici, Massimo; O'Donnell, Lynn; Horwitz, Edwin M

    2017-10-01

    Mesenchymal stem/stromal cells (MSCs) are widely studied by both academia and industry for a broad array of clinical indications. The collective body of data provides compelling evidence of the clinical safety of MSC therapy. However, generally accepted proof of therapeutic efficacy has not yet been reported. In an effort to generate a more effective therapeutic cell product, investigators are focused on modifying MSC processing protocols to enhance the intrinsic biologic activity. Here, we report a Good Manufacturing Practice-compliant two-step MSC manufacturing protocol to generate MSCs or interferon γ (IFNγ) primed MSCs which allows freshly expanded cells to be infused in patients on a predetermined schedule. This protocol eliminates the need to infuse cryopreserved, just thawed cells which may reduce the immune modulatory activity. Moreover, using (IFNγ) as a prototypic cytokine, we demonstrate the feasibility of priming the cells with any biologic agent. We then characterized MSCs and IFNγ primed MSCs prepared with our protocol, by karyotype, in vitro potential for malignant transformation, biodistribution, effect on engraftment of transplanted hematopoietic cells, and in vivo toxicity in immune deficient mice including a complete post-mortem examination. We found no evidence of toxicity attributable to the MSC or IFNγ primed MSCs. Our data suggest that the clinical risk of infusing MSCs or IFNγ primed MSCs produced by our two-step protocol is not greater than MSCs currently in practice. While actual proof of safety requires phase I clinical trials, our data support the use of either cell product in new clinical studies. Stem Cells Translational Medicine 2017;6:1868-1879. © 2017 The Authors Stem Cells Translational Medicine published by Wiley Periodicals, Inc. on behalf of AlphaMed Press.

  14. Study protocol of a mixed-methods evaluation of a cluster randomized trial to improve the safety of NSAID and antiplatelet prescribing: data-driven quality improvement in primary care.

    PubMed

    Grant, Aileen; Dreischulte, Tobias; Treweek, Shaun; Guthrie, Bruce

    2012-08-28

    Trials of complex interventions are criticized for being 'black box', so the UK Medical Research Council recommends carrying out a process evaluation to explain the trial findings. We believe it is good practice to pre-specify and publish process evaluation protocols to set standards and minimize bias. Unlike protocols for trials, little guidance or standards exist for the reporting of process evaluations. This paper presents the mixed-method process evaluation protocol of a cluster randomized trial, drawing on a framework designed by the authors. This mixed-method evaluation is based on four research questions and maps data collection to a logic model of how the data-driven quality improvement in primary care (DQIP) intervention is expected to work. Data collection will be predominately by qualitative case studies in eight to ten of the trial practices, focus groups with patients affected by the intervention and quantitative analysis of routine practice data, trial outcome and questionnaire data and data from the DQIP intervention. We believe that pre-specifying the intentions of a process evaluation can help to minimize bias arising from potentially misleading post-hoc analysis. We recognize it is also important to retain flexibility to examine the unexpected and the unintended. From that perspective, a mixed-methods evaluation allows the combination of exploratory and flexible qualitative work, and more pre-specified quantitative analysis, with each method contributing to the design, implementation and interpretation of the other.As well as strengthening the study the authors hope to stimulate discussion among their academic colleagues about publishing protocols for evaluations of randomized trials of complex interventions. DATA-DRIVEN QUALITY IMPROVEMENT IN PRIMARY CARE TRIAL REGISTRATION: ClinicalTrials.gov: NCT01425502.

  15. Using a Delphi consensus process to develop an acupuncture treatment protocol by consensus for women undergoing Assisted Reproductive Technology (ART) treatment

    PubMed Central

    2012-01-01

    Background Assisted reproductive technologies (ART) are increasingly utilised for resolving difficulties conceiving. These technologies are expensive to both the public purse and the individual consumers. Acupuncture is widely used as an adjunct to ART with indications that it may assist reducing the time to conception and increasing live birth rates. Heterogeneity is high between treatment protocols. The aim of this study was to examine what fertility acupuncturists consider key components of best practice acupuncture during an ART cycle, and to establish an acupuncture protocol by consensus. Methods Fifteen international acupuncturists with extensive experience treating women during ART interventions participated in 3 rounds of Delphi questionnaires. The first round focused on identifying the parameters of acupuncture treatment as adjunct to ART, the second round evaluated statements derived from the earlier round, and the third evaluated specific parameters for a proposed trial protocol. Consensus was defined as greater than 80% agreement. Results Significant agreement was achieved on the parameters of best practice acupuncture, including an acupuncture protocol suitable for future research. Study participants confirmed the importance of needling aspects relating to the dose of acupuncture, the therapeutic relationship, tailoring treatment to the individual, and the role of co-interventions. From two rounds of the Delphi a consensus was achieved on seven treatment parameters for the design of the acupuncture treatment to be used in a clinical trial of acupuncture as an adjunct to ART. The treatment protocol includes the use of the traditional Chinese medicine acupuncture, use of manual acupuncture, a first treatment administered between day 6–8 of the stimulated ART cycle which is individualised to the participant, two treatments will be administered on the day of embryo transfer, and will include points SP8, SP10, LR3, ST29, CV4, and post transfer include: GV20, KD3, ST36, SP6, and PC6. Auricular points Shenmen and Zigong will be used. Practitioner intent or yi will be addressed in the treatment protocol. Conclusions Despite a lack of homogeneity in the research and clinical literature on ART and acupuncture, a consensus amongst experts on key components of a best practice treatment protocol was possible. Such consensus offers guidance for further research. PMID:22769059

  16. Practice guidelines for music interventions with hospitalized pediatric patients.

    PubMed

    Stouffer, Janice W; Shirk, Beverly J; Polomano, Rosemary C

    2007-12-01

    Music therapy is an effective complementary approach that can achieve specific therapeutic outcomes in the clinical management of pediatric patients. Growing research on music interventions has generated scientific knowledge about how this modality benefits patients and has formed the basis for effective protocols that can be used in practice. Although it can be challenging to translate research-based protocols into routine clinical care at the bedside, it is essential that music therapy interventions be aligned with evidence-based information and that accepted standards be established by the music therapy discipline to achieve the greatest benefit. The importance of partnerships between nurses and music therapists is emphasized to enhance the success of music-based treatments. This discussion synthesizes research findings that can be used to design pediatric practice guidelines in the application of music therapy.

  17. Nurses' Sedation Practices During Weaning of Adults From Mechanical Ventilation in an Intensive Care Unit.

    PubMed

    Borkowska, Marta; Labeau, Sonia; Schepens, Tom; Vandijck, Dominique; Van de Vyver, Katrien; Christiaens, Daphné; Lizy, Christelle; Blackwood, Bronagh; Blot, Stijn I

    2018-01-01

    Sedation and analgesia have an important impact on the outcome of patients treated with mechanical ventilation. International guidelines recommend use of sedation protocols to ensure best patient care. To determine the sedation practice of intensive care nurses weaning adults from mechanical ventilation. A cross-sectional survey with a self-administered questionnaire was used to determine sedation practices of Flemish critical care nurses during weaning. Consensus on content validity was achieved through a Delphi procedure among experts. Data were collected during the 32nd Annual Congress of the Flemish Society of Critical Care Nurses in Ghent, Belgium, December 2014. A total of 342 nurses were included in the study. Of these, 43.7% had a sedation protocol in their unit that was used by 61.8% of the respondents. Sedation protocols were more often available ( P < .001) in academic hospitals (72%) than in general hospitals (41.5%). Sedatives were administered via continuous infusion with bolus doses if needed (81%). Level of sedation was assessed every 2 hours (56%), mostly via the Richmond Agitation-Sedation Scale (59.1%). Daily interruption of sedation was used by 16.5% of respondents. The biggest barriers to daily interruption were patient comfort (49.4%) and fear of respiratory worsening (46.6%). A considerable discrepancy exists between international recommendations and actual sedation practices. Standardization of sedation practices across different institutions on a regional and national level may improve the quality of care. ©2018 American Association of Critical-Care Nurses.

  18. Maternal–Child Microbiome: Specimen Collection, Storage and Implications for Research and Practice

    PubMed Central

    Jordan, Sheila; Baker, Brenda; Dunn, Alexis; Edwards, Sara; Ferranti, Erin; Mutic, Abby D.; Yang, Irene; Rodriguez, Jeannie

    2017-01-01

    Background The maternal microbiome is a key contributor to the development and outcomes of pregnancy and the health status of both mother and infant. Significant advances are occurring in the science of the maternal and child microbiome and hold promise in improving outcomes related to pregnancy complications, child development, and chronic health conditions of mother and child. Objectives The purpose of the paper is to review site-specific considerations in the collection and storage of maternal and child microbiome samples and its implications for nursing research and practice. Approach Microbiome sampling protocols were reviewed and synthesized. Precautions across sampling protocols were also noted. Results Oral, vaginal, gut, placental, and breastmilk are viable sources for sampling the maternal and/or child microbiome. Prior to sampling special considerations need to be addressed related to various factors including current medications, health status, and hygiene practices. Proper storage of samples will avoid degradation of cellular and DNA structures vital for analysis. Discussion Changes in the microbiome throughout the perinatal, postpartum and childhood periods are dramatic and significant to outcomes of the pregnancy and the long-term health of mother and child. Proper sampling techniques are required to produce reliable results from which evidence-based practice recommendations will be built. Ethical and practical issues surrounding study design and protocol development must also be considered when researching vulnerable groups such as pregnant women and infants. Nurses hold the responsibility to both perform the research and to translate findings from microbiome investigations for clinical use. PMID:28252577

  19. Compact Modbus TCP/IP protocol for data acquisition systems based on limited hardware resources

    NASA Astrophysics Data System (ADS)

    Bai, Q.; Jin, B.; Wang, D.; Wang, Y.; Liu, X.

    2018-04-01

    The Modbus TCP/IP has been a standard industry communication protocol and widely utilized for establishing sensor-cloud platforms on the Internet. However, numerous existing data acquisition systems built on traditional single-chip microcontrollers without sufficient resources cannot support it, because the complete Modbus TCP/IP protocol always works dependent on a full operating system which occupies abundant hardware resources. Hence, a compact Modbus TCP/IP protocol is proposed in this work to make it run efficiently and stably even on a resource-limited hardware platform. Firstly, the Modbus TCP/IP protocol stack is analyzed and the refined protocol suite is rebuilt by streamlining the typical TCP/IP suite. Then, specific implementation of every hierarchical layer is respectively presented in detail according to the protocol structure. Besides, the compact protocol is implemented in a traditional microprocessor to validate the feasibility of the scheme. Finally, the performance of the proposed scenario is assessed. The experimental results demonstrate that message packets match the frame format of Modbus TCP/IP protocol and the average bandwidth reaches to 1.15 Mbps. The compact protocol operates stably even based on a traditional microcontroller with only 4-kB RAM and 12-MHz system clock, and no communication congestion or frequent packet loss occurs.

  20. Measurement device-independent quantum dialogue

    NASA Astrophysics Data System (ADS)

    Maitra, Arpita

    2017-12-01

    Very recently, the experimental demonstration of quantum secure direct communication (QSDC) with state-of-the-art atomic quantum memory has been reported (Zhang et al. in Phys Rev Lett 118:220501, 2017). Quantum dialogue (QD) falls under QSDC where the secrete messages are communicated simultaneously between two legitimate parties. The successful experimental demonstration of QSDC opens up the possibilities for practical implementation of QD protocols. Thus, it is necessary to analyze the practical security issues of QD protocols for future implementation. Since the very first proposal for QD by Nguyen (Phys Lett A 328:6-10, 2004), a large number of variants and extensions have been presented till date. However, all of those leak half of the secret bits to the adversary through classical communications of the measurement results. In this direction, motivated by the idea of Lo et al. (Phys Rev Lett 108:130503, 2012), we propose a measurement device-independent quantum dialogue scheme which is resistant to such information leakage as well as side-channel attacks. In the proposed protocol, Alice and Bob, two legitimate parties, are allowed to prepare the states only. The states are measured by an untrusted third party who may himself behave as an adversary. We show that our protocol is secure under this adversarial model. The current protocol does not require any quantum memory, and thus, it is inherently robust against memory attacks. Such robustness might not be guaranteed in the QSDC protocol with quantum memory (Zhang et al. 2017).

Top