Difficult‐to‐control asthma management through the use of a specific protocol
Giavina‐Bianchi, Pedro; Aun, Marcelo Vivolo; Bisaccioni, Carla; Agondi, Rosana; Kalil, Jorge
2010-01-01
The present study is a critical review of difficult‐to‐control asthma, highlighting the characteristics and severity of the disease. It also presents a protocol for the management of patients with this asthma phenotype. The protocol, which was based on relevant studies in the literature, is described and analyzed. PMID:21049219
Security of the arbitrated quantum signature protocols revisited
NASA Astrophysics Data System (ADS)
Kejia, Zhang; Dan, Li; Qi, Su
2014-01-01
Recently, much attention has been paid to the study of arbitrated quantum signature (AQS). Among these studies, the cryptanalysis of some AQS protocols and a series of improved ideas have been proposed. Compared with the previous analysis, we present a security criterion, which can judge whether an AQS protocol is able to prevent the receiver (i.e. one participant in the signature protocol) from forging a legal signature. According to our results, it can be seen that most AQS protocols which are based on the Zeng and Keitel (ZK) model are susceptible to a forgery attack. Furthermore, we present an improved idea of the ZK protocol. Finally, some supplement discussions and several interesting topics are provided.
The Geneva Protocol of 1925: Past and Present.
ERIC Educational Resources Information Center
Harbison, John L.
1982-01-01
Presents a position paper for use in high school social studies class debates on the Geneva Protocol of 1925. The Protocol was an international agreement to restrict chemical and biological warfare (CBW). The author traces the history of U.S. policies dealing with CBW since 1925. (AM)
Guidelines and sample protocol for sampling forest gaps.
J.R. Runkle
1992-01-01
A protocol for sampling forest canopy gaps is presented. Methods used in published gap studies are reviewed. The sample protocol will be useful in developing a broader understanding of forest structure and dynamics through comparative studies across different forest ecosystems.
Hershberg, Julie A; Rose, Dorian K; Tilson, Julie K; Brutsch, Bettina; Correa, Anita; Gallichio, Joann; McLeod, Molly; Moore, Craig; Wu, Sam; Duncan, Pamela W; Behrman, Andrea L
2017-01-01
Despite efforts to translate knowledge into clinical practice, barriers often arise in adapting the strict protocols of a randomized, controlled trial (RCT) to the individual patient. The Locomotor Experience Applied Post-Stroke (LEAPS) RCT demonstrated equal effectiveness of 2 intervention protocols for walking recovery poststroke; both protocols were more effective than usual care physical therapy. The purpose of this article was to provide knowledge-translation tools to facilitate implementation of the LEAPS RCT protocols into clinical practice. Participants from 2 of the trial's intervention arms: (1) early Locomotor Training Program (LTP) and (2) Home Exercise Program (HEP) were chosen for case presentation. The two cases illustrate how the protocols are used in synergy with individual patient presentations and clinical expertise. Decision algorithms and guidelines for progression represent the interface between implementation of an RCT standardized intervention protocol and clinical decision-making. In each case, the participant presents with a distinct clinical challenge that the therapist addresses by integrating the participant's unique presentation with the therapist's expertise while maintaining fidelity to the LEAPS protocol. Both participants progressed through an increasingly challenging intervention despite their own unique presentation. Decision algorithms and exercise progression for the LTP and HEP protocols facilitate translation of the RCT protocol to the real world of clinical practice. The two case examples to facilitate translation of the LEAPS RCT into clinical practice by enhancing understanding of the protocols, their progression, and their application to individual participants.Video Abstract available for more insights from the authors (see Supplemental Digital Content 1, available at: http://links.lww.com/JNPT/A147).
Sutton, Paul; Vimalachandran, Dale; Poston, Graeme; Fenwick, Stephen; Malik, Hassan
2018-05-09
Colorectal cancer is the fourth commonest cancer and second commonest cause of cancer-related death in the United Kingdom. Almost 15% of patients have metastases on presentation. An increasing number of surgical strategies and better neoadjuvant treatment options are responsible for more patients undergoing resection of liver metastases, with prolonged survival in a select group of patients who present with synchronous disease. It is clear that the optimal strategy for the management of these patients remains unclear, and there is certainly a complete absence of Level 1 evidence in the literature. The objective of this study is to undertake preliminary work and devise an outline trial protocol to inform the future development of clinical studies to investigate the management of patients with liver limited stage IV colorectal cancer. We have undertaken some preliminary work and begun the process of designing a randomized controlled trial and present a draft trial protocol here. This study is at the protocol development stage only, and as such no results are available. There is no funding in place for this study, and no anticipated start date. We have presented preliminary work and an outline trial protocol which we anticipate will inform the future development of clinical studies to investigate the management of patients with liver limited stage IV colorectal cancer. We do not believe that the trial we have designed will answer the most significant clinical questions, nor that it is feasible to be delivered within the United Kingdom's National Health Service at this current time. ©Paul Sutton, Dale Vimalachandran, Graeme Poston, Stephen Fenwick, Hassan Malik. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 09.05.2018.
Presentation of Aural Stimuli to Newborns and Premature Infants: An Audiological Perspective.
Cassidy
1999-01-01
The purpose of this study was twofold: (a) to examine extant research in the field of music with premature and full term infants in order to identify protocols being used in the presentation of musical stimuli to neonates and (b) to use knowledge gleaned from audiology as a basis for suggesting a standardized protocol for use of musical stimuli with infants. Articles considered appropriate for inclusion in the analysis met the following criteria: (a) presented data for the effects of music on a dependent measure, (b) had subjects who were identified as either premature or term newborns receiving treatment after birth and prior to discharge from the hospital, and (c) used music for some or all of the aural stimuli. Articles (N = 20) were categorized by demographic information, types of aural stimuli, independent variables, dependent measures, and protocol used to present the musical stimuli. Of primary importance to this study was the protocol used in each study to present musical stimuli. Data regarding total duration of stimuli per day, longest duration of stimuli per day, method of stimuli presentation, placement of speakers, decibel level of stimuli, and where;he decibel level was measured reveal that there is no standard protocol being followed with regard to the presentation of aural stimuli. Recommendations include future research on (a) determining a minimum gestational age where music therapy may be appropriate, (b) determining the frequency spectrum perceived by a premature infant, (c) determining the decibel levels reaching the ear drum and assessing appropriate levels for minimum stimulation with maximum results, and (d) carefully considering the method of stimulus presentation as it will have an impact on the decibel level reaching the ear drum of these infants.
Two-party quantum key agreement protocols under collective noise channel
NASA Astrophysics Data System (ADS)
Gao, Hao; Chen, Xiao-Guang; Qian, Song-Rong
2018-06-01
Recently, quantum communication has become a very popular research field. The quantum key agreement (QKA) plays an important role in the field of quantum communication, based on its unconditional security in terms of theory. Among all kinds of QKA protocols, QKA protocols resisting collective noise are widely being studied. In this paper, we propose improved two-party QKA protocols resisting collective noise and present a feasible plan for information reconciliation. Our protocols' qubit efficiency has achieved 26.67%, which is the best among all the two-party QKA protocols against collective noise, thus showing that our protocol can improve the transmission efficiency of quantum key agreement.
Performing private database queries in a real-world environment using a quantum protocol.
Chan, Philip; Lucio-Martinez, Itzel; Mo, Xiaofan; Simon, Christoph; Tittel, Wolfgang
2014-06-10
In the well-studied cryptographic primitive 1-out-of-N oblivious transfer, a user retrieves a single element from a database of size N without the database learning which element was retrieved. While it has previously been shown that a secure implementation of 1-out-of-N oblivious transfer is impossible against arbitrarily powerful adversaries, recent research has revealed an interesting class of private query protocols based on quantum mechanics in a cheat sensitive model. Specifically, a practical protocol does not need to guarantee that the database provider cannot learn what element was retrieved if doing so carries the risk of detection. The latter is sufficient motivation to keep a database provider honest. However, none of the previously proposed protocols could cope with noisy channels. Here we present a fault-tolerant private query protocol, in which the novel error correction procedure is integral to the security of the protocol. Furthermore, we present a proof-of-concept demonstration of the protocol over a deployed fibre.
Performing private database queries in a real-world environment using a quantum protocol
Chan, Philip; Lucio-Martinez, Itzel; Mo, Xiaofan; Simon, Christoph; Tittel, Wolfgang
2014-01-01
In the well-studied cryptographic primitive 1-out-of-N oblivious transfer, a user retrieves a single element from a database of size N without the database learning which element was retrieved. While it has previously been shown that a secure implementation of 1-out-of-N oblivious transfer is impossible against arbitrarily powerful adversaries, recent research has revealed an interesting class of private query protocols based on quantum mechanics in a cheat sensitive model. Specifically, a practical protocol does not need to guarantee that the database provider cannot learn what element was retrieved if doing so carries the risk of detection. The latter is sufficient motivation to keep a database provider honest. However, none of the previously proposed protocols could cope with noisy channels. Here we present a fault-tolerant private query protocol, in which the novel error correction procedure is integral to the security of the protocol. Furthermore, we present a proof-of-concept demonstration of the protocol over a deployed fibre. PMID:24913129
Prigoff, Jake G; Swain, Gary W; Divino, Celia M
2016-05-01
Predicting the presence of a persistent common bile duct (CBD) stone is a difficult and expensive task. The aim of this study is to determine if a previously described protocol-based scoring system is a cost-effective strategy. The protocol includes all patients with gallstone pancreatitis and stratifies them based on laboratory values and imaging to high, medium, and low likelihood of persistent stones. The patient's stratification then dictates the next course of management. A decision analytic model was developed to compare the costs for patients who followed the protocol versus those that did not. Clinical data model inputs were obtained from a prospective study conducted at The Mount Sinai Medical Center to validate the protocol from Oct 2009 to May 2013. The study included all patients presenting with gallstone pancreatitis regardless of disease severity. Seventy-three patients followed the proposed protocol and 32 did not. The protocol group cost an average of $14,962/patient and the non-protocol group cost $17,138/patient for procedural costs. Mean length of stay for protocol and non-protocol patients was 5.6 and 7.7 days, respectively. The proposed protocol is a cost-effective way to determine the course for patients with gallstone pancreatitis, reducing total procedural costs over 12 %.
Subconscious Visual Cues during Movement Execution Allow Correct Online Choice Reactions
Leukel, Christian; Lundbye-Jensen, Jesper; Christensen, Mark Schram; Gollhofer, Albert; Nielsen, Jens Bo; Taube, Wolfgang
2012-01-01
Part of the sensory information is processed by our central nervous system without conscious perception. Subconscious processing has been shown to be capable of triggering motor reactions. In the present study, we asked the question whether visual information, which is not consciously perceived, could influence decision-making in a choice reaction task. Ten healthy subjects (28±5 years) executed two different experimental protocols. In the Motor reaction protocol, a visual target cue was shown on a computer screen. Depending on the displayed cue, subjects had to either complete a reaching movement (go-condition) or had to abort the movement (stop-condition). The cue was presented with different display durations (20–160 ms). In the second Verbalization protocol, subjects verbalized what they experienced on the screen. Again, the cue was presented with different display durations. This second protocol tested for conscious perception of the visual cue. The results of this study show that subjects achieved significantly more correct responses in the Motor reaction protocol than in the Verbalization protocol. This difference was only observed at the very short display durations of the visual cue. Since correct responses in the Verbalization protocol required conscious perception of the visual information, our findings imply that the subjects performed correct motor responses to visual cues, which they were not conscious about. It is therefore concluded that humans may reach decisions based on subconscious visual information in a choice reaction task. PMID:23049749
Detailed analysis of routing protocols with different network limitations
NASA Astrophysics Data System (ADS)
Masood, Mohsin; Abuhelala, Mohamed; Glesk, Ivan
2016-12-01
In network communication field, routing protocols have got a significant role which are not only used in networks to handle the user data but also to monitor the different network environments. Dynamic routing protocols such as OSPF, EIGRP and RIP are used for forwarding user data to its destination by instantly detecting the dynamic changes across the network. The dynamic changes in the network can be in the form of topological changes, congestions, links failure etc. Therefore, it becomes a challenge to develop and implement dynamic routing protocols that fulfills the network requirements. Hence, each routing protocol has its own characteristics such as convergence activity, routing metric, routing table etc. and will perform differently in various network environments. This paper presents a comprehensive study of static and dynamic routing, along with dynamic routing protocols. Experiments that are conducted under various network limitations are presented using the OPNET tool. The performance of each of dynamic routing protocols are monitored and explained in the form of simulated results using network parameters. The results are analyzed, in order to provide a clear understanding of each protocol performance for the selection of the proper protocol for a given network environment.
How to write a surgical clinical research protocol: literature review and practical guide.
Rosenthal, Rachel; Schäfer, Juliane; Briel, Matthias; Bucher, Heiner C; Oertli, Daniel; Dell-Kuster, Salome
2014-02-01
The study protocol is the core document of every clinical research project. Clinical research in studies involving surgical interventions presents some specific challenges, which need to be accounted for and described in the study protocol. The aim of this review is to provide a practical guide for developing a clinical study protocol for surgical interventions with a focus on methodologic issues. On the basis of an in-depth literature search of methodologic literature and on some cardinal published surgical trials and observational studies, the authors provides a 10-step guide for developing a clinical study protocol in surgery. This practical guide outlines key methodologic issues important when planning an ethically and scientifically sound research project involving surgical interventions, with the ultimate goal of providing high-level evidence relevant for health care decision making in surgery. Copyright © 2014 Elsevier Inc. All rights reserved.
Dodd-McCue, Diane; Tartaglia, Alexander
2005-01-01
The Family Communication Coordinator (FCC) Protocol was implemented to provide early family intervention and to facilitate effective communications during potential organ donation cases. Previous studies found the Protocol associated with improved donor outcome measures and with reduced role stress for ICU nurses caring for potential donors. The present study examines the impact of the Protocol on the perceived role stress of hospital chaplains serving as FCCs. All hospital chaplains serving as FCCs at an academic teaching hospital were surveyed. Their perceptions of job dimensions, role stress, job satisfaction, and commitment were measured; interviews and secondary data supplemented the surveys. The findings demonstrate that the FCC Protocol is associated with improved role stress, specifically role ambiguity and role conflict, among hospital chaplains serving as FCCs. Additionally, the findings suggest that satisfaction with the Protocol may be associated with experience with the Protocol.
The covert channel over HTTP protocol
NASA Astrophysics Data System (ADS)
Graniszewski, Waldemar; Krupski, Jacek; Szczypiorski, Krzysztof
2016-09-01
The paper presents a new steganographic method - the covert channel is created over HTTP protocol header, i.e. trailer field. HTTP protocol is one of the most frequently used in the Internet. The popularity of the Web servers and network traffic from, and to them, is one of the requirements for undetectable message exchange. To study this kind of the information hiding technique an application in Javascript language based on the Node.js framework was written. The results of the experiment that was performed to send a message in the covert channel are also presented.
Implementation of lung cancer CT screening in the Nordic countries.
Pedersen, Jesper Holst; Sørensen, Jens Benn; Saghir, Zaigham; Fløtten, Øystein; Brustugun, Odd Terje; Ashraf, Haseem; Strand, Trond-Eirik; Friesland, Signe; Koyi, Hirsh; Ek, Lars; Nyrén, Sven; Bergman, Per; Jekunen, Antti; Nieminen, Eeva-Maija; Gudbjartsson, Tomas
2017-10-01
We review the current knowledge of CT screening for lung cancer and present an expert-based, joint protocol for the proper implementation of screening in the Nordic countries. Experts representing all the Nordic countries performed literature review and concensus for a joint protocol for lung cancer screening. Areas of concern and caution are presented and discussed. We suggest to perform CT screening pilot studies in the Nordic countries in order to gain experience and develop specific and safe protocols for the implementation of such a program.
Maximizing Interhospital Transfer Resources for Neurosurgical Patients.
Schnurman, Zane; Chin, Robert; Fishkin, Edward R; Huang, Paul P
2017-08-01
Delays in patient transfers are associated with worse outcomes for some neurosurgical conditions. One of the primary causes of transfer delay is lack of neurosurgery intensive care unit bed availability. In the present study, we characterize the results of implementing an interhospital transfer protocol to reduce unnecessary transfers and improve bed availability. A transfer protocol was implemented in July 2012 at the Bellevue Hospital Department of Neurosurgery that screened for and prevented transfer of low-risk patients who were unlikely to require specialized inpatient neurosurgical care. The impact of this protocol was assessed with prospectively recorded data on all potential interhospital transfers from May 2011 through June 2016. Of the 1978 calls (regarding 1886 individual patients), 402 occurred before the implementation of the transfer protocol and 1576 occurred after. Before the protocol, 84.1% of transfer requests were accepted, but 15.2% were subsequently denied for bed unavailability. After the protocol, a smaller share of transfer requests were accepted after protocol screening (71.8%, P < 0.001), but only 1.9% (P < 0.001) were subsequently denied because of bed unavailability. The diagnosis demographics changed significantly (P < 0.001), with a larger share of arriving transfers suffering from aneurysms or tumors after the protocol and a smaller share suffering from stenosis/disc disease without neurological symptoms. The transfer protocol implemented in the present study allowed transfer determination based on the need for specialized neurosurgical care rather than chance unavailability of beds. Developing interhospital transfer protocols may be an effective strategy to efficiently allocate limited hospital resources and improve transfer systems. Copyright © 2017 Elsevier Inc. All rights reserved.
An improved ATAC-seq protocol reduces background and enables interrogation of frozen tissues.
Corces, M Ryan; Trevino, Alexandro E; Hamilton, Emily G; Greenside, Peyton G; Sinnott-Armstrong, Nicholas A; Vesuna, Sam; Satpathy, Ansuman T; Rubin, Adam J; Montine, Kathleen S; Wu, Beijing; Kathiria, Arwa; Cho, Seung Woo; Mumbach, Maxwell R; Carter, Ava C; Kasowski, Maya; Orloff, Lisa A; Risca, Viviana I; Kundaje, Anshul; Khavari, Paul A; Montine, Thomas J; Greenleaf, William J; Chang, Howard Y
2017-10-01
We present Omni-ATAC, an improved ATAC-seq protocol for chromatin accessibility profiling that works across multiple applications with substantial improvement of signal-to-background ratio and information content. The Omni-ATAC protocol generates chromatin accessibility profiles from archival frozen tissue samples and 50-μm sections, revealing the activities of disease-associated DNA elements in distinct human brain structures. The Omni-ATAC protocol enables the interrogation of personal regulomes in tissue context and translational studies.
Xrootd in dCache - design and experiences
NASA Astrophysics Data System (ADS)
Behrmann, Gerd; Ozerov, Dmitry; Zangerl, Thomas
2011-12-01
dCache is a well established distributed storage solution used in both high energy physics computing and other disciplines. An overview of the implementation of the xrootd data access protocol within dCache is presented. The performance of various access mechanisms is studied and compared and it is concluded that our implementation is as perfomant as other protocols. This makes dCache a compelling alternative to the Scalla software suite implementation of xrootd, with added value from broad protocol support, including the IETF approved NFS 4.1 protocol.
Performance evaluation of reactive and proactive routing protocol in IEEE 802.11 ad hoc network
NASA Astrophysics Data System (ADS)
Hamma, Salima; Cizeron, Eddy; Issaka, Hafiz; Guédon, Jean-Pierre
2006-10-01
Wireless technology based on the IEEE 802.11 standard is widely deployed. This technology is used to support multiple types of communication services (data, voice, image) with different QoS requirements. MANET (Mobile Adhoc NETwork) does not require a fixed infrastructure. Mobile nodes communicate through multihop paths. The wireless communication medium has variable and unpredictable characteristics. Furthermore, node mobility creates a continuously changing communication topology in which paths break and new one form dynamically. The routing table of each router in an adhoc network must be kept up-to-date. MANET uses Distance Vector or Link State algorithms which insure that the route to every host is always known. However, this approach must take into account the adhoc networks specific characteristics: dynamic topologies, limited bandwidth, energy constraints, limited physical security, ... Two main routing protocols categories are studied in this paper: proactive protocols (e.g. Optimised Link State Routing - OLSR) and reactive protocols (e.g. Ad hoc On Demand Distance Vector - AODV, Dynamic Source Routing - DSR). The proactive protocols are based on periodic exchanges that update the routing tables to all possible destinations, even if no traffic goes through. The reactive protocols are based on on-demand route discoveries that update routing tables only for the destination that has traffic going through. The present paper focuses on study and performance evaluation of these categories using NS2 simulations. We have considered qualitative and quantitative criteria. The first one concerns distributed operation, loop-freedom, security, sleep period operation. The second are used to assess performance of different routing protocols presented in this paper. We can list end-to-end data delay, jitter, packet delivery ratio, routing load, activity distribution. Comparative study will be presented with number of networking context consideration and the results show the appropriate routing protocol for two kinds of communication services (data and voice).
Game-theoretic perspective of Ping-Pong protocol
NASA Astrophysics Data System (ADS)
Kaur, Hargeet; Kumar, Atul
2018-01-01
We analyse Ping-Pong protocol from the point of view of a game. The analysis helps us in understanding the different strategies of a sender and an eavesdropper to gain the maximum payoff in the game. The study presented here characterizes strategies that lead to different Nash equilibriums. We further demonstrate the condition for Pareto optimality depending on the parameters used in the game. Moreover, we also analysed LM05 protocol and compared it with PP protocol from the point of view of a generic two-way QKD game with or without entanglement. Our results provide a deeper understanding of general two-way QKD protocols in terms of the security and payoffs of different stakeholders in the protocol.
Privacy-Preserving Health Data Collection for Preschool Children
Zhang, Yuan; Ji, Yue
2013-01-01
With the development of network technology, more and more data are transmitted over the network and privacy issues have become a research focus. In this paper, we study the privacy in health data collection of preschool children and present a new identity-based encryption protocol for privacy protection. The background of the protocol is as follows. A physical examination for preschool children is needed every year out of consideration for the children's health. After the examination, data are transmitted through the Internet to the education authorities for analysis. In the process of data collection, it is unnecessary for the education authorities to know the identities of the children. Based on this, we designed a privacy-preserving protocol, which delinks the children's identities from the examination data. Thus, the privacy of the children is preserved during data collection. We present the protocol in detail and prove the correctness of the protocol. PMID:24285984
Privacy-preserving health data collection for preschool children.
Guan, Shaopeng; Zhang, Yuan; Ji, Yue
2013-01-01
With the development of network technology, more and more data are transmitted over the network and privacy issues have become a research focus. In this paper, we study the privacy in health data collection of preschool children and present a new identity-based encryption protocol for privacy protection. The background of the protocol is as follows. A physical examination for preschool children is needed every year out of consideration for the children's health. After the examination, data are transmitted through the Internet to the education authorities for analysis. In the process of data collection, it is unnecessary for the education authorities to know the identities of the children. Based on this, we designed a privacy-preserving protocol, which delinks the children's identities from the examination data. Thus, the privacy of the children is preserved during data collection. We present the protocol in detail and prove the correctness of the protocol.
Scheer, U; Schellong, G; Riehm, H
1979-03-01
Between October 1974 and October 1978 23 children with acute myelocytic leucemia (AML) received intensive therapy in the Univ.-Kinderklinik Münster: 4 children were treated according to the ALGB-protocol consisting of 5-7 day courses of ARA-C-infusion and 3 DNR-injections. 19 patients received the West-Berlin-protocol: The first 7 the original ALL protocol, 11 the modified form of AML, which will be presented here as AML-therapy-study BFM 78. 4 of the 23 patients died with early acute cerebral bleeding. 2 patients were nonresponders. 17 children went into remission. One girl died in remission of septicemic aspergillosis. 4 children had a relapse. In November 1978 there were still 12 patients in continuous complete remission, 3 of them already without therapy. 13 of the 19 patients, who were treated with the West-Berlin-protocol went into remission. 1 had a relapse. At present there are 11 patients in continuous complete remission. The above results and those found in the literature could signify that the long term prognosis of children with AML will be improved. To coordinate efforts toward this goal a cooperative AML-therapy-study in the "Deutsche Arbeitsgemeinschaft für Leukämieforschung" (BFM-group) using the here presented therapy protocol was formed in November 1978.
Thomas V. Dietsch
2005-01-01
This study presents a protocol developed to rapidly assess ectoparasite prevalence and intensity. Using this protocol during a mist-netting project in two different coffee agroecosystems in Chiapas, Mexico, data were collected on ectoparasitic chigger mite larvae (Acarina: Trombiculidae) found on resident and migratory birds. Surprisingly high infestation rates were...
Hensel, Kendi L; Carnes, Michael S; Stoll, Scott T
2016-11-01
The structural and physiologic changes in a woman's body during pregnancy can predispose pregnant women to low back pain and its associated disability, as well as to complications of pregnancy, labor, and delivery. Anecdotal and empirical evidence has indicated that osteopathic manipulative treatment (OMT) may be efficacious in improving pain and functionality in women who are pregnant. Based on that premise, the Pregnancy Research on Osteopathic Manipulation Optimizing Treatment Effects (PROMOTE) study was designed as a prospective, randomized, placebo-controlled, and blinded clinical trial to evaluate the efficacy of an OMT protocol for pain during third-trimester pregnancy. The OMT protocol developed for the PROMOTE study was based on physiologic theory and the concept of the interrelationship of structure and function. The 12 well-defined, standardized OMT techniques used in the protocol are commonly taught at osteopathic medical schools in the United States. These techniques can be easily replicated as a 20-minute protocol applied in conjunction with usual prenatal care, thus making it feasible to implement into clinical practice. This article presents an overview of the study design and treatment protocols used in the PROMOTE study.
Energy-Aware RFID Anti-Collision Protocol.
Arjona, Laura; Simon, Hugo Landaluce; Ruiz, Asier Perallos
2018-06-11
The growing interest in mobile devices is transforming wireless identification technologies. Mobile and battery-powered Radio Frequency Identification (RFID) readers, such as hand readers and smart phones, are are becoming increasingly attractive. These RFID readers require energy-efficient anti-collision protocols to minimize the tag collisions and to expand the reader's battery life. Furthermore, there is an increasing interest in RFID sensor networks with a growing number of RFID sensor tags. Thus, RFID application developers must be mindful of tag anti-collision protocols. Energy-efficient protocols involve a low reader energy consumption per tag. This work presents a thorough study of the reader energy consumption per tag and analyzes the main factor that affects this metric: the frame size update strategy. Using the conclusion of this analysis, the anti-collision protocol Energy-Aware Slotted Aloha (EASA) is presented to decrease the energy consumption per tag. The frame size update strategy of EASA is configured to minimize the energy consumption per tag. As a result, EASA presents an energy-aware frame. The performance of the proposed protocol is evaluated and compared with several state of the art Aloha-based anti-collision protocols based on the current RFID standard. Simulation results show that EASA, with an average of 15 mJ consumed per tag identified, achieves a 6% average improvement in the energy consumption per tag in relation to the strategies of the comparison.
Berman, D Wayne
2011-08-01
Given that new protocols for assessing asbestos-related cancer risk have recently been published, questions arise concerning how they compare to the "IRIS" protocol currently used by regulators. The newest protocols incorporate findings from 20 additional years of literature. Thus, differences between the IRIS and newer Berman and Crump protocols are examined to evaluate whether these protocols can be reconciled. Risks estimated by applying these protocols to real exposure data from both laboratory and field studies are also compared to assess the relative health protectiveness of each protocol. The reliability of risks estimated using the two protocols are compared by evaluating the degree with which each potentially reproduces the known epidemiology study risks. Results indicate that the IRIS and Berman and Crump protocols can be reconciled; while environment-specific variation within fiber type is apparently due primarily to size effects (not addressed by IRIS), the 10-fold (average) difference between amphibole asbestos risks estimated using each protocol is attributable to an arbitrary selection of the lowest of available mesothelioma potency factors in the IRIS protocol. Thus, the IRIS protocol may substantially underestimate risk when exposure is primarily to amphibole asbestos. Moreover, while the Berman and Crump protocol is more reliable than the IRIS protocol overall (especially for predicting amphibole risk), evidence is presented suggesting a new fiber-size-related adjustment to the Berman and Crump protocol may ultimately succeed in reconciling the entire epidemiology database. However, additional data need to be developed before the performance of the adjusted protocol can be fully validated. © 2011 Society for Risk Analysis.
Peres, Marco A.; Peres, Karen G.; Cascaes, Andreia M.; Correa, Marcos B.; Demarco, Flávio F.; Hallal, Pedro C.; Horta, Bernardo L.; Gigante, Denise P.; Menezes, Ana B.
2012-01-01
Background Most studies comparing prevalence of periodontal disease and risk factors by using partial protocols were performed in adult populations, with several studies being conducted in clinical settings. The aim of this study is to assess the accuracy of partial protocols in estimating the prevalence of periodontal outcomes in adolescents and young adults from two population-based birth cohorts from Pelotas, Brazil, and to assess differences in the estimation and strength of the effect measures when partial protocols are adopted compared to full-mouth examination. Methods Gingival bleeding at probing among adolescents (n = 339) and young adults (n = 720) and dental calculus and periodontal probing depth among young adults were assessed using full-mouth examinations and four partial protocols: Ramfjord teeth (RT), community periodontal index (CPI), and two random diagonal quadrants (1 and 3, 2 and 4). Socioeconomic, demographic, and periodontal health-related variables were also collected. Sensitivity, absolute and relative bias, and inflation factors were calculated. Prevalence ratio for each periodontal outcome for the risk factors was estimated. Results Two diagonal quadrants showed better accuracy; RT had the worst, whereas CPI presented an intermediate pattern when compared to full-mouth examination. For bleeding assessment in adolescence, RT and CPI underestimated by 18.4% and 16.2%, respectively, the true outcome prevalence, whereas among young adults, all partial protocols underestimated the prevalence. All partial protocols presented similar magnitude of association measures for all investigated periodontal potential risk factors. Conclusion Two diagonal quadrants protocol may be effective in identifying the risk factors for the most relevant periodontal outcomes in adolescence and in young adulthood. PMID:21859320
Peres, Marco A; Peres, Karen G; Cascaes, Andreia M; Correa, Marcos B; Demarco, Flávio F; Hallal, Pedro C; Horta, Bernardo L; Gigante, Denise P; Menezes, Ana B
2012-03-01
Most studies comparing prevalence of periodontal disease and risk factors by using partial protocols were performed in adult populations, with several studies being conducted in clinical settings. The aim of this study is to assess the accuracy of partial protocols in estimating the prevalence of periodontal outcomes in adolescents and young adults from two population-based birth cohorts from Pelotas, Brazil, and to assess differences in the estimation and strength of the effect measures when partial protocols are adopted compared to full-mouth examination. Gingival bleeding at probing among adolescents (n = 339) and young adults (n = 720) and dental calculus and periodontal probing depth among young adults were assessed using full-mouth examinations and four partial protocols: Ramfjord teeth (RT), community periodontal index (CPI), and two random diagonal quadrants (1 and 3, 2 and 4). Socioeconomic, demographic, and periodontal health-related variables were also collected. Sensitivity, absolute and relative bias, and inflation factors were calculated. Prevalence ratio for each periodontal outcome for the risk factors was estimated. Two diagonal quadrants showed better accuracy; RT had the worst, whereas CPI presented an intermediate pattern when compared to full-mouth examination. For bleeding assessment in adolescence, RT and CPI underestimated by 18.4% and 16.2%, respectively, the true outcome prevalence, whereas among young adults, all partial protocols underestimated the prevalence. All partial protocols presented similar magnitude of association measures for all investigated periodontal potential risk factors. Two diagonal quadrants protocol may be effective in identifying the risk factors for the most relevant periodontal outcomes in adolescence and in young adulthood.
Pisu, Maria Carmela; Ponzio, Patrizia; Rovella, Chiara; Baravalle, Michela; Veronesi, Maria Cristina
2017-10-01
Objectives Although less often requested in comparison with dogs, the collection of semen in cats can be necessary for artificial insemination, for semen evaluation in tom cats used for breeding and for semen storage. Urethral catheterisation after pharmacological induction with medetomidine has proved to be useful for the collection of semen in domestic cats. However, most of the previously used protocols require the administration of high doses of medetomidine that can increase the risk of side effects, especially on the cardiovascular system. In routine clinical practice, one safe and useful injectable anaesthetic protocol for short-term clinical investigations or surgery in cats involves premedication with low intramuscular doses of dexmedetomidine with methadone, followed by intravenous propofol bolus injection. We aimed to assess the usefulness of this injectable anaesthetic protocol for semen collection, via urethral catheterisation, in domestic cats. Methods The study was performed on 38 purebred, adult cats, during the breeding season, and semen was collected via urethral catheterisation using an injectable anaesthesia protocol with methadone (0.2 mg/kg) and dexmedetomidine (5 µg/kg) premedication, followed by induction with propofol. Results The anaesthetic protocol used in the present study allowed the collection of large-volume semen samples, characterised by good parameters and without side effects. Conclusions and relevance The results from the present study suggest that the injectable anaesthetic protocol using methadone and dexmedetomidine premedication, followed by induction with propofol, could be suitable and safe for the collection of a good-quality semen sample, via urethral catheterisation, in domestic cats. It can therefore be used as an alternative to previous medetomidine-based sedation protocols.
Practical State Machine Replication with Confidentiality
DOE Office of Scientific and Technical Information (OSTI.GOV)
Duan, Sisi; Zhang, Haibin
2016-01-01
We study how to enable arbitrary randomized algorithms in Byzantine fault-tolerant (BFT) settings. We formalize a randomized BFT protocol and provide a simple and efficient construction that can be built on any existing BFT protocols while adding practically no overhead. We go one step further to revisit a confidential BFT protocol (Yin et al., SOSP '03). We show that their scheme is potentially susceptible to safety and confidentiality attacks. We then present a new protocol that is secure in the stronger model we formalize, by extending the idea of a randomized BFT protocol. Our protocol uses only efficient symmetric cryptography,more » while Yin et al.'s uses costly threshold signatures. We implemented and evaluated our protocols on microbenchmarks and real-world use cases. We show that our randomized BFT protocol is as efficient as conventional BFT protocols, and our confidential BFT protocol is two to three orders of magnitude faster than Yin et al.'s, which is less secure than ours.« less
Piek, Christine J; van Spil, Willem Evert; Junius, Greet; Dekker, Aldo
2011-04-13
Azathioprine is used as an immunosuppressant in canine immune-mediated hemolytic anemia (IMHA), but this potentially toxic and carcinogenic drug has not been proven to be beneficial. The aim of this study was to determine the difference in outcome and survival of dogs with idiopathic IMHA treated with a protocol that included azathioprine and prednisolone versus a protocol that included prednisolone alone. The study included 222 dogs with a hematocrit lower than 0.30 L/L and either a positive Coombs' test or spherocytosis and no evidence of diseases that could trigger IMHA. The clinical and laboratory data at the time of diagnosis and the response to therapy and survival were compared in dogs treated according to the prednisolone and azathioprine protocol (AP protocol; n = 149) and dogs treated according to the prednisolone protocol (P protocol; n = 73). At study entry, the two groups were comparable, except that thrombocyte counts were significantly lower and clinical signs had been present significantly longer in the AP protocol group. No significant difference in survival was found between the two groups: the 1-year survival was 64% (95% CI 54 - 77%) in the P protocol group and 69% (95% CI 59-80%) in the AP protocol group, respectively. Azathioprine would appear not to be beneficial as standard treatment for all cases of IMHA; however, a blinded, randomized clinical trial is needed to establish whether outcome is different with the two treatment protocols.
A study of battered women presenting in an emergency department.
McLeer, S V; Anwar, R
1989-01-01
Medical records of female trauma patients were retrospectively reviewed prior to introducing a protocol for enhancing identification of battered women; 5.6 per cent of 359 female trauma patients were identified as having injuries caused by battering; 30 per cent of 412 patients following use of the protocol were so identified. Standardized protocols for identifying battered women among female trauma patients should be instituted in emergency departments. PMID:2909183
Kubo, Keitaro; Kanehisa, Hiroaki; Fukunaga, Tetsuo
2001-01-01
The present study aimed to investigate the influence of isometric training protocols with long- and short-duration contractions on the elasticity of human tendon structures in vivo. The elasticity was assessed through in vivo determination of the elongation (L) of the tendons and aponeuroses using ultrasonography, while the subjects performed ramp isometric exercise up to maximum voluntary contraction (MVC).Eight young males completed 12 weeks (4 days per week) of a unilateral isometric training programme on knee extensors, which consisted of two different combinations of contraction and relaxation times at 70 % MVC: one leg was trained using a short-duration protocol (3 sets of 50 repetitions of contraction for 1 s and relaxation for 2 s), and the other leg was trained using a long-duration protocol (4 sets of a combination of contraction for 20 s and relaxation for 1 min). The training volume per session, expressed as the integrated torque, was the same for the two protocols.Both protocols resulted in a significant increase in MVC: 31.8 ± 17.2 % for the short-duration protocol and 33.9 ± 14.4 % for the long-duration protocol. Moreover, the training produced significant increases in the muscle volume of the constituents of the quadriceps femoris, with similar relative gains for the two protocols: 7.4 ± 3.9 % for the short-duration protocol and 7.6 ± 4.3 % for the long-duration protocol.The short-duration protocol produced no significant change in L values at any of the force production levels. For the long-duration protocol, however, the L values above 550 N were significantly shorter after training. Analysis revealed that the group × test time interaction effect on tendon stiffness was significant. Stiffness increased significantly for the long-duration protocol, but not for the short-duration protocol.The present study demonstrates a greater increase in stiffness of human tendon structures following isometric training using longer duration contractions compared to shorter contractions. This suggests that the changes in the elasticity of the tendon structures after resistance training may be affected by the duration of muscle contraction. PMID:11600697
Tousignant, M; Tougas, G; Rossignol, M; Goulet, L
2002-04-01
At present there is no systematic observation protocol for the assessment of the multi-factorial aspects of physical exposure related to the back used within the constraints of occupational epidemiological research. In this context, a new preliminary systematic observation protocol is proposed to assess exposure to physical loading of the back using nine categories of physical risk factors: the SOPE back protocol. The objective of this study was to investigate whether the new protocol can correctly identify the level of exposure related to measured physical loading of the back. The subjects of this closed cohort study were 451 manual workers at a natural gas distribution company. The assessment of exposure was made with the protocol using groups with different job titles. The workers were followed for a 2 yr period to establish the risk of a new occurrence of complete disability related to the back (NOCD back injury) in each job grouping. Based on the median of the total scores derived from the protocol, two levels of exposure were identified (high and low). Taking into account the limitations of this study, the protocol in development may be a good tool to establish two levels of exposure to physical loading of the back in large epidemiological studies of occupational low back pain. Further research is needed to replicate these results with larger samples and to test the reliability and predictive validity of the protocol.
Kollara, Lakshmi; Schenck, Graham; Jaskolka, Michael; Perry, Jamie L
2017-04-14
To date, no studies have imaged the velopharynx in children with 22q11.2 deletion syndrome (22q11.2 DS) without the use of sedation. Dysmorphology in velopharyngeal structures has been shown to have significant negative implications on speech among these individuals. This single case study was designed to assess the feasibility of a child-friendly magnetic resonance imaging (MRI) scanning protocol in this clinically challenging population and to determine the utility of this MRI protocol for future work in this area. One 6-year-old White girl diagnosed with 22q11.2 DS was imaged using a child-friendly, nonsedated MRI protocol. Quantitative and qualitative measures of the velopharyngeal area and associated structures were evaluated, and comparisons were made to age-matched control subjects with normal velopharyngeal anatomy. MRI data were successfully obtained using the child-friendly scanning protocol in the subject in the present study. Quantitative and qualitative differences of the levator muscle and associated velopharyngeal structures were noted. Using these MRI and structural analyses methods, insights related to muscle morphology can be obtained and considered as part of the research and clinical examination of children with 22q11.2 DS. The imaging protocol described in this study presents an effective means to counteract difficulties in imaging young children.
Reis, Joana; Portugal, Ana Maria; Fernandes, Luís; Afonso, Nuno; Pereira, Mariana; Sousa, Nuno; Dias, Nuno S.
2016-01-01
The present study tested the effects of an intensive and short alpha and theta neurofeedback (NF) protocol in working memory (WM) performance in a healthy elder population and explored the effects of a multimodal approach, by supplementing NF with cognitive tasks. Participants were allocated to four groups: NF (N = 9); neurofeedback supplemented with cognitive training (NFCT) (N = 8); cognitive training (CT) (N = 7) and sham neurofeedback (Sham-NF) (N = 6). The intervention consisted in 30-min sessions for 8 days. The NF group presented post intervention increases of alpha and theta relative power as well as performance in the matrix rotation task. In addition, a successful up training of frontal theta showed positive correlation with an improvement of post-training alpha and a better performance in the matrix rotation task. The results presented herein suggest that an intensive and short NF protocol enables elders to learn alpha and theta self-modulation and already presents moderate improvements in cognition and basal EEG. Also, CT group showed moderate performance gains on the cognitive tasks used during the training sessions but no clear improvements on neurophysiology and behavioral measurements were observed. This study represents a first attempt to study the effects of an intensive and short NF protocol in WM performance of elders. The evidence presented here suggests that an intensive and short NF intervention could be a valid alternative for introduction of older populations to NF methodologies. PMID:27458369
Automatic image hanging protocol for chest radiographs in PACS.
Luo, Hui; Hao, Wei; Foos, David H; Cornelius, Craig W
2006-04-01
Chest radiography is one of the most widely used techniques in diagnostic imaging. It comprises at least one-third of all diagnostic radiographic procedures in hospitals. However, in the picture archive and communication system, images are often stored with the projection and orientation unknown or mislabeled, which causes inefficiency for radiologists' interpretation. To address this problem, an automatic hanging protocol for chest radiographs is presented. The method targets the most effective region in a chest radiograph, and extracts a set of size-, rotation-, and translation-invariant features from it. Then, a well-trained classifier is used to recognize the projection. The orientation of the radiograph is later identified by locating the neck, heart, and abdomen positions in the radiographs. Initial experiments are performed on the radiographs collected from daily routine chest exams in hospitals and show promising results. Using the presented protocol, 98.2% of all cases could be hung correctly on projection view (without protocol, 62%), and 96.1% had correct orientation (without protocol, 75%). A workflow study on the protocol also demonstrates a significant improvement in efficiency for image display.
Comparison of Physiological and Perceptual Responses Between Continuous and Intermittent Cycling
Brasil, Roxana M.; Barreto, Ana C.; Nogueira, Leandro; Santos, Edil; Novaes, Jefferson S.; Reis, Victor M.
2011-01-01
The present study tested the hypothesis that the exercise protocol (continuous vs. intermittent) would affect the physiological response and the perception of effort during aquatic cycling. Each protocol was divided on four stages. Heart rate, arterial blood pressure, blood lactate concentration, central and peripheral rate of perceived exertion were collected in both protocols in aquatic cycling in 10 women (values are mean ± SD): age=32.8 ± 4.8 years; height=1.62 ± 0.05 cm; body mass=61.60 ± 5.19 kg; estimated body fat=27.13 ± 4.92%. Protocols were compared through two way ANOVA with Scheffé’s post-hoc test and the test of Mann- Whitney for rate of perceived exertion with α=0.05. No systematic and consistent differences in heart rate, arterial blood pressure, double product and blood lactate concentration were found between protocols. On the other hand, central rate of perceived exertion was significantly higher at stage four during continuous protocol compared with intermittent protocol (p=0.01), while the peripheral rate of perceived exertion presented higher values at stages three (p=0.02) and four (p=0.00) in the continuous protocol when compared to the results found in intermittent protocol. These findings suggest that although the aquatic cycling induces similar physiologic demands in both protocols, the rate of perceived exertion may vary according to the continuous vs. intermittent nature of the exercise. PMID:23487483
Establishing an effective TMS protocol for craving in substance addiction: Is it possible?
Enokibara, Mailu; Trevizol, Alisson; Shiozawa, Pedro; Cordeiro, Quirino
2016-01-01
Repetitive transcranial magnetic stimulation (TMS) is a non-invasive tool with known therapeutic efficacy in various neuropsychiatric disorders, such as depression, schizophrenia, mania, and anxiety disorders. We hereby, briefly present a brief review and meta-analysis on the use of TMS for craving in substance addiction. We present our brief review and meta-analysis following the recommendations of the Cochrane group. A total of eight randomized controlled trials fulfilled eligibility criteria and were selected. A total of 199 patients were studied. We found active stimulation to be superior than sham protocols only for trials focused on right DLPFC (with Hedge's g = 1.48; ES (95%CI: 0.126-2.834), p = 0.032. Main meta-analysis limitations include small number of studies, high heterogeneity among studies, and high publication bias. However challenging, our exploratory analysis underscored the amelioration of craving in substance addiction for trials using high frequency TMS protocols over the right DLPFC. We hereby, propose the use of this particular TMS protocol as a promising tool in clinical research. © American Academy of Addiction Psychiatry.
[Immunocytochemical demonstration of astrocytes in brain sections combined with Nissl staining].
Korzhevskiĭ, D E; Otellin, V A
2004-01-01
The aim of the present study was to develop an easy and reliable protocol of combined preparation staining, which would unite the advantages of immunocytochemical demonstration of astrocytes with the availability to evaluate functional state of neurons provided by Nissl technique. The presented protocol of paraffin sections processing allows to retain high quality of tissue structure and provides for selective demonstration of astrocytes using the monoclonal antibodies against glial fibrillary acidic protein and contrast Nissl staining of cells. The protocol can be used without any changes for processing of brain sections obtained from the humans and other mammals with the exception of mice and rabbits.
Cohen, Clay; King, Amber; Lin, Chee Paul; Friedman, Gregory K; Monroe, Kathy; Kutny, Matthew
2016-11-01
Patients with febrile neutropenia are at high risk of morbidity and mortality from infectious causes. Decreasing time to antibiotic (TTA) administration is associated with improved patient outcomes. We sought to reduce TTA for children presenting to the emergency department with fever and neutropenia. In a prospective cohort study with historical comparison, TTA administration was evaluated in patients with neutropenia presenting to the Children's of Alabama Emergency Department. A protocol was established to reduce delays in antibiotic administration and increase the percentage of patients who receive treatment within 60 minutes of presentation. One hundred pre-protocol patient visits between August 2010 and December 2011 were evaluated and 153 post-protocol visits were evaluated between August 2012 and September 2013. We reviewed individual cases to determine barriers to rapid antibiotic administration. Antibiotics were administered in 96.9 ± 57.8 minutes in the pre-protocol patient group, and only 35% of patients received antibiotics within 60 minutes of presentation and 70% received antibiotics within 120 minutes. After implementation of the protocol, TTA for neutropenic patients was decreased to 64.3 ± 28.4 minutes (P < 0.0001) with 51.4% receiving antibiotics within 60 minutes and 93.2% within 120 minutes. Implementing a standard approach to patients at risk for neutropenia decreased TTA. There are numerous challenges in providing timely antibiotics to children with febrile neutropenia. Identified delays included venous access (time to effect of topical anesthetics, and difficulty obtaining access), physicians waiting on laboratory results, and antibiotic availability.
Modified CTAB and TRIzol protocols improve RNA extraction from chemically complex Embryophyta1
Jordon-Thaden, Ingrid E.; Chanderbali, Andre S.; Gitzendanner, Matthew A.; Soltis, Douglas E.
2015-01-01
Premise of the study: Here we present a series of protocols for RNA extraction across a diverse array of plants; we focus on woody, aromatic, aquatic, and other chemically complex taxa. Methods and Results: Ninety-one taxa were subjected to RNA extraction with three methods presented here: (1) TRIzol/TURBO DNA-free kits using the manufacturer’s protocol with the addition of sarkosyl; (2) a combination method using cetyltrimethylammonium bromide (CTAB) and TRIzol/sarkosyl/TURBO DNA-free; and (3) a combination of CTAB and QIAGEN RNeasy Plant Mini Kit. Bench-ready protocols are given. Conclusions: After an iterative process of working with chemically complex taxa, we conclude that the use of TRIzol supplemented with sarkosyl and the TURBO DNA-free kit is an effective, efficient, and robust method for obtaining RNA from 100 mg of leaf tissue of land plant species (Embryophyta) examined. Our protocols can be used to provide RNA of suitable stability, quantity, and quality for transcriptome sequencing. PMID:25995975
Stephens, John R; Liles, E Allen; Dancel, Ria; Gilchrist, Michael; Kirsch, Jonathan; DeWalt, Darren A
2014-04-01
Clinicians caring for patients seeking alcohol detoxification face many challenges, including lack of evidence-based guidelines for treatment and high recidivism rates. To develop a standardized protocol for determining which alcohol dependent patients seeking detoxification need inpatient versus outpatient treatment, and to study the protocol's implementation. Review of best evidence by ad hoc task force and subsequent creation of standardized protocol. Prospective observational evaluation of initial protocol implementation. Patients presenting for alcohol detoxification. Development and implementation of a protocol for evaluation and treatment of patients requesting alcohol detoxification. Number of admissions per month with primary alcohol related diagnosis (DRG), 30-day readmission rate, and length of stay, all measured before and after protocol implementation. We identified one randomized clinical trial and three cohort studies to inform the choice of inpatient versus outpatient detoxification, along with one prior protocol in this population, and combined that data with clinical experience to create an institutional protocol. After implementation, the average number of alcohol related admissions was 15.9 per month, compared with 18.9 per month before implementation (p = 0.037). There was no difference in readmission rate or length of stay. Creation and utilization of a protocol led to standardization of care for patients requesting detoxification from alcohol. Initial evaluation of protocol implementation showed a decrease in number of admissions.
A dyadic protocol for training complex skills: a replication using female participants.
Sanchez-Ku, M L; Arthur, W
2000-01-01
The effectiveness and efficiency of the active interlocked modeling (AIM) dyadic protocol in training complex skills has been extensively demonstrated. However, past evaluation studies have all used male participants exclusively. Consequently, the present study investigated the generalizability of the effectiveness and efficiency gains to women. We randomly assigned 108 female participants to either the AIM-dyad condition or a standard individual control training condition. The results supported the robustness and viability of the AIM protocol. Although their overall performance was lower than that obtained for men in previous studies, women trained in the AIM-dyad condition performed as well as those trained in the individual condition. Thus, the efficiency gains associated with the AIM-dyad protocol, which result from the ability to train two people simultaneously to reach the same performance level as a single person with no increase in training time or machine cost, are generalizable to female participants. The applied and basic research implications of the present study are discussed within the context of well-documented male/female differences in the performance of complex psychomotor tasks. For instance, given the number of women entering the workforce and the significant proportion of women in professions previously deemed to be male-dominated (e.g., air navigation), it is reassuring to know that sex differences in task performance do not necessarily imply sex differences in the effectiveness of training protocols.
[Effect of a multidisciplinar protocol on the clinical results obtained after bariatric surgery].
Cánovas Gaillemin, B; Sastre Martos, J; Moreno Segura, G; Llamazares Iglesias, O; Familiar Casado, C; Abad de Castro, S; López Pardo, R; Sánchez-Cabezudo Muñoz, M A
2011-01-01
Bariatric surgery has been shown to be an effective therapy for weight loss in patients with severe obesity, and the implementation of a multidisciplinar management protocol is recommended. To assess the usefulness of the implementation of a management protocol in obesity surgery based on the Spanish Consensus Document of the SEEDO. Retrospective comparative study of the outcomes in patients previously operated (51 patients) and after the implementation of the protocol (66 patients). The following data were gathered: anthropometry, pre-and post-surgery comorbidities, post-surgical nutritional and surgical complications, validated Quality of Life questionnaire, and dietary habits. Withdrawals (l7.6%) and alcoholism (5.8%) were higher in patients pre- versus post-implementation of the protocol (4.5% vs. 3%, respectively), the differences being statistically significant. The mortality rate was 2% in the pre-protocol group and 0% in the postprotocol group. The dietary habits were better in the post-protocol group, the pre-protocol group presenting a higher percentage of feeding-behavior disorders (5.1%) although not reaching a statistical significance. The improvement in quality of life was higher in the post-protocol group for all items, but only reaching statistical significance in sexual activity (p = 0.004). In the pre-protocol group, 70.5% of the patients had more than one nutritional complication vs. 32.8% in the post-protocol group (p < 0.05). There were no differences regarding the percentage of weight in excess lost at two years (> 50% in 81.3% in the pre-protocol group vs. 74.8% in the pos-protocol group) or the comorbidities. Bariatric surgery achieves excellent outcomes in weight loss, comorbidities, and quality of life, but presents nutritional, surgical, and psychiatric complications that require a protocol-based and multidisciplinary approach. Our protocol improves the outcomes regarding the withdrawal rates, feeding-behavior disorders, dietary habits, nutritional complications, and quality of life.
Use of Flowchart for Automation of Clinical Protocols in mHealth.
Dias, Karine Nóra; Welfer, Daniel; Cordeiro d'Ornellas, Marcos; Pereira Haygert, Carlos Jesus; Dotto, Gustavo Nogara
2017-01-01
For healthcare professionals to use mobile applications we need someone who knows software development, provide them. In healthcare institutions, health professionals use clinical protocols to govern care, and sometimes these documents are computerized through mobile applications to assist them. This work aims to present a proposal of an application of flow as a way of describing clinical protocols for automatic generation of mobile applications to assist health professionals. The purpose of this research is to enable health professionals to develop applications from the description of their own clinical protocols. As a result, we developed a web system that automates clinical protocols for an Android platform, and we validated with two clinical protocols used in a Brazilian hospital. Preliminary results of the developed architecture demonstrate the feasibility of this study.
Costa, Fábio Wildson Gurgel; Brito, Gerly Anne de Castro; Pessoa, Rosana Maria Andrade; Studart-Soares, Eduardo Costa
2011-01-01
The aim of this study was to evaluate the effects of liquid nitrogen cryosurgery on the femoral diaphysis of rats. The femoral diaphyses of 42 Wistar rats were exposed to three local and sequential applications of liquid nitrogen for 1 or 2 min, intercalated with periods of 5 min of passive thawing. The animals were sacrificed after 1, 2, 4 and 12 weeks and the specimens obtained were processed and analyzed histomorphometrically. The depth and extent of peak bone necrosis were 124.509 µm and 2087.094 µm for the 1-min protocol, respectively, and 436.424 µm and 12046.426 µm for the 2-min protocol. Peak necrosis was observed in the second experimental week with both cryotherapy protocols. The present results indicate that the 2-min protocol produced more marked bone necrosis than the 1-min protocol. Although our results cannot be entirely extrapolated to clinical practice, they contribute to the understanding of the behavior of bone tissue submitted to different cycles of liquid nitrogen freezing and may serve as a basis for new studies.
Study on Cloud Security Based on Trust Spanning Tree Protocol
NASA Astrophysics Data System (ADS)
Lai, Yingxu; Liu, Zenghui; Pan, Qiuyue; Liu, Jing
2015-09-01
Attacks executed on Spanning Tree Protocol (STP) expose the weakness of link layer protocols and put the higher layers in jeopardy. Although the problems have been studied for many years and various solutions have been proposed, many security issues remain. To enhance the security and credibility of layer-2 network, we propose a trust-based spanning tree protocol aiming at achieving a higher credibility of LAN switch with a simple and lightweight authentication mechanism. If correctly implemented in each trusted switch, the authentication of trust-based STP can guarantee the credibility of topology information that is announced to other switch in the LAN. To verify the enforcement of the trusted protocol, we present a new trust evaluation method of the STP using a specification-based state model. We implement a prototype of trust-based STP to investigate its practicality. Experiment shows that the trusted protocol can achieve security goals and effectively avoid STP attacks with a lower computation overhead and good convergence performance.
Analogy motor learning by young children: a study of rope skipping.
Tse, Andy C Y; Fong, Shirley S M; Wong, Thomson W L; Masters, Rich
2017-03-01
Research in psychology suggests that provision of an instruction by analogy can enhance acquisition and understanding of knowledge. Limited research has been conducted to test this proposition in motor learning by children. The purpose of the present study was to examine the feasibility of analogy instructions in motor skill acquisition by children. Thirty-two children were randomly assigned to one of the two instruction protocols: analogy and explicit instruction protocols for a two-week rope skipping training. Each participant completed a pretest (Lesson 1), three practice sessions (Lesson 2-4), a posttest and a secondary task test (Lesson 5). Children in the analogy protocol displayed better rope skip performance than those in the explicit instruction protocol (p < .001). Moreover, a cognitive secondary task test indicated that children in the analogy protocol performed more effectively, whereas children in the explicit protocol displayed decrements in performance. Analogy learning may aid children to acquire complex motor skills, and have potential benefits related to reduced cognitive processing requirements.
2011-01-01
Introduction Today, we frequently find patients taking oral anticoagulant therapy (OAT), a prophylaxis against the occurrence of thromboembolic events. An oral surgeon needs to know how to better manage such patients, in order to avoid hemorrhagic and thromboembolic complications. Materials and methods A group of 193 patients (119 men aged between 46 and 82 and 74 women aged between 54 and 76) undergoing OAT for more than 5 years were managed with a standardized management protocol and a 2-months follow-up. The aim of the present study was to apply a protocol, which could provide a safe intra- and postoperative management of patients on OAT. Results Among the 193 patients, only 2 had postoperative complications. Conclusions We think that the protocol used in the present study can be used for complete safety in the treatment of this type of patients. PMID:21771331
A carrier sensed multiple access protocol for high data base rate ring networks
NASA Technical Reports Server (NTRS)
Foudriat, E. C.; Maly, Kurt J.; Overstreet, C. Michael; Khanna, S.; Paterra, Frank
1990-01-01
The results of the study of a simple but effective media access protocol for high data rate networks are presented. The protocol is based on the fact that at high data rates networks can contain multiple messages simultaneously over their span, and that in a ring, nodes used to detect the presence of a message arriving from the immediate upstream neighbor. When an incoming signal is detected, the node must either abort or truncate a message it is presently sending. Thus, the protocol with local carrier sensing and multiple access is designated CSMA/RN. The performance of CSMA/RN with TTattempt and truncate is studied using analytic and simulation models. Three performance factors, wait or access time, service time and response or end-to-end travel time are presented. The service time is basically a function of the network rate, it changes by a factor of 1 between no load and full load. Wait time, which is zero for no load, remains small for load factors up to 70 percent of full load. Response time, which adds travel time while on the network to wait and service time, is mainly a function of network length, especially for longer distance networks. Simulation results are shown for CSMA/RN where messages are removed at the destination. A wide range of local and metropolitan area network parameters including variations in message size, network length, and node count are studied. Finally, a scaling factor based upon the ratio of message to network length demonstrates that the results, and hence, the CSMA/RN protocol, are applicable to wide area networks.
Silva, D V; Branco, S M J; Holanda, I S A; Royaert, S; Motamayor, J C; Marelli, J P; Corrêa, R X
2016-03-04
Theobroma cacao is a species of great economic importance with its beans used for chocolate production. The tree has been a target of various molecular studies. It contains many polyphenols, which complicate the extraction of nucleic acids with the extraction protocols requiring a large amount of plant material. These issues, therefore, necessitate the optimization of the protocols. The aim of the present study was to evaluate different methods for extraction of total RNA from shoot apical meristems of T. cacao 'CCN 51' and to assess the influence of storage conditions for the meristems on the extraction. The study also aimed to identify the most efficient protocol for RNA extraction using a small amount of plant material. Four different protocols were evaluated for RNA extraction using one shoot apical meristem per sample. Among these protocols, one that was more efficient was then tested to extract RNA using four different numbers of shoot apical meristems, subjected to three different storage conditions. The best protocol was tested for cDNA amplification using reverse transcription-polymerase chain reaction; the cDNA quality was determined to be satisfactory for molecular analyses. The study revealed that with the best RNA extraction protocol, one shoot apical meristem was sufficient for extraction of high-quality total RNA. The results obtained might enable advances in genetic analyses and molecular studies using reduced amount of plant material.
Differences in handgrip strength protocols to identify sarcopenia and frailty - a systematic review.
Sousa-Santos, A R; Amaral, T F
2017-10-16
Hand grip strength (HGS) is used for the diagnosis of sarcopenia and frailty. Several factors have been shown to influence HGS values during measurement. Therefore, variations in the protocols used to assess HGS, as part of the diagnosis of sarcopenia and frailty, may lead to the identification of different individuals with low HGS, introducing bias. The aim of this systematic review is to gather all the relevant studies that measured HGS to diagnose sarcopenia and frailty and to identify the differences between the protocols used. A systematic review was carried out following the recommendations of The Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) Statement. PubMed and Web of Science were systematically searched, until August 16, 2016. The evidence regarding HGS measurement protocols used to diagnose sarcopenia and frailty was summarised and the most recent protocols regarding the procedure were compared. From the described search 4393 articles were identified. Seventy-two studies were included in this systematic review, in which 37 referred to sarcopenia articles, 33 to frailty and two evaluated both conditions. Most studies presented limited information regarding the protocols used. The majority of the studies included did not describe a complete procedure of HGS measurement. The high heterogeneity between the protocols used, in sarcopenia and frailty studies, create an enormous difficulty in drawing comparative conclusions among them.
Fussell, Holly E; Kunkel, Lynn E; McCarty, Dennis; Lewy, Colleen S
2011-09-01
Training research staff to implement clinical trials occurring in community-based addiction treatment programs presents unique challenges. Standardized patient walkthroughs of study procedures may enhance training and protocol implementation. Examine and discuss cross-site and cross-study challenges of participant screening and data collection procedures identified during standardized patient walkthroughs of multi-site clinical trials. Actors portrayed clients and "walked through" study procedures with protocol research staff. The study completed 57 walkthroughs during implementation of 4 clinical trials. Observers and walkthrough participants identified three areas of concern (consent procedures, screening and assessment processes, and protocol implementation) and made suggestions for resolving the concerns. Standardized patient walkthroughs capture issues with study procedures previously unidentified with didactic training or unscripted rehearsals. Clinical trials within the National Drug Abuse Treatment Clinical Trials Network are conducted in addiction treatment centers that vary on multiple dimensions. Based on walkthrough observations, the national protocol team and local site leadership modify standardized operating procedures and resolve cross-site problems prior to recruiting study participants. The standardized patient walkthrough improves consistency across study sites and reduces potential site variation in study outcomes.
A Novel Quantum Solution to Privacy-Preserving Nearest Neighbor Query in Location-Based Services
NASA Astrophysics Data System (ADS)
Luo, Zhen-yu; Shi, Run-hua; Xu, Min; Zhang, Shun
2018-04-01
We present a cheating-sensitive quantum protocol for Privacy-Preserving Nearest Neighbor Query based on Oblivious Quantum Key Distribution and Quantum Encryption. Compared with the classical related protocols, our proposed protocol has higher security, because the security of our protocol is based on basic physical principles of quantum mechanics, instead of difficulty assumptions. Especially, our protocol takes single photons as quantum resources and only needs to perform single-photon projective measurement. Therefore, it is feasible to implement this protocol with the present technologies.
Cryptography in the Bounded-Quantum-Storage Model
NASA Astrophysics Data System (ADS)
Schaffner, Christian
2007-09-01
This thesis initiates the study of cryptographic protocols in the bounded-quantum-storage model. On the practical side, simple protocols for Rabin Oblivious Transfer, 1-2 Oblivious Transfer and Bit Commitment are presented. No quantum memory is required for honest players, whereas the protocols can only be broken by an adversary controlling a large amount of quantum memory. The protocols are efficient, non-interactive and can be implemented with today's technology. On the theoretical side, new entropic uncertainty relations involving min-entropy are established and used to prove the security of protocols according to new strong security definitions. For instance, in the realistic setting of Quantum Key Distribution (QKD) against quantum-memory-bounded eavesdroppers, the uncertainty relation allows to prove the security of QKD protocols while tolerating considerably higher error rates compared to the standard model with unbounded adversaries.
Ho, Chi-Kung; Chen, Fu-Cheng; Chen, Yung-Lung; Wang, Hui-Ting; Lee, Chien-Ho; Chung, Wen-Jung; Lin, Cheng-Jui; Hsueh, Shu-Kai; Hung, Shin-Chiang; Wu, Kuan-Han; Liu, Chu-Feng; Kung, Chia-Te; Cheng, Cheng-I
2017-01-01
This study evaluated the impact on clinical outcomes using a cloud computing system to reduce percutaneous coronary intervention hospital door-to-balloon (DTB) time for ST segment elevation myocardial infarction (STEMI). A total of 369 patients before and after implementation of the transfer protocol were enrolled. Of these patients, 262 were transferred through protocol while the other 107 patients were transferred through the traditional referral process. There were no significant differences in DTB time, pain to door of STEMI receiving center arrival time, and pain to balloon time between the two groups. Pain to electrocardiography time in patients with Killip I/II and catheterization laboratory to balloon time in patients with Killip III/IV were significantly reduced in transferred through protocol group compared to in traditional referral process group (both p < 0.05). There were also no remarkable differences in the complication rate and 30-day mortality between two groups. The multivariate analysis revealed that the independent predictors of 30-day mortality were elderly patients, advanced Killip score, and higher level of troponin-I. This study showed that patients transferred through our present protocol could reduce pain to electrocardiography and catheterization laboratory to balloon time in Killip I/II and III/IV patients separately. However, this study showed that using a cloud computing system in our present protocol did not reduce DTB time.
Logan, Jennifer K; Tang, Chad; Liao, Zhongxing; Lee, J. Jack; Heymach, John V.; Swisher, Stephen G.; Welsh, James W.; Zhang, Jianjun; Lin, Steven H.; Gomez, Daniel R.
2018-01-01
Purpose Effective clinical trial enrollment can be difficult in a protocol designs that contain one treatment arm that is perceived as being more “aggressive” or “favorable.” There have been limited studies focusing on the barriers to enrollment and the efficacy of alternative study design to improve accrual. We analyzed barriers to enrollment, particularly the influence of timing, in context of three prospective randomized oncology trials where one arm was considered more aggressive. Methods and materials From June 2011 to March 2015, patients who were enrolled on three prospective institutional protocols (an oligometastatic non-small cell lung cancer (NSCLC) trial, and two proton vs. intensity-modulated radiation therapy (IMRT) trials in NSCLC and esophageal cancer) were screened for protocol eligibility. Eligible candidates were approached about trial participation, and patient characteristics (age, sex, T/N categorization) were recorded along with details surrounding trial presentation (appointment number). Fisher’s exact test, Student’s t tests, and multivariate analysis were performed to assess differences between enrolled and refusal patients. Results 309 eligible patients were approached about trial enrollment. The enrollment success rate (ESR) during this time span was 52% (n=160 patients). Enrolled patients were more likely to be presented trial information at an earlier appointment (oligomet protocol: 5 vs. 3 appointments (P<0.001), NSCLC protocol: 4 vs. 3 appointments (P = 0.0018), esophageal protocol: 3 vs. 2 appointments (P = 0.0086No other factors or patient characteristics significantly affected ESR. Conclusion Improvement in enrollment rates for randomized control trials is possible, even in difficult accrual settings. Earlier presentation of trial information to patients is the most influential factor for success, and may help overcome accrual barriers without compromising trial design. PMID:28244413
Field validation of protocols developed to evaluate in-line mastitis detection systems.
Kamphuis, C; Dela Rue, B T; Eastwood, C R
2016-02-01
This paper reports on a field validation of previously developed protocols for evaluating the performance of in-line mastitis-detection systems. The protocols outlined 2 requirements of these systems: (1) to detect cows with clinical mastitis (CM) promptly and accurately to enable timely and appropriate treatment and (2) to identify cows with high somatic cell count (SCC) to manage bulk milk SCC levels. Gold standard measures, evaluation tests, performance measures, and performance targets were proposed. The current study validated the protocols on commercial dairy farms with automated in-line mastitis-detection systems using both electrical conductivity (EC) and SCC sensor systems that both monitor at whole-udder level. The protocol for requirement 1 was applied on 3 commercial farms. For requirement 2, the protocol was applied on 6 farms; 3 of them had low bulk milk SCC (128×10(3) cells/mL) and were the same farms as used for field evaluation of requirement 1. Three farms with high bulk milk SCC (270×10(3) cells/mL) were additionally enrolled. The field evaluation methodology and results were presented at a workshop including representation from 7 international suppliers of in-line mastitis-detection systems. Feedback was sought on the acceptance of standardized performance evaluation protocols and recommended refinements to the protocols. Although the methodology for requirement 1 was relatively labor intensive and required organizational skills over an extended period, no major issues were encountered during the field validation of both protocols. The validation, thus, proved the protocols to be practical. Also, no changes to the data collection process were recommended by the technology supplier representatives. However, 4 recommendations were made to refine the protocols: inclusion of an additional analysis that ignores small (low-density) clot observations in the definition of CM, extension of the time window from 4 to 5 milkings for timely alerts for CM, setting a maximum number of 10 milkings for the time window to detect a CM episode, and presentation of sensitivity for a larger range of false alerts per 1,000 milkings replacing minimum performance targets. The recommended refinements are discussed with suggested changes to the original protocols. The information presented is intended to inform further debate toward achieving international agreement on standard protocols to evaluate performance of in-line mastitis-detection systems. Copyright © 2016 American Dairy Science Association. Published by Elsevier Inc. All rights reserved.
Lelijveld, Natasha; Bailey, Jeanette; Mayberry, Amy; Trenouth, Lani; N'Diaye, Dieynaba S; Haghparast-Bidgoli, Hassan; Puett, Chloe
2018-04-24
Acute malnutrition is currently divided into severe (SAM) and moderate (MAM) based on level of wasting. SAM and MAM currently have separate treatment protocols and products, managed by separate international agencies. For SAM, the dose of treatment is allocated by the child's weight. A combined and simplified protocol for SAM and MAM, with a standardised dose of ready-to-use therapeutic food (RUTF), is being trialled for non-inferior recovery rates and may be more cost-effective than the current standard protocols for treating SAM and MAM. This is the protocol for the economic evaluation of the ComPAS trial, a cluster-randomised controlled, non-inferiority trial that compares a novel combined protocol for treating uncomplicated acute malnutrition compared to the current standard protocol in South Sudan and Kenya. We will calculate the total economic costs of both protocols from a societal perspective, using accounting data, interviews and survey questionnaires. The incremental cost of implementing the combined protocol will be estimated, and all costs and outcomes will be presented as a cost-consequence analysis. Incremental cost-effectiveness ratio will be calculated for primary and secondary outcome, if statistically significant. We hypothesise that implementing the combined protocol will be cost-effective due to streamlined logistics at clinic level, reduced length of treatment, especially for MAM, and reduced dosages of RUTF. The findings of this economic evaluation will be important for policymakers, especially given the hypothesised non-inferiority of the main health outcomes. The publication of this protocol aims to improve rigour of conduct and transparency of data collection and analysis. It is also intended to promote inclusion of economic evaluation in other nutrition intervention studies, especially for MAM, and improve comparability with other studies. ISRCTN 30393230 , date: 16/03/2017.
Promoting Creativity in International Business Education: A Protocol for Student-Constructed Cases
ERIC Educational Resources Information Center
Riordan, Diane A.; Sullivan, M. Cathy; Fink, Danny
2003-01-01
Case studies, including "archival cases," "documentary cases," "living cases," and "learner-generated cases," are popular teaching methods in the international business curriculum. In this paper we present a protocol for student-constructed cases, an extension of the learner-generated case, and provide an example using foreign currency exchange…
Screening protocol for dysphagia in adults: comparison with videofluoroscopic findings.
Sassi, Fernanda C; Medeiros, Gisele C; Zilberstein, Bruno; Jayanthi, Shri Krishna; de Andrade, Claudia R F
2017-12-01
To compare the videofluoroscopic findings of patients with suspected oropharyngeal dysphagia with the results of a clinical screening protocol. A retrospective observational cohort study was conducted on all consecutive patients with suspected oropharyngeal dysphagia between March 2015 and February 2016 who were assigned to receive a videofluoroscopic assessment of swallowing. All patients were first submitted to videofluoroscopy and then to the clinical assessment of swallowing. The clinical assessment was performed within the first 24 hours after videofluoroscopy. The videofluoroscopy results were analyzed regarding penetration/aspiration using an 8-point multidimensional perceptual scale. The accuracy of the clinical protocol was analyzed using the sensitivity, specificity, likelihood ratios and predictive values. The selected sample consisted of 50 patients. The clinical protocol presented a sensitivity of 50% and specificity of 95%, with an accuracy of 88%. "Cough" and "wet-hoarse" vocal quality after/during swallowing were clinical indicators that appeared to correctly identify the presence of penetration/aspiration risk. The clinical protocol used in the present study is a simple, rapid and reliable clinical assessment. Despite the absence of a completely satisfactory result, especially in terms of the sensitivity and positive predictive values, we suggest that lower rates of pneumonia can be achieved using a formal dysphagia screening method.
Dekkers, Olaf M; Cevallos, Myriam; Bührer, Jonas; Poncet, Antoine; Ackermann Rau, Sabine; Perneger, Thomas V; Egger, Matthias
2015-05-01
To compare noninferiority margins defined in study protocols and trial registry records with margins reported in subsequent publications. Comparison of protocols of noninferiority trials submitted 2001 to 2005 to ethics committees in Switzerland and The Netherlands with corresponding publications and registry records. We searched MEDLINE via PubMed, the Cochrane Controlled Trials Register (Cochrane Library issue 01/2012), and Google Scholar in September 2013 to identify published reports, and the International Clinical Trials Registry Platform of the World Health Organization in March 2013 to identify registry records. Two readers recorded the noninferiority margin and other data using a standardized data-abstraction form. The margin was identical in study protocol and publication in 43 (80%) of 54 pairs of study protocols and articles. In the remaining pairs, reporting was inconsistent (five pairs, 9%), or the noninferiority margin was either not reported in the publication (five pairs, 9%) or not defined in the study protocol (one pair). The confidence interval or the exact P-value required to judge whether the result was compatible with noninferior, inferior, or superior efficacy was reported in 43 (80%) publications. Complete and consistent reporting of both noninferiority margin and confidence interval (or exact P-value) was present in 39 (72%) protocol-publication pairs. Twenty-nine trials (54%) were registered in trial registries, but only one registry record included the noninferiority margin. The reporting of noninferiority margins was incomplete and inconsistent with study protocols in a substantial proportion of published trials, and margins were rarely reported in trial registries. Copyright © 2015 Elsevier Inc. All rights reserved.
Trombone, Ana Paula Fávaro; Pedrini, Sílvia Cristina Barbosa; Diório, Suzana Madeira; Belone, Andréa de Faria Fernandes; Fachin, Luciana Raquel Vicenzi; do Nascimento, Dejair Caitano; Rosa, Patricia Sammarco
2014-03-23
Leprosy, caused by Mycobacterium leprae, is an important infectious disease that is still endemic in many countries around the world, including Brazil. There are currently no known methods for growing M. leprae in vitro, presenting a major obstacle in the study of this pathogen in the laboratory. Therefore, the maintenance and growth of M. leprae strains are preferably performed in athymic nude mice (NU-Foxn1(nu)). The laboratory conditions for using mice are readily available, easy to perform, and allow standardization and development of protocols for achieving reproducible results. In the present report, we describe a simple protocol for purification of bacilli from nude mouse footpads using trypsin, which yields a suspension with minimum cell debris and with high bacterial viability index, as determined by fluorescent microscopy. A modification to the standard method for bacillary counting by Ziehl-Neelsen staining and light microscopy is also demonstrated. Additionally, we describe a protocol for freezing and thawing bacillary stocks as an alternative protocol for maintenance and storage of M. leprae strains.
Bires, Angela Macci; Lawson, Dori; Wasser, Thomas E; Raber-Baer, Donna
2013-12-01
Clinically valid cardiac evaluation via treadmill stress testing requires patients to achieve specific target heart rates and to successfully complete the cardiac examination. A comparison of the standard Bruce protocol and the ramped Bruce protocol was performed using data collected over a 1-y period from a targeted patient population with a body mass index (BMI) equal to or greater than 30 to determine which treadmill protocol provided more successful examination results. The functional capacity, metabolic equivalent units achieved, pressure rate product, and total time on the treadmill as measured for the obese patients were clinically valid and comparable to normal-weight and overweight patients (P < 0.001). Data gathered from each protocol demonstrated that the usage of the ramped Bruce protocol achieved more consistent results in comparison across all BMI groups in achieving 80%-85% of their age-predicted maximum heart rate. This study did not adequately establish that the ramped Bruce protocol was superior to the standard Bruce protocol for the examination of patients with a BMI equal to or greater than 30.
PROTOCOL FOR EXAMINATION OF THE INNER CAN CLOSURE WELD REGION FOR 3013 DE CONTAINERS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mickalonis, J.
2014-09-16
The protocol for the examination of the inner can closure weld region (ICCWR) for 3013 DE containers is presented within this report. The protocol includes sectioning of the inner can lid section, documenting the surface condition, measuring corrosion parameters, and storing of samples. This protocol may change as the investigation develops since findings may necessitate additional steps be taken. Details of the previous analyses, which formed the basis for this protocol, are also presented.
Reiter, Karen; Andersen, Søren Bo; Carlsson, Jessica
2016-02-01
Neurofeedback is an alternative, noninvasive approach used in the treatment of a wide range of neuropsychiatric disorders, including posttraumatic stress disorder (PTSD). Many different neurofeedback protocols and methods exist. Likewise, PTSD is a heterogeneous disorder. To review the evidence on effectiveness and preferred protocol when using neurofeedback treatment on PTSD, a systematic search of PubMed, PsychInfo, Embase, and Cochrane databases was undertaken. Five studies were included in this review. Neurofeedback had a statistically significant effect in three studies. Neurobiological changes were reported in three studies. Interpretation of results is, however, limited by differences between the studies and several issues regarding design. The optimistic results presented here qualify neurofeedback as probably efficacious for PTSD treatment.
Collective attacks and unconditional security in continuous variable quantum key distribution.
Grosshans, Frédéric
2005-01-21
We present here an information theoretic study of Gaussian collective attacks on the continuous variable key distribution protocols based on Gaussian modulation of coherent states. These attacks, overlooked in previous security studies, give a finite advantage to the eavesdropper in the experimentally relevant lossy channel, but are not powerful enough to reduce the range of the reverse reconciliation protocols. Secret key rates are given for the ideal case where Bob performs optimal collective measurements, as well as for the realistic cases where he performs homodyne or heterodyne measurements. We also apply the generic security proof of Christiandl et al. to obtain unconditionally secure rates for these protocols.
Treatment Protocol for High Velocity/High Energy Gunshot Injuries to the Face
Peled, Micha; Leiser, Yoav; Emodi, Omri; Krausz, Amir
2011-01-01
Major causes of facial combat injuries include blasts, high-velocity/high-energy missiles, and low-velocity missiles. High-velocity bullets fired from assault rifles encompass special ballistic properties, creating a transient cavitation space with a small entrance wound and a much larger exit wound. There is no dispute regarding the fact that primary emergency treatment of ballistic injuries to the face commences in accordance with the current advanced trauma life support (ATLS) recommendations; the main areas in which disputes do exist concern the question of the timing, sequence, and modes of surgical treatment. The aim of the present study is to present the treatment outcome of high-velocity/high-energy gunshot injuries to the face, using a protocol based on the experience of a single level I trauma center. A group of 23 injured combat soldiers who sustained bullet and shrapnel injuries to the maxillofacial region during a 3-week regional military conflict were evaluated in this study. Nine patients met the inclusion criteria (high-velocity/high-energy injuries) and were included in the study. According to our protocol, upon arrival patients underwent endotracheal intubation and were hemodynamically stabilized in the shock-trauma unit and underwent total-body computed tomography with 3-D reconstruction of the head and neck and computed tomography angiography. All patients underwent maxillofacial surgery upon the day of arrival according to the protocol we present. In view of our treatment outcomes, results, and low complication rates, we conclude that strict adherence to a well-founded and structured treatment protocol based on clinical experience is mandatory in providing efficient, appropriate, and successful treatment to a relatively large group of patients who sustain various degrees of maxillofacial injuries during a short period of time. PMID:23449809
Yang, Li; Zheng, Zhiming
2018-01-01
According to advancements in the wireless technologies, study of biometrics-based multi-server authenticated key agreement schemes has acquired a lot of momentum. Recently, Wang et al. presented a three-factor authentication protocol with key agreement and claimed that their scheme was resistant to several prominent attacks. Unfortunately, this paper indicates that their protocol is still vulnerable to the user impersonation attack, privileged insider attack and server spoofing attack. Furthermore, their protocol cannot provide the perfect forward secrecy. As a remedy of these aforementioned problems, we propose a biometrics-based authentication and key agreement scheme for multi-server environments. Compared with various related schemes, our protocol achieves the stronger security and provides more functionality properties. Besides, the proposed protocol shows the satisfactory performances in respect of storage requirement, communication overhead and computational cost. Thus, our protocol is suitable for expert systems and other multi-server architectures. Consequently, the proposed protocol is more appropriate in the distributed networks.
Zheng, Zhiming
2018-01-01
According to advancements in the wireless technologies, study of biometrics-based multi-server authenticated key agreement schemes has acquired a lot of momentum. Recently, Wang et al. presented a three-factor authentication protocol with key agreement and claimed that their scheme was resistant to several prominent attacks. Unfortunately, this paper indicates that their protocol is still vulnerable to the user impersonation attack, privileged insider attack and server spoofing attack. Furthermore, their protocol cannot provide the perfect forward secrecy. As a remedy of these aforementioned problems, we propose a biometrics-based authentication and key agreement scheme for multi-server environments. Compared with various related schemes, our protocol achieves the stronger security and provides more functionality properties. Besides, the proposed protocol shows the satisfactory performances in respect of storage requirement, communication overhead and computational cost. Thus, our protocol is suitable for expert systems and other multi-server architectures. Consequently, the proposed protocol is more appropriate in the distributed networks. PMID:29534085
Ozarda, Yesim; Ichihara, Kiyoshi; Barth, Julian H; Klee, George
2013-05-01
The reference intervals (RIs) given in laboratory reports have an important role in aiding clinicians in interpreting test results in reference to values of healthy populations. In this report, we present a proposed protocol and standard operating procedures (SOPs) for common use in conducting multicenter RI studies on a national or international scale. The protocols and consensus on their contents were refined through discussions in recent C-RIDL meetings. The protocol describes in detail (1) the scheme and organization of the study, (2) the target population, inclusion/exclusion criteria, ethnicity, and sample size, (3) health status questionnaire, (4) target analytes, (5) blood collection, (6) sample processing and storage, (7) assays, (8) cross-check testing, (9) ethics, (10) data analyses, and (11) reporting of results. In addition, the protocol proposes the common measurement of a panel of sera when no standard materials exist for harmonization of test results. It also describes the requirements of the central laboratory, including the method of cross-check testing between the central laboratory of each country and local laboratories. This protocol and the SOPs remain largely exploratory and may require a reevaluation from the practical point of view after their implementation in the ongoing worldwide study. The paper is mainly intended to be a basis for discussion in the scientific community.
Shiozawa, Pedro; da Silva, Mailu Enokibara; Cordeiro, Quirino
2015-09-01
We report the case of a 66-year-old male patient with major depressive disorder for the last 6 months. The patient had been diagnosed with dyslexia during childhood and was left-handed. The intervention protocol consisted in 10 consecutive daily transcranial direct current stimulation sessions. However, after 5 days of stimulation, the patient presented with intensification of depressive symptoms and panic attacks. It was hypothetized that the intensification of symptoms may have been due to stimulation protocol itself. Considering the patient was left-handed and presented comorbidity with dyslexia, there was a plausible hypothesis of right hemispheric dominance. This was corroborated by the Edinburgh Handedness Scale. In fact, dyslexic patients present right hemisphere dominance more frequently. The patient also presented a single photon emission computed tomography with a hypoperfusion area over the left posterior parietal lobe. After the patients agreement, a 10-day experimental repetitive transcranial magnetic stimulation low-frequency protocol over the left dorsolateral prefrontal cortex was started to inhibit the area, which was hypothetically hyperactivated following the rationale of right dominance. The patient presented amelioration of depressive and anxious symptoms. Given the hemispheric reversal we show in the present case study, however, it seems that therapies that are beneficial to right-handers could be detrimental to left-handers.
Space Wire Upper Layer Protocols
NASA Technical Reports Server (NTRS)
Rakow, Glenn; Schnurr, Richard; Gilley, Daniel; Parkes, Steve
2004-01-01
This viewgraph presentation addresses efforts to provide a streamlined approach for developing SpaceWire Upper layer protocols which allows industry to drive standardized communication solutions for real projects. The presentation proposes a simple packet header that will allow flexibility in implementing a diverse range of protocols.
ERIC Educational Resources Information Center
Arthanat, Sajay; Curtin, Christine; Kontak, David
2015-01-01
Mainstream technologies are widely being employed in inclusive and special education classrooms to accommodate the learning needs of students. As the evidence of their effectiveness evolves, educators and school-based therapists need tools and documentable strategies for their implementation. This research presents an evaluation protocol to guide…
Medium Access Control Protocols for Cognitive Radio Ad Hoc Networks: A Survey
Islam, A. K. M. Muzahidul; Baharun, Sabariah; Mansoor, Nafees
2017-01-01
New wireless network paradigms will demand higher spectrum use and availability to cope with emerging data-hungry devices. Traditional static spectrum allocation policies cause spectrum scarcity, and new paradigms such as Cognitive Radio (CR) and new protocols and techniques need to be developed in order to have efficient spectrum usage. Medium Access Control (MAC) protocols are accountable for recognizing free spectrum, scheduling available resources and coordinating the coexistence of heterogeneous systems and users. This paper provides an ample review of the state-of-the-art MAC protocols, which mainly focuses on Cognitive Radio Ad Hoc Networks (CRAHN). First, a description of the cognitive radio fundamental functions is presented. Next, MAC protocols are divided into three groups, which are based on their channel access mechanism, namely time-slotted protocol, random access protocol and hybrid protocol. In each group, a detailed and comprehensive explanation of the latest MAC protocols is presented, as well as the pros and cons of each protocol. A discussion on future challenges for CRAHN MAC protocols is included with a comparison of the protocols from a functional perspective. PMID:28926952
Maher, Dermot P; Chen, Lucy; Mao, Jianren
2017-02-01
Intravenous ketamine infusions have been used extensively to treat often-intractable neuropathic pain conditions. Because there are many widely divergent ketamine infusion protocols described in the literature, the variation in these protocols presents a challenge for direct comparison of one protocol with another and in discerning an optimal protocol. Careful examination of the published literature suggests that ketamine infusions can be useful to treat neuropathic pain and that certain characteristics of ketamine infusions may be associated with better clinical outcomes. Increased duration of relief from neuropathic pain is associated with (1) higher total infused doses of ketamine; (2) prolonged infusion durations, although the rate of infusion does not appear to be a factor; and (3) coadministration of adjunct medications such as midazolam and/or clonidine that mitigate some of the unpleasant psychomimetic side effects. However, there are few studies designed to optimize ketamine infusion protocols by defining what an effective infusion protocol entails with regard to a respective neuropathic pain condition. Therefore, despite common clinical practice, the current state of the literature leaves the use of ketamine infusions without meaningful guidance from high-quality comparative evidence. The objectives of this topical review are to (1) analyze the available clinical evidence related to ketamine infusion protocols and (2) call for clinical studies to identify optimal ketamine infusion protocols tailored for individual neuropathic pain conditions. The Oxford Center for Evidence-Based Medicine classification for levels of evidence was used to stratify the grades of clinical recommendation for each infusion variable studied.
The Simulation of Read-time Scalable Coherent Interface
NASA Technical Reports Server (NTRS)
Li, Qiang; Grant, Terry; Grover, Radhika S.
1997-01-01
Scalable Coherent Interface (SCI, IEEE/ANSI Std 1596-1992) (SCI1, SCI2) is a high performance interconnect for shared memory multiprocessor systems. In this project we investigate an SCI Real Time Protocols (RTSCI1) using Directed Flow Control Symbols. We studied the issues of efficient generation of control symbols, and created a simulation model of the protocol on a ring-based SCI system. This report presents the results of the study. The project has been implemented using SES/Workbench. The details that follow encompass aspects of both SCI and Flow Control Protocols, as well as the effect of realistic client/server processing delay. The report is organized as follows. Section 2 provides a description of the simulation model. Section 3 describes the protocol implementation details. The next three sections of the report elaborate on the workload, results and conclusions. Appended to the report is a description of the tool, SES/Workbench, used in our simulation, and internal details of our implementation of the protocol.
Multi-party Quantum Key Agreement without Entanglement
NASA Astrophysics Data System (ADS)
Cai, Bin-Bin; Guo, Gong-De; Lin, Song
2017-04-01
A new efficient quantum key agreement protocol without entanglement is proposed. In this protocol, each user encodes his secret key into the traveling particles by performing one of four rotation operations that one cannot perfectly distinguish. In the end, all users can simultaneously obtain the final shared key. The security of the presented protocol against some common attacks is discussed. It is shown that this protocol can effectively protect the privacy of each user and satisfy the requirement of fairness in theory. Moreover, the quantum carriers and the encoding operations used in the protocol can be achieved in realistic physical devices. Therefore, the presented protocol is feasible with current technology.
Biernat, Ryszard; Trzaskoma, Zbigniew; Trzaskoma, Lukasz; Czaprowski, Dariusz
2014-01-01
The aim of the study was to investigate the efficacy of rehabilitation protocol applied during competitive period for the treatment of patellar tendinopathy. A total of 28 male volleyball players were divided into two groups. Fifteen from experimental group (E) and 13 from control group (C) fulfilled the same tests 3 times: before the training program started (first measurement), after 12 weeks (second measurement) and after 24 weeks (third measurement). The above-mentioned protocol included the following: USG imagining with color Doppler function, clinical testing, pain intensity evaluation with VISA-P questionnaire, leg muscle strength and power and jumping ability measurements. The key element of the rehabilitation program was eccentric squat on decline board with additional unstable surface. The essential factor of the protocol was a set of preventive functional exercises, with focus on eccentric exercises of hamstrings. Patellar tendinopathy was observed in 18% of the tested young volleyball players. Implementation of the presented rehabilitation protocol with eccentric squat on decline board applied during sports season lowered the pain level of the young volleyball players. Presented rehabilitation protocol applied without interrupting the competitive period among young volleyball players together with functional exercises could be an effective method for the treatment of patellar tendinopathy.
Data aggregation in wireless sensor networks using the SOAP protocol
NASA Astrophysics Data System (ADS)
Al-Yasiri, A.; Sunley, A.
2007-07-01
Wireless sensor networks (WSN) offer an increasingly attractive method of data gathering in distributed system architectures and dynamic access via wireless connectivity. Wireless sensor networks have physical and resource limitations, this leads to increased complexity for application developers and often results in applications that are closely coupled with network protocols. In this paper, a data aggregation framework using SOAP (Simple Object Access Protocol) on wireless sensor networks is presented. The framework works as a middleware for aggregating data measured by a number of nodes within a network. The aim of the study is to assess the suitability of the protocol in such environments where resources are limited compared to traditional networks.
On entropy change measurements around first order phase transitions in caloric materials.
Caron, Luana; Ba Doan, Nguyen; Ranno, Laurent
2017-02-22
In this work we discuss the measurement protocols for indirect determination of the isothermal entropy change associated with first order phase transitions in caloric materials. The magneto-structural phase transitions giving rise to giant magnetocaloric effects in Cu-doped MnAs and FeRh are used as case studies to exemplify how badly designed protocols may affect isothermal measurements and lead to incorrect entropy change estimations. Isothermal measurement protocols which allow correct assessment of the entropy change around first order phase transitions in both direct and inverse cases are presented.
Protocols for second-generation business satellites systems
NASA Astrophysics Data System (ADS)
Evans, B. G.; Coakley, F. P.; El Amin, M. H. M.
The paper discusses the nature and mix of traffic in business satellite systems and describes the limitations on the protocol imposed by the differing impairments of speech, video, and data. A simple TDMA system protocol is presented which meets the requirements of mixed-service operation. The efficiency of the protocol together with implications for allocation, scheduling and synchronisation are discussed. Future-generation satellites will probably use on-board processing. Some initial work on protocols that make use of on-board processing and the implications for satellite and earth-station equipment are presented.
Ho, Chi-Kung; Wang, Hui-Ting; Lee, Chien-Ho; Chung, Wen-Jung; Lin, Cheng-Jui; Hsueh, Shu-Kai; Hung, Shin-Chiang; Wu, Kuan-Han; Liu, Chu-Feng; Kung, Chia-Te
2017-01-01
Background This study evaluated the impact on clinical outcomes using a cloud computing system to reduce percutaneous coronary intervention hospital door-to-balloon (DTB) time for ST segment elevation myocardial infarction (STEMI). Methods A total of 369 patients before and after implementation of the transfer protocol were enrolled. Of these patients, 262 were transferred through protocol while the other 107 patients were transferred through the traditional referral process. Results There were no significant differences in DTB time, pain to door of STEMI receiving center arrival time, and pain to balloon time between the two groups. Pain to electrocardiography time in patients with Killip I/II and catheterization laboratory to balloon time in patients with Killip III/IV were significantly reduced in transferred through protocol group compared to in traditional referral process group (both p < 0.05). There were also no remarkable differences in the complication rate and 30-day mortality between two groups. The multivariate analysis revealed that the independent predictors of 30-day mortality were elderly patients, advanced Killip score, and higher level of troponin-I. Conclusions This study showed that patients transferred through our present protocol could reduce pain to electrocardiography and catheterization laboratory to balloon time in Killip I/II and III/IV patients separately. However, this study showed that using a cloud computing system in our present protocol did not reduce DTB time. PMID:28900621
Actions of the fall prevention protocol: mapping with the classification of nursing interventions.
Alves, Vanessa Cristina; Freitas, Weslen Carlos Junior de; Ramos, Jeferson Silva; Chagas, Samantha Rodrigues Garbis; Azevedo, Cissa; Mata, Luciana Regina Ferreira da
2017-12-21
to analyze the correspondence between the actions contained in the fall prevention protocol of the Ministry of Health and the Nursing Interventions Classification (NIC) by a cross-mapping. this is a descriptive study carried out in four stages: protocol survey, identification of NIC interventions related to nursing diagnosis, the risk of falls, cross-mapping, and validation of the mapping from the Delphi technique. there were 51 actions identified in the protocol and 42 interventions in the NIC. Two rounds of mapping evaluation were carried out by the experts. There were 47 protocol actions corresponding to 25 NIC interventions. The NIC interventions that presented the highest correspondence with protocol actions were: fall prevention, environmental-safety control, and risk identification. Regarding the classification of similarity and comprehensiveness of the 47 actions of the protocol mapped, 44.7% were considered more detailed and specific than the NIC, 29.8% less specific than the NIC and 25.5% were classified as similar in significance to the NIC. most of the actions contained in the protocol are more specific and detailed, however, the NIC contemplates a greater diversity of interventions and may base a review of the protocol to increase actions related to falls prevention..
Paes, Thaís; Belo, Letícia Fernandes; da Silva, Diego Rodrigues; Morita, Andrea Akemi; Donária, Leila; Furlanetto, Karina Couto; Sant'Anna, Thaís; Pitta, Fabio; Hernandes, Nidia Aparecida
2017-03-01
It is important to assess activities of daily living (ADL) in older adults due to impairment of independence and quality of life. However, there is no objective and standardized protocol available to assess this outcome. Thus, the aim of this study was to verify the reproducibility and validity of a new protocol for ADL assessment applied in physically independent adults age ≥50 y, the Londrina ADL protocol, and to establish an equation to predict reference values of the Londrina ADL protocol. Ninety-three physically independent adults age ≥50 y had their performance in ADL evaluated by registering the time spent to conclude the protocol. The protocol was performed twice. The 6-min walk test, which assesses functional exercise capacity, was used as a validation criterion. A multiple linear regression model was applied, including anthropometric and demographic variables that correlated with the protocol, to establish an equation to predict the protocol's reference values. In general, the protocol was reproducible (intraclass correlation coefficient 0.91). The average difference between the first and second protocol was 5.3%. The new protocol was valid to assess ADL performance in the studied subjects, presenting a moderate correlation with the 6-min walk test (r = -0.53). The time spent to perform the protocol correlated significantly with age (r = 0.45) but neither with weight (r = -0.17) nor with height (r = -0.17). A model of stepwise multiple regression including sex and age showed that age was the only determinant factor to the Londrina ADL protocol, explaining 21% ( P < .001) of its variability. The derived reference equation was: Londrina ADL protocol pred (s) = 135.618 + (3.102 × age [y]). The Londrina ADL protocol was reproducible and valid in physically independent adults age ≥50 y. A reference equation for the protocol was established including only age as an independent variable (r 2 = 0.21), allowing a better interpretation of the protocol's results in clinical practice. Copyright © 2017 by Daedalus Enterprises.
NASA Astrophysics Data System (ADS)
de Fátima Lima Ferreira, Maria; de Carvalho, Fabiola Bastos; de Oliveira, Susana C. P. S.; Monteiro, Juliana S. C.; Santos, Gustavo M. P.; Gesteira, Maria F. M.; Maia, Tereza Cristina Teixeira; Pinheiro, Antônio L. B.
2013-03-01
The aim of this study was to evaluate the efficacy of the laser photobiomodulation (FBML) in prevention and treatment of oral mucositis induced by chemotherapy protocols CMF (cyclophosphamide, methotrexate, 5-Fluouracil) and FAC (5 Fluouracil + Adriamycin + Cyclophosphamide) in cancer patients breast. We selected 28 patients treated at the Center for High Complexity (CACON), who underwent 6 cycles of 21 days of treatment, with diagnosis of infiltrating ductal carcinoma (ICD C50.9). Were randomly divided into three groups: Group A - eight patients (Protocol FAC + Dental protocol of CACON + Laser), Group B - 6 patients (Protocol CMF + Dental protocol of CACON + Laser), Group C - was divided into two sub-groups: Group C1 with 8 patients (Control Group 1: FAC + Dental protocol o CACON) and group C2 with 6 patients (control group 2: Protocol CMF + Dental protocol of CACON). Patients in Group A and B were use of preventive FBML 24 hours before the start of chemotherapy cycle, then every 48 hours and was extended up to one week following completion of chemotherapy. The groups A and B, presented oral mucositis grade 0 (64.29%) p = 0.07, grade I (7.14%), grade II (14.29%), grade III (7.14 %), grade IV (7.14%) compared to group C, who presented mucositis grade 0 (35.71%) in the initial evaluation with p = 0.10, grade I (21.43%), grade II (28.57%), grade III (14.29%), grade IV (0.00%), patients who used the FBML as a preventive and therapeutic showed a reduction and pain relief in 42.86%. It is concluded that the low power laser when used preventively or as therapy and showed immediate relief of pain and accelerate tissue repair.
Chronology of desert margin in western India using improved luminescence dating protocols
NASA Astrophysics Data System (ADS)
Chauhan, Naveen; Morthekai, P.
2017-12-01
The present study provides improved chronology for the desert margin fluvial sediments of semi-arid region located in the Mahi river basin, western India. The sequence has preserved a near-continuous record of climate change since the Last Interglacial. An earlier attempt of dating based on feldspar IRSL chronology shows a combined effect of anomalous fading and unbleached components resulting in age inversions. The present work tries to explore the possibility of using blue light stimulated luminescence (BLSL) of quartz, infra-red stimulated luminescence (IRSL) of feldspar and the newly developed methodologies, like natural correction factor based single aliquot regeneration (NCF-SAR) protocol and decision making schemes based on distribution of doses and beta heterogeneity concept for luminescence dating of sediments. Observations suggest that quartz suffered from significant sensitivity changes during natural signal measurement and partial bleaching. A combination of NCF-SAR protocol and sample specific equivalent dose computation helped in arriving at better age estimate for present samples. The study also compares the criteria for the selection of different age models that are used at present. The age of the alluvial sequence is now bracketed between 10 ka (upper aeolian unit) and 75 ka (lowermost fluvial unit).
[PROtocol-based MObilizaTION on intensive care units : Design of a cluster randomized pilot study].
Nydahl, P; Diers, A; Günther, U; Haastert, B; Hesse, S; Kerschensteiner, C; Klarmann, S; Köpke, S
2017-10-12
Despite convincing evidence for early mobilization of patients on intensive care units (ICU), implementation in practice is limited. Protocols for early mobilization, including in- and exclusion criteria, assessments, safety criteria, and step schemes may increase the rate of implementation and mobilization. Patients (population) on ICUs with a protocol for early mobilization (intervention), compared to patients on ICUs without protocol (control), will be more frequently mobilized (outcome). A multicenter, stepped-wedge, cluster-randomized pilot study is presented. Five ICUs will receive an adapted, interprofessional protocol for early mobilization in randomized order. Before and after implementation, mobilization of ICU patients will be evaluated by randomized monthly one-day point prevalence surveys. Primary outcome is the percentage of patients mobilized out of bed, operationalized as a score of ≥3 on the ICU Mobility Scale. Secondary outcome parameters will be presence and/or length of mechanical ventilation, delirium, stay on ICU and in hospital, barriers to early mobilization, adverse events, and process parameters as identified barriers, used strategies, and adaptions to local conditions. Exploratory evaluation of study feasibility and estimation of effect sizes as the basis for a future explanatory study.
A rapid and efficient SDS-based RNA isolation protocol from different tissues of coffee.
Huded, Arun Kumar C; Jingade, Pavankumar; Mishra, Manoj Kumar
2018-03-01
Isolation of high-quality RNA from coffee is challenging because of high level of polysaccharides, polyphenols and other secondary metabolites. In the present study, a rapid and efficient RNA extraction protocol from different tissues of coffee was optimized. Sufficiently high quality and quantity (225.6-454.8 µg/g) of RNA was obtained by using the optimized protocol. The presence of two distinct bands of 28S rRNA and 18S rRNA in agarose gel proved the intactness of the RNA samples. The average spectrophotometric values of the isolated RNA ranged from 1.96 to 2.02 ( A 260/280 ) and 1.95 to 2.14 ( A 260/230 ), indicating the high quality of RNA devoid of polyphenols, polysaccharides and protein contamination. In the optimized protocol, addition of PVPP to the extraction buffer and a brief incubation of samples at 65 °C and subsequent purification with potassium acetate resulted in good-quality RNA isolation. The suitability of RNA for downstream processing was confirmed by PCR amplification with cytochrome c oxidase gene-specific primers. The amplification of a single 392 bp fragment using cDNA and 1.5 kb fragment using genomic DNA samples confirmed the absence of DNA contamination. The present protocol is rapid and yielded good quality and quantity of RNA suitable for functional genomics studies.
Li, Jian; Yang, Yu-Guang; Chen, Xiu-Bo; Zhou, Yi-Hua; Shi, Wei-Min
2016-08-19
A novel quantum private database query protocol is proposed, based on passive round-robin differential phase-shift quantum key distribution. Compared with previous quantum private database query protocols, the present protocol has the following unique merits: (i) the user Alice can obtain one and only one key bit so that both the efficiency and security of the present protocol can be ensured, and (ii) it does not require to change the length difference of the two arms in a Mach-Zehnder interferometer and just chooses two pulses passively to interfere with so that it is much simpler and more practical. The present protocol is also proved to be secure in terms of the user security and database security.
Tsujimoto, Yasushi; Tsujimoto, Hiraku; Kataoka, Yuki; Kimachi, Miho; Shimizu, Sayaka; Ikenoue, Tatsuyoshi; Fukuma, Shingo; Yamamoto, Yosuke; Fukuhara, Shunichi
2017-04-01
To describe the registration of systematic review (SR) protocols and examine whether or not registration reduced the outcome reporting bias in high-impact journals. We searched MEDLINE via PubMed to identify SRs of randomized controlled trials of interventions. We included SRs published between August 2009 and June 2015 in the 10 general and internal medicinal journals with the highest impact factors in 2013. We examined the proportion of SR protocol registration and investigated the relationship between registration and outcome reporting bias using multivariable logistic regression. Among the 284 included reviews, 60 (21%) protocols were registered. The proportion of registration increased from 5.6% in 2009 to 27% in 2015 (P for trend <0.001). Protocol registration was not associated with outcome reporting bias (adjusted odds ratio [OR] 0.85, 95% confidence interval [CI] 0.39-1.86). The association between Preferred Reporting Items for Systematic review and Meta-Analysis (PRISMA) adherence and protocol registration was not statistically significant (OR 1.09, 95% CI 0.59-2.01). Six years after the launch of the PRISMA statement, the proportion of protocol registration in high-impact journals has increased some but remains low. The present study found no evidence suggesting that protocol registration reduced outcome reporting bias. Copyright © 2017 Elsevier Inc. All rights reserved.
(LMRG): Microscope Resolution, Objective Quality, Spectral Accuracy and Spectral Un-mixing
Bayles, Carol J.; Cole, Richard W.; Eason, Brady; Girard, Anne-Marie; Jinadasa, Tushare; Martin, Karen; McNamara, George; Opansky, Cynthia; Schulz, Katherine; Thibault, Marc; Brown, Claire M.
2012-01-01
The second study by the LMRG focuses on measuring confocal laser scanning microscope (CLSM) resolution, objective lens quality, spectral imaging accuracy and spectral un-mixing. Affordable test samples for each aspect of the study were designed, prepared and sent to 116 labs from 23 countries across the globe. Detailed protocols were designed for the three tests and customized for most of the major confocal instruments being used by the study participants. One protocol developed for measuring resolution and objective quality was recently published in Nature Protocols (Cole, R. W., T. Jinadasa, et al. (2011). Nature Protocols 6(12): 1929–1941). The first study involved 3D imaging of sub-resolution fluorescent microspheres to determine the microscope point spread function. Results of the resolution studies as well as point spread function quality (i.e. objective lens quality) from 140 different objective lenses will be presented. The second study of spectral accuracy looked at the reflection of the laser excitation lines into the spectral detection in order to determine the accuracy of these systems to report back the accurate laser emission wavelengths. Results will be presented from 42 different spectral confocal systems. Finally, samples with double orange beads (orange core and orange coating) were imaged spectrally and the imaging software was used to un-mix fluorescence signals from the two orange dyes. Results from 26 different confocal systems will be summarized. Time will be left to discuss possibilities for the next LMRG study.
NASA SpaceWire Activities/Comments/Recommendations
NASA Technical Reports Server (NTRS)
Rakow, Glenn
2006-01-01
This viewgraph presentation reviews NASA's activities, and proposes recommendations for the further use of the SpaceWire (SpW). The areas covered in this presentation are: (1) Protocol ID assignment, (2) Protocol development, (3) Plug & Play (PnP), (4) Recommended additions t o SpW protocol and (5) SpaceFibre trade.
Lie, Marie Udnesseter; Matre, Dagfinn; Hansson, Per; Stubhaug, Audun; Zwart, John-Anker; Nilsen, Kristian Bernhard
2017-01-01
Abstract Introduction: The interest in conditioned pain modulation (CPM) as a clinical tool for measuring endogenously induced analgesia is increasing. There is, however, large variation in the CPM methodology, hindering comparison of results across studies. Research comparing different CPM protocols is needed in order to obtain a standardized test paradigm. Objectives: The aim of the study was to assess whether a protocol with phasic heat stimuli as test-stimulus is preferable to a protocol with tonic heat stimulus as test-stimulus. Methods: In this experimental crossover study, we compared 2 CPM protocols with different test-stimulus; one with tonic test-stimulus (constant heat stimulus of 120-second duration) and one with phasic test-stimuli (3 heat stimulations of 5 seconds duration separated by 10 seconds). Conditioning stimulus was a 7°C water bath in parallel with the test-stimulus. Twenty-four healthy volunteers were assessed on 2 occasions with minimum 1 week apart. Differences in the magnitude and test–retest reliability of the CPM effect in the 2 protocols were investigated with repeated-measures analysis of variance and by relative and absolute reliability indices. Results: The protocol with tonic test-stimulus induced a significantly larger CPM effect compared to the protocol with phasic test-stimuli (P < 0.001). Fair and good relative reliability was found with the phasic and tonic test-stimuli, respectively. Absolute reliability indices showed large intraindividual variability from session to session in both protocols. Conclusion: The present study shows that a CPM protocol with a tonic test-stimulus is preferable to a protocol with phasic test-stimuli. However, we emphasize that one should be cautious to use the CPM effect as biomarker or in clinical decision making on an individual level due to large intraindividual variability. PMID:29392240
Dąbrowska, Krystyna
2018-01-01
In all cases when a bacteriophage makes direct contact with a mammalian organism, it may challenge the mammalian immunological system. Its major consequence is production of antibodies specific to the bacteriophage. Here we present protocols applicable in studies of bacteriophage ability to induce specific antibodies. The protocols have been divided into three parts: purification, immunization, and detection (ELISA).
[Cognitive therapy of trauma related guilt in patients with PTSD].
Popiel, Agnieszka
2014-01-01
Various aspects of guilt are frequent problems of patients suffering from PTSD, though they have been included into the diagnostic criteria for PTSD just in the present version DSM-5. Some studies indicate limitation of effectiveness of exposure therapy in PTSD patients with predominant emotions of anger or guilt. The aim of this paper is to present cognitive conceptualization of guilt in PTSD proposed by Kubany, and a treatment protocol resulting from this conceptualization. The clinical application of the protocol is illustrated with preliminary results of systematic observation of 8 patients with moderate to severe PTSD who were treated with cognitive therapy for guilt followed by a standard prolonged exposure protocol. The cognitive therapy of guilt can be a valuable supplement for treatment of PTSD. This protocol can also be an inspiration for therapists working with patients with dysfunctional guilt as a problem in other than PTSD disorders--like depression or adjustment disorders. In discussion the place of guilt in treatment according to different (PE-Foa et al.; CPT-Resick et al.; CT-Ehlers and Clark) trauma focused therapy approaches is addressed, and the need for further studies is underlined.
Effects of exercise with or without light exposure on sleep quality and hormone reponses
Lee, Hayan; Kim, Sunho; Kim, Donghee
2014-01-01
[Purpose] The objectives of the present study were to determine the effect of sun exposure and aerobic exercise on quality of sleep and investigate sleep-related hormonal responses in college-aged males. [Methods] In this study, the cross-over design was utilized. The subjects (N = 10) without any physical problems or sleep disorders participated in the experimental performed 4 protocols in only sun exposure (for 30 minutes, EG1) protocol, only aerobic exercise (walking and jogging for 30 minutes, EG2) protocol, aerobic exercise with sun exposure (EG3) protocol, and control (no exercise and no sun exposure, EG4) protocol. Each protocol was 5 times per week with one-week break (wash-out period) between protocols to prevent the effects of the previous protocol. Total test period was should be 7 weeks (one week of protocol and one week of break). Before and after each aerobic exercise session, the subjects completed stretching to warm up for 5 to 10 minutes. Surveys consisting of (bedtime, wake-up time, sleep onset latency, and (Pittsburgh Sleep Quality Index (PSQI) were obtained before the test and after each protocol. After each protocol, the following sleep-related hormonal responses were measured: blood concentrations of melatonin, cortisol, epinephrine, and norepinephrine. One-way ANOVA was used to determine differences between protocols. Statistical significance was set at p < 0.05. [Results] Bedtime of EG4 was significantly later than that of the EG1 or EG3. Wake-up time in the EG4 was significantly later than that of the EG1 or the EG3. Sleep onset latency in the EG4 was longer than that of the EG3. The quality of sleep in the EG4 was lower than that of the EG3. Sleep cycle in the EG4 was significantly shorter than that of the EG1. Blood melatonin concentrations of the EG3 was significantly higher than that of the EG4. There were no significant differences in blood concentrations of cortisol, epinephrine, or norepinephrine among protocols, with the order from the lowest to the highest values of EG1 < EG2 < EG3 < EG4. [Conclusion] The present data found that EG1 and EG3 showed positive sleep-related hormonal responses, sleep habits, and quality of sleep, indicating that sun exposure or exercise with sun exposure may improve the physical status and quality of life. PMID:25566466
Effect of Exercise Intensity and Duration on Postexercise Executive Function.
Tsukamoto, Hayato; Takenaka, Saki; Suga, Tadashi; Tanaka, Daichi; Takeuchi, Tatsuya; Hamaoka, Takafumi; Isaka, Tadao; Hashimoto, Takeshi
2017-04-01
The effect of exercise volume represented by exercise intensity and duration on postexercise executive function (EF) improvement remains unclear. In the present study, involving two volume-controlled evaluations, we aimed to compare acute exercise protocols with differing intensities and durations to establish an effective exercise protocol for improving EF. In study 1, 12 healthy male subjects performed cycle ergometer exercise, based on a low-intensity (LI) protocol for 20 min (LI20), moderate-intensity (MI) protocol for 20 min (MI20), and MI20 volume-matched LI protocol for 40 min (LI40). The exercise intensities for the LI and MI were set at 30% and 60% of peak oxygen consumption, respectively. In study 2, 15 healthy male subjects performed MI exercise for 10 min (MI10), MI20, and 40 min (MI40). To evaluate the EF, the color-word Stroop task was administrated before exercise, immediately after exercise, and during the 30-min postexercise recovery. In study 1, postexercise EF improvement was sustained for a longer duration after MI20 than after LI40 and was sustained for a longer duration after LI40 than after LI20. In study 2, although there was no significant difference in post-MI exercise EF improvement, the magnitude of difference in the EF between preexercise and 30-min postexercise recovery period was moderately larger in MI40, but not in MI10 and MI20, indicating that the EF improvement during postexercise recovery could be sustained after MI40. The present findings showed that postexercise EF improvement could be prolonged after MI exercise with a moderate duration compared with volume-matched LI exercise with a longer duration. In addition, MI exercise with a relatively long duration may slightly prolong the postexercise EF improvement.
An orthopedist's guide to shoulder ultrasound: a systematic review of examination protocols.
Amoo-Achampong, Kelms; Nwachukwu, Benedict U; McCormick, Frank
2016-11-01
The utilization of musculoskeletal ultrasound has expanded within the setting of the orthopedic clinic as a cost-effective, point-of-care diagnostic tool for shoulder pathology. In experienced hands, ultrasound exhibits capabilities equivalent to that of magnetic resonance imaging in the diagnosis of many shoulder diseases including full-thickness and partial-thickness rotator cuff tears. Although similarly effective in identifying additional shoulder disease processes, major obstacles to its widespread use include user dependence and intrinsic limitation to extra-articular diagnosis. The purpose of this review is to present a step-by-step guide of how to perform a comprehensive shoulder examination and to discuss the appropriate use, economic benefit and implementation of ultrasound within the clinic. A systematic search (June 2016) of PubMed, Scopus, and EMBASE databases was conducted according to the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines for literature presenting shoulder ultrasound examination protocols. Included studies were peer-reviewed articles or academic society endorsed protocols presenting comprehensive sonographic examinations of the adult shoulder. Papers with limited or single structure examination descriptions, non-English language, and publication dates before 1980 were excluded. Final papers meeting criteria were secondarily screened for publication after 2005 to reflect the current state of ultrasound imaging. The search yielded 1,725 unique articles with 17 studies meeting final selection criteria. Information from identified studies was summarized to formulate a 4-part shoulder examination protocol, including steps most pertinent to orthopedic in-office diagnoses. In agreement with previous studies, the inexperienced orthopedic surgeon can be quickly trained to expert level proficiency in shoulder ultrasound diagnosis. Using an established protocol, a comprehensive, yet effective shoulder ultrasound examination can be performed within ten minutes. Further, ultrasound provides opportunity to off-set costs through the engagement of revenue generating activity for the orthopedic practice.
A Mobile Satellite Experiment (MSAT-X) network definition
NASA Technical Reports Server (NTRS)
Wang, Charles C.; Yan, Tsun-Yee
1990-01-01
The network architecture development of the Mobile Satellite Experiment (MSAT-X) project for the past few years is described. The results and findings of the network research activities carried out under the MSAT-X project are summarized. A framework is presented upon which the Mobile Satellite Systems (MSSs) operator can design a commercial network. A sample network configuration and its capability are also included under the projected scenario. The Communication Interconnection aspect of the MSAT-X network is discussed. In the MSAT-X network structure two basic protocols are presented: the channel access protocol, and the link connection protocol. The error-control techniques used in the MSAT-X project and the packet structure are also discussed. A description of two testbeds developed for experimentally simulating the channel access protocol and link control protocol, respectively, is presented. A sample network configuration and some future network activities of the MSAT-X project are also presented.
A Secure and Efficient Handover Authentication Protocol for Wireless Networks
Wang, Weijia; Hu, Lei
2014-01-01
Handover authentication protocol is a promising access control technology in the fields of WLANs and mobile wireless sensor networks. In this paper, we firstly review an efficient handover authentication protocol, named PairHand, and its existing security attacks and improvements. Then, we present an improved key recovery attack by using the linearly combining method and reanalyze its feasibility on the improved PairHand protocol. Finally, we present a new handover authentication protocol, which not only achieves the same desirable efficiency features of PairHand, but enjoys the provable security in the random oracle model. PMID:24971471
Semi-quantum Dialogue Based on Single Photons
NASA Astrophysics Data System (ADS)
Ye, Tian-Yu; Ye, Chong-Qiang
2018-02-01
In this paper, we propose two semi-quantum dialogue (SQD) protocols by using single photons as the quantum carriers, where one requires the classical party to possess the measurement capability and the other does not have this requirement. The security toward active attacks from an outside Eve in the first SQD protocol is guaranteed by the complete robustness of present semi-quantum key distribution (SQKD) protocols, the classical one-time pad encryption, the classical party's randomization operation and the decoy photon technology. The information leakage problem of the first SQD protocol is overcome by the classical party' classical basis measurements on the single photons carrying messages which makes him share their initial states with the quantum party. The security toward active attacks from Eve in the second SQD protocol is guaranteed by the classical party's randomization operation, the complete robustness of present SQKD protocol and the classical one-time pad encryption. The information leakage problem of the second SQD protocol is overcome by the quantum party' classical basis measurements on each two adjacent single photons carrying messages which makes her share their initial states with the classical party. Compared with the traditional information leakage resistant QD protocols, the advantage of the proposed SQD protocols lies in that they only require one party to have quantum capabilities. Compared with the existing SQD protocol, the advantage of the proposed SQD protocols lies in that they only employ single photons rather than two-photon entangled states as the quantum carriers. The proposed SQD protocols can be implemented with present quantum technologies.
Prognostic significance of DNA index by flowcytometry in acute lymphoblastic leukaemia.
Parikh, P M; Ashokkumar, M S; Pai, S K; Redkar, A; Chopra, H K; Barbhaya, S A; Gopal, R; Mittra, I; Advani, S H
1995-07-01
DNA index (DI) is considered an important prognostic factor in acute lymphoblastic leukaemia (ALL). We undertook this study to correlate DI with other presenting features and response to therapy. Of the 30 patients of ALL treated at our hospital and entered in this study, 15 were put on the aggressive MCP (multi center protocol) 841 protocol and equal number on the Alternate protocol. Eighteen achieved complete remission (13/15 on the former protocol and 5/15 on the later). DI was less than 0.8 in 8 (27%) patients, between 0.8 and 1.2 in 18 (60%) and more than 1.2 in 4 patients (13%). These figures are different from those reported in Caucasians. On multivariate regression analysis, the DI significantly correlated with percentage of blasts in peripheral blood (P = 0.0035). There was no correlation with outcome or response to treatment.
Singh, Swaran P; Paul, Moli; Ford, Tamsin; Kramer, Tami; Weaver, Tim
2008-06-23
Although young people's transition from Child and Adolescent Mental Health Services (CAMHS) to Adult Mental Health Services (AMHS) in England is a significant health issue for service users, commissioners and providers, there is little evidence available to guide service development. The TRACK study aims to identify factors which facilitate or impede effective transition from CAHMS to AMHS. This paper presents findings from a survey of transition protocols in Greater London. A questionnaire survey (Jan-April 2005) of Greater London CAMHS to identify transition protocols and collect data on team size, structure, transition protocols, population served and referral rates to AMHS. Identified transition protocols were subjected to content analysis. Forty two of the 65 teams contacted (65%) responded to the survey. Teams varied in type (generic/targeted/in-patient), catchment area (locality-based, wider or national) and transition boundaries with AMHS. Estimated annual average number of cases considered suitable for transfer to AMHS, per CAMHS team (mean 12.3, range 0-70, SD 14.5, n = 37) was greater than the annual average number of cases actually accepted by AMHS (mean 8.3, range 0-50, SD 9.5, n = 33). In April 2005, there were 13 active and 2 draft protocols in Greater London. Protocols were largely similar in stated aims and policies, but differed in key procedural details, such as joint working between CAHMS and AMHS and whether protocols were shared at Trust or locality level. While the centrality of service users' involvement in the transition process was identified, no protocol specified how users should be prepared for transition. A major omission from protocols was procedures to ensure continuity of care for patients not accepted by AMHS. At least 13 transition protocols were in operation in Greater London in April 2005. Not all protocols meet all requirements set by government policy. Variation in protocol-sharing organisational units and transition process suggest that practice may vary. There is discontinuity of care provision for some patients who 'graduate' from CAMHS services but are not accepted by adult services.
Singh, Swaran P; Paul, Moli; Ford, Tamsin; Kramer, Tami; Weaver, Tim
2008-01-01
Background Although young people's transition from Child and Adolescent Mental Health Services (CAMHS) to Adult Mental Health Services (AMHS) in England is a significant health issue for service users, commissioners and providers, there is little evidence available to guide service development. The TRACK study aims to identify factors which facilitate or impede effective transition from CAHMS to AMHS. This paper presents findings from a survey of transition protocols in Greater London. Methods A questionnaire survey (Jan-April 2005) of Greater London CAMHS to identify transition protocols and collect data on team size, structure, transition protocols, population served and referral rates to AMHS. Identified transition protocols were subjected to content analysis. Results Forty two of the 65 teams contacted (65%) responded to the survey. Teams varied in type (generic/targeted/in-patient), catchment area (locality-based, wider or national) and transition boundaries with AMHS. Estimated annual average number of cases considered suitable for transfer to AMHS, per CAMHS team (mean 12.3, range 0–70, SD 14.5, n = 37) was greater than the annual average number of cases actually accepted by AMHS (mean 8.3, range 0–50, SD 9.5, n = 33). In April 2005, there were 13 active and 2 draft protocols in Greater London. Protocols were largely similar in stated aims and policies, but differed in key procedural details, such as joint working between CAHMS and AMHS and whether protocols were shared at Trust or locality level. While the centrality of service users' involvement in the transition process was identified, no protocol specified how users should be prepared for transition. A major omission from protocols was procedures to ensure continuity of care for patients not accepted by AMHS. Conclusion At least 13 transition protocols were in operation in Greater London in April 2005. Not all protocols meet all requirements set by government policy. Variation in protocol-sharing organisational units and transition process suggest that practice may vary. There is discontinuity of care provision for some patients who 'graduate' from CAMHS services but are not accepted by adult services. PMID:18573214
Scanning protocols dedicated to smart velocity ranging in spectral OCT.
Grulkowski, Ireneusz; Gorczynska, Iwona; Szkulmowski, Maciej; Szlag, Daniel; Szkulmowska, Anna; Leitgeb, Rainer A; Kowalczyk, Andrzej; Wojtkowski, Maciej
2009-12-21
We introduce a new type of scanning protocols, called segmented protocols, which enable extracting multi-range flow velocity information from a single Spectral OCT data set. The protocols are evaluated using a well defined flow in a glass capillary. As an example of in vivo studies, we demonstrate two- and three-dimensional imaging of the retinal vascular system in the eyes of healthy volunteers. The flow velocity detection is performed using a method of Joint Spectral and Time domain OCT. Velocity ranging is demonstrated in imaging of retinal vasculature in the macular region and in the optic disk area characterized by different flow velocity values. Additionally, an enhanced visualization of retinal capillary network is presented in the close proximity to macula.
Guay, Stephane; Tremblay, Nicole; Goncalves, Jane; Bilodeau, Henriette; Geoffrion, Steve
2017-01-01
Introduction The use of peer support programmes to help workers experiencing potentially traumatic events (PTE) has increased in high-risk organisations in the last decades. However, the scientific evidence of its effectiveness is still very limited. This paper aims to describe the protocol of a prospective cohort study that assesses the efficacy of a peer support programme among youth social services employees exposed to a PTE at work on psychological well-being, work functioning and needs of support. Methods and analysis This is a mixed-methods prospective study that will examine workers' evolution four times over a 12-month period in Canada. This study involves: (1) quantitative data obtained through self-administrated questionnaires among 222 workers, and (2) qualitative in-depth interviews with a subsample of 45 workers. This study will compare findings from a cohort who received the support of a peer following a PTE (peer support–experimental protocol) as part of the experimental protocol of the Montreal Youth Social Services-University Institute (MYSS-UI), the second group of workers did not ask for the peer support (no peer support-experimental protocol) but was part of MYSS-UI, and the third group received standard organisational support from the Monteregie Youth Social Services (MYSS) (standard organisational protocol). Ethics and dissemination The protocol and informed consent form complied with the ethics guidelines of the MYSS-UI. The Research Ethics Board of MYSS-UI and MYSS reviewed and accepted the protocol as required. The results of the study will be published in peer-reviewed journals, presented at research and general public conferences, disseminated via a public report for the institute that funded the project and for all workers. Results of this study will influence decision making regarding intervention policies following PTE and peer support interventions may be expanded throughout the youth social services in Canada and worldwide. PMID:28647721
Kuppens, S M I; Hasaart, T H M; van der Donk, M W P; Huibers, M; Franssen, M J; de Becker, B M J; Wijnen, H A A; Pop, V J M
2008-06-07
Identification of determinants affecting the outcome of external cephalic version (ECV) in breech presentation, and investigation of the impact of ECV--performed according to a standardized protocol in an outpatient clinic--on the mode of delivery. Retrospective analysis. In 2003 a standardized protocol of ECV was developed in the outpatient clinic for obstetrics of the Catharina Hospital in Eindhoven, the Netherlands; it was tested in 'version office visits'. Obstetric characteristics of all pregnant women who underwent attempts of ECV in the clinic from January 2004 until June 2006 during these sessions, and the subsequent births, were analysed. 85% of all ECVs were performed by the same hospital midwife and gynaecologist, in accordance with the protocol. ECV was successful in 96 of 209 pregnant women (46%). In 1 pregnant woman an emergency caesarean section was performed after ECV because of partial abruptio placentae. Nulliparity, incomplete breech presentation and low birth weight of the baby were associated with a lower success rate of ECV in this study. In the group with a successful ECV the percentage of caesarean deliveries was substantially lower (9 versus 83%; odds ratio: 0.21; 95% CI: 0.09-0.51). A regular team consisting of a hospital midwife and a gynaecologist working according to a standardized protocol for ECV in a case of breech presentation proved successful: the number of term breech presentations substantially diminished and therefore the percentage of caesarean sections was lower in the group in which ECV had been successful. This could have considerable impact on health care in the Netherlands in terms of reduced maternal morbidity and cost savings.
Havens, Jennifer R.; Leukefeld, Carl G.; Oser, Carrie B.; Staton-Tindall, Michele; Knudsen, Hannah K.; Mooney, Jennifer; Duvall, Jamieson L.; Clarke, Jennifer G.; Frisman, Linda; Surratt, Hilary L.; Inciardi, James A.
2009-01-01
The purpose of this study was to examine the implementation, adherence and protocol fidelity for the Reducing Risky Relationships for HIV (RRR-HIV) study. The RRR-HIV study is a phase III trial of a randomized intervention to reduce human immunodeficiency virus (HIV) risk behaviors among incarcerated women in four US states: Connecticut, Delaware, Kentucky and Rhode Island. The intervention consists of five interventionist-led prison-based group sessions and a sixth individual community-based session. Data on adherence, implementation, acceptability and fidelity of the intervention were obtained from forms completed after the five prison-based sessions by both the interventionist and participant. Data from the sixth session were collected by the interventionist. Of the 363 women recruited to date, 173 (47.6%) have been randomly allocated to the experimental RRR intervention, of which implementation measures were available for 162 (93.6%). Almost three-quarters of women attended all five sessions, each of which lasted a median of 90 minutes, indicating successful implementation of the protocol across multiple study sites. Interventionists and participants alike reported that all of the topics for each session were discussed, suggesting adherence to the protocol. In addition, protocol interventionists indicated that more than 95% of the women were engaged/involved, interested, and understood the materials presented, indicating high levels of acceptability among the participants and fidelity to the intervention protocols. The majority of participants also answered all of the post-test questions correctly, which is another strong indicator of the fidelity to the intervention. Results suggest that the RRR-HIV study has been successfully implemented across multiple study sites. Adherence to the protocol, as well as protocol fidelity and acceptability, were also strong, which is essential to establish prior to examining outcome data. PMID:20090928
Sturgill, Jeremiah; Howell, Scott; Perry, Maureen Munnelly; Kothari, Hemali
2016-11-01
Approximately 14% of Americans are living with chronic kidney disease (CKD). The prevalence of end-stage renal disease (ESRD), the result of progressing CKD continues to rise by 21,000 per year. There are no updated, evidence-based antibiotic prophylaxis guidelines for patients with renal disease undergoing dental treatment. The most recent was a scientific statement from the American Heart Association (AHA) in 2003. Presented in three parts, the goal of the first part of this study is to determine the current protocol being used to treat renal patients at U.S. dental schools. A 21 multiple-choice question survey was e-mailed to 58 clinic deans of accredited dental schools in the United States regarding renal treatment protocol details including antibiotic prophylaxis. Fifty-two percent of programs report having no established renal patient treatment protocol. For programs with a protocol, when using prophylactic antibiotics, 54% followed AHA protocol, whereas 62% used a modified protocol. There is a lack of consistent, established protocols among undergraduate dental programs. It is suggested that evidence-based guidelines for the safe treatment of patients be developed. © 2016 Special Care Dentistry Association and Wiley Periodicals, Inc.
Li, Jian; Yang, Yu-Guang; Chen, Xiu-Bo; Zhou, Yi-Hua; Shi, Wei-Min
2016-01-01
A novel quantum private database query protocol is proposed, based on passive round-robin differential phase-shift quantum key distribution. Compared with previous quantum private database query protocols, the present protocol has the following unique merits: (i) the user Alice can obtain one and only one key bit so that both the efficiency and security of the present protocol can be ensured, and (ii) it does not require to change the length difference of the two arms in a Mach-Zehnder interferometer and just chooses two pulses passively to interfere with so that it is much simpler and more practical. The present protocol is also proved to be secure in terms of the user security and database security. PMID:27539654
Vañó, Eliseo; Alejo, Luis; Ubeda, Carlos; Gutiérrez‐Larraya, Federico; Garayoa, Julia
2016-01-01
The aim of this study was to assess image quality and radiation dose of a biplane angiographic system with cone‐beam CT (CBCT) capability tuned for pediatric cardiac procedures. The results of this study can be used to explore dose reduction techniques. For pulsed fluoroscopy and cine modes, polymethyl methacrylate phantoms of various thicknesses and a Leeds TOR 18‐FG test object were employed. Various fields of view (FOV) were selected. For CBCT, the study employed head and body dose phantoms, Catphan 504, and an anthropomorphic cardiology phantom. The study also compared two 3D rotational angiography protocols. The entrance surface air kerma per frame increases by a factor of 3–12 when comparing cine and fluoroscopy frames. The biggest difference in the signal‐to‐noise ratio between fluoroscopy and cine modes occurs at FOV 32 cm because fluoroscopy is acquired at a 1440×1440 pixel matrix size and in unbinned mode, whereas cine is acquired at 720×720 pixels and in binned mode. The high‐contrast spatial resolution of cine is better than that of fluoroscopy, except for FOV 32 cm, because fluoroscopy mode with 32 cm FOV is unbinned. Acquiring CBCT series with a 16 cm head phantom using the standard dose protocol results in a threefold dose increase compared with the low‐dose protocol. Although the amount of noise present in the images acquired with the low‐dose protocol is much higher than that obtained with the standard mode, the images present better spatial resolution. A 1 mm diameter rod with 250 Hounsfield units can be distinguished in reconstructed images with an 8 mm slice width. Pediatric‐specific protocols provide lower doses while maintaining sufficient image quality. The system offers a novel 3D imaging mode. The acquisition of CBCT images results in increased doses administered to the patients, but also provides further diagnostic information contained in the volumetric images. The assessed CBCT protocols provide images that are noisy, but with very good spatial resolution. PACS number(s): 87.59.‐e, 87.59.‐C, 87.59.‐cf, 87.59.Dj, 87.57. uq PMID:27455474
Corredoira, Eva; Vañó, Eliseo; Alejo, Luis; Ubeda, Carlos; Gutiérrez-Larraya, Federico; Garayoa, Julia
2016-07-08
The aim of this study was to assess image quality and radiation dose of a biplane angiographic system with cone-beam CT (CBCT) capability tuned for pediatric cardiac procedures. The results of this study can be used to explore dose reduction techniques. For pulsed fluoroscopy and cine modes, polymethyl methacrylate phantoms of various thicknesses and a Leeds TOR 18-FG test object were employed. Various fields of view (FOV) were selected. For CBCT, the study employed head and body dose phantoms, Catphan 504, and an anthropomorphic cardiology phantom. The study also compared two 3D rotational angiography protocols. The entrance surface air kerma per frame increases by a factor of 3-12 when comparing cine and fluoroscopy frames. The biggest difference in the signal-to- noise ratio between fluoroscopy and cine modes occurs at FOV 32 cm because fluoroscopy is acquired at a 1440 × 1440 pixel matrix size and in unbinned mode, whereas cine is acquired at 720 × 720 pixels and in binned mode. The high-contrast spatial resolution of cine is better than that of fluoroscopy, except for FOV 32 cm, because fluoroscopy mode with 32 cm FOV is unbinned. Acquiring CBCT series with a 16 cm head phantom using the standard dose protocol results in a threefold dose increase compared with the low-dose protocol. Although the amount of noise present in the images acquired with the low-dose protocol is much higher than that obtained with the standard mode, the images present better spatial resolution. A 1 mm diameter rod with 250 Hounsfield units can be distinguished in reconstructed images with an 8 mm slice width. Pediatric-specific protocols provide lower doses while maintaining sufficient image quality. The system offers a novel 3D imaging mode. The acquisition of CBCT images results in increased doses administered to the patients, but also provides further diagnostic information contained in the volumetric images. The assessed CBCT protocols provide images that are noisy, but with very good spatial resolution. © 2016 The Authors.
Berkson, Burton M; Rubin, Daniel M; Berkson, Arthur J
2009-12-01
The authors, in a previous article, described the long-term survival of a man with pancreatic cancer and metastases to the liver, treated with intravenous alpha-lipoic acid and oral low-dose naltrexone (ALA/N) without any adverse effects. He is alive and well 78 months after initial presentation. Three additional pancreatic cancer case studies are presented in this article. At the time of this writing, the first patient, GB, is alive and well 39 months after presenting with adenocarcinoma of the pancreas with metastases to the liver. The second patient, JK, who presented to the clinic with the same diagnosis was treated with the ALA/N protocol and after 5 months of therapy, PET scan demonstrated no evidence of disease. The third patient, RC, in addition to his pancreatic cancer with liver and retroperitoneal metastases, has a history of B-cell lymphoma and prostate adenocarcinoma. After 4 months of the ALA/N protocol his PET scan demonstrated no signs of cancer. In this article, the authors discuss the poly activity of ALA: as an agent that reduces oxidative stress, its ability to stabilize NF(k)B, its ability to stimulate pro-oxidant apoptosic activity, and its discriminative ability to discourage the proliferation of malignant cells. In addition, the ability of lowdose naltrexone to modulate an endogenous immune response is discussed. This is the second article published on the ALA/N protocol and the authors believe the protocol warrants clinical trial.
Graphical user interface for wireless sensor networks simulator
NASA Astrophysics Data System (ADS)
Paczesny, Tomasz; Paczesny, Daniel; Weremczuk, Jerzy
2008-01-01
Wireless Sensor Networks (WSN) are currently very popular area of development. It can be suited in many applications form military through environment monitoring, healthcare, home automation and others. Those networks, when working in dynamic, ad-hoc model, need effective protocols which must differ from common computer networks algorithms. Research on those protocols would be difficult without simulation tool, because real applications often use many nodes and tests on such a big networks take much effort and costs. The paper presents Graphical User Interface (GUI) for simulator which is dedicated for WSN studies, especially in routing and data link protocols evaluation.
A proactive approach for managing indoor air quality
DOE Office of Scientific and Technical Information (OSTI.GOV)
Greene, R.E.; Casey, J.M.; Williams, P.L.
1997-11-01
Ventilation and maintenance, followed by psychosocial issues, are the factors most often implicated in indoor air quality (IAQ) investigations. The absence of accepted exposure standards and the presence of a wide variety of building designs, ages, ventilation systems, and usages often make IAQ complaint investigations ineffective. Thus, the best approach to achieving IAQ is to prevent problems from occurring. This paper presents the framework for a proactive approach to managing the causes most often implicated in IAQ investigations. It is the aim of this proactive protocol to provide a cost-effective guide for preventing IAQ problems in nonindustrial settings and inmore » buildings for which there are no current IAQ complaints. The proposed protocol focuses on heating, ventilation, and air-conditioning (HVAC) system maintenance and operation; psychosocial factors; and the handling and investigation of complaints. An IAQ manager is designated to implement and manage the protocol. The HVAC system portion of the protocol focuses on proper maintenance of the components often identified as sources of problems in IAQ studies, documentation of the maintenance procedures, and training of individuals responsible for building maintenance. The protocol addresses the psychosocial factors with an environmental survey that rates the occupants` perceptions of the indoor air to identify potential IAQ problems. The psychosocial portion of the protocol also incorporates occupant education and awareness. Finally, a three-step initial investigation procedure for addressing IAQ problems is presented.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Logan, Jennifer K.; Tang, Chad; Liao, Zhongxing
Purpose: Challenges can arise when attempting to maximize patient enrollment in clinical trials. There have been limited studies focusing on the barriers to enrollment and the efficacy of alternative study design to improve accrual. We analyzed barriers to clinical trial enrollment, particularly the influence of timing, in context of three prospective, randomized oncology trials where one arm was considered more aggressive than the other. Methods and Materials: From June 2011 to March 2015, patients who were enrolled on 3 prospective institutional protocols (an oligometastatic non-small cell lung cancer [NSCLC] trial and 2 proton vs intensity modulated radiation therapy trials inmore » NSCLC and esophageal cancer) were screened for protocol eligibility. Eligible candidates were approached about trial participation, and patient characteristics (age, sex, T/N categorization) were recorded along with details surrounding trial presentation (appointment number). Fisher's exact test, Student's t tests, and multivariate analysis were performed to assess differences between enrolled and refusal patients. Results: A total of 309 eligible patients were approached about trial enrollment. The enrollment success rate during this time span was 52% (n=160 patients). Enrolled patients were more likely to be presented trial information at an earlier appointment (oligometastatic protocol: 5 vs 3 appointments [P<.001]; NSCLC protocol: 4 vs 3 appointments [P=.0018]; esophageal protocol: 3 vs 2 appointments [P=.0086]). No other factors or patient characteristics significantly affected enrollment success rate. Conclusion: Improvement in enrollment rates for randomized control trials is possible, even in difficult accrual settings. Earlier presentation of trial information to patients is the most influential factor for success and may help overcome accrual barriers without compromising trial design.« less
Carretero, M I; Giuliano, S M; Arraztoa, C C; Santa Cruz, R C; Fumuso, F G; Neild, D M
2017-08-01
Seminal plasma (SP) of South American Camelids could interfere with the interaction of spermatozoa with the extenders; therefore it becomes necessary to improve semen management using enzymatic treatment. Our objective was to compare two cooling protocols for llama semen. Twelve ejaculates were incubated in 0.1% collagenase and then were divided into two aliquots. One was extended in lactose and egg yolk (LEY) (Protocol A: collagenase and SP present). The other aliquot was centrifuged, and the pellet was resuspended in LEY (Protocol B: collagenase and SP absent). Both samples were maintained at 5°C during 24 hr. Routine and DNA evaluations were carried out in raw and cooled semen. Both cooling protocols maintained sperm viability, membrane function and DNA fragmentation, with Protocol A showing a significantly lowered total and progressive motility (p < .05) and Protocol B showing a significant increase in chromatin decondensation (p < .05). Protocol A avoids centrifugation, reducing processing times and making application in the field simpler. However, as neither protocol showed a significant superiority over the other, studies should be carried out in vivo to evaluate the effect on pregnancy rates of the presence of collagenase and SP in semen samples prior to either cooling or freeze-thawing. © 2016 Blackwell Verlag GmbH.
Brito, Maíra M; Lúcio, Cristina F; Angrimani, Daniel S R; Losano, João Diego A; Dalmazzo, Andressa; Nichi, Marcílio; Vannucchi, Camila I
2017-01-02
In addition to the existence of several cryopreservation protocols, no systematic research has been carried out in order to confirm the suitable protocol for canine sperm. This study aims to assess the effect of adding 5% glycerol during cryopreservation at 37°C (one-step) and 5°C (two-steps), in addition of testing two thawing protocols (37°C for 30 seconds, and 70°C for 8 seconds). We used 12 sperm samples divided into four experimental groups: Single-Step - Slow Thawing Group; Two-Step - Slow Thawing Group; Single-Step - Fast Thawing Group; and Two-Step - Fast Thawing Group. Frozen-thawed samples were submitted to automated analysis of sperm motility, evaluation of plasmatic membrane integrity, acrosomal integrity, mitochondrial activity, sperm morphology, sperm susceptibility to oxidative stress, and sperm binding assay to perivitellinic membrane of chicken egg yolk. Considering the comparison between freezing protocols, no statistical differences were verified for any of the response variables. When comparison between thawing protocols was performed, slow thawing protocol presented higher sperm count bound to perivitelline membrane of chicken egg yolk, compared to fast thawing protocol. Regardless of the freezing process, the slow thawing protocol can be recommended for the large scale cryopreservation of canine semen, since it shows a consistent better functional result.
Verification of a Byzantine-Fault-Tolerant Self-stabilizing Protocol for Clock Synchronization
NASA Technical Reports Server (NTRS)
Malekpour, Mahyar R.
2008-01-01
This paper presents the mechanical verification of a simplified model of a rapid Byzantine-fault-tolerant self-stabilizing protocol for distributed clock synchronization systems. This protocol does not rely on any assumptions about the initial state of the system except for the presence of sufficient good nodes, thus making the weakest possible assumptions and producing the strongest results. This protocol tolerates bursts of transient failures, and deterministically converges within a time bound that is a linear function of the self-stabilization period. A simplified model of the protocol is verified using the Symbolic Model Verifier (SMV). The system under study consists of 4 nodes, where at most one of the nodes is assumed to be Byzantine faulty. The model checking effort is focused on verifying correctness of the simplified model of the protocol in the presence of a permanent Byzantine fault as well as confirmation of claims of determinism and linear convergence with respect to the self-stabilization period. Although model checking results of the simplified model of the protocol confirm the theoretical predictions, these results do not necessarily confirm that the protocol solves the general case of this problem. Modeling challenges of the protocol and the system are addressed. A number of abstractions are utilized in order to reduce the state space.
Rodríguez Martínez, Consuelo Fernanda; Rubio, Alicia Sciaraffia
2012-01-01
Background The World Allergy Organization (WAO) in 2003 defined ‘drug allergy’ as an immunologically mediated drug hypersensitivity reaction. The mechanism of drug allergy may be either IgE or non-IgE mediated. The true incidence of drug allergy is not known. There are only few studies/datasets using standardized clinical questionnaires and validated in vivo or in vitro tests to confirm the diagnosis of drug allergy. Here we have analyzed the obtained results of in vivo test in suspected drug allergy patients. Methods Data from the Centre of Allergies of the Clinical Hospital of the Universidad de Chile between the months of October 2007 and March 2011 was obtained. The information of the protocols of drug executed, by defining as Protocol the study of a probable allergy by 2 or more procedures, which can be: Prick Test, intradermal reaction, specific IgE and/or Test Patch. Results For a total of 126 drug protocols, 25% of them were trivírica vaccine, 24% β-lactams, 21% local anaesthetics and 10% to general anesthesia (inductors, muscle relaxants and Latex). Of the total of patients undergoing protocols the most of them were women, there is no clear difference between the number of children and adults. The temporal distribution of protocols was stable between the months of October 2007 and March 2009 (15 protocols/semester), to then become variable, reaching values between 10 and 29 every 6 months. Of total protocols, 30.1% were positive; only one patient presented a mild adverse reaction (local welt). The β-lactams being most often the positive drugs. Protocols involving pethidine 100% was positive, diclofenac 33%, dipyrone, ketoprofen and hydrocortisone each one 25%. The most accomplished protocol was trivírica vaccine, resulting in 100% negative. Of all negative protocols 58% went to provocation, resulting in a 8% positive, including one provocation to the trívirica vaccine. Conclusions Methodologicall study is very important for a possible drug allergy, because history is not enough to certify the diagnosis. To do a provocation test to a negative protocol is crucial.
ERIC Educational Resources Information Center
Ganek, Hillary V.; Eriks-Brophy, Alice
2018-01-01
The aim of this study was to present a protocol for the validation of the Language ENvironment Analysis (LENA) System's conversational turn count (CTC) for Vietnamese speakers. Ten families of children aged between 22 and 42 months, recruited near Ho Chi Minh City, participated in this project. Each child wore the LENA audio recorder for a full…
de Paula, Jonas Jardim; Bertola, Laiss; Ávila, Rafaela Teixeira; Moreira, Lafaiete; Coutinho, Gabriel; de Moraes, Edgar Nunes; Bicalho, Maria Aparecida Camargos; Nicolato, Rodrigo; Diniz, Breno Satler; Malloy-Diniz, Leandro Fernandes
2013-01-01
Background and Objectives The neuropsychological exam plays a central role in the assessment of elderly patients with cognitive complaints. It is particularly relevant to differentiate patients with mild dementia from those subjects with mild cognitive impairment. Formal education is a critical factor in neuropsychological performance; however, there are few studies that evaluated the psychometric properties, especially criterion related validity, neuropsychological tests for patients with low formal education. The present study aims to investigate the validity of an unstructured neuropsychological assessment protocol for this population and develop cutoff values for clinical use. Methods and Results A protocol composed by the Rey-Auditory Verbal Learning Test, Frontal Assessment Battery, Category and Letter Fluency, Stick Design Test, Clock Drawing Test, Digit Span, Token Test and TN-LIN was administered to 274 older adults (96 normal aging, 85 mild cognitive impairment and 93 mild Alzheimer`s disease) with predominantly low formal education. Factor analysis showed a four factor structure related to Executive Functions, Language/Semantic Memory, Episodic Memory and Visuospatial Abilities, accounting for 65% of explained variance. Most of the tests showed a good sensitivity and specificity to differentiate the diagnostic groups. The neuropsychological protocol showed a significant ecological validity as 3 of the cognitive factors explained 31% of the variance on Instrumental Activities of Daily Living. Conclusion The study presents evidence of the construct, criteria and ecological validity for this protocol. The neuropsychological tests and the proposed cutoff values might be used for the clinical assessment of older adults with low formal education. PMID:24066031
Kortz, Teresa Bleakly; Axelrod, David M; Chisti, Mohammod J; Kache, Saraswati
2017-01-01
Pediatric sepsis has a high mortality rate in limited resource settings. Sepsis protocols have been shown to be a cost-effective strategy to improve morbidity and mortality in a variety of populations and settings. At Dhaka Hospital in Bangladesh, mortality from pediatric sepsis in high-risk children previously approached 60%, which prompted the implementation of an evidenced-based protocol in 2010. The clinical effectiveness of this protocol had not been measured. We hypothesized that implementation of a pediatric sepsis protocol improved clinical outcomes, including reducing mortality and length of hospital stay. This was a retrospective cohort study of children 1-59 months old with a diagnosis of sepsis, severe sepsis or septic shock admitted to Dhaka Hospital from 10/25/2009-10/25/2011. The primary outcome was inpatient mortality pre- and post-protocol implementation. Secondary outcomes included fluid overload, heart failure, respiratory insufficiency, length of hospital stay, and protocol compliance, as measured by antibiotic and fluid bolus administration within 60 minutes of hospital presentation. 404 patients were identified by a key-word search of the electronic medical record; 328 patients with a primary diagnosis of sepsis, severe sepsis, or septic shock were included (143 pre- and185 post-protocol) in the analysis. Pre- and post-protocol mortality were similar and not statistically significant (32.17% vs. 34.59%, p = 0.72). The adjusted odds ratio (AOR) for post-protocol mortality was 1.55 (95% CI, 0.88-2.71). The odds for developing fluid overload were significantly higher post-protocol (AOR 3.45, 95% CI, 2.04-5.85), as were the odds of developing heart failure (AOR 4.52, 95% CI, 1.43-14.29) and having a longer median length of stay (AOR 1.81, 95% CI 1.10-2.96). There was no statistically significant difference in respiratory insufficiency (pre- 65.7% vs. post- 70.3%, p = 0.4) or antibiotic administration between the cohorts (pre- 16.08% vs. post- 12.43%, p = 0.42). Implementation of a pediatric sepsis protocol did not improve all-cause mortality or length of stay and may have been associated with increased fluid overload and heart failure during the study period in a large, non-governmental hospital in Bangladesh. Similar rates of early antibiotic administration may indicate poor protocol compliance. Though evidenced-based protocols are a potential cost-effective strategy to improve outcomes, future studies should focus on optimal implementation of context-relevant sepsis protocols in limited resource settings.
Pereira, Maíra N; Reis, Thaiene A; Matos, Breno N; Cunha-Filho, Marcílio; Gratieri, Taís; Gelfuso, Guilherme M
2017-10-01
Local treatment of vaginal diseases presents advantages over systemic treatments and the interaction of the drug delivery systems with the biological tissue is a key factor for a successful vaginal topical therapy. Conventional protocols for permeation studies have high variability and fail in distinguishing drug penetration from mucoadhesive or colloidal drug delivery systems from conventional formulations, as tissue interaction is normally under estimated. The protocol presented in this paper is a simplified ex vivo vertical model, in which formulations are placed in hung porcine vaginas with the objective of mimicking a condition closer to the biological circumstance, specifically considering the possible leak from the vaginal canal in the vertical position. The results indicate the proposed method was capable of differentiating formulations performances and histological evaluation showed mucosa structures are preserved during this new assay. Therefore, the ex vivo method can be considered reliable for approaching the physiological situation in comparative studies. Copyright © 2017 Elsevier B.V. All rights reserved.
Development of a method for the characterization and operation of UV-LED for water treatment.
Kheyrandish, Ataollah; Mohseni, Madjid; Taghipour, Fariborz
2017-10-01
Tremendous improvements in semiconductor technology have made ultraviolet light-emitting diodes (UV-LEDs) a viable alternative to conventional UV sources for water treatment. A robust and validated experimental protocol for studying the kinetics of microorganism inactivation is key to the further development of UV-LEDs for water treatment. This study proposes a protocol to operate UV-LEDs and control their output as a polychromatic radiation source. In order to systematically develop this protocol, the results of spectral power distribution, radiation profile, and radiant power measurements of a variety of UV-LEDs are presented. A wide range of UV-LEDs was selected for this study, covering various UVA, UVB, and UVC wavelengths, viewing angles from 3.5° to 135°, and a variety of output powers. The effects of operational conditions and measurement techniques were investigated on these UV-LEDs using a specially designed and fabricated setup. Operating conditions, such as the UV-LED electrical current and solder temperature, were found to significantly affect the power and peak wavelength output. The measurement techniques and equipment, including the detector size, detector distance from the UV-LED, and potential reflection from the environment, were shown to influence the results for many of the UV-LEDs. The results obtained from these studies were analyzed and applied to the development of a protocol for UV-LED characterization. This protocol is presented as a guideline that allows the operation and control of UV-LEDs in any structure, as well as accurately measuring the UV-LED output. Such information is essential for performing a reliable UV-LED assessment for the inactivation of microorganisms and for obtaining precise kinetic data. Copyright © 2017 Elsevier Ltd. All rights reserved.
Implementation of AICAR analysis by GC-C-IRMS for anti-doping purposes.
Buisson, C; Frelat, C; Mongongu, C; Martinat, N; Audran, M
2017-11-01
AICAR (5-aminoimidazole-4-carboxamide-1-β-D-ribofuranoside), is a naturally occurring substance which is part to the World Anti-Doping Agency (WADA) Prohibited List. It is claimed to improve physical performance when administered as a supplement. As for other endogenous compounds such as steroids, the gas chromatography-combustion-isotope ratio mass spectrometry (GC-C-IRMS) analysis remains an efficient tool to differentiate endogenous substances from exogenous ones. A protocol was described in the literature for the analysis of AICAR by GC-C-IRMS. The aim of the present study was to implement this protocol in our laboratory and to propose solutions to avoid the difficulties encountered. The first point discussed in this study is the derivatization step. Due to the structure of the AICAR molecule, conventional derivatization for GC-C-IRMS such as acetylation could not be applied and silylation was preferred. The improvement of the derivatives stability was achieved thanks to several derivatization conditions tested. This adjustment led to a reproducible derivatization pattern with the 3-TMS form as major derivative product. The second point discussed in this study is the diminution of extracts' background noise. Indeed, the implementation of the published protocol was not easy due to high performance liquid chromatography (HPLC) problems encountered when concentrated urine was injected into our system. Also, too many interferences in the endogenous reference compound fractions were observed. The addition of both a wash step before the HPLC purification and a HPLC purification step for the endogenous reference compound (ERC) fraction allowed us to increase the robustness of the method. This study presents the modified protocol compared to the original protocol as well as the evaluation of the whole method performances. Copyright © 2017 John Wiley & Sons, Ltd. Copyright © 2017 John Wiley & Sons, Ltd.
Carlos, Fernando; Clark, Patricia; Maciel, Humberto; Tamayo, Juan A
2009-01-01
To compare costs of diagnosis and annual treatment of osteoporosis and hip fracture between the Instituto Nacional de Rehabilitación (INR) and the protocol used by the Seguro Popular de Salud (SPSS). Direct costs gathered in a prospective study with real cases at the INR are presented, and then this data is re-analyzed with the methodology and protocol for the SPSS to estimate the costs of those cases if treated with the SPSS protocol. Important differences were found in the cost of hip fracture: the SPSS estimates ($37,363.73 MXN) almost double the INR cost ($20,286.86 MXN ). This discrepancy was caused by the different types of surgeries the INR and SPSS protocols call for (the SPSS assumes that all hip fractures will necessitate a hip replacement) and the cost of subsequent hospitalization. A prospective study at the SPSS is needed to validate these results. Important differences were found between treatment of the same osteoporosis related problems at the INR and SPSS. We recommend revising the SPSS protocol to include less costly surgical treatments.
The costs and cost-effectiveness of an integrated sepsis treatment protocol.
Talmor, Daniel; Greenberg, Dan; Howell, Michael D; Lisbon, Alan; Novack, Victor; Shapiro, Nathan
2008-04-01
Sepsis is associated with high mortality and treatment costs. International guidelines recommend the implementation of integrated sepsis protocols; however, the true cost and cost-effectiveness of these are unknown. To assess the cost-effectiveness of an integrated sepsis protocol, as compared with conventional care. Prospective cohort study of consecutive patients presenting with septic shock and enrolled in the institution's integrated sepsis protocol. Clinical and economic outcomes were compared with a historical control cohort. Beth Israel Deaconess Medical Center. Overall, 79 patients presenting to the emergency department with septic shock in the treatment cohort and 51 patients in the control group. An integrated sepsis treatment protocol incorporating empirical antibiotics, early goal-directed therapy, intensive insulin therapy, lung-protective ventilation, and consideration for drotrecogin alfa and steroid therapy. In-hospital treatment costs were collected using the hospital's detailed accounting system. The cost-effectiveness analysis was performed from the perspective of the healthcare system using a lifetime horizon. The primary end point for the cost-effectiveness analysis was the incremental cost per quality-adjusted life year gained. Mortality in the treatment group was 20.3% vs. 29.4% in the control group (p = .23). Implementing an integrated sepsis protocol resulted in a mean increase in cost of approximately $8,800 per patient, largely driven by increased intensive care unit length of stay. Life expectancy and quality-adjusted life years were higher in the treatment group; 0.78 and 0.54, respectively. The protocol was associated with an incremental cost of $11,274 per life-year saved and a cost of $16,309 per quality-adjusted life year gained. In patients with septic shock, an integrated sepsis protocol, although not cost-saving, appears to be cost-effective and compares very favorably to other commonly delivered acute care interventions.
Hebisz, Rafał; Hebisz, Paulina; Zatoń, Marek; Michalik, Kamil
2017-04-01
In the literature, the exercise capacity of cyclists is typically assessed using incremental and endurance exercise tests. The aim of the present study was to confirm whether peak oxygen uptake (V̇O 2peak ) attained in a sprint interval testing protocol correlates with cycling performance, and whether it corresponds to maximal oxygen uptake (V̇O 2max ) determined by an incremental testing protocol. A sample of 28 trained mountain bike cyclists executed 3 performance tests: (i) incremental testing protocol (ITP) in which the participant cycled to volitional exhaustion, (ii) sprint interval testing protocol (SITP) composed of four 30 s maximal intensity cycling bouts interspersed with 90 s recovery periods, (iii) competition in a simulated mountain biking race. Oxygen uptake, pulmonary ventilation, work, and power output were measured during the ITP and SITP with postexercise blood lactate and hydrogen ion concentrations collected. Race times were recorded. No significant inter-individual differences were observed in regards to any of the ITP-associated variables. However, 9 individuals presented significantly increased oxygen uptake, pulmonary ventilation, and work output in the SITP compared with the remaining cyclists. In addition, in this group of 9 cyclists, oxygen uptake in SITP was significantly higher than in ITP. After the simulated race, this group of 9 cyclists achieved significantly better competition times (99.5 ± 5.2 min) than the other cyclists (110.5 ± 6.7 min). We conclude that mountain bike cyclists who demonstrate higher peak oxygen uptake in a sprint interval testing protocol than maximal oxygen uptake attained in an incremental testing protocol demonstrate superior competitive performance.
Kumar, U Ajith; Maruthy, Sandeep; Chandrakant, Vishwakarma
2009-03-01
Distortion product otoacoustic emissions are one form of evoked otoacoustic emissions. DPOAEs provide the frequency specific information about the hearing status in mid and high frequency regions. But in most screening protocols TEOAEs are preferred as it requires less time compared to DPOAE. This is because, in DPOAE each stimulus is presented one after the other and responses are analyzed. Grason and Stadler Incorporation 60 (GSI-60) offer simultaneous presentation of four sets of primary tones at a time and checks for the DPOAE. In this mode of presentation, all the pairs are presented at a time and following that response is extracted separately whereas, in sequential mode primaries are presented in orderly fashion one after the other. In this article simultaneous and sequential protocols were used to compare the Distortion product otoacoustic emission amplitude, noise floor and administration time in individuals with normal hearing and mild sensori-neural (SN) hearing loss. In simultaneous protocols four sets of primary tones (i.e. 8 tones) were presented together whereas, in sequential presentation mode one set of primary tones was presented each time. Simultaneous protocol was completed in less than half the time required for the completion of sequential protocol. Two techniques yielded similar results at frequencies above 1000 Hz only in normal hearing group. In SN hearing loss group simultaneous presentation yielded signifi cantly higher noise floors and distortion product amplitudes. This result challenges the use of simultaneous presentation technique in neonatal hearing screening programmes and on other pathologies. This discrepancy between two protocols may be due to some changes in biomechanical process in the cochlear and/or due to higher distortion/noise produced by the system during the simultaneous presentation mode.
A Self-Stabilizing Synchronization Protocol for Arbitrary Digraphs
NASA Technical Reports Server (NTRS)
Malekpour, Mahyar R.
2011-01-01
This paper presents a self-stabilizing distributed clock synchronization protocol in the absence of faults in the system. It is focused on the distributed clock synchronization of an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. This protocol deterministically converges within a time bound that is a linear function of the self-stabilization period. We present an outline of a deductive proof of the correctness of the protocol. A bounded model of the protocol was mechanically verified for a variety of topologies. Results of the mechanical proof of the correctness of the protocol are provided. The model checking results have verified the correctness of the protocol as they apply to the networks with unidirectional and bidirectional links. In addition, the results confirm the claims of determinism and linear convergence. As a result, we conjecture that the protocol solves the general case of this problem. We also present several variations of the protocol and discuss that this synchronization protocol is indeed an emergent system.
NASA Technical Reports Server (NTRS)
Malekpour, Mahyar R.
2007-01-01
This report presents the mechanical verification of a simplified model of a rapid Byzantine-fault-tolerant self-stabilizing protocol for distributed clock synchronization systems. This protocol does not rely on any assumptions about the initial state of the system. This protocol tolerates bursts of transient failures, and deterministically converges within a time bound that is a linear function of the self-stabilization period. A simplified model of the protocol is verified using the Symbolic Model Verifier (SMV) [SMV]. The system under study consists of 4 nodes, where at most one of the nodes is assumed to be Byzantine faulty. The model checking effort is focused on verifying correctness of the simplified model of the protocol in the presence of a permanent Byzantine fault as well as confirmation of claims of determinism and linear convergence with respect to the self-stabilization period. Although model checking results of the simplified model of the protocol confirm the theoretical predictions, these results do not necessarily confirm that the protocol solves the general case of this problem. Modeling challenges of the protocol and the system are addressed. A number of abstractions are utilized in order to reduce the state space. Also, additional innovative state space reduction techniques are introduced that can be used in future verification efforts applied to this and other protocols.
Mandible condylar hyperplasia: a review of diagnosis and treatment protocol
Olate, Sergio; Netto, Henrique Duque; Rodriguez-Chessa, Jaime; Alister, Juan Pablo; de Albergaria-Barbosa, Jose; de Moraes, Márcio
2013-01-01
Condylar hyperplasia (CH) is a bone disease characterized by the increased development of one mandibular condyle. It regularly presents as an active growth with facial asymmetry generally without pain. Statistically it affects more women in adolescence, although it does not discriminate by age or gender. Its best-known consequence is asymmetric facial deformity (AFD), which combined with alteration of the dental occlusion with unilateral crossbite or open bite. It is not known when CH begins and how long it lasts; diagnostic examinations are described and are efficient in some research about diagnosis. Protocol treatment is not well studie and depends on the criteria described in this paper. The aim of this research is to provide up-to-date information about the diagnosis of this disease and to analyze the treatment protocol, visualizing the CH and AFD presented. PMID:24179565
Schmidt, Olga; Hausmann, Axel; Cancian de Araujo, Bruno; Sutrisno, Hari; Peggie, Djunijanti; Schmidt, Stefan
2017-01-01
Here we present a general collecting and preparation protocol for DNA barcoding of Lepidoptera as part of large-scale rapid biodiversity assessment projects, and a comparison with alternative preserving and vouchering methods. About 98% of the sequenced specimens processed using the present collecting and preparation protocol yielded sequences with more than 500 base pairs. The study is based on the first outcomes of the Indonesian Biodiversity Discovery and Information System (IndoBioSys). IndoBioSys is a German-Indonesian research project that is conducted by the Museum für Naturkunde in Berlin and the Zoologische Staatssammlung München, in close cooperation with the Research Center for Biology - Indonesian Institute of Sciences (RCB-LIPI, Bogor).
Neuroimaging paradigms for tonotopic mapping (II): the influence of acquisition protocol.
Langers, Dave R M; Sanchez-Panchuelo, Rosa M; Francis, Susan T; Krumbholz, Katrin; Hall, Deborah A
2014-10-15
Numerous studies on the tonotopic organisation of auditory cortex in humans have employed a wide range of neuroimaging protocols to assess cortical frequency tuning. In the present functional magnetic resonance imaging (fMRI) study, we made a systematic comparison between acquisition protocols with variable levels of interference from acoustic scanner noise. Using sweep stimuli to evoke travelling waves of activation, we measured sound-evoked response signals using sparse, clustered, and continuous imaging protocols that were characterised by inter-scan intervals of 8.8, 2.2, or 0.0 s, respectively. With regard to sensitivity to sound-evoked activation, the sparse and clustered protocols performed similarly, and both detected more activation than the continuous method. Qualitatively, tonotopic maps in activated areas proved highly similar, in the sense that the overall pattern of tonotopic gradients was reproducible across all three protocols. However, quantitatively, we observed substantial reductions in response amplitudes to moderately low stimulus frequencies that coincided with regions of strong energy in the scanner noise spectrum for the clustered and continuous protocols compared to the sparse protocol. At the same time, extreme frequencies became over-represented for these two protocols, and high best frequencies became relatively more abundant. Our results indicate that although all three scanning protocols are suitable to determine the layout of tonotopic fields, an exact quantitative assessment of the representation of various sound frequencies is substantially confounded by the presence of scanner noise. In addition, we noticed anomalous signal dynamics in response to our travelling wave paradigm that suggest that the assessment of frequency-dependent tuning is non-trivially influenced by time-dependent (hemo)dynamics when using sweep stimuli. Copyright © 2014. Published by Elsevier Inc.
A Self-Stabilizing Distributed Clock Synchronization Protocol for Arbitrary Digraphs
NASA Technical Reports Server (NTRS)
Malekpour, Mahyar R.
2011-01-01
This report presents a self-stabilizing distributed clock synchronization protocol in the absence of faults in the system. It is focused on the distributed clock synchronization of an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. We present an outline of a deductive proof of the correctness of the protocol. A model of the protocol was mechanically verified using the Symbolic Model Verifier (SMV) for a variety of topologies. Results of the mechanical proof of the correctness of the protocol are provided. The model checking results have verified the correctness of the protocol as they apply to the networks with unidirectional and bidirectional links. In addition, the results confirm the claims of determinism and linear convergence. As a result, we conjecture that the protocol solves the general case of this problem. We also present several variations of the protocol and discuss that this synchronization protocol is indeed an emergent system.
Relativistic quantum private database queries
NASA Astrophysics Data System (ADS)
Sun, Si-Jia; Yang, Yu-Guang; Zhang, Ming-Ou
2015-04-01
Recently, Jakobi et al. (Phys Rev A 83, 022301, 2011) suggested the first practical private database query protocol (J-protocol) based on the Scarani et al. (Phys Rev Lett 92, 057901, 2004) quantum key distribution protocol. Unfortunately, the J-protocol is just a cheat-sensitive private database query protocol. In this paper, we present an idealized relativistic quantum private database query protocol based on Minkowski causality and the properties of quantum information. Also, we prove that the protocol is secure in terms of the user security and the database security.
Dias, Joana; Sobkowiak, Michał J; Sandberg, Johan K; Leeansyah, Edwin
2016-07-01
Mucosa-associated invariant T cells are a large and relatively recently described innate-like antimicrobial T-cell subset in humans. These cells recognize riboflavin metabolites from a range of microbes presented by evolutionarily conserved major histocompatibility complex, class I-related molecules. Given the innate-like characteristics of mucosa-associated invariant T cells and the novel type of antigens they recognize, new methodology must be developed and existing methods refined to allow comprehensive studies of their role in human immune defense against microbial infection. In this study, we established protocols to examine a range of mucosa-associated invariant T-cell functions as they respond to antigen produced by Escherichia coli These improved and dose- and time-optimized experimental protocols allow detailed studies of MR1-dependent mucosa-associated invariant T-cell responses to Escherichia coli pulsed antigen-presenting cells, as assessed by expression of activation markers and cytokines, by proliferation, and by induction of apoptosis and death in major histocompatibility complex, class I-related-expressing target cells. The novel and optimized protocols establish a framework of methods and open new possibilities to study mucosa-associated invariant T-cell immunobiology, using Escherichia coli as a model antigen. Furthermore, we propose that these robust experimental systems can also be adapted to study mucosa-associated invariant T-cell responses to other microbes and types of antigen-presenting cells. © The Author(s).
A New On-Line Diagnosis Protocol for the SPIDER Family of Byzantine Fault Tolerant Architectures
NASA Technical Reports Server (NTRS)
Geser, Alfons; Miner, Paul S.
2004-01-01
This paper presents the formal verification of a new protocol for online distributed diagnosis for the SPIDER family of architectures. An instance of the Scalable Processor-Independent Design for Electromagnetic Resilience (SPIDER) architecture consists of a collection of processing elements communicating over a Reliable Optical Bus (ROBUS). The ROBUS is a specialized fault-tolerant device that guarantees Interactive Consistency, Distributed Diagnosis (Group Membership), and Synchronization in the presence of a bounded number of physical faults. Formal verification of the original SPIDER diagnosis protocol provided a detailed understanding that led to the discovery of a significantly more efficient protocol. The original protocol was adapted from the formally verified protocol used in the MAFT architecture. It required O(N) message exchanges per defendant to correctly diagnose failures in a system with N nodes. The new protocol achieves the same diagnostic fidelity, but only requires O(1) exchanges per defendant. This paper presents this new diagnosis protocol and a formal proof of its correctness using PVS.
Farina, R; Squarzoni, M A; Calura, G; Trombelli, L
2009-06-01
The bacterial colonization of teeth by Streptococcus mutans (StrepM) represents a major risk factor for the development of dental caries. At present, no clinical studies have explored the effect of a combined mechanical-chemical antisepsis protocol in a periodontally-healthy population and the pattern of recolonization of StrepM in subjects whose StrepM infection was successfully eradicated. The present study was designed in order to 1) determine the salivary and plaque changes in StrepM content after a combined mechanical/chemical antisepsis protocol; and 2) evaluate the pattern of recolonization when StrepM was successfully eradicated from saliva and plaque. Thirty-five periodontally-healthy and caries-susceptible subjects successfully entered and concluded the study. At baseline, non-surgical periodontal therapy was performed according to the principles of full mouth disinfection. Adjunctive home-based rinsing with a 0.2% chlorhexidine mouthrinse was requested for the following week. StrepM concentration was assessed in saliva and plaque at the initial contact appointment, at baseline, and 1-week, 1-month, 3-month and 6-month follow-up. A significant effect of ''time'' on StrepM concentration in saliva and plaque was observed (P<0.000). In subjects with successful eradication of StrepM at 1 week (N=17 plaque samples), StrepM infection recurrence occurred within 3-6 months. The results of the present study demonstrated that 1) the application of the investigated mechanical/chemical antisepsis protocol can effectively reduce StrepM colonies in saliva and plaque of periodontally healthy subjects; and 2) in plaque samples, StrepM infection recurrence tends to occur within 3-6 months.
Vazini Taher, Amir; Parnow, Abdolhossein
2017-05-01
Different methods of warm-up may have implications in improving various aspects of soccer performance. The present study aimed to investigate acute effects of soccer specific warm-up protocols on functional performance tests. This study using randomized within-subject design, investigated the performance of 22 collegiate elite soccer player following soccer specific warm-ups using dynamic stretching, static stretching, and FIFA 11+ program. Post warm-up examinations consisted: 1) Illinois Agility Test; 2) vertical jump; 3) 30 meter sprint; 4) consecutive turns; 5) flexibility of knee. Vertical jump performance was significantly lower following static stretching, as compared to dynamic stretching (P=0.005). Sprint performance declined significantly following static stretching as compared to FIFA 11+ (P=0.023). Agility time was significantly faster following dynamic stretching as compared to FIFA 11+ (P=0.001) and static stretching (P=0.001). Knee flexibility scores were significantly improved following the static stretching as compared to dynamic stretching (P=016). No significant difference was observed for consecutive turns between three warm-up protocol. The present finding showed that a soccer specific warm-up protocol relied on dynamic stretching is preferable in enhancing performance as compared to protocols relying on static stretches and FIFA 11+ program. Investigators suggest that while different soccer specific warm-up protocols have varied types of effects on performance, acute effects of dynamic stretching on performance in elite soccer players are assured, however application of static stretching in reducing muscle stiffness is demonstrated.
Pomerleau, Geneviève; Hurteau, Anne-Marie; Parent, Line; Doucet, Katrine; Corbin-Berrigan, Laurie-Ann; Gagnon, Isabelle
2012-01-01
The purpose of this study was to review the feasibility and usefulness of instituting a clinical protocol of scheduled assessments for children after a moderate or severe traumatic brain injury (TBI) sustained before the age of 2 years and showing no immediate deficits at hospital discharge, as well as to explore the early developmental trajectories of these children. Exploratory analytical cohort study. Pediatric Trauma Center Out-patient services. 31 children were followed within the clinical protocol of scheduled assessments. The protocol included an immediate post-injury clinical assessment of infants who sustained a TBI and follow-up assessments at the ages of 9 months, 18 months (if injured prior to that age), 30 months, and 42 months. Domains assessed at each scheduled visit included hearing, speech and language, motor performance, personal social abilities, and adaptive behaviors. Clinicians reported few difficulties with scheduling or administering the assessments, maintaining a 67% participation rate at the end of the follow-up period, thus demonstrating the feasibility of the protocol in this population. Scores on the majority of formal tests showed high variability and 15-20% of children presented with clinically significant motor and/or language delays. By 42 months of age, difficulties with adaptive behavior and personal social abilities were identified in our sample of children when compared to published norms. Qualitative clinical findings from professionals identified between 25-50% of children with potential attentional difficulties throughout the follow-up period. Findings from this study demonstrate the feasibility of implementing a clinical protocol of assessment for infants and toddlers who sustain a TBI before the age of 2 years and present with no impairments at the time of discharge from hospital. Developmental problems in this population appear to be easier to identify later in the toddler years as opposed to immediately following the TBI, emphasizing the importance of providing screening for developmental issues in this population prior to school entry.
Fluid resuscitation for major burn patients with the TMMU protocol.
Luo, Gaoxing; Peng, Yizhi; Yuan, Zhiqiang; Cheng, Wenguang; Wu, Jun; Tang, Jin; Huang, Yuesheng; Fitzgerald, Mark
2009-12-01
Fluid resuscitation is one of the critical treatments for the major burn patient in the early phases after injury. We evaluated the practice of fluid resuscitation for severely burned patients with the Third Military Medical University (TMMU) protocol, which is most widely used in many regions of China. Patients with major burns (>30% total body surface area (TBSA)) presenting to Southwest Hospital, Third Military Medical University, between January 2005 and October 2007, were included in this study. Fluid resuscitation was initiated by the TMMU protocol. A total of 71 patients were (46 adults and 25 children) included in this study. All patients survived the first 48 h after injury smoothly and none developed abdominal compartment syndrome or other recognised complications associated with fluid resuscitation. The average quantity of fluid infused was 3.3-61.33% more than that calculated based on the TMMU protocol in both adult and paediatric groups. The average urine output during the first 24h after injury was about 1.2 ml per kg body weight per hour in the two groups, but reached 1.2 ml and 1.7 ml during the second 24h in adult and pediatric groups, respectively. This study indicates that the TMMU protocol for fluid resuscitation is a feasible option for burn patients. Individualised resuscitation - guided by the physiological response to fluid administration - is still important as in other protocols.
Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis.
Alanazi, Adwan; Elleithy, Khaled
2015-09-02
Many routing protocols have been proposed for wireless sensor networks. These routing protocols are almost always based on energy efficiency. However, recent advances in complementary metal-oxide semiconductor (CMOS) cameras and small microphones have led to the development of Wireless Multimedia Sensor Networks (WMSN) as a class of wireless sensor networks which pose additional challenges. The transmission of imaging and video data needs routing protocols with both energy efficiency and Quality of Service (QoS) characteristics in order to guarantee the efficient use of the sensor nodes and effective access to the collected data. Also, with integration of real time applications in Wireless Senor Networks (WSNs), the use of QoS routing protocols is not only becoming a significant topic, but is also gaining the attention of researchers. In designing an efficient QoS routing protocol, the reliability and guarantee of end-to-end delay are critical events while conserving energy. Thus, considerable research has been focused on designing energy efficient and robust QoS routing protocols. In this paper, we present a state of the art research work based on real-time QoS routing protocols for WMSNs that have already been proposed. This paper categorizes the real-time QoS routing protocols into probabilistic and deterministic protocols. In addition, both categories are classified into soft and hard real time protocols by highlighting the QoS issues including the limitations and features of each protocol. Furthermore, we have compared the performance of mobility-aware query based real-time QoS routing protocols from each category using Network Simulator-2 (NS2). This paper also focuses on the design challenges and future research directions as well as highlights the characteristics of each QoS routing protocol.
Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis
Alanazi, Adwan; Elleithy, Khaled
2015-01-01
Many routing protocols have been proposed for wireless sensor networks. These routing protocols are almost always based on energy efficiency. However, recent advances in complementary metal-oxide semiconductor (CMOS) cameras and small microphones have led to the development of Wireless Multimedia Sensor Networks (WMSN) as a class of wireless sensor networks which pose additional challenges. The transmission of imaging and video data needs routing protocols with both energy efficiency and Quality of Service (QoS) characteristics in order to guarantee the efficient use of the sensor nodes and effective access to the collected data. Also, with integration of real time applications in Wireless Senor Networks (WSNs), the use of QoS routing protocols is not only becoming a significant topic, but is also gaining the attention of researchers. In designing an efficient QoS routing protocol, the reliability and guarantee of end-to-end delay are critical events while conserving energy. Thus, considerable research has been focused on designing energy efficient and robust QoS routing protocols. In this paper, we present a state of the art research work based on real-time QoS routing protocols for WMSNs that have already been proposed. This paper categorizes the real-time QoS routing protocols into probabilistic and deterministic protocols. In addition, both categories are classified into soft and hard real time protocols by highlighting the QoS issues including the limitations and features of each protocol. Furthermore, we have compared the performance of mobility-aware query based real-time QoS routing protocols from each category using Network Simulator-2 (NS2). This paper also focuses on the design challenges and future research directions as well as highlights the characteristics of each QoS routing protocol. PMID:26364639
Comparative assessment of different recycling methods of orthodontic brackets for clinical use.
de Oliveira Correia, Ayla M; de Souza Matos, Felipe; Pilli Jóias, Renata; de Mello Rode, Sigmar; Cesar, Paulo F; Paranhos, Luiz R
2017-06-01
This study aimed to assess bond strength of the resin/bracket interface, under in-vitro shear stress, of metal brackets recycled by different clinical protocols. Sixty stainless steel orthodontic brackets were bonded on acrylic resin. The Transbond XT™ resin was applied at the base of the bracket aided by a matrix, obtaining 1 mm of thickness, and photoactivated with a LED device (40 s; 500 mW/cm2). Samples were randomly divided into four groups (N.=15) according to the reconditioning/recycling protocol: aluminum oxide (AO) 90 µm; hydrofluoric acid 60 s (HA60); hydrofluoric acid 120 s (HA120); hydrofluoric acid 60 s + silane (HA60S). After recycling, the resin was applied at the base of the bracket for shear testing in a universal testing machine (0.5 mm/min). After reconditioning/recycling, the surfaces were analyzed by Scanning Electron Microscopy. Data obtained after the shear test were subjected to ANOVA and Tukey's test (P<0.05). The AO group presented higher values of shear bond strength compared to the other reconditioning/recycling protocols (P<0.05). The HA120 and HA60S groups presented statistically similar results, but HA120 presented strength below the recommended limit. The recycling technique by aluminum oxide sandblasting was more effective for reconditioning orthodontic brackets when compared to the other protocols. The reconditioning technique with 10% hydrofluoric acid followed by the application of silane bonding agent may be used as an alternative protocol.
Jadidi, Masoud; Båth, Magnus; Nyrén, Sven
2018-04-09
To compare the quality of images obtained with two different protocols with different acquisition time and the influence from image post processing in a chest digital tomosynthesis (DTS) system. 20 patients with suspected lung cancer were imaged with a chest X-ray equipment with tomosynthesis option. Two examination protocols with different acquisition times (6.3 and 12 s) were performed on each patient. Both protocols were presented with two different image post-processing (standard DTS processing and more advanced processing optimised for chest radiography). Thus, 4 series from each patient, altogether 80 series, were presented anonymously and in a random order. Five observers rated the quality of the reconstructed section images according to predefined quality criteria in three different classes. Visual grading characteristics (VGC) was used to analyse the data and the area under the VGC curve (AUC VGC ) was used as figure-of-merit. The 12 s protocol and the standard DTS processing were used as references in the analyses. The protocol with 6.3 s acquisition time had a statistically significant advantage over the vendor-recommended protocol with 12 s acquisition time for the classes of criteria, Demarcation (AUC VGC = 0.56, p = 0.009) and Disturbance (AUC VGC = 0.58, p < 0.001). A similar value of AUC VGC was found also for the class Structure (definition of bone structures in the spine) (0.56) but it could not be statistically separated from 0.5 (p = 0.21). For the image processing, the VGC analysis showed a small but statistically significant advantage for the standard DTS processing over the more advanced processing for the classes of criteria Demarcation (AUC VGC = 0.45, p = 0.017) and Disturbance (AUC VGC = 0.43, p = 0.005). A similar value of AUC VGC was found also for the class Structure (0.46), but it could not be statistically separated from 0.5 (p = 0.31). The study indicates that the protocol with 6.3 s acquisition time yields slightly better image quality than the vender-recommended protocol with acquisition time 12 s for several anatomical structures. Furthermore, the standard gradation processing (the vendor-recommended post-processing for DTS), yields to some extent advantage over the gradation processing/multiobjective frequency processing/flexible noise control processing in terms of image quality for all classes of criteria. Advances in knowledge: The study proves that the image quality may be strongly affected by the selection of DTS protocol and that the vendor-recommended protocol may not always be the optimal choice.
Perlmutter, A S; Tran, V-T; Dechartres, A; Ravaud, P
2017-04-01
Protocols are often unavailable to peer-reviewers and readers. To detect outcome reporting bias (ORB), readers usually have to resort to publicly available descriptions of study design such as public clinical trial registries. We compared primary outcomes in protocols, ClinicalTrials.gov and publications of oncology trials and evaluated the use of ClinicalTrials.gov as compared with protocols in detecting discrepancies between planned and published outcomes. We searched for phase III oncology trials registered in ClinicalTrials.gov and published in the Journal of Clinical Oncology and New England Journal of Medicine between January 2014 and June 2015. We extracted primary outcomes reported in the protocol, ClinicalTrials.gov and the publication. First, we assessed the quality of primary outcome descriptions by using a published framework. Second, we evaluated modifications of primary outcomes between each source. Finally, we evaluated the agreement, specificity and sensitivity of detecting modifications between planned and published outcomes by using protocols or ClinicalTrials.gov. We included 65 trials, with 81 primary outcomes common among the 3 sources. The proportion of primary outcomes reporting all items from the framework was 73%, 22%, and 75% for protocols, ClinicalTrials.gov and publications, respectively. Eight (12%) trials presented a discrepancy between primary outcomes reported in the protocol and in the publication. Twelve (18.5%) trials presented a discrepancy between primary outcomes registered at ClinicalTrials.gov and in publications. We found a moderate agreement in detecting discrepant reporting of outcomes by using protocols or ClinicalTrials.gov [κ = 0.53, 95% confidence interval (0.25-0.81)]. Using ClinicalTrials.gov to detect discrepant reporting of outcomes showed high specificity (89.5%) but lacked sensitivity (75%) as compared with use of protocols. In oncology trials, primary outcome descriptions in ClinicalTrials.gov are often of low quality and may not reflect what is in the protocol, thus limiting the detection of modifications between planned and published outcomes. © The Author 2016. Published by Oxford University Press on behalf of the European Society for Medical Oncology. All rights reserved. For permissions, please email: journals.permissions@oup.com.
Hardesty, Samantha L; Hagopian, Louis P; McIvor, Melissa M; Wagner, Leaora L; Sigurdsson, Sigurdur O; Bowman, Lynn G
2014-09-01
The present study isolated the effects of frequently used staff training intervention components to increase communication between direct care staff and clinicians working on an inpatient behavioral unit. Written "protocol review" quizzes developed by clinicians were designed to assess knowledge about a patient's behavioral protocols. Direct care staff completed these at the beginning of each day and evening shift. Clinicians were required to score and discuss these protocol reviews with direct care staff for at least 75% of shifts over a 2-week period. During baseline, only 21% of clinicians met this requirement. Completing and scoring of protocol reviews did not improve following additional in-service training (M = 15%) or following an intervention aimed at decreasing response effort combined with prompting (M = 28%). After implementing an intervention involving specified performance criterion and performance feedback, 86% of clinicians reached the established goal. Results of a component analysis suggested that the presentation of both the specified performance criterion and supporting contingencies was necessary to maintain acceptable levels of performance. © The Author(s) 2014.
Heitt, Michael C; Tamburo, Melissa Back
2005-01-01
The creation and development of a Risk Assessment Team at a large urban university is presented as a case study, with particular focus on the role the Employee Assistance Program (EAP) plays in the multidisciplinary team. The structure of the team and differing roles and responsibilities of members will be discussed. A specific protocol for addressing incidents will be introduced, along with changes in the team ' response over time. Major lessons learned will be presented, as well as the challenges the team faces today, and discussion of areas for future research and evaluation.
Boisseau, Christina L.; Farchione, Todd J.; Fairholme, Christopher P.; Ellard, Kristen K.; Barlow, David H.
2013-01-01
A detailed description of treatment utilizing the Unified Protocol (UP), a transdiagnostic emotion-focused cognitive-behavioral treatment, is presented using a clinical case example treated during the most current phase of an ongoing randomized controlled trial of the UP. The implementation of the UP in its current, modular version is illustrated. A working case conceptualization is presented from the perspective of the UP drawing from theory and research that underlies current transdiagnostic approaches to treatment and consistent with recent dimensional classification proposals (Brown & Barlow, in press). Treatment is illustrated module-by-module describing how the principles of the UP were applied in the presented case. PMID:23997572
Kuroda, Masaharu; Ikenaga, Sachiko
2015-01-01
We present a novel protocol for small-scale production of crop seed in a plant incubator termed "Single-tube hydroponics." Our protocol minimizes the materials and methods for cultivation whereby a large number of independent plants can be cultured in a limited space. This study may aid in the improvement of crop seed components, especially in the cultivation of transgenic plants.
SU-F-207-16: CT Protocols Optimization Using Model Observer
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tseng, H; Fan, J; Kupinski, M
2015-06-15
Purpose: To quantitatively evaluate the performance of different CT protocols using task-based measures of image quality. This work studies the task of size and the contrast estimation of different iodine concentration rods inserted in head- and body-sized phantoms using different imaging protocols. These protocols are designed to have the same dose level (CTDIvol) but using different X-ray tube voltage settings (kVp). Methods: Different concentrations of iodine objects inserted in a head size phantom and a body size phantom are imaged on a 64-slice commercial CT scanner. Scanning protocols with various tube voltages (80, 100, and 120 kVp) and current settingsmore » are selected, which output the same absorbed dose level (CTDIvol). Because the phantom design (size of the iodine objects, the air gap between the inserted objects and the phantom) is not ideal for a model observer study, the acquired CT images are used to generate simulation images with four different sizes and five different contracts iodine objects. For each type of the objects, 500 images (100 x 100 pixels) are generated for the observer study. The observer selected in this study is the channelized scanning linear observer which could be applied to estimate the size and the contrast. The figure of merit used is the correct estimation ratio. The mean and the variance are estimated by the shuffle method. Results: The results indicate that the protocols with 100 kVp tube voltage setting provides the best performance for iodine insert size and contrast estimation for both head and body phantom cases. Conclusion: This work presents a practical and robust quantitative approach using channelized scanning linear observer to study contrast and size estimation performance from different CT protocols. Different protocols at same CTDIvol setting could Result in different image quality performance. The relationship between the absorbed dose and the diagnostic image quality is not linear.« less
Nam, Junghyun; Choo, Kim-Kwang Raymond; Paik, Juryon; Won, Dongho
2014-01-01
While a number of protocols for password-only authenticated key exchange (PAKE) in the 3-party setting have been proposed, it still remains a challenging task to prove the security of a 3-party PAKE protocol against insider dictionary attacks. To the best of our knowledge, there is no 3-party PAKE protocol that carries a formal proof, or even definition, of security against insider dictionary attacks. In this paper, we present the first 3-party PAKE protocol proven secure against both online and offline dictionary attacks as well as insider and outsider dictionary attacks. Our construct can be viewed as a protocol compiler that transforms any 2-party PAKE protocol into a 3-party PAKE protocol with 2 additional rounds of communication. We also present a simple and intuitive approach of formally modelling dictionary attacks in the password-only 3-party setting, which significantly reduces the complexity of proving the security of 3-party PAKE protocols against dictionary attacks. In addition, we investigate the security of the well-known 3-party PAKE protocol, called GPAKE, due to Abdalla et al. (2005, 2006), and demonstrate that the security of GPAKE against online dictionary attacks depends heavily on the composition of its two building blocks, namely a 2-party PAKE protocol and a 3-party key distribution protocol.
Antonescu, I; Baldini, G; Watson, D; Kaneva, P; Fried, G M; Khwaja, K; Vassiliou, M C; Carli, F; Feldman, L S
2013-12-01
Postoperative urinary retention (POUR) is a common complication of ambulatory inguinal herniorraphy, with an incidence reaching 38%, and many surgeons require patients to void before discharge. This study aimed to assess whether the implementation of a bladder scan-based voiding protocol reduces the time until discharge after ambulatory inguinal herniorraphy without increasing the rate of POUR. As part of a perioperative care pathway, a protocol was implemented to standardize decision making after elective inguinal hernia repair (February 2012). Patients were assessed with a bladder scan, and those with <600 mL of urine were discharged home, whereas those with more than 600 mL of urine had an in-and-out catheterization before discharge. The patients received written information about urinary symptoms and instructions to present to the emergency department if they were unable to void at home. An audit of scheduled outpatient inguinal hernia repairs between October 2011 and July 2012 was performed. Comparisons were made using the t test, Fisher's exact test, and Wilcoxon rank sum test where appropriate. Statistical significance was defined a priori as a p value lower than 0.05. During the study period, 124 patients underwent hernia repair: 60 before and 64 after implementation of the protocol. The findings showed no significant differences in patient characteristics, laparoscopic approach (35 vs. 33%; p = 0.80), proportion receiving general anesthesia (70 vs. 73%; p = 0.67), or amount of intravenous fluids given (793 vs. 663 mL; p = 0.07). The proportion of patients voiding before discharge was higher after protocol implementation (73 vs. 89%; p = 0.02). The protocol had no impact on median time to discharge (190 vs. 205 min; p = 0.60). Only one patient in each group presented to the emergency department with POUR (2%). After ambulatory inguinal herniorraphy, implementation of a bladder scan-based voiding protocol did not result in earlier discharge. The incidence of POUR was lower than reported in the literature.
An Evaluation of Protocols for UAV Science Applications
NASA Technical Reports Server (NTRS)
Ivancic, William D.; Stewart, David E.; Sullivan, Donald V.; Finch, Patrick E.
2012-01-01
This paper identifies data transport needs for current and future science payloads deployed on the NASA Global Hawk Unmanned Aeronautical Vehicle (UAV). The NASA Global Hawk communication system and operational constrains are presented. The Genesis and Rapid Intensification Processes (GRIP) mission is used to provide the baseline communication requirements as a variety of payloads were utilized in this mission. User needs and desires are addressed. Protocols are matched to the payload needs and an evaluation of various techniques and tradeoffs are presented. Such techniques include utilization rate-base selective negative acknowledgement protocols and possible use of protocol enhancing proxies. Tradeoffs of communication architectures that address ease-of-use and security considerations are also presented.
NASA Astrophysics Data System (ADS)
Xu, Liangfei; Reimer, Uwe; Li, Jianqiu; Huang, Haiyan; Hu, Zunyan; Jiang, Hongliang; Janßen, Holger; Ouyang, Minggao; Lehnert, Werner
2018-02-01
City buses using polymer electrolyte membrane (PEM) fuel cells are considered to be the most likely fuel cell vehicles to be commercialized in China. The technical specifications of the fuel cell systems (FCSs) these buses are equipped with will differ based on the powertrain configurations and vehicle control strategies, but can generally be classified into the power-follow and soft-run modes. Each mode imposes different levels of electrochemical stress on the fuel cells. Evaluating the aging behavior of fuel cell stacks under the conditions encountered in fuel cell buses requires new durability test protocols based on statistical results obtained during actual driving tests. In this study, we propose a systematic design method for fuel cell durability test protocols that correspond to the power-follow mode based on three parameters for different fuel cell load ranges. The powertrain configurations and control strategy are described herein, followed by a presentation of the statistical data for the duty cycles of FCSs in one city bus in the demonstration project. Assessment protocols are presented based on the statistical results using mathematical optimization methods, and are compared to existing protocols with respect to common factors, such as time at open circuit voltage and root-mean-square power.
A method for meta-analysis of epidemiological studies.
Einarson, T R; Leeder, J S; Koren, G
1988-10-01
This article presents a stepwise approach for conducting a meta-analysis of epidemiological studies based on proposed guidelines. This systematic method is recommended for practitioners evaluating epidemiological studies in the literature to arrive at an overall quantitative estimate of the impact of a treatment. Bendectin is used as an illustrative example. Meta-analysts should establish a priori the purpose of the analysis and a complete protocol. This protocol should be adhered to, and all steps performed should be recorded in detail. To aid in developing such a protocol, we present methods the researcher can use to perform each of 22 steps in six major areas. The illustrative meta-analysis confirmed previous traditional narrative literature reviews that Bendectin is not related to teratogenic outcomes in humans. The overall summary odds ratio was 1.01 (chi 2 = 0.05, p = 0.815) with a 95 percent confidence interval of 0.66-1.55. When the studies were separated according to study type, the summary odds ratio for cohort studies was 0.95 with a 95 percent confidence interval of 0.62-1.45. For case-control studies, the summary odds ratio was 1.27 with a 95 percent confidence interval of 0.83-1.94. The corresponding chi-square values were not statistically significant at the p = 0.05 level.
Quality control and conduct of genome-wide association meta-analyses
Winkler, Thomas W; Day, Felix R; Croteau-Chonka, Damien C; Wood, Andrew R; Locke, Adam E; Mägi, Reedik; Ferreira, Teresa; Fall, Tove; Graff, Mariaelisa; Justice, Anne E; Luan, Jian'an; Gustafsson, Stefan; Randall, Joshua C; Vedantam, Sailaja; Workalemahu, Tsegaselassie; Kilpeläinen, Tuomas O; Scherag, André; Esko, Tonu; Kutalik, Zoltán; Heid, Iris M; Loos, Ruth JF
2014-01-01
Rigorous organization and quality control (QC) are necessary to facilitate successful genome-wide association meta-analyses (GWAMAs) of statistics aggregated across multiple genome-wide association studies. This protocol provides guidelines for [1] organizational aspects of GWAMAs, and for [2] QC at the study file level, the meta-level across studies, and the meta-analysis output level. Real–world examples highlight issues experienced and solutions developed by the GIANT Consortium that has conducted meta-analyses including data from 125 studies comprising more than 330,000 individuals. We provide a general protocol for conducting GWAMAs and carrying out QC to minimize errors and to guarantee maximum use of the data. We also include details for use of a powerful and flexible software package called EasyQC. For consortia of comparable size to the GIANT consortium, the present protocol takes a minimum of about 10 months to complete. PMID:24762786
Aloisio, Michelangelo; Bortot, Barbara; Gandin, Ilaria; Severini, Giovanni Maria; Athanasakis, Emmanouil
2017-02-01
Chimerism status evaluation of post-allogeneic hematopoietic stem cell transplantation samples is essential to predict post-transplant relapse. The most commonly used technique capable of detecting small increments of chimerism is quantitative real-time PCR. Although this method is already used in several laboratories, previously described protocols often lack sensitivity and the amount of the DNA required for each chimerism analysis is too high. In the present study, we compared a novel semi-nested allele-specific real-time PCR (sNAS-qPCR) protocol with our in-house standard allele-specific real-time PCR (gAS-qPCR) protocol. We selected two genetic markers and analyzed technical parameters (slope, y-intercept, R2, and standard deviation) useful to determine the performances of the two protocols. The sNAS-qPCR protocol showed better sensitivity and precision. Moreover, the sNAS-qPCR protocol requires, as input, only 10 ng of DNA, which is at least 10-fold less than the gAS-qPCR protocols described in the literature. Finally, the proposed sNAS-qPCR protocol could prove very useful for performing chimerism analysis with a small amount of DNA, as in the case of blood cell subsets.
NASA Astrophysics Data System (ADS)
Balcerzyk, Marcin; Fernández-López, Rosa; Parrado-Gallego, Ángel; Pachón-Garrudo, Víctor Manuel; Chavero-Royan, José; Hevilla, Juan; Jiménez-Ortega, Elisa; Leal, Antonio
2017-11-01
Tumour uptake value is a critical result in [18F]FDG-PET/CT ([18F]fluorodeoxyglucose) quantitative scans such as the dose prescription for radiotherapy and oncology. The quantification is highly dependent on the protocol of acquisition and reconstruction of the image, especially in low activity tumours. During adjusting acquisition and reconstruction protocols available in our Siemens Biograph mCT scanner for EARL (ResEARch 4 Life®) [18F]FDG-PET/CT accreditation requirements, we developed reconstruction protocols which will be used in PET based radiotherapy planning able to reduce inter-/intra-institute variability in Standard Uptake Value (SUV) results, and to bring Recovery Coefficient to 1 as close as possible for Image Quality NEMA 2007 phantom. Primary and secondary tumours from two patients were assessed by four independent evaluators. The influence of reconstruction protocols on tumour clinical assessment was presented. We proposed the improvement route for EARL accredited protocols so that they may be developed in classes to take advantage of scanner possibilities. The application of optimized reconstruction protocol eliminates the need of partial volume corrections.
Cislan-2 extension final document by University of Twente (Netherlands)
NASA Astrophysics Data System (ADS)
Niemegeers, Ignas; Baumann, Frank; Beuwer, Wim; Jordense, Marcel; Pras, Aiko; Schutte, Leon; Tracey, Ian
1992-01-01
Results of worked performed under the so called Cislan extension contract are presented. The adaptation of the Cislan 2 prototype design to an environment of interconnected Local Area Networks (LAN's) instead of a single 802.5 token ring LAN is considered. In order to extend the network architecture, the Interconnection Function (IF) protocol layer was subdivided into two protocol layers: a new IF layer, and below the Medium Enhancement (ME) protocol layer. Some small enhancements to the distributed bandwidth allocation protocol were developed, which in fact are also applicable to the 'normal' Cislan 2 system. The new services and protocols are described together with some scenarios and requirements for the new internetting Cislan 2 system. How to overcome the degradation of the quality of speech due to packet loss on the LAN subsystem was studied. Experiments were planned in order to measure this speech quality degradation. Simulations were performed of two Cislan subsystems, the bandwidth allocation protocol and the clock synchronization mechanism. Results on both simulations, performed on SUN workstations using QNAP as a simulation tool, are given. Results of the simulations of the clock synchronization mechanism, and results of the simulation of the distributed bandwidth allocation protocol are given.
Paes, Thaís; Machado, Felipe Vilaça Cavallari; Cavalheri, Vinícius; Pitta, Fabio; Hernandes, Nidia Aparecida
2017-07-01
People with chronic obstructive pulmonary disease (COPD) present symptoms such as dyspnea and fatigue, which hinder their performance in activities of daily living (ADL). A few multitask protocols have been developed to assess ADL performance in this population, although measurement properties of such protocols were not yet systematically reviewed. Areas covered: Studies were included if an assessment of the ability to perform ADL was conducted in people with COPD using a (objective) performance-based protocol. The search was conducted in the following databases: Pubmed, EMBASE, Cochrane Library, PEDro, CINAHL and LILACS. Furthermore, hand searches were conducted. Expert commentary: Up to this moment, only three protocols had measurement properties described: the Glittre ADL Test, the Monitored Functional Task Evaluation and the Londrina ADL Protocol were shown to be valid and reliable whereas only the Glittre ADL Test was shown to be responsive to change after pulmonary rehabilitation. These protocols can be used in laboratory settings and clinical practice to evaluate ADL performance in people with COPD, although there is need for more in-depth information on their validity, reliability and especially responsiveness due to the growing interest in the accurate assessment of ADL performance in this population.
Development of Uniform Protocol for Alopecia Areata Clinical Trials.
Solomon, James A
2015-11-01
Developing a successful treatment for alopecia areata (AA), clearly has not been at the forefront of the agenda for new drug/device development among the pharmaceutical and medical device industry. The National Alopecia Areata Foundation (NAAF), a patient advocacy group, initiated a plan to facilitate and drive clinical research toward finding safe and efficacious treatments for AA. As such, Alopecia Areata Uniform Protocols for clinical trials to test new treatments for AA were developed. The design of the uniform protocol is to accomplish the development of a plug-and-play template as well as to provide a framework wherein data from studies utilizing the uniform protocol can be compared through consistency of inclusions/exclusions, safety, and outcome assessment measures. A core uniform protocol for use by pharmaceutical companies in testing proof of concept for investigational products to treat AA. The core protocol includes standardized title, informed consent, inclusion/exclusion criteria, disease outcome assessments, and safety assessments. The statistical methodology to assess successful outcomes will also be standardized. The protocol as well as the informed consent form has been approved in concept by Liberty IRB and is ready to present to pharmaceutical companies.
Study protocol for the Cities Changing Diabetes programme: a global mixed-methods approach.
Napier, A David; Nolan, John J; Bagger, Malene; Hesseldal, Louise; Volkmann, Anna-Maria
2017-11-08
Urban living has been shown to affect health in various ways. As the world is becoming more urbanised and almost two-thirds of people with diabetes now live in cities, research into the relationship between urban living, health and diabetes is key to improving the lives of many. The majority of people with diabetes have type 2 diabetes, a subset linked to overweight and obesity, decreased physical activity and unhealthy diets. Diabetes has significant consequences for those living with the condition as well as their families, relationships and wider society. Although care and management are improving, complications remain common, and diabetes is among the leading causes of vision loss, amputation, neuropathy and renal and cardiovascular disease worldwide. We present a research protocol for exploring the drivers of type 2 diabetes and its complications in urban settings through the Cities Changing Diabetes (CCD) partnership programme. A global study protocol is implemented in eight collaborating CCD partner cities. In each city, academic institutions, municipal representatives and local stakeholders collaborate to set research priorities and plan implementation of findings. Local academic teams execute the study following the global study protocol presented here. A quantitative Rule of Halves analysis obtains measures of the magnitude of the diabetes burden, the diagnosis rates in each city and the outcomes of care. A qualitative Diabetes Vulnerability Assessment explores the urban context in vulnerability to type 2 diabetes and identifies social factors and cultural determinants relevant to health, well-being and diabetes. The protocol steers the collection of primary and secondary data across the study sites. Research ethics board approval has been sought and obtained in each site. Findings from each of the local studies as well as the result from combined multisite (global) analyses will be reported in a series of core scientific journal papers. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.
de Vries, E
2012-01-01
Members of the European Society for Immunodeficiencies (ESID) and other colleagues have updated the multi-stage expert-opinion-based diagnostic protocol for non-immunologists incorporating newly defined primary immunodeficiency diseases (PIDs). The protocol presented here aims to increase the awareness of PIDs among doctors working in different fields. Prompt identification of PID is important for prognosis, but this may not be an easy task. The protocol therefore starts from the clinical presentation of the patient. Because PIDs may present at all ages, this protocol is aimed at both adult and paediatric physicians. The multi-stage design allows cost-effective screening for PID of the large number of potential cases in the early phases, with more expensive tests reserved for definitive classification in collaboration with a specialist in the field of immunodeficiency at a later stage. PMID:22132890
[Objective functional compensation in NHIL: INAIL prosthesic protocol in Lombardy, 2007-2010].
Calcinoni, O; Polo, L
2011-01-01
Even if NHIL gives already right to economic compensation, our Insurance aimed to real functional compensation, to reduce handicap in everyday life. Together with Professor Giordano, Audioprosthesists' Association and Manufacturers' representatives, INAIL Medical Superintendence started in 2003 a study on this problem, involving some of his forensic physician and ENT staff; in 2007-2009 INAIL issued directives innovating and planning the rules in prosthesis provision, not only acoustical ones. In 2010 started an experimental protocol to rule hearing aid provision in all INAIL centers, throughout Italy. Authors present first results of this protocol in Lombardy, related to previous and national ones.
Pisciolaro, Ricardo Luiz; Duailibi, Monica Talarico; Novo, Neil Ferreira; Juliano, Yara; Pallos, Debora; Yelick, Pamela Crotty; Vacanti, Joseph Phillip; Ferreira, Lydia Masako; Duailibi, Silvio Eduardo
2015-11-01
One of the goals in using cells for tissue engineering (TE) and cell therapy consists of optimizing the medium for cell culture. The present study compares three different blood product supplements for improved cell proliferation and protection against DNA damage in cultured human dental pulp stem cells for tooth TE applications. Human cells from dental pulp were first characterized as adult stem cells (ectomesenchymal mixed origin) by flow cytometry. Next, four different cell culture conditions were tested: I, supplement-free; II, supplemented with fetal bovine serum; III, allogeneic human serum; and IV, autologous human serum. Cultured cells were then characterized for cell proliferation, mineralized nodule formation, and colony-forming units (CFU) capability. After 28 days in culture, the comet assay was performed to assess possible damage in cellular DNA. Our results revealed that Protocol IV achieved higher cell proliferation than Protocol I (p = 0.0112). Protocols II and III resulted in higher cell proliferation than Protocol I, but no statistical differences were found relative to Protocol IV. The comet assay revealed less cell damage in cells cultured using Protocol IV as compared to Protocols II and III. The damage percentage observed on Protocol II was significantly higher than all other protocols. CFUs capability was highest using Protocol IV (p = 0.0018) and III, respectively, and the highest degree of mineralization was observed using Protocol IV as compared to Protocols II and III. Protocol IV resulted in significantly improved cell proliferation, and no cell damage was observed. These results demonstrate that human blood product supplements can be used as feasible supplements for culturing adult human dental stem cells.
Asynchronous reference frame agreement in a quantum network
NASA Astrophysics Data System (ADS)
Islam, Tanvirul; Wehner, Stephanie
2016-03-01
An efficient implementation of many multiparty protocols for quantum networks requires that all the nodes in the network share a common reference frame. Establishing such a reference frame from scratch is especially challenging in an asynchronous network where network links might have arbitrary delays and the nodes do not share synchronised clocks. In this work, we study the problem of establishing a common reference frame in an asynchronous network of n nodes of which at most t are affected by arbitrary unknown error, and the identities of the faulty nodes are not known. We present a protocol that allows all the correctly functioning nodes to agree on a common reference frame as long as the network graph is complete and not more than t\\lt n/4 nodes are faulty. As the protocol is asynchronous, it can be used with some assumptions to synchronise clocks over a network. Also, the protocol has the appealing property that it allows any existing two-node asynchronous protocol for reference frame agreement to be lifted to a robust protocol for an asynchronous quantum network.
Construction of a femtosecond laser microsurgery system.
Steinmeyer, Joseph D; Gilleland, Cody L; Pardo-Martin, Carlos; Angel, Matthew; Rohde, Christopher B; Scott, Mark A; Yanik, Mehmet Fatih
2010-03-01
Femtosecond laser microsurgery is a powerful method for studying cellular function, neural circuits, neuronal injury and neuronal regeneration because of its capability to selectively ablate sub-micron targets in vitro and in vivo with minimal damage to the surrounding tissue. Here, we present a step-by-step protocol for constructing a femtosecond laser microsurgery setup for use with a widely available compound fluorescence microscope. The protocol begins with the assembly and alignment of beam-conditioning optics at the output of a femtosecond laser. Then a dichroic mount is assembled and installed to direct the laser beam into the objective lens of a standard inverted microscope. Finally, the laser is focused on the image plane of the microscope to allow simultaneous surgery and fluorescence imaging. We illustrate the use of this setup by presenting axotomy in Caenorhabditis elegans as an example. This protocol can be completed in 2 d.
Hausmann, Axel; Cancian de Araujo, Bruno; Sutrisno, Hari; Peggie, Djunijanti; Schmidt, Stefan
2017-01-01
Abstract Here we present a general collecting and preparation protocol for DNA barcoding of Lepidoptera as part of large-scale rapid biodiversity assessment projects, and a comparison with alternative preserving and vouchering methods. About 98% of the sequenced specimens processed using the present collecting and preparation protocol yielded sequences with more than 500 base pairs. The study is based on the first outcomes of the Indonesian Biodiversity Discovery and Information System (IndoBioSys). IndoBioSys is a German-Indonesian research project that is conducted by the Museum für Naturkunde in Berlin and the Zoologische Staatssammlung München, in close cooperation with the Research Center for Biology – Indonesian Institute of Sciences (RCB-LIPI, Bogor). PMID:29134041
Bueno, Andressa; Carvalho, Fabiano B; Gutierres, Jessié M; Lhamas, Cibele L; Brusco, Indiara; Oliveira, Sara M; Amaral, Marta G; Dorneles, Guilherme; Sorraila, Juliana; Duarte, Marta M; de Andrade, Cinthia M
2017-03-01
The present study was conducted to analyze the adverse effects of the anabolic steroids boldenone (BOL) and stanazolol (ST) in the reproductive function of male rats. These molecules were administered using three different protocols. In Protocol I, BOL and ST were administered in a higher dose than what is recommended but for a short period. In Protocol II, a moderate dose of these compounds was applied for an intermediate period, whereas in Protocol III a reduced dose was administered but for an extended period. Notably, Protocol I and III resulted in increased levels of reactive oxygen specimens (ROS [I, p < 0.01] [III, p < 0.001)]) and nitrite plus nitrate (NOx [I, p < 0.01] [II, p < 0.01] [III,p < 0.05]), respectively, whereas non-protein thiols (NPSH) levels were decreased only after Protocol III (p < 0.01). Myeloperoxidase activity was significantly increased after treatment with BOL in protocol II (p < 0.01) and III (p < 0.05) than with ST in protocol III (p < 0.05). Boldenone and ST also caused a significant up-regulation in the levels of serum testosterone when protocols I (p < 0.01) and II (p < 0.05) were performed. There were also visible histopathological alterations in the testes induced by treatment with BOL, namely degenerative changes primarily characterized by a decrease in the germinal epithelium. Together, these results suggest that the administration of BOL or ST exerts a significantly harmful effect in the testes of male rats. Moreover, all the treatment protocols used in this study induced deleterious effects on the testes, as indicated by the different biochemical parameters investigated. However, only the protocols of longer exposure time (II and III) induced morphological changes compatible with infertility. Copyright © 2017 Elsevier Inc. All rights reserved.
Reliable multicast protocol specifications protocol operations
NASA Technical Reports Server (NTRS)
Callahan, John R.; Montgomery, Todd; Whetten, Brian
1995-01-01
This appendix contains the complete state tables for Reliable Multicast Protocol (RMP) Normal Operation, Multi-RPC Extensions, Membership Change Extensions, and Reformation Extensions. First the event types are presented. Afterwards, each RMP operation state, normal and extended, is presented individually and its events shown. Events in the RMP specification are one of several things: (1) arriving packets, (2) expired alarms, (3) user events, (4) exceptional conditions.
Comparison of Ovulation Induction Protocols After Endometrioma Resection
Yasa, Cenk; Dural, Ozlem; Mutlu, Mehmet Firat; Celik, Cem; Ugurlucan, Funda Gungor; Buyru, Faruk
2014-01-01
Background and Objectives: The aim of this study was to compare the in vitro fertilization (IVF) outcomes of long gonadotropin-releasing hormone agonist (GnRH-a) and GnRH-antagonist (GnRH-ant) protocols in endometriosis patients who have undergone laparoscopic endometrioma resection surgery. To our knowledge, there is no study in the current literature that compares the effectiveness of long GnRH-a and GnRH-ant protocols in management of IVF cycles in endometriosis patients who underwent laparoscopic endometrioma resection surgery. Methods: Eighty-six patients with stage III to IV endometriosis who had undergone laparoscopic resection surgery for endometrioma were divided into 2 groups: those who had ovarian stimulation with a long GnRH-a protocol (n = 44), and those who had ovarian stimulation with a GnRH-ant protocol (n = 42). Results: The number of follicles on human chorionic gonadotropin injection day, duration of hyperstimulation, number of retrieved metaphase II oocytes, and total number of grade 1 embryos were statically significantly higher in the long GnRH-a protocol. There were no significant differences in positive β-human chorionic gonadotropin pregnancy rates (25% vs 21.4%; P = .269) and ongoing pregnancy rates per patient (20.5% vs 19.1%; P = .302) between the 2 protocols. Conclusions: Long GnRH-a and GnRH-ant protocols both present similar IVF outcomes in patients with endometriosis who have undergone laparoscopic endometrioma resection surgery. A long GnRH-a protocol may lead to a higher number of embryos that can be cryopreserved, providing the possibility of additional embryo transfers without having to go through the process of ovarian stimulation again. PMID:25392665
Pediatric superficial scald burns--reassessment of our follow-up protocol.
Egro, Francesco M; O'Neill, Jennifer K; Briard, Robert; Cubison, Tania C S; Kay, Alan R; Estela, Catalina M; Burge, Timothy S
2010-01-01
The most common pediatric burn injury is a superficial scald. The current follow-up protocol for such burns includes review of the patient at 2 weeks postinjury and then 2 months later. The authors decided to review the protocol to assess the need for this second follow-up. A retrospective study reviewed the case notes of patients younger than 16 years at the time of their injury presenting with a scald over 5% TBSA. The progress of healing and scar development up to 5 years follow-up was assessed. This study showed that scalds healing within 2 weeks following injury rarely became hypertrophic. A prospective study was performed over a 10-month period. All children who suffered a superficial partial-thickness scald injury were included. At the 2-week appointment, the need for further follow-up was predicted. The accuracy of this prediction was assessed 2 months later. This study showed that an experienced member of the burns team could reliably predict at 2-week appointment those children who could be safely discharged with no subsequent need for scar management. This study suggests that it will be safe to modify the follow-up protocol, reducing the number of clinic attendances.
ALIZADEH, Mahdi; KHADEM, Ebrahim; ALIASL, Jale
2017-01-01
Background: In Iranian traditional medicine (ITM) stomach is the important organ in the body. Its disorders can affect other organs such as liver, heart and also can cause depression. Stomach distemperaments can cause some disorders. The purpose of this study was to provide a diagnostic method of stomach distemperament for clinical practice. Methods: In this study authoritative ITM books such as Canon of Avicenna, Zakhirah-E-Kharazm Shahi by Hakim Esmail Jorjani, Kamel al-Sina’ah al-Tibbiyah by Ali ibn al-‘Abbas al-Majusi were assessed and symptoms and signs of stomach distemperament were collected. Results: Stomach has some normal temperament. The imbalance in temperament and humor can cause distemperments. There are 12 types of stomach distemperament and based on symptoms and signs a primary protocol is designed for diagnosis of stomach distemperament. Conclusion: There is no available guideline for gastric distemperamet diagnosis protocol. As a result, the presented protocol should be considered for use in clinical practice. PMID:28845397
Efficient Isolation Protocol for B and T Lymphocytes from Human Palatine Tonsils
Assadian, Farzaneh; Sandström, Karl; Laurell, Göran; Svensson, Catharina; Akusjärvi, Göran; Punga, Tanel
2015-01-01
Tonsils form a part of the immune system providing the first line of defense against inhaled pathogens. Usually the term “tonsils” refers to the palatine tonsils situated at the lateral walls of the oral part of the pharynx. Surgically removed palatine tonsils provide a convenient accessible source of B and T lymphocytes to study the interplay between foreign pathogens and the host immune system. This video protocol describes the dissection and processing of surgically removed human palatine tonsils, followed by the isolation of the individual B and T cell populations from the same tissue sample. We present a method, which efficiently separates tonsillar B and T lymphocytes using an antibody-dependent affinity protocol. Further, we use the method to demonstrate that human adenovirus infects specifically the tonsillar T cell fraction. The established protocol is generally applicable to efficiently and rapidly isolate tonsillar B and T cell populations to study the role of different types of pathogens in tonsillar immune responses. PMID:26650582
Axelrod, David M.; Chisti, Mohammod J.; Kache, Saraswati
2017-01-01
Background Pediatric sepsis has a high mortality rate in limited resource settings. Sepsis protocols have been shown to be a cost-effective strategy to improve morbidity and mortality in a variety of populations and settings. At Dhaka Hospital in Bangladesh, mortality from pediatric sepsis in high-risk children previously approached 60%, which prompted the implementation of an evidenced-based protocol in 2010. The clinical effectiveness of this protocol had not been measured. We hypothesized that implementation of a pediatric sepsis protocol improved clinical outcomes, including reducing mortality and length of hospital stay. Materials and methods This was a retrospective cohort study of children 1–59 months old with a diagnosis of sepsis, severe sepsis or septic shock admitted to Dhaka Hospital from 10/25/2009-10/25/2011. The primary outcome was inpatient mortality pre- and post-protocol implementation. Secondary outcomes included fluid overload, heart failure, respiratory insufficiency, length of hospital stay, and protocol compliance, as measured by antibiotic and fluid bolus administration within 60 minutes of hospital presentation. Results 404 patients were identified by a key-word search of the electronic medical record; 328 patients with a primary diagnosis of sepsis, severe sepsis, or septic shock were included (143 pre- and185 post-protocol) in the analysis. Pre- and post-protocol mortality were similar and not statistically significant (32.17% vs. 34.59%, p = 0.72). The adjusted odds ratio (AOR) for post-protocol mortality was 1.55 (95% CI, 0.88–2.71). The odds for developing fluid overload were significantly higher post-protocol (AOR 3.45, 95% CI, 2.04–5.85), as were the odds of developing heart failure (AOR 4.52, 95% CI, 1.43–14.29) and having a longer median length of stay (AOR 1.81, 95% CI 1.10–2.96). There was no statistically significant difference in respiratory insufficiency (pre- 65.7% vs. post- 70.3%, p = 0.4) or antibiotic administration between the cohorts (pre- 16.08% vs. post- 12.43%, p = 0.42). Conclusions Implementation of a pediatric sepsis protocol did not improve all-cause mortality or length of stay and may have been associated with increased fluid overload and heart failure during the study period in a large, non-governmental hospital in Bangladesh. Similar rates of early antibiotic administration may indicate poor protocol compliance. Though evidenced-based protocols are a potential cost-effective strategy to improve outcomes, future studies should focus on optimal implementation of context-relevant sepsis protocols in limited resource settings. PMID:28753618
CT protocol management: simplifying the process by using a master protocol concept.
Szczykutowicz, Timothy P; Bour, Robert K; Rubert, Nicholas; Wendt, Gary; Pozniak, Myron; Ranallo, Frank N
2015-07-08
This article explains a method for creating CT protocols for a wide range of patient body sizes and clinical indications, using detailed tube current information from a small set of commonly used protocols. Analytical expressions were created relating CT technical acquisition parameters which can be used to create new CT protocols on a given scanner or customize protocols from one scanner to another. Plots of mA as a function of patient size for specific anatomical regions were generated and used to identify the tube output needs for patients as a function of size for a single master protocol. Tube output data were obtained from the DICOM header of clinical images from our PACS and patient size was measured from CT localizer radiographs under IRB approval. This master protocol was then used to create 11 additional master protocols. The 12 master protocols were further combined to create 39 single and multiphase clinical protocols. Radiologist acceptance rate of exams scanned using the clinical protocols was monitored for 12,857 patients to analyze the effectiveness of the presented protocol management methods using a two-tailed Fisher's exact test. A single routine adult abdominal protocol was used as the master protocol to create 11 additional master abdominal protocols of varying dose and beam energy. Situations in which the maximum tube current would have been exceeded are presented, and the trade-offs between increasing the effective tube output via 1) decreasing pitch, 2) increasing the scan time, or 3) increasing the kV are discussed. Out of 12 master protocols customized across three different scanners, only one had a statistically significant acceptance rate that differed from the scanner it was customized from. The difference, however, was only 1% and was judged to be negligible. All other master protocols differed in acceptance rate insignificantly between scanners. The methodology described in this paper allows a small set of master protocols to be adapted among different clinical indications on a single scanner and among different CT scanners.
Using semantics for representing experimental protocols.
Giraldo, Olga; García, Alexander; López, Federico; Corcho, Oscar
2017-11-13
An experimental protocol is a sequence of tasks and operations executed to perform experimental research in biological and biomedical areas, e.g. biology, genetics, immunology, neurosciences, virology. Protocols often include references to equipment, reagents, descriptions of critical steps, troubleshooting and tips, as well as any other information that researchers deem important for facilitating the reusability of the protocol. Although experimental protocols are central to reproducibility, the descriptions are often cursory. There is the need for a unified framework with respect to the syntactic structure and the semantics for representing experimental protocols. In this paper we present "SMART Protocols ontology", an ontology for representing experimental protocols. Our ontology represents the protocol as a workflow with domain specific knowledge embedded within a document. We also present the S ample I nstrument R eagent O bjective (SIRO) model, which represents the minimal common information shared across experimental protocols. SIRO was conceived in the same realm as the Patient Intervention Comparison Outcome (PICO) model that supports search, retrieval and classification purposes in evidence based medicine. We evaluate our approach against a set of competency questions modeled as SPARQL queries and processed against a set of published and unpublished protocols modeled with the SP Ontology and the SIRO model. Our approach makes it possible to answer queries such as Which protocols use tumor tissue as a sample. Improving reporting structures for experimental protocols requires collective efforts from authors, peer reviewers, editors and funding bodies. The SP Ontology is a contribution towards this goal. We build upon previous experiences and bringing together the view of researchers managing protocols in their laboratory work. Website: https://smartprotocols.github.io/ .
Lima, Jessica Ferraz Carvalho; Lima, Adriano Fonseca; Humel, Maria Malerba Colombi; Paulillo, Luis Alexandre Maffei Sartini; Marchi, Giselle Maria; Ferraz, Caio Cezar Randi
2015-01-01
The aim of this in vitro study was to evaluate the influence of different irrigation protocols on the bond strength, at different root depths, of fiber posts cemented with a self-adhesive cement 24 hours after endodontic treatment. Fifty-six bovine incisor roots were endodontically prepared and separated into 7 groups (n = 8) according to irrigation protocols: group 1, sterile saline (control); group 2, chlorhexidine (CHX) gel 2% and saline; group 3, sodium hypochlorite (NaOCl) 5.25% and saline; group 4, CHX and saline (final irrigation with ethylenediaminetetraacetic acid [EDTA] 17%); group 5, NaOCl and saline (final irrigation with EDTA); group 6, CHX and saline (final irrigation with NaOCl and EDTA); and group 7, NaOCl (final irrigation with CHX and EDTA). No statistically significant difference was found among the groups. Within the limitations of this study, it can be concluded that the different irrigation protocols did not influence the bond strength of self-adhesive resin cement, which presented similar behaviors at the 3 root depths studied.
Management of Wilms' tumor: NWTS vs SIOP
Bhatnagar, Sushmita
2009-01-01
With the availability of several protocols in the management of Wilms' tumor, there is dilemma in the minds of the treating oncologists or pediatric onco-surgeons as to whether the child should receive upfront chemotherapy or should be operated upon primarily. It is necessary for us to understand why do we follow either of the protocols, NWTS which follows the upfront surgery principle or the SIOP which follows the upfront chemotherapy principle in all stages of the disease. While deciding which protocol to follow, it is imperative to know the pros and cons of the treatment strategies and also to study the outcome patterns in both the treatment regimes which is what this article highlights. In an attempt to compare all the differences in both the major protocols, it was realized that most of our patients in the Indian scenario present with advanced disease and thus poorer outcomes if intensive and appropriate treatment strategies are not utilized. Hence, it is imperative that we should study our own patients through the Indian Wilms' tumor study group and adopt the policies which improve the overall event free survival on a nationwide basis. PMID:20177436
Admiraal, M M; van Rootselaar, A-F; Horn, J
2017-02-01
Electroencephalographic (EEG) reactivity testing is often presented as a clear-cut element of electrophysiological testing. Absence of EEG reactivity is generally considered an indicator of poor outcome, especially in patients after cardiac arrest. However, guidelines do not clearly describe how to test for reactivity and how to evaluate the results. In a quest for clear guidelines, we performed a systematic review aimed at identifying testing methods and definitions of EEG reactivity. We systematically searched the literature between 1970 and May 2016. Methodological quality of the studies was assessed using the QUality In Prognostic Studies tool. Quality of the descriptions of stimulus protocol and reactivity definition was rated on a four-category grading scale based on reproducibility. We found that protocols for EEG reactivity testing vary greatly and descriptions of protocols are almost never replicable. Furthermore, replicable definitions of presence or absence of EEG reactivity are never provided. In order to draw firm conclusions on EEG reactivity as a prognostic factor, future studies should include a precise stimulation protocol and reactivity definition to facilitate guideline formation. © 2016 EAN.
Boldness, Aggression, and Shoaling Assays for Zebrafish Behavioral Syndromes.
Way, Gregory P; Southwell, Maura; McRobert, Scott P
2016-08-29
A behavioral syndrome exists when specific behaviors interact under different contexts. Zebrafish have been test subjects in recent studies and it is important to standardize protocols to ensure proper analyses and interpretations. In our previous studies, we have measured boldness by monitoring a series of behaviors (time near surface, latency in transitions, number of transitions, and darts) in a 1.5 L trapezoidal tank. Likewise, we quantified aggression by observing bites, lateral displays, darts, and time near an inclined mirror in a rectangular 19 L tank. By dividing a 76 L tank into thirds, we also examined shoaling preferences. The shoaling assay is a highly customizable assay and can be tailored for specific hypotheses. However, protocols for this assay also must be standardized, yet flexible enough for customization. In previous studies, end chambers were either empty, contained 5 or 10 zebrafish, or 5 pearl danios (D. albolineatus). In the following manuscript, we present a detailed protocol and representative data that accompany successful applications of the protocol, which will allow for replication of behavioral syndrome experiments.
Extra-Vehicular Activity (EVA) glove evaluation test protocol
NASA Technical Reports Server (NTRS)
Hinman-Sweeney, E. M.
1994-01-01
One of the most critical components of a space suit is the gloves, yet gloves have traditionally presented significant design challenges. With continued efforts at glove development, a method for evaluating glove performance is needed. This paper presents a pressure-glove evaluation protocol. A description of this evaluation protocol, and its development is provided. The protocol allows comparison of one glove design to another, or any one design to bare-handed performance. Gloves for higher pressure suits may be evaluated at current and future design pressures to drive out differences in performance due to pressure effects. Using this protocol, gloves may be evaluated during design to drive out design problems and determine areas for improvement, or fully mature designs may be evaluated with respect to mission requirements. Several different test configurations are presented to handle these cases. This protocol was run on a prototype glove. The prototype was evaluated at two operating pressures and in the unpressurized state, with results compared to bare-handed performance. Results and analysis from this test series are provided, as is a description of the configuration used for this test.
Transfection using DEAE-dextran.
Selden, R F
2001-05-01
Two protocols for DEAE-dextran transfection of cells are provided in this unit. The Basic Protocol describes a procedure used to transfect adherent cells and the first Alternate Protocol presents a method used to transfect suspension cells. If an increase in transfection efficiency is needed, cells can be treated with chloroquine as described in the second Alternate Protocol.
Kakuda, Wataru; Abo, Masahiro; Sasanuma, Jinichi; Shimizu, Masato; Okamoto, Takatsugu; Kimura, Chikou; Kakita, Kiyohito; Hara, Hiroyoshi
2016-06-01
Several years ago, we proposed a combination protocol of repetitive transcranial magnetic stimulation (rTMS) and intensive occupational therapy (OT) for upper limb hemiparesis after stroke. Subsequently, the number of patients treated with the protocol has increased in Japan. We aimed to present the latest data on our proposed combination protocol for post-stroke upper limb hemiparesis as a result of a multi-institutional study. After confirming that a patient met the inclusion criteria for the protocol, they were scheduled to receive the 15-day inpatient protocol. In the protocol, two sessions of 20-min rTMS and 120-min occupational therapy were provided daily, except for Sundays and the days of admission/discharge. Motor function of the affected upper limb was evaluated by the Fugl-Meyer assessment (FMA) and Wolf motor function test (WMFT) at admission/discharge and at 4 weeks after discharge if possible. A total of 1725 post-stroke patients were studied (mean age at admission 61.4 ± 13.0 years). The scheduled 15-day protocol was completed by all patients. At discharge, the increase in FMA score, shortening in performance time of WMFT, and increase in functional ability scale (FAS) score of WMFT were significant (FMA score 46.8 ± 12.2 to 50.9 ± 11.4 points, p < 0.001; performance time of WMFT 2.57 ± 1.32 to 2.21 ± 1.33, p < 0.001; FAS score of WMFT 47.4 ± 14. to 51.4 ± 14.3 points, p < 0.001). Our proposed combination protocol can be a potentially safe and useful therapeutic intervention for upper limb hemiparesis after stroke, although its efficacy should be confirmed in a randomized controlled study.
A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.
Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander
2017-01-01
Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.
Ramos-Goñi, Juan M; Rand-Hendriksen, Kim; Pinto-Prades, Jose Luis
2016-06-01
Time trade-off (TTO)-based valuation studies for the three-level version of the EuroQol five-dimensional questionnaire (EQ-5D) typically started off with a ranking task (ordering the health states by preference). This was not included in the protocol for the five-level EQ-5D (EQ-5D-5L) valuation study. To test whether reintroducing a ranking task before the composite TTO (C-TTO) could help to reduce inconsistencies in C-TTO responses and improve the data quality. Respondents were randomly assigned to three study arms. The control arm was the present EQ-5D-5L study protocol, without ranking. The second arm (ranking without sorting) preceded the present protocol by asking respondents to rank the target health states using physical cards. The states were then valued in random order using C-TTO. In the third arm (ranking and sorting), the ranked states remained visible through the C-TTO tasks and the order of valuation was determined by the ranking. The study used only 10 EQ-5D-5L health states. We compared the C-TTO-based inconsistent pairs of health states and ties. The final sample size was 196 in the control arm, 205 in the ranking without sorting arm, and 199 in the ranking and sorting arm. The percentages of ties by respondents were 15.1%, 12.5%, and 12.6% for the control arm, the ranking without sorting arm, and the ranking and sorting arm, respectively. The extra cost for adding the ranking task was about 15%. The benefit does not justify the effort involved in the ranking task. For this reason, the addition of the ranking task to the present EQ-5D-5L valuation protocol is not an attractive option. Copyright © 2016 International Society for Pharmacoeconomics and Outcomes Research (ISPOR). Published by Elsevier Inc. All rights reserved.
Guay, Stephane; Tremblay, Nicole; Goncalves, Jane; Bilodeau, Henriette; Geoffrion, Steve
2017-06-24
The use of peer support programmes to help workers experiencing potentially traumatic events (PTE) has increased in high-risk organisations in the last decades. However, the scientific evidence of its effectiveness is still very limited. This paper aims to describe the protocol of a prospective cohort study that assesses the efficacy of a peer support programme among youth social services employees exposed to a PTE at work on psychological well-being, work functioning and needs of support. This is a mixed-methods prospective study that will examine workers' evolution four times over a 12-month period in Canada. This study involves: (1) quantitative data obtained through self-administrated questionnaires among 222 workers, and (2) qualitative in-depth interviews with a subsample of 45 workers. This study will compare findings from a cohort who received the support of a peer following a PTE (peer support-experimental protocol) as part of the experimental protocol of the Montreal Youth Social Services-University Institute (MYSS-UI), the second group of workers did not ask for the peer support (no peer support-experimental protocol) but was part of MYSS-UI, and the third group received standard organisational support from the Monteregie Youth Social Services (MYSS) (standard organisational protocol). The protocol and informed consent form complied with the ethics guidelines of the MYSS-UI. The Research Ethics Board of MYSS-UI and MYSS reviewed and accepted the protocol as required. The results of the study will be published in peer-reviewed journals, presented at research and general public conferences, disseminated via a public report for the institute that funded the project and for all workers. Results of this study will influence decision making regarding intervention policies following PTE and peer support interventions may be expanded throughout the youth social services in Canada and worldwide. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.
Mobile-ip Aeronautical Network Simulation Study
NASA Technical Reports Server (NTRS)
Ivancic, William D.; Tran, Diepchi T.
2001-01-01
NASA is interested in applying mobile Internet protocol (mobile-ip) technologies to its space and aeronautics programs. In particular, mobile-ip will play a major role in the Advanced Aeronautic Transportation Technology (AATT), the Weather Information Communication (WINCOMM), and the Small Aircraft Transportation System (SATS) aeronautics programs. This report presents the results of a simulation study of mobile-ip for an aeronautical network. The study was performed to determine the performance of the transmission control protocol (TCP) in a mobile-ip environment and to gain an understanding of how long delays, handoffs, and noisy channels affect mobile-ip performance.
Comment on "flexible protocol for quantum private query based on B92 protocol"
NASA Astrophysics Data System (ADS)
Chang, Yan; Zhang, Shi-Bin; Zhu, Jing-Min
2017-03-01
In a recent paper (Quantum Inf Process 13:805-813, 2014), a flexible quantum private query (QPQ) protocol based on B92 protocol is presented. Here we point out that the B92-based QPQ protocol is insecure in database security when the channel has loss, that is, the user (Alice) will know more records in Bob's database compared with she has bought.
Cryptanalysis and improvement of a quantum communication-based online shopping mechanism
NASA Astrophysics Data System (ADS)
Huang, Wei; Yang, Ying-Hui; Jia, Heng-Yue
2015-06-01
Recently, Chou et al. (Electron Commer Res 14:349-367, 2014) presented a novel controlled quantum secure direct communication protocol which can be used for online shopping. The authors claimed that their protocol was immune to the attacks from both external eavesdropper and internal betrayer. However, we find that this protocol is vulnerable to the attack from internal betrayer. In this paper, we analyze the security of this protocol to show that the controller in this protocol is able to eavesdrop the secret information of the sender (i.e., the customer's shopping information), which indicates that it cannot be used for secure online shopping as the authors expected. Accordingly, an improvement of this protocol, which could resist the controller's attack, is proposed. In addition, we present another protocol which is more appropriate for online shopping. Finally, a discussion about the difference in detail of the quantum secure direct communication process between regular quantum communications and online shopping is given.
Nam, Junghyun; Choo, Kim-Kwang Raymond
2014-01-01
While a number of protocols for password-only authenticated key exchange (PAKE) in the 3-party setting have been proposed, it still remains a challenging task to prove the security of a 3-party PAKE protocol against insider dictionary attacks. To the best of our knowledge, there is no 3-party PAKE protocol that carries a formal proof, or even definition, of security against insider dictionary attacks. In this paper, we present the first 3-party PAKE protocol proven secure against both online and offline dictionary attacks as well as insider and outsider dictionary attacks. Our construct can be viewed as a protocol compiler that transforms any 2-party PAKE protocol into a 3-party PAKE protocol with 2 additional rounds of communication. We also present a simple and intuitive approach of formally modelling dictionary attacks in the password-only 3-party setting, which significantly reduces the complexity of proving the security of 3-party PAKE protocols against dictionary attacks. In addition, we investigate the security of the well-known 3-party PAKE protocol, called GPAKE, due to Abdalla et al. (2005, 2006), and demonstrate that the security of GPAKE against online dictionary attacks depends heavily on the composition of its two building blocks, namely a 2-party PAKE protocol and a 3-party key distribution protocol. PMID:25309956
Counselling, Suicide Risk Assessment, and Retention in a Community College (2004-2009)
ERIC Educational Resources Information Center
Porter, Shirley
2010-01-01
This study focused on Suicide Risk Assessment (SRA) protocols completed by counsellors for 153 students who presented with suicidal ideation at a community college counselling centre during a five year period. This study sought to: determine the number of students presenting with suicidal ideation annually; identify the types of interventions used…
An Efficient and Secure Arbitrary N-Party Quantum Key Agreement Protocol Using Bell States
NASA Astrophysics Data System (ADS)
Liu, Wen-Jie; Xu, Yong; Yang, Ching-Nung; Gao, Pei-Pei; Yu, Wen-Bin
2018-01-01
Two quantum key agreement protocols using Bell states and Bell measurement were recently proposed by Shukla et al. (Quantum Inf. Process. 13(11), 2391-2405, 2014). However, Zhu et al. pointed out that there are some security flaws and proposed an improved version (Quantum Inf. Process. 14(11), 4245-4254, 2015). In this study, we will show Zhu et al.'s improvement still exists some security problems, and its efficiency is not high enough. For solving these problems, we utilize four Pauli operations { I, Z, X, Y} to encode two bits instead of the original two operations { I, X} to encode one bit, and then propose an efficient and secure arbitrary N-party quantum key agreement protocol. In the protocol, the channel checking with decoy single photons is introduced to avoid the eavesdropper's flip attack, and a post-measurement mechanism is used to prevent against the collusion attack. The security analysis shows the present protocol can guarantee the correctness, security, privacy and fairness of quantum key agreement.
Systemic and local reactions of bee venom immunotherapy in Iran.
Bemanian, Mohammad Hassan; Farhoudi, Abolhassan; Pourpak, Zahra; Gharagozlou, Mohammad; Movahedi, Masoud; Nabavi, Mohammad; Mozafari, Habibeh; Mohammadzadeh, Iraj; Chavoshzadeh, Zahra; Shirkhoda, Zahra
2007-12-01
Severe allergic reactions during specific immunotherapy may occur in the treatment of hymenoptera sting allergy. The objective of the present study was to examine the characteristics of allergic reactions during specific immunotherapy in patients with allergy towards hymenoptera venom in the Iranian population. A prospective study was performed using the clinical reports of 27 patients with anaphylaxis to bee venom (Apis melifera, Geupes vespula and Geupes Polites). Ten patients treated with Cluster protocol during 2002 and 2006 After diagnosis of hymenoptera sting allergy according to history and intradermal tests, the patient were treated with Cluster protocol immunotherapy. The protocol lasted 6 weeks with an increase in the concentration of venom from 0.01 microg/ml to 100 microg/ml. None of the patient received premedication. All patients with hymenoptera venom allergy received 120 injections. Anaphylactic reactions were classified according to the Mueller-classification. The frequencies of systemic reactions during Cluster protocol were 8.33% and 5% for yellow jacket and honey bee venom respectively. No patient experienced severe systemic reaction. Cluster protocol for hymenoptera immunotherapy is a reliable method for the treatment of anaphylactic reactions to bee venom. It is safe with low cost and do not need hospitalization.
Bridge, Heather; Smolskis, Mary; Bianchine, Peter; Dixon, Dennis O; Kelly, Grace; Herpin, Betsey; Tavel, Jorge
2009-08-01
A clinical research protocol document must reflect both sound scientific rationale as well as local, national and, when applicable, international regulatory and human subject protections requirements. These requirements originate from a variety of sources, undergo frequent revision and are subject to interpretation. Tools to assist clinical investigators in the production of clinical protocols could facilitate navigating these requirements and ultimately increase the efficiency of clinical research. The National Institute of Allergy and Infectious Diseases (NIAID) developed templates for investigators to serve as the foundation for protocol development. These protocol templates are designed as tools to support investigators in developing clinical protocols. NIAID established a series of working groups to determine how to improve its capacity to conduct clinical research more efficiently and effectively. The Protocol Template Working Group was convened to determine what protocol templates currently existed within NIAID and whether standard NIAID protocol templates should be produced. After review and assessment of existing protocol documents and requirements, the group reached consensus about required and optional content, determined the format and identified methods for distribution as well as education of investigators in the use of these templates. The templates were approved by the NIAID Executive Committee in 2006 and posted as part of the NIAID Clinical Research Toolkit [1] website for broad access. These documents require scheduled revisions to stay current with regulatory and policy changes. The structure of any clinical protocol template, whether comprehensive or specific to a particular study phase, setting or design, affects how it is used by investigators. Each structure presents its own set of advantages and disadvantages. While useful, protocol templates are not stand-alone tools for creating an optimal protocol document, but must be complemented by institutional resources and support. Education and guidance of investigators in the appropriate use of templates is necessary to ensure a complete yet concise protocol document. Due to changing regulatory requirements, clinical protocol templates cannot become static, but require frequent revisions.
Testing warning messages on smokers’ cigarette packages: A standardized protocol
Brewer, Noel T.; Hall, Marissa G.; Lee, Joseph G. L.; Peebles, Kathryn; Noar, Seth M.; Ribisl, Kurt M.
2015-01-01
Purpose Lab experiments on cigarette warnings typically use a brief one-time exposure that is not paired with the cigarette packs smokers use every day, leaving open the question of how repeated warning exposure over several weeks may affect smokers. This proof of principle study sought to develop a new protocol for testing cigarette warnings that better reflects real-world exposure by presenting them on cigarette smokers’ own packs. Methods We tested a cigarette pack labeling protocol with 76 US smokers ages 18 and older. We applied graphic warnings to the front and back of smokers’ cigarette packs. Results Most smokers reported that at least 75% of the packs of cigarettes they smoked during the study had our warnings. Nearly all said they would participate in the study again. Using cigarette packs with the study warnings increased quit intentions (p<.05). Conclusion Our findings suggest a feasible pack labeling protocol with six steps: (1) schedule appointments at brief intervals; (2) determine typical cigarette consumption; (3) ask smokers to bring a supply of cigarette packs to study appointments; (4) apply labels to smokers’ cigarette packs; (5) provide participation incentives at the end of appointments; and (6) refer smokers to cessation services at end of the study. When used in randomized controlled trials in settings with real-world message exposure over time, this protocol may help identify the true impact of warnings and thus better inform tobacco product labeling policy. PMID:25564282
DOT National Transportation Integrated Search
2006-08-01
The purpose of this Traffic Noise Analysis Protocol for New Highway : Construction, Reconstruction, and Retrofit Barrier Projects (Protocol) is : to present California Department of Transportation (Caltrans) policies and : procedures for applying 23 ...
Smith, Michelle K; Jones, Francis H M; Gilbert, Sarah L; Wieman, Carl E
2013-01-01
Instructors and the teaching practices they employ play a critical role in improving student learning in college science, technology, engineering, and mathematics (STEM) courses. Consequently, there is increasing interest in collecting information on the range and frequency of teaching practices at department-wide and institution-wide scales. To help facilitate this process, we present a new classroom observation protocol known as the Classroom Observation Protocol for Undergraduate STEM or COPUS. This protocol allows STEM faculty, after a short 1.5-hour training period, to reliably characterize how faculty and students are spending their time in the classroom. We present the protocol, discuss how it differs from existing classroom observation protocols, and describe the process by which it was developed and validated. We also discuss how the observation data can be used to guide individual and institutional change.
Smith, Michelle K.; Jones, Francis H. M.; Gilbert, Sarah L.; Wieman, Carl E.
2013-01-01
Instructors and the teaching practices they employ play a critical role in improving student learning in college science, technology, engineering, and mathematics (STEM) courses. Consequently, there is increasing interest in collecting information on the range and frequency of teaching practices at department-wide and institution-wide scales. To help facilitate this process, we present a new classroom observation protocol known as the Classroom Observation Protocol for Undergraduate STEM or COPUS. This protocol allows STEM faculty, after a short 1.5-hour training period, to reliably characterize how faculty and students are spending their time in the classroom. We present the protocol, discuss how it differs from existing classroom observation protocols, and describe the process by which it was developed and validated. We also discuss how the observation data can be used to guide individual and institutional change. PMID:24297289
One Approach for Transitioning the iNET Standards into the IRIG 106 Telemetry Standards
2015-05-26
Protocol Suite. Figure 1 illustrates the Open Systems Interconnection ( OSI ) Model, the corresponding TCP/IP Model, and the major components of the TCP...IP Protocol Suite. Figure 2 represents the iNET-specific protocols layered onto the TCP/IP Model. Figure 1. OSI and TCP/IP Model with TCP/IP...Protocol Suite TCP/IP Protocol Suite Major Components IPv4 IPv6 TCP/IP Model OSI Model Application Presentation
Developing family planning nurse practitioner protocols.
Hawkins, J W; Roberto, D
1984-01-01
This article focuses on the process of development of protocols for family planning nurse practitioners. A rationale for the use of protocols, a definition of the types and examples, and the pros and cons of practice with protocols are presented. A how-to description for the development process follows, including methods and a suggested tool for critique and evaluation. The aim of the article is to assist nurse practitioners in developing protocols for their practice.
A Public-Key Based Authentication and Key Establishment Protocol Coupled with a Client Puzzle.
ERIC Educational Resources Information Center
Lee, M. C.; Fung, Chun-Kan
2003-01-01
Discusses network denial-of-service attacks which have become a security threat to the Internet community and suggests the need for reliable authentication protocols in client-server applications. Presents a public-key based authentication and key establishment protocol coupled with a client puzzle protocol and validates it through formal logic…
Colyar, Jessica M; Eggett, Dennis L; Steele, Frost M; Dunn, Michael L; Ogden, Lynn V
2009-09-01
The relative sensitivity of side-by-side and sequential monadic consumer liking protocols was compared. In the side-by-side evaluation, all samples were presented at once and evaluated together 1 characteristic at a time. In the sequential monadic evaluation, 1 sample was presented and evaluated on all characteristics, then returned before panelists received and evaluated another sample. Evaluations were conducted on orange juice, frankfurters, canned chili, potato chips, and applesauce. Five commercial brands, having a broad quality range, were selected as samples for each product category to assure a wide array of consumer liking scores. Without their knowledge, panelists rated the same 5 retail brands by 1 protocol and then 3 wk later by the other protocol. For 3 of the products, both protocols yielded the same order of overall liking. Slight differences in order of overall liking for the other 2 products were not significant. Of the 50 pairwise overall liking comparisons, 44 were in agreement. The different results obtained by the 2 protocols in order of liking and significance of paired comparisons were due to the experimental variation and differences in sensitivity. Hedonic liking scores were subjected to statistical power analyses and used to calculate minimum number of panelists required to achieve varying degrees of sensitivity when using side-by-side and sequential monadic protocols. In most cases, the side-by-side protocol was more sensitive, thus providing the same information with fewer panelists. Side-by-side protocol was less sensitive in cases where sensory fatigue was a factor.
Monz, Christopher A.; Marion, Jeffrey L.; Goonan, Kelly A.; Manning, Robert E.; Wimpey, Jeremy; Carr, Christopher
2010-01-01
Mountain summits present a unique challenge to manage sustainably: they are ecologically important and, in many circumstances, under high demand for recreation and tourism activities. This article presents recent advances in the assessment of resource conditions and visitor disturbance in mountain summit environments, by drawing on examples from a multiyear, interdisciplinary study of summits in the northeastern United States. Primary impact issues as a consequence of visitor use, such as informal trail formation, vegetation disturbance, and soil loss, were addressed via the adaption of protocols from recreation ecology studies to summit environments. In addition, new methodologies were developed that provide measurement sensitivity to change previously unavailable through standard recreation monitoring protocols. Although currently limited in application to the northeastern US summit environments, the methods presented show promise for widespread application wherever summits are in demand for visitor activities.
A client-treatment matching protocol for therapeutic communities: first report.
Melnick, G; De Leon, G; Thomas, G; Kressel, D
2001-10-01
The present study is the first report on a client-treatment matching protocol (CMP) to guide admissions to residential and outpatient substance abuse treatment settings. Two cohorts, a field test sample (n = 318) and cross-validation (n = 407) sample were drawn from consecutive admissions to nine geographically distributed multisetting therapeutic communities (TCs). A passive matching design was employed. Clients received the CMP on admission, but agencies were "blind" to the CMP treatment recommendation (i.e., match) and assigned clients to treatment by the usual intake procedures. Bivariate and logistical regression analyses show that positive treatment dispositions (treatment completion or longer retention in treatment)) were significantly higher among the CMP-matched clients. The present findings provide the empirical basis for studies assessing the validity and utility of the CMP with controlled designs. Though limited to TC-oriented agencies, the present research supports the use of objective matching criteria to improve treatment.
Goldberg, Andrew J; Zaidi, Razi; Brooking, Deirdre; Kim, Louise; Korda, Michelle; Masci, Lorenzo; Green, Ruth; O’Donnell, Paul; Smith, Roger
2018-01-01
Introduction Achilles tendinopathy (AT) is a cause of pain and disability affecting both athletes and sedentary individuals. More than 150 000 people in the UK every year suffer from AT. While there is much preclinical work on the use of stem cells in tendon pathology, there is a scarcity of clinical data looking at the use of mesenchymal stem cells to treat tendon disease and there does not appear to be any studies of the use of autologous cultured mesenchymal stem cells (MSCs) for AT. Our hypothesis is that autologous culture expanded MSCs implanted into an area of mid-portion AT will lead to improved pain-free mechanical function. The current paper presents the protocol for a phase IIa clinical study. Methods and analysis The presented protocol is for a non-commercial, single-arm, open-label, phase IIa proof-of-concept study. The study will recruit 10 participants and will follow them up for 6 months. Included will be patients aged 18–70 years with chronic mid-portion AT who have failed at least 6 months of non-operative management. Participants will have a bone marrow aspirate collected from the posterior iliac crest under either local or general anaesthetic. MSCs will be isolated and expanded from the bone marrow. Four to 6 weeks after the harvest, participants will undergo implantation of the culture expanded MSCs under local anaesthetic and ultrasound guidance. The primary outcome will be safety as defined by the incidence rate of serious adverse reaction. The secondary outcomes will be efficacy as measured by patient-reported outcome measures and radiological outcome using ultrasound techniques. Ethics and dissemination The protocol has been approved by the National Research Ethics Service Committee (London, Harrow; reference 13/LO/1670). Trial findings will be disseminated through peer-reviewed publications and conference presentations. Trial registration number NCT02064062. PMID:29764889
[Fewer breech deliveries after implementation of a modified cephalic version protocol].
Kuppens, Simone M I; Francois, Anne M H; Hasaart, Tom H M; van der Donk, Maria W P; Pop, Victor J M
2010-01-01
To investigate the effect of implementation of a number of process policy guidelines (protocol), on the success rate of external cephalic version (ECV) for breech presentation. Prospective study. During a 3-year period (2004-2006) a standardized protocol for an ECV consultation was developed, evaluated and adapted. After implementing this modified protocol as 'process policy guidelines', the effect on the rate of successful ECV was prospectively evaluated during the period 1 January 2007-31 July 2008. Success was defined as cephalic presentation (ultrasound) immediately after ECV. A secondary outcome measure was the elective caesarean section rate for breech presentation. The rate of successful ECV increased significantly from 47% (110/236 pregnant women) in the period January 2004-December 2006 to 61% (85/139, p = 0.006) in the period January 2007-July 2008. Patient characteristics were similar in both groups, with the exception of 2 subgroups of term of version. The increase was preferentially found in nulliparous and multiparous women with frank breech. Nulliparity, frank breech, anterior placenta and low birth weight were associated with a lower success rate of ECV. The term of pregnancy at which ECV was performed did not seem to affect the success rate. Implementing the process policy guidelines increased the number of cephalic presentations at delivery and decreased the rate of elective caesarean sections for breech presentation from 39% to 27% (p = 0.03). The number needed to treat to prevent 1 elective caesarean section by ECV according to the process policy guidelines was 8. After implementation of the process policy guidelines, the success rate of ECV increased considerably. The rate of elective caesarean section for breech presentation declined. These findings are in favour of establishing specialized ECV centres in the Netherlands.
NASA Technical Reports Server (NTRS)
Zhou, Xiaoming (Inventor); Baras, John S. (Inventor)
2010-01-01
The present invention relates to an improved communications protocol which increases the efficiency of transmission in return channels on a multi-channel slotted Alohas system by incorporating advanced error correction algorithms, selective retransmission protocols and the use of reserved channels to satisfy the retransmission requests.
DOT National Transportation Integrated Search
1998-03-01
This report presents the development and verification of a testing protocol and protocol equipment for confined extension testing and confined creep testing for geosynthetic reinforcement materials. The developed data indicate that confined response ...
Álvarez, José M; Cortizo, Millán; Ordás, Ricardo J
2012-01-01
Pinus pinaster is one of the most economically important conifers in the world. Somatic embryogenesis is a powerful tool in breeding programmes because it allows the generation of a great number of different clonal lines from seeds of superior genotypes. Unfortunately, embryogenic competence decreases with the age of cultures. Therefore, it is necessary to have a cryopreservation protocol that ensures a continuous supply of juvenile mass while allowing good maturation and conversion rates into vigorously growing plants. In this work we studied the influence of several cryopreservation parameters, such as cryoprotectant solution and pre-cooling temperature, on embryogenic culture regrowth and embryo maturation. Recovery of rewarmed samples after cryopreservation in a -150 degree C freezer depended on the cooling temperature reached prior to plunging the tubes into liquid nitrogen. As a result, we present an optimised cryopreservation protocol that ensures high recovery and embryo maturation rates. The protocol presented is a simple and fast alternative and enabled successful cryopreservation and recovery of 100 percent of the lines tested. Cryopreserved lines presented the same maturation rates as non-cryopreserved controls.
Asher, Elad; Reuveni, Haim; Shlomo, Nir; Gerber, Yariv; Beigel, Roy; Narodetski, Michael; Eldar, Michael; Or, Jacob; Hod, Hanoch; Shamiss, Arie; Matetzky, Shlomi
2015-01-01
The aim of this study was to compare in patients presenting with acute chest pain the clinical outcomes and cost-effectiveness of an accelerated diagnostic protocol utilizing contemporary technology in a chest pain unit versus routine care in an internal medicine department. Hospital and 90-day course were prospectively studied in 585 consecutive low-moderate risk acute chest pain patients, of whom 304 were investigated in a designated chest pain center using a pre-specified accelerated diagnostic protocol, while 281 underwent routine care in an internal medicine ward. Hospitalization was longer in the routine care compared with the accelerated diagnostic protocol group (p<0.001). During hospitalization, 298 accelerated diagnostic protocol patients (98%) vs. 57 (20%) routine care patients underwent non-invasive testing, (p<0.001). Throughout the 90-day follow-up, diagnostic imaging testing was performed in 125 (44%) and 26 (9%) patients in the routine care and accelerated diagnostic protocol patients, respectively (p<0.001). Ultimately, most patients in both groups had non-invasive imaging testing. Accelerated diagnostic protocol patients compared with those receiving routine care was associated with a lower incidence of readmissions for chest pain [8 (3%) vs. 24 (9%), p<0.01], and acute coronary syndromes [1 (0.3%) vs. 9 (3.2%), p<0.01], during the follow-up period. The accelerated diagnostic protocol remained a predictor of lower acute coronary syndromes and readmissions after propensity score analysis [OR = 0.28 (CI 95% 0.14-0.59)]. Cost per patient was similar in both groups [($2510 vs. $2703 for the accelerated diagnostic protocol and routine care group, respectively, (p = 0.9)]. An accelerated diagnostic protocol is clinically superior and as cost effective as routine in acute chest pain patients, and may save time and resources.
Asher, Elad; Reuveni, Haim; Shlomo, Nir; Gerber, Yariv; Beigel, Roy; Narodetski, Michael; Eldar, Michael; Or, Jacob; Hod, Hanoch; Shamiss, Arie; Matetzky, Shlomi
2015-01-01
Aims The aim of this study was to compare in patients presenting with acute chest pain the clinical outcomes and cost-effectiveness of an accelerated diagnostic protocol utilizing contemporary technology in a chest pain unit versus routine care in an internal medicine department. Methods and Results Hospital and 90-day course were prospectively studied in 585 consecutive low-moderate risk acute chest pain patients, of whom 304 were investigated in a designated chest pain center using a pre-specified accelerated diagnostic protocol, while 281 underwent routine care in an internal medicine ward. Hospitalization was longer in the routine care compared with the accelerated diagnostic protocol group (p<0.001). During hospitalization, 298 accelerated diagnostic protocol patients (98%) vs. 57 (20%) routine care patients underwent non-invasive testing, (p<0.001). Throughout the 90-day follow-up, diagnostic imaging testing was performed in 125 (44%) and 26 (9%) patients in the routine care and accelerated diagnostic protocol patients, respectively (p<0.001). Ultimately, most patients in both groups had non-invasive imaging testing. Accelerated diagnostic protocol patients compared with those receiving routine care was associated with a lower incidence of readmissions for chest pain [8 (3%) vs. 24 (9%), p<0.01], and acute coronary syndromes [1 (0.3%) vs. 9 (3.2%), p<0.01], during the follow-up period. The accelerated diagnostic protocol remained a predictor of lower acute coronary syndromes and readmissions after propensity score analysis [OR = 0.28 (CI 95% 0.14–0.59)]. Cost per patient was similar in both groups [($2510 vs. $2703 for the accelerated diagnostic protocol and routine care group, respectively, (p = 0.9)]. Conclusion An accelerated diagnostic protocol is clinically superior and as cost effective as routine in acute chest pain patients, and may save time and resources. PMID:25622029
Evaluating Protocol Lifecycle Time Intervals in HIV/AIDS Clinical Trials
Schouten, Jeffrey T.; Dixon, Dennis; Varghese, Suresh; Cope, Marie T.; Marci, Joe; Kagan, Jonathan M.
2014-01-01
Background Identifying efficacious interventions for the prevention and treatment of human diseases depends on the efficient development and implementation of controlled clinical trials. Essential to reducing the time and burden of completing the clinical trial lifecycle is determining which aspects take the longest, delay other stages, and may lead to better resource utilization without diminishing scientific quality, safety, or the protection of human subjects. Purpose In this study we modeled time-to-event data to explore relationships between clinical trial protocol development and implementation times, as well as identify potential correlates of prolonged development and implementation. Methods We obtained time interval and participant accrual data from 111 interventional clinical trials initiated between 2006 and 2011 by NIH’s HIV/AIDS Clinical Trials Networks. We determined the time (in days) required to complete defined phases of clinical trial protocol development and implementation. Kaplan-Meier estimates were used to assess the rates at which protocols reached specified terminal events, stratified by study purpose (therapeutic, prevention) and phase group (pilot/phase I, phase II, and phase III/ IV). We also examined several potential correlates to prolonged development and implementation intervals. Results Even though phase grouping did not determine development or implementation times of either therapeutic or prevention studies, overall we observed wide variation in protocol development times. Moreover, we detected a trend toward phase III/IV therapeutic protocols exhibiting longer developmental (median 2 ½ years) and implementation times (>3years). We also found that protocols exceeding the median number of days for completing the development interval had significantly longer implementation. Limitations The use of a relatively small set of protocols may have limited our ability to detect differences across phase groupings. Some timing effects present for a specific study phase may have been masked by combining protocols into phase groupings. Presence of informative censoring, such as withdrawal of some protocols from development if they began showing signs of lost interest among investigators, complicates interpretation of Kaplan-Meier estimates. Because this study constitutes a retrospective examination over an extended period of time, it does not allow for the precise identification of relative factors impacting timing. Conclusions Delays not only increase the time and cost to complete clinical trials, but they also diminish their usefulness by failing to answer research questions in time. We believe that research analyzing the time spent traversing defined intervals across the clinical trial protocol development and implementation continuum can stimulate business process analyses and reengineering efforts that could lead to reductions in the time from clinical trial concept to results, thereby accelerating progress in clinical research. PMID:24980279
Bulk Data Dissemination in Low Power Sensor Networks: Present and Future Directions
Xu, Zhirong; Hu, Tianlei; Song, Qianshu
2017-01-01
Wireless sensor network-based (WSN-based) applications need an efficient and reliable data dissemination service to facilitate maintenance, management and data distribution tasks. As WSNs nowadays are becoming pervasive and data intensive, bulk data dissemination protocols have been extensively studied recently. This paper provides a comprehensive survey of the state-of-the-art bulk data dissemination protocols. The large number of papers available in the literature propose various techniques to optimize the dissemination protocols. Different from the existing survey works which separately explores the building blocks of dissemination, our work categorizes the literature according to the optimization purposes: Reliability, Scalability and Transmission/Energy efficiency. By summarizing and reviewing the key insights and techniques, we further discuss on the future directions for each category. Our survey helps unveil three key findings for future direction: (1) The recent advances in wireless communications (e.g., study on cross-technology interference, error estimating codes, constructive interference, capture effect) can be potentially exploited to support further optimization on the reliability and energy efficiency of dissemination protocols; (2) Dissemination in multi-channel, multi-task and opportunistic networks requires more efforts to fully exploit the spatial-temporal network resources to enhance the data propagation; (3) Since many designs incur changes on MAC layer protocols, the co-existence of dissemination with other network protocols is another problem left to be addressed. PMID:28098830
Lee, Joseph G L; Gregory, Kyle R; Baker, Hannah M; Ranney, Leah M; Goldstein, Adam O
2016-01-01
Most smokers become addicted to tobacco products before they are legally able to purchase these products. We systematically reviewed the literature on protocols to assess underage purchase and their ecological validity. We conducted a systematic search in May 2015 in PubMed and PsycINFO. We independently screened records for inclusion. We conducted a narrative review and examined implications of two types of legal authority for protocols that govern underage buy enforcement in the United States: criminal (state-level laws prohibiting sales to youth) and administrative (federal regulations prohibiting sales to youth). Ten studies experimentally assessed underage buy protocols and 44 studies assessed the association between youth characteristics and tobacco sales. Protocols that mimicked real-world youth behaviors were consistently associated with substantially greater likelihood of a sale to a youth. Many of the tested protocols appear to be designed for compliance with criminal law rather than administrative enforcement in ways that limited ecological validity. This may be due to concerns about entrapment. For administrative enforcement in particular, entrapment may be less of an issue than commonly thought. Commonly used underage buy protocols poorly represent the reality of youths' access to tobacco from retailers. Compliance check programs should allow youth to present themselves naturally and attempt to match the community's demographic makeup.
Lee, Joseph G. L.; Gregory, Kyle R.; Baker, Hannah M.; Ranney, Leah M.; Goldstein, Adam O.
2016-01-01
Most smokers become addicted to tobacco products before they are legally able to purchase these products. We systematically reviewed the literature on protocols to assess underage purchase and their ecological validity. We conducted a systematic search in May 2015 in PubMed and PsycINFO. We independently screened records for inclusion. We conducted a narrative review and examined implications of two types of legal authority for protocols that govern underage buy enforcement in the United States: criminal (state-level laws prohibiting sales to youth) and administrative (federal regulations prohibiting sales to youth). Ten studies experimentally assessed underage buy protocols and 44 studies assessed the association between youth characteristics and tobacco sales. Protocols that mimicked real-world youth behaviors were consistently associated with substantially greater likelihood of a sale to a youth. Many of the tested protocols appear to be designed for compliance with criminal law rather than administrative enforcement in ways that limited ecological validity. This may be due to concerns about entrapment. For administrative enforcement in particular, entrapment may be less of an issue than commonly thought. Commonly used underage buy protocols poorly represent the reality of youths' access to tobacco from retailers. Compliance check programs should allow youth to present themselves naturally and attempt to match the community’s demographic makeup. PMID:27050671
Salgueiro, Lister L; Rolim, Juliana R; Moura, Bernardo R L; Machado, Suelen P P; Haddad, Carolina
2016-08-01
This study evaluated the use of Corifollitropin alfa in patients with previous poor response to recombinant follicle stimulating hormone in long-term protocols using gonadotropin-releasing hormone. Twenty-seven poor responders to previous treatment with the long term protocol using the recombinant follicle stimulating hormone (Group 1) were selected and then submitted to a second attempt using the same long term protocol with Corifollitropin alfa instead of the recombinant follicle stimulating hormone (Group 2).Ovarian down-regulation was achieved using subcutaneous administration of Leuprolide Acetate. Ovarian stimulation was performed with recombinant follicle stimulating hormone until the administration of human chorionic gonadotropin, followed by follicular aspiration (Group 1). Group 2 was submitted to this same protocol using Corifollitropin alfa instead of recombinant follicle stimulating hormone. There were significant differences in the number of aspirated oocytes, percentage of mature oocytes, amount of injected oocytes and transferred embryos - with all of these parameters being increased in the Corifollitropin alfa group. In addition, the rates of pregnancy and ongoing pregnancy were also significantly higher in the Corifollitropin alfa group. The present study demonstrated that the use of Corifollitropin alfa in the long-term protocol could be a highly effective alternative for patients with poor ovarian response, who were unsuccessful in a previous treatment with In Vitro Fertilization - Intracytoplasmic Sperm Injection.
Kakkar, Chandan; Sripathi, Smiti; Parakh, Anushri; Shrivastav, Rajendra
2016-01-01
Introduction Urolithiasis is one of the major, recurring problem in young individuals and CT being the commonest diagnostic modality used. In order to reduce the radiation dose to the patient who are young and as stone formation is a recurring process; one of the simplest way would be, low dose CT along with tube current modulation. Aim Aim of this study was to compare the sensitivity and specificity of low dose (70mAs) with standard dose (250mAs) protocol in detecting urolithiasis and to define the tube current and mean effective patient dose by these protocols. Materials and Methods A prospective study was conducted in 200 patients over a period of 2 years with acute flank pain presentation. CT was performed in 100 cases with standard dose and another 100 with low dose protocol using tube current modulation. Sensitivity and specificity for calculus detection, percentage reduction of dose and tube current with low dose protocol was calculated. Results Urolithiasis was detected in 138 patients, 67 were examined by high dose and 71 were by low dose protocol. Sensitivity and Specificity of low dose protocol was 97.1% and 96.4% with similar results found in high BMI patients. Tube current modulation resulted in reduction of effective tube current by 12.17%. The mean effective patient dose for standard dose was 10.33 mSv whereas 2.92 mSv for low dose with 51.13–53.8% reduction in low dose protocol. Conclusion The study has reinforced that low-dose CT with tube current modulation is appropriate for diagnosis of urolithiasis with significant reduction in tube current and patient effective dose. PMID:27437322
Koteshwar, Prakashini; Kakkar, Chandan; Sripathi, Smiti; Parakh, Anushri; Shrivastav, Rajendra
2016-05-01
Urolithiasis is one of the major, recurring problem in young individuals and CT being the commonest diagnostic modality used. In order to reduce the radiation dose to the patient who are young and as stone formation is a recurring process; one of the simplest way would be, low dose CT along with tube current modulation. Aim of this study was to compare the sensitivity and specificity of low dose (70mAs) with standard dose (250mAs) protocol in detecting urolithiasis and to define the tube current and mean effective patient dose by these protocols. A prospective study was conducted in 200 patients over a period of 2 years with acute flank pain presentation. CT was performed in 100 cases with standard dose and another 100 with low dose protocol using tube current modulation. Sensitivity and specificity for calculus detection, percentage reduction of dose and tube current with low dose protocol was calculated. Urolithiasis was detected in 138 patients, 67 were examined by high dose and 71 were by low dose protocol. Sensitivity and Specificity of low dose protocol was 97.1% and 96.4% with similar results found in high BMI patients. Tube current modulation resulted in reduction of effective tube current by 12.17%. The mean effective patient dose for standard dose was 10.33 mSv whereas 2.92 mSv for low dose with 51.13-53.8% reduction in low dose protocol. The study has reinforced that low-dose CT with tube current modulation is appropriate for diagnosis of urolithiasis with significant reduction in tube current and patient effective dose.
Moir, Gavin L; Mergy, David; Witmer, Ca; Davis, Shala E
2011-06-01
The acute effects of manipulating the volume and load of back squats on subsequent countermovement vertical jump performance were investigated in the present study. Eleven National Collegiate Athletic Association division II female volleyball players performed 10 countermovement vertical jumps (CMJs) on a force platform 2 minutes after the last squat repetition of a high-load (HL) or high-volume (HV) squat protocol. Two minutes of rest was provided between each CMJ. The HL protocol culminated in the subjects having to perform 3 repetitions with a load equivalent to 90% 1 repetition maximum (1RM) back squat, whereas 12 repetitions with a load equivalent to 37% 1RM were performed in the HV protocol. During an initial familiarization session, knee angles were recorded during a series of CMJs, and these angles were used to control the depth of descent during all subsequent back squats. Jump height (JH) and vertical stiffness (VStiff) were calculated during each of the 10 CMJ, and the change in these variables after the 2 squat protocols was assessed using an analysis of variance model with repeated measures on 2 factors (Protocol [2-levels]; Time [2-levels]). There was no significant difference in JH after the HL and HV protocols (p > 0.05). A significant Protocol × Time interaction for VStiff resulted from the increase after the HL protocol being greater than that after the HV protocol (p = 0.03). The knee angles before the HL and HV protocols were significantly greater than those measured during the initial familiarization session (p = 0.001). Although neither squat protocol provided any benefit in improving JH, the heavy squat protocol produced greater increases in VStiff during the CMJ. Because of the increased VStiff caused by the HL protocol, volleyball coaches may consider using such protocols with their players to improve performance in jumps performed from a run such as the spike and on-court agility.
Patel, Akash R; Ganley, Jamie; Zhu, Xiaowei; Rome, Jonathan J; Shah, Maully; Glatz, Andrew C
2014-10-01
Radiation exposure during pediatric catheterization is significant. We sought to describe radiation exposure and the effectiveness of radiation safety protocols in reducing exposure during catheter ablations with electrophysiology studies in children and patients with congenital heart disease. We additionally sought to identify at-risk patients. We retrospectively reviewed all interventional electrophysiology procedures performed from April 2009 to September 2011 (6 months preceding intervention, 12 months following implementation of initial radiation safety protocol, and 8 months following implementation of modified protocol). The protocols consisted of low pulse rate fluoroscopy settings, operator notification of skin entrance dose every 1,000 mGy, adjusting cameras by >5 at every 1,000 mGy, and appropriate collimation. The cohort consisted of 291 patients (70 pre-intervention, 137 after initial protocol implementation, 84 after modified protocol implementation) at a median age of 14.9 years with congenital heart disease present in 11 %. Diagnoses included atrioventricular nodal reentrant tachycardia (25 %), atrioventricular reentrant tachycardia (61 %), atrial tachycardias (12 %), and ventricular tachycardia (2 %). There were no differences between groups based on patient, arrhythmia, and procedural characteristics. Following implementation of the protocols, there were significant reductions in all measures of radiation exposure: fluoroscopy time (17.8 %), dose area product (80.2 %), skin entry dose (81.0 %), and effective dose (76.9 %), p = 0.0001. Independent predictors of increased radiation exposure included larger patient weight, longer fluoroscopy time, and lack of radiation safety protocol. Implementation of a radiation safety protocol for pediatric and congenital catheter ablations can drastically reduce radiation exposure to patients without affecting procedural success.
Evaluation of Protocol Uniformity Concerning Laparoscopic Cholecystectomy in The Netherlands
Goossens, Richard H. M.; van Eijk, Daan J.; Lange, Johan F.
2008-01-01
Background Iatrogenic bile duct injury remains a current complication of laparoscopic cholecystectomy. One uniform and standardized protocol, based on the “critical view of safety” concept of Strasberg, should reduce the incidence of this complication. Furthermore, owing to the rapid development of minimally invasive surgery, technicians are becoming more frequently involved. To improve communication between the operating team and technicians, standardized actions should also be defined. The aim of this study was to compare existing protocols for laparoscopic cholecystectomy from various Dutch hospitals. Methods Fifteen Dutch hospitals were contacted for evaluation of their protocols for laparoscopic cholecystectomy. All evaluated protocols were divided into six steps and were compared accordingly. Results In total, 13 hospitals responded—5 academic hospitals, 5 teaching hospitals, 3 community hospitals—of which 10 protocols were usable for comparison. Concerning the trocar positions, only minor differences were found. The concept of “critical view of safety” was represented in just one protocol. Furthermore, the order of clipping and cutting the cystic artery and duct differed. Descriptions of instruments and apparatus were also inconsistent. Conclusions Present protocols differ too much to define a universal procedure among surgeons in The Netherlands. The authors propose one (inter)national standardized protocol, including standardized actions. This uniform standardized protocol has to be officially released and recommended by national scientific associations (e.g., the Dutch Society of Surgery) or international societies (e.g., European Association for Endoscopic Surgery and Society of American Gastrointestinal and Endoscopic Surgeons). The aim is to improve patient safety and professional communication, which are necessary for new developments. PMID:18224485
Model Checking A Self-Stabilizing Synchronization Protocol for Arbitrary Digraphs
NASA Technical Reports Server (NTRS)
Malekpour, Mahyar R.
2012-01-01
This report presents the mechanical verification of a self-stabilizing distributed clock synchronization protocol for arbitrary digraphs in the absence of faults. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. The system under study is an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. This protocol deterministically converges within a time bound that is a linear function of the self-stabilization period. A bounded model of the protocol is verified using the Symbolic Model Verifier (SMV) for a subset of digraphs. Modeling challenges of the protocol and the system are addressed. The model checking effort is focused on verifying correctness of the bounded model of the protocol as well as confirmation of claims of determinism and linear convergence with respect to the self-stabilization period.
Protocols for treating patients with end-stage renal disease: a survey of nephrology fellowships.
Perry, Maureen Munnelly; Howell, Scott; Patel, Nipa
2017-03-01
Approximately 14% of Americans are living with chronic kidney disease (CKD). The prevalence of end-stage renal disease (ESRD), the result of progressing CKD continues to rise by 21,000 per year. Currently, the only antibiotic prophylaxis guidelines for patients with ESRD undergoing dental treatment were published by the AHA in 2003. Presented in three parts, the first and second parts of this study found no consistent protocols amongst U.S. dental schools and U.S. GPRs and AEGDs, respectively. The goal of the third part of the project was to determine the current protocol being used to treat ESRD patients at U.S. nephrology fellowship programs. An 18 multiple-choice question survey was e-mailed to 130 directors of nephrology fellowships within the U.S. regarding renal treatment protocol details and antibiotic prophylaxis for patients with renal disease. Note that, 34.6% of respondents reported having an established renal treatment protocol. For programs with a protocol, 69% of programs reported following AHA guidelines. There is a lack of consistent, established protocols amongst U.S. nephrology fellowships. It is suggested that updated and evidence based guidelines for the safe treatment of patients be developed. © 2016 Special Care Dentistry Association and Wiley Periodicals, Inc.
Heavy vehicle driver workload assessment. Task 5, workload assessment protocol
DOT National Transportation Integrated Search
This report presents a description of a prescriptive workload assessment protocol for use in evaluating in-cab devices in heavy vehicles. The primary objective of this heavy vehicle driver workload assessment protocol is to identify the components an...
Wind tunnel experiments to study chaparral crown fires
Jeanette Cobian-Iñiguez; AmirHessam Aminfar; Joey Chong; Gloria Burke; Albertina Zuniga; David R. Weise; Marko Princevac
2017-01-01
The present protocol presents a laboratory technique designed to study chaparral crown fire ignition and spread. Experiments were conducted in a low velocity fire wind tunnel where two distinct layers of fuel were constructed to represent surface and crown fuels in chaparral. Chamise, a common chaparral shrub, comprised the live crown layer. The dead fuel surface layer...
Pfammatter, Angela Fidler; Mitsos, Alexa; Wang, Shirlene; Hood, Susan Hammett; Spring, Bonnie
2017-01-01
Recruitment and retention strategy investigations in mHealth clinical trials are rare. Technology presents an opportunity to intensely and remotely evaluate recruitment, use of mobile apps, and retention, leading to new insights for continuous improvement of mHealth trials. The objective of this paper is to present a case study in which a trial evaluated and changed strategies during a clinical trial to improve recruitment, adherence to study protocols, and retention in the mHealth trial. In Fall 2015, the NUYou trial enrolled 150 college freshmen in an mHealth protocol. Three months after study initiation, NUYou struggled to meet recruitment goals and maintain anticipated usage levels of the study smartphone application. Two sets of data were collected to improve recruitment and retention: a survey about recruitment was sent to the target population and surveys regarding usability of the app was sent to the study sample. Survey results informed improvements in recruitment strategies, the study retention protocol, and the smartphone application. Survey results revealed several insights including misunderstanding components of the trial by potential participants, low perceived usefulness of the app, and little recall or impact of the incentive structure. After implementation of user-centered improvements, the second cohort of NUYou recruitment in the fall of 2016 produced an equal sample size in 4 weeks less time. Winter quarter of 2016 compared to 2017 demonstrated an improvement in retention via app use and completion of weekly in-app surveys. Recruitment and retention in clinical trials continues to be a critical challenge and mHealth trials may present both unique challenges and opportunities. To our knowledge, this is the first study to describe a systematic evaluation followed by changes and further evaluation to recruitment, use of the mHealth application, adherence to study protocol, and retention during an mHealth clinical trial. Future work should adopt and explicitly study these processes to optimize both enrollment and retention in these types of trials to preserve validity and reliability of research results.
CT protocol management: simplifying the process by using a master protocol concept
Bour, Robert K.; Rubert, Nicholas; Wendt, Gary; Pozniak, Myron; Ranallo, Frank N.
2015-01-01
This article explains a method for creating CT protocols for a wide range of patient body sizes and clinical indications, using detailed tube current information from a small set of commonly used protocols. Analytical expressions were created relating CT technical acquisition parameters which can be used to create new CT protocols on a given scanner or customize protocols from one scanner to another. Plots of mA as a function of patient size for specific anatomical regions were generated and used to identify the tube output needs for patients as a function of size for a single master protocol. Tube output data were obtained from the DICOM header of clinical images from our PACS and patient size was measured from CT localizer radiographs under IRB approval. This master protocol was then used to create 11 additional master protocols. The 12 master protocols were further combined to create 39 single and multiphase clinical protocols. Radiologist acceptance rate of exams scanned using the clinical protocols was monitored for 12,857 patients to analyze the effectiveness of the presented protocol management methods using a two‐tailed Fisher's exact test. A single routine adult abdominal protocol was used as the master protocol to create 11 additional master abdominal protocols of varying dose and beam energy. Situations in which the maximum tube current would have been exceeded are presented, and the trade‐offs between increasing the effective tube output via 1) decreasing pitch, 2) increasing the scan time, or 3) increasing the kV are discussed. Out of 12 master protocols customized across three different scanners, only one had a statistically significant acceptance rate that differed from the scanner it was customized from. The difference, however, was only 1% and was judged to be negligible. All other master protocols differed in acceptance rate insignificantly between scanners. The methodology described in this paper allows a small set of master protocols to be adapted among different clinical indications on a single scanner and among different CT scanners. PACS number: 87.57.Q PMID:26219005
NASA Technical Reports Server (NTRS)
Evans, G. F.; Haller, R. G.; Wyrick, P. S.; Parkey, R. W.; Fleckenstein, J. L.; Blomqvist, C. G. (Principal Investigator)
1998-01-01
PURPOSE: To assess correlations between muscle edema on magnetic resonance (MR) images and clinical indexes of muscle injury in delayed-onset muscle soreness (DOMS) produced by submaximal exercise protocols. MATERIALS AND METHODS: Sixteen subjects performed 36 elbow flexions ("biceps curls") at one of two submaximal workloads that emphasized eccentric contractions. Changes in MR imaging findings, plasma levels of creatine kinase, and pain scores were correlated. RESULTS: Both exercise protocols produced DOMS in all subjects. The best correlation was between change in creatine kinase level and volume of muscle edema on MR images, regardless of the workload. Correlations tended to be better with the easier exercise protocol. CONCLUSION: Whereas many previous studies of DOMS focused on intense exercise protocols to ensure positive results, the present investigation showed that submaximal workloads are adequate to produce DOMS and that correlations between conventionally measured indexes of injury may be enhanced at lighter exercise intensities.
Investigation of Interference Models for RFID Systems.
Zhang, Linchao; Ferrero, Renato; Gandino, Filippo; Rebaudengo, Maurizio
2016-02-04
The reader-to-reader collision in an RFID system is a challenging problem for communications technology. In order to model the interference between RFID readers, different interference models have been proposed, mainly based on two approaches: single and additive interference. The former only considers the interference from one reader within a certain range, whereas the latter takes into account the sum of all of the simultaneous interferences in order to emulate a more realistic behavior. Although the difference between the two approaches has been theoretically analyzed in previous research, their effects on the estimated performance of the reader-to-reader anti-collision protocols have not yet been investigated. In this paper, the influence of the interference model on the anti-collision protocols is studied by simulating a representative state-of-the-art protocol. The results presented in this paper highlight that the use of additive models, although more computationally intensive, is mandatory to improve the performance of anti-collision protocols.
Model Checking a Self-Stabilizing Distributed Clock Synchronization Protocol for Arbitrary Digraphs
NASA Technical Reports Server (NTRS)
Malekpour, Mahyar R.
2011-01-01
This report presents the mechanical verification of a self-stabilizing distributed clock synchronization protocol for arbitrary digraphs in the absence of faults. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. The system under study is an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. This protocol deterministically converges within a time bound that is a linear function of the self-stabilization period.
XPS Protocol for the Characterization of Pristine and Functionalized Single Wall Carbon Nanotubes
NASA Technical Reports Server (NTRS)
Sosa, E. D.; Allada, R.; Huffman, C. B.; Arepalli, S.
2009-01-01
Recent interest in developing new applications for carbon nanotubes (CNT) has fueled the need to use accurate macroscopic and nanoscopic techniques to characterize and understand their chemistry. X-ray photoelectron spectroscopy (XPS) has proved to be a useful analytical tool for nanoscale surface characterization of materials including carbon nanotubes. Recent nanotechnology research at NASA Johnson Space Center (NASA-JSC) helped to establish a characterization protocol for quality assessment for single wall carbon nanotubes (SWCNTs). Here, a review of some of the major factors of the XPS technique that can influence the quality of analytical data, suggestions for methods to maximize the quality of data obtained by XPS, and the development of a protocol for XPS characterization as a complementary technique for analyzing the purity and surface characteristics of SWCNTs is presented. The XPS protocol is then applied to a number of experiments including impurity analysis and the study of chemical modifications for SWCNTs.
Thiolation mediated pegylation platform to generate functional universal red blood cells.
Nacharaju, Parimala; Manjula, Belur N; Acharya, Seetharama A
2007-01-01
The PEGylation that adds an extension arm on protein amino groups with the conservation of their positive charge masks the A and D antigens of erythrocytes efficiently. In the present study, the efficiency of masking the antigens of RBC by PEGylation protocols that do not conserve the charge with and without adding extension arms is compared. The conjugation of PEG-5000 to RBCs through the addition of extension arms masked the D antigen more efficiently than the other protocol. A combination of PEG-5 K and PEG-20 K is needed to mask the A antigen, irrespective of the PEGylation approach. The oxygen affinity of the PEGylated RBCs increased by the extension arm facilitated PEGylation. The protocol involving the conjugation of PEG-chains without adding extension arm did not alter the oxygen affinity of RBCs. A combination of PEGylation protocols is an alternate strategy to generate universal red blood cells with good levels of oxygen affinity.
Nishi, Kanae; Kewley-Port, Diane
2008-01-01
Purpose Nishi and Kewley-Port (2007) trained Japanese listeners to perceive nine American English monophthongs and showed that a protocol using all nine vowels (fullset) produced better results than the one using only the three more difficult vowels (subset). The present study extended the target population to Koreans and examined whether protocols combining the two stimulus sets would provide more effective training. Method Three groups of five Korean listeners were trained on American English vowels for nine days using one of the three protocols: fullset only, first three days on subset then six days on fullset, or first six days on fullset then three days on subset. Participants' performance was assessed by pre- and post-training tests, as well as by a mid-training test. Results 1) Fullset training was also effective for Koreans; 2) no advantage was found for the two combined protocols over the fullset only protocol, and 3) sustained “non-improvement” was observed for training using one of the combined protocols. Conclusions In using subsets for training American English vowels, care should be taken not only in the selection of subset vowels, but also for the training orders of subsets. PMID:18664694
García-Magariño, Iván; Lacuesta, Raquel; Lloret, Jaime
2018-03-27
Smart communication protocols are becoming a key mechanism for improving communication performance in networks such as wireless sensor networks. However, the literature lacks mechanisms for simulating smart communication protocols in precision agriculture for decreasing production costs. In this context, the current work presents an agent-based simulator of smart communication protocols for efficiently managing pesticides. The simulator considers the needs of electric power, crop health, percentage of alive bugs and pesticide consumption. The current approach is illustrated with three different communication protocols respectively called (a) broadcast, (b) neighbor and (c) low-cost neighbor. The low-cost neighbor protocol obtained a statistically-significant reduction in the need of electric power over the neighbor protocol, with a very large difference according to the common interpretations about the Cohen's d effect size. The presented simulator is called ABS-SmartComAgri and is freely distributed as open-source from a public research data repository. It ensures the reproducibility of experiments and allows other researchers to extend the current approach.
2018-01-01
Smart communication protocols are becoming a key mechanism for improving communication performance in networks such as wireless sensor networks. However, the literature lacks mechanisms for simulating smart communication protocols in precision agriculture for decreasing production costs. In this context, the current work presents an agent-based simulator of smart communication protocols for efficiently managing pesticides. The simulator considers the needs of electric power, crop health, percentage of alive bugs and pesticide consumption. The current approach is illustrated with three different communication protocols respectively called (a) broadcast, (b) neighbor and (c) low-cost neighbor. The low-cost neighbor protocol obtained a statistically-significant reduction in the need of electric power over the neighbor protocol, with a very large difference according to the common interpretations about the Cohen’s d effect size. The presented simulator is called ABS-SmartComAgri and is freely distributed as open-source from a public research data repository. It ensures the reproducibility of experiments and allows other researchers to extend the current approach. PMID:29584703
Dynamics of Nafion membrane swelling in H2O/D2O mixtures as studied using FTIR technique
NASA Astrophysics Data System (ADS)
Bunkin, Nikolai F.; Kozlov, Valeriy A.; Shkirin, Alexey V.; Ninham, Barry W.; Balashov, Anatoliy A.; Gudkov, Sergey V.
2018-03-01
Experiments with Fourier transform spectrometry of Nafion, a water-swollen polymeric membrane, are described. The transmittance spectra of liquid samples and Nafion, soaked in these samples, were studied, depending on the deuterium content in water in the spectral range 1.8-2.15 μm. The experiments were carried out using two protocols: in the first protocol we studied the dynamics of Nafion swelling in H2O + D2O mixtures for the deuterium concentrations 3 < C < 104 ppm, and in the second protocol we studied the dynamics of swelling in pure heavy water (C = 106 ppm). For liquid mixtures in the concentration range 3 < C < 104 ppm, the transmittance spectra are the same, but for Nafion soaked in these fluids, the corresponding spectra are different. It is shown that, in the range of deuterium contents C = 90-500 ppm, the behavior of transmittance of the polymer membrane is non-monotonic. In experiments using the second protocol, the dynamics of diffusion replacement of residual water, which is always present in the bulk of the polymer membrane inside closed cavities (i.e., without access to atmospheric air), were studied. The experimentally estimated diffusion coefficient for this process is ≈6.10-11 cm2/s.
Implementation of a Rapid, Protocol-based TIA Management Pathway.
Jarhult, Susann J; Howell, Melissa L; Barnaure-Nachbar, Isabelle; Chang, Yuchiao; White, Benjamin A; Amatangelo, Mary; Brown, David F; Singhal, Aneesh B; Schwamm, Lee H; Silverman, Scott B; Goldstein, Joshua N
2018-03-01
Our goal was to assess whether use of a standardized clinical protocol improves efficiency for patients who present to the emergency department (ED) with symptoms of transient ischemic attack (TIA). We performed a structured, retrospective, cohort study at a large, urban, tertiary care academic center. In July 2012 this hospital implemented a standardized protocol for patients with suspected TIA. The protocol selected high-risk patients for admission and low/intermediate-risk patients to an ED observation unit for workup. Recommended workup included brain imaging, vascular imaging, cardiac monitoring, and observation. Patients were included if clinical providers determined the need for workup for TIA. We included consecutive patients presenting during a six-month period prior to protocol implementation, and those presenting between 6-12 months after implementation. Outcomes included ED length of stay (LOS), hospital LOS, use of neuroimaging, and 90-day risk of stroke or TIA. From 01/2012 to 06/2012, 130 patients were evaluated for TIA symptoms in the ED, and from 01/2013 to 06/2013, 150 patients. The final diagnosis was TIA or stroke in 45% before vs. 41% after (p=0.18). Following the intervention, the inpatient admission rate decreased from 62% to 24% (p<0.001), median ED LOS decreased by 1.2 hours (5.7 to 4.9 hours, p=0.027), and median total hospital LOS from 29.4 hours to 23.1 hours (p=0.019). The proportion of patients receiving head computed tomography (CT) went from 68% to 58% (p=0.087); brain magnetic resonance (MR) imaging from 83% to 88%, (p=0.44) neck CT angiography from 32% to 22% (p=0.039); and neck MR angiography from 61% to 72% (p=0.046). Ninety-day stroke or recurrent TIA among those with final diagnosis of TIA was 3% for both periods. Implementation of a TIA protocol significantly reduced ED LOS and total hospital LOS.
NASA Astrophysics Data System (ADS)
Abdillah, T.; Dai, R.; Setiawan, E.
2018-02-01
This study aims to develop the application of Web Services technology with RestFul Protocol to optimize the information presentation on mining potential. This study used User Interface Design approach for the information accuracy and relevance as well as the Web Service for the reliability in presenting the information. The results show that: the information accuracy and relevance regarding mining potential can be seen from the achievement of User Interface implementation in the application that is based on the following rules: The consideration of the appropriate colours and objects, the easiness of using the navigation, and users’ interaction with the applications that employs symbols and languages understood by the users; the information accuracy and relevance related to mining potential can be observed by the information presented by using charts and Tool Tip Text to help the users understand the provided chart/figure; the reliability of the information presentation is evident by the results of Web Services testing in Figure 4.5.6. This study finds out that User Interface Design and Web Services approaches (for the access of different Platform apps) are able to optimize the presentation. The results of this study can be used as a reference for software developers and Provincial Government of Gorontalo.
A clinical protocol to increase chewing and assess mastication in children with feeding disorders.
Volkert, Valerie M; Peterson, Kathryn M; Zeleny, Jason R; Piazza, Cathleen C
2014-09-01
Children with feeding disorders often cannot or do not chew when presented with table food. Children with chewing deficits also often swallow the bite before masticating it appropriately, which we will refer to as early swallowing. In the current study, we evaluated a clinical protocol to increase chews per bite, assess mastication, and eliminate early swallowing with three children with feeding disorders. The current study adds to a small body of literature on chewing and mastication of children with feeding disorders. Suggestions for future research are also discussed. © The Author(s) 2014.
López-Jornet, Pia; Camacho-Alonso, Fabio
2010-10-01
The main objective of the present study was to assess the efficacy of a motivation–behavioral skills protocol for plaque control in patients with gingival lichen planus. A pre- and post-test descriptive clinical study was made of 40 consecutive white patients with gingival lichen planus: five males (12.5%) and 35 females (87.5%); mean age: 57 years. A motivation–behavioral skills protocol for oral hygiene was applied, with the determination of gingival scores (gingival index, plaque extension, and Community Periodontal Index of Treatment Needs [CPITN]) and patient evaluation after 4 and 8 weeks. The clinical parameters in relation to the different forms of gingival lichen planus showed statistically significant improvements for gingival index, plaque extension, and CPITN (P <0.001) as determined 4 and 8 weeks after starting the program. The application of an active prevention program in patients with gingival lichen planus is important because it offers benefits for periodontal health. However, more long-term studies are needed to confirm the results obtained.
Fasting: a major limitation for resistance exercise training effects in rodents
das Neves, W.; de Oliveira, L.F.; da Silva, R.P.; Alves, C.R.R.; Lancha, A.H.
2017-01-01
Protocols that mimic resistance exercise training (RET) in rodents present several limitations, one of them being the electrical stimulus, which is beyond the physiological context observed in humans. Recently, our group developed a conditioning system device that does not use electric shock to stimulate rats, but includes fasting periods before each RET session. The current study was designed to test whether cumulative fasting periods have some influence on skeletal muscle mass and function. Three sets of male Wistar rats were used in the current study. The first set of rats was submitted to a RET protocol without food restriction. However, rats were not able to perform exercise properly. The second and third sets were then randomly assigned into three experimental groups: 1) untrained control rats, 2) untrained rats submitted to fasting periods, and 3) rats submitted to RET including fasting periods before each RET session. While the second set of rats performed a short RET protocol (i.e., an adaptation protocol for 3 weeks), the third set of rats performed a longer RET protocol including overload (i.e., 8 weeks). After the short-term protocol, cumulative fasting periods promoted loss of weight (P<0.001). After the longer RET protocol, no difference was observed for body mass, extensor digitorum longus (EDL) morphology or skeletal muscle function (P>0.05 for all). Despite no effects on EDL mass, soleus muscle displayed significant atrophy in the fasting experimental groups (P<0.01). Altogether, these data indicate that fasting is a major limitation for RET in rats. PMID:29185588
Fasting: a major limitation for resistance exercise training effects in rodents.
das Neves, W; de Oliveira, L F; da Silva, R P; Alves, C R R; Lancha, A H
2017-11-17
Protocols that mimic resistance exercise training (RET) in rodents present several limitations, one of them being the electrical stimulus, which is beyond the physiological context observed in humans. Recently, our group developed a conditioning system device that does not use electric shock to stimulate rats, but includes fasting periods before each RET session. The current study was designed to test whether cumulative fasting periods have some influence on skeletal muscle mass and function. Three sets of male Wistar rats were used in the current study. The first set of rats was submitted to a RET protocol without food restriction. However, rats were not able to perform exercise properly. The second and third sets were then randomly assigned into three experimental groups: 1) untrained control rats, 2) untrained rats submitted to fasting periods, and 3) rats submitted to RET including fasting periods before each RET session. While the second set of rats performed a short RET protocol (i.e., an adaptation protocol for 3 weeks), the third set of rats performed a longer RET protocol including overload (i.e., 8 weeks). After the short-term protocol, cumulative fasting periods promoted loss of weight (P<0.001). After the longer RET protocol, no difference was observed for body mass, extensor digitorum longus (EDL) morphology or skeletal muscle function (P>0.05 for all). Despite no effects on EDL mass, soleus muscle displayed significant atrophy in the fasting experimental groups (P<0.01). Altogether, these data indicate that fasting is a major limitation for RET in rats.
Quantum key distribution protocol based on contextuality monogamy
NASA Astrophysics Data System (ADS)
Singh, Jaskaran; Bharti, Kishor; Arvind
2017-06-01
The security of quantum key distribution (QKD) protocols hinges upon features of physical systems that are uniquely quantum in nature. We explore the role of quantumness, as qualified by quantum contextuality, in a QKD scheme. A QKD protocol based on the Klyachko-Can-Binicioğlu-Shumovsky (KCBS) contextuality scenario using a three-level quantum system is presented. We explicitly show the unconditional security of the protocol by a generalized contextuality monogamy relationship based on the no-disturbance principle. This protocol provides a new framework for QKD which has conceptual and practical advantages over other protocols.
NASA Astrophysics Data System (ADS)
Wiley, E. O.
2010-07-01
Relative motion studies of visual double stars can be investigated using least squares regression techniques and readily accessible programs such as Microsoft Excel and a calculator. Optical pairs differ from physical pairs under most geometries in both their simple scatter plots and their regression models. A step-by-step protocol for estimating the rectilinear elements of an optical pair is presented. The characteristics of physical pairs using these techniques are discussed.
Testing warning messages on smokers' cigarette packages: a standardised protocol.
Brewer, Noel T; Hall, Marissa G; Lee, Joseph G L; Peebles, Kathryn; Noar, Seth M; Ribisl, Kurt M
2016-03-01
Lab experiments on cigarette warnings typically use a brief one-time exposure that is not paired with the cigarette packs smokers use every day, leaving open the question of how repeated warning exposure over several weeks may affect smokers. This proof of principle study sought to develop a new protocol for testing cigarette warnings that better reflects real-world exposure by presenting them on cigarette smokers' own packs. We tested a cigarette pack labelling protocol with 76 US smokers ages 18 and older. We applied graphic warnings to the front and back of smokers' cigarette packs. Most smokers reported that at least 75% of the packs of cigarettes they smoked during the study had our warnings. Nearly all said they would participate in the study again. Using cigarette packs with the study warnings increased quit intentions (p<0.05). Our findings suggest a feasible pack labelling protocol with six steps: (1) schedule appointments at brief intervals; (2) determine typical cigarette consumption; (3) ask smokers to bring a supply of cigarette packs to study appointments; (4) apply labels to smokers' cigarette packs; (5) provide participation incentives at the end of appointments; and (6) refer smokers to cessation services at end of the study. When used in randomised controlled trials in settings with real-world message exposure over time, this protocol may help identify the true impact of warnings and thus better inform tobacco product labelling policy. NCT02247908. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/
Sbriccoli, A; Carretta, D; Santarelli, M; Granato, A; Minciacchi, D
1999-01-01
We describe the protocol set-up to investigate an experimental model of foetal alcohol syndrome in the rat. The protocol has been devised to expose specific cell populations of the central nervous system to ethanol during their neurogenesis and has been applied to the study of diencephalo-telencephalic connections. We were able to demonstrate specific permanent changes of the adult thalamo-cortical circuitry. Our protocol can be applied to study other aspects of central nervous system-ethanol interactions, such as neurotransmitter and receptor patterns. It can also represent a useful tool to test the effects of different diets to prevent nutritional deficiencies and the efficacy of drug treatments to prevent foetal alcohol syndrome. We have shown in fact that ethanol-induced thalamo-cortical alterations are partially prevented by concurrent administration of acetyl-L-carnitine. Finally, the present protocol can be used to investigate the effects of ethanol exposure on the development of different brain structures. To this purpose, the gestational period for ethanol exposure must be chosen according to the peak of neurogenesis for the investigated structure.
Lau, Bobo Hi-Po; Chow, Amy Y M; Wong, Daniel F K; Chan, Jessie S M; Chan, Celia H Y; Ho, Rainbow T H; So, Tsz-Him; Lam, Tai-Chung; Lee, Victor Ho-Fun; Lee, Anne W M; Chow, Sau Fong; Chan, Cecilia L W
2018-01-01
Compared to cancers at other sites, lung cancer often results in greater psychosocial distress to both the patients and their caregivers, due to the poor prognosis and survival rate, as well as the heavy symptom burden. In recent years, making protocols of proposed or on-going studies publicly available via clinical trial registries and/or peer-reviewed journals has benefited health sciences with timely communication of the latest research trends and improved transparency in reporting. However, such practice is yet to be a common sight in evidence-informed social work. Hence, this paper discusses the value of publishing protocols in social work research and presents the protocol of a randomized controlled trial that compares the effectiveness of integrative body-mind-spirit intervention with cognitive behavioral therapy for enhancing quality of life of patients with lung cancer and their family caregivers. The data collection process was still on-going at the time of manuscript submission.
Psifidi, Androniki; Dovas, Chrysostomos; Banos, Georgios
2011-01-19
Single nucleotide polymorphisms (SNP) have proven to be powerful genetic markers for genetic applications in medicine, life science and agriculture. A variety of methods exist for SNP detection but few can quantify SNP frequencies when the mutated DNA molecules correspond to a small fraction of the wild-type DNA. Furthermore, there is no generally accepted gold standard for SNP quantification, and, in general, currently applied methods give inconsistent results in selected cohorts. In the present study we sought to develop a novel method for accurate detection and quantification of SNP in DNA pooled samples. The development and evaluation of a novel Ligase Chain Reaction (LCR) protocol that uses a DNA-specific fluorescent dye to allow quantitative real-time analysis is described. Different reaction components and thermocycling parameters affecting the efficiency and specificity of LCR were examined. Several protocols, including gap-LCR modifications, were evaluated using plasmid standard and genomic DNA pools. A protocol of choice was identified and applied for the quantification of a polymorphism at codon 136 of the ovine PRNP gene that is associated with susceptibility to a transmissible spongiform encephalopathy in sheep. The real-time LCR protocol developed in the present study showed high sensitivity, accuracy, reproducibility and a wide dynamic range of SNP quantification in different DNA pools. The limits of detection and quantification of SNP frequencies were 0.085% and 0.35%, respectively. The proposed real-time LCR protocol is applicable when sensitive detection and accurate quantification of low copy number mutations in DNA pools is needed. Examples include oncogenes and tumour suppressor genes, infectious diseases, pathogenic bacteria, fungal species, viral mutants, drug resistance resulting from point mutations, and genetically modified organisms in food.
Psifidi, Androniki; Dovas, Chrysostomos; Banos, Georgios
2011-01-01
Background Single nucleotide polymorphisms (SNP) have proven to be powerful genetic markers for genetic applications in medicine, life science and agriculture. A variety of methods exist for SNP detection but few can quantify SNP frequencies when the mutated DNA molecules correspond to a small fraction of the wild-type DNA. Furthermore, there is no generally accepted gold standard for SNP quantification, and, in general, currently applied methods give inconsistent results in selected cohorts. In the present study we sought to develop a novel method for accurate detection and quantification of SNP in DNA pooled samples. Methods The development and evaluation of a novel Ligase Chain Reaction (LCR) protocol that uses a DNA-specific fluorescent dye to allow quantitative real-time analysis is described. Different reaction components and thermocycling parameters affecting the efficiency and specificity of LCR were examined. Several protocols, including gap-LCR modifications, were evaluated using plasmid standard and genomic DNA pools. A protocol of choice was identified and applied for the quantification of a polymorphism at codon 136 of the ovine PRNP gene that is associated with susceptibility to a transmissible spongiform encephalopathy in sheep. Conclusions The real-time LCR protocol developed in the present study showed high sensitivity, accuracy, reproducibility and a wide dynamic range of SNP quantification in different DNA pools. The limits of detection and quantification of SNP frequencies were 0.085% and 0.35%, respectively. Significance The proposed real-time LCR protocol is applicable when sensitive detection and accurate quantification of low copy number mutations in DNA pools is needed. Examples include oncogenes and tumour suppressor genes, infectious diseases, pathogenic bacteria, fungal species, viral mutants, drug resistance resulting from point mutations, and genetically modified organisms in food. PMID:21283808
OSI Upper Layers Support for Applications.
ERIC Educational Resources Information Center
Davison, Wayne
1990-01-01
Discusses how various Open Systems Interconnection (OSI) application layer protocols can be used together, along with the Presentation and Session protocols, to support the interconnection requirements of applications. Application layer protocol standards that are currently available or under development are reviewed, and the File, Transfer,…
Modification of Fox protocol for prediction of maximum oxygen uptake in male university students.
Bandyopadhyay, Amit; Pal, Sangita
2015-01-01
Direct estimation of VO₂max involves labourious, exhaustive, hazardous, time consuming and expensive experimental protocols. Hence, application of various indirect protocols for prediction of VO₂max has become popular, subject to proper population-specific standardisation of the indirect protocol. Application of Fox (1973) protocol in male sedentary university students of Kolkata, India led to premature fatigue in their leg muscles that hindered the muscular activity leading to inability in completing the exercise. The present study was aimed at modifying and validating the Fox (1973) protocol with a convenient workload of 110 W (i.e., modified Fox test or MFT) in the said population. Ninety (90) sedentary male students were recruited by simple random sampling from the University of Calcutta, India and they were randomly assigned into study group (n=60) and confirmatory group (n=30). VO₂max was directly estimated by Scholander micro-gas analysis after incremental bicycle exercise. Predicted VO₂max (PVO₂max) was computed from MFT by using the submaximal heart rate (HR(sub). In the Study Group VO₂max (2216.63 ± 316.77 mL.min⁻¹ was significantly different (P< 0.001) from PVO₂max (3131.73 ± 234.32 mL.min⁻¹ measured by using the equation of Fox (1973). Simple and multiple regression equations have been computed for prediction of VO₂max from HR(sub) and physical parameters. Application of these norms in the confirmatory group depicted insignificant difference between VO₂max and PVO₂max with substantially small limits of agreement and lower values of SEE. The modified regression norms are therefore recommended for use in MFT for accurate assessment of VO₂max in the studied population.
Protocol Processing for 100 Gbit/s and Beyond - A Soft Real-Time Approach in Hardware and Software
NASA Astrophysics Data System (ADS)
Büchner, Steffen; Lopacinski, Lukasz; Kraemer, Rolf; Nolte, Jörg
2017-09-01
100 Gbit/s wireless communication protocol processing stresses all parts of a communication system until the outermost. The efficient use of upcoming 100 Gbit/s and beyond transmission technology requires the rethinking of the way protocols are processed by the communication endpoints. This paper summarizes the achievements of the project End2End100. We will present a comprehensive soft real-time stream processing approach that allows the protocol designer to develop, analyze, and plan scalable protocols for ultra high data rates of 100 Gbit/s and beyond. Furthermore, we will present an ultra-low power, adaptable, and massively parallelized FEC (Forward Error Correction) scheme that detects and corrects bit errors at line rate with an energy consumption between 1 pJ/bit and 13 pJ/bit. The evaluation results discussed in this publication show that our comprehensive approach allows end-to-end communication with a very low protocol processing overhead.
Zebrafish embryology and cartilage staining protocols for high school students.
Emran, Farida; Brooks, Jacqueline M; Zimmerman, Steven R; Johnson, Susan L; Lue, Robert A
2009-06-01
The Life Sciences-Howard Hughes Medical Institute Outreach Program at Harvard University supports high school science education by offering an on-campus program for students and their teachers to participate in investigative, hands-on laboratory sessions. The outreach program has recently designed and launched a successful zebrafish embryology protocol that we present here. The main objectives of this protocol are to introduce students to zebrafish as a model research organism and to provide students with direct experience with current techniques used in embryological research. The content of the lab is designed to generate discussions on embryology, genetics, fertilization, natural selection, and animal adaptation. The protocol produces reliable results in a time-efficient manner using a minimum of reagents. The protocol presented here consists of three sections: observations of live zebrafish larvae at different developmental stages, cartilage staining of zebrafish larvae, and a mutant hunt involving identification of two zebrafish mutants (nacre and chokh). Here, we describe the protocol, show the results obtained for each section, and suggest possible alternatives for different lab settings.
Thamsborg, Lise Holst; Andersen, Berit; Larsen, Lise Grupe; Christensen, Jette; Johansen, Tonje; Hariri, Jalil; Christiansen, Sanne; Rygaard, Carsten; Lynge, Elsebeth
2018-05-26
The first birth cohorts of women offered human papillomavirus (HPV) vaccination as girls are now entering cervical screening. However, there is no international consensus on how to screen HPV vaccinated women. These women are better protected against cervical cancer and could therefore be offered less intensive screening. Primary HPV testing is more sensitive than cytology, allowing for a longer screening interval. The aim of Trial23 is to investigate if primary HPV testing with cytology triage of HPV positive samples is a reasonable screening scheme for women offered HPV vaccination as girls. Trial23 is a method study embedded in the existing cervical screening programme in four out of five Danish regions. Without affecting the screening programme, women born in 1994 are randomised to present screening with liquid-based cytology every third year (present programme arm) or present screening plus an HPV test (HPV arm). The study started 1 February 2017 and will run over three screening rounds corresponding to 7-8 years. The primary endpoint is cervical intraepithelial neoplasia grade 3 or above. The trial is undertaken as a non-inferiority study including intention-to-treat and per-protocol analyses. The potential effect of primary HPV screening with a 6-year interval will be calculated from the observed data. The study protocol has been submitted to the ethical committee and deemed a method study. All women are screened according to routine guidelines. The study will contribute new evidence on the future screening of HPV vaccinated birth cohorts of women. All results will be published in open-access journal. NCT03049553; Pre-results. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.
Development, implementation, and experimentation of parametric routing protocol for sensor networks
NASA Astrophysics Data System (ADS)
Nassr, Matthew S.; Jun, Jangeun; Eidenbenz, Stephan J.; Frigo, Janette R.; Hansson, Anders A.; Mielke, Angela M.; Smith, Mark C.
2006-09-01
The development of a scalable and reliable routing protocol for sensor networks is traced from a theoretical beginning to positive simulation results to the end of verification experiments in large and heavily loaded networks. Design decisions and explanations as well as implementation hurdles are presented to give a complete picture of protocol development. Additional software and hardware is required to accurately test the performance of our protocol in field experiments. In addition, the developed protocol is tested in TinyOS on Mica2 motes against well-established routing protocols frequently used in sensor networks. Our protocol proves to outperform the standard (MINTRoute) and the trivial (Gossip) in a variety of different scenarios.
Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols
Nam, Junghyun; Kim, Moonseong
2014-01-01
We revisit the SM2 protocol, which is widely used in Chinese commercial applications and by Chinese government agencies. Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order to assure protocol implementers of their security properties, the SM2 protocol does not have a proof of security. In this paper, we prove the security of the SM2 protocol in the widely accepted indistinguishability-based Bellare-Rogaway model under the elliptic curve discrete logarithm problem (ECDLP) assumption. We also present a simplified and more efficient version of the SM2 protocol with an accompanying security proof. PMID:25276863
Guimarães, Ariane; de Lima Rodrigues, Aline Sueli; Malafaia, Guilherme
2017-10-30
The exploitation and degradation of natural environments exert intense pressure on important ecosystems worldwide. Thus, it is necessary developing or adapting assessment methods to monitor environmental changes and to generate results to be applied to environmental management programs. The Brazilian Veredas (phytophysiognomies typical to the Cerrado biome) are threatened by several human activities; thus, the aim of the present study is to adapt a rapid assessment protocol (RAP) to be applied to Veredas springs, by using the upper course of the Vai-e-Vem stream watershed (Ipameri County, Goiás State, Brazil). Therefore, several springs in the study site were visited and 11 of them were considered Veredas springs. After the RAP was adapted, the instrument was validated and used to environmentally assess the springs in order to demonstrate its applicability. The present study has provided an instrument of option to monitor Veredas springs.
Mechanical verification of a schematic Byzantine clock synchronization algorithm
NASA Technical Reports Server (NTRS)
Shankar, Natarajan
1991-01-01
Schneider generalizes a number of protocols for Byzantine fault tolerant clock synchronization and presents a uniform proof for their correctness. The authors present a machine checked proof of this schematic protocol that revises some of the details in Schneider's original analysis. The verification was carried out with the EHDM system developed at the SRI Computer Science Laboratory. The mechanically checked proofs include the verification that the egocentric mean function used in Lamport and Melliar-Smith's Interactive Convergence Algorithm satisfies the requirements of Schneider's protocol.
Mobile Virtual Private Networking
NASA Astrophysics Data System (ADS)
Pulkkis, Göran; Grahn, Kaj; Mårtens, Mathias; Mattsson, Jonny
Mobile Virtual Private Networking (VPN) solutions based on the Internet Security Protocol (IPSec), Transport Layer Security/Secure Socket Layer (SSL/TLS), Secure Shell (SSH), 3G/GPRS cellular networks, Mobile IP, and the presently experimental Host Identity Protocol (HIP) are described, compared and evaluated. Mobile VPN solutions based on HIP are recommended for future networking because of superior processing efficiency and network capacity demand features. Mobile VPN implementation issues associated with the IP protocol versions IPv4 and IPv6 are also evaluated. Mobile VPN implementation experiences are presented and discussed.
Hydrogen Hazards Assessment Protocol (HHAP): Approach and Methodology
NASA Technical Reports Server (NTRS)
Woods, Stephen
2009-01-01
This viewgraph presentation reviews the approach and methodology to develop a assessment protocol for hydrogen hazards. Included in the presentation are the reasons to perform hazards assessment, the types of hazard assessments that exist, an analysis of hydrogen hazards, specific information about the Hydrogen Hazards Assessment Protocol (HHAP). The assessment is specifically tailored for hydrogen behavior. The end product of the assesment is a compilation of hazard, mitigations and associated factors to facilitate decision making and achieve the best practice.
Real time UNIX in embedded control-a case study within the context of LynxOS
NASA Astrophysics Data System (ADS)
Kleines, H.; Zwoll, K.
1996-02-01
Intelligent communication controllers for a layered protocol profile are a typical example of an embedded control application, where the classical approach for the software development is based on a proprietary real-time operating system kernel under which the individual layers are implemented as tasks. Based on the exemplary implementation of a derivative of MAP 3.0, an unusual and innovative approach is presented, where the protocol software is implemented under the UNIX-compatible real-time operating system LynxOS. The overall design of the embedded control application is presented under a more general view and economical implications as well as aspects of the development environment and performance are discussed
Code of Federal Regulations, 2010 CFR
2010-04-01
... FOR NONCLINICAL LABORATORY STUDIES Protocol for and Conduct of a Nonclinical Laboratory Study § 58.120 Protocol. (a) Each study shall have an approved written protocol that clearly indicates the objectives and all methods for the conduct of the study. The protocol shall contain, as applicable, the following...
Ryan, Gareth; Dooley, Joe; Windrim, Rory; Bollinger, Megan; Gerber Finn, Lianne; Kelly, Len
2017-06-01
To describe/analyse a novel, community-based prenatal monitoring protocol for opioid-exposed pregnancies developed by our centre in 2014 to optimize prenatal care for this population. A literature review of published monitoring protocols for this population is also presented. Retrospective comparison of pre-protocol (n = 215) and post-protocol (n = 251) cohorts. Medline and Embase were searched between 2000-2016 using MeSH terms: [fetal monitoring OR prenatal care] AND [opioid-related disorders OR substance-related disorders] in Medline and [fetal monitoring OR prenatal care] AND [opiate addiction OR substance abuse] in Embase, producing 518 results. Thirteen studies included protocols for monitoring opioid-exposed pregnancies. No comprehensive monitoring protocols with high-quality supporting evidence were found. We evaluated 466 opioid-exposed pregnancies, 215 before and 251 after introduction of the protocol. Since implementation, there was a significant increase in the number of opioid-exposed patients who have underwent urine drug screening (72.6% to 89.2%, P < 0.0001); a significant reduction in the number of urine drug screenings positive for illicit opioids (50.2% to 29.1%, P < 0.0001); and a significant increase in the number of patients who discontinued illicit opioid use by the time of delivery (24.7% to 39.4%, P < 0.01). There was no difference in the CS rate (27.4% vs. 26.3%, P > 0.05). There were no observed differences in the rate of preterm birth, birth weight <2500 g, or Apgar score <7 (P > 0.05). Care of women with increased opioid use during pregnancy is an important but under-studied health issue. A novel protocol for focused antenatal care provision for women with opioid-exposed pregnancies improves standard of care and maternal/fetal outcomes. Copyright © 2017. Published by Elsevier Inc.
A review of tags anti-collision and localization protocols in RFID networks.
Ullah, S; Alsalih, W; Alsehaim, A; Alsadhan, N
2012-12-01
Radio Frequency IDentification (RFID) has allowed the realization of ubiquitous tracking and monitoring of physical objects wirelessly with minimum human interactions. It plays a key role in a wide range of applications including asset tracking, contactless payment, access control, transportation and logistics, and other industrial applications. On the other side, RFID systems face several technical challenges that need to be overcome in order to achieve their potential benefits; tags collisions and localization of tagged objects are two important challenges. Numerous anti-collision and localization protocols have been proposed to address these challenges. This paper reviews the state-of-art tags' anti-collision and localization protocols, and provides a deep insight into technical issues of these protocols. The probabilistic and deterministic anti-collision protocols are critically studied and compared in terms of different parameters. We further review distance estimation, scene analysis, and proximity localization schemes and provide useful suggestions. We also introduce a new hybrid direction that utilizes power control to spatially partition the interrogation range of a reader for more efficient anti-collision and localization. Finally, we present the applications of RFID systems in healthcare sectors.
Allegra, Carmen J.
2015-01-01
During the past decade, biomedical technologies have undergone an explosive evolution---from the publication of the first complete human genome in 2003, after more than a decade of effort and at a cost of hundreds of millions of dollars---to the present time, where a complete genomic sequence can be available in less than a day and at a small fraction of the cost of the original sequence. The widespread availability of next generation genomic sequencing has opened the door to the development of precision oncology. The need to test multiple new targeted agents both alone and in combination with other targeted therapies, as well as classic cytotoxic agents, demand the development of novel therapeutic platforms (particularly Master Protocols) capable of efficiently and effectively testing multiple targeted agents or targeted therapeutic strategies in relatively small patient subpopulations. Here, we describe the Master Protocol concept, with a focus on the expected gains and complexities of the use of this design. An overview of Master Protocols currently active or in development is provided along with a more extensive discussion of the Lung Master Protocol (Lung-MAP study). PMID:26433553
NASA Technical Reports Server (NTRS)
Moore, J. Strother
1992-01-01
In this paper we present a formal model of asynchronous communication as a function in the Boyer-Moore logic. The function transforms the signal stream generated by one processor into the signal stream consumed by an independently clocked processor. This transformation 'blurs' edges and 'dilates' time due to differences in the phases and rates of the two clocks and the communications delay. The model can be used quantitatively to derive concrete performance bounds on asynchronous communications at ISO protocol level 1 (physical level). We develop part of the reusable formal theory that permits the convenient application of the model. We use the theory to show that a biphase mark protocol can be used to send messages of arbitrary length between two asynchronous processors. We study two versions of the protocol, a conventional one which uses cells of size 32 cycles and an unconventional one which uses cells of size 18. We conjecture that the protocol can be proved to work under our model for smaller cell sizes and more divergent clock rates but the proofs would be harder.
Reliable transfer of data from ground to space
NASA Technical Reports Server (NTRS)
Brosi, Fred
1993-01-01
This paper describes the problems involved in uplink of data from control centers on the ground to spacecraft, and explores the solutions to those problems, past. present. and future. The evolution of this process, from simple commanding to transfer of large volumes of data and commands is traced. The need for reliable end-to-end protocols for commanding and file transfer is demonstrated, and the shortcomings of both existing telecommand protocols and commercial products to meet this need are discussed. Recent developments in commercial protocols that may be adaptable to the mentioned operations environment are surveyed, and current efforts to develop a suite of protocols for reliable transfer in this environment are presented.
Meta-Analysis: An Approach to Interview Success.
ERIC Educational Resources Information Center
McCaslin, Mark; Carlson, Nancy M.
An initial research step, developing an effective interview strategy, presents unique challenges for novice and master research alike. To focus qualitative research in the human ecology of the study, the strategy presented in this paper used an initial interview protocol and preanalysis process, called meta-analysis, prior to developing the formal…
In January 2018, EPA released the Systematic Review Protocol for the IRIS Chloroform Assessment (Inhalation). As part of developing a draft IRIS assessment, EPA presents a methods document, referred to as the protocol, for conducting a chemical-specific systematic revie...
Developing a guideline for clinical trial protocol content: Delphi consensus survey
2012-01-01
Background Recent evidence has highlighted deficiencies in clinical trial protocols, having implications for many groups. Existing guidelines for randomized clinical trial (RCT) protocol content vary substantially and most do not describe systematic methodology for their development. As one of three prespecified steps for the systematic development of a guideline for trial protocol content, the objective of this study was to conduct a three-round Delphi consensus survey to develop and refine minimum content for RCT protocols. Methods Panellists were identified using a multistep iterative approach, met prespecified minimum criteria and represented key stakeholders who develop or use clinical trial protocols. They were asked to rate concepts for importance in a minimum set of items for RCT protocols. The main outcome measures were degree of importance (scale of 1 to 10; higher scores indicating higher importance) and level of consensus for items. Results were presented as medians, interquartile ranges, counts and percentages. Results Ninety-six expert panellists participated in the Delphi consensus survey including trial investigators, methodologists, research ethics board members, funders, industry, regulators and journal editors. Response rates were between 88 and 93% per round. Overall, panellists rated 63 of 88 concepts of high importance (of which 50 had a 25th percentile rating of 8 or greater), 13 of moderate importance (median 6 or 7) and 12 of low importance (median less than or equal to 5) for minimum trial protocol content. General and item-specific comments and subgroup results provided valuable insight for further discussions. Conclusions This Delphi process achieved consensus from a large panel of experts from diverse stakeholder groups on essential content for RCT protocols. It also highlights areas of divergence. These results, complemented by other empirical research and consensus meetings, are helping guide the development of a guideline for protocol content. PMID:23006145
In situ protocol for butterfly pupal wings using riboprobes.
Ramos, Diane; Monteiro, Antonia
2007-01-01
Here we present, in video format, a protocol for in situ hybridizations in pupal wings of the butterfly Bicyclus anynana using riboprobes. In situ hybridizations, a mainstay of developmental biology, are useful to study the spatial and temporal patterns of gene expression in developing tissues at the level of transcription. If antibodies that target the protein products of gene transcription have not yet been developed, and/or there are multiple gene copies of a particular protein in the genome that cannot be differentiated using available antibodies, in situs can be used instead. While an in situ technique for larval wing discs has been available to the butterfly community for several years, the current protocol has been optimized for the larger and more fragile pupal wings.
de Vries, E
2006-01-01
Efficient early identification of primary immunodeficiency disease (PID) is important for prognosis, but is not an easy task for non-immunologists. The Clinical Working Party of the European Society for Immunodeficiencies (ESID) has composed a multi-stage diagnostic protocol that is based on expert opinion, in order to increase the awareness of PID among doctors working in different fields. The protocol starts from the clinical presentation of the patient; immunological skills are not needed for its use. The multi-stage design allows cost-effective screening for PID within the large pool of potential cases in all hospitals in the early phases, while more expensive tests are reserved for definitive classification in collaboration with an immunologist at a later stage. Although many PIDs present in childhood, others may present at any age. The protocols presented here are therefore aimed at both adult physicians and paediatricians. While designed for use throughout Europe, there will be national differences which may make modification of this generic algorithm necessary. PMID:16879238
NASA Technical Reports Server (NTRS)
Pang, Jackson; Pingree, Paula J.; Torgerson, J. Leigh
2006-01-01
We present the Telecommunications protocol processing subsystem using Reconfigurable Interoperable Gate Arrays (TRIGA), a novel approach that unifies fault tolerance, error correction coding and interplanetary communication protocol off-loading to implement CCSDS File Delivery Protocol and Datalink layers. The new reconfigurable architecture offers more than one order of magnitude throughput increase while reducing footprint requirements in memory, command and data handling processor utilization, communication system interconnects and power consumption.
Security Verification of Secure MANET Routing Protocols
2012-03-22
SECURITY VERIFICATION OF SECURE MANET ROUTING PROTOCOLS THESIS Matthew F. Steele, Captain, USAF AFIT/GCS/ ENG /12-03 DEPARTMENT OF THE AIR FORCE AIR...States AFIT/GCS/ ENG /12-03 SECURITY VERIFICATION OF SECURE MANET ROUTING PROTOCOLS THESIS Presented to the Faculty Department of Electrical and Computer...DISTRIBUTION UNLIMITED AFIT/GCS/ ENG /12-03 SECURITY VERIFICATION OF SECURE MANET ROUTING PROTOCOLS Matthew F. Steele, B.S.E.E. Captain, USAF
Acupuncture for patients with Alzheimer's disease: a systematic review protocol
Zhou, Jing; Peng, Weina; Li, Wang; Liu, Zhishun
2014-01-01
Introduction The aim of this protocol is to provide the methods used to assess the effectiveness and safety of acupuncture for the treatment of patients with Alzheimer's disease. Methods and analysis We will search the following electronic databases: The Cochrane Library, PubMed, Medline, Embase, PsycINFO, Chinese Biomedical Literature Database, Chinese Medical Current Contents and China National Knowledge Infrastructure without restriction of language and publication status. Other sources such as Chinese acupuncture journals and the reference list of selected studies will also be searched. After screening the studies, a meta-analysis of randomised controlled trials will be conducted, if possible. Results expressed as risk ratios for dichotomous data and standardised or weighted mean differences for continuous data, will be used for data synthesis. Dissemination The protocol of this systematic review will be disseminated in a peer-reviewed journal and presented at a relevant conference. Trial registration number PROSPERO CRD42014009619 PMID:25142265
Experimental aspect of solid-state nuclear magnetic resonance studies of biomaterials such as bones.
Singh, Chandan; Rai, Ratan Kumar; Sinha, Neeraj
2013-01-01
Solid-state nuclear magnetic resonance (SSNMR) spectroscopy is increasingly becoming a popular technique to probe micro-structural details of biomaterial such as bone with pico-meter resolution. Due to high-resolution structural details probed by SSNMR methods, handling of bone samples and experimental protocol are very crucial aspects of study. We present here first report of the effect of various experimental protocols and handling methods of bone samples on measured SSNMR parameters. Various popular SSNMR experiments were performed on intact cortical bone sample collected from fresh animal, immediately after removal from animal systems, and results were compared with bone samples preserved in different conditions. We find that the best experimental conditions for SSNMR parameters of bones correspond to preservation at -20 °C and in 70% ethanol solution. Various other SSNMR parameters were compared corresponding to different experimental conditions. Our study has helped in finding best experimental protocol for SSNMR studies of bone. This study will be of further help in the application of SSNMR studies on large bone disease related animal model systems for statistically significant results. © 2013 Elsevier Inc. All rights reserved.
Conducting Clinically Based Intimate Partner Violence Research: Safety Protocol Recommendations.
Anderson, Jocelyn C; Glass, Nancy E; Campbell, Jacquelyn C
Maintaining safety is of utmost importance during research involving participants who have experienced intimate partner violence (IPV). Limited guidance on safety protocols to protect participants is available, particularly information related to technology-based approaches to informed consent, data collection, and contacting participants during the course of a study. The purpose of the article is to provide details on the safety protocol developed and utilized with women receiving care at an urban HIV clinic and who were taking part in an observational study of IPV, mental health symptoms, and substance abuse and their relationship to HIV treatment adherence. The protocol presents the technological strategies to promote safety and allow autonomy in participant decision-making throughout the research process, including Voice over Internet Protocol telephone numbers, and tablet-based eligibility screening and data collection. Protocols for management of participants at risk for suicide and/or intimate partner homicide that included automated high-risk messaging to participants and research staff and facilitated disclosure of risk to clinical staff based on participant preferences are discussed. Use of technology and partnership with clinic staff helped to provide an environment where research regarding IPV could be conducted without undue burden or risk to participants. Utilizing tablet-based survey administration provided multiple practical and safety benefits for participants. Most women who screened into high-risk categories for suicide or intimate partner homicide did not choose to have their results shared with their healthcare providers, indicating the importance of allowing participants control over information sharing whenever possible.
León, Ileana R.; Schwämmle, Veit; Jensen, Ole N.; Sprenger, Richard R.
2013-01-01
The majority of mass spectrometry-based protein quantification studies uses peptide-centric analytical methods and thus strongly relies on efficient and unbiased protein digestion protocols for sample preparation. We present a novel objective approach to assess protein digestion efficiency using a combination of qualitative and quantitative liquid chromatography-tandem MS methods and statistical data analysis. In contrast to previous studies we employed both standard qualitative as well as data-independent quantitative workflows to systematically assess trypsin digestion efficiency and bias using mitochondrial protein fractions. We evaluated nine trypsin-based digestion protocols, based on standard in-solution or on spin filter-aided digestion, including new optimized protocols. We investigated various reagents for protein solubilization and denaturation (dodecyl sulfate, deoxycholate, urea), several trypsin digestion conditions (buffer, RapiGest, deoxycholate, urea), and two methods for removal of detergents before analysis of peptides (acid precipitation or phase separation with ethyl acetate). Our data-independent quantitative liquid chromatography-tandem MS workflow quantified over 3700 distinct peptides with 96% completeness between all protocols and replicates, with an average 40% protein sequence coverage and an average of 11 peptides identified per protein. Systematic quantitative and statistical analysis of physicochemical parameters demonstrated that deoxycholate-assisted in-solution digestion combined with phase transfer allows for efficient, unbiased generation and recovery of peptides from all protein classes, including membrane proteins. This deoxycholate-assisted protocol was also optimal for spin filter-aided digestions as compared with existing methods. PMID:23792921
Security of two quantum cryptography protocols using the same four qubit states
DOE Office of Scientific and Technical Information (OSTI.GOV)
Branciard, Cyril; Ecole Nationale Superieure des Telecommunications, 46, rue Barrault, 75013 Paris; Gisin, Nicolas
2005-09-15
The first quantum cryptography protocol, proposed by Bennett and Brassard in 1984 (BB84), has been widely studied in recent years. This protocol uses four states (more precisely, two complementary bases) for the encoding of the classical bit. Recently, it has been noticed that by using the same four states, but a different encoding of information, one can define a protocol which is more robust in practical implementations, specifically when attenuated laser pulses are used instead of single-photon sources [V. Scarani et al., Phys. Rev. Lett. 92, 057901 (2004), referred to as the SARG04 protocol]. We present a detailed study ofmore » SARG04 in two different regimes. In the first part, we consider an implementation with a single-photon source: we derive bounds on the error rate Q for security against all possible attacks by the eavesdropper. The lower and the upper bound obtained for SARG04 (Q < or approx. 10.95% and Q > or approx. 14.9%, respectively) are close to those obtained for BB84 (Q < or approx. 12.4% and Q > or approx. 14.6%, respectively). In the second part, we consider a realistic source consisting of an attenuated laser and improve on previous analysis by allowing Alice to optimize the mean number of photons as a function of the distance. The SARG04 protocol is found to perform better than BB84, both in secret-key rate and in maximal achievable distance, for a wide class of Eve's attacks.« less
Karakatsanis, Nicolas A; Lodge, Martin A; Tahari, Abdel K; Zhou, Y; Wahl, Richard L; Rahmim, Arman
2013-10-21
Static whole-body PET/CT, employing the standardized uptake value (SUV), is considered the standard clinical approach to diagnosis and treatment response monitoring for a wide range of oncologic malignancies. Alternative PET protocols involving dynamic acquisition of temporal images have been implemented in the research setting, allowing quantification of tracer dynamics, an important capability for tumor characterization and treatment response monitoring. Nonetheless, dynamic protocols have been confined to single-bed-coverage limiting the axial field-of-view to ~15-20 cm, and have not been translated to the routine clinical context of whole-body PET imaging for the inspection of disseminated disease. Here, we pursue a transition to dynamic whole-body PET parametric imaging, by presenting, within a unified framework, clinically feasible multi-bed dynamic PET acquisition protocols and parametric imaging methods. We investigate solutions to address the challenges of: (i) long acquisitions, (ii) small number of dynamic frames per bed, and (iii) non-invasive quantification of kinetics in the plasma. In the present study, a novel dynamic (4D) whole-body PET acquisition protocol of ~45 min total length is presented, composed of (i) an initial 6 min dynamic PET scan (24 frames) over the heart, followed by (ii) a sequence of multi-pass multi-bed PET scans (six passes × seven bed positions, each scanned for 45 s). Standard Patlak linear graphical analysis modeling was employed, coupled with image-derived plasma input function measurements. Ordinary least squares Patlak estimation was used as the baseline regression method to quantify the physiological parameters of tracer uptake rate Ki and total blood distribution volume V on an individual voxel basis. Extensive Monte Carlo simulation studies, using a wide set of published kinetic FDG parameters and GATE and XCAT platforms, were conducted to optimize the acquisition protocol from a range of ten different clinically acceptable sampling schedules examined. The framework was also applied to six FDG PET patient studies, demonstrating clinical feasibility. Both simulated and clinical results indicated enhanced contrast-to-noise ratios (CNRs) for Ki images in tumor regions with notable background FDG concentration, such as the liver, where SUV performed relatively poorly. Overall, the proposed framework enables enhanced quantification of physiological parameters across the whole body. In addition, the total acquisition length can be reduced from 45 to ~35 min and still achieve improved or equivalent CNR compared to SUV, provided the true Ki contrast is sufficiently high. In the follow-up companion paper, a set of advanced linear regression schemes is presented to particularly address the presence of noise, and attempt to achieve a better trade-off between the mean-squared error and the CNR metrics, resulting in enhanced task-based imaging.
Karakatsanis, Nicolas A.; Lodge, Martin A.; Tahari, Abdel K.; Zhou, Y.; Wahl, Richard L.; Rahmim, Arman
2013-01-01
Static whole body PET/CT, employing the standardized uptake value (SUV), is considered the standard clinical approach to diagnosis and treatment response monitoring for a wide range of oncologic malignancies. Alternative PET protocols involving dynamic acquisition of temporal images have been implemented in the research setting, allowing quantification of tracer dynamics, an important capability for tumor characterization and treatment response monitoring. Nonetheless, dynamic protocols have been confined to single bed-coverage limiting the axial field-of-view to ~15–20 cm, and have not been translated to the routine clinical context of whole-body PET imaging for the inspection of disseminated disease. Here, we pursue a transition to dynamic whole body PET parametric imaging, by presenting, within a unified framework, clinically feasible multi-bed dynamic PET acquisition protocols and parametric imaging methods. We investigate solutions to address the challenges of: (i) long acquisitions, (ii) small number of dynamic frames per bed, and (iii) non-invasive quantification of kinetics in the plasma. In the present study, a novel dynamic (4D) whole body PET acquisition protocol of ~45min total length is presented, composed of (i) an initial 6-min dynamic PET scan (24 frames) over the heart, followed by (ii) a sequence of multi-pass multi-bed PET scans (6 passes x 7 bed positions, each scanned for 45sec). Standard Patlak linear graphical analysis modeling was employed, coupled with image-derived plasma input function measurements. Ordinary least squares (OLS) Patlak estimation was used as the baseline regression method to quantify the physiological parameters of tracer uptake rate Ki and total blood distribution volume V on an individual voxel basis. Extensive Monte Carlo simulation studies, using a wide set of published kinetic FDG parameters and GATE and XCAT platforms, were conducted to optimize the acquisition protocol from a range of 10 different clinically acceptable sampling schedules examined. The framework was also applied to six FDG PET patient studies, demonstrating clinical feasibility. Both simulated and clinical results indicated enhanced contrast-to-noise ratios (CNRs) for Ki images in tumor regions with notable background FDG concentration, such as the liver, where SUV performed relatively poorly. Overall, the proposed framework enables enhanced quantification of physiological parameters across the whole-body. In addition, the total acquisition length can be reduced from 45min to ~35min and still achieve improved or equivalent CNR compared to SUV, provided the true Ki contrast is sufficiently high. In the follow-up companion paper, a set of advanced linear regression schemes is presented to particularly address the presence of noise, and attempt to achieve a better trade-off between the mean-squared error (MSE) and the CNR metrics, resulting in enhanced task-based imaging. PMID:24080962
NASA Astrophysics Data System (ADS)
Karakatsanis, Nicolas A.; Lodge, Martin A.; Tahari, Abdel K.; Zhou, Y.; Wahl, Richard L.; Rahmim, Arman
2013-10-01
Static whole-body PET/CT, employing the standardized uptake value (SUV), is considered the standard clinical approach to diagnosis and treatment response monitoring for a wide range of oncologic malignancies. Alternative PET protocols involving dynamic acquisition of temporal images have been implemented in the research setting, allowing quantification of tracer dynamics, an important capability for tumor characterization and treatment response monitoring. Nonetheless, dynamic protocols have been confined to single-bed-coverage limiting the axial field-of-view to ˜15-20 cm, and have not been translated to the routine clinical context of whole-body PET imaging for the inspection of disseminated disease. Here, we pursue a transition to dynamic whole-body PET parametric imaging, by presenting, within a unified framework, clinically feasible multi-bed dynamic PET acquisition protocols and parametric imaging methods. We investigate solutions to address the challenges of: (i) long acquisitions, (ii) small number of dynamic frames per bed, and (iii) non-invasive quantification of kinetics in the plasma. In the present study, a novel dynamic (4D) whole-body PET acquisition protocol of ˜45 min total length is presented, composed of (i) an initial 6 min dynamic PET scan (24 frames) over the heart, followed by (ii) a sequence of multi-pass multi-bed PET scans (six passes × seven bed positions, each scanned for 45 s). Standard Patlak linear graphical analysis modeling was employed, coupled with image-derived plasma input function measurements. Ordinary least squares Patlak estimation was used as the baseline regression method to quantify the physiological parameters of tracer uptake rate Ki and total blood distribution volume V on an individual voxel basis. Extensive Monte Carlo simulation studies, using a wide set of published kinetic FDG parameters and GATE and XCAT platforms, were conducted to optimize the acquisition protocol from a range of ten different clinically acceptable sampling schedules examined. The framework was also applied to six FDG PET patient studies, demonstrating clinical feasibility. Both simulated and clinical results indicated enhanced contrast-to-noise ratios (CNRs) for Ki images in tumor regions with notable background FDG concentration, such as the liver, where SUV performed relatively poorly. Overall, the proposed framework enables enhanced quantification of physiological parameters across the whole body. In addition, the total acquisition length can be reduced from 45 to ˜35 min and still achieve improved or equivalent CNR compared to SUV, provided the true Ki contrast is sufficiently high. In the follow-up companion paper, a set of advanced linear regression schemes is presented to particularly address the presence of noise, and attempt to achieve a better trade-off between the mean-squared error and the CNR metrics, resulting in enhanced task-based imaging.
Secure Skyline Queries on Cloud Platform.
Liu, Jinfei; Yang, Juncheng; Xiong, Li; Pei, Jian
2017-04-01
Outsourcing data and computation to cloud server provides a cost-effective way to support large scale data storage and query processing. However, due to security and privacy concerns, sensitive data (e.g., medical records) need to be protected from the cloud server and other unauthorized users. One approach is to outsource encrypted data to the cloud server and have the cloud server perform query processing on the encrypted data only. It remains a challenging task to support various queries over encrypted data in a secure and efficient way such that the cloud server does not gain any knowledge about the data, query, and query result. In this paper, we study the problem of secure skyline queries over encrypted data. The skyline query is particularly important for multi-criteria decision making but also presents significant challenges due to its complex computations. We propose a fully secure skyline query protocol on data encrypted using semantically-secure encryption. As a key subroutine, we present a new secure dominance protocol, which can be also used as a building block for other queries. Finally, we provide both serial and parallelized implementations and empirically study the protocols in terms of efficiency and scalability under different parameter settings, verifying the feasibility of our proposed solutions.
Latency correction of event-related potentials between different experimental protocols
NASA Astrophysics Data System (ADS)
Iturrate, I.; Chavarriaga, R.; Montesano, L.; Minguez, J.; Millán, JdR
2014-06-01
Objective. A fundamental issue in EEG event-related potentials (ERPs) studies is the amount of data required to have an accurate ERP model. This also impacts the time required to train a classifier for a brain-computer interface (BCI). This issue is mainly due to the poor signal-to-noise ratio and the large fluctuations of the EEG caused by several sources of variability. One of these sources is directly related to the experimental protocol or application designed, and may affect the amplitude or latency of ERPs. This usually prevents BCI classifiers from generalizing among different experimental protocols. In this paper, we analyze the effect of the amplitude and the latency variations among different experimental protocols based on the same type of ERP. Approach. We present a method to analyze and compensate for the latency variations in BCI applications. The algorithm has been tested on two widely used ERPs (P300 and observation error potentials), in three experimental protocols in each case. We report the ERP analysis and single-trial classification. Main results. The results obtained show that the designed experimental protocols significantly affect the latency of the recorded potentials but not the amplitudes. Significance. These results show how the use of latency-corrected data can be used to generalize the BCIs, reducing the calibration time when facing a new experimental protocol.
Swartz, Elliot W; Baek, Jaeyun; Pribadi, Mochtar; Wojta, Kevin J; Almeida, Sandra; Karydas, Anna; Gao, Fen-Biao; Miller, Bruce L; Coppola, Giovanni
2016-11-01
: Induced pluripotent stem cells (iPSCs) offer an unlimited resource of cells to be used for the study of underlying molecular biology of disease, therapeutic drug screening, and transplant-based regenerative medicine. However, methods for the directed differentiation of skeletal muscle for these purposes remain scarce and incomplete. Here, we present a novel, small molecule-based protocol for the generation of multinucleated skeletal myotubes using eight independent iPSC lines. Through combinatorial inhibition of phosphoinositide 3-kinase (PI3K) and glycogen synthase kinase 3β (GSK3β) with addition of bone morphogenic protein 4 (BMP4) and fibroblast growth factor 2 (FGF2), we report up to 64% conversion of iPSCs into the myogenic program by day 36 as indicated by MYOG + cell populations. These cells began to exhibit spontaneous contractions as early as 34 days in vitro in the presence of a serum-free medium formulation. We used this protocol to obtain iPSC-derived muscle cells from frontotemporal dementia (FTD) patients harboring C9orf72 hexanucleotide repeat expansions (rGGGGCC), sporadic FTD, and unaffected controls. iPSCs derived from rGGGGCC carriers contained RNA foci but did not vary in differentiation efficiency when compared to unaffected controls nor display mislocalized TDP-43 after as many as 120 days in vitro. This study presents a rapid, efficient, and transgene-free method for generating multinucleated skeletal myotubes from iPSCs and a resource for further modeling the role of skeletal muscle in amyotrophic lateral sclerosis and other motor neuron diseases. Protocols to produce skeletal myotubes for disease modeling or therapy are scarce and incomplete. The present study efficiently generates functional skeletal myotubes from human induced pluripotent stem cells using a small molecule-based approach. Using this strategy, terminal myogenic induction of up to 64% in 36 days and spontaneously contractile myotubes within 34 days were achieved. Myotubes derived from patients carrying the C9orf72 repeat expansion show no change in differentiation efficiency and normal TDP-43 localization after as many as 120 days in vitro when compared to unaffected controls. This study provides an efficient, novel protocol for the generation of skeletal myotubes from human induced pluripotent stem cells that may serve as a valuable tool in drug discovery and modeling of musculoskeletal and neuromuscular diseases. ©AlphaMed Press.
Communication protocol in chassis detecting wireless transmission system based on WiFi
USDA-ARS?s Scientific Manuscript database
In chassis detecting wireless transmission system, the wireless network communication protocol plays a key role in the information exchange and synchronization between the host and chassis PDA. This paper presents a wireless network transmission protocol based on TCP/IP which makes the rules of info...
An algorithm for optimal fusion of atlases with different labeling protocols
Iglesias, Juan Eugenio; Sabuncu, Mert Rory; Aganj, Iman; Bhatt, Priyanka; Casillas, Christen; Salat, David; Boxer, Adam; Fischl, Bruce; Van Leemput, Koen
2014-01-01
In this paper we present a novel label fusion algorithm suited for scenarios in which different manual delineation protocols with potentially disparate structures have been used to annotate the training scans (hereafter referred to as “atlases”). Such scenarios arise when atlases have missing structures, when they have been labeled with different levels of detail, or when they have been taken from different heterogeneous databases. The proposed algorithm can be used to automatically label a novel scan with any of the protocols from the training data. Further, it enables us to generate new labels that are not present in any delineation protocol by defining intersections on the underling labels. We first use probabilistic models of label fusion to generalize three popular label fusion techniques to the multi-protocol setting: majority voting, semi-locally weighted voting and STAPLE. Then, we identify some shortcomings of the generalized methods, namely the inability to produce meaningful posterior probabilities for the different labels (majority voting, semi-locally weighted voting) and to exploit the similarities between the atlases (all three methods). Finally, we propose a novel generative label fusion model that can overcome these drawbacks. We use the proposed method to combine four brain MRI datasets labeled with different protocols (with a total of 102 unique labeled structures) to produce segmentations of 148 brain regions. Using cross-validation, we show that the proposed algorithm outperforms the generalizations of majority voting, semi-locally weighted voting and STAPLE (mean Dice score 83%, vs. 77%, 80% and 79%, respectively). We also evaluated the proposed algorithm in an aging study, successfully reproducing some well-known results in cortical and subcortical structures. PMID:25463466
Laugisch, Oliver; Ramseier, Christoph A; Salvi, Giovanni E; Hägi, Tobias T; Bürgin, Walter; Eick, Sigrun; Sculean, Anton
2016-11-01
The aim of this study was to compare early wound healing, tooth staining and patient acceptance with two different post-surgical maintenance protocols. Forty patients scheduled for flap surgery to treat periodontal pockets or accommodate dental implants were randomly assigned to receive the following two different post-surgical maintenance protocols: (a) 2 weeks rinsing with a 0.05 % chlorhexidine digluconate (CHX)/herbal extract combination (test) or (b) a 0.1 % CHX solution (control). Early wound healing was evaluated clinically and immunologically. Tooth staining and patient acceptance were assessed by means of visual analogue scale (VAS). Both groups presented with comparable wound healing profiles. No statistically significant differences were observed between the two protocols regarding early wound healing and plaque index (p > 0.05). However, in the control group, statistically significantly more patients felt discomfort due to tooth staining (p = 0.0467). Compared with patients from the test group, patients in the control group reported statistically significant more irritation of taste at week 1 (p = 0.0359) and at week 2 (p = 0.0042). The present findings indicate that the two CHX protocols resulted in comparable healing and inhibition of plaque formation. Tooth staining and subjective discomfort related to irritation of taste were more frequent in the control group. A post-operative protocol including 0.05 % CHX/herbal extract may have the potential to improve patient compliance during post-operative maintenance.
Rames, Matthew; Yu, Yadong; Ren, Gang
2014-08-15
Structural determination of proteins is rather challenging for proteins with molecular masses between 40 - 200 kDa. Considering that more than half of natural proteins have a molecular mass between 40 - 200 kDa, a robust and high-throughput method with a nanometer resolution capability is needed. Negative staining (NS) electron microscopy (EM) is an easy, rapid, and qualitative approach which has frequently been used in research laboratories to examine protein structure and protein-protein interactions. Unfortunately, conventional NS protocols often generate structural artifacts on proteins, especially with lipoproteins that usually form presenting rouleaux artifacts. By using images of lipoproteins from cryo-electronmore » microscopy (cryo-EM) as a standard, the key parameters in NS specimen preparation conditions were recently screened and reported as the optimized NS protocol (OpNS), a modified conventional NS protocol. Artifacts like rouleaux can be greatly limited by OpNS, additionally providing high contrast along with reasonably high-resolution (near 1 nm) images of small and asymmetric proteins. These high-resolution and high contrast images are even favorable for an individual protein (a single object, no average) 3D reconstruction, such as a 160 kDa antibody, through the method of electron tomography. Moreover, OpNS can be a high-throughput tool to examine hundreds of samples of small proteins. For example, the previously published mechanism of 53 kDa cholesteryl ester transfer protein (CETP) involved the screening and imaging of hundreds of samples. Considering cryo-EM rarely successfully images proteins less than 200 kDa has yet to publish any study involving screening over one hundred sample conditions, it is fair to call OpNS a high-throughput method for studying small proteins. Hopefully the OpNS protocol presented here can be a useful tool to push the boundaries of EM and accelerate EM studies into small protein structure, dynamics and mechanisms.« less
Cognitive-behavioral group treatment for social phobia in adolescents. A preliminary study.
Albano, A M; Marten, P A; Holt, C S; Heimberg, R G; Barlow, D H
1995-10-01
The present study is a preliminary evaluation of the effectiveness of a new cognitive-behavioral group treatment protocol for social phobia in adolescents. Five adolescents with social phobia were treated in a 16-session group treatment program, with parental involvement in selected sessions. Treatment involved skills training (social skills, problem solving, assertiveness), cognitive restructuring, behavioral exposure, and homework. Self-report measures of anxiety and depression, taken throughout treatment, indicated significant improvements over a 1-year follow-up period. Behavior test measures also indicated a decrease in subjective anxiety ratings after treatment which was maintained at follow-up. Structured diagnostic interviews 1 year after treatment confirmed full remission of social phobia for four subjects, with one subject's phobia in partial remission. Overall, the present findings support the continued evaluation of this protocol for social phobic adolescents.
Efficient decentralized consensus protocols
NASA Technical Reports Server (NTRS)
Lakshman, T. V.; Agrawala, A. K.
1986-01-01
Decentralized consensus protocols are characterized by successive rounds of message interchanges. Protocols which achieve a consensus in one round of message interchange require O(N-squared) messages, where N is the number of participants. In this paper, a communication scheme, based on finite projective planes, which requires only O(N sq rt N) messages for each round is presented. Using this communication scheme, decentralized consensus protocols which achieve a consensus within two rounds of message interchange are developed. The protocols are symmetric, and the communication scheme does not impose any hierarchical structure. The scheme is illustrated using blocking and nonblocking commit protocols, decentralized extrema finding, and computation of the sum function.
Threshold Things That Think: Authorisation for Resharing
NASA Astrophysics Data System (ADS)
Peeters, Roel; Kohlweiss, Markulf; Preneel, Bart
As we are evolving towards ubiquitous computing, users carry an increasing number of mobile devices with sensitive information. The security of this information can be protected using threshold cryptography, in which secret computations are shared between multiple devices. Threshold cryptography can be made more robust by resharing protocols, which allow recovery from partial compromises. This paper introduces user-friendly and secure protocols for the authorisation of resharing protocols. We present both automatic and manual protocols, utilising a group manual authentication protocol to add a new device. We analyse the security of these protocols: our analysis considers permanent and temporary compromises, denial of service attacks and manual authentications errors of the user.
One Step Quantum Key Distribution Based on EPR Entanglement.
Li, Jian; Li, Na; Li, Lei-Lei; Wang, Tao
2016-06-30
A novel quantum key distribution protocol is presented, based on entanglement and dense coding and allowing asymptotically secure key distribution. Considering the storage time limit of quantum bits, a grouping quantum key distribution protocol is proposed, which overcomes the vulnerability of first protocol and improves the maneuverability. Moreover, a security analysis is given and a simple type of eavesdropper's attack would introduce at least an error rate of 46.875%. Compared with the "Ping-pong" protocol involving two steps, the proposed protocol does not need to store the qubit and only involves one step.
On the designing of a tamper resistant prescription RFID access control system.
Safkhani, Masoumeh; Bagheri, Nasour; Naderi, Majid
2012-12-01
Recently, Chen et al. have proposed a novel tamper resistant prescription RFID access control system, published in the Journal of Medical Systems. In this paper we consider the security of the proposed protocol and identify some existing weaknesses. The main attack is a reader impersonation attack which allows an active adversary to impersonate a legitimate doctor, e.g. the patient's doctor, to access the patient's tag and change the patient prescription. The presented attack is quite efficient. To impersonate a doctor, the adversary should eavesdrop one session between the doctor and the patient's tag and then she can impersonate the doctor with the success probability of '1'. In addition, we present efficient reader-tag to back-end database impersonation, de-synchronization and traceability attacks against the protocol. Finally, we propose an improved version of protocol which is more efficient compared to the original protocol while provides the desired security against the presented attacks.
Genomics-Based Security Protocols: From Plaintext to Cipherprotein
NASA Technical Reports Server (NTRS)
Shaw, Harry; Hussein, Sayed; Helgert, Hermann
2011-01-01
The evolving nature of the internet will require continual advances in authentication and confidentiality protocols. Nature provides some clues as to how this can be accomplished in a distributed manner through molecular biology. Cryptography and molecular biology share certain aspects and operations that allow for a set of unified principles to be applied to problems in either venue. A concept for developing security protocols that can be instantiated at the genomics level is presented. A DNA (Deoxyribonucleic acid) inspired hash code system is presented that utilizes concepts from molecular biology. It is a keyed-Hash Message Authentication Code (HMAC) capable of being used in secure mobile Ad hoc networks. It is targeted for applications without an available public key infrastructure. Mechanics of creating the HMAC are presented as well as a prototype HMAC protocol architecture. Security concepts related to the implementation differences between electronic domain security and genomics domain security are discussed.
Resistance to compression of weakened roots subjected to different root reconstruction protocols
ZOGHEIB, Lucas Villaça; SAAVEDRA, Guilherme de Siqueira Ferreira Anzaloni; CARDOSO, Paula Elaine; VALERA, Márcia Carneiro; de ARAÚJO, Maria Amélia Máximo
2011-01-01
Objective This study evaluated, in vitro, the fracture resistance of human non-vital teeth restored with different reconstruction protocols. Material and methods Forty human anterior roots of similar shape and dimensions were assigned to four groups (n=10), according to the root reconstruction protocol: Group I (control): non-weakened roots with glass fiber post; Group II: roots with composite resin by incremental technique and glass fiber post; Group III: roots with accessory glass fiber posts and glass fiber post; and Group IV: roots with anatomic glass fiber post technique. Following post cementation and core reconstruction, the roots were embedded in chemically activated acrylic resin and submitted to fracture resistance testing, with a compressive load at an angle of 45º in relation to the long axis of the root at a speed of 0.5 mm/min until fracture. All data were statistically analyzed with bilateral Dunnett's test (α=0.05). Results Group I presented higher mean values of fracture resistance when compared with the three experimental groups, which, in turn, presented similar resistance to fracture among each other. None of the techniques of root reconstruction with intraradicular posts improved root strength, and the incremental technique was suggested as being the most recommendable, since the type of fracture that occurred allowed the remaining dental structure to be repaired. Conclusion The results of this in vitro study suggest that the healthy remaining radicular dentin is more important to increase fracture resistance than the root reconstruction protocol. PMID:22231002
Berlin, M A; Anand, Sheila
2014-01-01
This paper presents Direction based Hazard Routing Protocol (DHRP) for disseminating information about fixed road hazards such as road blocks, tree fall, boulders on road, snow pile up, landslide, road maintenance work and other obstacles to the vehicles approaching the hazardous location. The proposed work focuses on dissemination of hazard messages on highways with sparse traffic. The vehicle coming across the hazard would report the presence of the hazard. It is proposed to use Road Side fixed infrastructure Units for reliable and timely delivery of hazard messages to vehicles. The vehicles can then take appropriate safety action to avoid the hazardous location. The proposed protocol has been implemented and tested using SUMO simulator to generate road traffic and NS 2.33 network simulator to analyze the performance of DHRP. The performance of the proposed protocol was also compared with simple flooding protocol and the results are presented.
Cell engineering: spearheading the next generation in healthcare.
Jayasinghe, Suwan N
2008-09-01
Manipulating living mammalian cells present fascinating possibilities for a plethora of applications within our healthcare. These imply several possibilities in tissue engineering and regenerative medicine, to those of a therapeutic nature. The physical sciences are increasingly playing a pivotal role in this endeavour by both advancing existing cell engineering technology and pioneering new protocols for the creation of biologically viable structures. In this paper, the author introduces several direct needle/channel/orifice-based cell engineering protocols, currently undergoing intense investigation for a whole host of bio-applications. Hence, each protocol's advantages and disadvantages are clearly identified, whilst recognizing their future biological and engineering challenges. In conclusion, a few selected biotechnological applications present possibilities where these protocols could undergo focused exploration. Successful development of these bio-protocols sees the emergence of unique future strategies within a clinical environment having far-reaching consequences for our healthcare.
Rani, Anupama; Sharma, Vivek; Arora, Sumit; Lal, Darshan; Kumar, Anil
2015-04-01
Detection of milk fat adulteration with foreign fats/oils continues to be a challenge for the dairy industry as well as food testing laboratories, especially in the present scenario of rampant adulteration using the scientific knowledge by unscrupulous persons involved in the trade. In the present investigation a rapid reversed-phase thin layer chromatographic (RP-TLC) protocol was standardized to ascertain the purity of milk fat. RP-TLC protocol did not show any false positive results in the genuine ghee (clarified butter fat) samples of known origin. Adulteration of ghee with coconut oil up to 7. 5 %, soybean oil, sunflower oil and groundnut oil up to 1 %, while, designer oil up to 2 % level could be detected using the standardized RP-TLC protocol. The protocol standardized is rapid and convenient to use.
NASA Astrophysics Data System (ADS)
Kao, Shih-Hung; Lin, Jason; Tsai, Chia-Wei; Hwang, Tzonelih
2018-03-01
In early 2009, Xiu et al. (Opt. Commun. 282(2) 333-337 2009) presented a controlled deterministic secure quantum communication (CDSQC) protocol via a newly constructed five-qubit entangled quantum state. Later, Qin et al. (Opt. Commun. 282(13), 2656-2658 2009) pointed out two security loopholes in Xiu et al.'s protocol: (1) A correlation-elicitation (CE) attack can reveal the entire secret message; (2) A leakage of partial information for the receiver is noticed. Then, Xiu et al. (Opt. Commun. 283(2), 344-347 2010) presented a revised CDSQC protocol to remedy the CE attack problem. However, the information leakage problem still remains open. This work proposes a new CDSQC protocol using the same five-qubit entangled state which can work without the above mentioned security problems. Moreover, the Trojan Horse attacks can be automatically avoided without using detecting devices in the new CDSQC.
NASA Astrophysics Data System (ADS)
Kao, Shih-Hung; Lin, Jason; Tsai, Chia-Wei; Hwang, Tzonelih
2018-06-01
In early 2009, Xiu et al. (Opt. Commun. 282(2) 333-337 2009) presented a controlled deterministic secure quantum communication (CDSQC) protocol via a newly constructed five-qubit entangled quantum state. Later, Qin et al. (Opt. Commun. 282(13), 2656-2658 2009) pointed out two security loopholes in Xiu et al.'s protocol: (1) A correlation-elicitation (CE) attack can reveal the entire secret message; (2) A leakage of partial information for the receiver is noticed. Then, Xiu et al. (Opt. Commun. 283(2), 344-347 2010) presented a revised CDSQC protocol to remedy the CE attack problem. However, the information leakage problem still remains open. This work proposes a new CDSQC protocol using the same five-qubit entangled state which can work without the above mentioned security problems. Moreover, the Trojan Horse attacks can be automatically avoided without using detecting devices in the new CDSQC.
Elsholtz, Fabian Henry Jürgen; Kamp, Julia Evi-Katrin; Vahldiek, Janis Lucas; Hamm, Bernd; Niehues, Stefan Markus
2018-06-18
CT-guided periradicular infiltration of the cervical spine is an effective symptomatic treatment in patients with radiculopathy-associated pain syndromes. This study evaluates the robustness and safety of a low-dose protocol on a CT scanner with iterative reconstruction software. A total of 183 patients who underwent periradicular infiltration therapy of the cervical spine were included in this study. 82 interventions were performed on a new CT scanner with a new intervention protocol using an iterative reconstruction algorithm. Spot scanning was implemented for planning and a basic low-dose setup of 80 kVp and 5 mAs was established during intermittent fluoroscopy. The comparison group included 101 prior interventions on a scanner without iterative reconstruction. The dose-length product (DLP), number of acquisitions, pain reduction on a numeric analog scale, and protocol changes to achieve a safe intervention were recorded. The median DLP for the whole intervention was 24.3 mGy*cm in the comparison group and 1.8 mGy*cm in the study group. The median pain reduction was -3 in the study group and -2 in the comparison group. A 5 mAs increase in the tube current-time product was required in 5 patients of the study group. Implementation of a new scanner and intervention protocol resulted in a 92.6 % dose reduction without a compromise in safety and pain relief. The dose needed here is more than 75 % lower than doses used for similar interventions in published studies. An increase of the tube current-time product was needed in only 6 % of interventions. · The presented ultra-low-dose protocol allows for a significant dose reduction without compromising outcome.. · The protocol includes spot scanning for planning purposes and a basic setup of 80 kVp and 5 mAs.. · The iterative reconstruction algorithm is activated during fluoroscopy.. · Elsholtz FH, Kamp JE, Vahldiek JL et al. Periradicular Infiltration of the Cervical Spine: How New CT Scanner Techniques and Protocol Modifications Contribute to the Achievement of Low-Dose Interventions. Fortschr Röntgenstr 2018; DOI: 10.1055/a-0632-3930. © Georg Thieme Verlag KG Stuttgart · New York.
Sefuba, Maria; Walingo, Tom; Takawira, Fambirai
2015-09-18
This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols.
Sefuba, Maria; Walingo, Tom; Takawira, Fambirai
2015-01-01
This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols. PMID:26393608
Publication trends of study protocols in rehabilitation.
Jesus, Tiago S; Colquhoun, Heather L
2017-09-04
Growing evidence points for the need to publish study protocols in the health field. To observe whether the growing interest in publishing study protocols in the broader health field has been translated into increased publications of rehabilitation study protocols. Observational study using publication data and its indexation in PubMed. Not applicable. Not applicable. PubMed was searched with appropriate combinations of Medical Subject Headings up to December 2014. The effective presence of study protocols was manually screened. Regression models analyzed the yearly growth of publications. Two-sample Z-tests analyzed whether the proportion of Systematic Reviews (SRs) and Randomized Controlled Trials (RCTs) among study protocols differed from that of the same designs for the broader rehabilitation research. Up to December 2014, 746 publications of rehabilitation study protocols were identified, with an exponential growth since 2005 (r2=0.981; p<0.001). RCT protocols were the most common among rehabilitation study protocols (83%), while RCTs were significantly more prevalent among study protocols than among the broader rehabilitation research (83% vs. 35.8%; p<0.001). For SRs, the picture was reversed: significantly less common among study protocols (2.8% vs. 9.3%; p<0.001). Funding was more often reported by rehabilitation study protocols than the broader rehabilitation research (90% vs. 53.1%; p<0.001). Rehabilitation journals published a significantly lower share of rehabilitation study protocols than they did for the broader rehabilitation research (1.8% vs.16.7%; p<0.001). Identifying the reasons for these discrepancies and reverting unwarranted disparities (e.g. low rate of publication for rehabilitation SR protocols) are likely new avenues for rehabilitation research and its publication. SRs, particularly those aggregating RCT results, are considered the best standard of evidence to guide rehabilitation clinical practice; however, that standard can be improved in rigor and/or transparency if the publications of rehabilitation SRs protocols become more common.
Crowd Sourcing Data Collection through Amazon Mechanical Turk
2013-09-01
The first recognition study consisted of a Panel Study using a simple detection protocol, in which participants were presented with vignettes and, for...variability than the crowdsourcing data set, hewing more closely to the year 1 verbs of interest and simple description grammar . The DT:PS data were...Study RT: PS Recognition Task: Panel Study RT: RT Recognition Task: Round Table S3 Amazon Simple Storage Service SVPA Single Verb Present /Absent
A Unified Fault-Tolerance Protocol
NASA Technical Reports Server (NTRS)
Miner, Paul; Gedser, Alfons; Pike, Lee; Maddalon, Jeffrey
2004-01-01
Davies and Wakerly show that Byzantine fault tolerance can be achieved by a cascade of broadcasts and middle value select functions. We present an extension of the Davies and Wakerly protocol, the unified protocol, and its proof of correctness. We prove that it satisfies validity and agreement properties for communication of exact values. We then introduce bounded communication error into the model. Inexact communication is inherent for clock synchronization protocols. We prove that validity and agreement properties hold for inexact communication, and that exact communication is a special case. As a running example, we illustrate the unified protocol using the SPIDER family of fault-tolerant architectures. In particular we demonstrate that the SPIDER interactive consistency, distributed diagnosis, and clock synchronization protocols are instances of the unified protocol.
Simultaneous brightness contrast of foraging Papilio butterflies
Kinoshita, Michiyo; Takahashi, Yuki; Arikawa, Kentaro
2012-01-01
This study focuses on the sense of brightness in the foraging Japanese yellow swallowtail butterfly, Papilio xuthus. We presented two red discs of different intensity on a grey background to butterflies, and trained them to select one of the discs. They were successfully trained to select either a high intensity or a low intensity disc. The trained butterflies were tested on their ability to perceive brightness in two different protocols: (i) two orange discs of different intensity presented on the same intensity grey background and (ii) two orange discs of the same intensity separately presented on a grey background that was either higher or lower in intensity than the training background. The butterflies trained to high intensity red selected the orange disc of high intensity in protocol 1, and the disc on the background of low intensity grey in protocol 2. We obtained similar results in another set of experiments with purple discs instead of orange discs. The choices of the butterflies trained to low intensity red were opposite to those just described. Taken together, we conclude that Papilio has the ability to learn brightness and darkness of targets independent of colour, and that they have the so-called simultaneous brightness contrast. PMID:22179808
Physical layer simulation study for the coexistence of WLAN standards
DOE Office of Scientific and Technical Information (OSTI.GOV)
Howlader, M. K.; Keiger, C.; Ewing, P. D.
This paper presents the results of a study on the performance of wireless local area network (WLAN) devices in the presence of interference from other wireless devices. To understand the coexistence of these wireless protocols, simplified physical-layer-system models were developed for the Bluetooth, Wireless Fidelity (WiFi), and Zigbee devices, all of which operate within the 2.4-GHz frequency band. The performances of these protocols were evaluated using Monte-Carlo simulations under various interference and channel conditions. The channel models considered were basic additive white Gaussian noise (AWGN), Rayleigh fading, and site-specific fading. The study also incorporated the basic modulation schemes, multiple accessmore » techniques, and channel allocations of the three protocols. This research is helping the U.S. Nuclear Regulatory Commission (NRC) understand the coexistence issues associated with deploying wireless devices and could prove useful in the development of a technical basis for guidance to address safety-related issues with the implementation of wireless systems in nuclear facilities. (authors)« less
Cerritelli, Francesco; Cicchitti, Luca; Martelli, Marta; Barlafante, Gina; Renzetti, Cinzia; Pizzolorusso, Gianfranco; Lupacchini, Mariacristina; D'Orazio, Marianna; Marinelli, Benedetta; Cozzolino, Vincenzo; Fusilli, Paola; D'Incecco, Carmine
2015-03-08
Recent evidence proved the necessity to improve health care and pain management in newborns. Osteopathic manipulative treatment (OMT) has been largely used to treat painful syndromes as well as term and preterm newborns. Recent studies have demonstrated positive results of osteopathy in reducing length of stay and costs. However, no trials were carried out on pain in newborns. The aim of the present clinical trial is to explore the effectiveness of osteopathic treatment in reducing pain in a sample of preterms. A three-armed single blinded placebo-control randomised controlled trial protocol has been designed to primarily evaluate the extent to which OMT is effective in reducing pain in preterms. One hundred and twenty newborns will be enrolled from one tertiary neonatal intensive care unit in central Italy and randomised in three groups: study, sham and control. The study group will be further prospectively randomised in two subgroups: experienced osteopaths and students. All preterms will receive standard medical care. Osteopathic treatment will be applied to the study group only whilst 'soft touch' will be administer to the sham group only. Newborns will undergo manual sessions once a week for the entire period of hospitalisation. Blinding will be assured for neonatal staff and outcome assessor. Primary outcome will be the mean difference in baseline score changes of PIPP questionnaire between discharge and entry among the three groups. Secondary outcomes will be: mean difference in length of stay and costs between groups. Statistical analyses will use per-protocol analysis method. Missing data will be handled using last observation carried forward imputation technique. The present single blinded randomised controlled trial has been designed to explore potential advantages of OMT in the management of newborns' pain. Currently, based on a patient-centred need-based approach, this research will be looking at the benefit of osteopathic care rather than the efficacy of a specific technique or a pre-determined protocol. The protocol has been registered on ClinicalTrials.gov ( NCT02146677 ) on 20 May 2014.
Quantifying receptor trafficking and colocalization with confocal microscopy.
Pike, Jeremy A; Styles, Iain B; Rappoport, Joshua Z; Heath, John K
2017-02-15
Confocal microscopy is a powerful tool for the study of cellular receptor trafficking and endocytosis. Unbiased and robust image analysis workflows are required for the identification, and study, of aberrant trafficking. After a brief review of related strategies, identifying both good and bad practice, custom workflows for the analysis of live cell 3D time-lapse data are presented. Strategies for data pre-processing, including denoising and background subtraction are considered. We use a 3D level set protocol to accurately segment cells using only the signal from fluorescently labelled receptor. A protocol for the quantification of changes to subcellular receptor distribution over time is then presented. As an example, ligand stimulated trafficking of epidermal growth factor receptor (EGFR) is shown to be significantly reduced in both AG1478 and Dynasore treated cells. Protocols for the quantitative analysis of colocalization between receptor and endosomes are also introduced, including strategies for signal isolation and statistical testing. By calculating the Manders and Pearson coefficients, both co-occurrence and correlation can be assessed. A statistically significant decrease in the level of ligand induced co-occurrence between EGFR and rab5 positive endosomes is demonstrated for both the AG1478 and Dynasore treated cells relative to a control. Finally, a strategy for the visualisation of co-occurrence is presented, which provides an unbiased alternative to colour overlays. Copyright © 2017 The Author(s). Published by Elsevier Inc. All rights reserved.
Palmer, Suetonia C; Ruospo, Marinella; Barulli, Maria Rosaria; Iurillo, Annalisa; Saglimbene, Valeria; Natale, Patrizia; Gargano, Letizia; Murgo, Angelo M; Loy, Clement; van Zwieten, Anita; Wong, Germaine; Tortelli, Rosanna; Craig, Jonathan C; Johnson, David W; Tonelli, Marcello; Hegbrant, Jörgen; Wollheim, Charlotta; Logroscino, Giancarlo; Strippoli, G F M
2015-12-09
The prevalence of cognitive impairment may be increased in adults with end-stage kidney disease compared with the general population. However, the specific patterns of cognitive impairment and association of cognitive dysfunction with activities of daily living and clinical outcomes (including withdrawal from treatment) among haemodialysis patients remain incompletely understood. The COGNITIVE impairment in adults with end-stage kidney disease treated with HemoDialysis (COGNITIVE-HD) study aims to characterise the age-adjusted and education-adjusted patterns of cognitive impairment (using comprehensive testing for executive function, perceptual-motor function, language, learning and memory, and complex attention) in patients on haemodialysis and association with clinical outcomes. A prospective, longitudinal, cohort study of 750 adults with end-stage kidney disease treated with long-term haemodialysis has been recruited within haemodialysis centres in Italy (July 2013 to April 2014). Testing for neurocognitive function was carried out by a trained psychologist at baseline to assess cognitive functioning. The primary study factor is cognitive impairment and secondary study factors will be specific domains of cognitive function. The primary outcome will be total mortality. Secondary outcomes will be cause-specific mortality, major cardiovascular events, fatal and non-fatal myocardial infarction and stroke, institutionalisation, and withdrawal from treatment at 12 months. This protocol was approved before study conduct by the following responsible ethics committees: Catania (approval reference 186/BE; 26/09/2013), Agrigento (protocol numbers 61-62; 28/6/2013), USL Roma C (CE 39217; 24/6/2013), USL Roma F (protocol number 0041708; 23/7/2013), USL Latina (protocol number 20090/A001/2011; 12/7/2013), Trapani (protocol number 3413; 16/7/2013) and Brindisi (protocol number 40259; 6/6/2013). All participants have provided written and informed consent and can withdraw from the study at any time. The findings of the study will be disseminated through peer-reviewed journals and national and international conference presentations and to the participants through communication within the dialysis network in which this study is conducted. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/
Implementation of Siemens USS protocol into LabVIEW.
Hosek, P; Diblik, M
2011-10-01
This article gives basic overview of the USS protocol as a communication interface to drive Siemens frequency inverters. It presents our implementation of this protocol into LabVIEW, as there was permanent demand from the community of the users to have native LabVIEW implementation of the USS protocol. It also states encountered problems and their solutions. Copyright © 2011 Society for Laboratory Automation and Screening. Published by Elsevier Inc. All rights reserved.
An economic and feasible Quantum Sealed-bid Auction protocol
NASA Astrophysics Data System (ADS)
Zhang, Rui; Shi, Run-hua; Qin, Jia-qi; Peng, Zhen-wan
2018-02-01
We present an economic and feasible Quantum Sealed-bid Auction protocol using quantum secure direct communication based on single photons in both the polarization and the spatial-mode degrees of freedom, where each single photon can carry two bits of classical information. Compared with previous protocols, our protocol has higher efficiency. In addition, we propose a secure post-confirmation mechanism without quantum entanglement to guarantee the security and the fairness of the auction.
Multi-party quantum key agreement protocol secure against collusion attacks
NASA Astrophysics Data System (ADS)
Wang, Ping; Sun, Zhiwei; Sun, Xiaoqiang
2017-07-01
The fairness of a secure multi-party quantum key agreement (MQKA) protocol requires that all involved parties are entirely peer entities and can equally influence the outcome of the protocol to establish a shared key wherein no one can decide the shared key alone. However, it is found that parts of the existing MQKA protocols are sensitive to collusion attacks, i.e., some of the dishonest participants can collaborate to predetermine the final key without being detected. In this paper, a multi-party QKA protocol resisting collusion attacks is proposed. Different from previous QKA protocol resisting N-1 coconspirators or resisting 1 coconspirators, we investigate the general circle-type MQKA protocol which can be secure against t dishonest participants' cooperation. Here, t < N. We hope the results of the presented paper will be helpful for further research on fair MQKA protocols.
Fully Integrated Passive UHF RFID Tag for Hash-Based Mutual Authentication Protocol.
Mikami, Shugo; Watanabe, Dai; Li, Yang; Sakiyama, Kazuo
2015-01-01
Passive radio-frequency identification (RFID) tag has been used in many applications. While the RFID market is expected to grow, concerns about security and privacy of the RFID tag should be overcome for the future use. To overcome these issues, privacy-preserving authentication protocols based on cryptographic algorithms have been designed. However, to the best of our knowledge, evaluation of the whole tag, which includes an antenna, an analog front end, and a digital processing block, that runs authentication protocols has not been studied. In this paper, we present an implementation and evaluation of a fully integrated passive UHF RFID tag that runs a privacy-preserving mutual authentication protocol based on a hash function. We design a single chip including the analog front end and the digital processing block. We select a lightweight hash function supporting 80-bit security strength and a standard hash function supporting 128-bit security strength. We show that when the lightweight hash function is used, the tag completes the protocol with a reader-tag distance of 10 cm. Similarly, when the standard hash function is used, the tag completes the protocol with the distance of 8.5 cm. We discuss the impact of the peak power consumption of the tag on the distance of the tag due to the hash function.
Ricci, Natalia Aquaroni; Aratani, Mayra Cristina; Caovilla, Heloísa Helena; Ganança, Fernando Freitas
2016-04-01
The aim of this study was to compare the effects of vestibular rehabilitation protocols on balance control in elderly with dizziness. This is a randomized clinical trial with 3-mo follow-up period. The sample was composed of 82 older individuals with chronic dizziness from vestibular disorders. The control group was treated according to the Conventional Cawthorne & Cooksey protocol (n = 40), and the experimental group was submitted to a Multimodal Cawthorne & Cooksey protocol (n = 42). Measures included Dynamic Gait Index, fall history, hand grip strength, Time Up-and-Go Test, sit-to-stand test, multidirectional reach, and static balance tests. With the exception of history of falls, Forward Functional Reach, Unipedal Right and Left Leg Eyes Closed, and Sensorial Romberg Eyes Open, all outcomes improved after treatments. Such results persisted at follow-up period, with the exception of the Tandem Eyes Open and the Timed Up-and-Go manual. The between-group differences for Sensorial Romberg Eyes Closed (4.27 secs) and Unipedal Left Leg Eyes Open (4.08 secs) were significant after treatment, favoring the Multimodal protocol. Both protocols resulted in improvement on elderly's balance control, which was maintained during a short-term period. The multimodal protocol presented better performance on specific static balance tests.
Jasińska, Kaja K; Guei, Sosthène
2018-02-02
Portable neuroimaging approaches provide new advances to the study of brain function and brain development with previously inaccessible populations and in remote locations. This paper shows the development of field functional Near Infrared Spectroscopy (fNIRS) imaging to the study of child language, reading, and cognitive development in a rural village setting of Côte d'Ivoire. Innovation in methods and the development of culturally appropriate neuroimaging protocols allow a first-time look into the brain's development and children's learning outcomes in understudied environments. This paper demonstrates protocols for transporting and setting up a mobile laboratory, discusses considerations for field versus laboratory neuroimaging, and presents a guide for developing neuroimaging consent procedures and building meaningful long-term collaborations with local government and science partners. Portable neuroimaging methods can be used to study complex child development contexts, including the impact of significant poverty and adversity on brain development. The protocol presented here has been developed for use in Côte d'Ivoire, the world's primary source of cocoa, and where reports of child labor in the cocoa sector are common. Yet, little is known about the impact of child labor on brain development and learning. Field neuroimaging methods have the potential to yield new insights into such urgent issues, and the development of children globally.
Khan, Anwar; Ali, Ihsan; Ghani, Abdullah; Khan, Nawsher; Alsaqer, Mohammed; Rahman, Atiq Ur; Mahmood, Hasan
2018-05-18
Recent research in underwater wireless sensor networks (UWSNs) has gained the attention of researchers in academia and industry for a number of applications. They include disaster and earthquake prediction, water quality and environment monitoring, leakage and mine detection, military surveillance and underwater navigation. However, the aquatic medium is associated with a number of limitations and challenges: long multipath delay, high interference and noise, harsh environment, low bandwidth and limited battery life of the sensor nodes. These challenges demand research techniques and strategies to be overcome in an efficient and effective fashion. The design of routing protocols for UWSNs is one of the promising solutions to cope with these challenges. This paper presents a survey of the routing protocols for UWSNs. For the ease of description, the addressed routing protocols are classified into two groups: localization-based and localization-free protocols. These groups are further subdivided according to the problems they address or the major parameters they consider during routing. Unlike the existing surveys, this survey considers only the latest and state-of-the-art routing protocols. In addition, every protocol is described in terms of its routing strategy and the problem it addresses and solves. The merit(s) of each protocol is (are) highlighted along with the cost. A description of the protocols in this fashion has a number of advantages for researchers, as compared to the existing surveys. Firstly, the description of the routing strategy of each protocol makes its routing operation easily understandable. Secondly, the demerit(s) of a protocol provides (provide) insight into overcoming its flaw(s) in future investigation. This, in turn, leads to the foundation of new protocols that are more intelligent, robust and efficient with respect to the desired parameters. Thirdly, a protocol can be selected for the appropriate application based on its described merit(s). Finally, open challenges and research directions are presented for future investigation.
Ghani, Abdullah; Alsaqer, Mohammed; Rahman, Atiq Ur; Mahmood, Hasan
2018-01-01
Recent research in underwater wireless sensor networks (UWSNs) has gained the attention of researchers in academia and industry for a number of applications. They include disaster and earthquake prediction, water quality and environment monitoring, leakage and mine detection, military surveillance and underwater navigation. However, the aquatic medium is associated with a number of limitations and challenges: long multipath delay, high interference and noise, harsh environment, low bandwidth and limited battery life of the sensor nodes. These challenges demand research techniques and strategies to be overcome in an efficient and effective fashion. The design of routing protocols for UWSNs is one of the promising solutions to cope with these challenges. This paper presents a survey of the routing protocols for UWSNs. For the ease of description, the addressed routing protocols are classified into two groups: localization-based and localization-free protocols. These groups are further subdivided according to the problems they address or the major parameters they consider during routing. Unlike the existing surveys, this survey considers only the latest and state-of-the-art routing protocols. In addition, every protocol is described in terms of its routing strategy and the problem it addresses and solves. The merit(s) of each protocol is (are) highlighted along with the cost. A description of the protocols in this fashion has a number of advantages for researchers, as compared to the existing surveys. Firstly, the description of the routing strategy of each protocol makes its routing operation easily understandable. Secondly, the demerit(s) of a protocol provides (provide) insight into overcoming its flaw(s) in future investigation. This, in turn, leads to the foundation of new protocols that are more intelligent, robust and efficient with respect to the desired parameters. Thirdly, a protocol can be selected for the appropriate application based on its described merit(s). Finally, open challenges and research directions are presented for future investigation. PMID:29783686
Weitzman, Patricia Flynn; Weitzman, Eben A
2003-07-01
In this paper, we review the importance of effective communication in older adulthood, and ideas for promoting it. We focus on theoretical and applied work in two communicative encounters that have particular relevance for older adult health, i.e., interpersonal conflict and visits with a healthcare provider. Little applied work has aimed to adapt training protocols for older adults in these two areas. We will present training protocols we have developed in constructive conflict resolution for older adults, and on enhancing doctor-patient communication. We present these protocols to stimulate ideas on the part of the reader on how to further develop and refine training efforts for older adults in effective communication.
Exploratory Evaluation of a School-Based Child Sexual Abuse Prevention Program
ERIC Educational Resources Information Center
Barron, Ian G.; Topping, Keith J.
2013-01-01
Internationally, efficacy studies of school-based child sexual abuse prevention programs display a series of methodological shortcomings. Few studies include adolescent participants, recording of disclosures has been inconsistent, and no studies to date have assessed presenter adherence to program protocols or summated the costs of program…
Huser, Vojtech; Sastry, Chandan; Breymaier, Matthew; Idriss, Asma; Cimino, James J
2015-10-01
Efficient communication of a clinical study protocol and case report forms during all stages of a human clinical study is important for many stakeholders. An electronic and structured study representation format that can be used throughout the whole study life-span can improve such communication and potentially lower total study costs. The most relevant standard for representing clinical study data, applicable to unregulated as well as regulated studies, is the Operational Data Model (ODM) in development since 1999 by the Clinical Data Interchange Standards Consortium (CDISC). ODM's initial objective was exchange of case report forms data but it is increasingly utilized in other contexts. An ODM extension called Study Design Model, introduced in 2011, provides additional protocol representation elements. Using a case study approach, we evaluated ODM's ability to capture all necessary protocol elements during a complete clinical study lifecycle in the Intramural Research Program of the National Institutes of Health. ODM offers the advantage of a single format for institutions that deal with hundreds or thousands of concurrent clinical studies and maintain a data warehouse for these studies. For each study stage, we present a list of gaps in the ODM standard and identify necessary vendor or institutional extensions that can compensate for such gaps. The current version of ODM (1.3.2) has only partial support for study protocol and study registration data mainly because it is outside the original development goal. ODM provides comprehensive support for representation of case report forms (in both the design stage and with patient level data). Inclusion of requirements of observational, non-regulated or investigator-initiated studies (outside Food and Drug Administration (FDA) regulation) can further improve future revisions of the standard. Published by Elsevier Inc.
Jiménez-Naharro, Raúl; Gómez-Bravo, Fernando; Medina-García, Jonathan; Sánchez-Raya, Manuel; Gómez-Galán, Juan Antonio
2017-01-01
This paper presents a study about hardware attacking and clock signal vulnerability. It considers a particular type of attack on the clock signal in the I2C protocol, and proposes the design of a new sensor for detecting and defending against this type of perturbation. The analysis of the attack and the defense is validated by means of a configurable experimental platform that emulates a differential drive robot. A set of experimental results confirm the interest of the studied vulnerabilities and the efficiency of the proposed sensor in defending against this type of situation. PMID:28346337
Physical aquatic habitat assessment data, Ozark plateaus, Missouri and Arkansas
Jacobson, Robert B.; Johnson, Harold E.; Reuter, Joanna M.; Wright, Maria Panfil
2004-01-01
This report presents data from two related studies on physical habitat in small streams in the Ozark Plateaus Physiographic Province of Missouri and Arkansas. Seventy stream reaches and their contributing drainage basins were assessed using a physical habitat protocol designed to optimize understanding of how stream reach characteristics relate to drainage-basin characteristics. Drainage-basin characteristics were evaluated using geographic information system (GIS) techniques and datasets designed to evaluate the geologic, physiographic, and land-use characteristics of encompassing drainage basins. Reach characteristics were evaluated using a field-based geomorphology and habitat protocol. The data are intended to complement ecological studies on Ozark Plateaus streams.
Distributed synchronization of networked drive-response systems: A nonlinear fixed-time protocol.
Zhao, Wen; Liu, Gang; Ma, Xi; He, Bing; Dong, Yunfeng
2017-11-01
The distributed synchronization of networked drive-response systems is investigated in this paper. A novel nonlinear protocol is proposed to ensure that the tracking errors converge to zeros in a fixed-time. By comparison with previous synchronization methods, the present method considers more practical conditions and the synchronization time is not dependent of arbitrary initial conditions but can be offline pre-assign according to the task assignment. Finally, the feasibility and validity of the presented protocol have been illustrated by a numerical simulation. Copyright © 2017. Published by Elsevier Ltd.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Flewett, S.; Saintenoy, T.; Sepulveda, M.
Archeological ceramic paste material typically consists of a mix of a clay matrix and various millimeter and sub-millimeter sized mineral inclusions. Micro X-ray Fluorescence (μXRF) is a standard compositional classification tool, and in this work we propose and demonstrate an improved fluorescence map processing protocol where the mineral inclusions are automatically separated from the clay matrix to allow independent statistical analysis of the two parts. Application of this protocol allowed us to improve enhance the differentiation discrimination between different ceramic shards compared with the standard procedure of comparing working with only the spatially averaged elemental concentrations. Using the new protocol,more » we performed an initial compositional classification of a set of 83 ceramic shards from the western slopes of the south central Andean region in the Arica y Parinacota region of present-day far northern Chile. Comparing the classifications obtained using the new versus the old (average concentrations only) protocols, we found that some samples were erroneously classified with the old protocol. From an archaeological perspective, a very broad and heterogeneous sample set was used in this study due to the fact that this was the first such study to be performed on ceramics from this region. This allowed a general overview to be obtained, however further work on more specific sample sets will be necessary to extract concrete archaeological conclusions.« less
Bušić, Mladen; Bjeloš, Mirjana; Petrovečki, Mladen; Kuzmanović Elabjer, Biljana; Bosnar, Damir; Ramić, Senad; Miletić, Daliborka; Andrijašević, Lidija; Kondža Krstonijević, Edita; Jakovljević, Vid; Bišćan Tvrdi, Ana; Predović, Jurica; Kokot, Antonio; Bišćan, Filip; Kovačević Ljubić, Mirna; Motušić Aras, Ranka
2016-02-01
To present and evaluate a new screening protocol for amblyopia in preschool children. Zagreb Amblyopia Preschool Screening (ZAPS) study protocol performed screening for amblyopia by near and distance visual acuity (VA) testing of 15 648 children aged 48-54 months attending kindergartens in the City of Zagreb County between September 2011 and June 2014 using Lea Symbols in lines test. If VA in either eye was >0.1 logMAR, the child was re-tested, if failed at re-test, the child was referred to comprehensive eye examination at the Eye Clinic. 78.04% of children passed the screening test. Estimated prevalence of amblyopia was 8.08%. Testability, sensitivity, and specificity of the ZAPS study protocol were 99.19%, 100.00%, and 96.68% respectively. The ZAPS study used the most discriminative VA test with optotypes in line as they do not underestimate amblyopia. The estimated prevalence of amblyopia was considerably higher than reported elsewhere. To the best of our knowledge, the ZAPS study protocol reached the highest sensitivity and specificity when evaluating diagnostic accuracy of VA tests for screening. The pass level defined at ≤0.1 logMAR for 4-year-old children, using Lea Symbols in lines missed no amblyopia cases, advocating that both near and distance VA testing should be performed when screening for amblyopia.
Bušić, Mladen; Bjeloš, Mirjana; Petrovečki, Mladen; Kuzmanović Elabjer, Biljana; Bosnar, Damir; Ramić, Senad; Miletić, Daliborka; Andrijašević, Lidija; Kondža Krstonijević, Edita; Jakovljević, Vid; Bišćan Tvrdi, Ana; Predović, Jurica; Kokot, Antonio; Bišćan, Filip; Kovačević Ljubić, Mirna; Motušić Aras, Ranka
2016-01-01
Aim To present and evaluate a new screening protocol for amblyopia in preschool children. Methods Zagreb Amblyopia Preschool Screening (ZAPS) study protocol performed screening for amblyopia by near and distance visual acuity (VA) testing of 15 648 children aged 48-54 months attending kindergartens in the City of Zagreb County between September 2011 and June 2014 using Lea Symbols in lines test. If VA in either eye was >0.1 logMAR, the child was re-tested, if failed at re-test, the child was referred to comprehensive eye examination at the Eye Clinic. Results 78.04% of children passed the screening test. Estimated prevalence of amblyopia was 8.08%. Testability, sensitivity, and specificity of the ZAPS study protocol were 99.19%, 100.00%, and 96.68% respectively. Conclusion The ZAPS study used the most discriminative VA test with optotypes in lines as they do not underestimate amblyopia. The estimated prevalence of amblyopia was considerably higher than reported elsewhere. To the best of our knowledge, the ZAPS study protocol reached the highest sensitivity and specificity when evaluating diagnostic accuracy of VA tests for screening. The pass level defined at ≤0.1 logMAR for 4-year-old children, using Lea Symbols in lines missed no amblyopia cases, advocating that both near and distance VA testing should be performed when screening for amblyopia. PMID:26935612
Experimental purification of single qubits.
Ricci, M; De Martini, F; Cerf, N J; Filip, R; Fiurásek, J; Macchiavello, C
2004-10-22
We report the experimental realization of the purification protocol for single qubits sent through a depolarizing channel. The qubits are associated with polarization states of single photons and the protocol is achieved by means of passive linear optical elements. The present approach may represent a convenient alternative to the distillation and error correction protocols of quantum information.
Semi-Structured Interview Protocol for Constructing Logic Models
ERIC Educational Resources Information Center
Gugiu, P. Cristian; Rodriguez-Campos, Liliana
2007-01-01
This paper details a semi-structured interview protocol that evaluators can use to develop a logic model of a program's services and outcomes. The protocol presents a series of questions, which evaluators can ask of specific program informants, that are designed to: (1) identify key informants basic background and contextual information, (2)…
Using Green Star Metrics to Optimize the Greenness of Literature Protocols for Syntheses
ERIC Educational Resources Information Center
Duarte, Rita C. C.; Ribeiro, M. Gabriela T. C.; Machado, Adélio A. S. C.
2015-01-01
A procedure to improve the greenness of a synthesis, without performing laboratory work, using alternative protocols available in the literature is presented. The greenness evaluation involves the separate assessment of the different steps described in the available protocols--reaction, isolation, and purification--as well as the global process,…
Student Non-Suicidal Self-Injury: A Protocol for School Counselors
ERIC Educational Resources Information Center
Stargell, Nicole A.; Zoldan, Chelsey A.; Kress, Victoria E.; Walker-Andrews, Laura M.; Whisenhunt, Julia L.
2018-01-01
Schools have a demonstrated need for student non-suicidal self-injury protocols and school counselors play an important role in the development and implementation of such procedures. This article presents an overview of school counselor considerations related to developing and implementing a self-injury protocol. It provides an example of a…
SCPS-TP: A Satellite-Enhanced TCP
NASA Technical Reports Server (NTRS)
Scott, Keith; Torgerson, Leigh
2004-01-01
This viewgraph presentation reviews the Space Communications Protocol Standard Transport Protocol (SCPS-TP) which is a satellite enhanced Transport Control Protocol (TCP). The contents include: 1) Purpose; 2) Background; 3) Stressed Communication Environments; 4) SCPS-TP Features; 5) SCPS-TP Performance; 6) Performance Enhancing Proxies (PEPs); and 7) Ongoing and Future SCPS-TP Work.
A Protocol for Advanced Psychometric Assessment of Surveys
Squires, Janet E.; Hayduk, Leslie; Hutchinson, Alison M.; Cranley, Lisa A.; Gierl, Mark; Cummings, Greta G.; Norton, Peter G.; Estabrooks, Carole A.
2013-01-01
Background and Purpose. In this paper, we present a protocol for advanced psychometric assessments of surveys based on the Standards for Educational and Psychological Testing. We use the Alberta Context Tool (ACT) as an exemplar survey to which this protocol can be applied. Methods. Data mapping, acceptability, reliability, and validity are addressed. Acceptability is assessed with missing data frequencies and the time required to complete the survey. Reliability is assessed with internal consistency coefficients and information functions. A unitary approach to validity consisting of accumulating evidence based on instrument content, response processes, internal structure, and relations to other variables is taken. We also address assessing performance of survey data when aggregated to higher levels (e.g., nursing unit). Discussion. In this paper we present a protocol for advanced psychometric assessment of survey data using the Alberta Context Tool (ACT) as an exemplar survey; application of the protocol to the ACT survey is underway. Psychometric assessment of any survey is essential to obtaining reliable and valid research findings. This protocol can be adapted for use with any nursing survey. PMID:23401759
Entanglement-secured single-qubit quantum secret sharing
DOE Office of Scientific and Technical Information (OSTI.GOV)
Scherpelz, P.; Resch, R.; Berryrieser, D.
In single-qubit quantum secret sharing, a secret is shared between N parties via manipulation and measurement of one qubit at a time. Each qubit is sent to all N parties in sequence; the secret is encoded in the first participant's preparation of the qubit state and the subsequent participants' choices of state rotation or measurement basis. We present a protocol for single-qubit quantum secret sharing using polarization entanglement of photon pairs produced in type-I spontaneous parametric downconversion. We investigate the protocol's security against eavesdropping attack under common experimental conditions: a lossy channel for photon transmission, and imperfect preparation of themore » initial qubit state. A protocol which exploits entanglement between photons, rather than simply polarization correlation, is more robustly secure. We implement the entanglement-based secret-sharing protocol with 87% secret-sharing fidelity, limited by the purity of the entangled state produced by our present apparatus. We demonstrate a photon-number splitting eavesdropping attack, which achieves no success against the entanglement-based protocol while showing the predicted rate of success against a correlation-based protocol.« less
A randomized trial of protocol-based care for early septic shock.
Yealy, Donald M; Kellum, John A; Huang, David T; Barnato, Amber E; Weissfeld, Lisa A; Pike, Francis; Terndrup, Thomas; Wang, Henry E; Hou, Peter C; LoVecchio, Frank; Filbin, Michael R; Shapiro, Nathan I; Angus, Derek C
2014-05-01
In a single-center study published more than a decade ago involving patients presenting to the emergency department with severe sepsis and septic shock, mortality was markedly lower among those who were treated according to a 6-hour protocol of early goal-directed therapy (EGDT), in which intravenous fluids, vasopressors, inotropes, and blood transfusions were adjusted to reach central hemodynamic targets, than among those receiving usual care. We conducted a trial to determine whether these findings were generalizable and whether all aspects of the protocol were necessary. In 31 emergency departments in the United States, we randomly assigned patients with septic shock to one of three groups for 6 hours of resuscitation: protocol-based EGDT; protocol-based standard therapy that did not require the placement of a central venous catheter, administration of inotropes, or blood transfusions; or usual care. The primary end point was 60-day in-hospital mortality. We tested sequentially whether protocol-based care (EGDT and standard-therapy groups combined) was superior to usual care and whether protocol-based EGDT was superior to protocol-based standard therapy. Secondary outcomes included longer-term mortality and the need for organ support. We enrolled 1341 patients, of whom 439 were randomly assigned to protocol-based EGDT, 446 to protocol-based standard therapy, and 456 to usual care. Resuscitation strategies differed significantly with respect to the monitoring of central venous pressure and oxygen and the use of intravenous fluids, vasopressors, inotropes, and blood transfusions. By 60 days, there were 92 deaths in the protocol-based EGDT group (21.0%), 81 in the protocol-based standard-therapy group (18.2%), and 86 in the usual-care group (18.9%) (relative risk with protocol-based therapy vs. usual care, 1.04; 95% confidence interval [CI], 0.82 to 1.31; P=0.83; relative risk with protocol-based EGDT vs. protocol-based standard therapy, 1.15; 95% CI, 0.88 to 1.51; P=0.31). There were no significant differences in 90-day mortality, 1-year mortality, or the need for organ support. In a multicenter trial conducted in the tertiary care setting, protocol-based resuscitation of patients in whom septic shock was diagnosed in the emergency department did not improve outcomes. (Funded by the National Institute of General Medical Sciences; ProCESS ClinicalTrials.gov number, NCT00510835.).
Bridge, Heather; Smolskis, Mary; Bianchine, Peter; Dixon, Dennis O.; Kelly, Grace; Herpin, Betsey; Tavel, Jorge
2009-01-01
Background: A clinical research protocol document must reflect both sound scientific rationale as well as local, national and, when applicable, international regulatory and human subject protections requirements. These requirements originate from a variety of sources, undergo frequent revision and are subject to interpretation. Tools to assist clinical investigators in the production of clinical protocols could facilitate navigating these requirements and ultimately increase the efficiency of clinical research. Purpose: The National Institute of Allergy and Infectious Diseases (NIAID) developed templates for investigators to serve as the foundation for protocol development. These protocol templates are designed as tools to support investigators in developing clinical protocols. Methods: NIAID established a series of working groups to determine how to improve its capacity to conduct clinical research more efficiently and effectively. The Protocol Template Working Group was convened to determine what protocol templates currently existed within NIAID and whether standard NIAID protocol templates should be produced. After review and assessment of existing protocol documents and requirements, the group reached consensus about required and optional content, determined the format and identified methods for distribution as well as education of investigators in the use of these templates. Results: The templates were approved by the NIAID Executive Committee in 2006 and posted as part of the NIAID Clinical Research Toolkit[1]website for broad access. These documents require scheduled revisions to stay current with regulatory and policy changes. Limitations: The structure of any clinical protocol template, whether comprehensive or specific to a particular study phase, setting or design, affects how it is used by investigators. Each structure presents its own set of advantages and disadvantages. While useful, protocol templates are not stand-alone tools for creating an optimal protocol document but must be complemented by institutional resources and support. Education and guidance of investigators in the appropriate use of templates is necessary to ensure a complete yet concise protocol document. Due to changing regulatory requirements, clinical protocol templates cannot become static but require frequent revisions. Conclusions: Standard protocol templates that meet applicable regulations can be important tools to assist investigators in the effective conduct of clinical research, but they require dedicated resources and ongoing input from key stakeholders. PMID:19625326
Abbaszadeh-Amirdehi, Maryam; Ansari, Noureddin Nakhostin; Naghdi, Soofia; Olyaei, Gholamreza; Nourbakhsh, Mohammad Reza
2013-01-01
Introduction Dry needling (DN) is an effective method for the treatment of myofascial trigger points (MTrPs). There is no report on the neurophysiological effects of DN in patients with MTrPs. The aim of the present study will be to assess the immediate neurophysiological efficacy of deep DN in patients with upper trapezius MTrPs. Methods and analysis A prospective, controlled clinical trial was designed to include patients with upper trapezius MTrPs and volunteered healthy participants to receive one session of DN. The primary outcome measures are neuromuscular junction response and sympathetic skin response. The secondary outcomes are pain intensity and pressure pain threshold. Data will be collected at baseline and immediately after intervention. Ethics and dissemination This study protocol has been approved by the Research Council, School of Rehabilitation and the Ethics Committee of Tehran University of Medical Sciences. The results of the study will be disseminated in a peer-reviewed journal and presented at international congresses. PMID:23793673
Queiroz, Polyane Mazucatto; Santaella, Gustavo Machado; Capelozza, Ana Lúcia Alvares; Rosalen, Pedro Luiz; Freitas, Deborah Queiroz; Haiter-Neto, Francisco
2018-04-01
This study evaluated the image quality and the diagnosis of root fractures when using the Zoom Reconstruction tool (J Morita, Kyoto, Japan). A utility wax phantom with a metal sample inside was used for objective evaluation, and a mandible with 27 single-rooted teeth (with and without obturation and with and without vertical or horizontal fractures) was used for diagnostic evaluation. The images were acquired in 3 protocols: protocol 1, field of view (FOV) of 4 × 4 cm and a voxel size of 0.08 mm; protocol 2, FOV of 10 × 10 cm and a voxel size of 0.2 mm; and protocol 3, Zoom Reconstruction of images from protocol 2 (FOV of 4 × 4 cm and a voxel size of 0.08 mm). The objective evaluation was achieved by measuring the image noise, and the diagnosis of fractures was performed by 3 evaluators. The area under the receiver operating characteristic curve was used to calculate accuracy, and analysis of variance compared the accuracy and image quality of the protocols. Regarding quality, protocol 1 was superior to protocol 2 (P < .0001) and Zoom Reconstruction (P < .0001). Additionally, images of protocol 2 presented less noise than the Zoom Reconstruction image (P < .0001); however, for diagnosis, Zoom Reconstruction was superior in relation to protocol 2 (P = .011) and did not differ from protocol 1 (P = .228) for the diagnosis of a vertical root fracture in filled teeth. The Zoom Reconstruction tool allows better accuracy for vertical root fracture detection in filled teeth, making it possible to obtain a higher-resolution image from a lower-resolution examination without having to expose the patient to more radiation. Copyright © 2017 American Association of Endodontists. Published by Elsevier Inc. All rights reserved.
Allen, Joselyn N; Dey, Adwitia; Nissly, Ruth; Fraser, James; Yu, Shan; Balandaram, Gayathri; Peters, Jeffrey M; Hankey-Giblin, Pamela A
2017-04-03
Obesity promotes a chronic inflammatory state that is largely mediated by tissue-resident macrophages as well as monocyte-derived macrophages. Diet-induced obesity (DIO) is a valuable model in studying the role of macrophage heterogeneity; however, adequate macrophage isolations are difficult to acquire from inflamed tissues. In this protocol, we outline the isolation steps and necessary troubleshooting guidelines derived from our studies for obtaining a suitable population of tissue-resident macrophages from mice following 18 weeks of high-fat (HFD) or high-fat/high-cholesterol (HFHCD) diet intervention. This protocol focuses on three hallmark tissues studied in obesity and atherosclerosis including the liver, white adipose tissues (WAT), and the aorta. We highlight how dualistic usage of flow cytometry can achieve a new dimension of isolation and characterization of tissue-resident macrophages. A fundamental section of this protocol addresses the intricacies underlying tissue-specific enzymatic digestions and macrophage isolation, and subsequent cell-surface antibody staining for flow cytometric analysis. This protocol addresses existing complexities underlying fluorescent-activated cell sorting (FACS) and presents clarifications to these complexities so as to obtain broad range characterization from adequately sorted cell populations. Alternate enrichment methods are included for sorting cells, such as the dense liver, allowing for flexibility and time management when working with FACS. In brief, this protocol aids the researcher to evaluate macrophage heterogeneity from a multitude of inflamed tissues in a given study and provides insightful troubleshooting tips that have been successful for favorable cellular isolation and characterization of immune cells in DIO-mediated inflammation.
Chesnut, Randall M; Temkin, Nancy; Dikmen, Sureyya; Rondina, Carlos; Videtta, Walter; Petroni, Gustavo; Lujan, Silvia; Alanis, Victor; Falcao, Antonio; de la Fuenta, Gustavo; Gonzalez, Luis; Jibaja, Manuel; Lavarden, Arturo; Sandi, Freddy; Mérida, Roberto; Romero, Ricardo; Pridgeon, Jim; Barber, Jason; Machamer, Joan; Chaddock, Kelley
2018-01-01
The imaging and clinical examination (ICE) algorithm used in the Benchmark Evidence from South American Trials: Treatment of Intracranial Pressure (BEST TRIP) randomized controlled trial is the only prospectively investigated clinical protocol for traumatic brain injury management without intracranial pressure (ICP) monitoring. As the default literature standard, it warrants careful evaluation. We present the ICE protocol in detail and analyze the demographics, outcome, treatment intensity, frequency of intervention usage, and related adverse events in the ICE-protocol cohort. The 167 ICE protocol patients were young (median 29 years) with a median Glasgow Coma Scale motor score of 4 but with anisocoria or abnormal pupillary reactivity in 40%. This protocol produced outcomes not significantly different from those randomized to the monitor-based protocol (favorable 6-month extended Glasgow Outcome Score in 39%; 41% mortality rate). Agents commonly employed to treat suspected intracranial hypertension included low-/moderate-dose hypertonic saline (72%) and mannitol (57%), mild hyperventilation (adjusted partial pressure of carbon dioxide 30-35 mm Hg in 73%), and pressors to maintain cerebral perfusion (62%). High-dose hyperosmotics or barbiturates were uncommonly used. Adverse event incidence was low and comparable to the BEST TRIP monitored group. Although this protocol should produce similar/acceptable results under circumstances comparable to those in the trial, influences such as longer pre-hospital times and non-specialist transport personnel, plus an intensive care unit model of aggressive physician-intensive care by small groups of neurotrauma-focused intensivists, which differs from most high-resource models, support caution in expecting the same results in dissimilar settings. Finally, this protocol's ICP-titration approach to suspected intracranial hypertension (vs. crisis management for monitored ICP) warrants further study.
Ngo, Thoai D; Park, Min Hae; Xiao, Yuanhong
2012-01-01
To compare the effectiveness, in terms of complete abortion, of the World Health Organization (WHO)- and the China-recommended protocol for first-trimester medical abortion. A retrospective analysis of clinical data from women presenting for first trimester medical abortion between January 2009 and August 2010 at reproductive health clinics in Qingdao, Xi'an, Nanjing, Nanning, and Zhengzhou was conducted. One clinic in Qingdao administered the WHO-recommended protocol (200 mg mifepristone orally followed by 0.8 mg misoprostol buccally 36-48 hours later). Four clinics in the other locations provided the China-recommended procedure (Day 1: 50 mg of mifepristone in the morning, 25 mg in the afternoon; Day 2: 50 mg of mifepristone in the morning, 25 mg in the afternoon; Day 3: 0.6 mg oral misoprostol). Data on reproductive and demographic characteristics were extracted from clinic records, and complete termination was determined on day 14 (post-mifepristone administration). A total of 337 women underwent early medical abortion (167 WHO- and 170 China-recommended procedures). Complete abortion was significantly higher among women who had the WHO protocol than those who received the China protocol (91.0% vs 77.7%, respectively; P < 0.001). Women using the China-recommended protocol were three times more likely to require an additional dose of misoprostol than women using the WHO protocol (21.8% vs 7.8%, respectively; P < 0.001), and had significantly more bleeding on the day of misoprostol administration (12.5 mL vs 18.5 mL; P < 0.001). This clinical audit provides preliminary evidence suggesting the WHO-recommended protocol may be more effective than the China-recommended protocol for early medical abortion. A larger scale study is necessary to compare the methods' effectiveness and acceptability.
Dalziel, Stuart R; Furyk, Jeremy; Bonisch, Megan; Oakley, Ed; Borland, Meredith; Neutze, Jocelyn; Donath, Susan; Sharpe, Cynthia; Harvey, Simon; Davidson, Andrew; Craig, Simon; Phillips, Natalie; George, Shane; Rao, Arjun; Cheng, Nicholas; Zhang, Michael; Sinn, Kam; Kochar, Amit; Brabyn, Christine; Babl, Franz E
2017-06-22
Convulsive status epilepticus (CSE) is the most common life-threatening childhood neurological emergency. Despite this, there is a lack of high quality evidence supporting medication use after first line benzodiazepines, with current treatment protocols based solely on non-experimental evidence and expert opinion. The current standard of care, phenytoin, is only 60% effective, and associated with considerable adverse effects. A newer anti-convulsant, levetiracetam, can be given faster, is potentially more efficacious, with a more tolerable side effect profile. The primary aim of the study presented in this protocol is to determine whether intravenous (IV) levetiracetam or IV phenytoin is the better second line treatment for the emergency management of CSE in children. 200 children aged between 3 months and 16 years presenting to 13 emergency departments in Australia and New Zealand with CSE, that has failed to stop with first line benzodiazepines, will be enrolled into this multicentre open randomised controlled trial. Participants will be randomised to 40 mg/kg IV levetiracetam infusion over 5 min or 20 mg/kg IV phenytoin infusion over 20 min. The primary outcome for the study is clinical cessation of seizure activity five minutes following the completion of the infusion of the study medication. Blinded confirmation of the primary outcome will occur with the primary outcome assessment being video recorded and assessed by a primary outcome assessment team blinded to treatment allocation. Secondary outcomes include: Clinical cessation of seizure activity at two hours; Time to clinical seizure cessation; Need for rapid sequence induction; Intensive care unit (ICU) admission; Serious adverse events; Length of Hospital/ICU stay; Health care costs; Seizure status/death at one-month post discharge. This paper presents the background, rationale, and design for a randomised controlled trial comparing levetiracetam to phenytoin in children presenting with CSE in whom benzodiazepines have failed. This study will provide the first high quality evidence for management of paediatric CSE post first-line benzodiazepines. Prospectively registered with the Australian and New Zealand Clinical Trial Registry (ANZCTR): ACTRN12615000129583 (11/2/2015). UTN U1111-1144-5272. ConSEPT protocol version 4 (12/12/2014).
Controlled mutual quantum entity authentication with an untrusted third party
NASA Astrophysics Data System (ADS)
Kang, Min-Sung; Heo, Jino; Hong, Chang-Ho; Yang, Hyung-Jin; Han, Sang-Wook; Moon, Sung
2018-07-01
We propose a quantum control entity mutual authentication protocol that can be executed in environments involving an untrusted third party. In general, the third party, referred to as Charlie, can be an entity such as a telephone company, server, financial company, or login webpage for a portal service. Most communication protocols controlled by third parties are vulnerable to internal attacks. In this study, we present two solutions that make use of an entanglement correlation checking method and random numbers against an internal attack by an untrusted third party.
A History of the Improvement of Internet Protocols Over Satellites Using ACTS
NASA Technical Reports Server (NTRS)
Allman, Mark; Kruse, Hans; Ostermann, Shawn
2000-01-01
This paper outlines the main results of a number of ACTS experiments on the efficacy of using standard Internet protocols over long-delay satellite channels. These experiments have been jointly conducted by NASAs Glenn Research Center and Ohio University over the last six years. The focus of our investigations has been the impact of long-delay networks with non-zero bit-error rates on the performance of the suite of Internet protocols. In particular, we have focused on the most widely used transport protocol, the Transmission Control Protocol (TCP), as well as several application layer protocols. This paper presents our main results, as well as references to more verbose discussions of our experiments.
Zuo, Shan; Song, Yongduan; Lewis, Frank L; Davoudi, Ali
2017-01-04
This paper studies the output containment control of linear heterogeneous multi-agent systems, where the system dynamics and even the state dimensions can generally be different. Since the states can have different dimensions, standard results from state containment control do not apply. Therefore, the control objective is to guarantee the convergence of the output of each follower to the dynamic convex hull spanned by the outputs of leaders. This can be achieved by making certain output containment errors go to zero asymptotically. Based on this formulation, two different control protocols, namely, full-state feedback and static output-feedback, are designed based on internal model principles. Sufficient local conditions for the existence of the proposed control protocols are developed in terms of stabilizing the local followers' dynamics and satisfying a certain H∞ criterion. Unified design procedures to solve the proposed two control protocols are presented by formulation and solution of certain local state-feedback and static output-feedback problems, respectively. Numerical simulations are given to validate the proposed control protocols.
Protocols for Molecular Dynamics Simulations of RNA Nanostructures.
Kim, Taejin; Kasprzak, Wojciech K; Shapiro, Bruce A
2017-01-01
Molecular dynamics (MD) simulations have been used as one of the main research tools to study a wide range of biological systems and bridge the gap between X-ray crystallography or NMR structures and biological mechanism. In the field of RNA nanostructures, MD simulations have been used to fix steric clashes in computationally designed RNA nanostructures, characterize the dynamics, and investigate the interaction between RNA and other biomolecules such as delivery agents and membranes.In this chapter we present examples of computational protocols for molecular dynamics simulations in explicit and implicit solvent using the Amber Molecular Dynamics Package. We also show examples of post-simulation analysis steps and briefly mention selected tools beyond the Amber package. Limitations of the methods, tools, and protocols are also discussed. Most of the examples are illustrated for a small RNA duplex (helix), but the protocols are applicable to any nucleic acid structure, subject only to the computational speed and memory limitations of the hardware available to the user.
NASA Technical Reports Server (NTRS)
Kiselyov, Oleg; Fisher, Paul
1995-01-01
This paper presents a case study of integration of compression techniques within a satellite image communication component of an actual tactical weather information dissemination system. The paper describes history and requirements of the project, and discusses the information flow, request/reply protocols, error handling, and, especially, system integration issues: specification of compression parameters and the place and time for compressor/decompressor plug-ins. A case for a non-uniform compression of satellite imagery is presented, and its implementation in the current system id demonstrated. The paper gives special attention to challenges of moving the system towards the use of standard, non-proprietary protocols (smtp and http) and new technologies (OpenDoc), and reports the ongoing work in this direction.
Real time UNIX in embedded control -- A case study within context of LynxOS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kleines, H.; Zwoll, K.
1996-02-01
Intelligent communication controllers for a layered protocol profile are a typical example of an embedded control application, where the classical approach for the software development is based on a proprietary real-time operating system kernel under which the individual layers are implemented as tasks. Based on the exemplary implementation of a derivative of MAP 3.0, an unusual and innovative approach is presented, where the protocol software is implemented under the UNIX-compatible real-time operating system LynxOS. The overall design of the embedded control application is presented under a more general view and economical implications as well as aspects of the development environmentmore » and performance are discussed.« less
A Survey on Underwater Acoustic Sensor Network Routing Protocols.
Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina
2016-03-22
Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research.
A Survey on Underwater Acoustic Sensor Network Routing Protocols
Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina
2016-01-01
Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research. PMID:27011193
Regulation of human retinal blood flow by endothelin-1.
Polak, Kaija; Luksch, Alexandra; Frank, Barbara; Jandrasits, Kerstin; Polska, Elzbieta; Schmetterer, Leopold
2003-05-01
There is evidence from in vitro and animal studies that endothelin is a major regulator of retinal blood flow. We set out to characterize the role of the endothelin-system in the blood flow control of the human retina. Two studies in healthy subjects were performed. The study design was randomized, placebo-controlled, double-masked, balanced, two-way crossover in protocol A and three way-way crossover in protocol B. In protocol A 18 healthy male subjects received intravenous endothelin-1 (ET-1) in a dose of 2.5 ng kg (-1)min(-1) for 30 min or placebo on two different study days and retinal vessel diameters were measured. In protocol B 12 healthy male subjects received ET-1 in stepwise increasing doses of 0, 1.25, 2.5 and 5 ng kg (-1)min(-1) (each infusion step over 20 min) in co-infusion with the specific ET(A)-receptor antagonist BQ123 (60 microg min (-1)) or placebo or BQ123 alone investigating retinal vessel diameters, retinal blood velocity and retinal blood flow. Measurements of retinal vessel size were done with the Zeiss retinal vessel analyzer. Measurements of blood velocities were done with bi-directional laser Doppler velocimetry. From these measurements retinal blood flow was calculated. In protocol A exogenous ET-1 tended to decrease retinal arterial diameter, but this effect was not significant versus placebo. No effect on retinal venous diameter was seen. In protocol B retinal venous blood velocity and retinal blood flow was significantly reduced after administration of exogenous ET-1. These effects were significantly blunted when BQ-123 was co-administered. By contrast, BQ-123 alone had no effect on retinal hemodynamic parameters. Concluding, BQ123 antagonizes the effects of exogenously administered ET-1 on retinal blood flow in healthy subjects. In addition, the results of the present study are compatible with the hypothesis that ET-1 exerts its vasoconstrictor effects in the retina mainly on the microvessels.
Developing an evidence-based practice protocol: implications for midwifery practice.
Carr, K C
2000-01-01
Evidence-based practice is defined and its importance to midwifery practice is presented. Guidelines are provided for the development of an evidence-based practice protocol. These include: identifying the clinical question, obtaining the evidence, evaluating the validity and importance of the evidence, synthesizing the evidence and applying it to the development of a protocol or clinical algorithm, and, finally, developing an evaluation plan or measurement strategy to see if the new protocol is effective.
Buczinski, S; Fecteau, G; Chigerwe, M; Vandeweerd, J M
2016-06-01
Calves are highly dependent of colostrum (and antibody) intake because they are born agammaglobulinemic. The transfer of passive immunity in calves can be assessed directly by dosing immunoglobulin G (IgG) or by refractometry or Brix refractometry. The latter are easier to perform routinely in the field. This paper presents a protocol for a systematic review meta-analysis to assess the diagnostic accuracy of refractometry or Brix refractometry versus dosage of IgG as a reference standard test. With this review protocol we aim to be able to report refractometer and Brix refractometer accuracy in terms of sensitivity and specificity as well as to quantify the impact of any study characteristic on test accuracy.
Finite-key analysis for the 1-decoy state QKD protocol
NASA Astrophysics Data System (ADS)
Rusca, Davide; Boaron, Alberto; Grünenfelder, Fadri; Martin, Anthony; Zbinden, Hugo
2018-04-01
It has been shown that in the asymptotic case of infinite-key length, the 2-decoy state Quantum Key Distribution (QKD) protocol outperforms the 1-decoy state protocol. Here, we present a finite-key analysis of the 1-decoy method. Interestingly, we find that for practical block sizes of up to 108 bits, the 1-decoy protocol achieves for almost all experimental settings higher secret key rates than the 2-decoy protocol. Since using only one decoy is also easier to implement, we conclude that it is the best choice for QKD, in most common practical scenarios.
Comments on the "Byzantine Self-Stabilizing Pulse Synchronization" Protocol: Counter-examples
NASA Technical Reports Server (NTRS)
Malekpour, Mahyar R.; Siminiceanu, Radu
2006-01-01
Embedded distributed systems have become an integral part of many safety-critical applications. There have been many attempts to solve the self-stabilization problem of clocks across a distributed system. An analysis of one such protocol called the Byzantine Self-Stabilizing Pulse Synchronization (BSS-Pulse-Synch) protocol from a paper entitled "Linear Time Byzantine Self-Stabilizing Clock Synchronization" by Daliot, et al., is presented in this report. This report also includes a discussion of the complexity and pitfalls of designing self-stabilizing protocols and provides counter-examples for the claims of the above protocol.
One Step Quantum Key Distribution Based on EPR Entanglement
Li, Jian; Li, Na; Li, Lei-Lei; Wang, Tao
2016-01-01
A novel quantum key distribution protocol is presented, based on entanglement and dense coding and allowing asymptotically secure key distribution. Considering the storage time limit of quantum bits, a grouping quantum key distribution protocol is proposed, which overcomes the vulnerability of first protocol and improves the maneuverability. Moreover, a security analysis is given and a simple type of eavesdropper’s attack would introduce at least an error rate of 46.875%. Compared with the “Ping-pong” protocol involving two steps, the proposed protocol does not need to store the qubit and only involves one step. PMID:27357865
Shin, Jae-Ho; Moon, Hyun Ju; Kim, Tae Sung; Kang, Il Hyun; Ki, Ho Yeon; Choi, Kwang Sik; Han, Soon Young
2006-09-01
We performed a 28-day repeated-dose toxicity study of vinclozolin, a widely used fungicide, based on the draft protocol of the "Enhanced OECD Test Guideline 407" (Enhanced TG407) to investigate whether vinclozolin has endocrine-mediated properties according to this assay. Seven-week-old SD rats were administered with vinclozolin daily by oral gavage at dose rates of 0, 3.125, 12.5, 50 and 200 mg/kg/day for at least 28 days. The vinclozolin-treated male rats showed a reduction of epididymis and accessory sex organ weights and an alteration of hormonal patterns. A slight prolongation of the estrous cycle and changes in the estrogen/testosterone ratio and luteinizing hormone level were observed in vinclozolin-treated female rats. Thyroxin concentrations were decreased and thyroid-stimulating hormone concentrations were increased in both sexes; however, there were no compound-related microscopic lesions in the thyroid gland or changes in the thyroid weight. The endocrine-related effects of vinclozolin could be detected by the parameters examined in the present study based on the OECD protocol, suggesting the Enhanced TG407 protocol should be a suitable screening test for the detection of endocrine-mediated effects of chemicals.
Advances and limitations of visual conditioning protocols in harnessed bees.
Avarguès-Weber, Aurore; Mota, Theo
2016-10-01
Bees are excellent invertebrate models for studying visual learning and memory mechanisms, because of their sophisticated visual system and impressive cognitive capacities associated with a relatively simple brain. Visual learning in free-flying bees has been traditionally studied using an operant conditioning paradigm. This well-established protocol, however, can hardly be combined with invasive procedures for studying the neurobiological basis of visual learning. Different efforts have been made to develop protocols in which harnessed honey bees could associate visual cues with reinforcement, though learning performances remain poorer than those obtained with free-flying animals. Especially in the last decade, the intention of improving visual learning performances of harnessed bees led many authors to adopt distinct visual conditioning protocols, altering parameters like harnessing method, nature and duration of visual stimulation, number of trials, inter-trial intervals, among others. As a result, the literature provides data hardly comparable and sometimes contradictory. In the present review, we provide an extensive analysis of the literature available on visual conditioning of harnessed bees, with special emphasis on the comparison of diverse conditioning parameters adopted by different authors. Together with this comparative overview, we discuss how these diverse conditioning parameters could modulate visual learning performances of harnessed bees. Copyright © 2016 Elsevier Ltd. All rights reserved.
NASA Astrophysics Data System (ADS)
Magazzù, G.; Borgese, G.; Costantino, N.; Fanucci, L.; Incandela, J.; Saponara, S.
2013-02-01
In many research fields as high energy physics (HEP), astrophysics, nuclear medicine or space engineering with harsh operating conditions, the use of fast and flexible digital communication protocols is becoming more and more important. The possibility to have a smart and tested top-down design flow for the design of a new protocol for control/readout of front-end electronics is very useful. To this aim, and to reduce development time, costs and risks, this paper describes an innovative design/verification flow applied as example case study to a new communication protocol called FF-LYNX. After the description of the main FF-LYNX features, the paper presents: the definition of a parametric SystemC-based Integrated Simulation Environment (ISE) for high-level protocol definition and validation; the set up of figure of merits to drive the design space exploration; the use of ISE for early analysis of the achievable performances when adopting the new communication protocol and its interfaces for a new (or upgraded) physics experiment; the design of VHDL IP cores for the TX and RX protocol interfaces; their implementation on a FPGA-based emulator for functional verification and finally the modification of the FPGA-based emulator for testing the ASIC chipset which implements the rad-tolerant protocol interfaces. For every step, significant results will be shown to underline the usefulness of this design and verification approach that can be applied to any new digital protocol development for smart detectors in physics experiments.
Hannay, Gwynne; Leavesley, David; Pearcy, Mark
2005-12-01
Pulsed electromagnetic field (PEMF) devices have been used clinically to promote the healing of surgically resistant fractures in vivo. However, there is a sparsity of data on how the timing of an applied PEMF effects the osteogenic cells that would be present within the fracture gap. The purpose of this study was to examine the response of osteoblast-like cells to a PEMF stimulus, mimicking that of a clinically available device, using four protocols for the timing of the stimulus. The PEMF signal consisted of a 5 ms pulse burst (containing 20 pulses) repeated at 15 Hz. Cultures of a human osteosarcoma cell line, SaOS-2, were exposed to the four timing protocols, each conducted over 3 days. Protocol one stimulated the cells for 8 h each day, protocol two stimulated the cells for 24 h on the first day, protocol three stimulated the cells for 24 h on the second day, and protocol four stimulated the cells for 24 h on the third day. Cells were seeded with either 25,000 or 50,000 cells/well (24-well cell culture plates). All assays showed reduced proliferation and increased differentiation (alkaline phosphatase activity) in the PEMF stimulated cultures compared with the control cultures, except for protocol four alkaline phosphatase measurements. No clear trend was observed between the four protocols; however this may be due to cell density. The results indicated that an osteoblast-like cell line is responsive to a 15 Hz PEMF stimulus, which will stimulate the cell line to into an increasing state of maturity. Bioelectromagnetics (c) 2005 Wiley-Liss, Inc
Moreso, F; Alperovich, G; Fulladosa, X; Gil-Vernet, S; Ibernon, M; Carrera, M; Castelao, A M; Hueso, M; Grinyo, J M; Serón, D
2003-08-01
Protocol biopsies performed in stable renal allografts show different degrees of acute and chronic lesions. Histologic findings in protocol biopsies have been related to graft outcome. We evaluated histologic lesions observed in protocol biopsies performed in patients under different immunosuppression therapies. From June 1988 a protocol biopsy was performed at approximately 4 months in patients who fulfilled the following criteria: serum creatinine <300 micromol/L; stable renal function; and proteinuria <1 g/d. Histologic lesions were graded according to 1997 Banff criteria. For the present study we considered the following groups according to immunosuppressive schedule: (i) induction therapy with polyclonal or monoclonal antilymphocytic antibodies associated with cyclosporine and prednisone (n=201); (ii) cyclosporine, mycophenolate mofetil, and prednisone (n=127); and (iii) tacrolimus, mycophenolate mofetil, and prednisone (n=51). On protocol biopsy patients treated with tacrolimus displayed a lower acute score (0.61+/-1.01 vs 1.24+/-1.23 in group I, 1.28+/-1.41 in group II; P<.0001) and a higher proportion of normal biopsies (57.1% vs 41.9% in group I, 45.1% in group II; P=.016). A similar proportion of chronic lesions (chronic score of group I: 1.30+/-1.56; group II: 1.34+/-1.80; group III: 1.51+/-0.95; P=NS) was observed in the three groups. Protocol biopsies displayed fewer acute lesions in patients treated with tacrolimus. This result suggests that the efficacy of new immunosuppression schedules can be evaluated using the protocol biopsy as a surrogate marker of graft outcome.
Lorazepam-diazepam protocol for catatonia in schizophrenia: a 21-case analysis.
Lin, Chin-Chuen; Huang, Tiao-Lai
2013-11-01
Catatonia is a unique clinical phenomenon characterized by concurrent motor, emotional, vegetative and behavioral signs. Benzodiazepines (BZD) and electroconvulsive therapy (ECT) can rapidly relieve catatonic signs. The lorazepam-diazepam protocol presented here has been proven to relieve catatonia in schizophrenia within a day. From July 2002 to August 2011, schizophrenic patients requiring psychiatric intervention for catatonia in Kaohsiung Chang Gung Memorial Hospital were studied by medical chart review. The study used the Bush-Francis Catatonia Rating Scale (BFCRS). Patients receiving the lorazepam-diazepam protocol were identified. The survey included 21 patients (eight males and 13 females) with a mean age of 30.3 ± 12.6 years. Mean duration of schizophrenia was 4.7 ± 5.6 years. Thirteen (61.9%) patients responded within 2 h, 18 (85.7%) responded within one day, and all became catatonia-free within a week. Mean BFCRS score was 9.9 ± 3.0 before treatment. Patients that responded with a single intramuscular lorazepam injection had mean BFCRS score of 8.9 ± 2.8, significantly lower than the mean score (11.6 ± 2.5) of the rest of the patients (p = 0.034). The lorazepam-diazepam protocol can rapidly relieve retarded catatonia in schizophrenia. Most patients became catatonia-free within one day but some may require up to a week. ECT should be considered if the protocol fails. © 2013.
Lund, Travis J.; Pilarz, Matthew; Velasco, Jonathan B.; Chakraverty, Devasmita; Rosploch, Kaitlyn; Undersander, Molly; Stains, Marilyne
2015-01-01
Researchers, university administrators, and faculty members are increasingly interested in measuring and describing instructional practices provided in science, technology, engineering, and mathematics (STEM) courses at the college level. Specifically, there is keen interest in comparing instructional practices between courses, monitoring changes over time, and mapping observed practices to research-based teaching. While increasingly common observation protocols (Reformed Teaching Observation Protocol [RTOP] and Classroom Observation Protocol in Undergraduate STEM [COPUS]) at the postsecondary level help achieve some of these goals, they also suffer from weaknesses that limit their applicability. In this study, we leverage the strengths of these protocols to provide an easy method that enables the reliable and valid characterization of instructional practices. This method was developed empirically via a cluster analysis using observations of 269 individual class periods, corresponding to 73 different faculty members, 28 different research-intensive institutions, and various STEM disciplines. Ten clusters, called COPUS profiles, emerged from this analysis; they represent the most common types of instructional practices enacted in the classrooms observed for this study. RTOP scores were used to validate the alignment of the 10 COPUS profiles with reformed teaching. Herein, we present a detailed description of the cluster analysis method, the COPUS profiles, and the distribution of the COPUS profiles across various STEM courses at research-intensive universities. PMID:25976654
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wu, D; France, E; Lambert, J
Purpose: Medical Physics teams can now play a critical role to help plan and provide studied approaches for traumatic brachial plexus MR imaging (tbpMRI). This is especially important for coordination with uncommon applications, since it is challenging to select the right modality, parameters, and train technologists on the essential components. For this work, we started with a review of the medical literature, performed crossover/volunteer studies to bring tbpMRI to practice with greater image QC and protocol management. Methods: To the best of our knowledge, we reviewed the known searchable domain for tbpMRI. We found 69 total articles since 2000. Articlesmore » were evaluated with our published protocol for literature management (LIMES3). Two physicists and two radiologists condensed the information from all articles into a knowledgebase. Results: The initial literature demonstrated great heterogeneity, which was a sign that this area needed greater consistency. Despite inconsistency and imprecision, we extracted the most relevant targets using our long-term experience with protocol development in MSK. We ran volunteers on six different magnets of various field strengths with multiple receiver coils, and rebuilt a coherent protocol for tbpMRI. Our radiologists rated LIMES3 work as superior. We have received referrals from the ER and have conducted four patient evaluations. Conclusion: Traumatic brachial plexus MRI has great possible benefits for patients. This work supports the complexity of tbpMRI scanning. As this is rarely performed, it requires a more diligent protocol workflow, coordination of caregivers, and education within multiple clinical departments. Choosing the correct imaging exam can be critical, as patients can have significant neuropathy and/or paralysis. The LIMES3 protocol is well liked at our institution, and forms the cornerstone of understanding for our work. Our literature management led to a better clinical protocol creation despite the diffuse and inconclusive information presented in the existing medical literature.« less
Hwang, Inpyeong; Cho, Jeong Yeon; Kim, Sang Youn; Oh, Seung-June; Ku, Ja Hyeon; Lee, Joongyup; Kim, Seung Hyup
2015-12-01
The aim of the present study was to investigate the feasibility and image quality of excretory CT urography performed using low iodine-concentration contrast media and low tube voltage. This prospective study enrolled 63 patients who undergoing CT urography. The subjects were randomized into two groups of an excretory phase CT urography protocol and received either 240 mg I/mL of contrast media and 80 kVp of tube voltage (low-concentration protocol, n=32) or 350 mg I/mL and 120 kVp (conventional protocol, n=31). Two readers qualitatively evaluated images for sharpness of the urinary tract, image noise, streak artifact and overall diagnostic acceptability. The mean attenuation, signal-to-noise ratio, contrast-to-noise ratio and figure of merit were measured in the urinary tract. The non-inferiority test assessed the diagnostic acceptability between the two protocol groups. The low-concentration protocol showed a significantly lower effective radiation dose (3.44 vs. 5.70 mSv, P<.001). The diagnostic acceptability was significantly lower in the low-concentration protocol with iterative reconstruction algorithm than in the conventional protocol (4.06±0.45 vs. 4.50±0.37, P<.001), however, all subjects showed at least more than standard diagnostic acceptability and the difference resided in the predefined non-inferiority margin. The signal-to-noise ratio, contrast-to-noise ratio and figure of merit were significantly higher in the low-concentration protocol along the entire urinary tract (P<.001). CT urography using 240 mg I/mL iodine contrast media, 80 kVp tube voltage and an iterative reconstruction algorithm is beneficial to reduce radiation dose and iodine load, and its objective image quality and subjective diagnostic acceptability is not inferior to that of conventional CT urography. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.
Álvarez-Bueno, Celia; Pesce, Caterina; Cavero-Redondo, Iván; Sánchez-López, Mairena; Pardo-Guijarro, María Jesús; Martínez-Vizcaíno, Vicente
2016-06-28
Schools provide a relevant context for improving children's and adolescents' physical and mental health by increasing physical activity during school hours and/or beyond. The interest in the relationship between physical activity programmes and cognition during development has recently increased, with evidence suggesting a positive association. We present a protocol of systematic reviews and meta-analysis of intervention studies that, by determining the effects of chronic physical exercise on children's and adolescents' cognitive and metacognitive functions, cognitive life skills, academic behaviours and achievement, aims to ensure procedural objectivity and transparency, and maximise the extraction of relevant information to inform policy development. This protocol is guided by Preferred Reporting Items for Systematic Review and Meta-Analysis Protocols (PRISMA-P) and by the Cochrane Collaboration Handbook. Databases to be utilised for a thorough selection of the pertinent literature are MEDLINE, EMBASE, Cochrane Central Register of Controlled Trials, Cochrane Database of Systematic Reviews, Web of Science, PsycINFO and ERIC. Selection is proposed to encompass an international and a national publication level, with inclusion of experimental studies written in English or in Spanish, respectively. Also, relevant references included in the selected studies will be considered suitable for review as supplemental sources.We present an integrated approach to the methodological quality assessment of the selected studies, including the Jadad Scale for the assessment of the quality of randomised controlled trials and the Quality Assessment Tool for Quantitative Studies for pre-post studies and non-randomised controlled trials. The pre-post interventions mean differences will be the primary indicator of the intervention outcome. A subgroup analysis is proposed based on cognitive functions and their neural correlates, metacognitive functions and cognitive life skills, academic achievement areas and academic behaviours. PROSPERO CRD42015029913. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/
Compositional Verification of a Communication Protocol for a Remotely Operated Vehicle
NASA Technical Reports Server (NTRS)
Goodloe, Alwyn E.; Munoz, Cesar A.
2009-01-01
This paper presents the specification and verification in the Prototype Verification System (PVS) of a protocol intended to facilitate communication in an experimental remotely operated vehicle used by NASA researchers. The protocol is defined as a stack-layered com- position of simpler protocols. It can be seen as the vertical composition of protocol layers, where each layer performs input and output message processing, and the horizontal composition of different processes concurrently inhabiting the same layer, where each process satisfies a distinct requirement. It is formally proven that the protocol components satisfy certain delivery guarantees. Compositional techniques are used to prove these guarantees also hold in the composed system. Although the protocol itself is not novel, the methodology employed in its verification extends existing techniques by automating the tedious and usually cumbersome part of the proof, thereby making the iterative design process of protocols feasible.
Continuous-variable protocol for oblivious transfer in the noisy-storage model.
Furrer, Fabian; Gehring, Tobias; Schaffner, Christian; Pacher, Christoph; Schnabel, Roman; Wehner, Stephanie
2018-04-13
Cryptographic protocols are the backbone of our information society. This includes two-party protocols which offer protection against distrustful players. Such protocols can be built from a basic primitive called oblivious transfer. We present and experimentally demonstrate here a quantum protocol for oblivious transfer for optical continuous-variable systems, and prove its security in the noisy-storage model. This model allows us to establish security by sending more quantum signals than an attacker can reliably store during the protocol. The security proof is based on uncertainty relations which we derive for continuous-variable systems, that differ from the ones used in quantum key distribution. We experimentally demonstrate in a proof-of-principle experiment the proposed oblivious transfer protocol for various channel losses by using entangled two-mode squeezed states measured with balanced homodyne detection. Our work enables the implementation of arbitrary two-party quantum cryptographic protocols with continuous-variable communication systems.
Validating Analytical Protocols to Determine Selected Pesticides and PCBs Using Routine Samples.
Pindado Jiménez, Oscar; García Alonso, Susana; Pérez Pastor, Rosa María
2017-01-01
This study aims at providing recommendations concerning the validation of analytical protocols by using routine samples. It is intended to provide a case-study on how to validate the analytical methods in different environmental matrices. In order to analyze the selected compounds (pesticides and polychlorinated biphenyls) in two different environmental matrices, the current work has performed and validated two analytical procedures by GC-MS. A description is given of the validation of the two protocols by the analysis of more than 30 samples of water and sediments collected along nine months. The present work also scopes the uncertainty associated with both analytical protocols. In detail, uncertainty of water sample was performed through a conventional approach. However, for the sediments matrices, the estimation of proportional/constant bias is also included due to its inhomogeneity. Results for the sediment matrix are reliable, showing a range 25-35% of analytical variability associated with intermediate conditions. The analytical methodology for the water matrix determines the selected compounds with acceptable recoveries and the combined uncertainty ranges between 20 and 30%. Analyzing routine samples is rarely applied to assess trueness of novel analytical methods and up to now this methodology was not focused on organochlorine compounds in environmental matrices.
Anti-hypercholesterolemic effect of Saccharomyces boulardii in the hamster.
Girard, Philippe; Pansart, Yannick; Verleye, Marc
2014-01-01
Hypercholesterolemia is a major risk factor for coronary artery disease and probiotics have been suggested as tools to manage elevated cholesterol levels. The present study investigated the ability of the biotherapeutic agent Saccharomyces boulardii (Sb-Biocodex) to reduce the hypercholesterolemia induced by a 0.1% cholesterol-enriched diet in the hamster. In a first experiment, chronic oral treatment with S. boulardii at 12 × 10(10) CFU/kg (3 g/kg) twice a day was started from the beginning of the cholesterol diet and continued for 14 days ('preventive protocol'). In the second experiment, S. boulardii was given 14 days after the beginning of the cholesterol diet when hypercholesterolemia had developed and continued for an additional 14 days ('curative protocol'). In the preventive protocol, administration of the yeast significantly reduced hypercholesterolemia (14%) induced by the cholesterol-enriched diet compared to the group receiving only the cholesterol diet. In the curative protocol, S. boulardii significantly reduced hypercholesterolemia (12%) induced by the cholesterol-enriched diet, too. Moreover, the yeast significantly decreased the serum triglyceride increase by 39%. S. boulardii possesses anti-hypercholesterolemic properties in the hamster worthy of further evaluation in clinical studies. © 2014 S. Karger AG, Basel.
Aghdasi, Hadi S; Abbaspour, Maghsoud; Moghadam, Mohsen Ebrahimi; Samei, Yasaman
2008-08-04
Technological progress in the fields of Micro Electro-Mechanical Systems (MEMS) and wireless communications and also the availability of CMOS cameras, microphones and small-scale array sensors, which may ubiquitously capture multimedia content from the field, have fostered the development of low-cost limited resources Wireless Video-based Sensor Networks (WVSN). With regards to the constraints of videobased sensor nodes and wireless sensor networks, a supporting video stream is not easy to implement with the present sensor network protocols. In this paper, a thorough architecture is presented for video transmission over WVSN called Energy-efficient and high-Quality Video transmission Architecture (EQV-Architecture). This architecture influences three layers of communication protocol stack and considers wireless video sensor nodes constraints like limited process and energy resources while video quality is preserved in the receiver side. Application, transport, and network layers are the layers in which the compression protocol, transport protocol, and routing protocol are proposed respectively, also a dropping scheme is presented in network layer. Simulation results over various environments with dissimilar conditions revealed the effectiveness of the architecture in improving the lifetime of the network as well as preserving the video quality.
Obeso, Ignacio; Cerasa, Antonio; Quattrone, Aldo
2015-01-01
Repetitive transcranial magnetic stimulation (rTMS) is a safe and painless method for stimulating cortical neurons. In neurological realm, rTMS has prevalently been applied to understand pathophysiological mechanisms underlying movement disorders. However, this tool has also the potential to be translated into a clinically applicable therapeutic use. Several available studies supported this hypothesis, but differences in protocols, clinical enrollment, and variability of rTMS effects across individuals complicate better understanding of efficient clinical protocols. The aim of this present review is to discuss to what extent the evidence provided by the therapeutic use of rTMS may be generalized. In particular, we attempted to define optimal cortical regions and stimulation protocols that have been demonstrated to maximize the effectiveness seen in the actual literature for the three most prevalent hyperkinetic movement disorders: Parkinson's disease (PD) with levodopa-induced dyskinesias (LIDs), essential tremor (ET) and dystonia. A total of 28 rTMS studies met our search criteria. Despite clinical and methodological differences, overall these studies demonstrated that therapeutic applications of rTMS to "normalize" pathologically decreased or increased levels of cortical activity have given moderate progress in patient's quality of life. Moreover, the present literature suggests that altered pathophysiology in hyperkinetic movement disorders establishes motor, premotor or cerebellar structures as candidate regions to reset cortico-subcortical pathways back to normal. Although rTMS has the potential to become a powerful tool for ameliorating the clinical outcome of hyperkinetic neurological patients, until now there is not a clear consensus on optimal protocols for these motor disorders. Well-controlled multicenter randomized clinical trials with high numbers of patients are urgently required.
Joosen, Margot C W; Mert, Agali; Zedlitz, Aglaia; Vrijhoef, Hubertus J M
2017-01-01
Introduction Many individuals suffer from chronic pain or functional somatic syndromes and face boundaries for diminishing functional limitations by means of biopsychosocial interventions. Serious gaming could complement multidisciplinary interventions through enjoyment and independent accessibility. A study protocol is presented for studying whether, how, for which patients and under what circumstances, serious gaming improves patient health outcomes during regular multidisciplinary rehabilitation. Methods and analysis A mixed-methods design is described that prioritises a two-armed naturalistic quasi-experiment. An experimental group is composed of patients who follow serious gaming during an outpatient multidisciplinary programme at two sites of a Dutch rehabilitation centre. Control group patients follow the same programme without serious gaming in two similar sites. Multivariate mixed-modelling analysis is planned for assessing how much variance in 250 patient records of routinely monitored pain intensity, pain coping and cognition, fatigue and psychopathology outcomes is attributable to serious gaming. Embedded qualitative methods include unobtrusive collection and analyses of stakeholder focus group interviews, participant feedback and semistructured patient interviews. Process analyses are carried out by a systematic approach of mixing qualitative and quantitative methods at various stages of the research. Ethics and dissemination The Ethics Committee of the Tilburg School of Social and Behavioural Sciences approved the research after reviewing the protocol for the protection of patients’ interests in conformity to the letter and rationale of the applicable laws and research practice (EC 2016.25t). Findings will be presented in research articles and international scientific conferences. Trial registration number A prospective research protocol for the naturalistic quasi-experimental outcome evaluation was entered in the Dutch trial register (registration number: NTR6020; Pre-results). PMID:28600377
Vasconcelos, Selene Cordeiro; Frazão, Iracema da Silva; Sougey, Everton Botelho; de Souza, Sandra Lopes; da Silva, Tatiana de Paula Santana; Lima, Murilo Duarte da Costa
2018-01-01
Introduction The abuse of alcohol and other drugs is a worldwide problem, the treatment of which poses a challenge to healthcare workers. Objective This study presents a proposal for a systematic review to analyse the psychometric properties of assessment tools developed to measure the self-efficacy of drug users with regard to resisting the urge to take drugs in high-risk situations. Methods and Analysis The guiding question was based on PICOS (Population Intervention Comparator Outcome Setting), and the report of the methods of review protocol was written in accordance with the Preferred Reporting Items for Systematic Review and Meta-Analysis Protocols (PRISMA-P). Searches will be performed in the PsycINFO, Cochrane, Pubmed, Web of Science, SCOPUS and CINAHL databases, followed by the use of the ‘snowball’ strategy. The inclusion criteria for the articles will be (1) assessment tool validation studies; (2) assessment tools developed to measure self-efficacy; (3) quantitative measures; (4) measures designed for use on adults; (5) data from self-reports of the participants; (6) studies involving a description of psychometric properties of the measures; and (7) studies that explain how the level of self-efficacy is scored. The search, selection and analysis will be performed by two independent reviewers. In cases of a divergence of opinion, a third reviewer will be consulted. The COSMIN checklist will be used for the appraisal of the methodological quality of the assessment tools and the certainty of the evidence in the articles (risk of bias) will be analysed using the GRADE (Grading of Recommendations Assessment, Development and Evaluation) approach. Ethics and dissemination This protocol does not require ethical approval. However, this protocol is part of the thesis entitled Drug-Taking Confidence Questionnaire for use in Brazil, presented for obtaining a doctorate in neuropsychiatry and behavioural sciences from the Federal University of Pernambuco, and has received approval from the human research ethics committee of the Federal University of Pernambuco (reference number: 1.179.162). The results will be disseminated to clinicians and researchers through peer-reviewed publications and conferences. PROSPERO registration number CRD42017068555. PMID:29540409
A Methodology for Anatomic Ultrasound Image Diagnostic Quality Assessment.
Hemmsen, Martin Christian; Lange, Theis; Brandt, Andreas Hjelm; Nielsen, Michael Bachmann; Jensen, Jorgen Arendt
2017-01-01
This paper discusses the methods for the assessment of ultrasound image quality based on our experiences with evaluating new methods for anatomic imaging. It presents a methodology to ensure a fair assessment between competing imaging methods using clinically relevant evaluations. The methodology is valuable in the continuing process of method optimization and guided development of new imaging methods. It includes a three phased study plan covering from initial prototype development to clinical assessment. Recommendations to the clinical assessment protocol, software, and statistical analysis are presented. Earlier uses of the methodology has shown that it ensures validity of the assessment, as it separates the influences between developer, investigator, and assessor once a research protocol has been established. This separation reduces confounding influences on the result from the developer to properly reveal the clinical value. This paper exemplifies the methodology using recent studies of synthetic aperture sequential beamforming tissue harmonic imaging.
Zebrafish developmental toxicity testing is an emerging field, which faces considerable challenges regarding data meta-analysis and the establishment of standardized test protocols. Here, we present an initial correlation study on toxicity of 133 chemicals based on data in the li...
Emotional Intelligence in Library Disaster Response Assistance Teams: Which Competencies Emerged?
ERIC Educational Resources Information Center
Wilkinson, Frances C.
2015-01-01
This qualitative study examines the relationship between emotional intelligence competencies and the personal attributes of library disaster response assistance team (DRAT) members. Using appreciative inquiry protocol to conduct interviews at two academic libraries, the study presents findings from emergent thematic coding of interview…
Engelman, Glenn H; Carry, Patrick M; Kubes, Kyle M; Gleason, Michael J
2016-11-01
Patients presenting with ST-elevation myocardial infarction (STEMI) benefit from rapid cardiac reperfusion therapy. Emergency medical service (EMS) agencies can improve patient outcomes by calling STEMI alerts to the receiving facility. The aim of this study was to evaluate the use of pre-hospital activation systems for suspected ST-elevation myocardial infarctions (STEMI) throughout Colorado. A cross sectional, survey design was utilized to collect all data from EMS agencies in Colorado. A univariable logistic regression model was used to identify factors predictive of an agency reporting that they utilize a STEMI activation protocol. 84.5% [95% CI: 78.3 to 90.7%] of agencies included indicate that they utilize a STEMI activation protocol. Based on the logistic regression analysis, the number of EMT employees was significantly associated with whether or not an agency indicates that they utilize a STEMI activation protocol. For every 10% increase in the number of EMTs employed by an EMS agency, there was a 3.0 [95% CI: 1.5 to 6.0, p = 0.0012] fold increase in the odds of the agency indicating they utilize a STEMI activation protocol. Our study provides evidence that larger agencies are more likely to utilize a STEMI activation protocol. In areas without a STEMI system of care, improvements in smaller agencies that cover more ground (with longer transport times) should be the focus for protocol implementation. Based on the current prevalence of such training, competency based training in reading ST-elevations on ECG should be considered by EMS agencies.
Cetuximab-induced skin exanthema: prophylactic and reactive skin therapy are equally effective.
Wehler, Thomas C; Graf, Claudine; Möhler, Markus; Herzog, Jutta; Berger, Martin R; Gockel, Ines; Lang, Hauke; Theobald, Matthias; Galle, Peter R; Schimanski, Carl C
2013-10-01
Treatment with cetuximab is accompanied by the development of an acneiform follicular skin exanthema in more than 80 % of patients. Severe exanthema (grade III/IV) develops in about 9-19 % of patients with the necessity of cetuximab dose reduction or cessation. The study presented was a retrospective analysis of 50 gastrointestinal cancer patients treated with cetuximab in combination with either FOLFIRI or FOLFOX. One cohort of 15 patients received an in-house reactive skin protocol upon development of an exanthema. A second cohort of 15 patients received a skin prophylaxis starting with the first dose of cetuximab before clinical signs of toxicity. A third historic group of 20 patients had received no skin prophylaxis or reactive treatment. 19/20 patients of the historic group developed a skin exanthema. Grade III/IV exanthema was observed six times. Forty percent discontinued cetuximab therapy. The average time to exanthema onset was 14.7 days. Applying the reactive skin protocol after the first occurrence of an exanthema, the exanthema was downgraded as follows: No patients developed grade IV° exanthema, and two patients developed a grade II/III exanthema. In the majority of cases, the reactive skin protocol controlled the exanthema (grade 0-I°). No dose reductions in cetuximab were necessary. Applying the prophylactic skin protocol starting at the beginning of cetuximab application was not superior to the reactive skin protocol. Cetuximab-induced skin exanthema can be coped with a reactive protocol equally effective as compared to a prophylactic skin treatment. A prospective study with higher patient numbers is planned.
Umbrello, M; Salice, V; Spanu, P; Formenti, P; Barassi, A; Melzi d'Eril, G V; Iapichino, G
2014-10-01
The optimal level and modality of glucose control in critically ill patients is still debated. A protocolized approach and the use of nearly-continuous technologies are recommended to manage hyperglycemia, hypoglycemia and glycemic variability. We recently proposed a pato-physiology-based glucose control protocol which takes into account patient glucose/carbohydrate intake and insulin resistance. Aim of the present investigation was to assess the performance of our protocol with an automated intermittent plasma glucose monitoring device (OptiScanner™ 5000). OptiScanner™ was used in 6 septic patients, providing glucose measurement every 15' from a side-port of an indwelling central venous catheter. Target level of glucose was 80-150 mg/dL. Insulin infusion and kcal with nutritional support were also recorded. 6 septic patients were studied for 319 h (1277 measurements); 58 [45-65] hours for each patient (measurements/patient: 231 [172-265]). Blood glucose was at target for 93 [90-98]% of study time. Mean plasma glucose was 126 ± 11 mg/dL. Only 3 hypoglycemic episodes (78, 78, 69 mg/dL) were recorded. Glucose variability was limited: plasma glucose coefficient of variation was 11.7 ± 4.0% and plasma glucose standard deviation was 14.3 ± 5.5 mg/dL. The local glucose control protocol achieved satisfactory glucose control in septic patients along with a high degree of safeness. Automated intermittent plasma glucose monitoring seemed useful to assess the performance of the protocol. Copyright © 2013 Elsevier Ltd and European Society for Clinical Nutrition and Metabolism. All rights reserved.
Lannes, Marcelo; Teitelbaum, Jeanne; del Pilar Cortés, Maria; Cardoso, Mauro; Angle, Mark
2012-06-01
For the treatment of cerebral vasospasm, current therapies have focused on increasing blood flow through blood pressure augmentation, hypervolemia, the use of intra-arterial vasodilators, and angioplasty of proximal cerebral vessels. Through a large case series, we present our experience of treating cerebral vasospasm with a protocol based on maintenance of homeostasis (correction of electrolyte and glucose disturbances, prevention and treatment of hyperthermia, replacement of fluid losses), and the use of intravenous milrinone to improve microcirculation (the Montreal Neurological Hospital protocol). Our objective is to describe the use milrinone in our practice and the neurological outcomes associated with this approach. Large case series based on the review of all patients diagnosed with delayed ischemic neurologic deficits after aneurysmal subarachnoid hemorrhage between April 1999 and April 2006. 88 patients were followed for a mean time of 44.6 months. An intravenous milrinone infusion was used for a mean of 9.8 days without any significant side effects. No medical complications associated with this protocol were observed. There were five deaths; of the surviving patients, 48.9 % were able to go back to their previous baseline and 75 % had a good functional outcome (modified Rankin scale ≤ 2). A protocol using intravenous milrinone, and the maintenance of homeostasis is simple to use and requires less intensive monitoring and resources than the standard triple H therapy. Despite the obvious limitations of this study's design, we believe that it would be now appropriate to proceed with formal prospective studies of this protocol.
A distance limited method for sampling downed coarse woody debris
Jeffrey H. Gove; Mark J. Ducey; Harry T. Valentine; Michael S. Williams
2012-01-01
A new sampling method for down coarse woody debris is proposed based on limiting the perpendicular distance from individual pieces to a randomly chosen sample point. Two approaches are presented that allow different protocols to be used to determine field measurements; estimators for each protocol are also developed. Both protocols are compared via simulation against...
Efficient multiuser quantum cryptography network based on entanglement.
Xue, Peng; Wang, Kunkun; Wang, Xiaoping
2017-04-04
We present an efficient quantum key distribution protocol with a certain entangled state to solve a special cryptographic task. Also, we provide a proof of security of this protocol by generalizing the proof of modified of Lo-Chau scheme. Based on this two-user scheme, a quantum cryptography network protocol is proposed without any quantum memory.
Efficient multiuser quantum cryptography network based on entanglement
Xue, Peng; Wang, Kunkun; Wang, Xiaoping
2017-01-01
We present an efficient quantum key distribution protocol with a certain entangled state to solve a special cryptographic task. Also, we provide a proof of security of this protocol by generalizing the proof of modified of Lo-Chau scheme. Based on this two-user scheme, a quantum cryptography network protocol is proposed without any quantum memory. PMID:28374854
2014-09-18
radios in a cognitive radio network using a radio frequency fingerprinting based method. In IEEE International Conference on Communications (ICC...IMPROVEDWIRELESS SECURITY THROUGH PHYSICAL LAYER PROTOCOL MANIPULATION AND RADIO FREQUENCY FINGERPRINTING DISSERTATION Benjamin W. Ramsey, Captain...PHYSICAL LAYER PROTOCOL MANIPULATION AND RADIO FREQUENCY FINGERPRINTING DISSERTATION Presented to the Faculty Graduate School of Engineering and
Efficient multiuser quantum cryptography network based on entanglement
NASA Astrophysics Data System (ADS)
Xue, Peng; Wang, Kunkun; Wang, Xiaoping
2017-04-01
We present an efficient quantum key distribution protocol with a certain entangled state to solve a special cryptographic task. Also, we provide a proof of security of this protocol by generalizing the proof of modified of Lo-Chau scheme. Based on this two-user scheme, a quantum cryptography network protocol is proposed without any quantum memory.
Chowdhury, Supriyo; Basu, Arpita; Kundu, Surekha
2014-09-01
In spite of the economic importance of sesame (Sesamum indicum L.) and the recent availability of its genome sequence, a high-frequency transformation protocol is still not available. The only two existing Agrobacterium-mediated transformation protocols that are available have poor transformation efficiencies of less than 2%. In the present study, we report a high-frequency, simple, and reproducible transformation protocol for sesame. Transformation was done using de-embryonated cotyledons via somatic embryogenic stages. All the critical parameters of transformation, like incubation period of explants in pre-regeneration medium prior to infection by Agrobacterium tumefaciens, cocultivation period, concentrations of acetosyringone in cocultivation medium, kanamycin concentration, and concentration of plant hormones, including 6-benzylaminopurine, have been optimized. This protocol is superior to the two existing protocols in its high regeneration and transformation efficiencies. The transformed sesame lines have been tested by PCR, RT-PCR for neomycin phosphotransferase II gene expression, and β-glucuronidase (GUS) assay. The regeneration frequency and transformation efficiency are 57.33 and 42.66%, respectively. T0 and T1 generation transgenic plants were analyzed, and several T1 plants homozygous for the transgenes were obtained.
Zeng, Wei-Fang; Liu, Ming; Kang, Yuan-Yuan; Li, Yan; Wang, Ji-Guang
2013-08-01
The present study aimed to evaluate the accuracy of the fully automated oscillometric upper-arm blood pressure monitor TM-2656 according to the British Hypertension Society (BHS) Protocol 1993. We recruited individuals until there were 85 eligible participants and their blood pressure could meet the blood pressure distribution requirements specified by the BHS Protocol. For each individual, we sequentially measured the systolic and diastolic blood pressures using a mercury sphygmomanometer (two observers) and the TM-2656 device (one supervisor). Data analysis was carried out according to the BHS Protocol. The device achieved grade A. The percentage of blood pressure differences within 5, 10, and 15 mmHg was 62, 85, and 96%, respectively, for systolic blood pressure, and 71, 93, and 99%, respectively, for diastolic blood pressure. The average (±SD) of the device-observer differences was -2.1±7.8 mmHg (P<0.0001) and -1.1±5.8 mmHg (P<0.0001) for systolic and diastolic blood pressures, respectively. The A&D upper-arm blood pressure monitor TM-2656 has passed the requirements of the BHS Protocol, and can thus be recommended for blood pressure measurement.
A secured authentication protocol for wireless sensor networks using elliptic curves cryptography.
Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen
2011-01-01
User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das' protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs.
A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen
2011-01-01
User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das’ protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs. PMID:22163874
Logan, Ryan W.; McCulley, Walter D.; Seggio, Joseph A.; Rosenwasser, Alan M.
2011-01-01
Background Alcohol withdrawal is associated with behavioral and chronobiological disturbances that may persist during protracted abstinence. We previously reported that C57BL/6J (B6) mice show marked but temporary reductions in running-wheel activity, and normal free-running circadian rhythms, following a 4-day chronic intermittent ethanol vapor (CIE) exposure (16 hours of ethanol vapor exposure alternating with 8 hours of withdrawal). In the present experiments, we extend these observations in two ways: (1) by examining post-CIE locomotor activity in C3H/HeJ (C3H) mice, an inbred strain characterized by high sensitivity to ethanol withdrawal, and (2) by directly comparing the responses of B6 and C3H mice to a longer-duration CIE protocol. Methods In Experiment 1, C3H mice were exposed to the same 4-day CIE protocol used in our previous study with B6 mice (referred to here as the 1-cycle CIE protocol). In Experiment 2, C3H and B6 mice were exposed to three successive 4-day CIE cycles, each separated by 2 days of withdrawal (the 3-cycle CIE protocol). Running-wheel activity was monitored prior to and following CIE, and post-CIE activity was recorded in constant darkness to allow assessment of free-running circadian period and phase. Results C3H mice displayed pronounced reductions in running-wheel activity that persisted for the duration of the recording period (up to 30 days) following both 1-cycle (Experiment 1) and 3-cycle (Experiment 2) CIE protocols. In contrast, B6 mice showed reductions in locomotor activity that persisted for about one week following the 3-cycle CIE protocol, similar to the results of our previous study using a 1-cycle protocol in this strain. Additionally, C3H mice showed significant shortening of free-running period following the 3-cycle, but not the 1-cycle, CIE protocol, while B6 mice showed normal free-running rhythms. Conclusions These results reveal genetic differences in the persistence of ethanol withdrawal-induced hypo-locomotion. In addition, chronobiological alterations during extended abstinence may depend on both genetic susceptibility and an extended prior withdrawal history. The present data establish a novel experimental model for long-term behavioral and circadian disruptions associated with ethanol withdrawal. PMID:22013893
Keith, Rachel J; Fetterman, Jessica L; Riggs, Daniel W; O’Toole, Timothy; Nystoriak, Jessica L; Holbrook, Monika; Lorkiewicz, Pawel; Bhatnagar, Aruni; DeFilippis, Andrew P; Hamburg, Naomi M
2018-01-01
Introduction Tobacco use leads to increased mortality, the majority of which is attributed to cardiovascular disease. Despite this knowledge, the early cardiovascular impact of tobacco product use is not well understood. Tobacco use increases exposure to harmful and potentially harmful constituents including volatile organic compounds (VOCs) such as acrolein and crotonaldehyde, which may contribute to cardiovascular risk. The link between exposure patterns, risk profiles and demographic distribution of tobacco product users, particularly users of new and emerging products, are not well known. Therefore, we designed the Cardiovascular Injury due to Tobacco Use (CITU) study to assess population characteristics, demographic features, exposure patterns and cardiovascular risk in relation to tobacco. Methods and analysis We present the design and methodology of the CITU study, a cross-sectional observational tobacco study conducted in Boston, Massachusetts and Louisville, Kentucky starting in 2014. Healthy participants 21–45 years of age who use tobacco products, including electronic nicotine devices, or who never used tobacco are being recruited. The study aims to recruit an evenly split cohort of African-Americans and Caucasians, that is, sex balanced for evaluation of self-reported tobacco exposure, VOC exposure and tobacco-induced injury profiling. Detailed information about participant’s demographics, health status and lifestyle is also collected. Ethics and dissemination The study protocol was approved institutional review boards at both participating universities. All study protocols will protect participant confidentiality. Results from the study will be disseminated via peer-reviewed journals and presented at scientific conferences. PMID:29602846
NASA Astrophysics Data System (ADS)
Wanner, Samuel Penna; Costa, Kátia Anunciação; Soares, Anne Danieli Nascimento; Cardoso, Valbert Nascimento; Coimbra, Cândido Celso
2014-08-01
The mechanisms underlying physical exercise-induced hyperthermia may be species specific. Therefore, the present study aimed to investigate the effects of exercise intensity and ambient temperature on the core body temperature ( T core) of running mice, which provide an important experimental model for advancing the understanding of thermal physiology. We evaluated the influence of different protocols (constant- or incremental-speed exercises), treadmill speeds and ambient temperatures ( T a) on the magnitude of exercise-induced hyperthermia. To measure T core, a telemetric sensor was implanted in the abdominal cavity of male adult Swiss mice under anesthesia. After recovering from the surgery, the animals were familiarized to running on a treadmill and then subjected to the different running protocols and speeds at two T a: 24 °C or 34 °C. All of the experimental trials resulted in marked increases in T core. As expected, the higher-temperature environment increased the magnitude of running-induced hyperthermia. For example, during incremental exercise at 34 °C, the maximal T core achieved was increased by 1.2 °C relative to the value reached at 24 °C. However, at the same T a, neither treadmill speed nor exercise protocol altered the magnitude of exercise-induced hyperthermia. We conclude that T core of running mice is influenced greatly by T a, but not by the exercise protocols or intensities examined in the present report. These findings suggest that the magnitude of hyperthermia in running mice may be regulated centrally, independently of exercise intensity.
Cohen, Jonathan; Rahamimov, Ruth; Hoffman, Aaron; Katvan, Eyal; Grozovski, Kyril; Ashkenazi, Tamar
2017-09-01
Strategies aimed at expanding the organ donor pool have been sought, which has resulted in renewed interest in donation after cardio-circulatory death (DCCD), also known as non-heart beating donors (NHBDs). To describe the derivation and implementation of a protocol for DCCD in Israel and report on the results with the first six cases. After receiving approval from an extraordinary ethics committee, Ministry of Health, the steering committee of the National Transplant Center defined and reached consensus on the unique challenges presented by a DCCD program. These protocol included medical aspects (construction of a clinical pathway), social and ethical aspects (presentation of the protocol at a public gathering(, legal/ethical aspects (consent for organ preservation procedures being either implied if the donor had signed an organ donor card or received directly from a surrogate decision maker), and logistical aspects (pilot study confined to kidney retrieval and to four medical centers). Data regarding organ donors and recipients were recorded. The protocol was implemented at four medical centers. Consent for organ donation was received from four of the six potential donors meeting criteria for inclusion, in all cases, from a surrogate decision maker. Of the eight kidneys retrieved, only four were suitable for transplantation, which was carried out successfully for four recipients. Graft function remained normal in all cases in 6-12 months follow-up. The DCCD program was successfully implemented and initial results are encouraging, suggesting that expansion of the program might further aid in decreasing the gap between needs and availability of organs.
Wanner, Samuel Penna; Costa, Kátia Anunciação; Soares, Anne Danieli Nascimento; Cardoso, Valbert Nascimento; Coimbra, Cândido Celso
2014-08-01
The mechanisms underlying physical exercise-induced hyperthermia may be species specific. Therefore, the present study aimed to investigate the effects of exercise intensity and ambient temperature on the core body temperature (T core) of running mice, which provide an important experimental model for advancing the understanding of thermal physiology. We evaluated the influence of different protocols (constant- or incremental-speed exercises), treadmill speeds and ambient temperatures (T a) on the magnitude of exercise-induced hyperthermia. To measure T core, a telemetric sensor was implanted in the abdominal cavity of male adult Swiss mice under anesthesia. After recovering from the surgery, the animals were familiarized to running on a treadmill and then subjected to the different running protocols and speeds at two T a: 24 °C or 34 °C. All of the experimental trials resulted in marked increases in T core. As expected, the higher-temperature environment increased the magnitude of running-induced hyperthermia. For example, during incremental exercise at 34 °C, the maximal T core achieved was increased by 1.2 °C relative to the value reached at 24 °C. However, at the same T a, neither treadmill speed nor exercise protocol altered the magnitude of exercise-induced hyperthermia. We conclude that T core of running mice is influenced greatly by T a, but not by the exercise protocols or intensities examined in the present report. These findings suggest that the magnitude of hyperthermia in running mice may be regulated centrally, independently of exercise intensity.
Influence of LCD color reproduction accuracy on observer performance using virtual pathology slides
NASA Astrophysics Data System (ADS)
Krupinski, Elizabeth A.; Silverstein, Louis D.; Hashmi, Syed F.; Graham, Anna R.; Weinstein, Ronald S.; Roehrig, Hans
2012-02-01
The use of color LCDs in medical imaging is growing as more clinical specialties use digital images as a resource in diagnosis and treatment decisions. Telemedicine applications such as telepathology, teledermatology and teleophthalmology rely heavily on color images. However, standard methods for calibrating, characterizing and profiling color displays do not exist, resulting in inconsistent presentation. To address this, we developed a calibration, characterization and profiling protocol for color-critical medical imaging applications. Physical characterization of displays calibrated with and without the protocol revealed high color reproduction accuracy with the protocol. The present study assessed the impact of this protocol on observer performance. A set of 250 breast biopsy virtual slide regions of interest (half malignant, half benign) were shown to 6 pathologists, once using the calibration protocol and once using the same display in its "native" off-the-shelf uncalibrated state. Diagnostic accuracy and time to render a decision were measured. In terms of ROC performance, Az (area under the curve) calibrated = 0.8640; uncalibrated = 0.8558. No statistically significant difference (p = 0.2719) was observed. In terms of interpretation speed, mean calibrated = 4.895 sec, mean uncalibrated = 6.304 sec which is statistically significant (p = 0.0460). Early results suggest a slight advantage diagnostically for a properly calibrated and color-managed display and a significant potential advantage in terms of improved workflow. Future work should be conducted using different types of color images that may be more dependent on accurate color rendering and a wider range of LCDs with varying characteristics.
An XML-Based Protocol for Distributed Event Services
NASA Technical Reports Server (NTRS)
Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)
2001-01-01
A recent trend in distributed computing is the construction of high-performance distributed systems called computational grids. One difficulty we have encountered is that there is no standard format for the representation of performance information and no standard protocol for transmitting this information. This limits the types of performance analysis that can be undertaken in complex distributed systems. To address this problem, we present an XML-based protocol for transmitting performance events in distributed systems and evaluate the performance of this protocol.
NASA Astrophysics Data System (ADS)
Sun, Ying; Wen, Qiao-yan; Zhu, Fu-chen
2010-01-01
The security of the multiparty quantum secret sharing protocol presented by Zhang [Z.J. Zhang, Physica A, 361 (2006) 233] is analyzed. It is shown that this protocol is vulnerable to the insider attack since eavesdropping detection is performed only when all states arrive at the last agent. We propose an attack strategy and give an improved version of the original protocol. The improved protocol is robust and has the same traits with the original one.
Viviani, R; Fischer, J; Spitzer, M; Freudenmann, R W
2004-04-01
We present a security protocol for the exchange of medical data via the Internet, based on the type/domain model. We discuss two applications of the protocol: in a system for the exchange of data for quality assurance, and in an on-line database of adverse reactions to drug use. We state that a type/domain security protocol can successfully comply with the complex requirements for data privacy and accessibility typical of such applications.
On Robust Key Agreement Based on Public Key Authentication
NASA Astrophysics Data System (ADS)
Hao, Feng
We describe two new attacks on the HMQV protocol. The first attack raises a serious question on the basic definition of "authentication" in HMQV, while the second attack is generally applicable to many other protocols. In addition, we present a new authenticated key agreement protocol called YAK. Our approach is to depend on well-established techniques such as Schnorr's signature. Among all the related protocols, YAK appears to be the simplest so far. We believe simplicity is an important engineering principle.
NASA Technical Reports Server (NTRS)
Hooker, Stanford B. (Editor); Firestone, Elaine R. (Editor); Acker, James G. (Editor); Mueller, James L.; Austin, Roswell W.
1995-01-01
This report presents protocols for measuring optical properties, and other environmental variables, to validate the radiometric performance of the Sea-viewing Wide Field-of-view Sensor (SeaWiFS), and to develop and validate bio-optical algorithms for use with SeaWiFS data. The protocols are intended to establish foundations for a measurement strategy to verify the challenging SeaWiFS uncertainty goals of 5 percent in water-leaving radiances and 35 percent in chlorophyll alpha concentration. The protocols first specify the variables which must be measured, and briefly review the rationale for measuring each variable. Subsequent chapters cover detailed protocols for instrument performance specifications, characterizing and calibrating instruments, methods of making measurements in the field, and methods of data analysis. These protocols were developed at a workshop sponsored by the SeaWiFS Project Office (SPO) and held at the Naval Postgraduate School in Monterey, California (9-12 April 1991). This report began as the proceedings of the workshop, as interpreted and expanded by the authors and reviewed by workshop participants and other members of the bio-optical research community. The protocols are an evolving prescription to allow the research community to approach the unprecedented measurement uncertainties implied by the SeaWiFS goals; research and development are needed to improve the state-of-the-art in specific areas. These protocols should be periodically revised to reflect technical advances during the SeaWiFS Project cycle. The present edition (Revision 1) incorporates new protocols in several areas, including expanded protocol descriptions for Case-2 waters and other improvements, as contributed by several members of the SeaWiFS Science Team.
Analyzing the effect of routing protocols on media access control protocols in radio networks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Barrett, C. L.; Drozda, M.; Marathe, A.
2002-01-01
We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i)more » number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.« less
Collocott, Shirley Jf; Kelly, Edel; Ellis, Richard F
2018-03-01
Early mobilisation protocols after repair of extensor tendons in zone V and VI provide better outcomes than immobilisation protocols. This systematic review investigated different early active mobilisation protocols used after extensor tendon repair in zone V and VI. The purpose was to determine whether any one early active mobilisation protocol provides superior results. An extensive literature search was conducted to identify articles investigating the outcomes of early active mobilisation protocols after extensor tendon repair in zone V and VI. Databases searched were AMED, Embase, Medline, Cochrane and CINAHL. Studies were included if they involved participants with extensor tendon repairs in zone V and VI in digits 2-5 and described a post-operative rehabilitation protocol which allowed early active metacarpophalangeal joint extension. Study designs included were randomised controlled trials, observational studies, cohort studies and case series. The Structured Effectiveness Quality Evaluation Scale was used to evaluate the methodological quality of the included studies. Twelve articles met the inclusion criteria. Two types of early active mobilisation protocols were identified: controlled active motion protocols and relative motion extension splinting protocols. Articles describing relative motion extension splinting protocols were more recent but of lower methodological quality than those describing controlled active motion protocols. Participants treated with controlled active motion and relative motion extension splinting protocols had similar range of motion outcomes, but those in relative motion extension splinting groups returned to work earlier. The evidence reviewed suggested that relative motion extension splinting protocols may allow an earlier return to function than controlled active motion protocols without a greater risk of complication.
Network support for turn-taking in multimedia collaboration
NASA Astrophysics Data System (ADS)
Dommel, Hans-Peter; Garcia-Luna-Aceves, Jose J.
1997-01-01
The effectiveness of collaborative multimedia systems depends on the regulation of access to their shared resources, such as continuous media or instruments used concurrently by multiple parties. Existing applications use only simple protocols to mediate such resource contention. Their cooperative rules follow a strict agenda and are largely application-specific. The inherent problem of floor control lacks a systematic methodology. This paper presents a general model on floor control for correct, scalable, fine-grained and fair resource sharing that integrates user interaction with network conditions, and adaptation to various media types. The motion of turn-taking known from psycholinguistics in studies on discourse structure is adapted for this framework. Viewed as a computational analogy to speech communication, online collaboration revolves around dynamically allocated access permissions called floors. The control semantics of floors derives from concurrently control methodology. An explicit specification and verification of a novel distributed Floor Control Protocol are presented. Hosts assume sharing roles that allow for efficient dissemination of control information, agreeing on a floor holder which is granted mutually exclusive access to a resource. Performance analytic aspects of floor control protocols are also briefly discussed.
Molenaar, Heike; Glawe, Martin; Boehm, Robert; Piepho, Hans-Peter
2017-01-01
Ornamental plant variety improvement is limited by current phenotyping approaches and neglected use of experimental designs. The present study was conducted to show the benefits of using an experimental design and corresponding analysis in ornamental breeding regarding simulated response to selection in Pelargonium zonale for production-related traits. This required establishment of phenotyping protocols for root formation and stem cutting counts, with which 974 genotypes were assessed in a two-phase experimental design. The present paper evaluates this protocol. The possibility of varietal improvement through indirect selection on secondary traits such as branch count and flower count was assessed by genetic correlations. Simulated response to selection varied greatly, depending on the genotypic variances of the breeding population and traits. A varietal improvement of over 20% is possible for stem cutting count, root formation, branch count and flower count. In contrast, indirect selection of stem cutting count by branch count or flower count was found to be ineffective. The established phenotypic protocols and two-phase experimental designs are valuable tools for breeding of P. zonale. PMID:28243453
Molenaar, Heike; Glawe, Martin; Boehm, Robert; Piepho, Hans-Peter
2017-01-01
Ornamental plant variety improvement is limited by current phenotyping approaches and neglected use of experimental designs. The present study was conducted to show the benefits of using an experimental design and corresponding analysis in ornamental breeding regarding simulated response to selection in Pelargonium zonale for production-related traits. This required establishment of phenotyping protocols for root formation and stem cutting counts, with which 974 genotypes were assessed in a two-phase experimental design. The present paper evaluates this protocol. The possibility of varietal improvement through indirect selection on secondary traits such as branch count and flower count was assessed by genetic correlations. Simulated response to selection varied greatly, depending on the genotypic variances of the breeding population and traits. A varietal improvement of over 20% is possible for stem cutting count, root formation, branch count and flower count. In contrast, indirect selection of stem cutting count by branch count or flower count was found to be ineffective. The established phenotypic protocols and two-phase experimental designs are valuable tools for breeding of P. zonale .
DeCoste, Jared B.; Peterson, Gregory W.
2013-01-01
Plasma enhanced chemical vapor deposition (PECVD) of perfluoroalkanes has long been studied for tuning the wetting properties of surfaces. For high surface area microporous materials, such as metal-organic frameworks (MOFs), unique challenges present themselves for PECVD treatments. Herein the protocol for development of a MOF that was previously unstable to humid conditions is presented. The protocol describes the synthesis of Cu-BTC (also known as HKUST-1), the treatment of Cu-BTC with PECVD of perfluoroalkanes, the aging of materials under humid conditions, and the subsequent ammonia microbreakthrough experiments on milligram quantities of microporous materials. Cu-BTC has an extremely high surface area (~1,800 m2/g) when compared to most materials or surfaces that have been previously treated by PECVD methods. Parameters such as chamber pressure and treatment time are extremely important to ensure the perfluoroalkane plasma penetrates to and reacts with the inner MOF surfaces. Furthermore, the protocol for ammonia microbreakthrough experiments set forth here can be utilized for a variety of test gases and microporous materials. PMID:24145623
Imaging malaria sporozoites in the dermis of the mammalian host.
Amino, Rogerio; Thiberge, Sabine; Blazquez, Samantha; Baldacci, Patricia; Renaud, Olivier; Shorte, Spencer; Ménard, Robert
2007-01-01
The initial phase of malaria infection is the pre-erythrocytic phase, which begins when parasites are injected by the mosquito into the dermis and ends when parasites are released from hepatocytes into the blood. We present here a protocol for the in vivo imaging of GFP-expressing sporozoites in the dermis of rodents, using the combination of a high-speed spinning-disk confocal microscope and a high-speed charge-coupled device (CCD) camera permitting rapid in vivo acquisitions. The steps of this protocol indicate how to infect mice through the bite of infected Anopheles stephensi mosquitoes, record the sporozoites' fate in the mouse ear and to present the data as maximum-fluorescence-intensity projections, time-lapse representations and movie clips. This protocol permits investigating the various aspects of sporozoite behavior in a quantitative manner, such as motility in the matrix, cell traversal, crossing the endothelial barrier of both blood and lymphatic vessels and intravascular gliding. Applied to genetically modified parasites and/or mice, these imaging techniques should be useful for studying the cellular and molecular bases of Plasmodium sporozoite infection in vivo.
Financial Indicators of Reduced Impact Logging Performance in Brazil: Case Study Comparisons
Thomas P. Holmes; Frederick Boltz; Douglas R. Carter
2001-01-01
Indicators of financial performance are compared for three case studies in the Brazilian Amazon. Each case study presents parameters obtained from monitoring initial harvest entries into primary forests for reduced impact logging (RIL) and conventional logging (CL) operations. Differences in cost definitions and data collection protocols complicate the analysis, and...
An Enhanced Reservation-Based MAC Protocol for IEEE 802.15.4 Networks
Afonso, José A.; Silva, Helder D.; Macedo, Pedro; Rocha, Luis A.
2011-01-01
The IEEE 802.15.4 Medium Access Control (MAC) protocol is an enabling standard for wireless sensor networks. In order to support applications requiring dedicated bandwidth or bounded delay, it provides a reservation-based scheme named Guaranteed Time Slot (GTS). However, the GTS scheme presents some drawbacks, such as inefficient bandwidth utilization and support to a maximum of only seven devices. This paper presents eLPRT (enhanced Low Power Real Time), a new reservation-based MAC protocol that introduces several performance enhancing features in comparison to the GTS scheme. This MAC protocol builds on top of LPRT (Low Power Real Time) and includes various mechanisms designed to increase data transmission reliability against channel errors, improve bandwidth utilization and increase the number of supported devices. A motion capture system based on inertial and magnetic sensors has been used to validate the protocol. The effectiveness of the performance enhancements introduced by each of the new features is demonstrated through the provision of both simulation and experimental results. PMID:22163826
Practical decoy state for quantum key distribution
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ma Xiongfeng; Qi Bing; Zhao Yi
2005-07-15
Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution (QKD). Here, we present a general theory of the decoy state protocol based on only two decoy states and one signal state. We perform optimization on the choice of intensities of the two decoy states and the signal state. Our result shows that a decoy state protocol with only two types of decoy states - the vacuum and a weak decoy state - asymptotically approaches the theoretical limit of the most general type of decoy state protocol (with an infinite numbermore » of decoy states). We also present a one-decoy-state protocol. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long-distance (larger than 100 km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical.« less
Beam quality corrections for parallel-plate ion chambers in electron reference dosimetry
NASA Astrophysics Data System (ADS)
Zink, K.; Wulff, J.
2012-04-01
Current dosimetry protocols (AAPM, IAEA, IPEM, DIN) recommend parallel-plate ionization chambers for dose measurements in clinical electron beams. This study presents detailed Monte Carlo simulations of beam quality correction factors for four different types of parallel-plate chambers: NACP-02, Markus, Advanced Markus and Roos. These chambers differ in constructive details which should have notable impact on the resulting perturbation corrections, hence on the beam quality corrections. The results reveal deviations to the recommended beam quality corrections given in the IAEA TRS-398 protocol in the range of 0%-2% depending on energy and chamber type. For well-guarded chambers, these deviations could be traced back to a non-unity and energy-dependent wall perturbation correction. In the case of the guardless Markus chamber, a nearly energy-independent beam quality correction is resulting as the effects of wall and cavity perturbation compensate each other. For this chamber, the deviations to the recommended values are the largest and may exceed 2%. From calculations of type-B uncertainties including effects due to uncertainties of the underlying cross-sectional data as well as uncertainties due to the chamber material composition and chamber geometry, the overall uncertainty of calculated beam quality correction factors was estimated to be <0.7%. Due to different chamber positioning recommendations given in the national and international dosimetry protocols, an additional uncertainty in the range of 0.2%-0.6% is present. According to the IAEA TRS-398 protocol, the uncertainty in clinical electron dosimetry using parallel-plate ion chambers is 1.7%. This study may help to reduce this uncertainty significantly.
Routing in Mobile Wireless Sensor Networks: A Leader-Based Approach.
Burgos, Unai; Amozarrain, Ugaitz; Gómez-Calzado, Carlos; Lafuente, Alberto
2017-07-07
This paper presents a leader-based approach to routing in Mobile Wireless Sensor Networks (MWSN). Using local information from neighbour nodes, a leader election mechanism maintains a spanning tree in order to provide the necessary adaptations for efficient routing upon the connectivity changes resulting from the mobility of sensors or sink nodes. We present two protocols following the leader election approach, which have been implemented using Castalia and OMNeT++. The protocols have been evaluated, besides other reference MWSN routing protocols, to analyse the impact of network size and node velocity on performance, which has demonstrated the validity of our approach.
Simple protocols for oblivious transfer and secure identification in the noisy-quantum-storage model
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schaffner, Christian
2010-09-15
We present simple protocols for oblivious transfer and password-based identification which are secure against general attacks in the noisy-quantum-storage model as defined in R. Koenig, S. Wehner, and J. Wullschleger [e-print arXiv:0906.1030]. We argue that a technical tool from Koenig et al. suffices to prove security of the known protocols. Whereas the more involved protocol for oblivious transfer from Koenig et al. requires less noise in storage to achieve security, our ''canonical'' protocols have the advantage of being simpler to implement and the security error is easier control. Therefore, our protocols yield higher OT rates for many realistic noise parameters.more » Furthermore, a proof of security of a direct protocol for password-based identification against general noisy-quantum-storage attacks is given.« less
Quantum CSMA/CD Synchronous Communication Protocol with Entanglement
NASA Astrophysics Data System (ADS)
Zhou, Nanrun; Zeng, Binyang; Gong, Lihua
By utilizing the characteristics of quantum entanglement, a quantum synchronous communication protocol for Carrier Sense Multiple Access with Collision Detection (CSMA/CD) is presented. The proposed protocol divides the link into the busy time and leisure one, where the data frames are sent via classical channels and the distribution of quantum entanglement is supposed to be completed at leisure time and the quantum acknowledge frames are sent via quantum entanglement channels. The time span between two successfully delivered messages can be significantly reduced in this proposed protocol. It is shown that the performance of the CSMA/CD protocol can be improved significantly since the collision can be reduced to a certain extent. The proposed protocol has great significance in quantum communication.
A Secured Authentication Protocol for SIP Using Elliptic Curves Cryptography
NASA Astrophysics Data System (ADS)
Chen, Tien-Ho; Yeh, Hsiu-Lien; Liu, Pin-Chuan; Hsiang, Han-Chen; Shih, Wei-Kuan
Session initiation protocol (SIP) is a technology regularly performed in Internet Telephony, and Hyper Text Transport Protocol (HTTP) as digest authentication is one of the major methods for SIP authentication mechanism. In 2005, Yang et al. pointed out that HTTP could not resist server spoofing attack and off-line guessing attack and proposed a secret authentication with Diffie-Hellman concept. In 2009, Tsai proposed a nonce based authentication protocol for SIP. In this paper, we demonstrate that their protocol could not resist the password guessing attack and insider attack. Furthermore, we propose an ECC-based authentication mechanism to solve their issues and present security analysis of our protocol to show that ours is suitable for applications with higher security requirement.
Comment on 'Quantum direct communication with authentication'
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhang, Zhan-jun; Key Laboratory of Optoelectronic Information Acquisition and Manipulation of Ministry of Education of China, School of Physics and Material Science, Anhui University, Hefei 230039; Liu, Jun
2007-02-15
Two protocols of quantum direct communication with authentication [Phys. Rev. A 73, 042305 (2006)] were recently proposed by Lee, Lim, and Yang. In this paper we will show that in the two protocols the authenticator Trent should be prevented from knowing the secret message. The first protocol can be eavesdropped on by Trent using the intercept-measure-resend attack, while the second protocol can be eavesdropped on by Trent using a simple single-qubit measurement. To fix these leaks, we revise the original versions of the protocols by using the Pauli Z operation {sigma}{sub z} instead of the original bit-flip operation X. Asmore » a consequence, the attacks we present can be prevented and accordingly the protocol securities are improved.« less
A Protocol for Generating and Exchanging (Genome-Scale) Metabolic Resource Allocation Models.
Reimers, Alexandra-M; Lindhorst, Henning; Waldherr, Steffen
2017-09-06
In this article, we present a protocol for generating a complete (genome-scale) metabolic resource allocation model, as well as a proposal for how to represent such models in the systems biology markup language (SBML). Such models are used to investigate enzyme levels and achievable growth rates in large-scale metabolic networks. Although the idea of metabolic resource allocation studies has been present in the field of systems biology for some years, no guidelines for generating such a model have been published up to now. This paper presents step-by-step instructions for building a (dynamic) resource allocation model, starting with prerequisites such as a genome-scale metabolic reconstruction, through building protein and noncatalytic biomass synthesis reactions and assigning turnover rates for each reaction. In addition, we explain how one can use SBML level 3 in combination with the flux balance constraints and our resource allocation modeling annotation to represent such models.
Assessment and Treatment of Selective Mutism: Recommendations and a Case Study.
ERIC Educational Resources Information Center
Sheridan, Susan M.; And Others
1995-01-01
Presents results of stimulus fading procedure used to treat a six-year-old girl with elective mutism. Presents assessment protocol that features procedures that can be used to render a diagnosis and assist in treatment planning. Results suggest stimulus fading of new persons into the school setting was effective in producing speech. (JBJ)
Chambrone, Leandro; Shibli, Jamil Awad; Mercúrio, Carlos Eduardo; Cardoso, Bruna; Preshaw, Philip M
2015-04-01
To assess the survival percentage, clinical and radiographic outcomes of sandblasted and acid-etched (SLA) dental implants and its modified surface (SLActive) in protocols involving immediate and early occlusal loading. MEDLINE, EMBASE and the Cochrane Oral Health Group's Trials Register CENTRAL were searched in duplicate up to, and including, June 2013 to include randomised controlled trials (RCTs) and prospective observational studies of at least 6-month duration published in all languages. Studies limited to patients treated with SLA and/or SLActive implants involving a treatment protocol describing immediate and early loading of these implants were eligible for inclusion. Data on clinical and/or radiographic outcomes following implant placement were considered for inclusion. Of the 447 potentially eligible publications identified by the search strategy, seven RCTs comprising a total of 853 implants (8% titanium plasma-sprayed, 41.5% SLA and 50.5% SLActive) and 12 prospective observational studies including 1394 SLA and 145 SLActive implants were included in this review. According to the Cochrane Collaboration's tool for assessing risk of bias, one of the studies was considered to be at a low risk of bias, whereas the remaining studies were considered to be at an unclear risk. Regarding the observational studies, all of them presented a medium methodological quality based on the Modified Newcastle-Ottawa scale. There were no significant differences reported in the studies in relation to implant loss or clinical parameters between the immediate/early loading and delayed loading protocols. Overall, 95% of SLA and 97% of SLActive implants still survive at the end of follow-up. Despite of the positive findings achieved by the included studies, few RCTs were available for analysis for SLActive implants. Study heterogeneity, scarcity of data and the lack of pooled estimates represent a limitation between studies' comparisons and should be considered when interpreting the present findings. © 2014 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tfaily, Malak M.; Chu, Rosalie K.; Toyoda, Jason
A vast number of organic compounds are present in soil organic matter (SOM) and play an important role in the terrestrial carbon cycle, facilitate interactions between organisms, and represent a sink for atmospheric CO2. The diversity of different SOM compounds and their molecular characteristics is a function of the organic source material and biogeochemical history. By understanding how SOM composition changes with sources and the processes by which it is biogeochemically altered in different terrestrial ecosystems, it may be possible to predict nutrient and carbon cycling, response to system perturbations, and impact of climate change will have on SOM composition.more » In this study, a sequential chemical extraction procedure was developed to reveal the diversity of organic matter (OM) in different ecosystems and was compared to the previously published protocol using parallel solvent extraction (PSE). We compared six extraction methods using three sample types, peat soil, spruce forest soil and river sediment, so as to select the best method for extracting a representative fraction of organic matter from soils and sediments from a wide range of ecosystems. We estimated the extraction yield of dissolved organic carbon (DOC) by total organic carbon analysis, and measured the composition of extracted OM using high resolution mass spectrometry. This study showed that OM composition depends primarily on soil and sediment characteristics. Two sequential extraction protocols, progressing from polar to non-polar solvents, were found to provide the highest number and diversity of organic compounds extracted from the soil and sediments. Water (H2O) is the first solvent used for both protocols followed by either co-extraction with methanol-chloroform (MeOH-CHCl3) mixture, or acetonitrile (ACN) and CHCl3 sequentially. The sequential extraction protocol developed in this study offers improved sensitivity, and requires less sample compared to the PSE workflow where a new sample is used for each solvent type. Furthermore, a comparison of SOM composition from the different sample types revealed that our sequential protocol allows for ecosystem comparisons based on the diversity of compounds present, which in turn could provide new insights about source and processing of organic compounds in different soil and sediment types.« less
Degidi, Marco; Daprile, Giuseppe; Piattelli, Adriano
2015-06-01
The purpose of this present study was to investigate the relation between implant site underpreparation and primary stability in the presence of poor-quality bone. A study was performed on fresh humid bovine bone; samples presented no cortical layer with a cancellous structure inside and were obtained from the hip. The bones were firmly attached to a base device. Sixty sites were prepared according to the protocol provided by the manufacturer: a 2-mm pilot drill was introduced to the proper depth and then twist drills of 3 and 3.4 mm were used. After site preparation, 20 3.4- × 11-mm (standard protocol group), 20 3.8- × 11-mm (10% undersized group), and 20 4.5- × 11-mm (25% undersized group) implants were inserted at a calibrated maximum torque of 70 N-cm at the predetermined speed of 30 rpm. After implant insertion, variable torque work (VTW), maximum insertion torque (peak IT), and resonance frequency analysis (RFA) values were recorded. The standard protocol group showed a mean VTW of 565.77 ± 219.12 N-cm, a peak IT of 11.3 ± 4.44 N-cm, and an RFA of 69.35 ± 7.35 implant stability quotient (ISQ). The 10% undersized group showed a mean VTW of 1,240.24 ± 407.78 N-cm, a peak IT of 20.26 ± 7.03 N-cm, and an RFA of 73.40 ± 2.33 ISQ. The 25% undersized group showed a mean VTW of 1,254.96 ± 727.49 N-cm, a peak IT of 17.15 ± 10.39 N-cm, and an RFA of 72.30 ± 6.70 ISQ. For VTW, the difference between the standard and undersized protocol values was statistically significant; for peak IT, the difference between the standard and 10% undersized protocol values was statistically significant; no other statistical differences were found between mean values. In the presence of poor-bone quality, a 10% undersized protocol is sufficient to improve the primary stability of the implant; additional decreases do not seem to enhance primary stability values. Copyright © 2015 American Association of Oral and Maxillofacial Surgeons. Published by Elsevier Inc. All rights reserved.
Tfaily, Malak M; Chu, Rosalie K; Toyoda, Jason; Tolić, Nikola; Robinson, Errol W; Paša-Tolić, Ljiljana; Hess, Nancy J
2017-06-15
A vast number of organic compounds are present in soil organic matter (SOM) and play an important role in the terrestrial carbon cycle, facilitate interactions between organisms, and represent a sink for atmospheric CO 2 . The diversity of different SOM compounds and their molecular characteristics is a function of the organic source material and biogeochemical history. By understanding how SOM composition changes with sources and the processes by which it is biogeochemically altered in different terrestrial ecosystems, it may be possible to predict nutrient and carbon cycling, response to system perturbations, and impact of climate change will have on SOM composition. In this study, a sequential chemical extraction procedure was developed to reveal the diversity of organic matter (OM) in different ecosystems and was compared to the previously published protocol using parallel solvent extraction (PSE). We compared six extraction methods using three sample types, peat soil, spruce forest soil and river sediment, so as to select the best method for extracting a representative fraction of organic matter from soils and sediments from a wide range of ecosystems. We estimated the extraction yield of dissolved organic carbon (DOC) by total organic carbon analysis, and measured the composition of extracted OM using high resolution mass spectrometry. This study showed that OM composition depends primarily on soil and sediment characteristics. Two sequential extraction protocols, progressing from polar to non-polar solvents, were found to provide the highest number and diversity of organic compounds extracted from the soil and sediments. Water (H 2 O) is the first solvent used for both protocols followed by either co-extraction with methanol-chloroform (MeOH-CHCl 3 ) mixture, or acetonitrile (ACN) and CHCl 3 sequentially. The sequential extraction protocol developed in this study offers improved sensitivity, and requires less sample compared to the PSE workflow where a new sample is used for each solvent type. Furthermore, a comparison of SOM composition from the different sample types revealed that our sequential protocol allows for ecosystem comparisons based on the diversity of compounds present, which in turn could provide new insights about source and processing of organic compounds in different soil and sediment types. Copyright © 2017 Elsevier B.V. All rights reserved.
Problem Solving Techniques for the Design of Algorithms.
ERIC Educational Resources Information Center
Kant, Elaine; Newell, Allen
1984-01-01
Presents model of algorithm design (activity in software development) based on analysis of protocols of two subjects designing three convex hull algorithms. Automation methods, methods for studying algorithm design, role of discovery in problem solving, and comparison of different designs of case study according to model are highlighted.…
Evidence-Based Language Practice
ERIC Educational Resources Information Center
Pollock, Eric J.
2005-01-01
The purpose of this paper was to examine evidence-based procedures in medicine and to demonstrate that the same protocols can be used in English language instruction. In the evidence-based methodology, studies are divided into those that address specific language problems. Integrated studies are presented as a systematic overview, meta-analysis,…
Summary and Synthesis: How to Present a Research Proposal.
Setia, Maninder Singh; Panda, Saumya
2017-01-01
This concluding module attempts to synthesize the key learning points discussed during the course of the previous ten sets of modules on methodology and biostatistics. The objective of this module is to discuss how to present a model research proposal, based on whatever was discussed in the preceding modules. The lynchpin of a research proposal is the protocol, and the key component of a protocol is the study design. However, one must not neglect the other areas, be it the project summary through which one catches the eyes of the reviewer of the proposal, or the background and the literature review, or the aims and objectives of the study. Two critical areas in the "methods" section that cannot be emphasized more are the sampling strategy and a formal estimation of sample size. Without a legitimate sample size, none of the conclusions based on the statistical analysis would be valid. Finally, the ethical parameters of the study should be well understood by the researchers, and that should get reflected in the proposal.
Summary and Synthesis: How to Present a Research Proposal
Setia, Maninder Singh; Panda, Saumya
2017-01-01
This concluding module attempts to synthesize the key learning points discussed during the course of the previous ten sets of modules on methodology and biostatistics. The objective of this module is to discuss how to present a model research proposal, based on whatever was discussed in the preceding modules. The lynchpin of a research proposal is the protocol, and the key component of a protocol is the study design. However, one must not neglect the other areas, be it the project summary through which one catches the eyes of the reviewer of the proposal, or the background and the literature review, or the aims and objectives of the study. Two critical areas in the “methods” section that cannot be emphasized more are the sampling strategy and a formal estimation of sample size. Without a legitimate sample size, none of the conclusions based on the statistical analysis would be valid. Finally, the ethical parameters of the study should be well understood by the researchers, and that should get reflected in the proposal. PMID:28979004
Microplastics in seafood: Benchmark protocol for their extraction and characterization.
Dehaut, Alexandre; Cassone, Anne-Laure; Frère, Laura; Hermabessiere, Ludovic; Himber, Charlotte; Rinnert, Emmanuel; Rivière, Gilles; Lambert, Christophe; Soudant, Philippe; Huvet, Arnaud; Duflos, Guillaume; Paul-Pont, Ika
2016-08-01
Pollution of the oceans by microplastics (<5 mm) represents a major environmental problem. To date, a limited number of studies have investigated the level of contamination of marine organisms collected in situ. For extraction and characterization of microplastics in biological samples, the crucial step is the identification of solvent(s) or chemical(s) that efficiently dissolve organic matter without degrading plastic polymers for their identification in a time and cost effective way. Most published papers, as well as OSPAR recommendations for the development of a common monitoring protocol for plastic particles in fish and shellfish at the European level, use protocols containing nitric acid to digest the biological tissues, despite reports of polyamide degradation with this chemical. In the present study, six existing approaches were tested and their effects were compared on up to 15 different plastic polymers, as well as their efficiency in digesting biological matrices. Plastic integrity was evaluated through microscopic inspection, weighing, pyrolysis coupled with gas chromatography and mass spectrometry, and Raman spectrometry before and after digestion. Tissues from mussels, crabs and fish were digested before being filtered on glass fibre filters. Digestion efficiency was evaluated through microscopical inspection of the filters and determination of the relative removal of organic matter content after digestion. Five out of the six tested protocols led to significant degradation of plastic particles and/or insufficient tissue digestion. The protocol using a KOH 10% solution and incubation at 60 °C during a 24 h period led to an efficient digestion of biological tissues with no significant degradation on all tested polymers, except for cellulose acetate. This protocol appeared to be the best compromise for extraction and later identification of microplastics in biological samples and should be implemented in further monitoring studies to ensure relevance and comparison of environmental and seafood product quality studies. Copyright © 2016 Elsevier Ltd. All rights reserved.
Neurofeedback training improves attention and working memory performance.
Wang, Jinn-Rong; Hsieh, Shulan
2013-12-01
The present study aimed to investigate the effectiveness of the frontal-midline theta (fmθ) activity uptraining protocol on attention and working memory performance of older and younger participants. Thirty-two participants were recruited. Participants within each age group were randomly assigned to either the neurofeedback training (fmθ uptraining) group or the sham-neurofeedback training group. There was a significant improvement in orienting scores in the older neurofeedback training group. In addition, there was a significant improvement in conflict scores in both the older and young neurofeedback training groups. However, alerting scores failed to increase. In addition, the fmθ training was found to improve working memory function in the older participants. The results further showed that fmθ training can modulate resting EEG for both neurofeedback groups. Our study demonstrated that fmθ uptraining improved attention and working memory performance and theta activity in the resting state for normal aging adults. In addition, younger participants also benefited from the present protocol in terms of improving their executive function. The current findings contribute to a better understanding of the mechanisms underlying neurofeedback training in cognitive function, and suggest that the fmθ uptraining protocol is an effective intervention program for cognitive aging. Copyright © 2013 International Federation of Clinical Neurophysiology. Published by Elsevier Ireland Ltd. All rights reserved.
Secure Skyline Queries on Cloud Platform
Liu, Jinfei; Yang, Juncheng; Xiong, Li; Pei, Jian
2017-01-01
Outsourcing data and computation to cloud server provides a cost-effective way to support large scale data storage and query processing. However, due to security and privacy concerns, sensitive data (e.g., medical records) need to be protected from the cloud server and other unauthorized users. One approach is to outsource encrypted data to the cloud server and have the cloud server perform query processing on the encrypted data only. It remains a challenging task to support various queries over encrypted data in a secure and efficient way such that the cloud server does not gain any knowledge about the data, query, and query result. In this paper, we study the problem of secure skyline queries over encrypted data. The skyline query is particularly important for multi-criteria decision making but also presents significant challenges due to its complex computations. We propose a fully secure skyline query protocol on data encrypted using semantically-secure encryption. As a key subroutine, we present a new secure dominance protocol, which can be also used as a building block for other queries. Finally, we provide both serial and parallelized implementations and empirically study the protocols in terms of efficiency and scalability under different parameter settings, verifying the feasibility of our proposed solutions. PMID:28883710
Simultaneous purification of DNA and RNA from microbiota in a single colonic mucosal biopsy.
Moen, Aina E F; Tannæs, Tone M; Vatn, Simen; Ricanek, Petr; Vatn, Morten Harald; Jahnsen, Jørgen
2016-06-28
Nucleic acid purification methods are of importance when performing microbiota studies and especially when analysing the intestinal microbiota as we here find a wide range of different microbes. Various considerations must be taken to lyse the microbial cell wall of each microbe. In the present article, we compare several tissue lysis steps and commercial purification kits, to achieve a joint RNA and DNA purification protocol for the purpose of investigating the microbiota and the microbiota-host interactions in a single colonic mucosal tissue sample. A further optimised tissue homogenisation and lysis protocol comprising mechanical bead beating, lysis buffer replacement and enzymatic treatment, in combination with the AllPrep DNA/RNA Mini Kit (Qiagen, Hilden, Germany) resulted in efficient and simultaneous purification of microbial and human RNA and DNA from a single mucosal colonic tissue sample. The present work provides a unique possibility to study RNA and DNA from the same mucosal biopsy sample, making a direct comparison between metabolically active microbes and total microbial DNA. The protocol also offers an opportunity to investigate other members of a microbiota such as viruses, fungi and micro-eukaryotes, and moreover the possibility to extract data on microbiota and host interactions from one single mucosal biopsy.
Păsărelu, Costina Ruxandra; Dobrean, Anca
2018-04-13
Internalizing problems are the most prevalent mental health problems in adolescents. Transdiagnostic programs are promising manners to treat multiple problems within the same protocol, however, there is limited research regarding the efficacy of such programs delivered as universal prevention programs in school settings. Therefore, the present study aims to investigate the efficacy of a video-based transdiagnostic rational emotive behavioral therapy (REBT) universal prevention program, for internalizing problems. The second objective of the present paper will be to investigate the subsequent mechanisms of change, namely maladaptive cognitions. A two-arm parallel randomized controlled trial will be conducted, with two groups: a video-based transdiagnostic REBT universal prevention program and a wait list control. Power analysis indicated that the study will involve 338 participants. Adolescents with ages between 12 and 17 years old, from several middle schools and high schools, will be invited to participate. Assessments will be conducted at four time points: baseline (T 1 ), post-intervention (T 2 ), 3 months follow-up (T 3 ) and 12 months follow-up (T 4 ). Intent-to-treat analysis will be used in order to investigate significant differences between the two groups in both primary and secondary outcomes. This is the first randomized controlled trial that aims to investigate the efficacy and mechanisms of change of a video-based transdiagnostic REBT universal prevention program, delivered in a school context. The present study has important implications for developing efficient prevention programs, interactive, that will aim to target within the same protocol both anxiety and depressive symptoms. ClinicalTrials.gov: NCT02756507 . Registered on 25 April 2016.
Eastwood, John G; Kemp, Lynn A; Jalaludin, Bin B
2016-01-01
We have recently described a protocol for a study that aims to build a theory of neighbourhood context and postnatal depression. That protocol proposed a critical realist Explanatory Theory Building Method comprising of an: (1) emergent phase, (2) construction phase, and (3) confirmatory phase. A concurrent triangulated mixed method multilevel cross-sectional study design was described. The protocol also described in detail the Theory Construction Phase which will be presented here. The Theory Construction Phase will include: (1) defining stratified levels; (2) analytic resolution; (3) abductive reasoning; (4) comparative analysis (triangulation); (5) retroduction; (6) postulate and proposition development; (7) comparison and assessment of theories; and (8) conceptual frameworks and model development. The stratified levels of analysis in this study were predominantly social and psychological. The abductive analysis used the theoretical frames of: Stress Process; Social Isolation; Social Exclusion; Social Services; Social Capital, Acculturation Theory and Global-economic level mechanisms. Realist propositions are presented for each analysis of triangulated data. Inference to best explanation is used to assess and compare theories. A conceptual framework of maternal depression, stress and context is presented that includes examples of mechanisms at psychological, social, cultural and global-economic levels. Stress was identified as a necessary mechanism that has the tendency to cause several outcomes including depression, anxiety, and health harming behaviours. The conceptual framework subsequently included conditional mechanisms identified through the retroduction including the stressors of isolation and expectations and buffers of social support and trust. The meta-theory of critical realism is used here to generate and construct social epidemiological theory using stratified ontology and both abductive and retroductive analysis. The findings will be applied to the development of a middle range theory and subsequent programme theory for local perinatal child and family interventions.
Mars Sample Handling Protocol Workshop Series: Workshop 4
NASA Technical Reports Server (NTRS)
Race Margaret S. (Editor); DeVincenzi, Donald L. (Editor); Rummel, John D. (Editor); Acevedo, Sara E. (Editor)
2001-01-01
In preparation for missions to Mars that will involve the return of samples to Earth, it will be necessary to prepare for the receiving, handling, testing, distributing, and archiving of martian materials here on Earth. Previous groups and committees have studied selected aspects of sample return activities, but specific detailed protocols for the handling and testing of returned samples must still be developed. To further refine the requirements for sample hazard testing and to develop the criteria for subsequent release of sample materials from quarantine, the NASA Planetary Protection Officer convened a series of workshops in 2000-2001. The overall objective of the Workshop Series was to produce a Draft Protocol by which returned martian sample materials can be assessed for biological hazards and examined for evidence of life (extant or extinct) while safeguarding the purity of the samples from possible terrestrial contamination. This report also provides a record of the proceedings of Workshop 4, the final Workshop of the Series, which was held in Arlington, Virginia, June 5-7, 2001. During Workshop 4, the sub-groups were provided with a draft of the protocol compiled in May 2001 from the work done at prior Workshops in the Series. Then eight sub-groups were formed to discuss the following assigned topics: Review and Assess the Draft Protocol for Physical/Chemical Testing Review and Assess the Draft Protocol for Life Detection Testing Review and Assess the Draft Protocol for Biohazard Testing Environmental and Health/Monitoring and Safety Issues Requirements of the Draft Protocol for Facilities and Equipment Contingency Planning for Different Outcomes of the Draft Protocol Personnel Management Considerations in Implementation of the Draft Protocol Draft Protocol Implementation Process and Update Concepts This report provides the first complete presentation of the Draft Protocol for Mars Sample Handling to meet planetary protection needs. This Draft Protocol, which was compiled from deliberations and recommendations from earlier Workshops in the Series, represents a consensus that emerged from the discussions of all the sub-groups assembled over the course of the five Workshops of the Series. These discussions converged on a conceptual approach to sample handling, as well as on specific analytical requirements. Discussions also identified important issues requiring attention, as well as research and development needed for protocol implementation.
The Use of Efficient Broadcast Protocols in Asynchronous Distributed Systems. Ph.D. Thesis
NASA Technical Reports Server (NTRS)
Schmuck, Frank Bernhard
1988-01-01
Reliable broadcast protocols are important tools in distributed and fault-tolerant programming. They are useful for sharing information and for maintaining replicated data in a distributed system. However, a wide range of such protocols has been proposed. These protocols differ in their fault tolerance and delivery ordering characteristics. There is a tradeoff between the cost of a broadcast protocol and how much ordering it provides. It is, therefore, desirable to employ protocols that support only a low degree of ordering whenever possible. This dissertation presents techniques for deciding how strongly ordered a protocol is necessary to solve a given application problem. It is shown that there are two distinct classes of application problems: problems that can be solved with efficient, asynchronous protocols, and problems that require global ordering. The concept of a linearization function that maps partially ordered sets of events to totally ordered histories is introduced. How to construct an asynchronous implementation that solves a given problem if a linearization function for it can be found is shown. It is proved that in general the question of whether a problem has an asynchronous solution is undecidable. Hence there exists no general algorithm that would automatically construct a suitable linearization function for a given problem. Therefore, an important subclass of problems that have certain commutativity properties are considered. Techniques for constructing asynchronous implementations for this class are presented. These techniques are useful for constructing efficient asynchronous implementations for a broad range of practical problems.
Quantum dense key distribution
DOE Office of Scientific and Technical Information (OSTI.GOV)
Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.
2004-03-01
This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.
A standard protocol for describing individual-based and agent-based models
Grimm, Volker; Berger, Uta; Bastiansen, Finn; Eliassen, Sigrunn; Ginot, Vincent; Giske, Jarl; Goss-Custard, John; Grand, Tamara; Heinz, Simone K.; Huse, Geir; Huth, Andreas; Jepsen, Jane U.; Jorgensen, Christian; Mooij, Wolf M.; Muller, Birgit; Pe'er, Guy; Piou, Cyril; Railsback, Steven F.; Robbins, Andrew M.; Robbins, Martha M.; Rossmanith, Eva; Ruger, Nadja; Strand, Espen; Souissi, Sami; Stillman, Richard A.; Vabo, Rune; Visser, Ute; DeAngelis, Donald L.
2006-01-01
Simulation models that describe autonomous individual organisms (individual based models, IBM) or agents (agent-based models, ABM) have become a widely used tool, not only in ecology, but also in many other disciplines dealing with complex systems made up of autonomous entities. However, there is no standard protocol for describing such simulation models, which can make them difficult to understand and to duplicate. This paper presents a proposed standard protocol, ODD, for describing IBMs and ABMs, developed and tested by 28 modellers who cover a wide range of fields within ecology. This protocol consists of three blocks (Overview, Design concepts, and Details), which are subdivided into seven elements: Purpose, State variables and scales, Process overview and scheduling, Design concepts, Initialization, Input, and Submodels. We explain which aspects of a model should be described in each element, and we present an example to illustrate the protocol in use. In addition, 19 examples are available in an Online Appendix. We consider ODD as a first step for establishing a more detailed common format of the description of IBMs and ABMs. Once initiated, the protocol will hopefully evolve as it becomes used by a sufficiently large proportion of modellers.
Influence of the Distribution of Tag IDs on RFID Memoryless Anti-Collision Protocols.
Cmiljanic, Nikola; Landaluce, Hugo; Perallos, Asier; Arjona, Laura
2017-08-17
In recent years, Radio Frequency Identification (RFID) has become very popular. The main feature of this technology is that RFID tags do not require close handling and no line of sight is required between the reader and the tags. RFID is a technology that uses radio frequencies in order to identify tags, which do not need to be positioned accurately relative to the reader. Tags share the communication channel, increasing the likelihood of causing a problem, viz., a message collision. Tree based protocols can resolve these collisions, but require a uniform tag ID distribution. This means they are very dependent of the distribution of the IDs of the tags. Tag IDs are written in the tag and contain a predefined bit string of data. A study of the influence of the tag ID distribution on the protocols' behaviour is proposed here. A new protocol, called the Flexible Query window Tree (FQwT) is presented to estimate the tag ID distribution, taking into consideration the type of distribution. The aim is to create a flexible anti-collision protocol in order to identify a set of tags that constitute an ID distribution. As a result, the reader classifies tags into groups determined by using a distribution estimator. Simulations show that the FQwT protocol contributes to significant reductions in identification time and energy consumption regardless of the type of ID distribution.
Fully Integrated Passive UHF RFID Tag for Hash-Based Mutual Authentication Protocol
Mikami, Shugo; Watanabe, Dai; Li, Yang; Sakiyama, Kazuo
2015-01-01
Passive radio-frequency identification (RFID) tag has been used in many applications. While the RFID market is expected to grow, concerns about security and privacy of the RFID tag should be overcome for the future use. To overcome these issues, privacy-preserving authentication protocols based on cryptographic algorithms have been designed. However, to the best of our knowledge, evaluation of the whole tag, which includes an antenna, an analog front end, and a digital processing block, that runs authentication protocols has not been studied. In this paper, we present an implementation and evaluation of a fully integrated passive UHF RFID tag that runs a privacy-preserving mutual authentication protocol based on a hash function. We design a single chip including the analog front end and the digital processing block. We select a lightweight hash function supporting 80-bit security strength and a standard hash function supporting 128-bit security strength. We show that when the lightweight hash function is used, the tag completes the protocol with a reader-tag distance of 10 cm. Similarly, when the standard hash function is used, the tag completes the protocol with the distance of 8.5 cm. We discuss the impact of the peak power consumption of the tag on the distance of the tag due to the hash function. PMID:26491714
Afshari, Amirali; Uhde-Stone, Claudia; Lu, Biao
2015-03-13
Luciferase assay has become an increasingly important technique to monitor a wide range of biological processes. However, the mainstay protocols require a luminometer to acquire and process the data, therefore limiting its application to specialized research labs. To overcome this limitation, we have developed an alternative protocol that utilizes a commonly available cooled charge-coupled device (CCCD), instead of a luminometer for data acquiring and processing. By measuring activities of different luciferases, we characterized their substrate specificity, assay linearity, signal-to-noise levels, and fold-changes via CCCD. Next, we defined the assay parameters that are critical for appropriate use of CCCD for different luciferases. To demonstrate the usefulness in cultured mammalian cells, we conducted a case study to examine NFκB gene activation in response to inflammatory signals in human embryonic kidney cells (HEK293 cells). We found that data collected by CCCD camera was equivalent to those acquired by luminometer, thus validating the assay protocol. In comparison, The CCCD-based protocol is readily amenable to live-cell and high-throughput applications, offering fast simultaneous data acquisition and visual and quantitative data presentation. In conclusion, the CCCD-based protocol provides a useful alternative for monitoring luciferase reporters. The wide availability of CCCD will enable more researchers to use luciferases to monitor and quantify biological processes. Copyright © 2015 Elsevier Inc. All rights reserved.
Method selection for sustainability assessments: The case of recovery of resources from waste water.
Zijp, M C; Waaijers-van der Loop, S L; Heijungs, R; Broeren, M L M; Peeters, R; Van Nieuwenhuijzen, A; Shen, L; Heugens, E H W; Posthuma, L
2017-07-15
Sustainability assessments provide scientific support in decision procedures towards sustainable solutions. However, in order to contribute in identifying and choosing sustainable solutions, the sustainability assessment has to fit the decision context. Two complicating factors exist. First, different stakeholders tend to have different views on what a sustainability assessment should encompass. Second, a plethora of sustainability assessment methods exist, due to the multi-dimensional characteristic of the concept. Different methods provide other representations of sustainability. Based on a literature review, we present a protocol to facilitate method selection together with stakeholders. The protocol guides the exploration of i) the decision context, ii) the different views of stakeholders and iii) the selection of pertinent assessment methods. In addition, we present an online tool for method selection. This tool identifies assessment methods that meet the specifications obtained with the protocol, and currently contains characteristics of 30 sustainability assessment methods. The utility of the protocol and the tool are tested in a case study on the recovery of resources from domestic waste water. In several iterations, a combination of methods was selected, followed by execution of the selected sustainability assessment methods. The assessment results can be used in the first phase of the decision procedure that leads to a strategic choice for sustainable resource recovery from waste water in the Netherlands. Copyright © 2017 Elsevier Ltd. All rights reserved.
The Wisconsin Frog and Toad Survey: Update and 1984-97 trends [abstract
Mossman, M.J.; Hartman, L.; Sauer, J.; Hay, R.; Dhuey, B.
1998-01-01
The Wisconsin Frog and Toad Survey (WFTS) is a volunteer-based, roadside auditory count that began in 1981. It's protocols were recently modified for continent-wide use by the North American Amphibian Monitoring Plan (NAAMP). In 1997 we initiated a study to compare data collected by the WFTS and NAAMP protocols, in order to guide WFTS transition from its current methodology to one more compatible with NAAMP, without losing the use of data collected since 1981. In this paper we present results from the first year of this study, along with results from analyses of WFTS data, including distributional maps, 1984-97 population trends, phenological information, and progress on a new web page.
Lusilla-Palacios, Pilar; Castellano-Tejedor, Carmina; Lucrecia-Ramírez-Garcerán; Navarro-Sanchís, José A; Rodríguez-Urrutia, Amanda; Parramon-Puig, Gemma; Valero-Ventura, Sergi; Cuxart-Fina, Ampar
2015-10-01
Acute spinal cord injury leaves patients severely impaired and generates high levels of psychological distress among them and their families, which can cause a less active role in rehabilitation, worse functional recovery, and less perceived satisfaction with the results. Additionally, rehabilitation professionals who deal with this psychological distress could ultimately experience higher stress and more risk of burnout. This article presents the study protocol of the ESPELMA project, aimed to train rehabilitation professionals in the clinical management of acute spinal cord injury-associated psychological distress, and to measure the impact of this training on the patients' perceived satisfaction with treatment. © The Author(s) 2013.
ChIP-seq and RNA-seq methods to study circadian control of transcription in mammals
Takahashi, Joseph S.; Kumar, Vivek; Nakashe, Prachi; Koike, Nobuya; Huang, Hung-Chung; Green, Carla B.; Kim, Tae-Kyung
2015-01-01
Genome-wide analyses have revolutionized our ability to study the transcriptional regulation of circadian rhythms. The advent of next-generation sequencing methods has facilitated the use of two such technologies, ChIP-seq and RNA-seq. In this chapter, we describe detailed methods and protocols for these two techniques, with emphasis on their usage in circadian rhythm experiments in the mouse liver, a major target organ of the circadian clock system. Critical factors for these methods are highlighted and issues arising with time series samples for ChIP-seq and RNA-seq are discussed. Finally detailed protocols for library preparation suitable for Illumina sequencing platforms are presented. PMID:25662462
Preparation of Stable Amyloid-β Oligomers Without Perturbative Methods.
Kotler, Samuel A; Ramamoorthy, Ayyalusamy
2018-01-01
Soluble amyloid-β (Aβ) oligomers have become a focal point in the study of Alzheimer's disease due to their ability to elicit cytotoxicity. A number of recent studies have concentrated on the structural characterization of soluble Aβ oligomers to gain insight into their mechanism of toxicity. Consequently, providing reproducible protocols for the preparation of such oligomers is of utmost importance. The method presented in this chapter details a protocol for preparing an Aβ oligomer, with a primarily disordered secondary structure, without the need for chemical modification or amino acid substitution. Due to the stability of these disordered Aβ oligomers and the reproducibility with which they form, they are amenable for biophysical and high-resolution structural characterization.
Yang, Lei; Chen, Shouming; Yang, Di; Li, Jiajin; Wu, Taixiang; Zuo, Yunxia
2018-05-15
To learn about the overall quality of clinical anaesthesia study protocols from the Chinese Clinical Trials Registry and to discuss the way to improve study protocol quality. We defined completeness of each sub-item in SPIRIT as N/A (not applicable) or with a score of 0, 1, or 2. For each protocol, we calculated the proportion of adequately reported items (score = 2 and N/A) and unreported items (score = 0). Protocol quality was determined according to the proportion of reported items, with values >50% indicating high quality. Protocol quality was determined according to the proportion of reported items. For each sub-item in SPIRIT, we calculated the adequately reported rate (percentage of all protocols with score 2 and NA on one sub-item) as well as the unreported rate (percentage of all protocols with score 0 on one sub-item). Total 126 study protocols were available for assessment. Among these, 88.1% were assessed as being of low quality. By comparison, the percentage of low-quality protocols was 88.9% after the publication of the SPIRIT statement. Among the 51 SPIRIT sub-items, 18 sub-items had an unreported rate above 90% while 16 had a higher adequately reported rate than an unreported rate. The overall quality of clinical anaesthesia study protocols registered in the ChiCTR was poor. A mandatory protocol upload and self-check based on the SPIRIT statement during the trial registration process may improve protocol quality in the future.
Hoenders, H J Rogier; Appelo, Martin T; van den Brink, Erik H; Hartogs, Bregje M A; de Jong, Joop T V M
2011-12-01
Complementary and alternative medicine (CAM) is subject to heated debates and prejudices. Studies show that CAM is widely used by psychiatric patients, usually without the guidance of a therapist and without the use of a solid working method, leading to potential health risks. The purpose of this study is to facilitate the judicious use of CAM alongside conventional psychiatry in an outpatient psychiatric clinic. A search was made through scientific and legal articles and discussion in focus groups. In the Centre for Integrative Psychiatry (CIP) of Lentis in The Netherlands, some carefully selected CAM are offered under strict conditions, alongside conventional treatments. Because of the controversy and the potential health risks, Lentis designed a protocol that is presented. The CIP hopes, by using this protocol, to better serve and respect the individual needs and preferences of the diversity of psychiatric patients in our Dutch multicultural society, and better protect them from harm.
Pullara, Filippo; Guerrero-Santoro, Jennifer; Calero, Monica; Zhang, Qiangmin; Peng, Ye; Spåhr, Henrik; Kornberg, Guy L.; Cusimano, Antonella; Stevenson, Hilary P.; Santamaria-Suarez, Hugo; Reynolds, Shelley L.; Brown, Ian S.; Monga, Satdarshan P.S.; Van Houten, Bennett; Rapić-Otrin, Vesna; Calero, Guillermo; Levine, Arthur S.
2014-01-01
Expression of recombinant proteins in bacterial or eukaryotic systems often results in aggregation rendering them unavailable for biochemical or structural studies. Protein aggregation is a costly problem for biomedical research. It forces research laboratories and the biomedical industry to search for alternative, more soluble, non-human proteins and limits the number of potential “druggable” targets. In this study we present a highly reproducible protocol that introduces the systematic use of an extensive number of detergents to solubilize aggregated proteins expressed in bacterial and eukaryotic systems. We validate the usefulness of this protocol by solubilizing traditionally difficult human protein targets to milligram quantities and confirm their biological activity. We use this method to solubilize monomeric or multimeric components of multi-protein complexes and demonstrate its efficacy to reconstitute large cellular machines. This protocol works equally well on cytosolic, nuclear and membrane proteins and can be easily adapted to a high throughput format. PMID:23137940
Entanglement enhancement in multimode integrated circuits
NASA Astrophysics Data System (ADS)
Léger, Zacharie M.; Brodutch, Aharon; Helmy, Amr S.
2018-06-01
The faithful distribution of entanglement in continuous-variable systems is essential to many quantum information protocols. As such, entanglement distillation and enhancement schemes are a cornerstone of many applications. The photon subtraction scheme offers enhancement with a relatively simple setup and has been studied in various scenarios. Motivated by recent advances in integrated optics, particularly the ability to build stable multimode interferometers with squeezed input states, a multimodal extension to the enhancement via photon subtraction protocol is studied. States generated with multiple squeezed input states, rather than a single input source, are shown to be more sensitive to the enhancement protocol, leading to increased entanglement at the output. Numerical results show the gain in entanglement is not monotonic with the number of modes or the degree of squeezing in the additional modes. Consequently, the advantage due to having multiple squeezed input states can be maximized when the number of modes is still relatively small (e.g., four). The requirement for additional squeezing is within the current realm of implementation, making this scheme achievable with present technologies.
NASA Astrophysics Data System (ADS)
Coggins, Porter E.
2015-04-01
The purpose of this paper is (1) to present how general education elementary school age students constructed computer passwords using digital root sums and second-order arithmetic sequences, (2) argue that computer password construction can be used as an engaging introduction to generate interest in elementary school students to study mathematics related to computer science, and (3) share additional mathematical ideas accessible to elementary school students that can be used to create computer passwords. This paper serves to fill a current gap in the literature regarding the integration of mathematical content accessible to upper elementary school students and aspects of computer science in general, and computer password construction in particular. In addition, the protocols presented here can serve as a hook to generate further interest in mathematics and computer science. Students learned to create a random-looking computer password by using biometric measurements of their shoe size, height, and age in months and to create a second-order arithmetic sequence, then converted the resulting numbers into characters that become their computer passwords. This password protocol can be used to introduce students to good computer password habits that can serve a foundation for a life-long awareness of data security. A refinement of the password protocol is also presented.
Quantum State Transfer via Noisy Photonic and Phononic Waveguides
NASA Astrophysics Data System (ADS)
Vermersch, B.; Guimond, P.-O.; Pichler, H.; Zoller, P.
2017-03-01
We describe a quantum state transfer protocol, where a quantum state of photons stored in a first cavity can be faithfully transferred to a second distant cavity via an infinite 1D waveguide, while being immune to arbitrary noise (e.g., thermal noise) injected into the waveguide. We extend the model and protocol to a cavity QED setup, where atomic ensembles, or single atoms representing quantum memory, are coupled to a cavity mode. We present a detailed study of sensitivity to imperfections, and apply a quantum error correction protocol to account for random losses (or additions) of photons in the waveguide. Our numerical analysis is enabled by matrix product state techniques to simulate the complete quantum circuit, which we generalize to include thermal input fields. Our discussion applies both to photonic and phononic quantum networks.
Biernat, Ryszard; Wołosewicz, Mariusz; Tomaszewski, Wiesław
2007-01-01
The purpose of this paper is to present a protocol of rehabilitation after ACL reconstruction using a hamstring autograft in the first month after surgery. The program enables the patient to return early to everyday activities (school, sedentary work) without crutches or a stabilizer. The program has been developed in accordance with rehabilitation protocols employed at Karolinska Institute in Sweden and Prof. Shelbourne's Clinic in the USA. The study group included 31 patients (18 men and 13 women). Patients rehabilitated in the Department according to our program achieved stable gait patterns and were able to step up and down within four to seven weeks. Early patient mobilization after ACL reconstruction is possible and does not cause any negative effects provided that the patient, doctor and physiotherapist cooperate very closely.
Borges, João Carlos Gomes; Jung, Larissa Molinari; Santos, Sebastião Silva Dos; Carvalho, Vitor Luz; Ramos, Rafael Antonio Nascimento; Alves, Leucio Câmara
2017-03-01
The aim of this study was to report the use of an oral combination of ivermectin plus praziquantel in the treatment of a Pulmonicola cochleotrema in an Antillean manatee ( Trichechus manatus manatus). A female manatee was found exhibiting respiratory changes and the presence of parasites in the nares. Based on clinical manifestations presented by the manatee, a symptomatic therapeutic protocol was employed, which included an anthelmintic treatment using a combination of ivermectin plus praziquantel. The parasites retrieved were identified as P. cochleotrema. The fourth day after the onset of the therapeutic protocol, the clinical signs declined and on the seventh day posttreatment no clinical signs were observed. This is the first time a therapeutic protocol of ivermectin plus praziquantel has been used in the treatment of P. cochleotrema in manatees.
[Theory of Mind in a child with autism: how to train her?].
Martín García, María J; Gómez Becerra, Inmaculada; Garro Espín, María J
2012-11-01
Theory of Mind is a metacognitive skill that, in many cases, is deficient in autism. In this paper, we present a clinical study conducted with a child diagnosed with autism, which verifies the effectiveness of a training protocol testing false beliefs, which has been considered to measure the Theory of Mind. Basically, the protocol incorporates a number of verbal prompts (such as emphasizing the elements of the narratives that indicate situational or temporary changes), trains many examples, extending the tests incorporating some games with more familiar objects from the child's daily life, applies differential contingencies to discriminate right from wrong in each child's responses and provides descriptive feedback. The results show that the training protocol achieved the highest level of correct trials and the child generalizes the ability to take the perspective of her natural context.
Isolation and purification of rabbit mesenchymal stem cells using an optimized protocol.
Lin, Chunbo; Shen, Maorong; Chen, Weiping; Li, Xiaofeng; Luo, Daoming; Cai, Jinhong; Yang, Yuan
2015-11-01
Mesenchymal stem cells were first isolated and grown in vitro by Friedenstein over 40 yr ago; however, their isolation remains challenging as they lack unique markers for identification and are present in very small quantities in mesenchymal tissues and bone marrow. Using whole marrow samples, common methods for mesenchymal stem cell isolation are the adhesion method and density gradient fractionation. The whole marrow sample adhesion method still results in the nonspecific isolation of mononuclear cells, and activation and/or potential loss of target cells. Density gradient fractionation methods are complicated, and may result in contamination with toxic substances that affect cell viability. In the present study, we developed an optimized protocol for the isolation and purification of mesenchymal stem cells based on the principles of hypotonic lysis and natural sedimentation.
Schmettow, Martin; Schnittker, Raphaela; Schraagen, Jan Maarten
2017-05-01
This paper proposes and demonstrates an extended protocol for usability validation testing of medical devices. A review of currently used methods for the usability evaluation of medical devices revealed two main shortcomings. Firstly, the lack of methods to closely trace the interaction sequences and derive performance measures. Secondly, a prevailing focus on cross-sectional validation studies, ignoring the issues of learnability and training. The U.S. Federal Drug and Food Administration's recent proposal for a validation testing protocol for medical devices is then extended to address these shortcomings: (1) a novel process measure 'normative path deviations' is introduced that is useful for both quantitative and qualitative usability studies and (2) a longitudinal, completely within-subject study design is presented that assesses learnability, training effects and allows analysis of diversity of users. A reference regression model is introduced to analyze data from this and similar studies, drawing upon generalized linear mixed-effects models and a Bayesian estimation approach. The extended protocol is implemented and demonstrated in a study comparing a novel syringe infusion pump prototype to an existing design with a sample of 25 healthcare professionals. Strong performance differences between designs were observed with a variety of usability measures, as well as varying training-on-the-job effects. We discuss our findings with regard to validation testing guidelines, reflect on the extensions and discuss the perspectives they add to the validation process. Copyright © 2017 Elsevier Inc. All rights reserved.
Two Quantum Protocols for Oblivious Set-member Decision Problem
NASA Astrophysics Data System (ADS)
Shi, Run-Hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun
2015-10-01
In this paper, we defined a new secure multi-party computation problem, called Oblivious Set-member Decision problem, which allows one party to decide whether a secret of another party belongs to his private set in an oblivious manner. There are lots of important applications of Oblivious Set-member Decision problem in fields of the multi-party collaborative computation of protecting the privacy of the users, such as private set intersection and union, anonymous authentication, electronic voting and electronic auction. Furthermore, we presented two quantum protocols to solve the Oblivious Set-member Decision problem. Protocol I takes advantage of powerful quantum oracle operations so that it needs lower costs in both communication and computation complexity; while Protocol II takes photons as quantum resources and only performs simple single-particle projective measurements, thus it is more feasible with the present technology.
Network time synchronization servers at the US Naval Observatory
NASA Technical Reports Server (NTRS)
Schmidt, Richard E.
1995-01-01
Responding to an increased demand for reliable, accurate time on the Internet and Milnet, the U.S. Naval Observatory Time Service has established the network time servers, tick.usno.navy.mil and tock.usno.navy.mil. The system clocks of these HP9000/747i industrial work stations are synchronized to within a few tens of microseconds of USNO Master Clock 2 using VMEbus IRIG-B interfaces. Redundant time code is available from a VMEbus GPS receiver. UTC(USNO) is provided over the network via a number of protocols, including the Network Time Protocol (NTP) (DARPA Network Working Group Report RFC-1305), the Daytime Protocol (RFC-867), and the Time protocol (RFC-868). Access to USNO network time services is presently open and unrestricted. An overview of USNO time services and results of LAN and WAN time synchronization tests will be presented.
Two Quantum Protocols for Oblivious Set-member Decision Problem
Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun
2015-01-01
In this paper, we defined a new secure multi-party computation problem, called Oblivious Set-member Decision problem, which allows one party to decide whether a secret of another party belongs to his private set in an oblivious manner. There are lots of important applications of Oblivious Set-member Decision problem in fields of the multi-party collaborative computation of protecting the privacy of the users, such as private set intersection and union, anonymous authentication, electronic voting and electronic auction. Furthermore, we presented two quantum protocols to solve the Oblivious Set-member Decision problem. Protocol I takes advantage of powerful quantum oracle operations so that it needs lower costs in both communication and computation complexity; while Protocol II takes photons as quantum resources and only performs simple single-particle projective measurements, thus it is more feasible with the present technology. PMID:26514668
Two Quantum Protocols for Oblivious Set-member Decision Problem.
Shi, Run-Hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun
2015-10-30
In this paper, we defined a new secure multi-party computation problem, called Oblivious Set-member Decision problem, which allows one party to decide whether a secret of another party belongs to his private set in an oblivious manner. There are lots of important applications of Oblivious Set-member Decision problem in fields of the multi-party collaborative computation of protecting the privacy of the users, such as private set intersection and union, anonymous authentication, electronic voting and electronic auction. Furthermore, we presented two quantum protocols to solve the Oblivious Set-member Decision problem. Protocol I takes advantage of powerful quantum oracle operations so that it needs lower costs in both communication and computation complexity; while Protocol II takes photons as quantum resources and only performs simple single-particle projective measurements, thus it is more feasible with the present technology.
Simulation Modeling and Performance Evaluation of Space Networks
NASA Technical Reports Server (NTRS)
Jennings, Esther H.; Segui, John
2006-01-01
In space exploration missions, the coordinated use of spacecraft as communication relays increases the efficiency of the endeavors. To conduct trade-off studies of the performance and resource usage of different communication protocols and network designs, JPL designed a comprehensive extendable tool, the Multi-mission Advanced Communications Hybrid Environment for Test and Evaluation (MACHETE). The design and development of MACHETE began in 2000 and is constantly evolving. Currently, MACHETE contains Consultative Committee for Space Data Systems (CCSDS) protocol standards such as Proximity-1, Advanced Orbiting Systems (AOS), Packet Telemetry/Telecommand, Space Communications Protocol Specification (SCPS), and the CCSDS File Delivery Protocol (CFDP). MACHETE uses the Aerospace Corporation s Satellite Orbital Analysis Program (SOAP) to generate the orbital geometry information and contact opportunities. Matlab scripts provide the link characteristics. At the core of MACHETE is a discrete event simulator, QualNet. Delay Tolerant Networking (DTN) is an end-to-end architecture providing communication in and/or through highly stressed networking environments. Stressed networking environments include those with intermittent connectivity, large and/or variable delays, and high bit error rates. To provide its services, the DTN protocols reside at the application layer of the constituent internets, forming a store-and-forward overlay network. The key capabilities of the bundling protocols include custody-based reliability, ability to cope with intermittent connectivity, ability to take advantage of scheduled and opportunistic connectivity, and late binding of names to addresses. In this presentation, we report on the addition of MACHETE models needed to support DTN, namely: the Bundle Protocol (BP) model. To illustrate the use of MACHETE with the additional DTN model, we provide an example simulation to benchmark its performance. We demonstrate the use of the DTN protocol and discuss statistics gathered concerning the total time needed to simulate numerous bundle transmissions
Clark, Sean; Iltis, Peter W
2008-05-01
Controlled laboratory study. To compare postural performance measures of athletes with those of nonathletes when completing the standard Sensory Organization Test (SOT) and a modified SOT that included dynamic head tilts (DHT-SOT). Authors of recently published research have suggested that modifications to the SOT protocol (eg, introduction of pitch and roll head tilts) may enhance the test's sensitivity when assessing postural stability in individuals with higher balance capabilities or with well-compensated sensory deficits. Nineteen athletes and 19 nonathletes (group) completed both the SOT and DHT-SOT (protocol). During the SOT, participants stood upright as steadily as possible for 20 seconds during each of 6 different sensory conditions. As a variation of the SOT, the DHT-SOT incorporated active pitch and roll head tilts into the SOT protocol. Four 2-way mixed-model analyses of variance (with protocol as the repeated factor) were performed to determine if the composite equilibrium score or the visual, vestibular, or somatosensory ratio scores differed between the 2 groups across the 2 testing protocols. Significant group-by-protocol interaction effects were present for both the composite equilibrium score and visual ratio. Follow-up simple main-effects analyses indicated that these measures did not differ between groups for the SOT protocol but were significantly different on the DHT-SOT. The addition of dynamic head tilts to the SOT protocol resulted in subtle differences in balance function between athletes and nonathletes. Athletes demonstrated an increased ability to adapt to sensory disruptions during the DHT-SOT. Therapists should consider including active pitch and roll head tilts to the SOT when evaluating individuals with higher balance function or to detect subtle deficits in balance function. Diagnosis, level 3b.
Method-centered digital communities on protocols.io for fast-paced scientific innovation.
Kindler, Lori; Stoliartchouk, Alexei; Teytelman, Leonid; Hurwitz, Bonnie L
2016-01-01
The Internet has enabled online social interaction for scientists beyond physical meetings and conferences. Yet despite these innovations in communication, dissemination of methods is often relegated to just academic publishing. Further, these methods remain static, with subsequent advances published elsewhere and unlinked. For communities undergoing fast-paced innovation, researchers need new capabilities to share, obtain feedback, and publish methods at the forefront of scientific development. For example, a renaissance in virology is now underway given the new metagenomic methods to sequence viral DNA directly from an environment. Metagenomics makes it possible to "see" natural viral communities that could not be previously studied through culturing methods. Yet, the knowledge of specialized techniques for the production and analysis of viral metagenomes remains in a subset of labs. This problem is common to any community using and developing emerging technologies and techniques. We developed new capabilities to create virtual communities in protocols.io, an open access platform, for disseminating protocols and knowledge at the forefront of scientific development. To demonstrate these capabilities, we present a virology community forum called VERVENet. These new features allow virology researchers to share protocols and their annotations and optimizations, connect with the broader virtual community to share knowledge, job postings, conference announcements through a common online forum, and discover the current literature through personalized recommendations to promote discussion of cutting edge research. Virtual communities in protocols.io enhance a researcher's ability to: discuss and share protocols, connect with fellow community members, and learn about new and innovative research in the field. The web-based software for developing virtual communities is free to use on protocols.io. Data are available through public APIs at protocols.io.
Nguyen, Nga T.; McInturf, Samuel A.; Mendoza-Cózatl, David G.
2016-01-01
Hydroponic systems have been utilized as one of the standard methods for plant biology research and are also used in commercial production for several crops, including lettuce and tomato. Within the plant research community, numerous hydroponic systems have been designed to study plant responses to biotic and abiotic stresses. Here we present a hydroponic protocol that can be easily implemented in laboratories interested in pursuing studies on plant mineral nutrition. This protocol describes the hydroponic system set up in detail and the preparation of plant material for successful experiments. Most of the materials described in this protocol can be found outside scientific supply companies, making the set up for hydroponic experiments less expensive and convenient. The use of a hydroponic growth system is most advantageous in situations where the nutrient media need to be well controlled and when intact roots need to be harvested for downstream applications. We also demonstrate how nutrient concentrations can be modified to induce plant responses to both essential nutrients and toxic non-essential elements. PMID:27500800
Nguyen, Nga T; McInturf, Samuel A; Mendoza-Cózatl, David G
2016-07-13
Hydroponic systems have been utilized as one of the standard methods for plant biology research and are also used in commercial production for several crops, including lettuce and tomato. Within the plant research community, numerous hydroponic systems have been designed to study plant responses to biotic and abiotic stresses. Here we present a hydroponic protocol that can be easily implemented in laboratories interested in pursuing studies on plant mineral nutrition. This protocol describes the hydroponic system set up in detail and the preparation of plant material for successful experiments. Most of the materials described in this protocol can be found outside scientific supply companies, making the set up for hydroponic experiments less expensive and convenient. The use of a hydroponic growth system is most advantageous in situations where the nutrient media need to be well controlled and when intact roots need to be harvested for downstream applications. We also demonstrate how nutrient concentrations can be modified to induce plant responses to both essential nutrients and toxic non-essential elements.
Yamazaki, Tomoko; Li, Wenling; Mukouyama, Yoh-Suke
2018-03-29
Here, we present a protocol of a whole-mount adult ear skin imaging technique to study comprehensive three-dimensional neuro-vascular branching morphogenesis and patterning, as well as immune cell distribution at a cellular level. The analysis of peripheral nerve and blood vessel anatomical structures in adult tissues provides some insights into the understanding of functional neuro-vascular wiring and neuro-vascular degeneration in pathological conditions such as wound healing. As a highly informative model system, we have focused our studies on adult ear skin, which is readily accessible for dissection. Our simple and reproducible protocol provides an accurate depiction of the cellular components in the entire skin, such as peripheral nerves (sensory axons, sympathetic axons, and Schwann cells), blood vessels (endothelial cells and vascular smooth muscle cells), and inflammatory cells. We believe this protocol will pave the way to investigate morphological abnormalities in peripheral nerves and blood vessels as well as the inflammation in the adult ear skin under different pathological conditions.
Muscle recruitment variations during wrist flexion exercise: MR evaluation
NASA Technical Reports Server (NTRS)
Fleckenstein, J. L.; Watumull, D.; Bertocci, L. A.; Nurenberg, P.; Peshock, R. M.; Payne, J. A.; Haller, R. G.; Blomqvist, C. G. (Principal Investigator)
1994-01-01
OBJECTIVE: Many exercise protocols used in physiological studies assume homogeneous and diffuse muscle recruitment. To test this assumption during a "standard" wrist flexion protocol, variations in muscle recruitment were assessed using MRI in eight healthy subjects. MATERIALS AND METHODS: Variations were assessed by comparing the right to the left forearms and the effect of slight (15 degrees) pronation or supination at the wrist. RESULTS: Postexercise imaging showed focal regions of increased signal intensity (SI), indicating relatively strong recruitment, most often in entire muscles, although occasionally only in subvolumes of muscles. In 15 of 26 studies, flexor carpi radialis (FCR) showed more SI than flexor carpi ulnaris, while in 11 studies SI in these muscles increased equivalently. Relatively greater FCR recruitment was seen during pronation and/or use of the nondominant side. Palmaris longus, a wrist flexor, did not appear recruited in 4 of 11 forearms in which it was present. A portion of the superficial finger flexor became hyperintense in 89% of studies, while recruitment of the deep finger flexor was seen only in 43%. CONCLUSION: Inter- and intraindividual variations in forearm muscle recruitment should be anticipated in physiological studies of standard wrist flexion exercise protocols.
Roberts, S C M; Zahnd, E; Sufrin, C; Armstrong, M A
2015-02-01
This study examined whether adopting a standardized prenatal substance use protocol (protocol) in a hospital labor and delivery unit reduced racial disparities in reporting to child protective services (CPS) related to maternal drug use during pregnancy. This study used an interrupted time series design with a non-equivalent control. One hospital adopted a protocol and another hospital group serving a similar geographic population did not change protocols. Data on CPS reporting disparities from these hospitals over 3.5 years were analyzed using segmented regression. In the hospital that adopted the protocol, almost five times more black than white newborns were reported during the study period. Adopting the protocol was not associated with reduced disparities. Adopting a protocol cannot be assumed to reduce CPS reporting disparities. Efforts to encourage hospitals to adopt protocols as a strategy to reduce disparities may be misguided. Other strategies to reduce disparities are needed.
Mariño, Tania Cruz; Armiñán, Rubén Reynaldo; Cedeño, Humberto Jorge; Mesa, José Miguel Laffita; Zaldivar, Yanetza González; Rodríguez, Raúl Aguilera; Santos, Miguel Velázquez; Mederos, Luis Enrique Almaguer; Herrera, Milena Paneque; Pérez, Luis Velázquez
2011-06-01
Predictive testing protocols are intended to help patients affected with hereditary conditions understand their condition and make informed reproductive choices. However, predictive protocols may expose clinicians and patients to ethical dilemmas that interfere with genetic counseling and the decision making process. This paper describes ethical dilemmas in a series of five cases involving predictive testing for hereditary ataxias in Cuba. The examples herein present evidence of the deeply controversial situations faced by both individuals at risk and professionals in charge of these predictive studies, suggesting a need for expanded guidelines to address such complexities.
Rosset-Llobet, Jaume; Fàbregas-Molas, Sílvia; Pascual-Leone, Alvaro
2014-03-01
Sensory-motor returning (SMR) can help the symptoms of task-specific focal hand dystonia. However, effects vary across patients and take many sessions. Here, we present proof of principle evidence that transcranial direct current stimulation (tDCS) can enhance these effects. We compared the effects of a combined tDCS-SMR protocol (n=4 patients) with the efficacy of SMR alone (n=30 patients). All 4 patients treated with the combined protocol showed greater improvement than those undergoing SMR alone. Results encourage a larger, parallel-group clinical trial with sham tDCS control.
Immunocytochemical detection of astrocytes in brain slices in combination with Nissl staining.
Korzhevskii, D E; Otellin, V A
2005-07-01
The present study was performed to develop a simple and reliable method for the combined staining of specimens to allow the advantages of immunocytochemical detection of astrocytes and assessment of the functional state of neurons by the Nissl method to be assessed simultaneously. The protocol suggested for processing paraffin sections allows preservation of tissue structure at high quality and allows the selective identification of astrocytes with counterstaining of neurons by the Nissl method. The protocol can be used without modification for processing brain specimens from humans and various mammals--except mice and rabbits.
Curcumin uptake enhancement using low dose light illumination during incubation in Candida albicans
NASA Astrophysics Data System (ADS)
Romano, Renan A.; Pratavieira, Sebastião.; da Silva, Ana P.; Kurachi, Cristina; Bagnato, Vanderlei S.; Guimarães, Francisco E. G.
2017-07-01
A new PDI protocol is presented in this study. C. albicans cells pre-illuminated with a low dose light demonstrated an increase of curcumin uptake when compared to dark incubation, leading to a higher PDI efficacy.
Turcios, Jacqueline; Cook, Barbara; Irwin, Julia; Rispoli, Taylor; Landi, Nicole
2017-07-31
This paper includes a detailed description of a familiarization protocol, which is used as an integral component of a larger research protocol to collect electroencephalography (EEG) data and Event-Related Potentials (ERPs). At present, the systems available for the collection of high-quality EEG/ERP data make significant demands on children with developmental disabilities, such as those with an Autism Spectrum Disorder (ASD). Children with ASD may have difficulty adapting to novel situations, tolerating uncomfortable sensory stimuli, and sitting quietly. This familiarization protocol uses Evidence-Based Practices (EBPs) to increase research participants' knowledge and understanding of the specific activities and steps of the research protocol. The tools in this familiarization protocol are a social narrative, a visual schedule, the Premack principle, role-playing, and modeling. The goal of this familiarization protocol is to increase understanding and agency and to potentially reduce anxiety for child participants, resulting in a greater likelihood of the successful completion of the research protocol for the collection of EEG/ERP data.
Authenticated Quantum Key Distribution with Collective Detection using Single Photons
NASA Astrophysics Data System (ADS)
Huang, Wei; Xu, Bing-Jie; Duan, Ji-Tong; Liu, Bin; Su, Qi; He, Yuan-Hang; Jia, Heng-Yue
2016-10-01
We present two authenticated quantum key distribution (AQKD) protocols by utilizing the idea of collective (eavesdropping) detection. One is a two-party AQKD protocol, the other is a multiparty AQKD protocol with star network topology. In these protocols, the classical channels need not be assumed to be authenticated and the single photons are used as the quantum information carriers. To achieve mutual identity authentication and establish a random key in each of the proposed protocols, only one participant should be capable of preparing and measuring single photons, and the main quantum ability that the rest of the participants should have is just performing certain unitary operations. Security analysis shows that these protocols are free from various kinds of attacks, especially the impersonation attack and the man-in-the-middle (MITM) attack.
Space Network Time Distribution and Synchronization Protocol Development for Mars Proximity Link
NASA Technical Reports Server (NTRS)
Woo, Simon S.; Gao, Jay L.; Mills, David
2010-01-01
Time distribution and synchronization in deep space network are challenging due to long propagation delays, spacecraft movements, and relativistic effects. Further, the Network Time Protocol (NTP) designed for terrestrial networks may not work properly in space. In this work, we consider the time distribution protocol based on time message exchanges similar to Network Time Protocol (NTP). We present the Proximity-1 Space Link Interleaved Time Synchronization (PITS) algorithm that can work with the CCSDS Proximity-1 Space Data Link Protocol. The PITS algorithm provides faster time synchronization via two-way time transfer over proximity links, improves scalability as the number of spacecraft increase, lowers storage space requirement for collecting time samples, and is robust against packet loss and duplication which underlying protocol mechanisms provide.
Fast, efficient error reconciliation for quantum cryptography
DOE Office of Scientific and Technical Information (OSTI.GOV)
Buttler, W.T.; Lamoreaux, S.K.; Torgerson, J.R.
2003-05-01
We describe an error-reconciliation protocol, which we call Winnow, based on the exchange of parity and Hamming's 'syndrome' for N-bit subunits of a large dataset. The Winnow protocol was developed in the context of quantum-key distribution and offers significant advantages and net higher efficiency compared to other widely used protocols within the quantum cryptography community. A detailed mathematical analysis of the Winnow protocol is presented in the context of practical implementations of quantum-key distribution; in particular, the information overhead required for secure implementation is one of the most important criteria in the evaluation of a particular error-reconciliation protocol. The increasemore » in efficiency for the Winnow protocol is largely due to the reduction in authenticated public communication required for its implementation.« less
A Draft Test Protocol for Detecting Possible Biohazards in Martian Samples Returned to Earth
NASA Technical Reports Server (NTRS)
Rummel, John D. (Editor); Race, Margaret S.; DeVincenzi, Donald L.; Schad, P. Jackson; Stabekis, Pericles D.; Viso, Michel; Acevedo, Sara E.
2002-01-01
This document presents the first complete draft of a protocol for detecting possible biohazards in Mars samples returned to Earth: it is the final product of the Mars Sample Handling Protocol Workshop Series. convened in 2000-2001 by NASA's Planetary Protection Officer. The goal of the five-workshop Series vas to develop a comprehensive protocol by which returned martian sample materials could be assessed k r the presence of any biological hazard(s) while safeguarding the purity of the samples from possible terrestrial contamination.
Draft Plan to Develop Non-Intrusive Load Monitoring Test Protocols
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mayhorn, Ebony T.; Sullivan, Greg P.; Petersen, Joseph M.
2015-09-29
This document presents a Draft Plan proposed to develop a common test protocol that can be used to evaluate the performance requirements of Non-Intrusive Load Monitoring. Development on the test protocol will be focused on providing a consistent method that can be used to quantify and compare the performance characteristics of NILM products. Elements of the protocols include specifications for appliances to be used, metrics, instrumentation, and a procedure to simulate appliance behavior during tests. In addition, three priority use cases for NILM will be identified and their performance requirements will specified.
Six-State Quantum Key Distribution Using Photons with Orbital Angular Momentum
NASA Astrophysics Data System (ADS)
Li, Jun-Lin; Wang, Chuan
2010-11-01
A new implementation of high-dimensional quantum key distribution (QKD) protocol is discussed. Using three mutual unbiased bases, we present a d-level six-state QKD protocol that exploits the orbital angular momentum with the spatial mode of the light beam. The protocol shows that the feature of a high capacity since keys are encoded using photon modes in d-level Hilbert space. The devices for state preparation and measurement are also discussed. This protocol has high security and the alignment of shared reference frames is not needed between sender and receiver.
ERIC Educational Resources Information Center
Barry, Shane
2012-01-01
The purpose of this research was to firstly develop a protocol for video recording student group oral presentations, for later viewing and self-assessment by student group members. Secondly, evaluations of students' experiences of this process were undertaken to determine if this self-assessment method was a positive experience for them in gaining…
Interface and protocol development for STS read-out ASIC in the CBM experiment at FAIR
NASA Astrophysics Data System (ADS)
Kasinski, Krzysztof; Zabolotny, Wojciech; Szczygiel, Robert
2014-11-01
This paper presents a proposal of a protocol for communication between the read-out integrated circuit for the STS (Silicon Tracking System) and the Data Processing Board (DPB) at CBM (Compressed Baryonic Matter) experiment at FAIR, GSI (Helmholtzzentrum fuer Schwerionenforschung GmbH) in Germany. The application background, objectives and proposed solution is presented.
NASA Astrophysics Data System (ADS)
Dutta, Shovan; Mueller, Erich J.
2018-03-01
We present and analyze a protocol in which polaritons in a noncoplanar optical cavity form fractional quantum Hall states. We model the formation of these states and present techniques for subsequently creating anyons and measuring their fractional exchange statistics. In this protocol, we use a rapid adiabatic passage scheme to sequentially add polaritons to the system, such that the system is coherently driven from n - to (n +1 )-particle Laughlin states. Quasiholes are created by slowly moving local pinning potentials in from outside the cloud. They are braided by dragging the pinning centers around one another, and the resulting phases are measured interferometrically. The most technically challenging issue with implementing our procedure is that maintaining adiabaticity and coherence requires that the two-particle interaction energy V0 be sufficiently large compared to the single-polariton decay rate γ , V0/γ ≫10 N2lnN , where N is the number of particles in the target state. While this condition is very demanding for present-day experiments where V0/γ ˜50 , our protocol presents a significant advance over the existing protocols in the literature.
Qiu, Shuming; Xu, Guoai; Ahmad, Haseeb; Guo, Yanhui
2018-01-01
The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash's scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash's protocol. We point out that Farash's protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.'s scheme. We prove that the proposed protocol not only overcomes the issues in Farash's scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure.
Anticarcinogenic effect of betel leaf extract against tobacco carcinogens.
Padma, P R; Lalitha, V S; Amonkar, A J; Bhide, S V
1989-06-01
Epidemiological studies have implicated that betel quid offers some protection to tobacco induced carcinogenesis. Earlier studies in our laboratory have shown betel leaf extract (BLE) to be antimutagenic against standard mutagens and tobacco-specific N'-nitrosamines (TSNA), N'-nitrosonornicotine (NNN) and 4-(methylnitrosamino)-1-(3-pyridyl)-1-butanone (NNK). In the present study, we have tested the anticarcinogenic effect of BLE using Swiss male mice. Two protocols of study were used to test this effect. In the first protocol, the effect of BLE was tested against the standard carcinogen benzo[a]pyrene (BP) using Wattenberg's stomach tumor model, Cancer Res., 41 (1981) 2820-2823. In this protocol, BLE inhibited the tumorigenicity of BP to a significant extent. In the second protocol, the effect of BLE against the two tobacco-specific nitrosamines, NNN and NNK was studied using long-term studies on Swiss male mice. The nitrosamines were administered on the tongues of the mice, while the BLE was supplied in drinking water. Two doses of NNN (22 mg and 72 mg) and one dose of NNK (22 mg) were used. In this study, it was observed that the number of tumor bearing animals decreased, but the difference was significant only in the group treated with the low dose of NNN in combination with BLE. However, in all the BLE treated animals, irrespective of the dose of nitrosamine, the hepatic vitamin A and C levels were elevated significantly as compared to the corresponding nitrosamine-treated controls. These results indicate that BLE has a promising anticarcinogenic role to play in tobacco induced cancer.(ABSTRACT TRUNCATED AT 250 WORDS)
Shelton, Michael; Kocharyan, Avetik; Liu, Jun; Skerjanc, Ilona S; Stanford, William L
2016-05-15
Human pluripotent stem cells provide a developmental model to study early embryonic and tissue development, tease apart human disease processes, perform drug screens to identify potential molecular effectors of in situ regeneration, and provide a source for cell and tissue based transplantation. Highly efficient differentiation protocols have been established for many cell types and tissues; however, until very recently robust differentiation into skeletal muscle cells had not been possible unless driven by transgenic expression of master regulators of myogenesis. Nevertheless, several breakthrough protocols have been published in the past two years that efficiently generate cells of the skeletal muscle lineage from pluripotent stem cells. Here, we present an updated version of our recently described 50-day protocol in detail, whereby chemically defined media are used to drive and support muscle lineage development from initial CHIR99021-induced mesoderm through to PAX7-expressing skeletal muscle progenitors and mature skeletal myocytes. Furthermore, we report an optional method to passage and expand differentiating skeletal muscle progenitors approximately 3-fold every 2weeks using Collagenase IV and continued FGF2 supplementation. Both protocols have been optimized using a variety of human pluripotent stem cell lines including patient-derived induced pluripotent stem cells. Taken together, our differentiation and expansion protocols provide sufficient quantities of skeletal muscle progenitors and myocytes that could be used for a variety of studies. Copyright © 2015 The Authors. Published by Elsevier Inc. All rights reserved.
A pilot study of modified cognitive-behavioral therapy for childhood traumatic grief (CBT-CTG).
Cohen, Judith A; Mannarino, Anthony P; Staron, Virginia R
2006-12-01
This pilot study evaluated outcomes for a modified 12-session protocol of cognitive-behavioral therapy for childhood traumatic grief (CBT-CTG) conducted between March 2004 and October 2005. CTG is an emerging condition characterized by a combination of posttraumatic stress and unresolved grief symptoms. This two-module treatment model consisting of sequential trauma- and grief-focused components was shortened from a previously presented 16-session protocol. Thirty-nine children ages 6 to 17 years old with CTG and their parents received the modified 12-session protocol of CBT-CTG. CTG and posttraumatic stress disorder (PTSD) symptoms were assessed at pretreatment, after the trauma-focused module, and after the grief-focused module (at posttreatment). Child depression, anxiety, and behavioral symptoms, as well as parental depression and PTSD symptoms, were assessed at pre- and posttreatment. Children reported significant improvement in CTG, PTSD, depression, and anxiety, and parents reported significant improvement in children's PTSD, internalizing and total behavior problems, and their personal PTSD symptoms. Although PTSD significantly improved only during the trauma-focused module of treatment, CTG improved significantly during both trauma- and grief-focused modules of treatment. Child satisfaction and parent satisfaction for this treatment protocol were also high. These findings suggest that the shortened CBT-CTG protocol, which is similar in the number of sessions to what many community child bereavement programs offer, may be acceptable and efficacious for this population. The CBT-CTG model requires further evaluation in randomized, controlled treatment trials.
Ginani, Fernanda; Soares, Diego Moura; Rabêlo, Luciana Maria; Rocha, Hugo Alexandre Oliveira; de Souza, Lélia Batista; Barboza, Carlos Augusto Galvão
2016-11-01
The aim of the present study was to evaluate the influence of a cryopreservation protocol on the proliferation and viability of stem cells from human exfoliated deciduous teeth (SHEDs). Cells from the pulp of three deciduous teeth were isolated and characterized to confirm their stem cell nature. In second passage, part of the cells were submitted to normal conditions of cell culture (Control group), while part of the cells were maintained in 10% DMSO diluted in foetal bovine serum and submitted to the following cryopreservation protocol: 2 h at 4 °C, 18 h at -20 °C and then at -80 °C for two intervals (30 days - Cryopreservation I; and 180 days Cryopreservation II). Cell proliferation and cell cycle were evaluated at intervals of 24, 48 and 72 h after plating, and apoptosis-related events were analyzed at 72 h. All groups exhibited an increase in the number of cells, and no significant differences between the cryopreserved and control groups were observed (p > .05). The distribution of cells in the cell cycle phases was consistent with cell proliferation, and the percentage of viable cells was higher than 99% in all groups, indicating that cell viability was not affected by the cryopreservation protocol throughout the experiment. The proposed cryopreservation protocol is adequate for the storage of SHED, permitting their use in future experimental studies.
Breaking bad news-what patients want and what they get: evaluating the SPIKES protocol in Germany.
Seifart, C; Hofmann, M; Bär, T; Riera Knorrenschild, J; Seifart, U; Rief, W
2014-03-01
Evaluation of the SPIKES protocol, a recommended guideline for breaking bad news, is sparse, and information about patients' preferences for bad-news delivery in Germany is lacking. Being the first actual-theoretical comparison of a 'breaking bad news' guideline, the present study evaluates the recommended steps of the SPIKES protocol. Moreover, emotional consequences and quality of bad-news delivery are investigated. A total of 350 cancer patients answered the MABBAN (Marburg Breaking Bad News Scale), a questionnaire representing the six SPIKES subscales, asking for the procedure, perception and satisfaction of the first cancer disclosure and patient's assign to these items. Only 46.2% of the asked cancer patients are completely satisfied with how bad news had been broken to them. The overall quality is significantly related to the emotional state after receiving bad news (r = -0.261, P < 0.001). Patients' preferences differ highly significantly from the way bad news were delivered, and the resulting rang list of patients' preferences indicates that the SPIKES protocol do not fully meet the priorities of cancer patients in Germany. It could be postulated that the low satisfaction of patients observed in this study reflects the highly significant difference between patients' preferences and bad-news delivery. Therefore, some adjunctions to the SPIKES protocol should be considered, including a frequent reassurance of listeners' understanding, the perpetual possibility to ask question, respect for prearrangement needs and the conception of bad-news delivery in a two-step procedure.
USDA-ARS?s Scientific Manuscript database
Federal dietary guidance recommends consumption of a variety of vegetables, but Americans only consume a small fraction of recommended amounts. Studies have attempted to increase consumption with modest results. In this manuscript, we present the protocol for a study that applies incentive sensitiza...