Science.gov

Sample records for presentation du protocole

  1. NREL Test-to-Failure Protocol (Presentation)

    SciTech Connect

    Hacke, P.

    2012-03-01

    The presentation describes the test-to-failure protocol that was developed and piloted at NREL, stressing PV modules with multiple applications of damp heat (with bias) and thermal cycling until they fail.

  2. Uccle Carte du Ciel Plate Catalogue Present in the WFPDB

    NASA Astrophysics Data System (ADS)

    Tsvetkova, Katya; Tsvetkov, Milcho; Lampens, Patricia; Duval, David

    2007-08-01

    We present the catalogue of the Carte du Ciel plates collected at the Royal Observatory of Belgium (ROB) and incorporated in the Wide-Field Plate Database. The catalogue comprises the descriptive information for 682 plates obtained with the Gautier 0.33-m equatorial telescope in the framework of the Carte du Ciel project in the period 1908-1939. The plates were taken using triple exposures with duration of 15 to 30 minutes. An analysis of the ROB CdC catalogue's content is presented. The catalogue, as well as the plate previews taken with a flatbed scanner AGFA (model DUOSCAN HiD) with a resolution of 250 dpi in TIFF format (of size 2.5 MB), are available on-line at http://www.skyarchive.org/.

  3. The Geneva Protocol of 1925: Past and Present.

    ERIC Educational Resources Information Center

    Harbison, John L.

    1982-01-01

    Presents a position paper for use in high school social studies class debates on the Geneva Protocol of 1925. The Protocol was an international agreement to restrict chemical and biological warfare (CBW). The author traces the history of U.S. policies dealing with CBW since 1925. (AM)

  4. Lymphome malin non hodgkinien du cavum: protocoles thérapeutiques et facteurs pronostiques

    PubMed Central

    Ouraini, Saloua; Nakkabi, Ismail; Benariba, Fouad

    2015-01-01

    Le lymphome malin non hodgkinien est une entité histologique rare parmi les cancers du cavum, la plupart des tumeurs du nasopharynx étant des carcinomes indifférenciés ou Undifferencied Carcinoma of Nasopharyngeal Type (UCNT); Il pose souvent un problème de diagnostic positif clinique et histologique. La symptomatologie est généralement peu spécifique et la démarche étiologique repose sur la biopsie du cavum faite à l'examen endoscopique avec examen immuno-histochimique. Nous rapportons le cas d'un lymphome non hodgkinien avec atteinte du nasopharynx, l'analyse anatomopathologique est en faveur d'un lymphome malin non hodgkinien de phénotype B. Les aspects cliniques, radiologiques, histologiques et thérapeutiques sont décrits. PMID:26889334

  5. [Therapeutic application of collateral ventilation in diffuse pulmonary emphysema: study protocol presentation].

    PubMed

    Saad, Roberto; Dorgan Neto, Vicente; Botter, Marcio; Stirbulov, Roberto; Rivaben, Jorge; Gonçalves, Roberto

    2008-06-01

    We present a protocol to test a new surgical procedure for the treatment of patients with diffuse lung emphysema who, after having received the golden standard treatment (pulmonary rehabilitation), continue to present respiratory failure with disabling dyspnea. Ten patients with severe lung hyperinflation will be evaluated. The method proposed is designed to create alternative expiratory passages for air trapped in the emphysematous lung by draining the lung parenchyma, thereby establishing communication between the alveoli and the external environment. The ten patients selected will be required to meet the inclusion criteria and to give written informed consent. Those ten patients will be included in the study pending the approval of the Ethics in Research Committee of the São Paulo Santa Casa School of Medicine, São Paulo, Brazil. The protocol we will employ in order to evaluate the proposed procedure is feasible and will show whether debilitated patients suffering from diffuse pulmonary emphysema can benefit from this procedure, which could represent an alternative to lung transplant or lung volume reduction surgery, the only options currently available.

  6. EPA Protocol Gas Verification Program - Presented at NIST Gas Panel Meeting

    EPA Science Inventory

    Accurate compressed gas calibration standards are needed to calibrate continuous emission monitors (CEMs) and ambient air quality monitors that are being used for regulatory purposes. US Environmental Protection Agency (EPA) established its traceability protocol to ensure that c...

  7. George Hughes and the history of fish ventilation: from Du Verney to the present.

    PubMed

    Wegner, Nicholas C; Graham, Jeffrey B

    2010-09-01

    This paper traces the research history of fish ventilation from its origins in the early 1700s to the present with emphasis on the work of George M. Hughes, who is considered by many to be the founder of the modern era of fish respiratory science. A particularly important year in the timeline for fish respiratory studies was 1960, when Hughes presented the currently accepted biomechanical model driving fish ventilation. He showed that both bony and cartilaginous fishes breathe through the use of a dual-pumping mechanism: a buccal or orobranchial pressure pump to force water over the gills and an opercular or parabranchial suction pump to pull water through the branchial chambers. Hughes divided this mechanism into four stages and demonstrated that during each the pressure of the buccal cavity usually exceeded that of the opercular chamber, thus indicating the continuous, or nearly continuous, nature of the ventilatory stream. Studies by Hughes and later researchers focused on variation in the four stages and related these to interspecific differences in fish habitat and activity level. Differences noted in the respiration of pelagic and benthic species largely led to the description and quantification of ram ventilation. Hughes further made significant contributions to the correlation of gill structure and function and was one of the first to examine gill morphometrics in relation to the ventilatory stream and the diffusivity of oxygen from the water into the blood. Such pioneering measurements paved the way toward the modern analyses of gill hydromechanics and the modeling of respiratory gas exchange in fishes.

  8. A Video Recording and Viewing Protocol for Student Group Presentations: Assisting Self-Assessment through a Wiki Environment

    ERIC Educational Resources Information Center

    Barry, Shane

    2012-01-01

    The purpose of this research was to firstly develop a protocol for video recording student group oral presentations, for later viewing and self-assessment by student group members. Secondly, evaluations of students' experiences of this process were undertaken to determine if this self-assessment method was a positive experience for them in gaining…

  9. Impact of restricted amoxicillin/clavulanic acid use on Escherichia coli resistance--antibiotic DU90% profiles with bacterial resistance rates: a visual presentation.

    PubMed

    Mimica Matanovic, Suzana; Bergman, Ulf; Vukovic, Dubravka; Wettermark, Björn; Vlahovic-Palcevski, Vera

    2010-10-01

    High use of amoxicillin/clavulanic acid (AMC) at the University Hospital Osijek (Croatia) contributed to high rates of resistance in Enterobacteriaceae, in particular Escherichia coli (50%). Thus, in order to decrease bacterial resistance, AMC use was restricted. We present results of the restriction on resistance amongst antibiotics accounting for 90% of antibiotic use [drug utilisation 90% (DU90%)]. Data were analysed on antibiotic use and microbiological susceptibility of E. coli during two 9-month periods, before and after the restriction of AMC use. Drug use was presented as numbers of defined daily doses (DDDs) and DDDs/100 bed-days. Resistance of E. coli to antibiotics was presented as percentages of isolated strains in the DU90% segment. Use of AMC was 16 DDDs/100 bed-days or 30% of all antibiotics before the intervention. Use of AMC fell to 2 DDDs/100 bed-days or 4% after the intervention, and resistance of E. coli fell from 37% to 11%. In conclusion, restricted use of AMC resulted in a significant decrease of E. coli resistance. DU90% resistance profiles are simple and useful tools in highlighting problems in antibiotic use and resistance but may also be useful in long-term follow-up of antibiotic policy.

  10. Magnetic nanobeads present during enzymatic amplification and labeling for a simplified DNA detection protocol based on AC susceptometry

    NASA Astrophysics Data System (ADS)

    Bejhed, Rebecca S.; Strømme, Maria; Svedlindh, Peter; Ahlford, Annika; Strömberg, Mattias

    2015-12-01

    Magnetic biosensors are promising candidates for low-cost point-of-care biodiagnostic devices. For optimal efficiency it is crucial to minimize the time and complexity of the assay protocol including target recognition, amplification, labeling and read-out. In this work, possibilities for protocol simplifications for a DNA biodetection principle relying on hybridization of magnetic nanobeads to rolling circle amplification (RCA) products are investigated. The target DNA is recognized through a padlock ligation assay resulting in DNA circles serving as templates for the RCA process. It is found that beads can be present during amplification without noticeably interfering with the enzyme used for RCA (phi29 polymerase). As a result, the bead-coil hybridization can be performed immediately after amplification in a one-step manner at elevated temperature within a few minutes prior to read-out in an AC susceptometer setup, i.e. a combined protocol approach. Moreover, by recording the phase angle ξ = arctan(χ″/χ'), where χ and χ″ are the in-phase and out-of-phase components of the AC susceptibility, respectively, at one single frequency the total assay time for the optimized combined protocol would be no more than 1.5 hours, often a relevant time frame for diagnosis of cancer and infectious disease. Also, applying the phase angle method normalization of AC susceptibility data is not needed. These findings are useful for the development of point-of-care biodiagnostic devices relying on bead-coil binding and magnetic AC susceptometry.

  11. Temporal presentation protocols in stereoscopic displays: Flicker visibility, perceived motion, and perceived depth

    PubMed Central

    Hoffman, David M.; Karasev, Vasiliy I.; Banks, Martin S.

    2011-01-01

    Most stereoscopic displays rely on field-sequential presentation to present different images to the left and right eyes. With sequential presentation, images are delivered to each eye in alternation with dark intervals, and each eye receives its images in counter phase with the other eye. This type of presentation can exacerbate image artifacts including flicker, and the appearance of unsmooth motion. To address the flicker problem, some methods repeat images multiple times before updating to new ones. This greatly reduces flicker visibility, but makes motion appear less smooth. This paper describes an investigation of how different presentation methods affect the visibility of flicker, motion artifacts, and distortions in perceived depth. It begins with an examination of these methods in the spatio-temporal frequency domain. From this examination, it describes a series of predictions for how presentation rate, object speed, simultaneity of image delivery to the two eyes, and other properties ought to affect flicker, motion artifacts, and depth distortions, and reports a series of experiments that tested these predictions. The results confirmed essentially all of the predictions. The paper concludes with a summary and series of recommendations for the best approach to minimize these undesirable effects. PMID:21572544

  12. Experimental Control of Nodality via Equal Presentations of Conditional Discriminations in Different Equivalence Protocols under Speed and No-Speed Conditions

    ERIC Educational Resources Information Center

    Imam, Abdulrazaq A.

    2006-01-01

    A within-participant comparison of simple-to-complex, complex-to-simple, and simultaneous protocols was conducted establishing different sets of three 7-member equivalence classes for 4 undergraduate students. The protocols were implemented under either accuracy-only or accuracy-plus-speed conditions while keeping number of presentations of…

  13. Fortuitous FISH diagnosis of an interstitial microdeletion (5)(q31.1q31.2) in a girl suspected to present a cri-du-chat syndrome.

    PubMed

    Mosca, A L; Callier, P; Leheup, B; Marle, N; Jalloul, M; Coffinet, L; Feillet, F; Valduga, M; Jonveaux, P; Mugneret, F

    2007-06-15

    Constitutional interstitial deletions of 5q are relatively rare and most are poorly characterized cytogenetically. Consequently a definite karyotype-phenotype correlation is difficult to establish. We report on a new case of a girl presenting with an abnormal cry, upslanting palpebral fissures, hypertelorism, anteverted nostrils, microretrognathia, growth retardation, and an adenoid cyst at the base of the tongue. The first suspected diagnosis was cri-du-chat syndrome because of the mewing cry. Standard cytogenetic analyses were interpreted as normal, but FISH studies using the probe of cri-du-chat syndrome with the control probe EGR1 (5q31.2)/D5S23 (Abbott) revealed a 5q31.2 microdeletion which was then confirmed by CGH-array (Abbott). FISH studies using PACs and BACs clones (Rocchi, Italia) enabled us to characterize the breakpoints of the deleted region. Cytogenetic analysis with FISH studies revealed a normal karyotype with normal 5q31 region in both parents. This case is compared with the other cases reported in the literature.

  14. Flexible logical-link-identifier assignment policy for Ethernet passive optical networks based on extended multipoint-control-protocol du flow control

    NASA Astrophysics Data System (ADS)

    Hajduczenia, Marek; da Silva, Henrique J.; Monteiro, Paulo P.

    2006-09-01

    We present a novel proposal for the extension of the currently approved multipoint control protocol (MPCP), as defined in the IEEE 802.3ah standard, clause 64, in the form of two new MPCP messages (extended GATE and extended REPORT), maintaining full backward compatibility with the already-deployed Ethernet passive optical network (EPON) systems and allowing for coexistence with legacy MPCP flow-control messages within the same network structure. Both currently existing logical-link identifier (LLID) assignment systems [namely, one LLID per optical network unit (ONU) and one LLID per queue] are examined in depth, and a missing scenario (one LLID per multiqueue) is discussed. Simulation results conducted using C++ based implementation of standard EPON networks with support for extended GATE-REPORT MPCP data units (DUs) prove that the design assumptions for both new flow-control messages were met to their fullest extent. The eGATE/eREPORT MPCP DUs allow for per-queue scheduling from the central packet controller in the optical line terminal (OLT) at the cost of ONU-based operation, thereby maintaining the benefits of two standard solutions. The obtained simulation results indicate superiority of the proposed IEEE 802.3ah, clause 64 extension in terms of network resource management, bandwidth efficiency, and system setup flexibility.

  15. The 2008 Charles H. Thompson Lecture-Colloquium Presentation: From Du Bois to Obama--The Education of Peoples of African Descent in the United States in the 21st Century

    ERIC Educational Resources Information Center

    Lee, Carol D.

    2009-01-01

    This article presents the text of a lecture delivered by American Educational Research Association President Carol D. Lee at the 29th Annual Charles H. Thompson Lecture-Colloquium Series which was held on November 5, 2008. In her lecture, Lee discussed several points of similarities between W. E. B. Du Bois and President Barack Obama. These…

  16. Communications protocol

    NASA Technical Reports Server (NTRS)

    Zhou, Xiaoming (Inventor); Baras, John S. (Inventor)

    2010-01-01

    The present invention relates to an improved communications protocol which increases the efficiency of transmission in return channels on a multi-channel slotted Alohas system by incorporating advanced error correction algorithms, selective retransmission protocols and the use of reserved channels to satisfy the retransmission requests.

  17. A new protocol for screening adults presenting with their own medical problems at the Emergency Department to identify children at high risk for maltreatment.

    PubMed

    Diderich, Hester M; Fekkes, Minne; Verkerk, Paul H; Pannebakker, Fieke D; Velderman, Mariska Klein; Sorensen, Peggy J G; Baeten, Paul; Oudesluys-Murphy, Anne Marie

    2013-12-01

    Identifying child abuse and neglect solely on the grounds of child characteristics leaves many children undetected. We developed a new approach (Hague protocol) based on characteristics of parents who attend the Emergency Department (ED) because they have the following problems: (1) intimate partner violence, (2) substance abuse, or (3) suicide attempt or other serious psychiatric problems. The goal of this protocol is to enable the Reporting Center for Child Abuse and Neglect (RCCAN) to rapidly assess family problems and offer voluntary community based support to these parents. The aim of this study is to assess whether this protocol for screening adults presenting for care in the Emergency Department can identify children at high risk for maltreatment. A before and after study was conducted at 9 EDs in 3 regions in the Netherlands (one intervention region and 2 control regions). During the period January 2006 to November 2007, prior to the introduction of the Hague protocol, from a total of 385,626 patients attending the ED in the intervention region 4 parents (1 per 100,000) were referred to the RCCAN. In the period after introduction of the protocol (December 2007 to December 2011), the number rose to 565 parents from a total of 885,301 patients attending the ED (64 per 100,000). In the control region, where the protocol was not implemented, these figures were 2 per 163,628 (1 per 100,000) and 10 per 371,616 (3 per 100,000) respectively (OR=28.0 (95 CI 4.6-170.7)). At assessment, child abuse was confirmed in 91% of referred cases. The protocol has a high positive predictive value of 91% and can substantially increase the detection rate of child abuse in an ED setting. Parental characteristics are strong predictors of child abuse. Implementing guidelines to detect child abuse based on parental characteristics of parents attending the adult section of the ED can increase the detection rate of child abuse and neglect allowing appropriate aid to be initiated for

  18. Correcting non cephalic presentation with moxibustion: study protocol for a multi-centre randomised controlled trial in general practice

    PubMed Central

    Vas, Jorge; Aranda, José Manuel; Barón, Mercedes; Perea-Milla, Emilio; Méndez, Camila; Ramírez, Carmen; Aguilar, Inmaculada; Modesto, Manuela; Lara, Ana María; Martos, Francisco; García-Ruiz, Antonio J

    2008-01-01

    Background Non cephalic presentation in childbirth involves various risks to both the mother and the foetus. The incidence in Spain is 3.8% of all full-term pregnancies. The most common technique used to end the gestation in cases of non cephalic presentation is that of caesarian section, and although it provokes a lower rate of morbi-mortality than does vaginal delivery in such situations, there remains the possibility of traumatic injury to the foetal head and neck, while maternal morbidity is also increased. The application of heat (moxibustion) to an acupuncture point, in order to correct non cephalic presentation, has been practised in China since ancient times, but as yet there is insufficient evidence of its real effectiveness. Methods/Design The experimental design consists of a multi-centre randomised controlled trial with three parallel arms, used to compare real moxibustion, sham moxibustion and the natural course of events, among pregnant women with a non cephalic presentation and a gestational duration of 33–35 weeks (estimated by echography). The participants in the trial will be blinded to both interventions. The results obtained will be analyzed by professionals, blinded with respect to the allocation to the different types of intervention. In addition, we intend to carry out a economic analysis. Discussion This trial will contribute to the development of evidence concerning moxibustion in the correction of non cephalic presentations. The primary outcome variable is the proportion of cephalic presentations at term. As secondary outcomes, we will evaluate the proportion of cephalic presentations at week 38 of gestation, determined by echography, together with the safety of the technique, the specificity of moxibustion and the control of the blinding process. This study has been funded by the Health Ministry of the Andalusian Regional Government. Trial registration Current Controlled Trials ISRCTN10634508. PMID:18495031

  19. Modelisation du Signal Radar EN Milieu Stratifie et Evaluation de Techniques de Mesure de L'humidite du Sol

    NASA Astrophysics Data System (ADS)

    Boisvert, Johanne

    La presente etude se penche sur des problemes relies a l'echantillonnage de l'humidite de sol et a l'estimation du signal radar sur sols nus. Le travail se divise en deux volets. Le volet 1 evalue trois techniques de mesure de l'humidite du sol (gravimetrie, reflectometrie temporelle et sonde dielectrique) et deux protocoles d'echantillonnage. Dans le volet 2, un modele de simulation du signal en milieu stratifie est developpe, et les estimes de signal obtenus sont compares aux estimes bases uniquement sur une valeur moyenne d'humidite du sol prise sur une profondeur fixe d'echantillonnage. Les differences entre les deux estimes dependent de la frequence et du choix judicieux de la profondeur d'echantillonnage; elles sont plus importantes aux faibles angles et en polarisation HV, puis VV. Le modele de simulation a aussi ete utilise pour etudier la profondeur de penetration du signal et en deduire la profondeur optimale d'echantillonnage en tenant compte des caracteristiques du signal. Une variation de 25 ^circ de l'angle d'incidence a peu d'effet sur la profondeur de penetration en bande Ku; l'ecart reste inferieur ou egal a 0,5 cm en bande C mais peut atteindre 1,3 cm en bande L. L'impact de la polarisation est nul en bande Ku mais croi t avec l'angle d'incidence en bande C et L. A 50^circ, il est, en moyenne de 1 cm en bande C et de 2 cm en bande L. En polarisation VV, la profondeur croi t avec une augmentation de l'angle alors que l'effet est inverse en polarisation HH. Deux methodes pour estimer la profondeur d'echantillonnage en conditions operationnelles sont presentees. Lorsqu'on inverse un modele pour estimer l'humidite du sol a partir du signal, ces methodes permettent aussi d'estimer l'epaisseur de sol representee par l'humidite ainsi estimee.

  20. Effectiveness of individualized physiotherapy on pain and functioning compared to a standard exercise protocol in patients presenting with clinical signs of subacromial impingement syndrome. A randomized controlled trial

    PubMed Central

    2010-01-01

    Background Shoulder impingement syndrome is a common musculoskeletal complaint leading to significant reduction of health and disability. Physiotherapy is often the first choice of treatment although its effectiveness is still under debate. Systematic reviews in this field highlight the need for more high quality trials to investigate the effectiveness of physiotherapy interventions in patients with subacromial impingement syndrome. Methods/Design This randomized controlled trial will investigate the effectiveness of individualized physiotherapy in patients presenting with clinical signs and symptoms of subacromial impingement, involving 90 participants aged 18-75. Participants are recruited from outpatient physiotherapy clinics, general practitioners, and orthopaedic surgeons in Germany. Eligible participants will be randomly allocated to either individualized physiotherapy or to a standard exercise protocol using central randomization. The control group will perform the standard exercise protocol aiming to restore muscular deficits in strength, mobility, and coordination of the rotator cuff and the shoulder girdle muscles to unload the subacromial space during active movements. Participants of the intervention group will perform the standard exercise protocol as a home program, and will additionally be treated with individualized physiotherapy based on clinical examination results, and guided by a decision tree. After the intervention phase both groups will continue their home program for another 7 weeks. Outcome will be measured at 5 weeks and at 3 and 12 months after inclusion using the shoulder pain and disability index and patients' global impression of change, the generic patient-specific scale, the average weekly pain score, and patient satisfaction with treatment. Additionally, the fear avoidance beliefs questionnaire, the pain catastrophizing scale, and patients' expectancies of treatment effect are assessed. Participants' adherence to the protocol, use

  1. Using Patient Flow Information to Determine Risk of Hospital Presentation: Protocol for a Proof-of-Concept Study

    PubMed Central

    McLeod, Adam; Patrick, Jon; Boyle, Douglas; Shearer, Marianne; Eustace, Paula; Pearce, Mary Catherine

    2016-01-01

    Background Every day, patients are admitted to the hospital with conditions that could have been effectively managed in the primary care sector. These admissions are expensive and in many cases are possible to avoid if early intervention occurs. General practitioners are in the best position to identify those at risk of imminent hospital presentation and admission; however, it is not always possible for all the factors to be considered. A lack of shared information contributes significantly to the challenge of understanding a patient’s full medical history. Some health care systems around the world use algorithms to analyze patient data in order to predict events such as emergency presentation; however, those responsible for the design and use of such systems readily admit that the algorithms can only be used to assess the populations used to design the algorithm in the first place. The United Kingdom health care system has contributed data toward algorithm development, which is possible through the unified health care system in place there. The lack of unified patient records in Australia has made building an algorithm for local use a significant challenge. Objective Our objective is to use linked patient records to track patient flow through primary and secondary health care in order to develop a tool that can be applied in real time at the general practice level. This algorithm will allow the generation of reports for general practitioners that indicate the relative risk of patients presenting to an emergency department. Methods A previously designed tool was used to deidentify the general practice and hospital records of approximately 100,000 patients. Records were pooled for patients who had attended emergency departments within the Eastern Health Network of hospitals and general practices within the Eastern Health Network catchment. The next phase will involve development of a model using a predictive analytic machine learning algorithm. The model will be

  2. Efficacité de la prévention de la transmission mère-enfant du Virus de l'Immunodéficience Humaine par le protocole 2010 de l'Organisation Mondiale de la Santé au Centre Médical Saint Camille de Ouagadougou (Burkina Faso)

    PubMed Central

    OuédraogoYugbaré, Solange Odile; Zagré, Nikaise; Koueta, Fla; Dao, Lassina; Kam, Ludovic; Ouattara, Diarra Yé; Simporé, Jacques

    2015-01-01

    L’épidémie du Virus de l'Immunodéficience Humaine en milieu pédiatrique est surtout le résultat de la transmission mère-enfant. Notre étude a pour objectif de décrire l'efficacité de la prévention de la transmission mère-enfant du Virus de l'Immunodéficience Humaine par le protocole OMS 2010 (Option A et trithérapie) au centre médical saint Camille de Ouagadougou. Nous avons mené une étude d'une cohorte d'enfants suivis dans le cadre de la prévention de la transmission mère-enfant du Virus de l'Immunodéficience Humaine au centre médical saint Camille de Ouagadougou sur une période de 2 ans allant du 1er Janvier 2012 au 31 Décembre 2013. Nous avons obtenu l'accord de 4900 femmes enceintes pour le dépistage de l'infection du Virus de l'Immunodéficience Humaine et 238 gestantes ont été diagnostiquées séropositives soit 4,86% de séroprévalence. Les femmes étaient surtout infectées par le Virus de l'Immunodéficience Humaine avec de type I (95,38%)). La majorité était sous trithérapie (74,3%) et (25,7%) sous prophylaxie (option A). Les nouveau-nés (92,5%) ont reçu un traitement antirétroviral à base de névirapine dans les 72 heures après la naissance. L'allaitement sécurisé a été appliquée dans 78% des cas. Le taux global de transmission mère-enfant du VIH était de 3,6% avec 3% de transmission chez les enfants nés de mères sous trithérapie antirétrovirale et 6,3% dans les cas de prophylaxie antirétrovirale. Le facteur de risque de transmission a été le long délai du début d'administration des antirétroviraux chez le nouveau-né. La mortalité infantile à un an était de 3,5%. Cette étude a révélé l'efficacité de l'Option A et conforté celle de la trithérapie, le passage à l'Option B+ serait donc plus bénéfique. PMID:26966499

  3. Actes du colloque: Tendances actuelles de la recherche sur la langue parlee (Conference Presentations: Current Trends in Research on Oral Language).

    ERIC Educational Resources Information Center

    Auger, Julie, Ed.

    Student papers presented at a sociolinguistics conference include: "La variation phonologique [d'une voyelle] a Hull"; "La force illocutoire des pronoms personnels 'je' et 'tu' en tant qu'insignes des places d'ou parlent les femmes et les hommes"; "L'emploi des modes indicatif et subjonctif dans le francais parle de la…

  4. Effectiveness of a primary care based complex intervention to promote self-management in patients presenting psychiatric symptoms: study protocol of a cluster-randomized controlled trial

    PubMed Central

    2014-01-01

    Background Anxiety, Depression and Somatoform (ADSom) disorders are highly prevalent in primary care. Managing these disorders is time-consuming and requires strong commitment on behalf of the General Practitioners (GPs). Furthermore, the management of these patients is restricted by the high patient turnover rates in primary care practices, especially in the German health care system. In order to address this problem, we implement a complex, low-threshold intervention by an Advanced Practice Nurse (APN) using a mixture of case management and counseling techniques to promote self-management in these patients. Here we present the protocol of the “Self-Management Support for Anxiety, Depression and Somatoform Disorders in Primary Care” (SMADS)-Study. Methods/Design The study is designed as a cluster-randomized controlled trial, comparing an intervention and a control group of 10 primary care practices in each case. We will compare the effectiveness of the intervention applied by an APN with usual GP-care. A total of 340 participants will be enrolled in the study, 170 in either arm. We use the Patient Health Questionnaire-German version (PHQ-D) as a screening tool for psychiatric symptoms, including patients with a score above 5 on any of the three symptom scales. The primary outcome is self-efficacy, measured by the General Self-Efficacy Scale (GSE), here used as a proxy for self-management. As secondary outcomes we include the PHQ-D symptom load and questionnaires regarding coping with illness and health related quality of life. Outcome assessments will be applied 8 weeks and 12 months after the baseline assessment. Discussion The SMADS-study evaluates a complex, low threshold intervention for ambulatory patients presenting ADSom-symptoms, empowering them to better manage their condition, as well as improving their motivation to engage in self-help and health-seeking behaviour. The benefit of the intervention will be substantiated, when patients can enhance

  5. Cri-du-chat (5p-) syndrome presenting with cerebellar hypoplasia and hypospadias: prenatal diagnosis and aCGH characterization using uncultured amniocytes.

    PubMed

    Chen, Chih-Ping; Huang, Ming-Chao; Chen, Yi-Yung; Chern, Schu-Rern; Wu, Peih-Shan; Su, Jun-Wei; Town, Dai-Dyi; Wang, Wayseen

    2013-07-25

    We present prenatal diagnosis of a de novo distal deletion involving 5p(5p15.1→pter) using uncultured amniocytes in a pregnancy with cerebellar hypoplasia, hypospadias and facial dysmorphisms in the fetus. We discuss the genotype-phenotype correlation and the consequence of haploinsufficiency of CTNND2, SEMA5A, TERT, SRD5A1 and TPPP. We speculate that haploinsufficiency of SRD5A1 and TPPP may be responsible for hypospadias and cerebellar hypoplasia, respectively, in this case.

  6. "Cirque du Freak."

    ERIC Educational Resources Information Center

    Rivett, Miriam

    2002-01-01

    Considers the marketing strategies that underpin the success of the "Cirque du Freak" series. Describes how "Cirque du Freak" is an account of events in the life of schoolboy Darren Shan. Notes that it is another reworking of the vampire narrative, a sub-genre of horror writing that has proved highly popular with both adult and…

  7. Montreal protocol: Business opportunites

    SciTech Connect

    1998-12-31

    The Montreal Protocol on Substances that Deplete the Ozone Layer was signed by 24 countries in 1987, establishing measures for controlling the production and consumption of ozone-depleting substances. This publication begins with some background information on ozone depletion and the history of the Protocol. It then describes aspects of the Protocol`s Multilateral Fund, created to assist developing countries to meet Protocol deadlines: Its administration, structure, and how projects are initiated. Names, addresses, and phone/fax numbers of Fund contacts are provided. Canadian projects under the Fund are then reviewed and opportunities for Canadian environmental companies are noted. Finally, information sheets are presented which summarize Fund-related Canadian bilateral projects undertaken to date.

  8. La naissance du parsec

    NASA Astrophysics Data System (ADS)

    Arenou, F.

    2010-01-01

    Les définitions du parsec et de la magnitude absolue sont le fruit de compromis pour régler trois problèmes entremêlés au début du XXème siècle: quelle unité de distance stellaire adopter? Quel nom lui donner? Comment comparer les luminosités intrinsèques des différentes étoiles?

  9. Etude et simulation du protocole TTEthernet sur un sous-systeme de gestion de vols et adaptation de la planification des tâches a des fins de simulation

    NASA Astrophysics Data System (ADS)

    Abidi, Dhafer

    TTEthernet is a deterministic network technology that makes enhancements to Layer 2 Quality-of-Service (QoS) for Ethernet. The components that implement its services enrich the Ethernet functionality with distributed fault-tolerant synchronization, robust temporal partitioning bandwidth and synchronous communication with fixed latency and low jitter. TTEthernet services can facilitate the design of scalable, robust, less complex distributed systems and architectures tolerant to faults. Simulation is nowadays an essential step in critical systems design process and represents a valuable support for validation and performance evaluation. CoRE4INET is a project bringing together all TTEthernet simulation models currently available. It is based on the extension of models of OMNeT ++ INET framework. Our objective is to study and simulate the TTEthernet protocol on a flight management subsystem (FMS). The idea is to use CoRE4INET to design the simulation model of the target system. The problem is that CoRE4INET does not offer a task scheduling tool for TTEthernet network. To overcome this problem we propose an adaptation for simulation purposes of a task scheduling approach based on formal specification of network constraints. The use of Yices solver allowed the translation of the formal specification into an executable program to generate the desired transmission plan. A case study allowed us at the end to assess the impact of the arrangement of Time-Triggered frames offsets on the performance of each type of the system traffic.

  10. Preventing avoidable incidents leading to a presentation to the emergency department (ED) by older adults with cognitive impairment: protocol for a scoping review

    PubMed Central

    Provencher, Véronique; Généreux, Mélissa; Gagnon-Roy, Mireille; Veillette, Nathalie; Egan, Mary; Sirois, Marie-Josée; Lacasse, Francis; Rose, Kathy; Stocco, Stéphanie

    2016-01-01

    Introduction Older adults with cognitive impairment represent a large portion (21–42%) of people (65+) who consult at an emergency department (ED). Because this sub-group is at higher risk for hospitalisation and mortality following an ED visit, awareness about ‘avoidable’ incidents should be increased in order to prevent presentations to the ED due to such incidents. This study aims to synthetise the actual knowledge related to ‘avoidable’ incidents (ie, traumatic injuries, poisoning and other consequences of external causes) (WHO, 2016) leading to ED presentations in older people with cognitive impairment. Methodology and analysis A scoping review will be performed. Scientific and grey literature (1996–2016) will be searched using a combination of key words pertaining to avoidable incidents, ED presentations, older adults and cognitive impairment. A variety of databases (MEDLINE, CINAHL, Ageline, SCOPUS, ProQuest Dissertations/theses, EBM Reviews, Healthstar), online library catalogues, governmental websites and published statistics will be examined. Included sources will pertain to community-dwelling older adults presenting to the ED as a result of an avoidable incident, with the main focus on those with cognitive impairment. Data (eg, type, frequency, severity, circumstances of incidents, preventive measures) will be extracted and analysed using a thematic chart and content analysis. Discussion and dissemination This scoping review will provide a picture of the actual knowledge on the subject and identify knowledge gaps in existing literature to be filled by future primary researches. Findings will help stakeholders to develop programmes in order to promote safe and healthy environments and behaviours aimed at reducing avoidable incidents in seniors, especially those with cognitive impairment. PMID:26873049

  11. Reliable multicast protocol specifications protocol operations

    NASA Technical Reports Server (NTRS)

    Callahan, John R.; Montgomery, Todd; Whetten, Brian

    1995-01-01

    This appendix contains the complete state tables for Reliable Multicast Protocol (RMP) Normal Operation, Multi-RPC Extensions, Membership Change Extensions, and Reformation Extensions. First the event types are presented. Afterwards, each RMP operation state, normal and extended, is presented individually and its events shown. Events in the RMP specification are one of several things: (1) arriving packets, (2) expired alarms, (3) user events, (4) exceptional conditions.

  12. Cirque du Monde as a health intervention

    PubMed Central

    Fournier, Cynthia; Drouin, Mélodie-Anne; Marcoux, Jérémie; Garel, Patricia; Bochud, Emmanuel; Théberge, Julie; Aubertin, Patrice; Favreau, Gil; Fleet, Richard

    2014-01-01

    Abstract Objective To present Cirque du Soleil’s social circus program, Cirque du Monde, to explore its potential as a primary health care tool for family physicians. Data sources A review of the literature in PubMed, the Cochrane Library, PsycINFO, LaPresse, Eureka, Google Scholar, and Érudit using the key words circus, social circus, Cirque du Monde, and Cirque du Soleil; a Montreal-based initiative, Espace Transition, modeled on Cirque du Monde; and personal communication with Cirque du Soleil’s Social Circus Training Advisor. Study selection The first 50 articles or websites identified for each key word in each of the databases were examined on the basis of their titles and abstracts in the case of articles, and on the basis of their titles and page content in the case of websites. Articles and websites that explored an aspect of social circuses or that described an intervention that involved circuses were then retained for analysis. Because all literature on social circuses was searched, no criterion for year of publication was used. Synthesis No articles on the social circus as a health intervention were found. One study on the use of the circus as an intervention in schools was identified. It demonstrated an increase in self-esteem in the children who took part. One study on the use of the circus in a First Nations community was found; it contained nonspecific, qualitative findings. The other articles identified were merely descriptions of social circuses. One website was identified on the use of the social circus to help youth who had been treated in a hospital setting for major psychiatric disorders to re-enter the community. The team in the pediatric psychiatry department at Centre Hospitalier Universitaire Sainte-Justine, the children’s hospital in Montreal, Que, was contacted; they were leading this project, called Espace Transition. The unpublished preliminary findings of its pilot project demonstrate substantial improvements in overall patient

  13. Cri du Chat: report of a case.

    PubMed

    Sparks, S; Hutchinson, B

    1980-01-01

    Since Lejeune et al. (1963) first described the syndrome of Cri du Chat (Cry of the Cat), cases have been described in the literature in terms of genetic abnormalities. All cases were severely retarded and the mental impairment has been believed to be progressive, although no longitudinal studies have been reported. Descriptions of speech and language behavior have been scarce. This paper presents a case of a 7-yr, 6 mo-old girl with Cri du Chat who has received speech and language therapy for five years. Her speech, language, and mental development are noted and are not consistent with cases reported previously.

  14. Testing Protocol for Module Encapsulant Creep (Presentation)

    SciTech Connect

    Kempe, M. D.; Miller, D. C.; Wohlgemuth, J. H.; Kurtz, S. R.; Moseley, J. M.; Shah, Q.; Tamizhmani, G.; Sakurai, K.; Inoue, M.; Doi, T.; Masuda, A.

    2012-02-01

    Recently there has been an interest in the use of thermoplastic encapsulant materials in photovoltaic modules to replace chemically crosslinked materials, e.g., ethylene-vinyl acetate. The related motivations include the desire to: reduce lamination time or temperature; use less moisture-permeable materials; or use materials with better corrosion characteristics. However, the use of any thermoplastic material in a high-temperature environment raises safety and performance concerns, as the standardized tests currently do not expose the modules to temperatures in excess of 85C, yet modules may experience temperatures above 100C in operation. Here we constructed eight pairs of crystalline-silicon modules and eight pairs of glass/encapsulation/glass mock modules using different encapsulation materials of which only two were designed to chemically crosslink. One module set was exposed outdoors with insulation on the back side in Arizona in the summer, and an identical set was exposed in environmental chambers. High precision creep measurements and performance measurements indicate that despite many of these polymeric materials being in the melt state at some of the highest outdoor temperatures achievable, very little creep was seen because of their high viscosity, temperature heterogeneity across the modules, and in the case of the crystalline-silicon modules, the physical restraint of the backsheet. These findings have very important implications for the development of IEC and UL qualification and safety standards, and in regards to the necessary level of cure during the processing of crosslinking encapsulants.

  15. Cri du Chat syndrome.

    PubMed

    Cerruti Mainardi, Paola

    2006-09-05

    The Cri du Chat syndrome (CdCS) is a genetic disease resulting from a deletion of variable size occurring on the short arm of chromosome 5 (5p-). The incidence ranges from 1:15,000 to 1:50,000 live-born infants. The main clinical features are a high-pitched monochromatic cry, microcephaly, broad nasal bridge, epicanthal folds, micrognathia, abnormal dermatoglyphics, and severe psychomotor and mental retardation. Malformations, although not very frequent, may be present: cardiac, neurological and renal abnormalities, preauricular tags, syndactyly, hypospadias, and cryptorchidism. Molecular cytogenetic analysis has allowed a cytogenetic and phenotypic map of 5p to be defined, even if results from the studies reported up to now are not completely in agreement. Genotype-phenotype correlation studies showed a clinical and cytogenetic variability. The identification of phenotypic subsets associated with a specific size and type of deletion is of diagnostic and prognostic relevance. Specific growth and psychomotor development charts have been established. Two genes, Semaphorin F (SEMAF) and delta-catenin (CTNND2), which have been mapped to the "critical regions", are potentially involved in cerebral development and their deletion may be associated with mental retardation in CdCS patients. Deletion of the telomerase reverse transcriptase (hTERT) gene, localised to 5p15.33, could contribute to the phenotypic changes in CdCS. The critical regions were recently refined by using array comparative genomic hybridisation. The cat-like cry critical region was further narrowed using quantitative polymerase chain reaction (PCR) and three candidate genes were characterised in this region. The diagnosis is based on typical clinical manifestations. Karyotype analysis and, in doubtful cases, FISH analysis will confirm the diagnosis. There is no specific therapy for CdCS but early rehabilitative and educational interventions improve the prognosis and considerable progress has been made

  16. Cri du Chat syndrome

    PubMed Central

    Cerruti Mainardi, Paola

    2006-01-01

    The Cri du Chat syndrome (CdCS) is a genetic disease resulting from a deletion of variable size occurring on the short arm of chromosome 5 (5p-). The incidence ranges from 1:15,000 to 1:50,000 live-born infants. The main clinical features are a high-pitched monochromatic cry, microcephaly, broad nasal bridge, epicanthal folds, micrognathia, abnormal dermatoglyphics, and severe psychomotor and mental retardation. Malformations, although not very frequent, may be present: cardiac, neurological and renal abnormalities, preauricular tags, syndactyly, hypospadias, and cryptorchidism. Molecular cytogenetic analysis has allowed a cytogenetic and phenotypic map of 5p to be defined, even if results from the studies reported up to now are not completely in agreement. Genotype-phenotype correlation studies showed a clinical and cytogenetic variability. The identification of phenotypic subsets associated with a specific size and type of deletion is of diagnostic and prognostic relevance. Specific growth and psychomotor development charts have been established. Two genes, Semaphorin F (SEMAF) and δ-catenin (CTNND2), which have been mapped to the "critical regions", are potentially involved in cerebral development and their deletion may be associated with mental retardation in CdCS patients. Deletion of the telomerase reverse transcriptase (hTERT) gene, localised to 5p15.33, could contribute to the phenotypic changes in CdCS. The critical regions were recently refined by using array comparative genomic hybridisation. The cat-like cry critical region was further narrowed using quantitative polymerase chain reaction (PCR) and three candidate genes were characterised in this region. The diagnosis is based on typical clinical manifestations. Karyotype analysis and, in doubtful cases, FISH analysis will confirm the diagnosis. There is no specific therapy for CdCS but early rehabilitative and educational interventions improve the prognosis and considerable progress has been made in

  17. Sign Communication in Cri du Chat Syndrome

    ERIC Educational Resources Information Center

    Erlenkamp, Sonja; Kristoffersen, Kristian Emil

    2010-01-01

    This paper presents findings from a study on the use of sign supported Norwegian (SSN) in two individuals with Cri du chat syndrome (CCS). The study gives a first account of some selected aspects of production and intelligibility of SSN in CCS. Possible deviance in manual parameters, in particular inter- and/or intra-subject variation in the use…

  18. Cri du chat syndrome

    MedlinePlus

    ... the infant's cry, which is high-pitched and sounds like a cat. Causes Cri du chat syndrome is rare. It is caused by a missing piece of chromosome 5. Most cases are believed to occur during the development of ... Cry that is high-pitched and may sound like a cat Downward slant to the eyes ...

  19. Space Wire Upper Layer Protocols

    NASA Technical Reports Server (NTRS)

    Rakow, Glenn; Schnurr, Richard; Gilley, Daniel; Parkes, Steve

    2004-01-01

    This viewgraph presentation addresses efforts to provide a streamlined approach for developing SpaceWire Upper layer protocols which allows industry to drive standardized communication solutions for real projects. The presentation proposes a simple packet header that will allow flexibility in implementing a diverse range of protocols.

  20. Comparison of Two Hierarchical Routing Protocols for Heterogeneous MANET

    DTIC Science & Technology

    2007-10-01

    révèlent que le protocole H-OLSR est d’un rendement supérieur au protocole H-LANMAR pour la plupart des scénarios de mobilité de groupe qui portent...bien à une topologie de MANET hétérogène du domaine tactique. Nous recourons à des scénarios de mobilité de groupe qui caractérisent l’exploitation

  1. An alternative for cost-effective remediation of depleted uranium (DU) at certain environmental restoration sites

    SciTech Connect

    Miller, M.; Galloway, B.; VanDerpoel, G.; Johnson, E.; Copland, J.; Salazar, M.

    2000-02-01

    Numerous sites in the United States and around the world are contaminated with depleted uranium (DU) in various forms. A prevalent form is fragmented DU originating from various scientific tests involving high explosives and DU during weapon development programs, at firing practice ranges, or war theaters where DU was used in armor-piercing projectiles. The contamination at these sites is typically very heterogeneous, with discreet, visually identifiable DU fragments mixed with native soil. That is, the bulk-averaged DU activity is quite low, while specific DU fragments, which are distinct from the soil matrix, have much higher specific activity. DU is best known as a dark, black metal that is nearly twice as dense as lead, but DU in the environment readily weathers to a distinctive bright yellow color that is readily visible. While the specific activity of DU is relatively low and presents only a minor radiological hazard, the fact that it is radioactive and visually identifiable makes it desirable to remove the DU contamination from the environment.

  2. Pourfour Du Petit syndrome after interscalene block

    PubMed Central

    Santhosh, Mysore Chandramouli Basappji; Pai, Rohini B.; Rao, Raghavendra P.

    2013-01-01

    Interscalene block is commonly associated with reversible ipsilateral phrenic nerve block, recurrent laryngeal nerve block, and cervical sympathetic plexus block, presenting as Horner's syndrome. We report a very rare Pourfour Du Petit syndrome which has a clinical presentation opposite to that of Horner's syndrome in a 24-year-old male who was given interscalene block for open reduction and internal fixation of fracture upper third shaft of left humerus. PMID:23956726

  3. Pourfour Du Petit syndrome after interscalene block.

    PubMed

    Santhosh, Mysore Chandramouli Basappji; Pai, Rohini B; Rao, Raghavendra P

    2013-04-01

    Interscalene block is commonly associated with reversible ipsilateral phrenic nerve block, recurrent laryngeal nerve block, and cervical sympathetic plexus block, presenting as Horner's syndrome. We report a very rare Pourfour Du Petit syndrome which has a clinical presentation opposite to that of Horner's syndrome in a 24-year-old male who was given interscalene block for open reduction and internal fixation of fracture upper third shaft of left humerus.

  4. Cost-Effective Remediation of Depleted Uranium (DU) at Environmental Restoration Sites

    SciTech Connect

    MILLER,MARK; GALLOWAY,ROBERT B.; VANDERPOEL,GLENN; JOHNSON,ED; COPLAND,JOHN; SALAZAR,MICHAEL

    1999-11-03

    Numerous sites in the United States and around the world are contaminated with depleted uranium (DU) in various forms. A prevalent form is fragmented DU originating from various scientific tests involving high explosives and DU during weapon-development programs, at firing practice ranges, or in war theaters where DU was used in armor-piercing projectiles. The contamination at these sites is typically very heterogeneous, with discrete, visually identifiable DU fragments mixed with native soil. The bulk-averaged DU activity is quite low, whereas DU fragments, which are distinct from the soil matrix, have much higher specific activity. DU is best known as a dark metal that is nearly twice as dense as lead, but DU in the environment readily weathers (oxidizes) to a distinctive bright yellow color that is quite visible. While the specific activity (amount of radioactivity per mass of soil) of DU is relatively low and presents only a minor radiological hazard, the fact that DU is radioactive and visually identifiable makes it desirable to remove the DU ''contamination'' from the environment. The typical approach to conducting this DU remediation is to use radiation-detection instruments to identify the contaminant and then to separate it from the adjacent soil, packaging it for disposal as radioactive waste. This process can be performed manually or by specialized, automated equipment. Alternatively, a more cost-effective approach might be simple mechanical or gravimetric separation of the DU fragments from the host soil matrix. At SNL/NM, both the automated and simple mechanical approaches have recently been employed. This paper discusses the pros/cons of the two approaches.

  5. Peters anomaly in cri-du-chat syndrome.

    PubMed

    Hope, William C; Cordovez, Jose A; Capasso, Jenina E; Hammersmith, Kristin M; Eagle, Ralph C; Lall-Trail, Joel; Levin, Alex V

    2015-06-01

    The cri-du-chat syndrome is a rare genetic disorder caused by deletions in the short arm of chromosome 5. It presents with a distinctive catlike high-pitched cry, psychomotor delays, microcephaly, craniofacial abnormalities, and, in many cases, ocular findings. We report the first child with cri-du-chat and the findings of unilateral corneal staphyloma due to Peters anomaly and retinal dysplasia.

  6. Consequences experimentales des effets des fluctuations du vide sur la fluorescence parametrique et la generation du second harmonique en milieu confine

    NASA Astrophysics Data System (ADS)

    Robichaud, Luc

    Les fluctuations du vide, qui consistent en l'apparition momentanee de particules, ce qui est permit par le principe d'incertitude de Heisenberg, joue un role primordial dans les processus photoniques, en particulier les processus non-lineaires. Par la manipulation de ces fluctuations du vide a l'aide de confinement optique, on retrouve deux phenomenes particuliers : l'intensification de la fluorescence parametrique (Walker, 2008) et l'inhibition de la generation du second harmonique (Collette, 2013). Dans ce travail, on presente les resultats dans le cas classique ; c'est-a-dire sans fluctuations du vide et confinement. Par la suite, on presente les effets des fluctuations du vide et du confinement, ce qui mene aux deux effets mentionnes. Dans le cas de la fluorescence parametrique, le bruit quantique sur le champ interne et externe est calcule, le role du desaccord de phase dans le modele est expose et une generalisation tridimensionnelle est etudiee afin de generaliser la conception du modele d'un cas unidimensionnel a un cas tridimensionnel planaire. Dans le cas de la generation du second harmonique, les difficultes d'un modele purement tridimensionnel sont exposees et ensuite le cas limite planaire est etudie.

  7. The Master Protocol Concept.

    PubMed

    Redman, Mary W; Allegra, Carmen J

    2015-10-01

    During the past decade, biomedical technologies have undergone an explosive evolution-from the publication of the first complete human genome in 2003, after more than a decade of effort and at a cost of hundreds of millions of dollars-to the present time, where a complete genomic sequence can be available in less than a day and at a small fraction of the cost of the original sequence. The widespread availability of next-generation genomic sequencing has opened the door to the development of precision oncology. The need to test multiple new targeted agents both alone and in combination with other targeted therapies, as well as classic cytotoxic agents, demands the development of novel therapeutic platforms (particularly Master Protocols) capable of efficiently and effectively testing multiple targeted agents or targeted therapeutic strategies in relatively small patient subpopulations. Here, we describe the Master Protocol concept, with a focus on the expected gains and complexities of the use of this design. An overview of Master Protocols currently active or in development is provided along with a more extensive discussion of the Lung Master Protocol (Lung-MAP study).

  8. Generalized teleportation protocol

    SciTech Connect

    Gordon, Goren; Rigolin, Gustavo

    2006-04-15

    A generalized teleportation protocol (GTP) for N qubits is presented, where the teleportation channels are nonmaximally entangled and all the free parameters of the protocol are considered: Alice's measurement basis, her sets of acceptable results, and Bob's unitary operations. The full range of fidelity (F) of the teleported state and the probability of success (P{sub suc}) to obtain a given fidelity are achieved by changing these free parameters. A channel efficiency bound is found, where one can determine how to divide it between F and P{sub suc}. A one-qubit formulation is presented and then expanded to N qubits. A proposed experimental setup that implements the GTP is given using linear optics.

  9. Distributed simulation of network protocols

    NASA Technical Reports Server (NTRS)

    Paterra, Frank; Overstreet, C. Michael; Maly, Kurt J.

    1990-01-01

    Simulations of high speed network protocols are very CPU intensive operations requiring very long run times. Very high speed network protocols (Gigabit/sec rates) require longer simulation runs in order to reach a steady state, while at the same time requiring additional CPU processing for each unit of time because of the data rates for the traffic being simulated. As protocol development proceeds and simulations provide insights into any problems associated with the protocol, the simulation model often must be changed to generate additional or finer statistical performance information. Iterating on this process is very time consuming due to the required run times for the simulation models. The results of the efforts to distribute a high speed ring network protocol, Carrier Sensed Multiple Access/Ring Network (CSMA/RN), are presented.

  10. Cri du Chat syndrome: a case report.

    PubMed

    Torres, Carolina Paes; Borsatto, Maria Cristina; de Queiroz, Alexandra Mussolino; Lessa, Fernanda Campos Rosetti; Orsi, Iara Agusta

    2005-01-01

    Cri du Chat Syndrome occurs as a result of a partial deletion in the short arm of chromosome 5. Among the consequent abnormalities are low birth weight, a striking catlike cry in infancy, mental retardation, epicanthal folds, hypertelorism and dental malocclusions. This paper presents a case report on the dental treatment of a 23-year-old patient who received multidisciplinary treatment, including special education and precocious stimulation for carriers of this syndrome.

  11. DuPont extends CFC production after EPA warns of scarcity

    SciTech Connect

    Kirschner, E.

    1994-01-05

    DuPont reversed its voluntary commitment to phase out CFC production at the end of 1994 to prevent a possible shortage for automotive air conditioning repairs. In a December letter, the US EPA asked Dupont to continue producing its full 1995 allowance of 76 million tons of CFC-12 under the Montreal Protocol.

  12. Determination of periodontopathogens in patients with Cri du chat syndrome

    PubMed Central

    Ballesta-Mudarra, Sofía; Torres-Lagares, Daniel; Rodríguez-Caballero, Ángela; Yáñez-Vico, Rosa M.; Solano-Reina, Enrique; Perea-Pérez, Evelio

    2013-01-01

    Objectives: Cri du chat syndrome is a genetic alteration associated with some oral pathologies. However, it has not been described previously any clinical relationship between the periodontal disease and the syndrome. The purpose of this comparative study was to compare periodontopathogenic flora in a group with Cri du chat syndrome and another without the síndrome, to assess a potential microbiological predisposition to suffer a periodontitis. Study Design: The study compared nineteen subjects with Cri du chat Syndrome with a control group of nineteen patients without it. All patients were clinically evaluated by periodontal probing, valuing the pocket depth, the clinical attachmente level and bleeding on probing. There were no significant differences between both groups. Aggregatibacter actinomycetemcomitans, Porphyromonas gingivalis, Prevotella intermedia, Tannerella forsythia and Treponema denticola were detected by multiplex-PCR using 16S rDNA (microIDENT). Results: When A. actinomycetemcomitans, P. gingivalis, P. intermedia and T. denticola were compared, no statistically significant differences were found between the two groups (p>0.05). The value of T. forsythia was significantly higher for Cri du chat syndrome (31.6%) than for the control group (5.3%). The odds ratio for T. forsythia was 8.3. Conclusions: In the present study T. forsythia is associated with Cri du chat syndrome subjects and not with healthy subjects. Key words:Cri du Chat syndrome, periodontal health, microbiology, special care dentistry. PMID:24121919

  13. Oxidation states of uranium in DU particles from Kosovo.

    PubMed

    Salbu, B; Janssens, K; Lind, O C; Proost, K; Danesi, P R

    2003-01-01

    The oxidation states of uranium contained in depleted uranium (DU) particles were determined by synchrotron radiation based micro-XANES, applied to individual particles in soil samples collected at Ceja Mountain, Kosovo. Based on scanning electron microscopy (SEM) with XRMA prior to micro-XANES, DU particles ranging from submicrons to about 30 microm (average size: 2 microm or less) were identified. Compared to well-defined standards, all investigated DU particles were oxidized. About 50% of the DU particles were characterized as UO2, the remaining DU particles present were U3O8 or a mixture of oxidized forms (ca. 2/3 UO2, 1/3 U3O8). Since the particle weathering rate is expected to be higher for U3O8 than for UO2, the presence of respiratory U3O8 and UO2 particles, their corresponding weathering rates and subsequent remobilisation of U from DU particles should be included in the environmental or health impact assessments.

  14. Proprietes de Transport Electronique du Rutile Stoechiometrique

    NASA Astrophysics Data System (ADS)

    Keroack, Danielle

    Le rutile est un oxyde metallique qui presente beaucoup de similitudes avec certains perovskites notamment le titanate de barium ou de strontium. Il est comme ces derniers, compose d'un agencement d'octaedres d'oxygene centres sur l'atome de titane. Ces octaedres sont responsables de la forte polarisabilite de ces cristaux et de leur grande constante dielectrique. Leurs proprietes optiques, seuil d'absorption et spectre de phonons, sont par exemple forts semblables. La presente etude vise a determiner la nature du transport electronique dans le rutile stoechiometrique pur et d'en comparer les resultats avec les proprietes de certains perovskites. Nous determinerons par differentes mesures optoelectroniques les parametres caracteristiques des pieges et leur influence sur le transport des electrons et des trous. Les resultats de conductivite et de capacitance de meme que les spectres de photoconductivite dans nos echantillons ont mis en evidence la presence d'au moins cinq niveaux energetiques dans la bande interdite du rutile agissant comme pieges pour les electrons ou pour les trous et qui jouent un role de premiere importance dans le comportement electrique du rutile. Par la technique de charge transitoire, nous determinerons pour la premiere fois dans le rutile stoechiometrique la grandeur de la mobilite de derive des trous a la temperature ambiante soit 3,4 cm^2/V cdots et nous etablierons une borne superieure a la mobilite des electrons soit 0,1 cm^2 /Vcdots.

  15. NATCON Papers 1999 = Les Actes du CONAT. [Papers Presented at the Annual Meeting of the National Consultation on Career Development (NATCON) (25th, Ottawa, Ontario, Canada, January 25-27, 1999)].

    ERIC Educational Resources Information Center

    National Consultation on Career Development (NATCON), Toronto (Ontario).

    This book contains the texts of a number of presentations from the 1999 NATCON conferences. These papers are: (1) "A Book of Surprises: Games, Stories, and Magic for Career Practitioners" (E. Sylvester); (2) "Academic and Career Choices for Lesbian and Gay Young Adults" (M. Schneider and J. McCurdy-Myers); (3)"Adolescent…

  16. [Premature ovarian failure: which protocols?].

    PubMed

    Merviel, P; Lourdel, E; Boulard, V; Cabry, R; Claeys, C; Oliéric, M-F; Sanguinet, P; Brasseur, F; Henri, I; Copin, H

    2008-09-01

    This review shows the results of the various studies concerning the protocols applied to the women presenting a premature ovarian failure. Will be thus analyzed the natural cycles (or semi-natural), the increase in the dose of gonadotrophins, the clomiphene citrate and the anti-aromatases, the protocols with GnRH agonists long, short, stop or microdoses, the protocols with GnRH antagonists and the adjuvant treatments: aspirin, nitric oxyde, recombinant LH recombining, growth hormone and androgens. The interest of several protocols is to collect a sufficient number of oocytes (and thus of embryos to be transferred), making it possible to obtain reasonable rates of pregnancy. However, it arises that the rates of pregnancy observed among these women depend not only on their ovarian reserve and their age, but are also function of the type of infertility, of the cycle number and the uterus.

  17. Comment on "flexible protocol for quantum private query based on B92 protocol"

    NASA Astrophysics Data System (ADS)

    Chang, Yan; Zhang, Shi-Bin; Zhu, Jing-Min

    2017-03-01

    In a recent paper (Quantum Inf Process 13:805-813, 2014), a flexible quantum private query (QPQ) protocol based on B92 protocol is presented. Here we point out that the B92-based QPQ protocol is insecure in database security when the channel has loss, that is, the user (Alice) will know more records in Bob's database compared with she has bought.

  18. Pourfour du Petit Syndrome in a Patient with Thyroid Carcinoma

    PubMed Central

    Martinez-Ramirez, Sergi; Roig, Carles; Martí-Fàbregas, Joan

    2010-01-01

    The clinical presentation of Pourfour du Petit syndrome (PdPs) is the opposite of Horner syndrome. Although all disorders underlying Horner syndrome may potentially present as PdPs, very few cases of the latter have been described in the literature. We report a patient with PdPs due to carotid compression by a thyroid tumor. PMID:21045936

  19. Applications attract DuPont

    SciTech Connect

    Rotman, D.

    1996-08-07

    Scientists at DuPont say they have demonstrated the first chemical processing application for high-temperature superconducting (HTS) magnets. DuPont says the work, which uses a HTS magnet to separate mineral contaminants from kaolin, points to the feasibility of a range of HTS applications in industrial processing, including those involving polymerization. DuPont`s success comes after 10 years of work to commercialize high-temperature superconductors. And while superconductors have lost much of their luster since the late 1980s, the company says it is still bullish on their prospects. {open_quotes}At the moment, there`s no real market for superconductors,{close_quotes} says Alan Lauder, general manager/superconductivity. But, he says, several potentially lucrative applications could be commercialized within the next several years.

  20. Continuous improvement journey at Du Pont photomasks

    NASA Astrophysics Data System (ADS)

    Henderson, Robert K.

    1994-02-01

    This paper describes the history and experiences of Du Pont Photomasks in their efforts to integrate the continuous improvement philosophy and practices embodied in the Malcolm Baldrige National Quality Award criteria into their way of doing business. A case study of key learnings in this almost four year long process is presented. Specific topics discussed include the process applied to achieve ISO 9000 certification, the quality systems deployed in this effort, and the use of a balanced set of business and quality metrics to assess and improve upon performance.

  1. L'Aventure du LHC

    SciTech Connect

    2010-06-11

    Cette présentation s’adressera principalement aux personnes qui ont construit le LHC. La construction du LHC fut longue et difficile. De nombreux problèmes sont apparus en cours de route. Tous ont été résolus grâce au dévouement et à l’engagement du personnel et des collaborateurs. Je reviendrai sur les coups durs et les réussites qui ont marqués ces 15 dernières années et je vous montrerai combien cette machine, le fruit de vos efforts, est extraordinaire.

  2. Modelisation par elements finis du muscle strie

    NASA Astrophysics Data System (ADS)

    Leonard, Mathieu

    Ce present projet de recherche a permis. de creer un modele par elements finis du muscle strie humain dans le but d'etudier les mecanismes engendrant les lesions musculaires traumatiques. Ce modele constitue une plate-forme numerique capable de discerner l'influence des proprietes mecaniques des fascias et de la cellule musculaire sur le comportement dynamique du muscle lors d'une contraction excentrique, notamment le module de Young et le module de cisaillement de la couche de tissu conjonctif, l'orientation des fibres de collagene de cette membrane et le coefficient de poisson du muscle. La caracterisation experimentale in vitro de ces parametres pour des vitesses de deformation elevees a partir de muscles stries humains actifs est essentielle pour l'etude de lesions musculaires traumatiques. Le modele numerique developpe est capable de modeliser la contraction musculaire comme une transition de phase de la cellule musculaire par un changement de raideur et de volume a l'aide des lois de comportement de materiau predefinies dans le logiciel LS-DYNA (v971, Livermore Software Technology Corporation, Livermore, CA, USA). Le present projet de recherche introduit donc un phenomene physiologique qui pourrait expliquer des blessures musculaires courantes (crampes, courbatures, claquages, etc.), mais aussi des maladies ou desordres touchant le tissu conjonctif comme les collagenoses et la dystrophie musculaire. La predominance de blessures musculaires lors de contractions excentriques est egalement exposee. Le modele developpe dans ce projet de recherche met ainsi a l'avant-scene le concept de transition de phase ouvrant la porte au developpement de nouvelles technologies pour l'activation musculaire chez les personnes atteintes de paraplegie ou de muscles artificiels compacts pour l'elaboration de protheses ou d'exosquelettes. Mots-cles Muscle strie, lesion musculaire, fascia, contraction excentrique, modele par elements finis, transition de phase

  3. Alternative parallel ring protocols

    NASA Technical Reports Server (NTRS)

    Mukkamala, R.; Foudriat, E. C.; Maly, Kurt J.; Kale, V.

    1990-01-01

    Communication protocols are know to influence the utilization and performance of communication network. The effect of two token ring protocols on a gigabit network with multiple ring structure is investigated. In the first protocol, a mode sends at most one message on receiving a token. In the second protocol, a mode sends all the waiting messages when a token is received. The behavior of these protocols is shown to be highly dependent on the number of rings as well as the load in the network.

  4. Optical Circuit Switched Protocol

    NASA Technical Reports Server (NTRS)

    Monacos, Steve P. (Inventor)

    2000-01-01

    The present invention is a system and method embodied in an optical circuit switched protocol for the transmission of data through a network. The optical circuit switched protocol is an all-optical circuit switched network and includes novel optical switching nodes for transmitting optical data packets within a network. Each optical switching node comprises a detector for receiving the header, header detection logic for translating the header into routing information and eliminating the header, and a controller for receiving the routing information and configuring an all optical path within the node. The all optical path located within the node is solely an optical path without having electronic storage of the data and without having optical delay of the data. Since electronic storage of the header is not necessary and the initial header is eliminated by the first detector of the first switching node. multiple identical headers are sent throughout the network so that subsequent switching nodes can receive and read the header for setting up an optical data path.

  5. Poumon du puisatier

    PubMed Central

    Elidrissi, Amal Moustarhfir; Zaghba, Nahid; Benjelloun, Hanane; Yassine, Najiba

    2016-01-01

    Le puisatier a pour profession le creusement et l'entretien des puits pour fournir de l'eau. Il est au contact de divers minerais, particulièrement la silice, particule qui présente un risque certain de développement des maladies pulmonaires connues sous le nom de silicose. Le but de notre travail est de préciser le profil épidémiologique, clinique, radiologique et évolutif des patients puisatiers silicotiques. C'est une étude rétrospective concernant 54 cas de puisatiers ayant une silicose, colligés au service des maladies respiratoires du CHU Ibn Rochd de Casablanca, de Mars 1997 à Janvier 2016. Tous les malades étaient des puisatiers, de sexe masculin, avec une moyenne d'âge de 50 ans. Le tabagisme était retrouvé dans 36 cas et un antécédent de tuberculose était noté dans huit cas. La radiographie thoracique retrouvait des grandes opacités dans 39 cas, des petites opacités dans 15 cas, et un épaississement des septats dans 11 cas. Ce tableau de silicose s'était compliqué d'une surinfection bactérienne dans 37% des cas, d' un pneumothorax dans 4% des cas et d'une tuberculose dans 20% des cas. La prise en charge thérapeutique était celle des complications. La déclaration de la maladie professionnelle et de l'indemnisation était faite. L'évolution était bonne dans 12 cas, stationnaire dans 17 cas et mauvaise dans 16 cas. La silicose est une pneumoconiose fréquente chez les puisatiers. Elle retentit sur la fonction respiratoire. Nous soulignons l'association fréquente de tuberculose et nous insistons sur la prévention qui reste le meilleur traitement. PMID:28292119

  6. Interpolation of recurrence and hashing entanglement distillation protocols

    SciTech Connect

    Vollbrecht, Karl Gerd H.; Verstraete, Frank

    2005-06-15

    We construct interesting entanglement distillation protocols by interpolating between the recurrence and hashing protocols. This leads to asymptotic two-way distillation protocols, resulting in an improvement of the distillation rate for all mixed Bell diagonal entangled states, even for the ones with very high fidelity. We also present a method for how entanglement-assisted distillation protocol can be converted into nonentanglement-assisted protocols with the same yield.

  7. Non-destructive analysis of DU content in the NIF hohlraums

    SciTech Connect

    Gharibyan, Narek; Moody, Ken J.; Shaughnessy, Dawn A.

    2015-12-16

    The advantage of using depleted uranium (DU) hohlraums in high-yield deuterium-tritium (DT) shots at the National Ignition Facility (NIF) is addressed by Döppner, et al., in great detail [1]. This DU based hohlraum incorporates a thin layer of DU, ~7 μm thick, on the inner surface along with a thin layer of a gold coating, ~0.7 μm thick, while the outer layer is ~22 μm thick gold. A thickness measurement of the DU layer can be performed using an optical microscope where the total DU weight can be computed provided a uniform DU layer. However, the uniformity of the thickness is not constant throughout the hohlraum since CAD drawing calculations of the DU weight do not agree with the computed values from optical measurements [2]. Therefore, a non-destructive method for quantifying the DU content in hohlraums has been established by utilizing gamma-ray spectroscopy. The details of this method, along with results from several hohlraums, are presented in this report.

  8. College of DuPage Student Portrait, Fall Quarter 1999.

    ERIC Educational Resources Information Center

    College of DuPage, Glen Ellyn, IL. Office of Research and Planning.

    The report profiles the College of DuPage's (COD) fall quarter 1999 student body. It presents a brief history of the college's enrollment and a comparison of enrollments with other Illinois community colleges. It also provides demographic information on current students. Additionally, enrollment information is included by program, division, and…

  9. Past Tense Morphology in Cri Du Chat Syndrome: Experimental Evidence

    ERIC Educational Resources Information Center

    Wium, Kristin; Kristoffersen, Kristian Emil

    2008-01-01

    It has been observed that persons with Cri du chat syndrome (CDCS) have poor language production. However, very few studies have addressed the question whether all aspects of language production are equally afflicted, or whether there are differences between for instance phonological and morphological abilities. The present study was aimed at…

  10. "The Moon Ring": A Conversation with Randy DuBurke.

    ERIC Educational Resources Information Center

    Pearson, Susan

    2003-01-01

    Discusses how the author, currently Editor-at-Large of Chronicle Books, chooses books to publish and discusses four attributes in a book that catch her eye. Presents an interview with Randy DuBurke and a conversation about his first picture book, "The Moon Ring." (SG)

  11. A Unified Fault-Tolerance Protocol

    NASA Technical Reports Server (NTRS)

    Miner, Paul; Gedser, Alfons; Pike, Lee; Maddalon, Jeffrey

    2004-01-01

    Davies and Wakerly show that Byzantine fault tolerance can be achieved by a cascade of broadcasts and middle value select functions. We present an extension of the Davies and Wakerly protocol, the unified protocol, and its proof of correctness. We prove that it satisfies validity and agreement properties for communication of exact values. We then introduce bounded communication error into the model. Inexact communication is inherent for clock synchronization protocols. We prove that validity and agreement properties hold for inexact communication, and that exact communication is a special case. As a running example, we illustrate the unified protocol using the SPIDER family of fault-tolerant architectures. In particular we demonstrate that the SPIDER interactive consistency, distributed diagnosis, and clock synchronization protocols are instances of the unified protocol.

  12. Developing practice protocols for advanced practice nursing.

    PubMed

    Paul, S

    1999-08-01

    In most states, the role of an advanced practice nurse is dependent on practice protocols that provide an organized method for analyzing and managing a disease or major symptom. They are also used to control the process of medical care and to specify steps in the delivery of that care. Creating appropriate practice protocols is one of the most important precursors to implementing the advanced practice role, because they virtually drive the clinician's ability to treat or manage clinical situations or disease states. This article outlines the steps involved in developing practice protocols and discusses the content that should be included in a protocol, providing an example of narrative and algorithm format protocols. Pros and cons, as well as legal issues related to practice protocols, are also presented.

  13. Rupture sous-cutanée du tendon long extenseur du pouce: à propos de 5 cas

    PubMed Central

    Abdelillah, Rachid; Abbassi, Najib; Erraji, Moncef; Abdeljawad, Najib; Yacoubi, Hicham; Daoudi, Abdelkrim

    2014-01-01

    La rupture spontanée du muscle long extenseur du pouce (EPL) du tendon au niveau du poignet est rare et principalement rapportés après fracture du radius distal à tubercule de Lister, dans la synovite, ténosynovite ou la polyarthrite rhumatoïde. Nous rapportons 5 cas de rupture spontanée du tendon long extenseur du pouce, traités par une greffe ou un transfert tendineux. PMID:25317233

  14. Internet Protocol Implementation Guide.

    DTIC Science & Technology

    1982-08-01

    Communications Netwv ’rks Reference: (a) USDR&E Memo, lHost-to-Host Protocols for Data Communications Networks," 23 Dec 78 (b) DoD Standard Transmission Control...memorandum is to clarify DOD policy concerning standardization of host-to-host protocols for data communications networks. 2. Tho policy cited in reference...function is intendel Lu paoe inrdased emphasis and Initiative on the Important and currently volatile technology of data communications protocol

  15. W. E. B. Du Bois at the center: from science, civil rights movement, to Black Lives Matter.

    PubMed

    Morris, Aldon

    2017-03-01

    I am honoured to present the 2016 British Journal of Sociology Annual Lecture at the London School of Economics. My lecture is based on ideas derived from my new book, The Scholar Denied: W.E.B. Du Bois and the Birth of Modern Sociology. In this essay I make three arguments. First, W.E.B. Du Bois and his Atlanta School of Sociology pioneered scientific sociology in the United States. Second, Du Bois pioneered a public sociology that creatively combined sociology and activism. Finally, Du Bois pioneered a politically engaged social science relevant for contemporary political struggles including the contemporary Black Lives Matter movement.

  16. The Pic du Midi solar survey

    NASA Astrophysics Data System (ADS)

    Koechlin, L.

    2015-12-01

    We carry a long term survey of the solar activity with our coronagraphic system at Pic du Midi de Bigorre in the French Pyrenees (CLIMSO). It is a set of two solar telescopes and two coronagraphs, taking one frame per minute for each of the four channels : Solar disk in H-α (656.28 nm), prominences in H-α, disk in Ca II (393.3 nm), prominences in He I (1083 nm), all year long, weather permitting. Since 2015 we also take images of the FeXIII corona (1074.7 nm) at the rate of one every 10 minutes. These images cover a large field: 1.25 solar diameter, 2k*2K pixels, and are freely downloadable form a database. The improvements made since 2015 concern an autoguiding system for better centering of the solar disk behind the coronagraphic masks, and a new Fe XIII channel at λ=1074.7 nm. In the near future we plan to provide radial velocity maps of the disc and polarimetry maps of the disk and corona. This survey took its present form in 2007 and we plan to maintain image acquisition in the same or better experimental conditions for a long period: one or several solar cycles if possible. During the partial solar eclipse of March 20, 2015, the CLIMSO instruments and the staff at Pic du Midi operating it have provided several millions internet users with real time images of the Sun and Moon during all the phenomenon.

  17. TOXICITY REDUCTION EVALUATION PROTOCOL FOR MUNICIPAL WASTEWATER TREATMENT PLANTS

    EPA Science Inventory

    This document presents a generalized protocol for conducting a Toxicity Reduction evaluation (TRE) at a municipal wastewater treatment plant (WWTP). This protocol is designed to provide guidance to municipalities in preparing TRE plans, evaluating the information generated durin...

  18. The prevention access and risk taking in young people (PARTY) project protocol: A cluster randomised controlled trial of health risk screening and motivational interviewing for young people presenting to general practice

    PubMed Central

    2012-01-01

    Background There are growing worldwide concerns about the ability of primary health care systems to manage the major burden of illness in young people. Over two thirds of premature adult deaths result from risks that manifest in adolescence, including injury, neuropsychiatric problems and consequences of risky behaviours. One policy response is to better reorientate primary health services towards prevention and early intervention. Currently, however, there is insufficient evidence to support this recommendation for young people. This paper describes the design and implementation of a trial testing an intervention to promote psychosocial risk screening of all young people attending general practice and to respond to identified risks using motivational interviewing. Main outcomes: clinicians’ detection of risk-taking and emotional distress, young people’s intention to change and reduction of risk taking. Secondary outcomes: pathways to care, trust in the clinician and likelihood of returning for future visits. The design of the economic and process evaluation are not detailed in this protocol. Methods PARTY is a cluster randomised trial recruiting 42 general practices in Victoria, Australia. Baseline measures include: youth friendly practice characteristics; practice staff’s self-perceived competency in young people’s care and clinicians’ detection and response to risk taking behaviours and emotional distress in 14–24 year olds, attending the practice. Practices are then stratified by a social disadvantage index and billing methods and randomised. Intervention practices receive: nine hours of training and tools; feedback of their baseline data and two practice visits over six weeks. Comparison practices receive a three hour seminar in youth friendly practice only. Six weeks post-intervention, 30 consecutive young people are interviewed post-consultation from each practice and followed-up for self-reported risk taking behaviour and emotional distress

  19. National Sample Assessment Protocols

    ERIC Educational Resources Information Center

    Ministerial Council on Education, Employment, Training and Youth Affairs (NJ1), 2012

    2012-01-01

    These protocols represent a working guide for planning and implementing national sample assessments in connection with the national Key Performance Measures (KPMs). The protocols are intended for agencies involved in planning or conducting national sample assessments and personnel responsible for administering associated tenders or contracts,…

  20. L'Aventure du LHC

    ScienceCinema

    None

    2016-07-12

    Cette présentation s’adressera principalement aux personnes qui ont construit le LHC. La construction du LHC fut longue et difficile. De nombreux problèmes sont apparus en cours de route. Tous ont été résolus grâce au dévouement et à l’engagement du personnel et des collaborateurs. Je reviendrai sur les coups durs et les réussites qui ont marqués ces 15 dernières années et je vous montrerai combien cette machine, le fruit de vos efforts, est extraordinaire.

  1. Reliable broadcast protocols

    NASA Technical Reports Server (NTRS)

    Joseph, T. A.; Birman, Kenneth P.

    1989-01-01

    A number of broadcast protocols that are reliable subject to a variety of ordering and delivery guarantees are considered. Developing applications that are distributed over a number of sites and/or must tolerate the failures of some of them becomes a considerably simpler task when such protocols are available for communication. Without such protocols the kinds of distributed applications that can reasonably be built will have a very limited scope. As the trend towards distribution and decentralization continues, it will not be surprising if reliable broadcast protocols have the same role in distributed operating systems of the future that message passing mechanisms have in the operating systems of today. On the other hand, the problems of engineering such a system remain large. For example, deciding which protocol is the most appropriate to use in a certain situation or how to balance the latency-communication-storage costs is not an easy question.

  2. Carte du Ciel, San Fernando zone

    NASA Astrophysics Data System (ADS)

    Abad, C.

    2014-06-01

    An updated summary of a future large astrometric catalogue is presented, based on the two most important astrometric projects carried out by the Real Instituto y Observatorio de la Armada de San Fernando (ROA). The goal is to make a catalogue of positions and proper motions based on ROA's Cart du Ciel (CdC) and the Astrographic Catalogue (AC) San Fernando zone plates, and the HAMC2 meridian circle catalogue. The CdC and AC plates are being reduced together to provide first-epoch positions while HAMC2 will provide second-epoch ones. New techniques have been applied, that range from using a commercial flatbed scanner to the proper reduction schemes to avoid systematics from it. Only thirty plates (out of 540) remain to be processed, due to scanning problems that are being solved.

  3. Protocols — EDRN Public Portal

    Cancer.gov

    EDRN investigators protocols. The following is a list of the EDRN protocols that have been captured and curated. Additional information will be added as it is available. Contact information is provided as part of the detail for each protocol.

  4. Quantum deniable authentication protocol

    NASA Astrophysics Data System (ADS)

    Shi, Wei-Min; Zhou, Yi-Hua; Yang, Yu-Guang

    2014-07-01

    The proposed quantum identity authentication schemes only involved authentication between two communicators, but communications with deniability capability are often desired in electronic applications such as online negotiation and electronic voting. In this paper, we proposed a quantum deniable authentication protocol. According to the property of unitary transformation and quantum one-way function, this protocol can provide that only the specified receiver can identify the true source of a given message and the specified receiver cannot prove the source of the message to a third party by a transcript simulation algorithm. Moreover, the quantum key distribution and quantum encryption algorithm guarantee the unconditional security of this scheme. Security analysis results show that this protocol satisfies the basic security requirements of deniable authentication protocol such as completeness and deniability and can withstand the forgery attack, impersonation attack, inter-resend attack.

  5. Implementation of Siemens USS protocol into LabVIEW.

    PubMed

    Hosek, P; Diblik, M

    2011-10-01

    This article gives basic overview of the USS protocol as a communication interface to drive Siemens frequency inverters. It presents our implementation of this protocol into LabVIEW, as there was permanent demand from the community of the users to have native LabVIEW implementation of the USS protocol. It also states encountered problems and their solutions.

  6. Coping with threats of terrorism: a protocol for group intervention.

    PubMed

    Ottenstein, Richard J

    2003-01-01

    This article presents a group protocol designed to assist people in coping with direct and ongoing threats of terrorism. The protocol is intended to enable participants to address the psychological issues necessary to cope during periods of extreme threat. A step-by-step description of the protocol is provided.

  7. Métastases gastro-intestinales du cancer du sein: à propos de 2 cas

    PubMed Central

    Loubna, Mezouar; Mohamed, El Hfid; Tijani, El Harroudi; Fouzia, Ghadouani; Hanane, Haj Kacem; Zouhour, Bourhaleb; Asmae, Ouabdelmoumen

    2013-01-01

    Le cancer du sein est le cancer le plus fréquent chez la femme, notamment au Maroc, avec un taux de mortalité élevé. Les métastases gastro-intestinales d'un carcinome canalaire du sein sont rares. Leur diagnostic est difficile du fait de la nature non spécifique des symptômes. Nous rapportons deux observations originales de métastases gastroduodénales d'un cancer canalaire infiltrant du sein. Les métastases gastro-intestinales du cancer du sein sont très rares; la présence de symptômes gastro-intestinaux chez une malade ayant un antécédent de cancer du sein doit faire suspecter une atteinte métastatique gastro-intestinale. PMID:24198876

  8. CT protocol management: simplifying the process by using a master protocol concept.

    PubMed

    Szczykutowicz, Timothy P; Bour, Robert K; Rubert, Nicholas; Wendt, Gary; Pozniak, Myron; Ranallo, Frank N

    2015-07-08

    This article explains a method for creating CT protocols for a wide range of patient body sizes and clinical indications, using detailed tube current information from a small set of commonly used protocols. Analytical expressions were created relating CT technical acquisition parameters which can be used to create new CT protocols on a given scanner or customize protocols from one scanner to another. Plots of mA as a function of patient size for specific anatomical regions were generated and used to identify the tube output needs for patients as a function of size for a single master protocol. Tube output data were obtained from the DICOM header of clinical images from our PACS and patient size was measured from CT localizer radiographs under IRB approval. This master protocol was then used to create 11 additional master protocols. The 12 master protocols were further combined to create 39 single and multiphase clinical protocols. Radiologist acceptance rate of exams scanned using the clinical protocols was monitored for 12,857 patients to analyze the effectiveness of the presented protocol management methods using a two-tailed Fisher's exact test. A single routine adult abdominal protocol was used as the master protocol to create 11 additional master abdominal protocols of varying dose and beam energy. Situations in which the maximum tube current would have been exceeded are presented, and the trade-offs between increasing the effective tube output via 1) decreasing pitch, 2) increasing the scan time, or 3) increasing the kV are discussed. Out of 12 master protocols customized across three different scanners, only one had a statistically significant acceptance rate that differed from the scanner it was customized from. The difference, however, was only 1% and was judged to be negligible. All other master protocols differed in acceptance rate insignificantly between scanners. The methodology described in this paper allows a small set of master protocols to be

  9. CT protocol management: simplifying the process by using a master protocol concept.

    PubMed

    Szczykutowicz, Timothy P; Bour, Robert K; Rubert, Nicholas; Wendt, Gary; Pozniak, Myron; Ranallo, Frank N

    2015-07-01

    This article explains a method for creating CT protocols for a wide range of patient body sizes and clinical indications, using detailed tube current information from a small set of commonly used protocols. Analytical expressions were created relating CT technical acquisition parameters which can be used to create new CT protocols on a given scanner or customize protocols from one scanner to another. Plots of mA as a function of patient size for specific anatomical regions were generated and used to identify the tube output needs for patients as a function of size for a single master protocol. Tube output data were obtained from the DICOM header of clinical images from our PACS and patient size was measured from CT localizer radiographs under IRB approval. This master protocol was then used to create 11 additional master protocols. The 12 master protocols were further combined to create 39 single and multiphase clinical protocols. Radiologist acceptance rate of exams scanned using the clinical protocols was monitored for 12,857 patients to analyze the effectiveness of the presented protocol management methods using a two-tailed Fisher's exact test. A single routine adult abdominal protocol was used as the master protocol to create 11 additional master abdominal protocols of varying dose and beam energy. Situations in which the maximum tube current would have been exceeded are presented, and the trade-offs between increasing the effective tube output via 1) decreasing pitch, 2) increasing the scan time, or 3) increasing the kV are discussed. Out of 12 master protocols customized across three different scanners, only one had a statistically significant acceptance rate that differed from the scanner it was customized from. The difference, however, was only 1% and was judged to be negligible. All other master protocols differed in acceptance rate insignificantly between scanners. The methodology described in this paper allows a small set of master protocols to be

  10. Prairie du Chien: Urban Consolidation and Decline 1858-1930.

    DTIC Science & Technology

    1981-01-01

    South Beaumont) in 1871. The school had a troubled early history, and in 1880 the Jesuit Order took control of the educational institutin. In 1891 the... Jesuits gave the school its present name, Campion College. Electricity came to Prairie du Chien during the 1890’s. In 1894 I.D. Hulbert, Sherwin...and which by 1862 centered on St. Friole Island-- stimulated an influx of population and construction. The documentary evidence supports a c. 1858

  11. The association between Cri du chat syndrome and dental anomalies.

    PubMed

    Hall, Charmaine; Hallett, Kerrod; Manton, David

    2014-01-01

    Cri du chat syndrome (CdcS), also known as 5p deletion syndrome is a genetic disorder caused by the partial deletion of chromatin from the short arm of chromosome 5. There is a paucity of literature on the dental manifestations in CdcS. The purposes of this report are to present the case of a nine-year-old girl with the syndrome, CdcS and to review its dental and clinical manifestations and their management in children.

  12. A prospective observational study to assess the diagnostic accuracy of clinical decision rules for children presenting to emergency departments after head injuries (protocol): the Australasian Paediatric Head Injury Rules Study (APHIRST)

    PubMed Central

    2014-01-01

    Background Head injuries in children are responsible for a large number of emergency department visits. Failure to identify a clinically significant intracranial injury in a timely fashion may result in long term neurodisability and death. Whilst cranial computed tomography (CT) provides rapid and definitive identification of intracranial injuries, it is resource intensive and associated with radiation induced cancer. Evidence based head injury clinical decision rules have been derived to aid physicians in identifying patients at risk of having a clinically significant intracranial injury. Three rules have been identified as being of high quality and accuracy: the Canadian Assessment of Tomography for Childhood Head Injury (CATCH) from Canada, the Children’s Head Injury Algorithm for the Prediction of Important Clinical Events (CHALICE) from the UK, and the prediction rule for the identification of children at very low risk of clinically important traumatic brain injury developed by the Pediatric Emergency Care Applied Research Network (PECARN) from the USA. This study aims to prospectively validate and compare the performance accuracy of these three clinical decision rules when applied outside the derivation setting. Methods/design This study is a prospective observational study of children aged 0 to less than 18 years presenting to 10 emergency departments within the Paediatric Research in Emergency Departments International Collaborative (PREDICT) research network in Australia and New Zealand after head injuries of any severity. Predictor variables identified in CATCH, CHALICE and PECARN clinical decision rules will be collected. Patients will be managed as per the treating clinicians at the participating hospitals. All patients not undergoing cranial CT will receive a follow up call 14 to 90 days after the injury. Outcome data collected will include results of cranial CTs (if performed) and details of admission, intubation, neurosurgery and death. The

  13. A receptor tyrosine kinase, UFO/Axl, and other genes isolated by a modified differential display PCR are overexpressed in metastatic prostatic carcinoma cell line DU145.

    PubMed

    Jacob, A N; Kalapurakal, J; Davidson, W R; Kandpal, G; Dunson, N; Prashar, Y; Kandpal, R P

    1999-01-01

    We have used a modified differential display PCR protocol for isolating 3' restriction fragments of cDNAs specifically expressed or overexpressed in metastatic prostate carcinoma cell line DU145. Several cDNA fragments were identified that matched to milk fat globule protein, UFO/Axl, a receptor tyrosine kinase, human homologue of a Xenopus maternal transcript, laminin and laminin receptor, human carcinoma-associated antigen, and some expressed sequence tags. The transcript for milk fat globule protein, a marker protein shown to be overexpressed in breast tumors, was elevated in DU145 cells. The expression of UFO/Axl, a receptor tyrosine kinase, was considerably higher in DU145 cells as compared to normal prostate cells and prostatic carcinoma cell line PC-3. The overexpression of UFO oncogene in DU145 cells is discussed in the context of prostate cancer metastasis.

  14. Protocols for quantum binary voting

    NASA Astrophysics Data System (ADS)

    Thapliyal, Kishore; Sharma, Rishi Dutt; Pathak, Anirban

    Two new protocols for quantum binary voting are proposed. One of the proposed protocols is designed using a standard scheme for controlled deterministic secure quantum communication (CDSQC), and the other one is designed using the idea of quantum cryptographic switch, which uses a technique known as permutation of particles. A few possible alternative approaches to accomplish the same task (quantum binary voting) have also been discussed. Security of the proposed protocols is analyzed. Further, the efficiencies of the proposed protocols are computed, and are compared with that of the existing protocols. The comparison has established that the proposed protocols are more efficient than the existing protocols.

  15. Approche de prise en charge du trouble du spectre de l’autisme

    PubMed Central

    Lee, Patrick F.; Thomas, Roger E.; Lee, Patricia A.

    2015-01-01

    Résumé Objectif Se pencher sur les critères diagnostiques du trouble du spectre de l’autisme (TSA) comme les définit le Manuel diagnostique et statistique des troubles mentaux, cinquième édition (DSM-V), et concevoir une approche de prise en charge du TSA à l’aide du cadre CanMEDS–Médecine familiale (CanMEDS-MF). Sources d’information Le DSM-V, publié par l’American Psychiatric Association en mai 2013, énonce de nouveaux critères diagnostiques du TSA. Le cadre CanMEDS-MF du Collège des médecins de famille du Canada fournit un plan d’orientation pour la prise en charge complexe du TSA. Nous avons utilisé des données recueillies par le Centers for Disease Control and Prevention afin de déterminer la prévalence du TSA, ainsi que la revue systématique et méta-analyse détaillée effectuée par le National Institute for Health and Care Excellence du R.-U. pour ses lignes directrices sur le TSA dans le but d’évaluer les données probantes issues de plus de 100 interventions. Message principal Selon les données du Centers for Disease Control and Prevention, la prévalence du TSA se chiffrait à 1 sur 88 en 2008 aux États-Unis. La classification du TSA dans la quatrième édition du DSM incluait l’autisme, le syndrome d’Asperger, le trouble envahissant du développement et le trouble désintégratif de l’enfance. La dernière révision du DSM-V réunit tous ces troubles sous la mention TSA, avec différents niveaux de sévérité. La prise en charge du TSA est complexe; elle exige les efforts d’une équipe multidisciplinaire ainsi que des soins continus. Les rôles CanMEDS-MF fournissent un cadre de prise en charge. Conclusion Les médecins de famille sont au cœur de l’équipe de soins multidisciplinaire pour le TSA, et le cadre CanMEDS-MF tient lieu de plan détaillé pour guider la prise en charge d’un enfant atteint de TSA et aider la famille de cet enfant.

  16. The Dutch Linguistic Intraoperative Protocol: a valid linguistic approach to awake brain surgery.

    PubMed

    De Witte, E; Satoer, D; Robert, E; Colle, H; Verheyen, S; Visch-Brink, E; Mariën, P

    2015-01-01

    Intraoperative direct electrical stimulation (DES) is increasingly used in patients operated on for tumours in eloquent areas. Although a positive impact of DES on postoperative linguistic outcome is generally advocated, information about the neurolinguistic methods applied in awake surgery is scarce. We developed for the first time a standardised Dutch linguistic test battery (measuring phonology, semantics, syntax) to reliably identify the critical language zones in detail. A normative study was carried out in a control group of 250 native Dutch-speaking healthy adults. In addition, the clinical application of the Dutch Linguistic Intraoperative Protocol (DuLIP) was demonstrated by means of anatomo-functional models and five case studies. A set of DuLIP tests was selected for each patient depending on the tumour location and degree of linguistic impairment. DuLIP is a valid test battery for pre-, intraoperative and postoperative language testing and facilitates intraoperative mapping of eloquent language regions that are variably located.

  17. Protocols of Users Manipulating Visually Presented Information with Natural Language.

    DTIC Science & Technology

    1982-09-01

    office is in Cambridge. Among his house-designs are Fallingriver and Highland Hills. Fallingriver has several features including 2 saunas , clay tennis...IS A LOGIC STRUCTURE OF SOME SORT, SINCE IT HAS INPUT AND OUTPUTS. IS THAT CORRECT? yes. OKAY. I ALSO PRESUME THAT *THE BOOK" IS IR [EE]% OKAY. I ALSO...PLEASE IR ]I I DON’T KNOW ABOUT *GENERIC* OR ONANIFESTED". PLEASE RE-ASK YOUR QUESTION. The picture we have drawn is a connected set of logic gates with

  18. Les plaies du tendon patellaire

    PubMed Central

    Mechchat, Atif; Elidrissi, Mohammed; Mardy, Abdelhak; Elayoubi, Abdelghni; Shimi, Mohammed; Elibrahimi, Abdelhalim; Elmrini, Abdelmajid

    2014-01-01

    Les plaies du tendon patellaire sont peu fréquentes et sont peu rapportés dans la littérature, contrairement aux ruptures sous cutanées. Les sections du tendon patellaire nécessitent une réparation immédiate afin de rétablir l'appareil extenseur et de permettre une récupération fonctionnelle précoce. A travers ce travail rétrospectif sur 13 cas, nous analysons les aspects épidémiologiques, thérapeutiques et pronostiques de ce type de pathologie en comparant différents scores. L’âge moyen est de 25 ans avec une prédominance masculine. Les étiologies sont dominées par les accidents de la voie publique (68%) et les agressions par agent tranchant (26%) et contendant (6 %). Tous nos patients ont bénéficié d'un parage chirurgical avec suture tendineuse direct protégée par un laçage au fils d'aciers en légère flexion. La rééducation est débutée après sédation des phénomènes inflammatoires. Au dernier recul les résultats sont excellents et bon à 92%. Nous n'avons pas noté de différence de force musculaire et d'amplitude articulaire entre le genou sain et le genou lésé. Les lésions ouvertes du tendon patellaire est relativement rare. La prise en charge chirurgicale rapide donne des résultats assez satisfaisants. La réparation est généralement renforcée par un semi-tendineux, synthétique ou métallique en forme de cadre de renfort pour faciliter la réadaptation et réduire le risque de récidive après la fin de l'immobilisation. PMID:25170379

  19. Protocol design for mobile radio group communications over satellite

    NASA Astrophysics Data System (ADS)

    Leung, Victor C. M.

    1992-10-01

    The protocol design for a mobile radio service supporting half-duplex push-to-talk voice communications over mobile satellite systems is presented. Two types of protocols are considered, namely, a demand assignment multiple access protocol to assign channels only to those user groups in active sessions of conversations and a signaling protocol to arbitrate contentions among members of the same user group within an assigned channel. It is concluded that the proposed access control protocol makes it possible to improve the throughput capacity of the assigned channel by 65 or 18 percent compared to manual carrier-sensed access without or with collisoin detection, respectively.

  20. Routing Protocols in Wireless Sensor Networks

    PubMed Central

    Villalba, Luis Javier García; Orozco, Ana Lucila Sandoval; Cabrera, Alicia Triviño; Abbas, Cláudia Jacy Barenco

    2009-01-01

    The applications of wireless sensor networks comprise a wide variety of scenarios. In most of them, the network is composed of a significant number of nodes deployed in an extensive area in which not all nodes are directly connected. Then, the data exchange is supported by multihop communications. Routing protocols are in charge of discovering and maintaining the routes in the network. However, the appropriateness of a particular routing protocol mainly depends on the capabilities of the nodes and on the application requirements. This paper presents a review of the main routing protocols proposed for wireless sensor networks. Additionally, the paper includes the efforts carried out by Spanish universities on developing optimization techniques in the area of routing protocols for wireless sensor networks. PMID:22291515

  1. WOODSTOVE DURABILITY TESTING PROTOCOL

    EPA Science Inventory

    The report discusses the development of an accelerated laboratory test to simulate in-home woodstove aging and degradation. nown as a stress test, the protocol determines the long-term durability of woodstove models in a 1- to 2-week time frame. wo avenues of research have been t...

  2. Simple wavelength assignment protocol

    NASA Astrophysics Data System (ADS)

    Suryaputra, Stephen; Touch, Joseph D.; Bannister, Joseph A.

    2000-10-01

    IP routers can be coupled with wavelength-selective optical cross- connects to support existing Internet infrastructure in a wavelength division multiplexing (WDM) optical network. Because optical wavelength routing is transparent to IP, packets can bypass traditional forwarding and pass directly through the optical cross-connect, resulting in very high throughput and low delay routing. This approach shares features with label switching, but wavelengths are much more scarce resource than labels. Because optical switches have larger switching times than electronic switches, and wavelength conversions are expensive, wavelength label swapping is not easily done. Wavelength label assignments must consider these limitations to be practical in an optical environment. The performance of an instance of this approach, called Packet over Wavelengths (POW) has been simulated and studied. A new signaling protocol, Simple Wavelength Assignment Protocol (SWAP) is devised to be POW signaling protocol. SWAP takes into account the optical device limitations, and is designed to minimize wavelength conversion, utilize wavelengths with the merging of flows, and reduce the reconfiguration of optical switches. SWAP, to our knowledge, is the first approach to combine signaling and wavelength assignment in an on- line protocol. This paper describes high level SWAP design challenges, decision, and overhead.

  3. Advanced Quantum Communication Protocols

    DTIC Science & Technology

    2005-12-17

    theoretically optimal configuration, and compared hyperentangled and multi-pair encoding. Table of Contents: Summary 2 Relativistic Quantum Cryptography ( RQC ...error rates, for 4- and 6-state RQC 4. Intensity pulses to generate uniform time-interval probability distributions 5. Schematic of photon-arrival...Protocols: Scientific Progress and Accomplishments “Relativistic” Quantum Cryptography We have implemented relativistic quantum cryptography ( RQC ) using

  4. What's a Research Protocol?

    ERIC Educational Resources Information Center

    Holloway, Philip J; Mooney, Jeanette A

    2004-01-01

    A clinical trial needs a carefully structured, written plan in order not only to ensure its smooth running and successful conclusion but also to gain the compulsory agreement of an ethical committee. Such a plan is called a protocol. It consists of several stages. These are: (1) An introduction; (2) A statement of aims, objectives, hypotheses and…

  5. Mars Sample Quarantine Protocol Workshop

    NASA Technical Reports Server (NTRS)

    DeVincenzi, Donald L. (Editor); Bagby, John (Editor); Race, Margaret (Editor); Rummel, John (Editor)

    1999-01-01

    The Mars Sample Quarantine Protocol (QP) Workshop was convened to deal with three specific aspects of the initial handling of a returned Mars sample: 1) biocontainment, to prevent uncontrolled release of sample material into the terrestrial environment; 2) life detection, to examine the sample for evidence of live organisms; and 3) biohazard testing, to determine if the sample poses any threat to terrestrial life forms and the Earth's biosphere. During the first part of the Workshop, several tutorials were presented on topics related to the workshop in order to give all participants a common basis in the technical areas necessary to achieve the objectives of the Workshop.

  6. A structured data transfer protocol

    NASA Technical Reports Server (NTRS)

    Barrett, P.; Rots, A.

    1992-01-01

    The transfer of data between different computers and programs can be a major obstacle during data analysis. We present a new data transfer protocol which is based on a simple structure containing a value, an error, and a unit. Each of these members can be arrays or another structure. The ability to nest structures allows for the concept of objects. When using an object-oriented language such as C++, reference can be made to the object name instead of each element explicitly. Prototype code has been written which implements the basic design with enhancements planned for the future.

  7. Learning about Cri du Chat Syndrome

    MedlinePlus

    ... chat syndrome - also known as 5p- syndrome and cat cry syndrome - is a rare genetic condition that ... du chat syndrome usually include a high-pitched cat-like cry, mental retardation, delayed development, distinctive facial ...

  8. Planetary Protection Alternate Protocol Certification

    NASA Astrophysics Data System (ADS)

    Baker, Amy; Barengoltz, Jack; Tisdale, David

    The talk presents a standardized approach for new method certification or alterative testing protocol (ATP) certification against the existing U.S. Planetary Protection Standards. In consideration of new method certification there are two phases of activities that are relevant to the certification process. The first is sample acquisition which typically incorporates swab or wipes sampling on relevant hardware, associated facilities and ground support equipment. The sampling methods introduce considerations of field sampling efficiency as it relates to spore distribution on the spacecraft, spacecraft material influences on the ability of the swab or wipe to remove spores from the hardware, the types of swabs and wipes used (polyester, cotton, macrofoam), and human sampling influences. The second portion of a new protocol certification looks specifically at the lab work-up or analysis of the samples provided to the laboratory. Variables in this process include selection of appropriate biomarkers, extraction efficiencies (removal of spores or constituents of interest from the sampling device), and a method's ability to accurately determine the number of spores present in the sample with a statistically valid level of confidence as described by parameters such as precision, accuracy, robustness, specificity and sensitivity. Considerations for alternative testing protocols such as those which utilize bioburden reduction techniques include selection of appropriate biomarkers for testing, test materials and a defined statistical approach that provides sufficient scientific data to support the modification of an existing NASA specification or the generation of a new NASA specification. Synergies between the U.S. and European Space Agency approaches will also be discussed.

  9. A secure key agreement protocol based on chaotic maps

    NASA Astrophysics Data System (ADS)

    Wang, Xing-Yuan; Luan, Da-Peng

    2013-11-01

    To guarantee the security of communication in the public channel, many key agreement protocols have been proposed. Recently, Gong et al. proposed a key agreement protocol based on chaotic maps with password sharing. In this paper, Gong et al.'s protocol is analyzed, and we find that this protocol exhibits key management issues and potential security problems. Furthermore, the paper presents a new key agreement protocol based on enhanced Chebyshev polynomials to overcome these problems. Through our analysis, our key agreement protocol not only provides mutual authentication and the ability to resist a variety of common attacks, but also solve the problems of key management and security issues existing in Gong et al.'s protocol.

  10. An Gen2 Based Security Authentication Protocol for RFID System

    NASA Astrophysics Data System (ADS)

    Yi, Xiaoluo; Wang, Liangmin; Mao, Dongmei; Zhan, Yongzhao

    EPC Class-1 Generation-2 specification(Gen2 in brief) has been accepted as the standard for RFID tags under grant number ISO18000-6C. However, Gen2 does not pay due attention to security. For this reason, a Gen2 based security authentication protocol is developed in this paper. In details, we study the security requirements presented in the current Gen2 based RFID authentication protocols[7-13]. Then we point out the security flaws of Chien's mutual authentication protocol[7], and improve the protocol based on a 11 security requirements. Our improved protocol merely uses CRC and PRNG operations supported by Gen2 and meets the 11 security requirements. In contrast to the similar work [14,15] on Chien's protocol or other Gen2 based schemes, our protocol is more secure and our security analysis is much more comprehensive and qualitative.

  11. Protocols for distributive scheduling

    NASA Technical Reports Server (NTRS)

    Richards, Stephen F.; Fox, Barry

    1993-01-01

    The increasing complexity of space operations and the inclusion of interorganizational and international groups in the planning and control of space missions lead to requirements for greater communication, coordination, and cooperation among mission schedulers. These schedulers must jointly allocate scarce shared resources among the various operational and mission oriented activities while adhering to all constraints. This scheduling environment is complicated by such factors as the presence of varying perspectives and conflicting objectives among the schedulers, the need for different schedulers to work in parallel, and limited communication among schedulers. Smooth interaction among schedulers requires the use of protocols that govern such issues as resource sharing, authority to update the schedule, and communication of updates. This paper addresses the development and characteristics of such protocols and their use in a distributed scheduling environment that incorporates computer-aided scheduling tools. An example problem is drawn from the domain of space shuttle mission planning.

  12. Dysphonia risk screening protocol

    PubMed Central

    Nemr, Katia; Simões-Zenari, Marcia; da Trindade Duarte, João Marcos; Lobrigate, Karen Elena; Bagatini, Flavia Alves

    2016-01-01

    OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors) divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children), 29.25 (adult women), 22.75 (adult men), and 27.10 (seniors). CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics. PMID:27074171

  13. Satellite Communications Using Commercial Protocols

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  14. Robust Optimization of Biological Protocols

    PubMed Central

    Flaherty, Patrick; Davis, Ronald W.

    2015-01-01

    When conducting high-throughput biological experiments, it is often necessary to develop a protocol that is both inexpensive and robust. Standard approaches are either not cost-effective or arrive at an optimized protocol that is sensitive to experimental variations. We show here a novel approach that directly minimizes the cost of the protocol while ensuring the protocol is robust to experimental variation. Our approach uses a risk-averse conditional value-at-risk criterion in a robust parameter design framework. We demonstrate this approach on a polymerase chain reaction protocol and show that our improved protocol is less expensive than the standard protocol and more robust than a protocol optimized without consideration of experimental variation. PMID:26417115

  15. Protocols for multisatellite military networks

    NASA Astrophysics Data System (ADS)

    Kolavennu, V. R.; Aronson, M. H.; Sites, M. J.

    The performance of a number of network control protocols applicable to multisatellite networks using single and multiple antenna beams is evaluated. The protocols analyzed include: token passing, polled TDMA, adaptive TDMA, and a reservation assignment with TDMA orderwire. The effects of varying the number of network terminals in the system, message arrival rates and length, propagation delay, and interleaver span-times on the performance of the protocols are investigated. The capabilities of a reservation assignment protocol with slotted-Aloha orderwire and an in-band network control protocol with congestion control and multiple user priorities are examined. It is observed that the token passing protocol is most applicable to an EHF tactical network; the reservation assignment protocol is suited to networks with many terminals requiring short, bursty data communication capability; and the in-band network control protocol is useful for tactical networks that require interoperability.

  16. Biokinetics and dosimetry of depleted uranium (DU) in rats implanted with DU fragments.

    SciTech Connect

    Guilmette, Ray A.; Hahn, Fletcher F.; Durbin, P. W.

    2004-01-01

    A number of U. S. veterans of the Persian Gulf War were wounded with depleted uranium (DU) metal fragments as a result of 'friendly fire' incidents, in which Abrams tanks and Bradley fighting vehicles were struck by DU anti-armor munitions. Some of the crew members who survived were left with multiple small fragments of DU in their muscles and soft tissues. The number, size and location of the fragments made them inoperable in general, and therefore subject to long-term retention. Because there was inadequate data to predict the potential carcinogenicity of DU fragments in soft tissues, Hahn et al. (2003) conducted a lifespan cancer study in rats. As part of that study, a number of rats were maintained to study the biokinetics and dosimetry of DU implanted intramuscularly in male Wistar rats. Typically, four metal fragments, either as cylindrical pellets or square wafers were implanted into the biceps femoris muscles of the rats. Urine samples were collected periodically during their lifespans, and DU was analyzed in kidneys and eviscerated carcass (minus the implant sites) at death. The daily DU urinary excretion rate increased steeply during the first 30 d after implantation peaking at about 90 d at 3-10 x 10{sup -3}%/d. During the first 150 d, the average excretion rate was 2.4 x 10{sup -3}%/d, decreasing thereafter to about 1 x 10{sup -3}%/d. Serial radiographs were made of the wound sites to monitor gross morphologic changes in the DU implant and the surrounding tissue. As early as 1 w after implantation, radiographs showed the presence of surface corrosion and small, dense bodies near the original implant, presumably DU. This corrosion from the surface of the implant continued with time, but did not result in an increasing amount of DU reaching the blood and urine after the first 3 mo. During this 3-mo period, connective tissue capsules formed around the implants, and are hypothesized to have reduced the access of DU to tissue fluids by limiting the diffusion

  17. The covert channel over HTTP protocol

    NASA Astrophysics Data System (ADS)

    Graniszewski, Waldemar; Krupski, Jacek; Szczypiorski, Krzysztof

    2016-09-01

    The paper presents a new steganographic method - the covert channel is created over HTTP protocol header, i.e. trailer field. HTTP protocol is one of the most frequently used in the Internet. The popularity of the Web servers and network traffic from, and to them, is one of the requirements for undetectable message exchange. To study this kind of the information hiding technique an application in Javascript language based on the Node.js framework was written. The results of the experiment that was performed to send a message in the covert channel are also presented.

  18. The classification of quantum symmetric-key encryption protocols

    NASA Astrophysics Data System (ADS)

    Xiang, Chong; Yang, Li; Peng, Yong; Chen, Dongqing

    2014-11-01

    The classification of quantum symmetric-key encryption protocol is presented. According to five elements of a quantum symmetric-key encryption protocol: plaintext, ciphertext, key, encryption algorithm and decryption algorithm, there are 32 different kinds of them. Among them, 5 kinds of protocols have already been constructed and studied, and 21 kinds of them are proved to be impossible to construct, the last 6 kinds of them are not yet presented effectively. That means the research on quantum symmetric-key encryption protocol only needs to consider with 5 kinds of them nowadays.

  19. A Secure and Efficient Handover Authentication Protocol for Wireless Networks

    PubMed Central

    Wang, Weijia; Hu, Lei

    2014-01-01

    Handover authentication protocol is a promising access control technology in the fields of WLANs and mobile wireless sensor networks. In this paper, we firstly review an efficient handover authentication protocol, named PairHand, and its existing security attacks and improvements. Then, we present an improved key recovery attack by using the linearly combining method and reanalyze its feasibility on the improved PairHand protocol. Finally, we present a new handover authentication protocol, which not only achieves the same desirable efficiency features of PairHand, but enjoys the provable security in the random oracle model. PMID:24971471

  20. Modelisation frequentielle de la permittivite du beton pour le controle non destructif par georadar

    NASA Astrophysics Data System (ADS)

    Bourdi, Taoufik

    Le georadar (Ground Penetrating Radar (GPR)) constitue une technique de controle non destructif (CND) interessante pour la mesure des epaisseurs des dalles de beton et la caracterisation des fractures, en raison de ses caracteristiques de resolution et de profondeur de penetration. Les equipements georadar sont de plus en plus faciles a utiliser et les logiciels d'interpretation sont en train de devenir plus aisement accessibles. Cependant, il est ressorti dans plusieurs conferences et ateliers sur l'application du georadar en genie civil qu'il fallait poursuivre les recherches, en particulier sur la modelisation et les techniques de mesure des proprietes electriques du beton. En obtenant de meilleures informations sur les proprietes electriques du beton aux frequences du georadar, l'instrumentation et les techniques d'interpretation pourraient etre perfectionnees plus efficacement. Le modele de Jonscher est un modele qui a montre son efficacite dans le domaine geophysique. Pour la premiere fois, son utilisation dans le domaine genie civil est presentee. Dans un premier temps, nous avons valide l'application du modele de Jonscher pour la caracterisation de la permittivite dielectrique du beton. Les resultats ont montre clairement que ce modele est capable de reproduire fidelement la variation de la permittivite de differents types de beton sur la bande de frequence georadar (100 MHz-2 GHz). Dans un deuxieme temps, nous avons montre l'interet du modele de Jonscher en le comparant a d'autres modeles (Debye et Debye-etendu) deja utilises dans le domaine genie civil. Nous avons montre aussi comment le modele de Jonscher peut presenter une aide a la prediction de l'efficacite de blindage et a l'interpretation des ondes de la technique GPR. Il a ete determine que le modele de Jonscher permet de donner une bonne presentation de la variation de la permittivite du beton dans la gamme de frequence georadar consideree. De plus, cette modelisation est valable pour differents

  1. Berberine-induced anticancer activities in FaDu head and neck squamous cell carcinoma cells.

    PubMed

    Seo, Yo-Seob; Yim, Min-Ji; Kim, Bok-Hee; Kang, Kyung-Rok; Lee, Sook-Young; Oh, Ji-Su; You, Jae-Seek; Kim, Su-Gwan; Yu, Sang-Joun; Lee, Gyeong-Je; Kim, Do Kyung; Kim, Chun Sung; Kim, Jin-Soo; Kim, Jae-Sung

    2015-12-01

    In the present study, we investigated berberine‑induced apoptosis and the signaling pathways underlying its activity in FaDu head and neck squamous cell carcinoma cells. Berberine did not affect the viability of primary human normal oral keratinocytes. In contrast, the cytotoxicity of berberine was significantly increased in FaDu cells stimulated with berberine for 24 h. Furthermore, berberine increased nuclear condensation and apoptosis rates in FaDu cells than those in untreated control cells. Berberine also induced the upregulation of apoptotic ligands, such as FasL and TNF-related apoptosis-inducing ligand, and triggered the activation of caspase-8, -7 and -3, and poly(ADP ribose) polymerase, characteristic of death receptor-dependent extrinsic apoptosis. Moreover, berberine activated the mitochondria‑dependent apoptotic signaling pathway by upregulating pro-apoptotic factors, such as Bax, Bad, Apaf-1, and the active form of caspase-9, and downregulating anti-apoptotic factors, such as Bcl-2 and Bcl-xL. In addition, berberine increased the expression of the tumor suppressor p53 in FaDu cells. The pan-caspase inhibitor Z-VAD-fmk suppressed the activation of caspase-3 and prevented cytotoxicity in FaDu cells treated with berberine. Interestingly, berberine suppressed cell migration through downregulation of vascular endothelial growth factor (VEGF), matrix metalloproteinase (MMP)-2, and MMP-9. Moreover, the phosphorylation of extracellular signal-regulated kinase (ERK1/2) and p38, components of the mitogen-activated protein kinase pathway that are associated with the expression of MMP and VEGF, was suppressed in FaDu cells treated with berberine for 24 h. Therefore, these data suggested that berberine exerted anticancer effects in FaDu cells through induction of apoptosis and suppression of migration. Berberine may have potential applications as a chemotherapeutic agent for the management of head and neck squamous carcinoma.

  2. Communication complexity protocols for qutrits

    SciTech Connect

    Tamir, Boaz

    2007-03-15

    Consider a function where its entries are distributed among many parties. Suppose each party is allowed to send only a limited amount of information to a referee. The referee can use a classical protocol to compute the value of the global function. Is there a quantum protocol improving the results of all classical protocols? In a recent work Brukner et al. showed the deep connection between such problems and the theory of Bell inequalities. Here we generalize the theory to trits. There, the best classical protocol fails whereas the quantum protocol yields the correct answer.

  3. An internationally standardised antisaccade protocol.

    PubMed

    Antoniades, Chrystalina; Ettinger, Ulrich; Gaymard, Bertrand; Gilchrist, Iain; Kristjánsson, Arni; Kennard, Christopher; John Leigh, R; Noorani, Imran; Pouget, Pierre; Smyrnis, Nikolaos; Tarnowski, Adam; Zee, David S; Carpenter, R H S

    2013-05-24

    Detailed measurements of saccadic latency--the time taken to make an eye movement to a suddenly-presented visual target--have proved a valuable source of detailed and quantitative information in a wide range of neurological conditions, as well as shedding light on the mechanisms of decision, currently of intense interest to cognitive neuroscientists. However, there is no doubt that more complex oculomotor tasks, and in particular the antisaccade task in which a participant must make a saccade in the opposite direction to the target, are potentially more sensitive indicators of neurological dysfunction, particularly in neurodegenerative conditions. But two obstacles currently hinder their widespread adoption for this purpose. First, that much of the potential information from antisaccade experiments, notably about latency distribution and amplitude, is typically thrown away. Second, that there is no standardised protocol for carrying out antisaccade experiments, so that results from one laboratory cannot easily be compared with those from another. This paper, the outcome of a recent international meeting of oculomotor scientists and clinicians with an unusually wide experience of such measurements, sets out a proposed protocol for clinical antisaccade trials: its adoption will greatly enhance the clinical and scientific benefits of making these kinds of measurements.

  4. Quantum protocol for cheat-sensitive weak coin flipping.

    PubMed

    Spekkens, R W; Rudolph, Terry

    2002-11-25

    We present a quantum protocol for the task of weak coin flipping. We find that, for one choice of parameters in the protocol, the maximum probability of a dishonest party winning the coin flip if the other party is honest is 1/sqrt[2]. We also show that if parties restrict themselves to strategies wherein they cannot be caught cheating, their maximum probability of winning can be even smaller. As such, the protocol offers additional security in the form of cheat sensitivity.

  5. TRIGA: Telecommunications Protocol Processing Subsystem Using Reconfigurable Interoperable Gate Arrays

    NASA Technical Reports Server (NTRS)

    Pang, Jackson; Pingree, Paula J.; Torgerson, J. Leigh

    2006-01-01

    We present the Telecommunications protocol processing subsystem using Reconfigurable Interoperable Gate Arrays (TRIGA), a novel approach that unifies fault tolerance, error correction coding and interplanetary communication protocol off-loading to implement CCSDS File Delivery Protocol and Datalink layers. The new reconfigurable architecture offers more than one order of magnitude throughput increase while reducing footprint requirements in memory, command and data handling processor utilization, communication system interconnects and power consumption.

  6. An improved arbitrated quantum signature protocol based on the key-controlled chained CNOT encryption

    NASA Astrophysics Data System (ADS)

    Zhang, Long; Sun, Hong-Wei; Zhang, Ke-Jia; Jia, Heng-Yue

    2017-03-01

    In this paper, a new quantum encryption based on the key-controlled chained CNOT operations, which is named KCCC encryption, is proposed. With the KCCC encryption, an improved arbitrated quantum signature (AQS) protocol is presented. Compared with the existing protocols, our protocol can effectively prevent forgery attacks and disavowal attacks. Moreover, only single state is required in the protocol. We hope it is helpful to further research in the design of AQS protocols in future.

  7. Delivery presentations

    MedlinePlus

    ... page: //medlineplus.gov/ency/patientinstructions/000621.htm Delivery presentations To use the sharing features on this page, ... baby by cesarean birth (C-section) . Less Common Presentations With the brow-first position, the baby's head ...

  8. Protocol Architecture Model Report

    NASA Technical Reports Server (NTRS)

    Dhas, Chris

    2000-01-01

    NASA's Glenn Research Center (GRC) defines and develops advanced technology for high priority national needs in communications technologies for application to aeronautics and space. GRC tasked Computer Networks and Software Inc. (CNS) to examine protocols and architectures for an In-Space Internet Node. CNS has developed a methodology for network reference models to support NASA's four mission areas: Earth Science, Space Science, Human Exploration and Development of Space (REDS), Aerospace Technology. This report applies the methodology to three space Internet-based communications scenarios for future missions. CNS has conceptualized, designed, and developed space Internet-based communications protocols and architectures for each of the independent scenarios. The scenarios are: Scenario 1: Unicast communications between a Low-Earth-Orbit (LEO) spacecraft inspace Internet node and a ground terminal Internet node via a Tracking and Data Rela Satellite (TDRS) transfer; Scenario 2: Unicast communications between a Low-Earth-Orbit (LEO) International Space Station and a ground terminal Internet node via a TDRS transfer; Scenario 3: Multicast Communications (or "Multicasting"), 1 Spacecraft to N Ground Receivers, N Ground Transmitters to 1 Ground Receiver via a Spacecraft.

  9. A Survey on Underwater Acoustic Sensor Network Routing Protocols

    PubMed Central

    Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina

    2016-01-01

    Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research. PMID:27011193

  10. A Survey on Underwater Acoustic Sensor Network Routing Protocols.

    PubMed

    Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina

    2016-03-22

    Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research.

  11. Reconnaissance des Formes a L'aide du Filtre de Phase D'harmoniques Circulaires

    NASA Astrophysics Data System (ADS)

    Leclerc, Luc

    Cette these porte sur l'etude d'une nouvelle generation de filtres fabriques a partir de la phase du filtre d'harmoniques circulaires (FHC). Il s'agit du FHC de phase (FHCP), du FHC de phase binaire (FHCPB) et du FHC binaire (FHCB) qui, tout en etant invariants par rapport a la position et a l'orientation des cibles, offrent une meilleure capacite de discrimination que le FHC. Nous presentons egalement le FHC de covariance (FHCC) et ses derives de phase, lesquels permettent d'accroi tre davantage la capacite de discrimination du FHC dans les cas ou les objets composants la scene sont tres semblables. La performance de chacun des filtres est evaluee au moyen de simulations sur ordinateur avant d'etre mesuree sur un correlateur optique. Le FHC, FHCP, FHCC et FHCCP sont encodes dans un hologramme genere par ordinateur tandis que les filtres binaires sont affiches sur un televiseur a cristaux liquides. Enfin, nous termions ce manuscrit en presentant le FHCB multiplexe qui permet de correler, en une seule operation, un objet et plusieurs FHC de differents ordres.

  12. Reengineering Archival Access through the OAI Protocols.

    ERIC Educational Resources Information Center

    Prom, Christopher J.

    2003-01-01

    The Open Archives Initiative (OAI) Protocol for Metadata Harvesting program presents a method by which metadata regarding archives and manuscripts can be shared and made more interoperable with metadata from other sources. Outlines a method for exposing hierarchical metadata from encoded archival description (EAD) files and assesses some…

  13. 21 CFR 58.120 - Protocol.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL GOOD LABORATORY PRACTICE... for acceptable levels of contaminants that are reasonably expected to be present in the dietary... methods to be used. (b) All changes in or revisions of an approved protocol and the reasons...

  14. Preparing Protocols for Institutional Review Boards.

    ERIC Educational Resources Information Center

    Lyons, Charles M.

    1983-01-01

    Introduces the process by which Institutional Review Boards (IRBs) review proposals for research involving human subjects. Describes the composition of IRBs. Presents the Nuremberg code, the elements of informed consent, the judging criteria for proposals, and a sample protocol format. References newly published regulations governing research with…

  15. Unlinkable Serial Transactions: Protocols and Applications

    DTIC Science & Technology

    1999-11-01

    Verification Additional Key Words and Phrases: Anonymity , blinding, cryptographic protocols, unlinkable serial transactions A preliminary version of...typically one for each vendor [Chaum 1981]. Customers maintain anonymity by conducting transactions using anonymous elec- tronic cash (e-cash). But...vendors are able to protect their interests by maintaining a profile on each anonymous customer. In this paper we present, effectively, the opposite

  16. Building multiservice Internet protocol virtual private networks

    NASA Astrophysics Data System (ADS)

    Cheung, William

    1999-11-01

    Multiservice Internet Protocol-based Virtual Private Networks (MIP- VPNs) with Quality of Service (QoS) are becoming a reality due to the availability of new standards from the Internet Engineering Task Force (IETF). This paper describes how components including security models, IP tunneling protocols, and service differentiation schemes fit together in order to construct such a VPN. First, the concept and rationale of VPN is presented, followed by a discussion of its supporting components. A comparison is made among the various VPN technologies.

  17. A molecular protocol for diagnosing myotonic dystrophy.

    PubMed

    Guida, M; Marger, R S; Papp, A C; Snyder, P J; Sedra, M S; Kissel, J T; Mendell, J R; Prior, T W

    1995-01-01

    Myotonic dystrophy (DM) is an autosomal dominant genetic disease caused by an unstable CTG repeat sequence in the 3' untranslated region of the myotonin protein kinase gene. The CTG repeat is present 5-30 times in the normal population, whereas DM patients have CTG expansions of 50 to several thousand repeats. The age of onset of the disorder and the severity of the phenotype is roughly correlated with the size of the CTG expansion. We developed a molecular protocol for the diagnosis of DM based on an initial polymerase chain reaction screen to detect normal-sized alleles and small expansions, followed by an improved Southern protocol to detect larger expansions.

  18. Cryptanalysis of the Quantum Group Signature Protocols

    NASA Astrophysics Data System (ADS)

    Zhang, Ke-Jia; Sun, Ying; Song, Ting-Ting; Zuo, Hui-Juan

    2013-11-01

    Recently, the researches of quantum group signature (QGS) have attracted a lot of attentions and some typical protocols have been designed for e-payment system, e-government, e-business, etc. In this paper, we analyze the security of the quantum group signature with the example of two novel protocols. It can be seen that both of them cannot be implemented securely since the arbitrator cannot solve the disputes fairly. In order to show that, some possible attack strategies, which can be used by the malicious participants, are proposed. Moreover, the further discussions of QGS are presented finally, including some insecurity factors and improved ideas.

  19. On Alarm Protocol in Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Cichoń, Jacek; Kapelko, Rafał; Lemiesz, Jakub; Zawada, Marcin

    We consider the problem of efficient alarm protocol for ad-hoc radio networks consisting of devices that try to gain access for transmission through a shared radio communication channel. The problem arise in tasks that sensors have to quickly inform the target user about an alert situation such as presence of fire, dangerous radiation, seismic vibrations, and more. In this paper, we present a protocol which uses O(logn) time slots and show that Ω(logn/loglogn) is a lower bound for used time slots.

  20. Standardized North American marsh bird monitoring protocol

    USGS Publications Warehouse

    Conway, Courtney J.

    2011-01-01

    Little is known about the population status of many marsh-dependent birds in North America but recent efforts have focused on collecting more reliable information and estimates of population trends. As part of that effort, a standardized survey protocol was developed in 1999 that provided guidance for conducting marsh bird surveys throughout North America such that data would be consistent among locations. The original survey protocol has been revised to provide greater clarification on many issues as the number of individuals using the protocol has grown. The Standardized North American Marsh Bird Monitoring Protocol instructs surveyors to conduct an initial 5-minute passive point-count survey followed by a series of 1-minute segments during which marsh bird calls are broadcast into the marsh following a standardized approach. Surveyors are instructed to record each individual bird from the suite of 26 focal species that are present in their local area on separate lines of a datasheet and estimate the distance to each bird. Also, surveyors are required to record whether each individual bird was detected within each 1-minute subsegment of the survey. These data allow analysts to use several different approaches for estimating detection probability. The Standardized North American Marsh Bird Monitoring Protocol provides detailed instructions that explain the field methods used to monitor marsh birds in North America.

  1. Network protocols for real-time applications

    NASA Technical Reports Server (NTRS)

    Johnson, Marjory J.

    1987-01-01

    The Fiber Distributed Data Interface (FDDI) and the SAE AE-9B High Speed Ring Bus (HSRB) are emerging standards for high-performance token ring local area networks. FDDI was designed to be a general-purpose high-performance network. HSRB was designed specifically for military real-time applications. A workshop was conducted at NASA Ames Research Center in January, 1987 to compare and contrast these protocols with respect to their ability to support real-time applications. This report summarizes workshop presentations and includes an independent comparison of the two protocols. A conclusion reached at the workshop was that current protocols for the upper layers of the Open Systems Interconnection (OSI) network model are inadequate for real-time applications.

  2. Protocol for emergency EPR dosimetry in fingernails.

    PubMed

    Trompier, F; Kornak, L; Calas, C; Romanyukha, A; Leblanc, B; Mitchell, C A; Swartz, H M; Clairand, I

    2007-08-01

    There is an increased need for after-the-fact dosimetry because of the high risk of radiation exposures due to terrorism or accidents. In case of such an event, a method is needed to make measurements of dose in a large number of individuals rapidly and with sufficient accuracy to facilitate effective medical triage. Dosimetry based on EPR measurements of fingernails potentially could be an effective tool for this purpose. This paper presents the first operational protocols for EPR fingernail dosimetry, including guidelines for collection and storage of samples, parameters for EPR measurements, and the method of dose assessment. In a blinded test of this protocol application was carried out on nails freshly sampled and irradiated to 4 and 20 Gy; this protocol gave dose estimates with an error of less than 30%.

  3. A Flexible CSMA based MAC Protocol for Software Defined Radios

    NASA Astrophysics Data System (ADS)

    Puschmann, André; Kalil, Mohamed A.; Mitschele-Thiel, Andreas

    2012-09-01

    In this article, we propose a flexible CSMA based MAC protocol which facilitates research and experimentation using software define radios. The modular architecture allows to employ the protocol on platforms with heterogeneous hardware capabilities and provides the freedom to exchange or adapt the spectrum sensing mechanism without modifying the MAC protocol internals. We discuss the architecture of the protocol and provide structural details of its main components. Furthermore, we present throughput measurements that have been obtained on an example system using host-based spectrum sensing.

  4. Optimal channel access protocol with multiple reception capacity

    NASA Astrophysics Data System (ADS)

    Chlamtac, Imrica; Farago, Andras

    1994-04-01

    A multiple access packet communication model is analyzed in which the users can receive packets on more than one common channel. For this type of system, a new channel access protocol is presented. We prove that under heavy homogeneous load the protocol guarantees the maximum achievable throughput among all possible protocols. The general model can be applied to different systems, according to various realizations of the logical channels. For example, in packet radio networks the channels can be realized by different carrier frequencies (FDMA) or by different codes (CDMA). The simplicity and optimality of the protocol make it attractive for practical applications.

  5. Licklider Transmission Protocol Implementation

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.; Krupiarz, Chris

    2011-01-01

    This software is an implementation of the Licklider Transmission Protocol (LTP), a communications protocol intended to support the Bundle Protocol in Delay-Tolerant Network (DTN) operations. LTP is designed to provide retransmission-based reliability over links characterized by extremely long message round-trip times and/or frequent interruptions in connectivity. Communication in interplanetary space is the most prominent example of this sort of environment, and LTP is principally aimed at supporting long-haul reliable transmission over deep-space RF links. Like any reliable transport service employing ARQ (Automatic Repeat re-Quests), LTP is stateful. In order to assure the reception of a block of data it has sent, LTP must retain for possible retransmission all portions of that block which might not have been received yet. In order to do so, it must keep track of which portions of the block are known to have been received so far, and which are not, together with any additional information needed for purposes of retransmitting part, or all, of the block. Long round-trip times mean substantial delay between the transmission of a block of data and the reception of an acknowledgement from the block s destination, signaling arrival of the block. If LTP postponed transmission of additional blocks of data until it received acknowledgement of the arrival of all prior blocks, valuable opportunities to use what little deep space transmission bandwidth is available would be forever lost. For this reason, LTP is based in part on a notion of massive state retention. Any number of requested transmission conversations (sessions) may be concurrently in flight at various displacements along the link between two LTP engines, and the LTP engines must necessarily retain transmission status and retransmission resources for all of them. Moreover, if any of the data of a given block are lost en route, it will be necessary to retain the state of that transmission during an additional

  6. An auditable protocol for treating attention deficit/hyperactivity disorder

    PubMed Central

    Hill, P; Taylor, E

    2001-01-01

    We present an auditable protocol for attention deficit/hyperactivity disorder (ADHD) or hyperkinetic disorder. The protocol is derived from standard recommendations and evidence, and is intended for outpatient medical clinic practice in secondary care. Suggested side effect rating scales are included.

 PMID:11316683

  7. Clinicians as Communication Partners: Developing a Mediated Discourse Elicitation Protocol

    ERIC Educational Resources Information Center

    Hengst, Julie A.; Duff, Melissa C.

    2007-01-01

    This article presents the development and piloting of a mediated discourse elicitation protocol. Grounded in situated theories of communication and informed by mediated discourse analysis, this protocol selectively samples familiar discourse types in a manner designed to preserve interactional aspects of communication. Critically, the mediated…

  8. An efficient sampling protocol for sagebrush/grassland monitoring

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Monitoring the health and condition of rangeland vegetation can be very time consuming and costly. An efficiency but rigorous sampling protocol is needed for monitoring sagebrush/grassland vegetation. A randomized sampling protocol was presented for geo-referenced, nadir photographs acquired using...

  9. Concurrent Think-Aloud Protocol as a Socially Situated Construct

    ERIC Educational Resources Information Center

    Sasaki, Tomomi

    2008-01-01

    Verbal report protocols have been considered as direct representations of individual cognitive processes. The present study examined the social nature of verbal reports, particularly focusing on whether and in what ways concurrent think-aloud (TA) protocol data are recipient-designed. The results of this study suggest that verbal reports elicited…

  10. Information Presentation

    NASA Technical Reports Server (NTRS)

    Holden, Kritina; Sandor, A.; Thompson, S. G.; McCann, R. S.; Kaiser, M. K.; Begault, D. R.; Adelstein, B. D.; Beutter, B. R.; Stone, L. S.

    2008-01-01

    The goal of the Information Presentation Directed Research Project (DRP) is to address design questions related to the presentation of information to the crew on flight vehicles, surface landers and habitats, and during extra-vehicular activities (EVA). Designers of displays and controls for exploration missions must be prepared to select the text formats, label styles, alarms, electronic procedure designs, and cursor control devices that provide for optimal crew performance on exploration tasks. The major areas of work, or subtasks, within the Information Presentation DRP are: 1) Controls, 2) Displays, 3) Procedures, and 4) EVA Operations.

  11. Variete Technique du Lambeau Sural dans les Brulures Profondes du Pied

    PubMed Central

    Ezzoubi, M.; Ettalbi, S.; Elmounjid, S.; Fassi, J.; Benchamckha, F.J.; Sakhi, M.; Boukind, E.

    2005-01-01

    Summary Les couvertures des pertes de substance de la jambe, du talon et du pied font souvent appel au lambeau sural, qui reste, de part ses dimensions, une indication limitée. Les Auteurs présentent, à travers deux cas cliniques, une variété technique pour la levée du lambeau sural, permettant d'obtenir des palettes cutanées de grande surface avec une bonne sécurité vasculaire. C'est un lambeau fasciocutané remontant jusqu'à un centimètre du creux poplité et incluant, lors de la levée, l'aponévrose, le nerf sural, la petite veine saphène et le nerf sural latéral. PMID:21990988

  12. Information Presentation

    NASA Technical Reports Server (NTRS)

    Holden, Kritina L.; Thompson, Shelby G.; Sandor, Aniko; McCann, Robert S.; Kaiser, Mary K.; Adelstein, Barnard D.; Begault, Durand R.; Beutter, Brent R.; Stone, Leland S.; Godfroy, Martine

    2009-01-01

    The goal of the Information Presentation Directed Research Project (DRP) is to address design questions related to the presentation of information to the crew. In addition to addressing display design issues associated with information formatting, style, layout, and interaction, the Information Presentation DRP is also working toward understanding the effects of extreme environments encountered in space travel on information processing. Work is also in progress to refine human factors-based design tools, such as human performance modeling, that will supplement traditional design techniques and help ensure that optimal information design is accomplished in the most cost-efficient manner. The major areas of work, or subtasks, within the Information Presentation DRP for FY10 are: 1) Displays, 2) Controls, 3) Procedures and Fault Management, and 4) Human Performance Modeling. The poster will highlight completed and planned work for each subtask.

  13. Conservation Presentation.

    ERIC Educational Resources Information Center

    Friday, Gerald

    2001-01-01

    Introduces a project in which students teach about the importance of recycling and conservation by presenting demonstrations. Includes demonstrations on water, plastic, and other recycling products such as steel. (YDS)

  14. Information Presentation

    NASA Technical Reports Server (NTRS)

    Holden, K.L.; Boyer, J.L.; Sandor, A.; Thompson, S.G.; McCann, R.S.; Begault, D.R.; Adelstein, B.D.; Beutter, B.R.; Stone, L.S.

    2009-01-01

    The goal of the Information Presentation Directed Research Project (DRP) is to address design questions related to the presentation of information to the crew. The major areas of work, or subtasks, within this DRP are: 1) Displays, 2) Controls, 3) Electronic Procedures and Fault Management, and 4) Human Performance Modeling. This DRP is a collaborative effort between researchers at Johnson Space Center and Ames Research Center.

  15. A Hybrid Quorum Protocol for Improved Availability, Capacity, Load and Reduced Overhead

    NASA Astrophysics Data System (ADS)

    Pandey, Parul; Tripathi, Maheshwari

    2016-12-01

    Data replication is playing a vital role in the design of distributed information systems. This paper presents a novel and efficient distributed algorithm for managing replicated data and for better performance and availability. This paper presents an extension to existing wheel protocol for improved performance. Wheel protocol imposes a logical wheel structure on the set of copies of an object and gives smallest read quorum. In addition to small read quorum size for read intensive applications, it is necessary to have good write availability as well. This paper proposes two hybrid wheel protocols, which superimpose logarithmic and ring protocols on top of the wheel protocol. It shows that, both protocols help in improving write availability, read capacity, load and message overhead and also compare their performances with wheel and other protocols. Hybrid protocols expand usage of wheel protocol to different type of applications.

  16. Prejudice: From Allport to DuBois.

    ERIC Educational Resources Information Center

    Gaines, Stanley O., Jr.; Reed, Edward S.

    1995-01-01

    Examines the differences between Gordon Allport's and W. E. B. DuBois's theories on the origins of prejudice and the impact of discrimination on the personality and social development of blacks. The article argues that prejudice is a historically developed process, not a universal feature of human psychology. Implications for U.S. race relations…

  17. Growth study of cri du chat syndrome.

    PubMed

    Collins, M S; Eaton-Evans, J

    2001-10-01

    We compared the growth of children with cri du chat (5p-) syndrome with the 1990 UK growth curves. Most subjects had impaired growth, particularly of head circumference. The more emaciated the child the more pronounced the microcephaly, showing the need for growth and nutrition monitoring.

  18. Rick and Becky DuFour

    ERIC Educational Resources Information Center

    McLester, Susan

    2012-01-01

    In 1969, a concern with the deep inequity of students' experiences and opportunities in traditional school systems first drove social studies teacher Rick DuFour to begin advocating for the kind of reforms that would jell into his transformative model, Professional Learning Communities (PLC) at Work, some 16 years later. The core belief of the PLC…

  19. DuSable High School Program Flourishes.

    ERIC Educational Resources Information Center

    Graff, Pat

    1995-01-01

    Describes the fall and rise of the Panther Press, the scholastic newspaper of the DuSable High School in Chicago. States that despite being located in the midst of public housing projects, the school's newspaper is thriving where others in similar circumstances have failed. Describes how the school's principal and an advisor revitalized and…

  20. The World Already Avoided: Quantifying the Ozone Benefits Achieved by the Montreal Protocol

    NASA Astrophysics Data System (ADS)

    Chipperfield, Martyn; Dhomse, Sandip; Feng, Wuhu; McKenzie, Richard; Velders, Guus; Pyle, John

    2015-04-01

    Chlorine and bromine-containing ozone-depleting substances (ODSs) are controlled by the 1987 Montreal Protocol. In consequence, atmospheric equivalent chlorine peaked in 1993 and has been declining slowly since then. Consistent with this, models project a gradual increase in stratospheric ozone with the Antarctic Ozone Hole expected to disappear by ~2050. However, we show that by 2014 the Montreal Protocol has already achieved significant benefits for the ozone layer. Using an off-line 3-D atmospheric chemistry model, we demonstrate that much larger ozone depletion than observed has been avoided by the protocol, with benefits for surface UV and climate. A deep Arctic Ozone Hole, with column values <120 DU, would have occurred given the meteorological conditions in 2011. The Antarctic Ozone Hole would have grown in size by 40% by 2013, with enhanced loss at subpolar latitudes. The ozone decline over northern hemisphere middle latitudes would have continued, more than doubling to ~15% by 2013.

  1. Quantifying the ozone and ultraviolet benefits already achieved by the Montreal Protocol

    NASA Astrophysics Data System (ADS)

    Chipperfield, M. P.; Dhomse, S. S.; Feng, W.; McKenzie, R. L.; Velders, G. J. M.; Pyle, J. A.

    2015-05-01

    Chlorine- and bromine-containing ozone-depleting substances (ODSs) are controlled by the 1987 Montreal Protocol. In consequence, atmospheric equivalent chlorine peaked in 1993 and has been declining slowly since then. Consistent with this, models project a gradual increase in stratospheric ozone with the Antarctic ozone hole expected to disappear by ~2050. However, we show that by 2013 the Montreal Protocol had already achieved significant benefits for the ozone layer. Using a 3D atmospheric chemistry transport model, we demonstrate that much larger ozone depletion than observed has been avoided by the protocol, with beneficial impacts on surface ultraviolet. A deep Arctic ozone hole, with column values <120 DU, would have occurred given meteorological conditions in 2011. The Antarctic ozone hole would have grown in size by 40% by 2013, with enhanced loss at subpolar latitudes. The decline over northern hemisphere middle latitudes would have continued, more than doubling to ~15% by 2013.

  2. Quantifying the ozone and ultraviolet benefits already achieved by the Montreal Protocol.

    PubMed

    Chipperfield, M P; Dhomse, S S; Feng, W; McKenzie, R L; Velders, G J M; Pyle, J A

    2015-05-26

    Chlorine- and bromine-containing ozone-depleting substances (ODSs) are controlled by the 1987 Montreal Protocol. In consequence, atmospheric equivalent chlorine peaked in 1993 and has been declining slowly since then. Consistent with this, models project a gradual increase in stratospheric ozone with the Antarctic ozone hole expected to disappear by ∼2050. However, we show that by 2013 the Montreal Protocol had already achieved significant benefits for the ozone layer. Using a 3D atmospheric chemistry transport model, we demonstrate that much larger ozone depletion than observed has been avoided by the protocol, with beneficial impacts on surface ultraviolet. A deep Arctic ozone hole, with column values <120 DU, would have occurred given meteorological conditions in 2011. The Antarctic ozone hole would have grown in size by 40% by 2013, with enhanced loss at subpolar latitudes. The decline over northern hemisphere middle latitudes would have continued, more than doubling to ∼15% by 2013.

  3. Quantifying the ozone and ultraviolet benefits already achieved by the Montreal Protocol

    PubMed Central

    Chipperfield, M. P.; Dhomse, S. S.; Feng, W.; McKenzie, R. L.; Velders, G.J.M.; Pyle, J. A.

    2015-01-01

    Chlorine- and bromine-containing ozone-depleting substances (ODSs) are controlled by the 1987 Montreal Protocol. In consequence, atmospheric equivalent chlorine peaked in 1993 and has been declining slowly since then. Consistent with this, models project a gradual increase in stratospheric ozone with the Antarctic ozone hole expected to disappear by ∼2050. However, we show that by 2013 the Montreal Protocol had already achieved significant benefits for the ozone layer. Using a 3D atmospheric chemistry transport model, we demonstrate that much larger ozone depletion than observed has been avoided by the protocol, with beneficial impacts on surface ultraviolet. A deep Arctic ozone hole, with column values <120 DU, would have occurred given meteorological conditions in 2011. The Antarctic ozone hole would have grown in size by 40% by 2013, with enhanced loss at subpolar latitudes. The decline over northern hemisphere middle latitudes would have continued, more than doubling to ∼15% by 2013. PMID:26011106

  4. Presentation Skills.

    ERIC Educational Resources Information Center

    Burt, Lorna; And Others

    This guide is intended for use in an eight-session course designed to develop the presentation skills required of persons employed in the manufacturing and service industries. The course is structured so that, upon its completion, students will be able to accomplish the following: identify the traits of good and bad speakers; research and organize…

  5. [Cri-du-chat syndrome. A case report].

    PubMed

    Diop, I B; Sy Signate, H; Ba, S A; Sarr, M; Hane, L; Diame, H; Kane, A; Dieye, O; Sow, D; Diouf, S M; Fall, M

    2000-01-01

    We report a documented case in Senegal with cri-du-chat syndrome diagnosed in a 3 months old girl. Our patient benefited from clinical examination, ECG (15 derivations), chest X ray and standard laboratory tests. The cry has been recorded on a magnetic band. We performed also a pulsed-Doppler, two dimensional and TM echocardiography. Chromosomal analysis has been realized. These data are discussed and compared to the literature. At admission this patient presents characteristic cat like cry. At examination, there is a facial dysmorphy, important growth retardation and feeding dyspnea. Auscultation shows a 3/6 left sub-clavicular systolic murmur. Laboratory tests show anemia (hemoglobin = 7.8 g/dl). Chest x-ray showed a cardio-thoracic ratio at 0.61 with increased pulmonary vascular markings. ECG showed right ventricular hypertrophy. Echocardiography-Doppler revealed persistent ductus arteriosus (PDA). Chromosomal analysis shows deletion of the short arm of chromosome 5. After treatment with digitalis and diuretics there was an improvement of cardiac failure. Diagnosis of cri-du-chat syndrome is easy when characteristic cat-like-cry is present. Cardiovascular abnormalities are unfrequent in this syndrome (20% of the cases). They are dominated by ventricular septal defect and PDA. Hemodynamic failure and related growth retardation can lead to cardiac surgery.

  6. Usability of Information in Battle Management Operations (1’Exploitation de l’information dans les operations de gestion du champ de bataille)

    DTIC Science & Technology

    2007-11-02

    de gestion du champ de bataille) Papers presented at the RTO Human Factors and Medicine Panel (HFM) Symposium held in Oslo, Norway, 10-13 April 2000...Information in Battle Management Operations (l’Exploitation de l’information dans les opérations de gestion du champ de bataille) Papers presented at the RTO...is easily used by battlespace managers and warfighters. iii l’Exploitation de l’information dans les opérations de gestion du champ de bataille (RTO

  7. Overview Presentation

    NASA Technical Reports Server (NTRS)

    Lytle, John

    2001-01-01

    This report provides an overview presentation of the 2000 NPSS (Numerical Propulsion System Simulation) Review and Planning Meeting. Topics include: 1) a background of the program; 2) 1999 Industry Feedback; 3) FY00 Status, including resource distribution and major accomplishments; 4) FY01 Major Milestones; and 5) Future direction for the program. Specifically, simulation environment/production software and NPSS CORBA Security Development are discussed.

  8. PROTOCOL FOR EXAMINATION OF THE INNER CAN CLOSURE WELD REGION FOR 3013 DE CONTAINERS

    SciTech Connect

    Mickalonis, J.

    2014-09-16

    The protocol for the examination of the inner can closure weld region (ICCWR) for 3013 DE containers is presented within this report. The protocol includes sectioning of the inner can lid section, documenting the surface condition, measuring corrosion parameters, and storing of samples. This protocol may change as the investigation develops since findings may necessitate additional steps be taken. Details of the previous analyses, which formed the basis for this protocol, are also presented.

  9. A Security Analysis of the 802.11s Wireless Mesh Network Routing Protocol and Its Secure Routing Protocols

    PubMed Central

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-01-01

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP. PMID:24002231

  10. A security analysis of the 802.11s wireless mesh network routing protocol and its secure routing protocols.

    PubMed

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-09-02

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP.

  11. Scalp acupuncture treatment protocol for anxiety disorders: a case report.

    PubMed

    He, Yuxin; Chen, Jia; Pan, Zimei; Ying, Zhou

    2014-07-01

    Anxiety disorders are among the most common psychiatric illnesses, and acupuncture treatment is widely accepted in the clinic without the side effects seen from various medications. We designed a scalp acupuncture treatment protocol by locating two new stimulation areas. The area one is between Yintang (M-HN-3) and Shangxing (DU-23) and Shenting (DU-24), and the area two is between Taiyang (M-HN-9) and Tianchong (GB-9) and Shuaigu (GB-8). By stimulating these two areas with high-frequency continuous electric waves, remarkable immediate and long-term effects for anxiety disorders have been observed in our practice. The first case was a 70-year-old male with general anxiety disorder (GAD) and panic attacks at night. The scalp acupuncture treatment protocol was applied with electric stimulation for 45 minutes once every week. After four sessions of acupuncture treatments, the patient reported that he did not have panic attacks at night and he had no feelings of anxiety during the day. Follow-up 4 weeks later confirmed that he did not have any episodes of panic attacks and he had no anxiety during the day since his last acupuncture treatment. The second case was a 35-year-old male who was diagnosed with posttraumatic stress disorder (PTSD) with a history of providing frontline trauma care as a Combat Medics from the Iraq combat field. He also had 21 broken bones and multiple concussions from his time in the battlefield. He had symptoms of severe anxiety, insomnia, nightmares with flashbacks, irritability, and bad temper. He also had chest pain, back pain, and joint pain due to injuries. The above treatment protocol was performed with 30 minutes of electric stimulation each time in combination with body acupuncture for pain management. After weekly acupuncture treatment for the first two visits, the patient reported that he felt less anxious and that his sleep was getting better with fewer nightmares. After six sessions of acupuncture treatments, the patient completely

  12. Scalp Acupuncture Treatment Protocol for Anxiety Disorders: A Case Report

    PubMed Central

    Chen, Jia; Pan, Zimei; Ying, Zhou

    2014-01-01

    Anxiety disorders are among the most common psychiatric illnesses, and acupuncture treatment is widely accepted in the clinic without the side effects seen from various medications. We designed a scalp acupuncture treatment protocol by locating two new stimulation areas. The area one is between Yintang (M-HN-3) and Shangxing (DU-23) and Shenting (DU-24), and the area two is between Taiyang (M-HN-9) and Tianchong (GB-9) and Shuaigu (GB-8). By stimulating these two areas with high-frequency continuous electric waves, remarkable immediate and long-term effects for anxiety disorders have been observed in our practice. The first case was a 70-year-old male with general anxiety disorder (GAD) and panic attacks at night. The scalp acupuncture treatment protocol was applied with electric stimulation for 45 minutes once every week. After four sessions of acupuncture treatments, the patient reported that he did not have panic attacks at night and he had no feelings of anxiety during the day. Follow-up 4 weeks later confirmed that he did not have any episodes of panic attacks and he had no anxiety during the day since his last acupuncture treatment. The second case was a 35-year-old male who was diagnosed with posttraumatic stress disorder (PTSD) with a history of providing frontline trauma care as a Combat Medics from the Iraq combat field. He also had 21 broken bones and multiple concussions from his time in the battlefield. He had symptoms of severe anxiety, insomnia, nightmares with flashbacks, irritability, and bad temper. He also had chest pain, back pain, and joint pain due to injuries. The above treatment protocol was performed with 30 minutes of electric stimulation each time in combination with body acupuncture for pain management. After weekly acupuncture treatment for the first two visits, the patient reported that he felt less anxious and that his sleep was getting better with fewer nightmares. After six sessions of acupuncture treatments, the patient completely

  13. Detailed analysis of routing protocols with different network limitations

    NASA Astrophysics Data System (ADS)

    Masood, Mohsin; Abuhelala, Mohamed; Glesk, Ivan

    2016-12-01

    In network communication field, routing protocols have got a significant role which are not only used in networks to handle the user data but also to monitor the different network environments. Dynamic routing protocols such as OSPF, EIGRP and RIP are used for forwarding user data to its destination by instantly detecting the dynamic changes across the network. The dynamic changes in the network can be in the form of topological changes, congestions, links failure etc. Therefore, it becomes a challenge to develop and implement dynamic routing protocols that fulfills the network requirements. Hence, each routing protocol has its own characteristics such as convergence activity, routing metric, routing table etc. and will perform differently in various network environments. This paper presents a comprehensive study of static and dynamic routing, along with dynamic routing protocols. Experiments that are conducted under various network limitations are presented using the OPNET tool. The performance of each of dynamic routing protocols are monitored and explained in the form of simulated results using network parameters. The results are analyzed, in order to provide a clear understanding of each protocol performance for the selection of the proper protocol for a given network environment.

  14. Transceiving protocol design for a free space optical communication system

    NASA Astrophysics Data System (ADS)

    Wang, Hualong; Su, Wanxin; Xing, Zhongbao

    2008-12-01

    A new transceiving protocol is demonstrated for a Free Space Optical (FSO) communication system, and it's discussed in two parts: the transmitting protocol and the receiving protocol. During the discussion of these two parts, the cooperation of them is also discussed. Different from wired communication, an FSO system modulates the data on a narrow beam of laser transmitting through the free space or the atmosphere, and the protocol presented in this paper is mainly optimized for terrestrial Free Space Optical links, in which the signal channel of the system is mainly the atmosphere. Due to the complex composition and activity of the atmosphere, this signal channel brings in great influence on the transmitting laser in it, for example, the absorption and scattering of the atmosphere molecules and aerosols, the scintillation of received laser power caused by the turbulence of the atmosphere, all of which results in a much higher Bit Error Rate (BER) of the communication system. Thus in designing a protocol for an FSO system, more effort should be taken in the encoding of the data stream, the synchronization of the data stream, error checking and exception handling. The main function of the transmitting protocol includes interfacing the outer input data with a parallel port, buffering the input data, encoding the input data stream, serializing the parallel data and output the serialized data. It also has an output management unit to manage the activity of each part of the transmitting protocol. The main function of the receiving protocol includes filtering and synchronizing the input serial data stream, paralleling the serial data stream, decoding the input data, error checking, exception handling and interfacing the outer receiver with a parallel port. The entire transceiving protocol could be programmed into a single FPGA chip to improve system integrity and reduce the system cost. The presented protocol could be taken as "protocol transparent" for outer interfaces

  15. Protocols.io: Virtual Communities for Protocol Development and Discussion.

    PubMed

    Teytelman, Leonid; Stoliartchouk, Alexei; Kindler, Lori; Hurwitz, Bonnie L

    2016-08-01

    The detailed know-how to implement research protocols frequently remains restricted to the research group that developed the method or technology. This knowledge often exists at a level that is too detailed for inclusion in the methods section of scientific articles. Consequently, methods are not easily reproduced, leading to a loss of time and effort by other researchers. The challenge is to develop a method-centered collaborative platform to connect with fellow researchers and discover state-of-the-art knowledge. Protocols.io is an open-access platform for detailing, sharing, and discussing molecular and computational protocols that can be useful before, during, and after publication of research results.

  16. Clean Quantum and Classical Communication Protocols

    NASA Astrophysics Data System (ADS)

    Buhrman, Harry; Christandl, Matthias; Perry, Christopher; Zuiddam, Jeroen

    2016-12-01

    By how much must the communication complexity of a function increase if we demand that the parties not only correctly compute the function but also return all registers (other than the one containing the answer) to their initial states at the end of the communication protocol? Protocols that achieve this are referred to as clean and the associated cost as the clean communication complexity. Here we present clean protocols for calculating the inner product of two n -bit strings, showing that (in the absence of preshared entanglement) at most n +3 qubits or n +O (√{n }) bits of communication are required. The quantum protocol provides inspiration for obtaining the optimal method to implement distributed cnot gates in parallel while minimizing the amount of quantum communication. For more general functions, we show that nearly all Boolean functions require close to 2 n bits of classical communication to compute and close to n qubits if the parties have access to preshared entanglement. Both of these values are maximal for their respective paradigms.

  17. Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols

    PubMed Central

    Nam, Junghyun; Kim, Moonseong

    2014-01-01

    We revisit the SM2 protocol, which is widely used in Chinese commercial applications and by Chinese government agencies. Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order to assure protocol implementers of their security properties, the SM2 protocol does not have a proof of security. In this paper, we prove the security of the SM2 protocol in the widely accepted indistinguishability-based Bellare-Rogaway model under the elliptic curve discrete logarithm problem (ECDLP) assumption. We also present a simplified and more efficient version of the SM2 protocol with an accompanying security proof. PMID:25276863

  18. A Self-Stabilizing Synchronization Protocol for Arbitrary Digraphs

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.

    2011-01-01

    This paper presents a self-stabilizing distributed clock synchronization protocol in the absence of faults in the system. It is focused on the distributed clock synchronization of an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. This protocol deterministically converges within a time bound that is a linear function of the self-stabilization period. We present an outline of a deductive proof of the correctness of the protocol. A bounded model of the protocol was mechanically verified for a variety of topologies. Results of the mechanical proof of the correctness of the protocol are provided. The model checking results have verified the correctness of the protocol as they apply to the networks with unidirectional and bidirectional links. In addition, the results confirm the claims of determinism and linear convergence. As a result, we conjecture that the protocol solves the general case of this problem. We also present several variations of the protocol and discuss that this synchronization protocol is indeed an emergent system.

  19. Etude du Photochromisme et de la Photorefractivite dans le Poly

    NASA Astrophysics Data System (ADS)

    Ghailane, Fatima

    1995-11-01

    Nous avons etudie la possibilite d'utiliser un materiau organique, le poly(vinylcarbazole) comme milieu de stockage optique de masse en temps reel. Ce materiau dope aux photochromes presente un potentiel non negligeable pour l'holographie de volume en temps reel. Plusiers cycles, Ecriture-Lecture-Effacement, ont ete enregistres dans cette matrice polymerique avec une resolution assez elevee. Une etude a ete menee afin d'obtenir la valeur des parametres comme l'epaisseur du film et l'intensite d'ecriture pour un angle d'enregistrement theta_{ acute ecriture} donne qui permettent d'obtenir les meilleures efficacites diffractionelles tout en preservant ce milieu de tout effet de fatigue ou de degradation. Ce polymere devient photorefractif une fois melange avec un bon accepteur de charge, le trinitrofluorenone et un bon chromophore non-lineaire, le disperse orange 25. Nous avons etudie experimentalement la conductivite en obscurite et la photoconductivite de ce materiau. Des simulations numeriques ont ete realisees en se basant sur le modele de Poole-Frenkel. Nous avons aussi etudie l'implantation de faisceaux d'ions d'oxygene d'energie 200 keV pour inscrire dans le PVCz un guide d'onde plan a profil d'indice. Une etude ESCA complete cette partie afin de savoir les modifications induites par implementation ionique a l'interieur du film polymerique.

  20. Photographic protocol for image acquisition in craniofacial microsomia

    PubMed Central

    2011-01-01

    Craniofacial microsomia (CFM) is a congenital condition associated with orbital, mandibular, ear, nerve, and soft tissue anomalies. We present a standardized, two-dimensional, digital photographic protocol designed to capture the common craniofacial features associated with CFM. PMID:22208766

  1. Benefits of Addressing HFCs under the Montreal Protocol 2014

    EPA Pesticide Factsheets

    The United States, Canada, and Mexico together submitted a proposal in April 2015 to phase-down production and consumption of hydrofluorocarbons (HFCs) under the Montreal Protocol. This paper presents an analysis of the potential benefits of such action.

  2. Protocol independent adaptive route update for VANET.

    PubMed

    Rasheed, Asim; Ajmal, Sana; Qayyum, Amir

    2014-01-01

    High relative node velocity and high active node density have presented challenges to existing routing approaches within highly scaled ad hoc wireless networks, such as Vehicular Ad hoc Networks (VANET). Efficient routing requires finding optimum route with minimum delay, updating it on availability of a better one, and repairing it on link breakages. Current routing protocols are generally focused on finding and maintaining an efficient route, with very less emphasis on route update. Adaptive route update usually becomes impractical for dense networks due to large routing overheads. This paper presents an adaptive route update approach which can provide solution for any baseline routing protocol. The proposed adaptation eliminates the classification of reactive and proactive by categorizing them as logical conditions to find and update the route.

  3. Protocol Independent Adaptive Route Update for VANET

    PubMed Central

    Rasheed, Asim; Qayyum, Amir

    2014-01-01

    High relative node velocity and high active node density have presented challenges to existing routing approaches within highly scaled ad hoc wireless networks, such as Vehicular Ad hoc Networks (VANET). Efficient routing requires finding optimum route with minimum delay, updating it on availability of a better one, and repairing it on link breakages. Current routing protocols are generally focused on finding and maintaining an efficient route, with very less emphasis on route update. Adaptive route update usually becomes impractical for dense networks due to large routing overheads. This paper presents an adaptive route update approach which can provide solution for any baseline routing protocol. The proposed adaptation eliminates the classification of reactive and proactive by categorizing them as logical conditions to find and update the route. PMID:24723807

  4. Packet-Based Protocol Efficiency for Aeronautical and Satellite Communications

    NASA Technical Reports Server (NTRS)

    Carek, David A.

    2005-01-01

    This paper examines the relation between bit error ratios and the effective link efficiency when transporting data with a packet-based protocol. Relations are developed to quantify the impact of a protocol s packet size and header size relative to the bit error ratio of the underlying link. These relations are examined in the context of radio transmissions that exhibit variable error conditions, such as those used in satellite, aeronautical, and other wireless networks. A comparison of two packet sizing methodologies is presented. From these relations, the true ability of a link to deliver user data, or information, is determined. Relations are developed to calculate the optimal protocol packet size forgiven link error characteristics. These relations could be useful in future research for developing an adaptive protocol layer. They can also be used for sizing protocols in the design of static links, where bit error ratios have small variability.

  5. A Secured Authentication Protocol for SIP Using Elliptic Curves Cryptography

    NASA Astrophysics Data System (ADS)

    Chen, Tien-Ho; Yeh, Hsiu-Lien; Liu, Pin-Chuan; Hsiang, Han-Chen; Shih, Wei-Kuan

    Session initiation protocol (SIP) is a technology regularly performed in Internet Telephony, and Hyper Text Transport Protocol (HTTP) as digest authentication is one of the major methods for SIP authentication mechanism. In 2005, Yang et al. pointed out that HTTP could not resist server spoofing attack and off-line guessing attack and proposed a secret authentication with Diffie-Hellman concept. In 2009, Tsai proposed a nonce based authentication protocol for SIP. In this paper, we demonstrate that their protocol could not resist the password guessing attack and insider attack. Furthermore, we propose an ECC-based authentication mechanism to solve their issues and present security analysis of our protocol to show that ours is suitable for applications with higher security requirement.

  6. DU-AGG pilot plant design study

    SciTech Connect

    Lessing, P.A.; Gillman, H.

    1996-07-01

    The Idaho National Engineering Laboratory (INEL) is developing new methods to produce high-density aggregate (artificial rock) primarily consisting of depleted uranium oxide. The objective is to develop a low-cost method whereby uranium oxide powder (UO[sub 2], U[sub 3]O[sub ]8, or UO[sub 3]) can be processed to produce high-density aggregate pieces (DU-AGG) having physical properties suitable for disposal in low-level radioactive disposal facilities or for use as a component of high-density concrete used as shielding for radioactive materials. A commercial company, G-M Systems, conducted a design study for a manufacturing pilot plant to process DU-AGG. The results of that study are included and summarized in this report. Also explained are design considerations, equipment capacities, the equipment list, system operation, layout of equipment in the plant, cost estimates, and the proposed plan and schedule.

  7. D-RATS 2011: RAFT Protocol Overview

    NASA Technical Reports Server (NTRS)

    Utz, Hans

    2011-01-01

    A brief overview presentation on the protocol used during the D-RATS2011 field test for file transfer from the field-test robots at Black Point Lava Flow AZ to Johnson Space Center, Houston TX over a simulated time-delay. The file transfer actually uses a commercial implementation of an open communications standard. The focus of the work lies on how to make the state of the distributed system observable.

  8. Instability Free Routing: Beyond One Protocol Instance

    DTIC Science & Technology

    2008-12-01

    assigned a Rout- ing Information Base (RIB) [13]. This database is used to store the routing information related to the routing process (e.g., routes...presents routing anomalies that can derive from route selection by itself, i.e., without any route redis - tribution configured between the routing... redis - tributed into the RIP protocol, all RIP messages received from the neighbors are in fact discarded independently of the AD values. This

  9. Hydrogen Hazards Assessment Protocol (HHAP): Approach and Methodology

    NASA Technical Reports Server (NTRS)

    Woods, Stephen

    2009-01-01

    This viewgraph presentation reviews the approach and methodology to develop a assessment protocol for hydrogen hazards. Included in the presentation are the reasons to perform hazards assessment, the types of hazard assessments that exist, an analysis of hydrogen hazards, specific information about the Hydrogen Hazards Assessment Protocol (HHAP). The assessment is specifically tailored for hydrogen behavior. The end product of the assesment is a compilation of hazard, mitigations and associated factors to facilitate decision making and achieve the best practice.

  10. EPA Protocol Gas Verification Program

    EPA Science Inventory

    Accurate compressed gas calibration standards are needed to calibrate continuous emission monitors (CEMs) and ambient air quality monitors that are being used for regulatory purposes. US Environmental Protection Agency (EPA) established its traceability protocol to ensure that co...

  11. A Token Ring Protocol for Dynamic Ad-hoc Wireless Environments

    SciTech Connect

    Top, P; Kohlhepp, V; Dowla, F

    2005-09-30

    A wireless ad-hoc networking protocol is presented. The protocol is designed to be flexible, easy to use and adaptable to a wide variety of potential applications. The primary considerations in design are small code size, guaranteed bandwidth access, limited delay, and error resilience in a highly dynamic ad-hoc environment. These considerations are achieved through the use of token ring protocol.

  12. The Evaluation of Rekeying Protocols Within the Hubenko Architecture as Applied to Wireless Sensor Networks

    DTIC Science & Technology

    2009-03-01

    Group Management Protocol ( IGMP )........................................................19 2.6 Gothic Group Membership Authentication...applications. Section 2.4 presents multicasting. Section 2.5 covers the Internet Group Management Protocol ( IGMP ), and Section 2.6 discusses the group...Communication 2.5 Internet Group Management Protocol ( IGMP ) The basic building block of multicasting is IGMP [Ste94]. IGMP -capable routers provide

  13. A Public-Key Based Authentication and Key Establishment Protocol Coupled with a Client Puzzle.

    ERIC Educational Resources Information Center

    Lee, M. C.; Fung, Chun-Kan

    2003-01-01

    Discusses network denial-of-service attacks which have become a security threat to the Internet community and suggests the need for reliable authentication protocols in client-server applications. Presents a public-key based authentication and key establishment protocol coupled with a client puzzle protocol and validates it through formal logic…

  14. ABM clinical protocol #20: Engorgement.

    PubMed

    Berens, Pam

    2009-06-01

    A central goal of The Academy of Breastfeeding Medicine is the development of clinical protocols for managing common medical problems that may impact breastfeeding success. These protocols serve only as guidelines for the care of breastfeeding mothers and infants and do not delineate an exclusive course of treatment or serve as standards of medical care. Variations in treatment may be appropriate according to the needs of an individual patient.

  15. Langerhans cell histiocytosis presenting as hypothyroid goitre: a unique presentation.

    PubMed

    Marupudi, Krishna Chaitanya; Karanth, Suman S; Thomas, Joseph

    2014-12-02

    Langerhans cell histiocytosis (LCH) is a disease involving the antigen presenting cells, which can range from a single system involvement with an indolent course to a multisystem disease with increased morbidity. We present a rare case of LCH presenting as hypothyroid goitre that was successfully treated as per the LCH III trial protocol with a combination of vinblastine and oral prednisolone. We highlight the need for awareness of this rare presentation of LCH as a painless goitre which is often misdiagnosed as poorly differentiated thyroid carcinoma or overlooked as a benign disease.

  16. Treatment Protocols as Hierarchical Structures

    PubMed Central

    Ben-Bassat, Moshe; Carlson, Richard W.; Puri, Vinod K.; Weil, Max Harry

    1978-01-01

    We view a treatment protocol as a hierarchical structure of therapeutic modules. The lowest level of this structure consists of individual therapeutic actions. Combinations of individual actions define higher level modules, which we call routines. Routines are designed to manage limited clinical problems, such as the routine for fluid loading to correct hypovolemia. Combinations of routines and additional actions, together with comments, questions, or precautions organized in a branching logic, in turn, define the treatment protocol for a given disorder. Adoption of this modular approach may facilitate the formulation of treatment protocols, since the physician is not required to prepare complex flowcharts. This hierarchical approach also allows protocols to be updated and modified in a flexible manner. By use of such a standard format, individual components may be fitted together to create protocols for multiple disorders. The technique is suited for computer implementation. We believe that this hierarchical approach may facilitate standarization of patient care as well as aid in clinical teaching. A protocol for acute pancreatitis is used to illustrate this technique.

  17. Influence du traitement thermique sur l'usinabilite du laiton monophase

    NASA Astrophysics Data System (ADS)

    Cholley, Airy

    La connaissance des proprietes et du comportement d'un materiau en usinage est primordiale pour optimiser son utilisation et obtenir une usinabilite maximale. Dans ce but, l'etude de la modification de la ductilite par traitement thermiques sur plusieurs criteres d'usinabilite tels que les efforts de coupe, la rugosite, les bavures et la formation du copeau a ete menee sur le laiton monophase. A cette fin, l'influence du traitement thermique sur la microstructure du laiton a d'abord ete etudiee. La taille des grains et la durete ont permis de determiner les proprietes mecaniques des etats metallurgiques. Des essais de percage ont ensuite ete effectues sur les etats metallurgiques H01 (99HV), OS100 (88HV) et OS250 (47HV) pour regarder l'influence du traitement thermique sur l'usinabilite. Cette etude experimentale a permis de comprendre l'influence du taux de laminage et de la temperature de recuit sur les proprietes mecaniques. Les essais d'usinabilite ont ensuite permis de prouver que les efforts de coupe sont dependants des conditions de coupe mais pas de la ductilite dans les etats metallurgiques testes. La taille des bavures augmente avec la ductilite et la vitesse de coupe, et diminue avec l'avance. La rugosite de la surface des trous apres l'usinage a egalement ete etudiee. Il a aussi ete prouve par une etude sur les copeaux que la temperature croit avec la vitesse de coupe. L'analyse de la segmentation des copeaux n'a en revanche pas permis de trouver une correlation significative avec les traitements thermiques testes. Enfin, le revetement de l'outil a montre une grande importance sur l'usinabilite du materiau. Il a ete conclu que l'usinabilite du laiton C26000 (CuZn30) est meilleure lorsqu'on travaille dans un etat metallurgique dur. Ces conclusions sont valables pour le laiton monophase etudie, il serait interessant d'examiner aussi le cas des laitons biphases.

  18. Up-regulating of RASD1 and apoptosis of DU-145 human prostate cancer cells induced by formononetin in vitro.

    PubMed

    Liu, Xiao-Jia; Li, Yun-Qian; Chen, Qiu-Yue; Xiao, Sheng-Jun; Zeng, Si-En

    2014-01-01

    Prostate cancer is one of the most prevalent malignant cancers in men. The isoflavone formononetin is a main active component of red clover plants. In the present study, we assessed the effect of formononetin on human prostate cancer DU-145 cells in vitro, and elucidated possible mechanisms. DU-145 cells were treated with different concentrations of formononetin and cell proliferation was assessed by MTT assay, cell apoptosis by Hoechst 33258 and flow cytometry, and protein levels of RASD1, Bcl-2 and Bax by Western blotting. The results showed that formononetin inhibited the proliferation of DU-145 cells in a dose-dependent manner. DU-145 cells treated with different concentrations of formononetin displayed obvious morphological changes of apoptosis under fluorescence microscopy. In addition, formononetin increased the proportion of early apoptotic DU-145 cells, down-regulated the protein levels of Bcl-2 and up-regulated those of RASD1 and Bax. The level of RASD1 reached its maximum at 48 h post-treatment, and rapidly decreased thereafter. Together, we present evidence that formononetin triggered cell apoptosis through the mitochondrial apoptotic pathway by up-regulating RASD1.

  19. Approximation techniques of a selective ARQ protocol

    NASA Astrophysics Data System (ADS)

    Kim, B. G.

    Approximations to the performance of selective automatic repeat request (ARQ) protocol with lengthy acknowledgement delays are presented. The discussion is limited to packet-switched communication systems in a single-hop environment such as found with satellite systems. It is noted that retransmission of errors after ARQ is a common situation. ARQ techniques, e.g., stop-and-wait and continuous, are outlined. A simplified queueing analysis of the selective ARQ protocol shows that exact solutions with long delays are not feasible. Two approximation models are formulated, based on known exact behavior of a system with short delays. The buffer size requirements at both ends of a communication channel are cited as significant factor for accurate analysis, and further examinations of buffer overflow and buffer lock-out probability and avoidance are recommended.

  20. An XML-based protocol for distributed event services

    SciTech Connect

    Gunter, Dan K.; Smith, Warren; Quesnel, Darcy

    2001-06-25

    A recent trend in distributed computing is the construction of high-performance distributed systems called computational grids. One difficulty we have encountered is that there is no standard format for the representation of performance information and no standard protocol for transmitting this information. This limits the types of performance analysis that can be undertaken in complex distributed systems. To address this problem, we present an XML-based protocol for transmitting performance events in distributed systems and evaluate the performance of this protocol.

  1. Protocol for secure quantum machine learning at a distant place

    NASA Astrophysics Data System (ADS)

    Bang, Jeongho; Lee, Seung-Woo; Jeong, Hyunseok

    2015-10-01

    The application of machine learning to quantum information processing has recently attracted keen interest, particularly for the optimization of control parameters in quantum tasks without any pre-programmed knowledge. By adapting the machine learning technique, we present a novel protocol in which an arbitrarily initialized device at a learner's location is taught by a provider located at a distant place. The protocol is designed such that any external learner who attempts to participate in or disrupt the learning process can be prohibited or noticed. We numerically demonstrate that our protocol works faithfully for single-qubit operation devices. A trade-off between the inaccuracy and the learning time is also analyzed.

  2. An XML-Based Protocol for Distributed Event Services

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    A recent trend in distributed computing is the construction of high-performance distributed systems called computational grids. One difficulty we have encountered is that there is no standard format for the representation of performance information and no standard protocol for transmitting this information. This limits the types of performance analysis that can be undertaken in complex distributed systems. To address this problem, we present an XML-based protocol for transmitting performance events in distributed systems and evaluate the performance of this protocol.

  3. Mesure de haute resolution de la fonction de distribution radiale du silicium amorphe pur

    NASA Astrophysics Data System (ADS)

    Laaziri, Khalid

    1999-11-01

    Cette these porte sur l'etude de la structure du silicium amorphe prepare par irradiation ionique. Elle presente des mesures de diffraction de rayons X sur de la poudre de silicium cristallin, du silicium amorphe relaxe et non relaxe, ainsi que tous les developpements mathematiques et physiques necessaires pour extraire la fonction de distribution radiale correspondant a chaque echantillon. Au Chapitre I, nous presentons une methode de fabrication de membranes minces de silicium amorphe pur. Il y a deux etapes majeures lors du processus de fabrication: l'implantation ionique, afin de creer une couche amorphe de plusieurs microns et l'attaque chimique, pour enlever le reste du materiau cristallin. Nous avons caracterise premierement les membranes de silicium amorphe par spectroscopie Raman pour verifier qu'il ne reste plus de trace de materiau cristallin dans les films amorphes. Une deuxieme caracterisation par detection de recul elastique (ERD-TOF) sur ces memes membranes a montre qu'il y a moins de 0.1% atomique de contaminants tels que l'oxygene, le carbone, et l'hydrogene. Au Chapitre II, nous proposons une nouvelle methode de correction de la contribution inelastique "Compton" des spectres de diffusion totale afin d'extraire les pics de diffusion elastique, responsable de la diffraction de Bragg. L'article presente tout d'abord une description simplifiee d'une theorie sur la diffusion inelastique dite "Impulse Approximation" (IA) qui permet de calculer des profils de Compton en fonction de l'energie et de l'angle de diffusion 2theta. Ces profils sont utilises comme fonction de lissage de la diffusion Compton experimentale. Pour lisser les pics de diffusion elastique, nous avons utilise une fonction pic de nature asymetrique. Aux Chapitre III, nous exposons de maniere detaillee les resultats des experiences de diffraction de rayons X sur les membranes de silicium amorphe et la poudre de silicium cristallin que nous avons preparees. Nous abordons aussi les

  4. Protocols.io: Virtual Communities for Protocol Development and Discussion

    PubMed Central

    Stoliartchouk, Alexei; Kindler, Lori; Hurwitz, Bonnie L.

    2016-01-01

    The detailed know-how to implement research protocols frequently remains restricted to the research group that developed the method or technology. This knowledge often exists at a level that is too detailed for inclusion in the methods section of scientific articles. Consequently, methods are not easily reproduced, leading to a loss of time and effort by other researchers. The challenge is to develop a method-centered collaborative platform to connect with fellow researchers and discover state-of-the-art knowledge. Protocols.io is an open-access platform for detailing, sharing, and discussing molecular and computational protocols that can be useful before, during, and after publication of research results. PMID:27547938

  5. Past tense morphology in Cri du chat syndrome: experimental evidence.

    PubMed

    Wium, Kristin; Kristoffersen, Kristian Emil

    2008-01-01

    It has been observed that persons with Cri du chat syndrome (CDCS) have poor language production. However, very few studies have addressed the question whether all aspects of language production are equally afflicted, or whether there are differences between for instance phonological and morphological abilities. The present study was aimed at investigating to what extent persons with CDCS inflect verbs, and, if so, which inflectional patterns in the target language they make use of, and further what kinds of inflectional errors they make. We compared the performance of three subjects (aged 11, 15 and 22) with CDCS on a past tense elicitation task. We found that all three subjects inflected verbs. The number of correct responses, however, varied from 28% to 53%. The majority of errors were over-generalizations, imitation of input, no response and substitution by semantically related verbs.

  6. Ocular findings in a newborn with cri du chat syndrome.

    PubMed

    Schechter, R J

    1978-03-01

    A deletion of the short arm of chromosome No. 5 has been termed the cri du chat (cat cry) syndrome. We report the first ophthalmologic examination of a newborn infant with this syndrome. Multiple ophthalmic abnormalities were found, including hypertelorism, telecanthus, epicanthal folds, antimongoloid palpebral fissures, exotropia, optic atrophy, and tortuosity of the retinal vasculature. It is of interest that these changes are congenital and present at birth, rather than developmental. Although such individuals are usually so severely mentally retarded that no ophthalmologic intervention is indicated, there are rare exceptions, and each case must be judged individually. Ten percent to 15% of these children inherit the chromosomal abnormality from phenotypically normal parents. Chromosomes from each parent should therefore be evaluated for the purposes of genetic counseling.

  7. Neurological abnormalities in the `cri-du-chat' syndrome 1

    PubMed Central

    Colover, Jack; Lucas, Mary; Comley, J. A.; Roe, A. M.

    1972-01-01

    An unusual case of the cri-du-chat syndrome is described in a 6½ year old boy, who, as well as attacks of stridor and choking, showed disorders of spatial perception and cerebellar signs in the form of nystagmus, clumsiness of the hands, and ataxia. Pyramidal signs were also present. He was only mildly retarded mentally. Psychological testing showed that he had a severe deficit for number processing, and also constructional apraxia. Surprisingly, his vocabulary was quite good, as was his reading capacity. Chromosome analysis showed a very small deletion of the short arm of the group B chromosome. In infancy this diagnosis may be suspected because of the high-pitched cry and attacks of stridor and choking. In late childhood, when the signs may be only of a neurological disorder, its recognition may be difficult without confirmation from chromosome studies. The neurological features of this disease are reviewed. Images PMID:5084140

  8. A complete classification of quantum public-key encryption protocols

    NASA Astrophysics Data System (ADS)

    Wu, Chenmiao; Yang, Li

    2015-10-01

    We present a classification of quantum public-key encryption protocols. There are six elements in quantum public-key encryption: plaintext, ciphertext, public-key, private-key, encryption algorithm and decryption algorithm. According to the property of each element which is either quantum or classical, the quantum public-key encryption protocols can be divided into 64 kinds. Among 64 kinds of protocols, 8 kinds have already been constructed, 52 kinds can be proved to be impossible to construct and the remaining 4 kinds have not been presented effectively yet. This indicates that the research on quantum public-key encryption protocol should be focus on the existed kinds and the unproposed kinds.

  9. Protocol Handbook - A Guide for the Base Protocol Officer

    DTIC Science & Technology

    1986-04-01

    rotighou I lIme 1.1 ni eml Slates Cioi mm dale of den iii lilt ough press , dent a ml its Ic rri tories and possess ions: U mit- ind io, television, r oil...At an official f unction, thc protocol of fjce:- or aide stands nearest the door and a little to the sine or rhe uln-, and anounces the names of the...Pennsylvania: The Stackpole Company, 1959. 8. Wood, John R. and Serres, Jean. Diplomatic Ceremonial and Protocol. New York: Columbia University Press

  10. La reconstruction du sourcil par greffon composite du cuir chevelu: une astuce pour faciliter la technique

    PubMed Central

    El Omari, Mounia; El Mazouz, Samir; Gharib, Noureddine; EL Abbassi, Abdallah

    2015-01-01

    Les sourcils jouent un rôle important dans l’équilibre esthétique du visage. Leur reconstruction ou ophriopoïése, après séquelle de brûlure fait partie intégrante du programme de réhabilitation de la face brûlée. Plusieurs techniques ont été décrites. Nous insistons ici sur l'intérêt d'une technique simple, à la portée de tous les chirurgiens, et dont la méthode et les résultats peuvent être améliorés par un dessin bien planifié des zones donneuse et receveuse: la greffe composite prélevée au niveau du cuir chevelu dessinée à l'aide d'un calque du sourcil controlatéral. PMID:26401195

  11. Formal Specification and Analysis of a Wireless Media Access Protocol.

    DTIC Science & Technology

    1995-09-01

    MACAW for Multiple Access Collision Avoidance Wireless, was described in ACM SIGCOMM Proceedings 94 Vol. 24 #4. The approach taken was to use the formal...specification of MACAW as originally proposed and a refined specification which provides an unambiguous understanding of the protocol. The analysis...determined that the protocol is free of deadlock. Also presented are three new transitions between MACAW states, which were suggested by the analysis.

  12. Suivi après le traitement du cancer du sein

    PubMed Central

    Sisler, Jeffrey; Chaput, Geneviève; Sussman, Jonathan; Ozokwelu, Emmanuel

    2016-01-01

    Résumé Objectif Offrir aux médecins de famille un résumé des recommandations fondées sur les données probantes pour guider les soins aux survivantes traitées pour le cancer du sein. Qualité des données Une recherche documentaire a été effectuée dans MEDLINE entre 2000 et 2016 à l’aide des mots-clés anglais suivants : breast cancer, survivorship, follow-up care, aftercare, guidelines et survivorship care plans, en se concentrant sur la revue des lignes directrices publiées récemment par les organismes nationaux de cancérologie. Les données étaient de niveaux I à III. Message principal Les soins aux survivantes comportent 4 facettes : surveillance et dépistage, prise en charge des effets à long terme, promotion de la santé et coordination des soins. La surveillance des récidives ne se traduit que par une mammographie annuelle, et le dépistage d’autres cancers doit suivre les lignes directrices basées sur la population. La prise en charge des effets à long terme du cancer et de son traitement aborde des problèmes courants tels la douleur, la fatigue, le lymphœdème, la détresse et les effets indésirables des médicaments, de même que les préoccupations à long terme comme la santé du cœur et des os. La promotion de la santé met en relief les bienfaits de l’activité chez les survivantes du cancer, avec l’accent mis sur l’activité physique. Les soins aux survivantes sont de meilleure qualité lorsque divers services et professionnels de la santé participent aux soins, et le médecin de famille joue un rôle important dans la coordination des soins. Conclusion Les médecins de famille sont de plus en plus souvent les principaux fournisseurs de soins de suivi après le traitement du cancer du sein. Le cancer du sein doit être considéré comme une affection médicale chronique, même chez les femmes en rémission, et les patientes profitent de la même approche que celle utilisée pour les autres affections chroniques en

  13. [The prevention of voice disorders in the actor: protocol and follow-up nine months of professional theater].

    PubMed

    Ormezzano, Y; Delale, A; Lamy-Simonian, A

    2011-01-01

    In July 2009, at the beginning of this work, 26 theses addressing professional principles of voice were listed in the database of SUDOC (Système Universitaire de Documentation): 9 related to voices of teachers (about 900,000* professionals in France), 14 theses relating to singers (7500** professionals), and only 3 about the voice of actors (20 000*** professional actors in France in 2006). The latter pertaining to concerning rookie actors (sensibilisation vocale auprès du comédien débutant Bichet, Linda, Bordeaux II, 2006), the mechanical larynx (étude des mécanismes laryngés dans la voix projetée: cas particulier des comédiennes Guerin, Mélanie, Paris VI, 2009), vocal fatigue (Fatigue vocale après une tâche d'utilisation prolongée de la voix chez le comédien Canaan Baggioni, Brigitte, Aix-Marseille II, 2009). Professional actors are plentiful; their training in vocal technique is very heterogeneous, or non-existent: it is not a prerequisite to have a degree to work as an actor! This lack of vocal technique is associated with risk factors specific to the acting profession: numerous travels in air-conditioned vehicles, unsuitable workplaces; dusty or poorly heated, irregular working patterns, excessive demands from directors... All this makes the actors highly susceptible to voice disorders. The protocol for the prevention of voice disorders presented here is holistic and ecological. This work also examines the effectiveness of such a preventive protocol aimed at theatre comedians.

  14. Apples to apples: the origin and magnitude of differences in asbestos cancer risk estimates derived using varying protocols.

    PubMed

    Berman, D Wayne

    2011-08-01

    Given that new protocols for assessing asbestos-related cancer risk have recently been published, questions arise concerning how they compare to the "IRIS" protocol currently used by regulators. The newest protocols incorporate findings from 20 additional years of literature. Thus, differences between the IRIS and newer Berman and Crump protocols are examined to evaluate whether these protocols can be reconciled. Risks estimated by applying these protocols to real exposure data from both laboratory and field studies are also compared to assess the relative health protectiveness of each protocol. The reliability of risks estimated using the two protocols are compared by evaluating the degree with which each potentially reproduces the known epidemiology study risks. Results indicate that the IRIS and Berman and Crump protocols can be reconciled; while environment-specific variation within fiber type is apparently due primarily to size effects (not addressed by IRIS), the 10-fold (average) difference between amphibole asbestos risks estimated using each protocol is attributable to an arbitrary selection of the lowest of available mesothelioma potency factors in the IRIS protocol. Thus, the IRIS protocol may substantially underestimate risk when exposure is primarily to amphibole asbestos. Moreover, while the Berman and Crump protocol is more reliable than the IRIS protocol overall (especially for predicting amphibole risk), evidence is presented suggesting a new fiber-size-related adjustment to the Berman and Crump protocol may ultimately succeed in reconciling the entire epidemiology database. However, additional data need to be developed before the performance of the adjusted protocol can be fully validated.

  15. Prenatal diagnosis of cri du chat syndrome with encephalocele.

    PubMed

    Bakkum, Jamie N; Watson, William J; Johansen, Keith L; Brost, Brian C

    2005-10-01

    A 19-year-old primigravida was found to have an encephalocele on screening ultrasound study. Amniocentesis indicated cri du chat syndrome, 5p-. Although cri du chat syndrome has been noted in association with central nervous system malformations, encephalocele is a rare finding in this syndrome.

  16. 33 CFR 117.443 - Du Large Bayou.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Du Large Bayou. 117.443 Section 117.443 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY BRIDGES DRAWBRIDGE OPERATION REGULATIONS Specific Requirements Louisiana § 117.443 Du Large Bayou. The draw of...

  17. 33 CFR 117.443 - Du Large Bayou.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Du Large Bayou. 117.443 Section 117.443 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY BRIDGES DRAWBRIDGE OPERATION REGULATIONS Specific Requirements Louisiana § 117.443 Du Large Bayou. The draw of...

  18. 33 CFR 117.443 - Du Large Bayou.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Du Large Bayou. 117.443 Section 117.443 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY BRIDGES DRAWBRIDGE OPERATION REGULATIONS Specific Requirements Louisiana § 117.443 Du Large Bayou. The draw of...

  19. 33 CFR 117.443 - Du Large Bayou.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Du Large Bayou. 117.443 Section 117.443 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY BRIDGES DRAWBRIDGE OPERATION REGULATIONS Specific Requirements Louisiana § 117.443 Du Large Bayou. The draw of...

  20. 33 CFR 117.443 - Du Large Bayou.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Du Large Bayou. 117.443 Section 117.443 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY BRIDGES DRAWBRIDGE OPERATION REGULATIONS Specific Requirements Louisiana § 117.443 Du Large Bayou. The draw of...

  1. Compositional mining of multiple object API protocols through state abstraction.

    PubMed

    Dai, Ziying; Mao, Xiaoguang; Lei, Yan; Qi, Yuhua; Wang, Rui; Gu, Bin

    2013-01-01

    API protocols specify correct sequences of method invocations. Despite their usefulness, API protocols are often unavailable in practice because writing them is cumbersome and error prone. Multiple object API protocols are more expressive than single object API protocols. However, the huge number of objects of typical object-oriented programs poses a major challenge to the automatic mining of multiple object API protocols: besides maintaining scalability, it is important to capture various object interactions. Current approaches utilize various heuristics to focus on small sets of methods. In this paper, we present a general, scalable, multiple object API protocols mining approach that can capture all object interactions. Our approach uses abstract field values to label object states during the mining process. We first mine single object typestates as finite state automata whose transitions are annotated with states of interacting objects before and after the execution of the corresponding method and then construct multiple object API protocols by composing these annotated single object typestates. We implement our approach for Java and evaluate it through a series of experiments.

  2. Compositional Mining of Multiple Object API Protocols through State Abstraction

    PubMed Central

    Mao, Xiaoguang; Qi, Yuhua; Wang, Rui; Gu, Bin

    2013-01-01

    API protocols specify correct sequences of method invocations. Despite their usefulness, API protocols are often unavailable in practice because writing them is cumbersome and error prone. Multiple object API protocols are more expressive than single object API protocols. However, the huge number of objects of typical object-oriented programs poses a major challenge to the automatic mining of multiple object API protocols: besides maintaining scalability, it is important to capture various object interactions. Current approaches utilize various heuristics to focus on small sets of methods. In this paper, we present a general, scalable, multiple object API protocols mining approach that can capture all object interactions. Our approach uses abstract field values to label object states during the mining process. We first mine single object typestates as finite state automata whose transitions are annotated with states of interacting objects before and after the execution of the corresponding method and then construct multiple object API protocols by composing these annotated single object typestates. We implement our approach for Java and evaluate it through a series of experiments. PMID:23844378

  3. Mars Sample Handling Protocol Workshop Series: Workshop 4

    NASA Technical Reports Server (NTRS)

    Race Margaret S. (Editor); DeVincenzi, Donald L. (Editor); Rummel, John D. (Editor); Acevedo, Sara E. (Editor)

    2001-01-01

    In preparation for missions to Mars that will involve the return of samples to Earth, it will be necessary to prepare for the receiving, handling, testing, distributing, and archiving of martian materials here on Earth. Previous groups and committees have studied selected aspects of sample return activities, but specific detailed protocols for the handling and testing of returned samples must still be developed. To further refine the requirements for sample hazard testing and to develop the criteria for subsequent release of sample materials from quarantine, the NASA Planetary Protection Officer convened a series of workshops in 2000-2001. The overall objective of the Workshop Series was to produce a Draft Protocol by which returned martian sample materials can be assessed for biological hazards and examined for evidence of life (extant or extinct) while safeguarding the purity of the samples from possible terrestrial contamination. This report also provides a record of the proceedings of Workshop 4, the final Workshop of the Series, which was held in Arlington, Virginia, June 5-7, 2001. During Workshop 4, the sub-groups were provided with a draft of the protocol compiled in May 2001 from the work done at prior Workshops in the Series. Then eight sub-groups were formed to discuss the following assigned topics: Review and Assess the Draft Protocol for Physical/Chemical Testing Review and Assess the Draft Protocol for Life Detection Testing Review and Assess the Draft Protocol for Biohazard Testing Environmental and Health/Monitoring and Safety Issues Requirements of the Draft Protocol for Facilities and Equipment Contingency Planning for Different Outcomes of the Draft Protocol Personnel Management Considerations in Implementation of the Draft Protocol Draft Protocol Implementation Process and Update Concepts This report provides the first complete presentation of the Draft Protocol for Mars Sample Handling to meet planetary protection needs. This Draft Protocol

  4. Lightweight Distance Bounding Protocol against Relay Attacks

    NASA Astrophysics Data System (ADS)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  5. Oncoplastie avec conservation mammaire dans le traitement du cancer du sein: à propos de 16 cas

    PubMed Central

    Bouzoubaa, Wail; Laadioui, Meryam; Jayi, Sofia; Alaoui, Fatime Zahra Fdili; Bouguern, Hakima; Chaara, Hikmat; Melhouf, Moulay Abdelilah

    2015-01-01

    Le cancer du sein est actuellement le cancer le plus fréquent chez la femme, et pose un véritable problème diagnostique et thérapeutique. Le dépistage des lésions à un stade de plus en plus précoce, a permis une extension des indications du traitement conservateur radiochirurgical, qui était initialement limitées aux tumeurs de moins de 3 cm, unifocales, non inflammatoires. Par ailleurs, l'utilisation de traitements préopératoires permet d’étendre les indications du traitement conservateur à des tumeurs plus volumineuses. Parallèlement à cette extension des indications de conservation mammaire, on a observé le développement de nouvelles approches thérapeutiques notamment la chirurgie oncoplastique, technique du ganglion sentinelle et chirurgie stéréotaxique, dont les résultats initiaux sont très encouragent. A travers cette étude réalisée dans le service de gynécologie et obstétrique II du CHU HASSAN II de FES au MAROC, après l'analyse rétrospective de 16 patientes traitées par traitement conservateur et oncoplastie, nous avons voulus montrer notre aptitude a réalisé ses techniques chirurgicales et a bien prendre en charge ces patientes, mais aussi évaluer ces techniques en termes de résultat carcinologique et de résultat esthétique, aussi en terme de survie globale, survie sans métastase et en termes de récidive locale entre les plasties mammaires et les traitements usuels: mastectomie et traitement conservateur classique. PMID:26430477

  6. A Simple XML Producer-Consumer Protocol

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy

    2000-01-01

    This document describes a simple XML-based protocol that can be used for producers of events to communicate with consumers of events. The protocol described here is not meant to be the most efficient protocol, the most logical protocol, or the best protocol in any way. This protocol was defined quickly and it's intent is to give us a reasonable protocol that we can implement relatively easily and then use to gain experience in distributed event services. This experience will help us evaluate proposals for event representations, XML-based encoding of information, and communication protocols. The next section of this document describes how we represent events in this protocol and then defines the two events that we choose to use for our initial experiments. These definitions are made by example so that they are informal and easy to understand. The following section then proceeds to define the producer-consumer protocol we have agreed upon for our initial experiments.

  7. The Groningen Protocol - the Jewish perspective.

    PubMed

    Gesundheit, Benjamin; Steinberg, Avraham; Blazer, Shraga; Jotkowitz, Alan

    2009-01-01

    Despite significant advances in neonatology, there will always be newborns with serious life-threatening conditions creating most difficult bioethical dilemmas. Active euthanasia for adult patients is one of the most controversial bioethical questions; for severely ill neonates, the issue is even more complex, due to their inability to take part in any decision concerning their future. The Groningen Protocol introduced in 2005 by P.J. Sauer proposes criteria allowing active euthanasia for severely ill, not necessarily terminal, newborns with incurable conditions and poor quality of life in order to spare them unbearable suffering. We discuss the ethical dilemma and ideological foundations of the protocol, the opinions of its defenders and critics, and the dangers involved. The Jewish perspective relating to the subject is presented based on classical Jewish sources, which we trust may enrich modern bioethical debates. In Jewish law, the fetus acquires full legal status only after birth. However, while the lives of terminally ill neonates must in no way be actively destroyed or shortened, there is no obligation to make extraordinary efforts to prolong their lives. Accurate preimplantation or prenatal diagnosis might significantly reduce the incidence of nonviable births, but active killing of infants violates the basic foundations of Jewish law, and opens the 'slippery slope' for uncontrolled abuse. Therefore, we call upon the international medical and bioethical community to reject the Groningen Protocol that permits euthanization and to develop ethical guidelines for the optimal care of severely compromised neonates.

  8. Analysis of Security Protocols for Mobile Healthcare.

    PubMed

    Wazid, Mohammad; Zeadally, Sherali; Das, Ashok Kumar; Odelu, Vanga

    2016-11-01

    Mobile Healthcare (mHealth) continues to improve because of significant improvements and the decreasing costs of Information Communication Technologies (ICTs). mHealth is a medical and public health practice, which is supported by mobile devices (for example, smartphones) and, patient monitoring devices (for example, various types of wearable sensors, etc.). An mHealth system enables healthcare experts and professionals to have ubiquitous access to a patient's health data along with providing any ongoing medical treatment at any time, any place, and from any device. It also helps the patient requiring continuous medical monitoring to stay in touch with the appropriate medical staff and healthcare experts remotely. Thus, mHealth has become a major driving force in improving the health of citizens today. First, we discuss the security requirements, issues and threats to the mHealth system. We then present a taxonomy of recently proposed security protocols for mHealth system based on features supported and possible attacks, computation cost and communication cost. Our detailed taxonomy demonstrates the strength and weaknesses of recently proposed security protocols for the mHealth system. Finally, we identify some of the challenges in the area of security protocols for mHealth systems that still need to be addressed in the future to enable cost-effective, secure and robust mHealth systems.

  9. La fin du jeûne?

    PubMed Central

    Naugler, Christopher; Sidhu, Davinder

    2014-01-01

    Résumé Objectif Présenter une mise à jour sur l’utilité clinique de ne pas être à jeun par rapport à l’être pour l’analyse des lipides dans le but d’améliorer l’observance par les patients, leur sécurité et l’évaluation clinique dans les tests du cholestérol. Qualité des données Les recommandations sont classées comme étant fondées sur des données probantes fortes, acceptables ou faibles (conflictuelles ou insuffisantes), selon les classifications adoptées par le Groupe d’étude canadien sur les soins de santé préventifs. Message principal Le dépistage de la dyslipidémie comme facteur de risque de coronaropathie et la prescription de médicaments hypolipidémiants sont des activités importantes en soins primaires. De récentes données probantes remettent en question la nécessité d’être à jeun pour la mesure des lipides. Dans des études sur la population, le cholestérol total, le cholestérol à lipoprotéines de haute densité et le cholestérol à lipoprotéines autres qu’à haute densité variaient tous d’en moyenne 2 % à jeun. Pour un dépistage de routine, la mesure du cholestérol sans être à jeun est maintenant une option de rechange raisonnable à l’analyse à jeun. Pour les patients diabétiques, l’exigence d’être à jeun peut représenter un important problème de sécurité en raison des possibilités d’hypoglycémie. Pour la surveillance des triglycérides et du cholestérol à lipoprotéines de basse densité chez les patients qui prennent des médicaments hypolipidémiants, le jeûne devient important. Conclusion Être à jeun pour la détermination routinière des niveaux lipidiques est largement inutile et il est improbable que le jeûne influence la stratification du risque clinique chez le patient, tandis que la mesure sans être à jeun pourrait améliorer l’observance par le patient et sa sécurité.

  10. Frequency Scale Factors for Some Double-Hybrid Density Functional Theory Procedures: Accurate Thermochemical Components for High-Level Composite Protocols.

    PubMed

    Chan, Bun; Radom, Leo

    2016-08-09

    In the present study, we have obtained geometries and frequency scale factors for a number of double-hybrid density functional theory (DH-DFT) procedures. We have evaluated their performance for obtaining thermochemical quantities [zero-point vibrational energies (ZPVE) and thermal corrections for 298 K enthalpies (ΔH298) and 298 K entropies (S298)] to be used within high-level composite protocols (using the W2X procedure as a probe). We find that, in comparison with the previously prescribed protocol for optimization and frequency calculations (B3-LYP/cc-pVTZ+d), the use of contemporary DH-DFT methods such as DuT-D3 and DSD-type procedures leads to a slight overall improved performance compared with B3-LYP. A major strength of this approach, however, lies in the better robustness of the DH-DFT methods in that the largest deviations are notably smaller than those for B3-LYP. In general, the specific choices of the DH-DFT procedure and the associated basis set do not drastically change the performance. Nonetheless, we find that the DSD-PBE-P86/aug'-cc-pVTZ+d combination has a very slight edge over the others that we have examined, and we recommend its general use for geometry optimization and vibrational frequency calculations, in particular within high-level composite methods such as the higher-level members of the WnX series of protocols. The scale factors determined for DSD-PBE-P86/aug'-cc-pVTZ+d are 0.9830 (ZPVE), 0.9876 (ΔH298), and 0.9923 (S298).

  11. Probability Distributions over Cryptographic Protocols

    DTIC Science & Technology

    2009-06-01

    2005-2969: SSL/TLS server implementation flaw in OpenSSL 0.9.7 and 0.9.8,” 2005. The MITRE Corporation. [8] J. A . Clark and J. L . Jacob, “Protocols are...733–736, IEEE Computer Society, 2007. [12] J. A . Clark and J. L . Jacob, “ A Survey of Authentication Protocol Literature, Version 1.0.” Unpublished...Notes in Computer Science, pp. 523–537. Heidelberg, Germany: Springer Berlin, 2007. [14] J. A . Clark and J. L . Jacob, “Searching for a solution

  12. Protocol Writing in Clinical Research

    PubMed Central

    Al-Jundi, Azzam

    2016-01-01

    Writing a research proposal is probably one of the most challenging and difficult task as research is a new area for the majority of postgraduates and new researchers. The purpose of this article is to summarize the most important steps and necessary guidelines for producing a standard research protocol. Academic and administrative success of any project is usually determined by acquiring a grant for the related field of research. Hence, the quality of a protocol is primarily required to achieve success in this scientific competition. PMID:28050522

  13. Developing protocols for obstetric emergencies.

    PubMed

    Roth, Cheryl K; Parfitt, Sheryl E; Hering, Sandra L; Dent, Sarah A

    2014-01-01

    There is potential for important steps to be missed in emergency situations, even in the presence of many health care team members. Developing a clear plan of response for common emergencies can ensure that no tasks are redundant or omitted, and can create a more controlled environment that promotes positive health outcomes. A multidisciplinary team was assembled in a large community hospital to create protocols that would help ensure optimum care and continuity of practice in cases of postpartum hemorrhage, shoulder dystocia, emergency cesarean surgical birth, eclamptic seizure and maternal code. Assignment of team roles and responsibilities led to the evolution of standardized protocols for each emergency situation.

  14. A highly reliable LAN protocol

    NASA Astrophysics Data System (ADS)

    Weaver, A. C.

    1986-10-01

    As a research project for NASA's Langley Research Center, a variation on the military standard for avionics buses was developed to increase fault tolerance. The resulting protocol, called implicit token passing (ITP), replaces an explicit token with brief 'soundoff' messages from all nodes participating on the LAN. ITP features high throughput and bounded message delay, and achieves high reliability through tolerance of failed nodes and automatic resynchronization when failed nodes are revived. The protocol is ideally suited for a bus topology and fiber optic media.

  15. FTP Extensions for Variable Protocol Specification

    NASA Technical Reports Server (NTRS)

    Allman, Mark; Ostermann, Shawn

    2000-01-01

    The specification for the File Transfer Protocol (FTP) assumes that the underlying network protocols use a 32-bit network address and a 16-bit transport address (specifically IP version 4 and TCP). With the deployment of version 6 of the Internet Protocol, network addresses will no longer be 32-bits. This paper species extensions to FTP that will allow the protocol to work over a variety of network and transport protocols.

  16. Semi-loss-tolerant strong quantum coin-flipping protocol using quantum non-demolition measurement

    NASA Astrophysics Data System (ADS)

    Yang, Qian; Ma, Jia-Jun; Guo, Fen-Zhuo; Wen, Qiao-Yan

    2014-07-01

    In this paper, we present a semi-loss-tolerant strong quantum coin-flipping (QCF) protocol with the best bias of 0.3536. Our manuscript applies quantum non-demolition measurement to quantum coin-flipping protocol. Furthermore, a single photon as a single qubit is used to avoid the difficult implementation of EPR resources. We also analyze the security of our protocol obtaining the best result among all coin-flipping protocols considering loss. A semi-loss-tolerant quantum dice rolling (QDR) protocol is first proposed, and the security of corresponding three-party QDR is analyzed to better demonstrate the security of our QCF.

  17. Cri du Chat Syndrome and Primary Ciliary Dyskinesia: A Common Genetic Cause on Chromosome 5p

    PubMed Central

    Shapiro, Adam J.; Weck, Karen E.; Chao, Kay C.; Rosenfeld, Margaret; Nygren, Anders O. H.; Knowles, Michael R.; Leigh, Margaret W.; Zariwala, Maimoona A.

    2014-01-01

    Cri du chat syndrome (CdCS) and primary ciliary dyskinesia (PCD) are rare diseases that present with frequent respiratory symptoms. PCD can be caused by hemizygous DNAH5 mutation in combination with a 5p segmental deletion attributable to CdCS on the opposite chromosome. Chronic oto-sino-pulmonary symptoms or organ laterality defects in CdCS should prompt an evaluation for PCD. PMID:25066065

  18. Cri du chat syndrome and primary ciliary dyskinesia: a common genetic cause on chromosome 5p.

    PubMed

    Shapiro, Adam J; Weck, Karen E; Chao, Kay C; Rosenfeld, Margaret; Nygren, Anders O H; Knowles, Michael R; Leigh, Margaret W; Zariwala, Maimoona A

    2014-10-01

    Cri du chat syndrome (CdCS) and primary ciliary dyskinesia (PCD) are rare diseases that present with frequent respiratory symptoms. PCD can be caused by hemizygous DNAH5 mutation in combination with a 5p segmental deletion attributable to CdCS on the opposite chromosome. Chronic oto-sino-pulmonary symptoms or organ laterality defects in CdCS should prompt an evaluation for PCD.

  19. Mesure du taux de la capture radiative du muon par l'hydrogene liquide

    NASA Astrophysics Data System (ADS)

    Jonkmans, Guy

    À basse énergie, l'interaction faible entre leptons et quarks est décrite par une interaction de la forme courant × courant de type V - A. La présence de l'interaction forte induit des couplages additionnels qui doivent être déterminés expérimentalement. De ceux-ci, le couplage pseudoscalaire induit, gp , est mesuré avec la plus grande incertitude et fait l'objet de la présente recherche. L'hypothèse du Courant Axial Partiellement Conservé (CAPC) et l'usage de la relation de Goldberger-Treiman relie gp au couplage axial ga . Cette relation a été vérifiée traditionnellement par la Capture Ordinaire du Muon (COM) à une valeur fixe du moment de transfert q. La Capture Radiative du Muon (CRM), m- p-->nnmg , est un meilleur outil pour l'étude de gp à cause de sa dépendance variable en q2 qui offre une plus grande sensibilité dans la partie à haute énergie du spectre des photons. Toutefois, le petit rapport d'embranchement (~10-8) de la CRM par rapport à la désintégration du muon a retardé cette mesure jusqu'à ce jour. La théorie et les difficultés expérimentales associées à la détection des photons de CRM sont présentées au deuxième chapitre. On décrit ensuite, au troisième chapitre, les composantes du système de détection. Ce détecteur est un spectromètre à paires de grand angle solide (~3p) et qui permet l'observation des photons par l'analyse des électrons et des positrons de photo-conversion. Ainsi, le bruit de fond important des neutrons de la COM ne constitue pas un problème pour cette mesure. Nous décrivons, au quatrième chapitre, toutes les étapes de l'analyse, nécessaires pour la réduction des multiples bruits de fond. Le cinquième chapitre présente le calcul des efficacités ainsi que l'estimation des erreurs systématiques. Le sixième chapitre démontre comment l'on extrait le rapport d'embranchement pour la CRM ainsi que la valeur ae gp . On insiste sur la dépendance de gp en fonction de la valeur de

  20. Two-generation reproductive toxicity study of implanted depleted uranium (DU) in CD rats.

    PubMed

    Arfsten, D P; Still, K R; Wilfong, E R; Johnson, E W; McInturf, S M; Eggers, J S; Schaeffer, D J; Bekkedal, M Y-V

    2009-01-01

    Depleted uranium (DU) munitions and armor plating have been used in several conflicts over the last 17 yr, including the Persian Gulf War and the Iraq War. Because of its effectiveness and availability, DU will continue to be used in military applications into the foreseeable future. There is much controversy over the use of DU in weapons and equipment because of its potential radiological and toxic hazards, and there is concern over the chronic adverse health effects of embedded DU shrapnel in war veterans and bystanders. This study evaluated the effects of long-term implantation of DU on the reproductive success of F0 generation adults and development and survival of subsequent F1 and F2 generations in a two-generation reproductive toxicity study. F0 generation Sprague-Dawley rats, 8 wk of age, were surgically implanted with 0, 4, 8, 12, or 20 DU pellets (1 x 2 mm). Inert implant control animals were implanted with 12 or 20 tantallum (Ta) pellets. The F0 generation was then mated at 120 d post DU implantation. In the F0 generation, when measured on postimplantation d 27 and 117, uranium was present in the urine of DU-implanted animals in a dose-dependent manner. F0 reproductive success was similar across treatment groups and the maternal retrieval test revealed no changes in maternal behavior. DU implantation exerted no effect on the survival, health, or well-being of the F0 generation. Necropsy results of F0 animals were negative with the exception of a marked inflammatory response surrounding the implanted DU pellets. For the F1 generation, measures of F1 development through postnatal day (PND) 20 were unremarkable and no gross abnormalities were observed in F1 offspring. No uranium was detected in whole-body homogenates of PND 4 or PND 20 pups. Necropsy findings of F1 PND 20 pups were negative and no instances of ribcage malformation were observed in F1 PND 20 pups. Body weight and body weight gain of F1 rats through PND 120 were similar across treatment

  1. A Taxonomy of Attacks on the DNP3 Protocol

    NASA Astrophysics Data System (ADS)

    East, Samuel; Butts, Jonathan; Papa, Mauricio; Shenoi, Sujeet

    Distributed Network Protocol (DNP3) is the predominant SCADA protocol in the energy sector - more than 75% of North American electric utilities currently use DNP3 for industrial control applications. This paper presents a taxonomy of attacks on the protocol. The attacks are classified based on targets (control center, outstation devices and network/communication paths) and threat categories (interception, interruption, modification and fabrication). To facilitate risk analysis and mitigation strategies, the attacks are associated with the specific DNP3 protocol layers they exploit. Also, the operational impact of the attacks is categorized in terms of three key SCADA objectives: process confi- dentiality, process awareness and process control. The attack taxonomy clarifies the nature and scope of the threats to DNP3 systems, and can provide insights into the relative costs and benefits of implementing mitigation strategies.

  2. Efficient multiparty quantum key agreement protocol based on commutative encryption

    NASA Astrophysics Data System (ADS)

    Sun, Zhiwei; Huang, Jiwu; Wang, Ping

    2016-05-01

    A secure multiparty quantum key agreement protocol using single-qubit states is proposed. The agreement key is computed by performing exclusive-OR operation on all the participants' secret keys. Based on the commutative property of the commutative encryption, the exclusive-OR operation can be performed on the plaintext in the encrypted state without decrypting it. Thus, it not only protects the final shared key, but also reduces the complexity of the computation. The efficiency of the proposed protocol, compared with previous multiparty QKA protocols, is also improved. In the presented protocol, entanglement states, joint measurement and even the unitary operations are not needed, and only rotation operations and single-state measurement are required, which are easier to be realized with current technology.

  3. Improvement on "Quantum Key Agreement Protocol with Maximally Entangled States"

    NASA Astrophysics Data System (ADS)

    Chong, Song-Kong; Tsai, Chia-Wei; Hwang, Tzonelih

    2011-06-01

    Recently, Hsueh and Chen [in Proceedings of the 14th Information Security Conference, National Taiwan University of Science and Technology, Taipei, pp. 236-242, 2004] proposed a quantum key agreement (QKA) protocol with maximally entangled states. Their protocol allows two users to negotiate a secret key in such a way that no one can predetermine the shared key alone. This study points out two security flaws in their protocol: (1) a legitimate but malicious user can fully control the shared key alone; (2) an eavesdropper can obtain the shared key without being detected. A possible solution is presented to avoid these attacks and also Tsai et al.'s CNOT attack [in Proceedings of the 20th Cryptology and Information Security Conference, National Chiao Tung University, Hsinchu, pp. 210-213, 2010] on Hsueh and Chen protocol to obtain the shared key without being detected.

  4. Design and Evaluation of Complex Moving HIFU Treatment Protocols

    NASA Astrophysics Data System (ADS)

    Kargl, Steven G.; Andrew, Marilee A.; Kaczkowski, Peter J.; Brayman, Andrew A.; Crum, Lawrence A.

    2005-03-01

    The use of moving high-intensity focused ultrasound (HIFU) treatment protocols is of interest in achieving efficient formation of large-volume thermal lesions in tissue. Judicious protocol design is critical in order to avoid collateral damage to healthy tissues outside the treatment zone. A KZK-BHTE model, extended to simulate multiple, moving scans in tissue, is used to investigate protocol design considerations. Prediction and experimental observations are presented which 1) validate the model, 2) illustrate how to assess the effects of acoustic nonlinearity, and 3) demonstrate how to assess and control collateral damage such as prefocal lesion formation and lesion formation resulting from thermal conduction without direct HIFU exposure. Experimental data consist of linear and circular scan protocols delivered over a range of exposure regimes in ex vivo bovine liver.

  5. A web oriented and interactive buyer-seller watermarking protocol

    NASA Astrophysics Data System (ADS)

    Frattolillo, Franco; D'Onofrio, Salvatore

    2006-02-01

    This paper presents and discusses a web oriented, interactive anonymous buyer-seller watermarking protocol. In particular, the protocol enables buyers who are neither provided with digital certificates issued by trusted certification authorities (CAs) nor able to autonomously perform security actions to purchase digital contents distributed by web content providers (CPs) while keeping their identities unexposed during web transactions. The protocol also allows guilty buyers, i.e. who are responsible distributors of illegal replicas, to be unambiguously identified. Finally, the protocol has been designed so that CPs can exploit copyright protection services supplied by web service providers (SPs) in a security context. Thus, CPs can take advantage of complex protection services without having to implement them.

  6. FIELD SAMPLING PROTOCOLS AND ANALYSIS

    EPA Science Inventory

    I have been asked to speak again to the environmental science class regarding actual research scenarios related to my work at Kerr Lab. I plan to discuss sampling protocols along with various field analyses performed during sampling activities. Many of the students have never see...

  7. U.S. prebreathe protocol.

    PubMed

    McBarron JW 2nd

    1994-01-01

    This paper identifies and describes the prebreathe protocol currently used by the U.S. Space Shuttle Program to provide astronauts the capability to safely perform extravehicular activity. A comparison of planned vs actual prebreathe experience through the STS-37 Mission is also provided.

  8. Metabolomics protocols for filamentous fungi.

    PubMed

    Gummer, Joel P A; Krill, Christian; Du Fall, Lauren; Waters, Ormonde D C; Trengove, Robert D; Oliver, Richard P; Solomon, Peter S

    2012-01-01

    Proteomics and transcriptomics are established functional genomics tools commonly used to study filamentous fungi. Metabolomics has recently emerged as another option to complement existing techniques and provide detailed information on metabolic regulation and secondary metabolism. Here, we describe broad generic protocols that can be used to undertake metabolomics studies in filamentous fungi.

  9. A Student Teamwork Induction Protocol

    ERIC Educational Resources Information Center

    Kamau, Caroline; Spong, Abigail

    2015-01-01

    Faulty group processes have harmful effects on performance but there is little research about intervention protocols to pre-empt them in higher education. This naturalistic experiment compared a control cohort with an inducted cohort. The inducted cohort attended a workshop, consultations, elected a leader and used tools (a group log and group…

  10. Bundle Security Protocol for ION

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher

    2011-01-01

    This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.

  11. E.I. DuPont De Nemours & Company/Oberlin Filter Company Microfiltration Technology. Applications Analysis Report

    EPA Science Inventory

    This report evaluates the DuPont/Oberlin microfiltration technology’s ability to remove metals (present in soluble or insoluble form) and particulates from liquid wastes while producing a dry filter cake and a filtrate that meet applicable disposal requirements. This report also ...

  12. Implementation and evaluation of a protocol management system for automated review of CT protocols.

    PubMed

    Grimes, Joshua; Leng, Shuai; Zhang, Yi; Vrieze, Thomas; McCollough, Cynthia

    2016-09-08

    Protocol review is important to decrease the risk of patient injury and increase the consistency of CT image quality. A large volume of CT protocols makes manual review labor-intensive, error-prone, and costly. To address these challenges, we have developed a software system for automatically managing and monitoring CT proto-cols on a frequent basis. This article describes our experiences in the implementation and evaluation of this protocol monitoring system. In particular, we discuss various strategies for addressing each of the steps in our protocol-monitoring workflow, which are: maintaining an accurate set of master protocols, retrieving protocols from the scanners, comparing scanner protocols to master protocols, reviewing flagged differences between the scanner and master protocols, and updating the scanner and/or master protocols. In our initial evaluation focusing only on abdo-men and pelvis protocols, we detected 309 modified protocols in a 24-week trial period. About one-quarter of these modified protocols were determined to contain inappropriate (i.e., erroneous) protocol parameter modifications that needed to be corrected on the scanner. The most frequently affected parameter was the series description, which was inappropriately modified 47 times. Two inappropriate modifications were made to the tube current, which is particularly important to flag as this parameter impacts both radiation dose and image quality. The CT protocol changes detected in this work provide strong motivation for the use of an automated CT protocol quality control system to ensure protocol accuracy and consistency.

  13. Compositional Verification of a Communication Protocol for a Remotely Operated Vehicle

    NASA Technical Reports Server (NTRS)

    Goodloe, Alwyn E.; Munoz, Cesar A.

    2009-01-01

    This paper presents the specification and verification in the Prototype Verification System (PVS) of a protocol intended to facilitate communication in an experimental remotely operated vehicle used by NASA researchers. The protocol is defined as a stack-layered com- position of simpler protocols. It can be seen as the vertical composition of protocol layers, where each layer performs input and output message processing, and the horizontal composition of different processes concurrently inhabiting the same layer, where each process satisfies a distinct requirement. It is formally proven that the protocol components satisfy certain delivery guarantees. Compositional techniques are used to prove these guarantees also hold in the composed system. Although the protocol itself is not novel, the methodology employed in its verification extends existing techniques by automating the tedious and usually cumbersome part of the proof, thereby making the iterative design process of protocols feasible.

  14. Brain stem hypoplasia associated with Cri-du-Chat syndrome.

    PubMed

    Hong, Jin Ho; Lee, Ha Young; Lim, Myung Kwan; Kim, Mi Young; Kang, Young Hye; Lee, Kyung Hee; Cho, Soon Gu

    2013-01-01

    Cri-du-Chat syndrome, also called the 5p-syndrome, is a rare genetic abnormality, and only few cases have been reported on its brain MRI findings. We describe the magnetic resonance imaging findings of a 1-year-old girl with Cri-du-Chat syndrome who showed brain stem hypoplasia, particularly in the pons, with normal cerebellum and diffuse hypoplasia of the cerebral hemispheres. We suggest that Cri-du-Chat syndrome chould be suspected in children with brain stem hypoplasia, particularly for those with high-pitched cries.

  15. Brain Stem Hypoplasia Associated with Cri-du-Chat Syndrome

    PubMed Central

    Hong, Jin Ho; Lim, Myung Kwan; Kim, Mi Young; Kang, Young Hye; Lee, Kyung Hee; Cho, Soon Gu

    2013-01-01

    Cri-du-Chat syndrome, also called the 5p-syndrome, is a rare genetic abnormality, and only few cases have been reported on its brain MRI findings. We describe the magnetic resonance imaging findings of a 1-year-old girl with Cri-du-Chat syndrome who showed brain stem hypoplasia, particularly in the pons, with normal cerebellum and diffuse hypoplasia of the cerebral hemispheres. We suggest that Cri-du-Chat syndrome chould be suspected in children with brain stem hypoplasia, particularly for those with high-pitched cries. PMID:24265573

  16. Developmental and behavioural characteristics of cri du chat syndrome.

    PubMed Central

    Cornish, K M; Pigram, J

    1996-01-01

    Developmental and behavioural characteristics were assessed in 27 children with cri du chat syndrome using the Society for the Study of Behavioural Phenotypes questionnaire, which gave information on prenatal and perinatal conditions, neurological problems, and developmental and behavioural difficulties. The findings suggest that the behavioural profile of children with cri du chat syndrome incorporates self injurious behaviour, repetitive movements, hypersensitivity to sound, clumsiness, and obsessive attachments to objects. In terms of a developmental profile, children with cri du chat syndrome were able to communicate their needs, socially interact with others, and have some degree of mobility. PMID:8957962

  17. Spectroscopie du Furanne et du Thiophene Par Diffusion Inelastique D'electrons

    NASA Astrophysics Data System (ADS)

    Lotfi, Said

    Nous avons etudie les molecules de furanne ( rm C_4H_4O) et de thiophene (rm C_4H_4O) au moyen de la spectroscopie de diffusion inelastique d'electrons. Pour (rm C_4H_4O), les spectres realises dans differentes conditions d'energie d'impact et d'angle de diffusion contiennent des singularites ou des families de pics correspondant a: (1) des vibrations de l'etat fondamental dans le domaine 0-0.5 eV, (2) des etats triplets ^3 B_1 et ^3 A_1 qui dominent la region 3-5.5 eV, (3) des etats de valences, entre 5 et 10 eV, dont certains son accompagnes de progressions vibrationnelles, soit ~ A _1B_2, ~ B ^1A_1 et ~ C ^1A_1, (4) toujours entre 5 et 10 eV, deux series de Ryhdberg (rm 1a_2to nda_2 et rm 1a_2to npb_2) qui convergent vers la premiere limite d'ionisation de la molecule, avec une progression vibrationnelle associee au mdoe nu_4 pour la seconde, et une troisieme serie (rm 2b_1to nsa_1 ) convergent vers la seconde limite d'ionisation accompagnee de la progression de mode nu _1. Pour rm C_4H_4S, nos spectres presentent les memes etats de vibration et les memes etats triplets que pour rm C_4H _4O. Nous avons releve egalement, dans la region de 5 a 10 eV, des etats de valence ~ A ^1A_1 (ou ~ A ^1B_2), ~ B ^1A_1 (ou ~ B ^1B _2) et ~ C ^1A_1 (ou ~ C ^1B_2). Pour la premiere fois, par la spectroscopie de diffusion inelastique d'electrons, de nombreux pics ont ete identifies et attribues, dans le cadre de ce travail. Il s'agit, notamment, des etats de vibration de l'etat electronique fondamental de ces molecules et egalement de certains etats de Rydberg dans le cas du furanne.

  18. Un cas de fracture luxation négligée du coude avec conservation de la fonction du coude

    PubMed Central

    Lahrach, Kamal; Ammoumri, Oussama; Mezzani, Amine; Benabid, Mounir; Marzouki, Amine; Boutayeb, Fawzi

    2015-01-01

    Les fractures luxations du coude sont rares et souvent mal tolérées chez les sujets jeunes actifs. Nous rapportons un cas de fracture-luxation du coude remontant à 20 ans. C'est un jeune de 35 ans, victime il y a 20 ans d'un traumatisme fermé, suite à une chute lors d'un match du football, de son coude gauche occasionnant une fracture-luxation du coude. Le patient a refusé une intervention chirurgicale avec une auto-rééducation. L'examen a mis en évidence une conservation de la fonction du coude. Un bilan radiologique a montré une fracture luxation du coude avec remaniement de la palette humérale. Une abstention thérapeutique a été décidée devant l'ancienneté de la fracture-luxation et la gêne fonctionnelle minime engendrée. Contrairement aux autres séries, la fracture-luxation dans notre cas était bien tolérée malgré le jeune âge du patient. PMID:26113930

  19. An Evaluation of Protocols for UAV Science Applications

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Stewart, David E.; Sullivan, Donald V.; Finch, Patrick E.

    2012-01-01

    This paper identifies data transport needs for current and future science payloads deployed on the NASA Global Hawk Unmanned Aeronautical Vehicle (UAV). The NASA Global Hawk communication system and operational constrains are presented. The Genesis and Rapid Intensification Processes (GRIP) mission is used to provide the baseline communication requirements as a variety of payloads were utilized in this mission. User needs and desires are addressed. Protocols are matched to the payload needs and an evaluation of various techniques and tradeoffs are presented. Such techniques include utilization rate-base selective negative acknowledgement protocols and possible use of protocol enhancing proxies. Tradeoffs of communication architectures that address ease-of-use and security considerations are also presented.

  20. Design and Verification of a Distributed Communication Protocol

    NASA Technical Reports Server (NTRS)

    Munoz, Cesar A.; Goodloe, Alwyn E.

    2009-01-01

    The safety of remotely operated vehicles depends on the correctness of the distributed protocol that facilitates the communication between the vehicle and the operator. A failure in this communication can result in catastrophic loss of the vehicle. To complicate matters, the communication system may be required to satisfy several, possibly conflicting, requirements. The design of protocols is typically an informal process based on successive iterations of a prototype implementation. Yet distributed protocols are notoriously difficult to get correct using such informal techniques. We present a formal specification of the design of a distributed protocol intended for use in a remotely operated vehicle, which is built from the composition of several simpler protocols. We demonstrate proof strategies that allow us to prove properties of each component protocol individually while ensuring that the property is preserved in the composition forming the entire system. Given that designs are likely to evolve as additional requirements emerge, we show how we have automated most of the repetitive proof steps to enable verification of rapidly changing designs.

  1. Chapter 14: Chiller Evaluation Protocol

    SciTech Connect

    Tiessen, A.

    2014-09-01

    This protocol defines a chiller measure as a project that directly impacts equipment within the boundary of a chiller plant. A chiller plant encompasses a chiller--or multiple chillers--and associated auxiliary equipment. This protocol primarily covers electric-driven chillers and chiller plants. It does not include thermal energy storage and absorption chillers fired by natural gas or steam, although a similar methodology may be applicable to these chilled water system components. Chillers provide mechanical cooling for commercial, institutional, multiunit residential, and industrial facilities. Cooling may be required for facility heating, ventilation, and air conditioning systems or for process cooling loads (e.g., data centers, manufacturing process cooling). The vapor compression cycle, or refrigeration cycle, cools water in the chilled water loop by absorbing heat and rejecting it to either a condensing water loop (water cooled chillers) or to the ambient air (air-cooled chillers).

  2. Building America House Simulation Protocols

    SciTech Connect

    Hendron, Robert; Engebrecht, Cheryn

    2010-09-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  3. Le mouvement du pôle

    NASA Astrophysics Data System (ADS)

    Bizouard, Christian

    2012-03-01

    Les variations de la rotation terrestre. En conditionnant à la fois notre vie quotidienne, notre perception du ciel, et bon nombre de phénomènes géophysiques comme la formation des cyclones, la rotation de la Terre se trouve au croisement de plusieurs disciplines. Si le phenomena se faisait uniformément, le sujet serait vite discuté, mais c'est parce que la rotation terrestre varie, même imperceptiblement pour nos sens, dans sa vitesse angulaire comme dans la direction de son axe, qu'elle suscite un grand intérêt. D'abord pour des raisons pratiques : non seulement les aléas de la rotation terrestre modi_ent à la longue les pointés astrométriques à un instant donné de la journée mais in_uencent aussi les mesures opérées par les techniques spatiales ; en consequence l'exploitation de ces mesures, par exemple pour déterminer les orbites des satellites impliqués ou pratiquer le positionnement au sol, nécessite une connaissance précise de ces variations. Plus fondamentalement, elles traduisent les propriétés globales de la Terre comme les processus physiques qui s'y déroulent, si bien qu'en analysant les causes des fluctuations observées, on dispose d'un moyen de mieux connaître notre globe. La découverte progressive des fluctuations de la rotation de la Terre a une longue histoire. Sous l'angle des techniques d'observation, trois époques se pro-celle du pointé astrométrique à l'oeil nu, à l'aide d'instruments en bois ou métalliques (quart de cercle muraux par exemple). À partir du XVIIe siècle débute l'astrométrie télescopique dont les pointés sont complétés par des datations de plus en plus précises grâce à l'invention d'horloges régulées par balancier. Cette deuxième époque se termine vers 1960, avec l'avènement des techniques spatiales : les pointés astrométriques sont délaissés au profit de la mesure ultra-précise de durées ou de fréquences de signaux électromagnétiques, grâce à l'invention des horloges

  4. Multiple protocol fluorometer and method

    DOEpatents

    Kolber, Zbigniew S.; Falkowski, Paul G.

    2000-09-19

    A multiple protocol fluorometer measures photosynthetic parameters of phytoplankton and higher plants using actively stimulated fluorescence protocols. The measured parameters include spectrally-resolved functional and optical absorption cross sections of PSII, extent of energy transfer between reaction centers of PSII, F.sub.0 (minimal), F.sub.m (maximal) and F.sub.v (variable) components of PSII fluorescence, photochemical and non-photochemical quenching, size of the plastoquinone (PQ) pool, and the kinetics of electron transport between Q.sub.a and PQ pool and between PQ pool and PSI. The multiple protocol fluorometer, in one embodiment, is equipped with an excitation source having a controlled spectral output range between 420 nm and 555 nm and capable of generating flashlets having a duration of 0.125-32 .mu.s, an interval between 0.5 .mu.s and 2 seconds, and peak optical power of up to 2 W/cm.sup.2. The excitation source is also capable of generating, simultaneous with the flashlets, a controlled continuous, background illumination.

  5. Integrating protocol schedules with patients' personal calendars.

    PubMed

    Civan, Andrea; Gennari, John H; Pratt, Wanda

    2006-01-01

    We propose a new approach for integrating protocol care schedules into patients' personal calendars. This approach could provide patients with greater control over their current and future scheduling demands as they seek and receive protocol-based care.

  6. The reliable multicast protocol application programming interface

    NASA Technical Reports Server (NTRS)

    Montgomery , Todd; Whetten, Brian

    1995-01-01

    The Application Programming Interface for the Berkeley/WVU implementation of the Reliable Multicast Protocol is described. This transport layer protocol is implemented as a user library that applications and software buses link against.

  7. Post-quantum key exchange protocols

    NASA Astrophysics Data System (ADS)

    Li, Xiangdong; Leung, Lin; Kwan, Andis Chi-Tung; Zhang, Xiaowen; Kahanda, Dammika; Anshel, Michael

    2006-05-01

    If an eavesdropper Eve is equipped with quantum computers, she can easily break the public key exchange protocols used today. In this paper we will discuss the post-quantum Diffie-Hellman key exchange and private key exchange protocols.

  8. A Contextuality Based Quantum Key Distribution Protocol

    NASA Astrophysics Data System (ADS)

    Troupe, James

    In 2005 Spekkens presented a generalization of noncontextuality that applies to imperfect measurements (POVMs) by allowing the underlying hidden variable model to be indeterministic. In addition, unlike traditional Bell-Kochen-Specker noncontextuality, HV models of a single qubit were shown to be contextual under this definition. Thus, not all single qubit POVM measurement outcomes can be modeled classically. Recently M. Pusey showed that, under certain conditions, exhibiting an anomalous weak value (i.e. values outside the eigenspectrum of the observable) implies contextuality. We will present a new single qubit prepare and measure QKD protocol that uses observation of anomalous weak values of particular observables to estimate the quantum channel error rate and certify the security of the channel. We also argue that it is the ``degree'' of contextuality of the noisy qubits exiting the channel that fundamentally determine the secure key rate. A benefit of this approach is that the security does not depend on the fair sampling assumption, and so is not compromised by Eve controlling Bob's measurement devices. Thus, it retains much of the benefit of ``Measurement Device Independent'' QKD protocols while only using single photon preparations and measurements. Supported by the Office of Naval Research under Grant N00014-15-1-2225.

  9. Extra-Vehicular Activity (EVA) glove evaluation test protocol

    NASA Technical Reports Server (NTRS)

    Hinman-Sweeney, E. M.

    1994-01-01

    One of the most critical components of a space suit is the gloves, yet gloves have traditionally presented significant design challenges. With continued efforts at glove development, a method for evaluating glove performance is needed. This paper presents a pressure-glove evaluation protocol. A description of this evaluation protocol, and its development is provided. The protocol allows comparison of one glove design to another, or any one design to bare-handed performance. Gloves for higher pressure suits may be evaluated at current and future design pressures to drive out differences in performance due to pressure effects. Using this protocol, gloves may be evaluated during design to drive out design problems and determine areas for improvement, or fully mature designs may be evaluated with respect to mission requirements. Several different test configurations are presented to handle these cases. This protocol was run on a prototype glove. The prototype was evaluated at two operating pressures and in the unpressurized state, with results compared to bare-handed performance. Results and analysis from this test series are provided, as is a description of the configuration used for this test.

  10. Classification moléculaire du cancer du sein au Maroc

    PubMed Central

    Fouad, Abbass; Yousra, Akasbi; Kaoutar, Znati; Omar, El Mesbahi; Afaf, Amarti; Sanae, Bennis

    2012-01-01

    Introduction La classification moléculaire des cancers du sein basée sur l'expression génique puis sur le profil protéique a permis de distinguer cinq groupes moléculaires: luminal A, luminal B, Her2/neu, basal-like et non-classées. L'objectif de cette étude réalisée au CHU Hassan II de Fès est de classer 335 cancers du sein infiltrant en groupes moléculaires, puis de les corréler avec les caractéristiques clinicopathologiques. Méthodes Etude rétrospective étalée sur 45 mois, comportant 335 patientes colligées au CHU pour le diagnostic et le suivi. Les tumeurs sont analysées histologiquement et classées après une étude immunohistochimique en groupes: luminal A, luminal B, Her2+, basal-like et non-classées. Résultats 54.3% des tumeurs sont du groupe luminal A, 16% luminal B, 11.3% Her2+, 11.3% basal-like et 7% non-classées. Le groupe luminal A renferme le plus faible taux de grade III, d'emboles vasculaires ainsi que de métastases; alors que le groupe des non-classées et basal-like représentent un taux élevé de grade III, une faible proportion d'emboles vasculaires et d'envahissement ganglionnaire. Ces facteurs sont significativement élevés dans les groupes luminal B et Her2+ avec un taux de survie globale de 78% et 76% respectivement. Dans le groupe luminal A, la survie globale des patientes est élevée (87%) alors qu'elle n'est que de 49% dans le groupe des triples négatifs (basal-like et non-classés). Conclusion Le groupe luminal B est différent du luminal A et il est de pronostic péjoratif vis à vis du groupe Her2+. Les caractéristiques clinicopathologiques concordent avec le profil moléculaire donc devraient être pris en considération comme facteurs pronostiques. PMID:23396646

  11. Impact socio professionnel de la libération chirurgicale du syndrome du canal carpien

    PubMed Central

    Kraiem, Aouatef Mahfoudh; Hnia, Hajer; Bouzgarrou, Lamia; Henchi, Mohamed Adnène; Khalfallah, Taoufik

    2016-01-01

    L’objectif de notre travail était d’étudier les conséquences socioprofessionnelles d’une libération chirurgicale du SCC. Il s’agit d’une étude transversale portant sur les sujets opérés pour un SCC d’origine professionnelle ; recensés dans le Service de Médecine de Travail et de Pathologies Professionnelles au CHU Tahar Sfar de Mahdia en Tunisie sur une période de 8 ans allant du 1 Janvier 2006 au mois Décembre 2013. Le recueil des données s’est basé sur une fiche d’enquête, portant sur la description des caractéristiques socioprofessionnelles, médicales, et sur le devenir professionnel des participants. Pour étudier les contraintes psychosociales au travail, nous avons adopté le questionnaire de Karasek. La durée d’arrêt de travail après libération chirurgicale du SCC était significativement liée à l’existence d’autres troubles musculo-squelettiques autre que le SCC, la déclaration du SCC en maladie professionnelle et à l’ancienneté professionnelle des salariés. Quant au devenir professionnel des salariés opérés, 50,7% ont gardé le même poste, 15,3% ont bénéficié d’un aménagement de poste et 33,8% ont bénéficié d’un changement de poste dans la même entreprise. Le devenir professionnel de ces salariés était corrélé à leurs qualifications professionnelles et au type de l’atteinte sensitive et/ou motrice du nerf médian à l’EMG. Un certain nombre de facteurs non lésionnels déterminaient la durée de l’arrêt de travail, alors que le devenir professionnel des opérés pour SCC dépendait essentiellement de leurs qualifications professionnelles et des données de l’électromyogramme. Il est certain que des travaux beaucoup plus larges permettraient d’affiner encore ces résultats. PMID:27800089

  12. An Improved RSA Based User Authentication and Session Key Agreement Protocol Usable in TMIS.

    PubMed

    Amin, Ruhul; Biswas, G P

    2015-08-01

    Recently, Giri et al.'s proposed a RSA cryptosystem based remote user authentication scheme for telecare medical information system and claimed that the protocol is secure against all the relevant security attacks. However, we have scrutinized the Giri et al.'s protocol and pointed out that the protocol is not secure against off-line password guessing attack, privileged insider attack and also suffers from anonymity problem. Moreover, the extension of password guessing attack leads to more security weaknesses. Therefore, this protocol needs improvement in terms of security before implementing in real-life application. To fix the mentioned security pitfalls, this paper proposes an improved scheme over Giri et al.'s scheme, which preserves user anonymity property. We have then simulated the proposed protocol using widely-accepted AVISPA tool which ensures that the protocol is SAFE under OFMC and CL-AtSe models, that means the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The informal cryptanalysis has been also presented, which confirmed that the proposed protocol provides well security protection on the relevant security attacks. The performance analysis section compares the proposed protocol with other existing protocols in terms of security and it has been observed that the protocol provides more security and achieves additional functionalities such as user anonymity and session key verification.

  13. A comparative study of protocols for secure quantum communication under noisy environment: single-qubit-based protocols versus entangled-state-based protocols

    NASA Astrophysics Data System (ADS)

    Sharma, Vishal; Thapliyal, Kishore; Pathak, Anirban; Banerjee, Subhashish

    2016-11-01

    The effect of noise on various protocols of secure quantum communication has been studied. Specifically, we have investigated the effect of amplitude damping, phase damping, squeezed generalized amplitude damping, Pauli type as well as various collective noise models on the protocols of quantum key distribution, quantum key agreement, quantum secure direct quantum communication and quantum dialogue. From each type of protocol of secure quantum communication, we have chosen two protocols for our comparative study: one based on single-qubit states and the other one on entangled states. The comparative study reported here has revealed that single-qubit-based schemes are generally found to perform better in the presence of amplitude damping, phase damping, squeezed generalized amplitude damping noises, while entanglement-based protocols turn out to be preferable in the presence of collective noises. It is also observed that the effect of noise depends upon the number of rounds of quantum communication involved in a scheme of quantum communication. Further, it is observed that squeezing, a completely quantum mechanical resource present in the squeezed generalized amplitude channel, can be used in a beneficial way as it may yield higher fidelity compared to the corresponding zero squeezing case.

  14. Protocols using Anonymous Connections: Mobile Applications

    DTIC Science & Technology

    1997-01-01

    Protocols using Anonymous Connections: Mobile Applications Michael G. Reed, Paul F. Syverson, and David M. Goldschlag ? Naval Research Laboratory...Abstract. This paper describes security protocols that use anonymous channels as primitive, much in the way that key distribution protocols take...encryption as primitive. This abstraction allows us to focus on high level anonymity goals of these protocols much as abstracting away from encryption clari

  15. Etude des phenomenes dynamiques ultrarapides et des caracteristiques impulsionnelles d'emission terahertz du supraconducteur YBCO

    NASA Astrophysics Data System (ADS)

    Savard, Stephane

    choisi, nous avons mesure les proprietes intrinseques du meme echantillon de YBa2Cu3O7- delta avec la technique pompe-visible et sonde-terahertz donnant, elle aussi, acces aux temps caracteristiques regissant l'evolution hors-equilibre de ce materiau. Dans le meilleur scenario, ces temps caracteristiques devraient correspondre a ceux evalues grace a la modelisation des antennes. Un bon controle des parametres de croissance des couches minces supraconductrices et de fabrication du dispositif nous a permis de realiser des antennes d'emission terahertz possedant d'excellentes caracteristiques en terme de largeur de bande d'emission (typiquement 3 THz) exploitables pour des applications de spectroscopie resolue dans le domaine temporel. Le modele developpe et retenu pour le lissage du spectre terahertz decrit bien les caracteristiques de l'antenne supraconductrice pour tous les parametres d'operation. Toutefois, le lien avec la technique pompe-sonde lors de la comparaison des proprietes intrinseques n'est pas direct malgre que les deux techniques montrent que le temps de relaxation des porteurs augmente pres de la temperature critique. Les donnees en pompe-sonde indiquent que la mesure du temps de relaxation depend de la frequence de la sonde, ce qui complique la correspondance des proprietes intrinseques entre les deux techniques. De meme, le temps de relaxation extrait a partir du spectre de l'antenne terahertz augmente en s'approchant de la temperature critique (T c) de YBa2Cu 3O7-delta. Le comportement en temperature du temps de relaxation correspond a une loi de puissance qui est fonction de l'inverse du gap supraconducteur avec un exposant 5 soit 1/Delta 5(T). Le travail presente dans cette these permet de mieux decrire les caracteristiques des antennes supraconductrices a haute temperature critique et de les relier aux proprietes intrinseques du materiau qui les compose. De plus, cette these presente les parametres a ajuster comme le courant applique, la puissance de

  16. Handbook for Using IP Protocols for Space Missions

    NASA Technical Reports Server (NTRS)

    Hogie, Keith; Criscuolo, Ed; Parise, Ron

    2004-01-01

    This presentation will provide a summary of a handbook developed at GSFC last year that contains concepts and guidelines for using Internet protocols for space missions. It will include topics on: Lessons learned from current Space IP mission. General architectural issues related to use of IP in space. Operational scenarios for common space data transfer applications. Security issues. A general review of protocols applicable for use with IP in space. The presentation will also pose questions on what sort of information would be useful in future versions of the document.

  17. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... describing the new research and omitting information in the supplemental protocol which has been stated in... 21 Food and Drugs 9 2011-04-01 2011-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A...

  18. 40 CFR 160.120 - Protocol.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... PRACTICE STANDARDS Protocol for and Conduct of a Study § 160.120 Protocol. (a) Each study shall have an... study. The protocol shall contain but shall not necessarily be limited to the following information: (1) A descriptive title and statement of the purpose of the study. (2) Identification of the...

  19. 40 CFR 160.120 - Protocol.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... PRACTICE STANDARDS Protocol for and Conduct of a Study § 160.120 Protocol. (a) Each study shall have an... study. The protocol shall contain but shall not necessarily be limited to the following information: (1) A descriptive title and statement of the purpose of the study. (2) Identification of the...

  20. 40 CFR 792.120 - Protocol.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... dated signature of the study director. (15) A statement of the proposed statistical method. (b) All...) GOOD LABORATORY PRACTICE STANDARDS Protocol for and Conduct of A Study § 792.120 Protocol. (a) Each study shall have an approved written protocol that clearly indicates the objectives and all methods...

  1. 21 CFR 58.120 - Protocol.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... sponsor and the dated signature of the study director. (12) A statement of the proposed statistical... FOR NONCLINICAL LABORATORY STUDIES Protocol for and Conduct of a Nonclinical Laboratory Study § 58.120 Protocol. (a) Each study shall have an approved written protocol that clearly indicates the objectives...

  2. 40 CFR 160.120 - Protocol.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... PRACTICE STANDARDS Protocol for and Conduct of a Study § 160.120 Protocol. (a) Each study shall have an... study. The protocol shall contain but shall not necessarily be limited to the following information: (1) A descriptive title and statement of the purpose of the study. (2) Identification of the...

  3. 40 CFR 160.120 - Protocol.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... PRACTICE STANDARDS Protocol for and Conduct of a Study § 160.120 Protocol. (a) Each study shall have an... study. The protocol shall contain but shall not necessarily be limited to the following information: (1) A descriptive title and statement of the purpose of the study. (2) Identification of the...

  4. 40 CFR 792.120 - Protocol.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... dated signature of the study director. (15) A statement of the proposed statistical method. (b) All...) GOOD LABORATORY PRACTICE STANDARDS Protocol for and Conduct of A Study § 792.120 Protocol. (a) Each study shall have an approved written protocol that clearly indicates the objectives and all methods...

  5. 21 CFR 312.83 - Treatment protocols.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 5 2010-04-01 2010-04-01 false Treatment protocols. 312.83 Section 312.83 Food...-debilitating Illnesses § 312.83 Treatment protocols. If the preliminary analysis of phase 2 test results appears promising, FDA may ask the sponsor to submit a treatment protocol to be reviewed under...

  6. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol to conduct research with controlled substances listed in Schedule I shall be in the following...

  7. Cryptanalysis on Cheng et al. protocol

    NASA Astrophysics Data System (ADS)

    Thakur, Tejeshwari

    2016-06-01

    Deployment of new node in any wireless sensor network is a sensitive task. This is the reason why, an Access Control Protocol is required in WSN. In this paper, we demonstrate that Access Control Protocol proposed by Cheng et al.[1] for Wireless Sensor Network is insecure. The reason is that this protocol fails to resist the active attack.

  8. 40 CFR 161.70 - Acceptable protocols.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... ingredient, mixture, or product. Accordingly, failure to follow a suggested protocol will not invalidate a.... Accordingly, questions concerning protocols should be directed, preferably in writing, to the Product Manager... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Acceptable protocols. 161.70...

  9. 40 CFR 161.70 - Acceptable protocols.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... ingredient, mixture, or product. Accordingly, failure to follow a suggested protocol will not invalidate a.... Accordingly, questions concerning protocols should be directed, preferably in writing, to the Product Manager... 40 Protection of Environment 24 2011-07-01 2011-07-01 false Acceptable protocols. 161.70...

  10. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 9 2014-04-01 2014-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol to conduct research with controlled substances listed in Schedule I shall be in the following...

  11. 21 CFR 1301.18 - Research protocols.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 9 2013-04-01 2013-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol to conduct research with controlled substances listed in Schedule I shall be in the following...

  12. The Cri-Du-Chat Syndrome: A Case Study.

    ERIC Educational Resources Information Center

    Sykes, Stewart C.; Christie, Margarette A.

    1987-01-01

    The developmental history of a 14-year-old girl with Cri-Du-Chat Syndrome (a genetic disorder characterized by a distinctive cry and severe physical and intellectual disabilities) is reported. (Author/DB)

  13. Genetics Home Reference: cri-du-chat syndrome

    MedlinePlus

    ... syndrome March of Dimes: Chromosomal Conditions Merck Manual Consumer Version: Overview of Chromosomal Abnormalities Orphanet: Monosomy 5p ... Pinkel D. High-resolution mapping of genotype-phenotype relationships in cri du chat syndrome using array comparative ...

  14. 1. Historic American Buildings Survey, drawn by Pierre du Simitiere ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    1. Historic American Buildings Survey, drawn by Pierre du Simitiere (papers in Philadelphia Library) DRAWING OF REDWOOD LIBRARY IN 1768. - Redwood Library, 50 Bellevue Avenue, Newport, Newport County, RI

  15. Difficult‐to‐control asthma management through the use of a specific protocol

    PubMed Central

    Giavina‐Bianchi, Pedro; Aun, Marcelo Vivolo; Bisaccioni, Carla; Agondi, Rosana; Kalil, Jorge

    2010-01-01

    The present study is a critical review of difficult‐to‐control asthma, highlighting the characteristics and severity of the disease. It also presents a protocol for the management of patients with this asthma phenotype. The protocol, which was based on relevant studies in the literature, is described and analyzed. PMID:21049219

  16. Atmosphere Assisted Machining of Depleted Uranium (DU) Penetrators

    DTIC Science & Technology

    1987-05-01

    tooling should be approximately $75,000 each. Lessons learned in the Vacuum Induction Remelt MM&T and the chip melts made on this program point out the...AD-E-401 528 Cutwator Report ARCCD-CR-6600S (V) ATMOSPHERE ASSISTED MACMINING DEPLETED URANIUM (DU) PENETRATORS DTic Charles E. Lathe"rOwn ELECTE...E-401 528 Contractor Report ARCCD-CR-86008 ATMOSPHERE ASSISTED MACHINING OF DEPLETED URANIUM (DU) PENETRATORS Charles E. Latham-Brown Frank Porter

  17. Anaesthetic considerations for the patient with cri du chat syndrome.

    PubMed

    Brislin, R P; Stayer, S A; Schwartz, R E

    1995-01-01

    Cri du chat syndrome is an inherited disease affecting multiple organ systems. Most characteristic is the anatomical abnormality of the larynx resulting in a cat-like cry. Issues important in developing an anaesthetic plan include: anatomical abnormalities of the airway, congenital heart disease, hypotonia, mental retardation, and temperature maintenance. We report the case of a 33-month-old patient with cri du chat syndrome undergoing patent ductus arteriosus (PDA) ligation and discuss the anaesthetic issues.

  18. Two Quantum Protocols for Oblivious Set-member Decision Problem

    NASA Astrophysics Data System (ADS)

    Shi, Run-Hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun

    2015-10-01

    In this paper, we defined a new secure multi-party computation problem, called Oblivious Set-member Decision problem, which allows one party to decide whether a secret of another party belongs to his private set in an oblivious manner. There are lots of important applications of Oblivious Set-member Decision problem in fields of the multi-party collaborative computation of protecting the privacy of the users, such as private set intersection and union, anonymous authentication, electronic voting and electronic auction. Furthermore, we presented two quantum protocols to solve the Oblivious Set-member Decision problem. Protocol I takes advantage of powerful quantum oracle operations so that it needs lower costs in both communication and computation complexity; while Protocol II takes photons as quantum resources and only performs simple single-particle projective measurements, thus it is more feasible with the present technology.

  19. Two Quantum Protocols for Oblivious Set-member Decision Problem

    PubMed Central

    Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun

    2015-01-01

    In this paper, we defined a new secure multi-party computation problem, called Oblivious Set-member Decision problem, which allows one party to decide whether a secret of another party belongs to his private set in an oblivious manner. There are lots of important applications of Oblivious Set-member Decision problem in fields of the multi-party collaborative computation of protecting the privacy of the users, such as private set intersection and union, anonymous authentication, electronic voting and electronic auction. Furthermore, we presented two quantum protocols to solve the Oblivious Set-member Decision problem. Protocol I takes advantage of powerful quantum oracle operations so that it needs lower costs in both communication and computation complexity; while Protocol II takes photons as quantum resources and only performs simple single-particle projective measurements, thus it is more feasible with the present technology. PMID:26514668

  20. Automatic image hanging protocol for chest radiographs in PACS.

    PubMed

    Luo, Hui; Hao, Wei; Foos, David H; Cornelius, Craig W

    2006-04-01

    Chest radiography is one of the most widely used techniques in diagnostic imaging. It comprises at least one-third of all diagnostic radiographic procedures in hospitals. However, in the picture archive and communication system, images are often stored with the projection and orientation unknown or mislabeled, which causes inefficiency for radiologists' interpretation. To address this problem, an automatic hanging protocol for chest radiographs is presented. The method targets the most effective region in a chest radiograph, and extracts a set of size-, rotation-, and translation-invariant features from it. Then, a well-trained classifier is used to recognize the projection. The orientation of the radiograph is later identified by locating the neck, heart, and abdomen positions in the radiographs. Initial experiments are performed on the radiographs collected from daily routine chest exams in hospitals and show promising results. Using the presented protocol, 98.2% of all cases could be hung correctly on projection view (without protocol, 62%), and 96.1% had correct orientation (without protocol, 75%). A workflow study on the protocol also demonstrates a significant improvement in efficiency for image display.

  1. Effets du titane et du niobium sur l'oxydation à 950circC d'aciers ferritiques

    NASA Astrophysics Data System (ADS)

    Issartel, C.; Buscail, H.; Caudron, E.; Cueff, R.; Riffard, F.; El Messki, S.; Karimi, N.; Antoni, L.

    2004-11-01

    Nous avons étudié l'effet du titane et du niobium sur l'oxydation à 950circC d'un acier Fe-Cr chrominoformeur. La DRX in situ montre que le titane semble s'oxyder en formant Cr{2}TiO{5} et TiO{2} qui contribuent à une augmentation de la prise de masse des échantillons. Une partie du titane issu de ces oxydes semble doper la couche de chromine. Sa présence augmente la concentration en lacunes cationiques dans la chromine et augmente donc la diffusion du chrome dans la couche. Nous avons aussi montré que le niobium n'a pas d'influence sur l'oxydation de ce type d'acier à 950circC.

  2. Tumeur du sac vitellin du testicule au stade IIIc métastatique : à propos d’un cas

    PubMed Central

    Zizi, Mohamed; Ziouziou, Imad; El Yacoubi, Souhail; Khmou, Mouna; Jahid, Ahmed; Mahassini, Najat; Karmouni, Tariq; El Khader, Khalid; Koutani, Abdellatif; Andaloussi, Ahmed Iben Attya

    2014-01-01

    Résumé Les tumeurs du sac vitellin du testicule sont rares chez l’adulte. Ces tumeurs se caractérisent par un mauvais pronostic à un stade métastatique avancé. Cependant, nous rapportons, dans le présent article, le cas clinique d’un adulte de 32 ans qui présentait une tumeur du sac vitellin du testicule au stade IIIc métastatique. Ce patient a subi une orchidectomie haute, accompagnée de quatre cycles de chimiothérapie à base de bléomycine, d’étoposide et de cisplatine. Il a répondu complètement au traitement, moyennant un recul de deux ans. PMID:25295144

  3. Nonblocking and orphan free message logging protocols

    NASA Technical Reports Server (NTRS)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-01-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  4. Id4 Promotes Senescence and Sensitivity to Doxorubicin-induced Apoptosis in DU145 Prostate Cancer Cells

    PubMed Central

    Carey, Jason P.; Knowell, Ashley Evans; Chinaranagari, Swathi; Chaudhary, Jaideep

    2014-01-01

    Inhibitor of differentiation proteins (Id1, 2, 3 and 4) are dominant negative regulators of basic helix loop helix transcription factors and play dominant roles in cancer cells, spanning several molecular pathways including senescence, invasion, metastasis, proliferation and apoptosis. In contrast to high Id1, Id2 and Id3 expression, the expression of Id4 is epigenetically silenced in prostate cancer. In the present study we demonstrated a novel role of Id4, that of promotion of cellular senescence in prostate cancer cells. Materials and Methods: Id4 was ectopically expressed in DU145 cells (DU145+Id4). The cells treated with Doxorubicin (0–500 nm) or vehicle control were analyzed for apoptosis, senescence (SA-beta Galactosidase), and expression of CDKN1A (p21), CDKN1B(p27), CDKN2A (p16), E2F1, vimentin and E-cadherin by immuno-histochemistry and/or Western blot. Results: In the present study we demonstrated that Id4 promotes cellular senescence in prostate cancer cell line DU145. Ectopic overexpression of Id4 in androgen receptor-negative DU145 prostate cancer cells resulted in increased expression of p16, p21, p27, E-cadherin and vimentin but down-regulated E2F1 expression. Id4 also potentiated the effect of doxorubicin induced senescence and apoptosis. Conclusion: The absence of functional p16, pRB and p53 in DU145 suggests that Id4 could alter additional molecular pathways such as those involving E2F1 to promote senescence and increased sensitivity to doxorubicin-induced apoptosis. The results of the present study support the role of Id4 as a tumor suppressor in prostate cancer. PMID:24122992

  5. INEEL AIR MODELING PROTOCOL ext

    SciTech Connect

    C. S. Staley; M. L. Abbott; P. D. Ritter

    2004-12-01

    Various laws stemming from the Clean Air Act of 1970 and the Clean Air Act amendments of 1990 require air emissions modeling. Modeling is used to ensure that air emissions from new projects and from modifications to existing facilities do not exceed certain standards. For radionuclides, any new airborne release must be modeled to show that downwind receptors do not receive exposures exceeding the dose limits and to determine the requirements for emissions monitoring. For criteria and toxic pollutants, emissions usually must first exceed threshold values before modeling of downwind concentrations is required. This document was prepared to provide guidance for performing environmental compliance-driven air modeling of emissions from Idaho National Engineering and Environmental Laboratory facilities. This document assumes that the user has experience in air modeling and dose and risk assessment. It is not intended to be a "cookbook," nor should all recommendations herein be construed as requirements. However, there are certain procedures that are required by law, and these are pointed out. It is also important to understand that air emissions modeling is a constantly evolving process. This document should, therefore, be reviewed periodically and revised as needed. The document is divided into two parts. Part A is the protocol for radiological assessments, and Part B is for nonradiological assessments. This document is an update of and supersedes document INEEL/INT-98-00236, Rev. 0, INEEL Air Modeling Protocol. This updated document incorporates changes in some of the rules, procedures, and air modeling codes that have occurred since the protocol was first published in 1998.

  6. A high performance totally ordered multicast protocol

    NASA Technical Reports Server (NTRS)

    Montgomery, Todd; Whetten, Brian; Kaplan, Simon

    1995-01-01

    This paper presents the Reliable Multicast Protocol (RMP). RMP provides a totally ordered, reliable, atomic multicast service on top of an unreliable multicast datagram service such as IP Multicasting. RMP is fully and symmetrically distributed so that no site bears un undue portion of the communication load. RMP provides a wide range of guarantees, from unreliable delivery to totally ordered delivery, to K-resilient, majority resilient, and totally resilient atomic delivery. These QoS guarantees are selectable on a per packet basis. RMP provides many communication options, including virtual synchrony, a publisher/subscriber model of message delivery, an implicit naming service, mutually exclusive handlers for messages, and mutually exclusive locks. It has commonly been held that a large performance penalty must be paid in order to implement total ordering -- RMP discounts this. On SparcStation 10's on a 1250 KB/sec Ethernet, RMP provides totally ordered packet delivery to one destination at 842 KB/sec throughput and with 3.1 ms packet latency. The performance stays roughly constant independent of the number of destinations. For two or more destinations on a LAN, RMP provides higher throughput than any protocol that does not use multicast or broadcast.

  7. Chapter 18: Variable Frequency Drive Evaluation Protocol

    SciTech Connect

    Romberger, J.

    2014-11-01

    An adjustable-speed drive (ASD) includes all devices that vary the speed of a rotating load, including those that vary the motor speed and linkage devices that allow constant motor speed while varying the load speed. The Variable Frequency Drive Evaluation Protocol presented here addresses evaluation issues for variable-frequency drives (VFDs) installed on commercial and industrial motor-driven centrifugal fans and pumps for which torque varies with speed. Constant torque load applications, such as those for positive displacement pumps, are not covered by this protocol. Other ASD devices, such as magnetic drive, eddy current drives, variable belt sheave drives, or direct current motor variable voltage drives, are also not addressed. The VFD is by far the most common type of ASD hardware. With VFD speed control on a centrifugal fan or pump motor, energy use follows the affinity laws, which state that the motor electricity demand is a cubic relationship to speed under ideal conditions. Therefore, if the motor runs at 75% speed, the motor demand will ideally be reduced to 42% of full load power; however, with other losses it is about 49% of full load power.

  8. Protocol for cardiac assessment of recreational athletes.

    PubMed

    Chinea, Ana M; Lollett, Carlos; Herrera, Hector; Passariello, Gianfranco; Wong, Sara

    2012-01-01

    In this work, the development of a database on physical fitness is presented. As initial population to fill this database, people who practice recreational sports at the Universidad Simon Bolivar (USB) were chosen. The goal was studying individual physical fitness in order to structure exercise routines that gives certain benefits without risking the individual health, promoting a less sedentary way of life. Before the study, a low-cost noninvasive protocol was designed to determine the level of physical fitness. The methodology consisted of four steps: a) A review of existing protocols to propose a set of physical fitness (International Physical Activity Questionnaire (IPAQ)), cardiovascular (heart rate variability, heart rate recovery time and arterial blood pressure), anthropomorphic, aerobic (maximum oxygen consumption) and mood state (Profile of Mood State (POMS)) measurements, which allow sketching a complete profile on the sportsman physical fitness. b) Instrumental data collection. c) Electrocardiographic signal processing. d) Data post-processing using multivariate analysis. The database was composed of 26 subject from USB. Ten subjects were soccer players, ten were mountain climbers and six were sedentary people. Results showed that the heart rate recover time after 2-3 min, IPAQ and maximum oxygen consumption have higher weights for classifying individuals according to their habitual physical activity. Heart rate variability, as well as, POMS did not contribute greatly for discriminating recreational sport from sedentary persons.

  9. Prise en charge du cancer du col utérin durant la grossesse: à propos de 05 cas

    PubMed Central

    El Mazghi, Abderrahman; Bouhafa, Touria; Loukili, Kaoutar; El Kacemi, Hanan; Lalya, Issam; Hassouni, Khalid

    2014-01-01

    L'association d'un cancer du col utérin avec une grossesse est une éventualité rare. Son incidence est assez mal évaluée, elle se situe selon les études entre 1 et 2/10 000. Lorsque la découverte en est faite, il faut conjuguer deux impératifs parfois totalement divergents: le traitement de la mère et la prise en charge du foetus. Cette association pose schématiquement quatre grands problèmes, qui sont: Celui du diagnostic, qui est loin d’être évident, compte tenu des remaniements cervicaux observés en début de gestation, le pronostic de l'affection, la date du traitement chirurgical et du délai entre le diagnostic et la prise en charge thérapeutique, enfin et de manière plus accessoire, le devenir de la grossesse et le mode d'accouchement. Nous rapportons une série de 5 cas de cancer du col utérin découverts au cours de la grossesse colligés dans notre service entre 2010 et 2013. La prise en charge thérapeutique est identique à celle des patientes en dehors de la grossesse même si quelques adaptations sont nécessaires du fait de l’état gravide, le pronostic du cancer ne semble pas être modifié par la grossesse. PMID:25852788

  10. How to design a (good) epidemiological observational study: epidemiological research protocol at a glance.

    PubMed

    Fronteira, Ines

    2013-01-01

    In this article, we propose a general structure for designing a research protocol of an observational epidemiological study. We start by highlighting the importance of the research protocol, namely in accounting for some bias and guaranteeing methodologic rigor and study reproductability. Next, we reflect on some of the essential elements of a research protocol no matter its objective. We further present some specific issues to be included according to the type of study: cross-sectional, case-control and cohort.

  11. Effective Protocols for Mobile Communications and Networking

    SciTech Connect

    Espinoza, J.; Sholander, P.; Van Leeuwen, B,

    1998-12-01

    This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

  12. Enabling protocol-based medical critiquing.

    PubMed

    Sips, Robert-Jan; Braun, Loes; Roos, Nico

    2006-01-01

    This paper investigates the combination of expert critiquing systems and formal medical protocols. Medical protocols might serve as a suitable basis for an expert critiquing system because of the ongoing acceptance of medical protocols and the rise of both evidence-based practice and evidence-based protocols. A prerequisite for a critiquing system based on medical protocols is the ability to match the actions a physician performs in practice to actions prescribed by a protocol. Previous research has shown that this is quite difficult, due to the fact that computerized systems are unable to handle deviations from a protocol, which are common in the medical domain. Our solution to this problem is based on extracting the intention underlying a physician's action and uses the intention as the basis for matching performed actions to prescribed actions. We propose an algorithm for the intention-based matching process and we evaluate the matching algorithm on 12 cases of hyperbilirubinemia in healthy term newborns.

  13. National protocol framework for the inventory and monitoring of bees

    USGS Publications Warehouse

    Droege, Sam; Engler, Joseph D.; Sellers, Elizabeth A.; Lee O'Brien,

    2016-01-01

    This national protocol framework is a standardized tool for the inventory and monitoring of the approximately 4,200 species of native and non-native bee species that may be found within the National Wildlife Refuge System (NWRS) administered by the U.S. Fish and Wildlife Service (USFWS). However, this protocol framework may also be used by other organizations and individuals to monitor bees in any given habitat or location. Our goal is to provide USFWS stations within the NWRS (NWRS stations are land units managed by the USFWS such as national wildlife refuges, national fish hatcheries, wetland management districts, conservation areas, leased lands, etc.) with techniques for developing an initial baseline inventory of what bee species are present on their lands and to provide an inexpensive, simple technique for monitoring bees continuously and for monitoring and evaluating long-term population trends and management impacts. The latter long-term monitoring technique requires a minimal time burden for the individual station, yet can provide a good statistical sample of changing populations that can be investigated at the station, regional, and national levels within the USFWS’ jurisdiction, and compared to other sites within the United States and Canada. This protocol framework was developed in cooperation with the United States Geological Survey (USGS), the USFWS, and a worldwide network of bee researchers who have investigated the techniques and methods for capturing bees and tracking population changes. The protocol framework evolved from field and lab-based investigations at the USGS Bee Inventory and Monitoring Laboratory at the Patuxent Wildlife Research Center in Beltsville, Maryland starting in 2002 and was refined by a large number of USFWS, academic, and state groups. It includes a Protocol Introduction and a set of 8 Standard Operating Procedures or SOPs and adheres to national standards of protocol content and organization. The Protocol Narrative

  14. Optical protocols for terabit networks

    NASA Technical Reports Server (NTRS)

    Chua, P. L.; Lambert, J. L.; Morookian, J. M.; Bergman, L. A.

    1991-01-01

    This paper describes a new fiber-optic local area network technology providing 100X improvement over current technology, has full crossbar funtionality, and inherent data security. Based on optical code-division multiple access (CDMA), using spectral phase encoding/decoding of optical pulses, networking protocols are implemented entirely in the optical domain and thus conventional networking bottlenecks are avoided. Component and system issues for a proof-of-concept demonstration are discussed, as well as issues for a more practical and commercially exploitable system. Possible terrestrial and aerospace applications of this technology, and its impact on other technologies are explored. Some initial results toward realization of this concept are also included.

  15. Experimental quantum multiparty communication protocols

    NASA Astrophysics Data System (ADS)

    Smania, Massimiliano; Elhassan, Ashraf M.; Tavakoli, Armin; Bourennane, Mohamed

    2016-06-01

    Quantum information science breaks limitations of conventional information transfer, cryptography and computation by using quantum superpositions or entanglement as resources for information processing. Here we report on the experimental realisation of three-party quantum communication protocols using single three-level quantum system (qutrit) communication: secret-sharing, detectable Byzantine agreement and communication complexity reduction for a three-valued function. We have implemented these three schemes using the same optical fibre interferometric setup. Our realisation is easily scalable without compromising on detection efficiency or generating extremely complex many-particle entangled states.

  16. Analyzing the effect of routing protocols on media access control protocols in radio networks

    SciTech Connect

    Barrett, C. L.; Drozda, M.; Marathe, A.; Marathe, M. V.

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  17. A Self-Stabilizing Distributed Clock Synchronization Protocol for Arbitrary Digraphs

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.

    2011-01-01

    This report presents a self-stabilizing distributed clock synchronization protocol in the absence of faults in the system. It is focused on the distributed clock synchronization of an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. We present an outline of a deductive proof of the correctness of the protocol. A model of the protocol was mechanically verified using the Symbolic Model Verifier (SMV) for a variety of topologies. Results of the mechanical proof of the correctness of the protocol are provided. The model checking results have verified the correctness of the protocol as they apply to the networks with unidirectional and bidirectional links. In addition, the results confirm the claims of determinism and linear convergence. As a result, we conjecture that the protocol solves the general case of this problem. We also present several variations of the protocol and discuss that this synchronization protocol is indeed an emergent system.

  18. Analyse du comportement thermique du sol d'une serre agricole par simulation dynamique

    NASA Astrophysics Data System (ADS)

    Monteil, C.; Amouroux, M.

    1997-02-01

    The overall energetical behaviour of a greenhouse is significantly affected by diurnal storage and nocturnal release of energy inside the soil, which is the only element with high thermal capacitance. Its specific part is analysed with a pre-existing dynamic simulation model. The first part of this paper studies the effects of 4kinds of heating exchangers along each month of an entire cultivation period: hot air convector, aerial metallic pipes with hot water circulation, radiant mulch or buried pipes with warm water circulation. The second part develops the hourly behaviour of both greenhouse and soil during a cold standard-day with each of the 4exchangers. The third part is a sensibility study to various classes of factors in the case of hot air convector exchanger: climatic environment, control policy, intrinsic properties of the greenhouse (soil characteristics, crop density, cover transparency). Le comportement énergétique global d'une serre agricole est influencé de manière parfois importante par le stockage diurne et la restitution nocturne d'énergie au sein de son sol, seul élément à grande capacité thermique. Le rôle spécifique joué par le sol est analysé en appliquant un modèle de simulation dynamique déjà existant. Une première partie compare les effets de 4types d'échangeurs de chauffage sur chaque mois d'une période de culture : aérotherme, tubes aériens à circulation d'eau chaude, paillage radiant ou tubes enterrés à circulation d'eau tiède. Une seconde partie développe le comportement horaire de la serre et du sol pour une journée-type froide en présence de chacun des échangeurs. Une troisième partie précise la sensibilité du bilan thermique de la serre et du sol à différents types de facteurs dans le cas d'un échangeur par aérotherme: environnement climatique, politique de contrôle de la serre, propriétés intrinsèques de la serre (caractéristiques du sol, densité de culture, transparence de la couverture).

  19. c-Met inhibitor SU11274 enhances the response of the prostate cancer cell line DU145 to ionizing radiation

    SciTech Connect

    Yu, Hongliang; Li, Xiaoying; Sun, Shaoqian; Gao, Xianshu; Zhou, Demin

    2012-10-26

    Highlights: Black-Right-Pointing-Pointer c-Met inhibition could significantly enhance the radiosensitivity of DU145 cells. Black-Right-Pointing-Pointer The mechanisms of the radiosensitization effect of c-Met inhibition on DU145 cells were also presented in this paper. Black-Right-Pointing-Pointer This is the first study demonstrating the effectiveness of c-Met inhibition on treating HRPC cells with radiotherapy. -- Abstract: Hormone-refractory prostate cancer shows substantial resistance to most conventional therapies including radiotherapy, constitutes a key impediment to curing patients with the disease. c-Met overexpression plays a key role in prostate cancer tumorigenesis and disease progression. Here, we demonstrate that c-Met inhibition by SU11274 could significantly suppress cell survival and proliferation as well as enhance the radiosensitivity of DU145 cells. The underlying mechanisms of the effects of SU11274 on DU145 cells may include the inhibition of c-Met signaling, depolarization of the mitochondrial membrane potential, impairment of DNA repair function, abrogation of cell cycle arrest, and enhancement of cell death. Our study is the first to show the effectiveness of combining c-Met inhibition with ionizing radiation to cure hormone-refractory prostate cancer.

  20. New rapid multicolor PRINS protocol.

    PubMed

    Yan, Ju; Gadji, Macoura; Krabchi, Kada; Drouin, Régen

    2006-01-01

    In the multiple-color primed in situ labeling (multi-PRINS) technique, using ddNTPs between two PRINS reactions can block the free 3'-end generated in the previous PRINS reaction, thus avoiding the next PRINS reaction, using it as a primer to perform spurious elongation at nondesired sites. However, by omitting the blocking step and taking advantage of the color mixing, we developed a simple and rapid multi-PRINS technique to simultaneously detect three chromosomes in the same cell. With this protocol, one can create a third color using the two most common forms of labeled dUTP (biotin- and digoxigenin-labeled dUTP) and two fluorochromes (fluorescein and rhodamine). The signals at the centromeres of three different chromosomes displayed perfect yellow, red, and green colors, respectively. The entire procedure could be completed in less than 90 min because the blocking step was omitted. This protocol is practical and efficient for multi-PRINS so that even more than three chromosome targets could be detected in the same cell.

  1. Performance Analysis of the HTTP Protocol on Geostationary Satellite Links

    NASA Technical Reports Server (NTRS)

    Krus, Hans; Allman, Mark; Griner, Jim; Tran, Diepchi

    1998-01-01

    Various issues associated with HTTP protocol on geostationary satellite links are presented in viewgraph form. Specific topics include: 1) Network reference points; 2) The HTTP 1.0 and 1.1 mechanisms; 3) Experimental setup; 4) TCP and HTTP configuration; 5) Modelling slow start and 6) Results and future work.

  2. Primary-backup protocols: Lower bounds and optimal implementations

    NASA Technical Reports Server (NTRS)

    Budhiraja, Navin; Marzullo, Keith; Schneider, Fred B.; Toueg, Sam

    1992-01-01

    A formal specification of primary-backup is presented. We then prove lower bounds on the degree of replication, failover time, and worst-case response time to client requests assuming different failure models. Finally, we outline primary-backup protocols and indicate which of our lower bounds are tight.

  3. [Protocol for the treatment of severe acute pancreatitis with necrosis].

    PubMed

    Barreda, Luis; Targarona, Javier; Rodriguez, César

    2005-01-01

    The Severe Acute Pancreatic Unit of Edgardo Rebagliati Martins National Hospital was officially created in the year 2000. Up to date, we have cared for more than 195 patients with Pancreatic Necrosis. All of them have been treated under a management protocol presented by us. This has helped us to standardize treatment and also to compare results with work groups around the world. This Protocol comes from our own experience and that of our colleagues abroad with a wide knowledge in this kind of pathology abroad, with whom we maintain close ties.

  4. Numerical analysis of decoy state quantum key distribution protocols

    SciTech Connect

    Harrington, Jim W; Rice, Patrick R

    2008-01-01

    Decoy state protocols are a useful tool for many quantum key distribution systems implemented with weak coherent pulses, allowing significantly better secret bit rates and longer maximum distances. In this paper we present a method to numerically find optimal three-level protocols, and we examine how the secret bit rate and the optimized parameters are dependent on various system properties, such as session length, transmission loss, and visibility. Additionally, we show how to modify the decoy state analysis to handle partially distinguishable decoy states as well as uncertainty in the prepared intensities.

  5. Protocols for configuring computation loops on a distributed multiprocessor system

    SciTech Connect

    Woei Lin; Chuan-lin Wu

    1983-01-01

    Protocols for configuring computation loops in a multiprocessing system are examined. Processing nodes are connected by a reconfigurable communication subnet using a multistage interconnection network. Configuration protocols are presented in terms of distributed algorithms such that processing nodes are configured in loop topologies. The configurability of loop topologies is first investigated. It is verified that the communication subnet can emulate loop distributed systems. It is also proven that multiple loops of various lengths can be configured in the distributed network. The technique demonstrated for configuring loop topologies can be used to configure other computation topologies. 6 references.

  6. Relationship between semi- and fully-device-independent protocols

    NASA Astrophysics Data System (ADS)

    Li, Hong-Wei; Mironowicz, Piotr; Pawłowski, Marcin; Yin, Zhen-Qiang; Wu, Yu-Chun; Wang, Shuang; Chen, Wei; Hu, Hong-Gang; Guo, Guang-Can; Han, Zheng-Fu

    2013-02-01

    We study the relation between semi- and fully-device-independent protocols. As a tool, we use the correspondence between Bell inequalities and dimension witnesses. We present a method for converting the former into the latter, and vice versa. This relation provides us with interesting results for both scenarios. First, we find random-number-generation protocols with higher bit rates for both the semi- and fully-device-independent cases. As a byproduct, we obtain classes of Bell inequalities and dimension witnesses. Then, we show how optimization methods used in studies on Bell inequalities can be adopted for dimension witnesses.

  7. Parallelized control protocols for high-performance routers

    NASA Astrophysics Data System (ADS)

    Yu, Shao-hua; Ji, Meng

    2005-11-01

    This paper proposes a novel parallelized architecture for control protocols in high-performance routers (HPRs). Unlike traditional centralized manner, this approach distributes the functionality of control plane protocols within a router and achieves scalability by selectively off-loading certain link-layer and interface operations to data plane processing components. This paper presents the design and implementation of this method on a 320Gbps distributed router. The experiment results show that the proposed scheme can yield better performance and faster response than the centralized approach.

  8. Family of loss-tolerant quantum coin-flipping protocols

    SciTech Connect

    Aharon, N.; Massar, S.; Silman, J.

    2010-11-15

    We present a family of loss-tolerant quantum strong-coin-flipping protocols, each protocol differing in the number of qubits employed. For a single qubit we obtain a bias of 0.4, reproducing the result of Berlin et al. [Phys. Rev. A 80, 062321 (2009)], while for two qubits we obtain a bias of 0.3975. Numerical evidence based on semidefinite programming indicates that the bias continues to decrease as the number of qubits increases but at a small rate.

  9. SDL design of MPLS routing protocol in the private network

    NASA Astrophysics Data System (ADS)

    Yang, Yang; Lu, Yang; Lin, Xiaokang

    2005-02-01

    Nowadays multi-protocol label switching (MPLS) technology has achieved great popularity in the world. Because MPLS adopts the scheme of "route once and switch many", routing is the key element to ensure packets are transmitted to destinations. Though there are many designs of MPLS routing protocol for public networks, they can hardly fit the private network very well for its special characteristics. This paper presents the design of MPLS routing protocol in the private network using the specification and description language (SDL), which is an object-oriented formal language and mainly used in communications area. In our design the whole autonomous system (AS) is regarded as a single area to reduce the number of protocol packets. The SDL module of MPLS routing protocol consists of four kinds of processes, namely Management, Checking, NeigSession and LSADbase. Simulations of the SDL design are run in many scenarios, the results of which indicate that the SDL module is manageable and the overall performance is satisfying. From our design and simulation experience, we find that the software development cycle can be drastically reduced by the use of SDL, and the code is easy to maintain and reuse.

  10. Data structure of search & compare (S&C) reservation protocol

    NASA Astrophysics Data System (ADS)

    Markovič, Miroslav; Dubovan, Jozef; Dado, Milan; Benedikovič, Daniel; Litvík, Ján.

    2012-01-01

    On the present time, the most used technology of core networks is Wavelength-division multiplexing (WDM) which save a lot of bandwidth of optical fiber. But in each node all optical signals must be converted into the electrical domain, processed and converted back into the optical domain. Result of all these steps is that the data spend in the node a lot of time. This time decreases total available bandwidth in the optical networks. One of the results is that we compose WDM nodes which represent hybrid system of switching and controlling. If we use out-of-band signalizing it is simpler to separate control head from the data. For effective control and transmission of data over the optical networks, the reservation protocols are needed in WDM/OBS4,5. In today's networks exist a lot of the protocols, which have their own advantages and disadvantages. For our investigation it was chosen the reservation protocol called Search & Compare (S &C)1, because it uses parallel-segment based and parallel link reservation. The structure of data will be designed from the point of view of wavelength for transmission channels, length of optical burst, source and group addresses in the segment, number of nodes and the total time needed for switching. Structure of the protocol will contain all of the control messages which are necessary for reservation a path along all segments. The design of the protocol follows the ITU-T recommendation2,3.

  11. Study on Cloud Security Based on Trust Spanning Tree Protocol

    NASA Astrophysics Data System (ADS)

    Lai, Yingxu; Liu, Zenghui; Pan, Qiuyue; Liu, Jing

    2015-09-01

    Attacks executed on Spanning Tree Protocol (STP) expose the weakness of link layer protocols and put the higher layers in jeopardy. Although the problems have been studied for many years and various solutions have been proposed, many security issues remain. To enhance the security and credibility of layer-2 network, we propose a trust-based spanning tree protocol aiming at achieving a higher credibility of LAN switch with a simple and lightweight authentication mechanism. If correctly implemented in each trusted switch, the authentication of trust-based STP can guarantee the credibility of topology information that is announced to other switch in the LAN. To verify the enforcement of the trusted protocol, we present a new trust evaluation method of the STP using a specification-based state model. We implement a prototype of trust-based STP to investigate its practicality. Experiment shows that the trusted protocol can achieve security goals and effectively avoid STP attacks with a lower computation overhead and good convergence performance.

  12. Adult Rhabdomyosarcoma Survival Improved With Treatment on Multimodality Protocols

    SciTech Connect

    Gerber, Naamit Kurshan; Wexler, Leonard H.; Singer, Samuel; Alektiar, Kaled M.; Keohan, Mary Louise; Shi, Weiji; Zhang, Zhigang; Wolden, Suzanne

    2013-05-01

    Purpose: Rhabdomyosarcoma (RMS) is a pediatric sarcoma rarely occurring in adults. For unknown reasons, adults with RMS have worse outcomes than do children. Methods and Materials: We analyzed data from all patients who presented to Memorial Sloan-Kettering Cancer Center between 1990 and 2011 with RMS diagnosed at age 16 or older. One hundred forty-eight patients met the study criteria. Ten were excluded for lack of adequate data. Results: The median age was 28 years. The histologic diagnoses were as follows: embryonal 54%, alveolar 33%, pleomorphic 12%, and not otherwise specified 2%. The tumor site was unfavorable in 67% of patients. Thirty-three patients (24%) were at low risk, 61 (44%) at intermediate risk, and 44 (32%) at high risk. Forty-six percent were treated on or according to a prospective RMS protocol. The 5-year rate of overall survival (OS) was 45% for patients with nonmetastatic disease. The failure rates at 5 years for patients with nonmetastatic disease were 34% for local failure and 42% for distant failure. Among patients with nonmetastatic disease (n=94), significant factors associated with OS were histologic diagnosis, site, risk group, age, and protocol treatment. On multivariate analysis, risk group and protocol treatment were significant after adjustment for age. The 5-year OS was 54% for protocol patients versus 36% for nonprotocol patients. Conclusions: Survival in adult patients with nonmetastatic disease was significantly improved for those treated on RMS protocols, most of which are now open to adults.

  13. When Cri du chat syndrome meets Edwards syndrome.

    PubMed

    Xie, Yingjun; Zhou, Yi; Wu, Jianzhu; Sun, Yunxia; Chen, Yongzhen; Chen, Baojiang

    2015-03-01

    It has been well established that the 5p deletion causes Cri du chat syndrome, typically characterized by a cat‑like cry, and that duplication of 18q causes Edwards syndrome; the two are rare genetic abnormalities that separately lead to physical and mental impairments. However, the severity of the clinicopathological characteristics that arise when these two aberrations occur in one patient is unknown. Here, the first case in our knowledge of a single patient (a two‑year‑old female) with 5p partial monosomy and 18q partial trisomy is described. In the present study, chromosome microarray analysis was performed, which identified the imbalance of chromosomes 5 and 18 in the patient. The chromosome aberrations were further confirmed by fluorescence in situ hybridization. By comparing the phenotypes of combined case with those of the individual syndromes, severe clinical phenotypes of the 5p (5p15.33‑p13.3) deletion were confirmed, however, the net effect of the duplication of 18q22.3‑q23 was not determined, as this duplication only appeared to have a weak effect on the patient's phenotypes. The correlation between these chromosomal aberrations and their clinical features has implications for the identification of critical regions of 5p and 18q, particularly for the functional mapping of chromosome 18.

  14. Cri du chat syndrome: a critical review.

    PubMed

    Rodríguez-Caballero, Angela; Torres-Lagares, Daniel; Rodríguez-Pérez, Antonio; Serrera-Figallo, María-Angeles; Hernández-Guisado, José-María; Machuca-Portillo, Guillermo

    2010-05-01

    A new syndrome was identified in 1963, when Lejeune et al. reported a genetic disease resulting from a partial or total deletion on the short arm of chromosome 5 (5p-) and named it the cri du chat syndrome (CdCS). This term makes reference to the main clinical feature of the syndrome, a high-pitched monochromatic cat-like crying, that usually disappears in the first years of life. CdCS is one of the most common chromosomal deletion syndromes in humans, with an incidence of 1:15.000-1:50.000 live-births. Our purpose was to review different aspects of this syndrome (concept, epidemiology, aetiology, clinical features, diagnostic methods and prognosis) emphasizing both: the breakthrough in this field introduced by new cytogenetic and molecular techniques, and the orofacial manifestations most frequently reported. The main orofacial anomalies registered were mandibular microretrognathia, high palate but rarely cleft, variable malocclusion (frequently anterior open-bite), enamel hypoplasia, poor oral hygiene, generalized chronic periodontitis, and retardation of tooth eruption, although there is not enough evidence to support any clear association between these pathologies and the CdCS.

  15. [Investigation of acupoints on Du (governor) channel].

    PubMed

    Zhang, Jian-bin; Wang, Ling-ling

    2006-07-01

    The origin and variation of acupoints on the Du channel are investigated by analyzing and studying the number and distribution of points recorded in the ancient medical works. It is found that the amount and distribution of the points were different in different ages. The distributions of the points were not only located on the midline of the face, head, nape and posterior midline but also on both sides of the spine from the period of Neijing (Inner Canon) to that of Zhenjiu Jiayi Jing (A-B Classic of Acupuncture and Moxibustion). Since the period of Tongren Shuxue Zhenjiu Tujing (Illustration Classic of Acupoints on Bronze Statue) in the Song dynasty, only those points of the midline from the face, nape to the spine are remained there until now. Meanwhile, the amount of points were also varied because of the cognition to the points on the spine. Huangdi Neijing Taisu (Grand Simplicity of Inner Canon of Huangdi) compiled in the Tang Dynasty first mentioned the arguments about the varied points on the channel. The records by Yang Shangshan and Wang Bing indicate that the main differences on the cognition of the channel andits points appeared during the period of the Tang Dynasty to the Song Dynasty.

  16. Mise à jour sur le nouveau vaccin 9-valent pour la prévention du virus du papillome humain

    PubMed Central

    Yang, David Yi; Bracken, Keyna

    2016-01-01

    Résumé Objectif Informer les médecins de famille quant à l’efficacité, à l’innocuité, aux effets sur la santé publique et à la rentabilité du vaccin 9-valent contre le virus du papillome humain (VPH). Qualité des données Des articles pertinents publiés dans PubMed jusqu’en mai 2015 ont été examinés et analysés. La plupart des données citées sont de niveau I (essais randomisés et contrôlés et méta-analyses) ou de niveau II (études transversales, cas-témoins et épidémiologiques). Des rapports et recommandations du gouvernement sont aussi cités en référence. Message principal Le vaccin 9-valent contre le VPH, qui offre une protection contre les types 6, 11, 16, 18, 31, 33, 45, 52 et 58 du VPH, est sûr et efficace et réduira encore plus l’incidence des infections à VPH, de même que les cas de cancer lié au VPH. Il peut également protéger indirectement les personnes non immunisées par l’entremise du phénomène d’immunité collective. Un programme d’immunisation efficace peut prévenir la plupart des cancers du col de l’utérus. Les analyses montrent que la rentabilité du vaccin 9-valent chez les femmes est comparable à celle du vaccin quadrivalent original contre le VPH (qui protège contre les types 6, 11, 16 et 18 du VPH) en usage à l’heure actuelle. Toutefois, il faut investiguer plus en profondeur l’utilité d’immuniser les garçons avec le vaccin 9-valent contre le VPH. Conclusion en plus d’être sûr, le vaccin 9-valent protège mieux contre le VPH que le vaccin quadrivalent. Une analyse coûtefficacité en favorise l’emploi, du moins chez les adolescentes. Ainsi, les médecins devraient recommander le vaccin 9-valent à leurs patients plutôt que le vaccin quadrivalent contre le VPH.

  17. Nurse driven protocol for head injured patients on warfarin.

    PubMed

    Bair, Holly; Ivascu, Felicia; Janczyk, Randy; Nittis, Tara; Bendick, Philip; Howells, Greg

    2005-01-01

    The trauma quality improvement committee at our facility identified a significant number of patients on warfarin presenting to the emergency center after minor head trauma that subsequently expired from their intracranial hemorrhage prior to appropriate intervention. An analysis of this patient population identified multiple areas of delay. A collaborative effort between the emergency center nurses and the trauma service personnel resulted in a formal protocol to address each component of delay and expedite the process. Since implementation of this nursing driven protocol we have dramatically decreased the time to (1) Emergency Center Physician evaluation, (2) completion of head computerized tomography, (3) reversal of anticoagulation with fresh frozen plasma (FFP), and (4) most importantly, patient mortality rate. We conclude that this nursing driven protocol is effective in decreasing the mortality rate by eliminating diagnostic and therapeutic delays in this high-risk patient population.

  18. BioBlocks: Programming Protocols in Biology Made Easier.

    PubMed

    Gupta, Vishal; Irimia, Jesús; Pau, Iván; Rodríguez-Patón, Alfonso

    2017-01-24

    The methods to execute biological experiments are evolving. Affordable fluid handling robots and on-demand biology enterprises are making automating entire experiments a reality. Automation offers the benefit of high-throughput experimentation, rapid prototyping, and improved reproducibility of results. However, learning to automate and codify experiments is a difficult task as it requires programming expertise. Here, we present a web-based visual development environment called BioBlocks for describing experimental protocols in biology. It is based on Google's Blockly and Scratch, and requires little or no experience in computer programming to automate the execution of experiments. The experiments can be specified, saved, modified, and shared between multiple users in an easy manner. BioBlocks is open-source and can be customized to execute protocols on local robotic platforms or remotely, that is, in the cloud. It aims to serve as a de facto open standard for programming protocols in Biology.

  19. A flexible acquisition cycle for incompletely defined fieldbus protocols.

    PubMed

    Gaitan, Vasile-Gheorghita; Gaitan, Nicoleta-Cristina; Ungurean, Ioan

    2014-05-01

    Real time data-acquisition from fieldbuses strongly depends on the network type and protocol used. Currently, there is an impressive number of fieldbuses, some of them are completely defined and others are incompletely defined. In those from the second category, the time variable, the main element in real-time data acquisition, does not appear explicitly. Examples include protocols such as Modbus ASCII/RTU, M-bus, ASCII character-based, and so on. This paper defines a flexible acquisition cycle based on the Master-Slave architecture that can be implemented on a Master station, called a Base Station Gateway (BSG). The BSG can add a timestamp for temporal location of data. It also presents a possible extension for the Modbus protocol, developed as simple and low cost solution based on existing hardware.

  20. A Survey on Clustering Routing Protocols in Wireless Sensor Networks

    PubMed Central

    Liu, Xuxun

    2012-01-01

    The past few years have witnessed increased interest in the potential use of wireless sensor networks (WSNs) in a wide range of applications and it has become a hot research area. Based on network structure, routing protocols in WSNs can be divided into two categories: flat routing and hierarchical or clustering routing. Owing to a variety of advantages, clustering is becoming an active branch of routing technology in WSNs. In this paper, we present a comprehensive and fine grained survey on clustering routing protocols proposed in the literature for WSNs. We outline the advantages and objectives of clustering for WSNs, and develop a novel taxonomy of WSN clustering routing methods based on complete and detailed clustering attributes. In particular, we systematically analyze a few prominent WSN clustering routing protocols and compare these different approaches according to our taxonomy and several significant metrics. Finally, we summarize and conclude the paper with some future directions. PMID:23112649

  1. Distributed Dynamic Host Configuration Protocol (D2HCP).

    PubMed

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    Mobile Ad Hoc Networks (MANETs) are multihop wireless networks of mobile nodes without any fixed or preexisting infrastructure. The topology of these networks can change randomly due to the unpredictable mobility of nodes and their propagation characteristics. In most networks, including MANETs, each node needs a unique identifier to communicate. This work presents a distributed protocol for dynamic node IP address assignment in MANETs. Nodes of a MANET synchronize from time to time to maintain a record of IP address assignments in the entire network and detect any IP address leaks. The proposed stateful autoconfiguration scheme uses the OLSR proactive routing protocol for synchronization and guarantees unique IP addresses under a variety of network conditions, including message losses and network partitioning. Simulation results show that the protocol incurs low latency and communication overhead for IP address assignment.

  2. Distributed Dynamic Host Configuration Protocol (D2HCP)

    PubMed Central

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    Mobile Ad Hoc Networks (MANETs) are multihop wireless networks of mobile nodes without any fixed or preexisting infrastructure. The topology of these networks can change randomly due to the unpredictable mobility of nodes and their propagation characteristics. In most networks, including MANETs, each node needs a unique identifier to communicate. This work presents a distributed protocol for dynamic node IP address assignment in MANETs. Nodes of a MANET synchronize from time to time to maintain a record of IP address assignments in the entire network and detect any IP address leaks. The proposed stateful autoconfiguration scheme uses the OLSR proactive routing protocol for synchronization and guarantees unique IP addresses under a variety of network conditions, including message losses and network partitioning. Simulation results show that the protocol incurs low latency and communication overhead for IP address assignment. PMID:22163856

  3. A practical approach to the interGroup protocols

    SciTech Connect

    Berket, Karlo; Agarwal, Deborah A.; Chevassut, Olivier

    2001-11-12

    Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces an unusual approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable timestamp ordered. We also present a secure group layer that builds on InterGroup to provide SSL-like security for groups.

  4. Reporting of planned statistical methods in published surgical randomised trial protocols: a protocol for a methodological systematic review

    PubMed Central

    Madden, Kim; Arseneau, Erika; Evaniew, Nathan; Smith, Christopher S; Thabane, Lehana

    2016-01-01

    Introduction Poor reporting can lead to inadequate presentation of data, confusion regarding research methodology used, selective reporting of results, and other misinformation regarding health research. One of the most recent attempts to improve quality of reporting comes from the Standard Protocol Items: Recommendations for Interventional Trials (SPIRIT) Group, which makes recommendations for the reporting of protocols. In this report, we present a protocol for a systematic review of published surgical randomised controlled trial (RCT) protocols, with the purpose of assessing the reporting quality and completeness of the statistical aspects. Methods We will include all published protocols of randomised trials that investigate surgical interventions. We will search MEDLINE, EMBASE, and CENTRAL for relevant studies. Author pairs will independently review all titles, abstracts, and full texts identified by the literature search, and extract data using a structured data extraction form. We will extract the following: year of publication, country, sample size, description of study population, description of intervention and control, primary outcome, important methodological qualities, and quality of reporting of planned statistical methods based on the SPIRIT guidelines. Ethics and dissemination The results of this review will demonstrate the quality of statistical reporting of published surgical RCT protocols. This knowledge will inform recommendations to surgeons, researchers, journal editors and peer reviewers, and other knowledge users that focus on common deficiencies in reporting and how to rectify them. Ethics approval for this study is not required. We will disseminate the results of this review in peer-reviewed publications and conference presentations, and at a doctoral independent study of oral defence. PMID:27259528

  5. Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis

    PubMed Central

    Alanazi, Adwan; Elleithy, Khaled

    2015-01-01

    Many routing protocols have been proposed for wireless sensor networks. These routing protocols are almost always based on energy efficiency. However, recent advances in complementary metal-oxide semiconductor (CMOS) cameras and small microphones have led to the development of Wireless Multimedia Sensor Networks (WMSN) as a class of wireless sensor networks which pose additional challenges. The transmission of imaging and video data needs routing protocols with both energy efficiency and Quality of Service (QoS) characteristics in order to guarantee the efficient use of the sensor nodes and effective access to the collected data. Also, with integration of real time applications in Wireless Senor Networks (WSNs), the use of QoS routing protocols is not only becoming a significant topic, but is also gaining the attention of researchers. In designing an efficient QoS routing protocol, the reliability and guarantee of end-to-end delay are critical events while conserving energy. Thus, considerable research has been focused on designing energy efficient and robust QoS routing protocols. In this paper, we present a state of the art research work based on real-time QoS routing protocols for WMSNs that have already been proposed. This paper categorizes the real-time QoS routing protocols into probabilistic and deterministic protocols. In addition, both categories are classified into soft and hard real time protocols by highlighting the QoS issues including the limitations and features of each protocol. Furthermore, we have compared the performance of mobility-aware query based real-time QoS routing protocols from each category using Network Simulator-2 (NS2). This paper also focuses on the design challenges and future research directions as well as highlights the characteristics of each QoS routing protocol. PMID:26364639

  6. Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis.

    PubMed

    Alanazi, Adwan; Elleithy, Khaled

    2015-09-02

    Many routing protocols have been proposed for wireless sensor networks. These routing protocols are almost always based on energy efficiency. However, recent advances in complementary metal-oxide semiconductor (CMOS) cameras and small microphones have led to the development of Wireless Multimedia Sensor Networks (WMSN) as a class of wireless sensor networks which pose additional challenges. The transmission of imaging and video data needs routing protocols with both energy efficiency and Quality of Service (QoS) characteristics in order to guarantee the efficient use of the sensor nodes and effective access to the collected data. Also, with integration of real time applications in Wireless Senor Networks (WSNs), the use of QoS routing protocols is not only becoming a significant topic, but is also gaining the attention of researchers. In designing an efficient QoS routing protocol, the reliability and guarantee of end-to-end delay are critical events while conserving energy. Thus, considerable research has been focused on designing energy efficient and robust QoS routing protocols. In this paper, we present a state of the art research work based on real-time QoS routing protocols for WMSNs that have already been proposed. This paper categorizes the real-time QoS routing protocols into probabilistic and deterministic protocols. In addition, both categories are classified into soft and hard real time protocols by highlighting the QoS issues including the limitations and features of each protocol. Furthermore, we have compared the performance of mobility-aware query based real-time QoS routing protocols from each category using Network Simulator-2 (NS2). This paper also focuses on the design challenges and future research directions as well as highlights the characteristics of each QoS routing protocol.

  7. Simple protocols for oblivious transfer and secure identification in the noisy-quantum-storage model

    SciTech Connect

    Schaffner, Christian

    2010-09-15

    We present simple protocols for oblivious transfer and password-based identification which are secure against general attacks in the noisy-quantum-storage model as defined in R. Koenig, S. Wehner, and J. Wullschleger [e-print arXiv:0906.1030]. We argue that a technical tool from Koenig et al. suffices to prove security of the known protocols. Whereas the more involved protocol for oblivious transfer from Koenig et al. requires less noise in storage to achieve security, our ''canonical'' protocols have the advantage of being simpler to implement and the security error is easier control. Therefore, our protocols yield higher OT rates for many realistic noise parameters. Furthermore, a proof of security of a direct protocol for password-based identification against general noisy-quantum-storage attacks is given.

  8. Serial link protocol design: a critique of the X. 25 standard, Level 2

    SciTech Connect

    Fletcher, J.G.

    1983-10-25

    There are certain technical design principles for link communication protocols which, if followed, result in a protocol that is less complex in both concept and implementation, but at the same time provides better service, than if the principles are not followed. These principles include modularization into subprotocols, symmetry between the nodes on the link, and use of the state-exchange model of a conversation rather than the command-response model. The principles are described, the extent to which they are followed by the standard protocol X.25, level 2, is examined, and a protocol adhering to them is presented.

  9. Comments on the "Byzantine Self-Stabilizing Pulse Synchronization" Protocol: Counter-examples

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.; Siminiceanu, Radu

    2006-01-01

    Embedded distributed systems have become an integral part of many safety-critical applications. There have been many attempts to solve the self-stabilization problem of clocks across a distributed system. An analysis of one such protocol called the Byzantine Self-Stabilizing Pulse Synchronization (BSS-Pulse-Synch) protocol from a paper entitled "Linear Time Byzantine Self-Stabilizing Clock Synchronization" by Daliot, et al., is presented in this report. This report also includes a discussion of the complexity and pitfalls of designing self-stabilizing protocols and provides counter-examples for the claims of the above protocol.

  10. An arbitrated quantum signature protocol based on the chained CNOT operations encryption

    NASA Astrophysics Data System (ADS)

    Li, Feng-Guang; Shi, Jian-Hong

    2015-06-01

    At present, the encryption scheme used by most arbitrated quantum signature (AQS) protocols is quantum one-time pad (QOTP) which encrypts data qubit by qubit. Though QOTP can achieve high security for data encryption, it is not suitable for AQS. There are many attacks on AQS using QOTP. In this paper, we propose an AQS protocol based on another encryption scheme called the chained CNOT operations, which encrypts quantum message ensemble. Our protocol preserves all merits in the similar AQS schemes and has better security. Security analysis shows that our protocol cannot be forged and disavowed under the existing attacks.

  11. Hand Self-Wiping Protocol for the Investigation of Lead Exposure in the Workplace

    PubMed Central

    Gorce, Jean-Philippe; Roff, Martin

    2015-01-01

    The purpose of this project was to develop and validate a hand wiping protocol to be used by occupational hygienists, scientists, or other competent persons, measuring skin exposure to lead in workplaces. Inadvertent lead ingestion is likely to occur once the hands of employees have become contaminated. Ideally, a hand wiping protocol should maximize the recovery of lead-based residues present on employees’ hands in a cost-effective and reproducible manner. This article describes an effective and practical hand wiping procedure. Here, two standardized protocols (A and B) are designed. Protocol A is a self-wiping protocol requiring employees to wipe their own hands using four separate and successive wipes. Protocol B involves a scientist wiping the hands of employees using four wipes, followed by employees self-wiping their hands using two wipes (total of six wipes). Both protocols are defined by four wipe passes over each hand using Ghost wipes. Because this study took place in the workplace rather than in a simulated laboratory environment, only the relative (i.e., not absolute) removal efficiencies of the hand wiping protocols have been assessed. The two protocols were first evaluated at a double glazing panel manufacturing site where between 248 μg and 4544 μg of lead was found on employees’ hands. A statistical analysis (t-test) on the mean relative lead levels recovered in the first parts of the protocols indicated that Protocol A was more efficient than Protocol B (73% for Protocol A vs. 65% for Protocol B). The relative recovery of the combined first two passes against the combined first three passes also confirmed the greater efficiency of Protocol A (83.3% for Protocol A vs. 76.5% for Protocol B). However, lead levels recovered on the fourth pass remain significant at more than 10% of the total recovered loadings. Nonetheless, Protocol A was preferred and further evaluated at a lead battery manufacturing site where between 149 μg and 18,784

  12. Optical protocols for advanced spacecraft networks

    NASA Technical Reports Server (NTRS)

    Bergman, Larry A.

    1991-01-01

    Most present day fiber optic networks are in fact extensions of copper wire networks. As a result, their speed is still limited by electronics even though optics is capable of running three orders of magnitude faster. Also, the fact that photons do not interact with one another (as electrons do) provides optical communication systems with some unique properties or new functionality that is not readily taken advantage of with conventional approaches. Some of the motivation for implementing network protocols in the optical domain, a few possible approaches including optical code-division multiple-access (CDMA), and how this class of networks can extend the technology life cycle of the Space Station Freedom (SSF) with increased performance and functionality are described.

  13. Tactical medicine -- the Israeli revised protocol.

    PubMed

    Waldman, Maor; Richman, Aaron; Shapira, Shmuel C

    2012-01-01

    Limited conflicts and the war against terrorism, in particular, have changed the emphasis in the present trend from preparing to cope with full-scale wars to the need to combat in limited conflicts. This shift has affected significantly medical units' preparations. Law enforcement organizations have come together with medical first responders in a combined new model. This model is supposed to be adopted and utilized in combat and evolved from the civilian model toward a modus operandi that combines the tactical and medical protocols into a single algorithm, the "Tactical Combat Casualty Care" (TCCC). This TCCC model is believed to enhance the mutual understanding and cooperation of tactical and medical forces in combat and especially amongst special military units. Utilizing the model will be achieved by the development of well-matched standard operating procedures and sharing drills. All these acts are hoped to improve safety of the participating units and hopefully also the medical outcomes.

  14. Regional rainfall-runoff relations for simulation of streamflow for watersheds in Du Page County, Illinois

    USGS Publications Warehouse

    Duncker, James J.; Melching, Charles S.

    1998-01-01

    Rainfall and streamflow data collected from July 1986 through September 1993 were utilized to calibrate and verify a continuous-simulation rainfall-runoff model for three watersheds (11.8--18.0 square miles in area) in Du Page County. Classification of land cover into three categories of pervious (grassland, forest/wetland, and agricultural land) and one category of impervious subareas was sufficient to accurately simulate the rainfall-runoff relations for the three watersheds. Regional parameter sets were obtained by calibrating jointly all parameters except fraction of ground-water inflow that goes to inactive ground water (DEEPFR), interflow recession constant (IRC), and infiltration (INFILT) for runoff from all three watersheds. DEEPFR and IRC varied among the watersheds because of physical differences among the watersheds. Two values of INFILT were obtained: one representing the rainfall-runoff process on the silty and clayey soils on the uplands and lake plains that characterize Sawmill Creek, St. Joseph Creek, and eastern Du Page County; and one representing the rainfall-runoff process on the silty soils on uplands that characterize Kress Creek and parts of western Du Page County. Regional rainfall-runoff relations, defined through joint calibration of the rainfall-runoff model and verified for independent periods, presented in this report, allow estimation of runoff for watersheds in Du Page County with an error in the total water balance less than 4.0 percent; an average absolute error in the annual-flow estimates of 17.1 percent with the error rarely exceeding 25 percent for annual flows; and correlation coefficients and coefficients of model-fit efficiency for monthly flows of at least 87 and 76 percent, respectively. Close reproduction of the runoff-volume duration curves was obtained. A frequency analysis of storm-runoff volume indicates a tendency of the model to undersimulate large storms, which may result from underestimation of the amount of

  15. Is the flexible GnRH antagonist protocol better suited for fresh eSET cycles?

    PubMed

    Dahdouh, Elias M; Gomes, Francisco L A F; Granger, Louis; Carranza-Mamane, Belina; Faruqi, Faez; Kattygnarath, Tiao-Virirak; St-Michel, Pierre

    2014-10-01

    Objectif : La présente étude visait à évaluer l’efficacité d’un protocole flexible ayant recours à des antagonistes de la GnRH, par comparaison avec celle d’un protocole long ayant recours à des agonistes de la GnRH, relativement au transfert sélectif d’un seul embryon (TsSE). L’étude a été menée dans le cadre d’un programme de fécondation in vitro financé par l’État. Méthodes : Nous avons effectué une analyse de cohorte prospective au moyen de données issues d’une clinique de fertilité privée, pour ce qui est de la période d’août 2010 à août 2011. Trois cent quatorze femmes présentant une réserve ovarienne normale et se soumettant à des cycles de TsSE frais ont été admises à l’étude. Un protocole flexible ayant recours à des antagonistes de la GnRH a été utilisé chez 64 femmes, aux fins de la stimulation folliculaire, tandis qu’un protocole long en phase lutéale standard ayant recours à des agonistes de la GnRH a été utilisé chez 250 autres femmes. Résultats : Les taux d’implantation (35,9 % au sein du groupe « antagonistes de la GnRH » et 29,6 % au sein du groupe « agonistes de la GnRH », P = 0,5) et les taux de grossesse en cours (32,8 % au sein du groupe « antagonistes de la GnRH » et 28,8 % au sein du groupe « agonistes de la GnRH », P = 0,5) étaient équivalents dans les deux groupes. La durée de la stimulation (9,8 jours ± 2 jours vs 10,7 jours ± 1,8 jour, P < 0,001) et la dose totale de FSH requise (2 044 vs 2 775 UI, P < 0,001) étaient moins élevées au sein du groupe « antagonistes de la GnRH », par comparaison avec le groupe « agonistes de la GnRH ». Le nombre d’ovocytes matures (6,0 vs 10,0, P < 0,001) et le nombre d’embryons (5,0 vs 7,0, P < 0,001) étaient également moins élevés au sein du groupe « antagonistes de la GnRH ». Cependant, le nombre d’embryons cryoconservés était similaire dans les deux groupes (médiane : 2,0, P = 0

  16. Intelligent routing protocol for ad hoc wireless network

    NASA Astrophysics Data System (ADS)

    Peng, Chaorong; Chen, Chang Wen

    2006-05-01

    A novel routing scheme for mobile ad hoc networks (MANETs), which combines hybrid and multi-inter-routing path properties with a distributed topology discovery route mechanism using control agents is proposed in this paper. In recent years, a variety of hybrid routing protocols for Mobile Ad hoc wireless networks (MANETs) have been developed. Which is proactively maintains routing information for a local neighborhood, while reactively acquiring routes to destinations beyond the global. The hybrid protocol reduces routing discovery latency and the end-to-end delay by providing high connectivity without requiring much of the scarce network capacity. On the other side the hybrid routing protocols in MANETs likes Zone Routing Protocol still need route "re-discover" time when a route between zones link break. Sine the topology update information needs to be broadcast routing request on local zone. Due to this delay, the routing protocol may not be applicable for real-time data and multimedia communication. We utilize the advantages of a clustering organization and multi-routing path in routing protocol to achieve several goals at the same time. Firstly, IRP efficiently saves network bandwidth and reduces route reconstruction time when a routing path fails. The IRP protocol does not require global periodic routing advertisements, local control agents will automatically monitor and repair broke links. Secondly, it efficiently reduces congestion and traffic "bottlenecks" for ClusterHeads in clustering network. Thirdly, it reduces significant overheads associated with maintaining clusters. Fourthly, it improves clusters stability due to dynamic topology changing frequently. In this paper, we present the Intelligent Routing Protocol. First, we discuss the problem of routing in ad hoc networks and the motivation of IRP. We describe the hierarchical architecture of IRP. We describe the routing process and illustrate it with an example. Further, we describe the control manage

  17. A novel interactive electronic protocol review system.

    PubMed

    Lewis, T W; Herbert, J H; Barrett, J; Lamprecht, E G

    2001-09-01

    This report describes a new protocol review system which was designed as a Lotus Notes database. This system encompasses all elements of investigator protocol generation, review and approval by the laboratory animal veterinarian and institutional animal care and use committee (IACUC), and notification of approval to personnel responsible for animal ordering. Unique features of the system are interactive dialog between IACUC members and the investigator and confidential protocol discussion among IACUC members. The advantages of the system are multiple: 1. it allows for interactive protocol discussion online; 2. it is an essentially paperless process; 3. inclusion of the outside IACUC member is easily accomplished by using an offsite personal computer and secure remote local-area network access; 4. the time required for protocol generation, review, and approval is streamlined due to the automatic features of the database and the speed of e-mail; and 5. all documentation relating to the protocol and the approval process is archived online.

  18. [The research protocol. Part I].

    PubMed

    Miranda-Novales, María Guadalupe; Villasís-Keever, Miguel Ángel

    2015-01-01

    One of the principal aims in research is the publication of the study in scientific journals. This implies two challenges: the first one, the election of an adequate research design, and the second one, the concrete and simple wording of the results for the study to be accepted in the most appropriate journal according to the scope. Despite numerous supporting documents are available for both issues, the publication process is long, tiresome, and can discourage the most enthusiastic researcher. This is the first of a series of articles with the objective to describe the steps from the research question to the publication of the study. First of all, the importance of the research design will be addressed. The structure of the protocol is essential to achieve the objectives, and provides a way to organize the investigation in a logic, comprehensible and efficient manner.

  19. [Climate change and Kyoto protocol].

    PubMed

    Ergasti, G; Pippia, V; Murzilli, G; De Luca D'Alessandro, E

    2009-01-01

    Due to industrial revolution and the heavy use of fossil fuels, the concentration of greenhouse gases in the atmosphere has increased dramatically during the last hundred years, and this has lead to an increase in mean global temperature. The environmental consequences of this are: the melting of the ice caps, an increase in mean sea-levels, catastrophic events such as floodings, hurricanes and earthquakes, changes to the animal and vegetable kingdoms, a growth in vectors and bacteria in water thus increasing the risk of infectious diseases and damage to agriculture. The toxic effects of the pollution on human health are both acute and chronic. The Kyoto Protocol is an important step in the campaign against climatic changes but it is not sufficient. A possible solution might be for the States which produce the most of pollution to adopt a better political stance for the environment and to use renewable resources for the production of energy.

  20. A Self-Stabilizing Hybrid Fault-Tolerant Synchronization Protocol

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.

    2015-01-01

    This paper presents a strategy for solving the Byzantine general problem for self-stabilizing a fully connected network from an arbitrary state and in the presence of any number of faults with various severities including any number of arbitrary (Byzantine) faulty nodes. The strategy consists of two parts: first, converting Byzantine faults into symmetric faults, and second, using a proven symmetric-fault tolerant algorithm to solve the general case of the problem. A protocol (algorithm) is also present that tolerates symmetric faults, provided that there are more good nodes than faulty ones. The solution applies to realizable systems, while allowing for differences in the network elements, provided that the number of arbitrary faults is not more than a third of the network size. The only constraint on the behavior of a node is that the interactions with other nodes are restricted to defined links and interfaces. The solution does not rely on assumptions about the initial state of the system and no central clock nor centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. A mechanical verification of a proposed protocol is also present. A bounded model of the protocol is verified using the Symbolic Model Verifier (SMV). The model checking effort is focused on verifying correctness of the bounded model of the protocol as well as confirming claims of determinism and linear convergence with respect to the self-stabilization period.

  1. An Argument for Soft Layering of Protocols.

    DTIC Science & Technology

    1983-05-01

    protocols. A protocol is the means by which two cooperating processes1 communicate . It consists of a set of agreements governing the form of the data ...that is sent over the communications channel, and the conventions for what data is to be sent under what circumstances. Put simply, a protocol...the FIFO nature of the underlying communications requires that the entity catch up with the monitoring station before it can receive the latest data

  2. Nouvelles approches en theorie du champ moyen dynamique: le cas du pouvoir thermoelectrique et celui de l'effet orbital d'un champ magnetique

    NASA Astrophysics Data System (ADS)

    Arsenault, Louis-Francois

    Les applications reliees a la generation d'energie motivent la recherche de materiaux ayant un fort pouvoir thermoelectrique (S). De plus, S nous renseigne sur certaines proprietes fondamentales des materiaux, comme, par exemple, la transition entre l'etat coherent et incoherent des quasi-particules lorsque la temperature augmente. Empiriquement, la presence de fortes interactions electron-electron peut mener a un pouvoir thermoelectrique geant. Nous avons donc etudie le modele le plus simple qui tient compte de ces fortes interactions, le modele de Hubbard. La theorie du champ moyen dynamique (DMFT) est tout indiquee dans ce cas. Nous nous sommes concentres sur un systeme tridimensionnel (3d) cubique a face centree (fcc), et ce, pour plusieurs raisons. A) Ce type de cristal est tres commun dans la nature. B) La DMFT donne de tres bons resultats en 3d et donc ce choix sert aussi de preuve de principe de la methode. C) Finalement, a cause de la frustration electronique intrinseque au fcc, celui-ci ne presente pas de symetrie particule-trou, ce qui est tres favorable a l'apparition d'une grande valeur de S. Ce travail demontre que lorsque le materiau est un isolant a demi-remplissage a cause des fortes interactions (isolant de Mott), il est possible d'obtenir de grands pouvoirs thermoelectriques en le dopant legerement. C'est un resultat pratique important. Du point de vue methodologique, nous avons montre comment la limite de frequence infinie de S et l'approche dite de Kelvin, qui considere la limite de frequence nulle avant la limite thermodynamique pour S, donnent des estimations fiables de la vraie limite continue (DC) dans les domaines de temperature appropriee. Ces deux approches facilitent grandement les calculs en court-circuit ant la necessite de recourir a de problematiques prolongements analytiques. Nous avons trouve que la methode de calcul a frequence infinie fonctionne bien lorsque les echelles d'energie sont relativement faibles. En d'autres termes

  3. Communication protocol in chassis detecting wireless transmission system based on WiFi

    Technology Transfer Automated Retrieval System (TEKTRAN)

    In chassis detecting wireless transmission system, the wireless network communication protocol plays a key role in the information exchange and synchronization between the host and chassis PDA. This paper presents a wireless network transmission protocol based on TCP/IP which makes the rules of info...

  4. Using Green Star Metrics to Optimize the Greenness of Literature Protocols for Syntheses

    ERIC Educational Resources Information Center

    Duarte, Rita C. C.; Ribeiro, M. Gabriela T. C.; Machado, Adélio A. S. C.

    2015-01-01

    A procedure to improve the greenness of a synthesis, without performing laboratory work, using alternative protocols available in the literature is presented. The greenness evaluation involves the separate assessment of the different steps described in the available protocols--reaction, isolation, and purification--as well as the global process,…

  5. 16S rRNA region based PCR protocol for identification and subtyping of Parvimonas micra.

    PubMed

    Ota-Tsuzuki, C; Brunheira, A T P; Mayer, M P A

    2008-10-01

    The present study established a PCR protocol in order to identify Parvimonas micra and to evaluate the intra-species diversity by PCR-RFLP of 16S rRNA partial sequence. The data indicated that the protocol was able to identify this species which could be clustered in five genotypes.

  6. Measuring Discourse-Level Processes with Verbal Protocols and Latent Semantic Analysis

    ERIC Educational Resources Information Center

    Millis, Keith; Magliano, Joseph; Todaro, Stacey

    2006-01-01

    The present study used latent semantic analysis (LSA) to analyze verbal protocols that were collected while participants read expository passages. In the study, participants were asked to type their thoughts after reading each sentence of 2 scientific texts. The semantic similarity between the protocols and the current sentence and prior causal…

  7. 16S rRNA region based PCR protocol for identification and subtyping of Parvimonas micra

    PubMed Central

    Ota-Tsuzuki, C.; Brunheira, A.T.P.; Mayer, M.P.A.

    2008-01-01

    The present study established a PCR protocol in order to identify Parvimonas micra and to evaluate the intra-species diversity by PCR-RFLP of 16S rRNA partial sequence. The data indicated that the protocol was able to identify this species which could be clustered in five genotypes. PMID:24031274

  8. Quantum secure direct communication protocol with blind polarization bases and particles' transmitting order

    NASA Astrophysics Data System (ADS)

    Song, Jie; Zhu, Ai-Dong; Zhang, Shou

    2007-03-01

    This paper presents a modified secure direct communication protocol by using the blind polarization bases and particles' random transmitting order. In our protocol, a sender (Alice) encodes secret messages by rotating a random polarization angle of particle and then the receiver (Bob) sends back these particles as a random sequence. This ensures the security of communication.

  9. Validating Knowledge-Based Framework through Mission-Oriented Sensors Array and Smart Sensor Protocol

    NASA Astrophysics Data System (ADS)

    Rodrigues, Douglas; Pires, Rayner M.; Branco, Kalinka R. L. J. C.

    2015-09-01

    This paper addresses the problem of using Service-Oriented Architecture (SOA) in critical embedded systems, mainly in Unmanned Aerial Vehicles (UAVs). We present the use of a SOA approach to provide the integration of the payload in the UAV. The integration is provided by a plug and play protocol named Smart Sensor Protocol (SSP) that validates the SOA approach.

  10. Individual Differences in the Self-Regulation of Learning, Emerging from Thinking Aloud Protocols.

    ERIC Educational Resources Information Center

    Simons, P. R. J.

    Underlying the research reported in this paper is a theoretical framework which defines the self-regulation of learning as the number and kinds of teaching tasks students perform themselves. Three studies are presented on individual differences in regulation-processes emerging from thinking aloud protocols. Protocols of good and weaker performing…

  11. Status Report on the UNIDROIT Space Protocol

    NASA Astrophysics Data System (ADS)

    Larsen, Paul B.

    2002-01-01

    In my status report on the UNIDROIT Space Protocol I will describe the history and purpose of the Space Protocol; I will state the Protocol's relationship to the UNIDROIT Convention on International Interests in Mobile Equipment in particular after the 2001 Cape Town Diplomatic Conference on the Convention. I will describe the COPUOS study of possible conflicts with the existing space law treaties and explain UNIDROIT's objective of avoiding conflicts between existing space law and the Space Protocol. Finally I will describe future steps to be taken.

  12. Evaluating the reliability of a novel neck-strength assessment protocol for healthy adults using self-generated resistance with a hand-held dynamometer.

    PubMed

    Versteegh, Theo; Beaudet, Danielle; Greenbaum, Marla; Hellyer, Leah; Tritton, Amanda; Walton, Dave

    2015-01-01

    Objectif : Évaluer la convergence test-retest intra et intersessionnelle d'un nouveau protocole d'évaluation de la force du cou au moyen d'un dynamomètre portatif. Contexte: Une recension des écrits a révélé un manque de protocoles d'évaluation de la force du cou à la fois portables et fiables. La dynamométrie manuelle est une méthode portable et peu coûteuse d'évaluation de la force musculaire, mais elle n'est pas utilisée couramment pour évaluer la force du cou. Méthodes : On a utilisé un dynamomètre portatif pour évaluer la force du cou chez 30 participants en bonne santé. On a mesuré la force maximale en flexion cervicale, extension, flexion latérale, flexion latérale avec rotation et rotation pure en utilisant la main ipsilatérale pour appliquer une résistance isométrique pendant 3 secondes. On a pris trois mesures en 6 à 8 jours. Résultats : Les coefficients de corrélation intraclasse (CCI) de test-retest ont révélé une grande fiabilité variant de 0,94 à 0,97 dans le cas de toutes les directions vérifiées de l'essai 1 à l'essai 2 (fiabilité intrasessionnelle) [CCI (2,1), absolu]. Les valeurs CCI ont démontré une fiabilité intersessionnelle variant de bonne à élevée, variant de 0,87 à 0,95 dans le cas de toutes les directions mises à l'épreuve de l'essai 1 à l'essai 3 [CCI (2,1), absolu]. Conclusion : Les résultats indiquent qu'il est possible d'appliquer le protocole d'évaluation de la force du cou et du quadrant supérieur par les cinq positions d'essai en utilisant la dynamométrie manuelle, et qu'il produit une fiabilité variant de bonne à élevée.

  13. Data Provenance in Photogrammetry Through Documentation Protocols

    NASA Astrophysics Data System (ADS)

    Carboni, N.; Bruseker, G.; Guillem, A.; Bellido Castañeda, D.; Coughenour, C.; Domajnko, M.; de Kramer, M.; Ramos Calles, M. M.; Stathopoulou, E. K.; Suma, R.

    2016-06-01

    Documenting the relevant aspects in digitisation processes such as photogrammetry in order to provide a robust provenance for their products continues to present a challenge. The creation of a product that can be re-used scientifically requires a framework for consistent, standardised documentation of the entire digitisation pipeline. This article provides an analysis of the problems inherent to such goals and presents a series of protocols to document the various steps of a photogrammetric workflow. We propose this pipeline, with descriptors to track all phases of digital product creation in order to assure data provenance and enable the validation of the operations from an analytic and production perspective. The approach aims to support adopters of the workflow to define procedures with a long term perspective. The conceptual schema we present is founded on an analysis of information and actor exchanges in the digitisation process. The metadata were defined through the synthesis of previous proposals in this area and were tested on a case study. We performed the digitisation of a set of cultural heritage artefacts from an Iron Age burial in Ilmendorf, Germany. The objects were captured and processed using different techniques, including a comparison of different imaging tools and algorithms. This augmented the complexity of the process allowing us to test the flexibility of the schema for documenting complex scenarios. Although we have only presented a photogrammetry digitisation scenario, we claim that our schema is easily applicable to a multitude of 3D documentation processes.

  14. Cultural Heritage Documentation and Integrated Geomatics Techniques in AN Educational Context: Case Bois-Du (belgium)

    NASA Astrophysics Data System (ADS)

    Stal, C.; Goossens, R.; Carlier, L.; Debie, J.; Haoudy, K.; Nuttens, T.; De Wulf, A.

    2013-07-01

    maps of the site, including the inside domain of the buildings. Already available aerial photographs are processed to obtain a 3D model of the site and the wider region. In March 2013, the first campaign took place. During this first campaign, a topographical network was set out and a series of detail points were measured for the detailed topographic mapping. The topographical network was well-planned and covers almost the whole site, forming a set of permanently materialized reference points for later measurements. Besides, a large number of ground control points (GCPs) were taken for the 3D reconstruction of the area, based on high resolution airborne imagery. This enables the students to familiarize themselves with photogrammetric principles in a practical exercise. Both the topographic maps and the 3D model fit within the large scale geographic reference map of the Walloon Region. In this contribution, the results of this intensive trans-regional collaboration on the preservation of the sites are presented. This paper will discuss the first deliverables from the project and the advantages for the responsible government, the cultural heritage organisations (Ecomusée du Bois-du-Luc) and the students. The main focus here is on the educational context of the project. Furthermore, future projects on the same site will be discussed.

  15. La chirurgie du diaphragme sous aortique

    PubMed Central

    Moutakiallah, Younes; Maaroufi, Ilham; Aithoussa, Mahdi; Bamous, Mehdi; Abdou, Abdessamad; Atmani, Noureddine; Hatim, Abdedaïm; Amahzoune, Brahim; Bekkali, Youssef El; Boulahya, Abdelatif

    2016-01-01

    Le diaphragme sous aortique se caractérise par une certaine latence clinique et une faible morbi-mortalité. La chirurgie reste le traitement de choix malgré un réel risque de récurrence à long terme. Nous rapportons 18 patients opérés entre Avril 1994 et Mars 2011 pour diaphragme sous aortique d’âge moyen de 18,1±9,7 ans avec 11 patients de sexe masculin. Le diaphragme était de nature fibreuse chez 13 patients et fibro-musculaire chez 5 patients. Tous les patients ont été opérés par résection de diaphragme associée à une myectomie, une plastie aortique, une fermeture de communication interventriculaire et une ligature de canal artériel perméable respectivement chez 3, 3, 2 et 2 patients. La Mortalité opératoire était nulle et sans aucun cas de trouble de conduction postopératoire. Le suivi a duré en moyenne 44,3±36,8 mois sans aucun décès tardif. Deux patients ont présenté une récidive de diaphragme qui a nécessité une réopération avec bonne évolution. La tendance actuelle dans la chirurgie du diaphragme se fait vers des interventions précoces et des résections plus extensives. Cependant, le risque de récidive impose une surveillance échographique systématique et rapprochée. PMID:27516830

  16. GENERIC VERIFICATION PROTOCOL: DISTRIBUTED GENERATION AND COMBINED HEAT AND POWER FIELD TESTING PROTOCOL

    EPA Science Inventory

    This report is a generic verification protocol by which EPA’s Environmental Technology Verification program tests newly developed equipment for distributed generation of electric power, usually micro-turbine generators and internal combustion engine generators. The protocol will ...

  17. DuCLOX-2/5 inhibition: a promising target for cancer chemoprevention.

    PubMed

    Gautam, Swetlana; Roy, Subhadeep; Ansari, Mohd Nazam; Saeedan, Abdulaziz S; Saraf, Shubhini A; Kaithwas, Gaurav

    2017-03-01

    Cancer is a leading cause of death and major health concern worldwide. The animal and human studies support the presumption that inflammation directs the cancer initiation and progression. Cyclooxygenase-2 (COX-2) and 5-lipoxygenase (5-LOX) are the key players in the inflammatory cascade contributing towards the angiogenesis, tumor cell invasiveness, and disruption in the pathways of cellular proliferation/apoptosis. Contemporary studies have particularized a promising role of COX-2 and 5-LOX inhibitors in cancer chemoprevention. The present review is a pursuit to define implications of dual COX-2 and 5-LOX (DuCLOX-2/5) inhibition on various aspects of cancer augmentation and chemoprevention.

  18. Beyond the EGS Protocol, A best practices document

    NASA Astrophysics Data System (ADS)

    Majer, E.; Nelson, J. E.; Robertson-Tate, A.; Savy, J. B.; Wong, I. G.

    2012-12-01

    One of the main issues often associated with subsurface fluid injection, an integral part of all the EGS technologies, is the impact as well as the utility of microseismicity (microearthquakes) that often occurs during the various stages of fluid injections. Although the Protocols are being used and followed by a number of geothermal stakeholders, the USDOE felt a "Best Practices" document was needed that would be used mainly by the geothermal operators and as a guideline for regulators. The "Best Practices" provides more detail than the Protocols, while still following the seven main steps in the updated Protocol (Majer et al., 2012). Like the Protocol, this Best Practices document is intended to be a living document; it is intended to supplement the existing IEA Protocol and the new DOE Protocol, and as practically as possible, be kept up-to-date with state-of-the-art knowledge and practices, both technical and non-technical. As methods, experience, knowledge, and regulations change with respect to induced seismicity, so should this document. It also recognizes that "one size" does not fit every geothermal project, and not everything presented should be required for every EGS project. Local conditions at each site will call for different types of action. Variations in procedures will result from such factors as the population density around the project, past seismicity in the area, the size of the project, the depth and amount of injection and its relation to any geologic faults, and others. Described will be several different approached that may be taken to successfully deal with induced seismicity and the status of the state of the practice as well experiences with regulators and the operators.

  19. Evaluating the Multicast Control Protocol on a Multicasting Network Architecture

    NASA Astrophysics Data System (ADS)

    Stergiou, E.; Meletiou, G.; Vasiliadis, D. C.; Rizos, G. E.; Margariti, S. V.

    2007-12-01

    In this paper a reliable multicasting architecture presented. This architecture operates using a Multicasting Firewall over the Multicast Control Protocol (MCP). Our aim was to evaluate the transition times of specific packets such as the IGMPv2 reports in the proposed multicasting network. In our study, multicasting experiments presented and analyzed. The obtained results of our experiments clearly show that the average validation times of IGMP reports on the Multicast Control Server smoothly increase versus the number of clients.

  20. Protocols for Image Processing based Underwater Inspection of Infrastructure Elements

    NASA Astrophysics Data System (ADS)

    O'Byrne, Michael; Ghosh, Bidisha; Schoefs, Franck; Pakrashi, Vikram

    2015-07-01

    Image processing can be an important tool for inspecting underwater infrastructure elements like bridge piers and pile wharves. Underwater inspection often relies on visual descriptions of divers who are not necessarily trained in specifics of structural degradation and the information may often be vague, prone to error or open to significant variation of interpretation. Underwater vehicles, on the other hand can be quite expensive to deal with for such inspections. Additionally, there is now significant encouragement globally towards the deployment of more offshore renewable wind turbines and wave devices and the requirement for underwater inspection can be expected to increase significantly in the coming years. While the merit of image processing based assessment of the condition of underwater structures is understood to a certain degree, there is no existing protocol on such image based methods. This paper discusses and describes an image processing protocol for underwater inspection of structures. A stereo imaging image processing method is considered in this regard and protocols are suggested for image storage, imaging, diving, and inspection. A combined underwater imaging protocol is finally presented which can be used for a variety of situations within a range of image scenes and environmental conditions affecting the imaging conditions. An example of detecting marine growth is presented of a structure in Cork Harbour, Ireland.

  1. Model Checking a Byzantine-Fault-Tolerant Self-Stabilizing Protocol for Distributed Clock Synchronization Systems

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.

    2007-01-01

    This report presents the mechanical verification of a simplified model of a rapid Byzantine-fault-tolerant self-stabilizing protocol for distributed clock synchronization systems. This protocol does not rely on any assumptions about the initial state of the system. This protocol tolerates bursts of transient failures, and deterministically converges within a time bound that is a linear function of the self-stabilization period. A simplified model of the protocol is verified using the Symbolic Model Verifier (SMV) [SMV]. The system under study consists of 4 nodes, where at most one of the nodes is assumed to be Byzantine faulty. The model checking effort is focused on verifying correctness of the simplified model of the protocol in the presence of a permanent Byzantine fault as well as confirmation of claims of determinism and linear convergence with respect to the self-stabilization period. Although model checking results of the simplified model of the protocol confirm the theoretical predictions, these results do not necessarily confirm that the protocol solves the general case of this problem. Modeling challenges of the protocol and the system are addressed. A number of abstractions are utilized in order to reduce the state space. Also, additional innovative state space reduction techniques are introduced that can be used in future verification efforts applied to this and other protocols.

  2. Les rivières et les sources de la Plaine du Cul-de-Sac: extrait du rapport sur les eaux souterraines de la Plaine du Cul-de-Sac

    USGS Publications Warehouse

    Taylor, George C.; Lemoine, Rémy C.

    1949-01-01

    Les principales rivières de la Plaine du Cul-de-Sac, la Rivière Grise ou Grande Rivière du Cul-de-Sac et la Rivière Blanche, prennent naissance sur le flanc Nord du Massif de la Selle à des altitudes de 1,300 à 1,800 mètres au dessus du niveau de la mer. Elles coulent à l’amont à travers des gorges profondes et sont éloignées de 9 Kms. dans la partie central de la bordure Sud de la plaine.

  3. [Biography of the outstanding acupuncturist DU Xiao-shan].

    PubMed

    Ding, Min; Lu, Rui-Qin; Du, Liang-Dong; Cao, Li; Lin, Tian-Yun

    2012-09-01

    Professor DU Xiao-shan 's academic thought and clinical experiences was introduced in this paper. He has noble medical ethics and is fair to the patients without distinction. He has great learning and rich practical experiences, and he specializes in all kinds of common diseases as well as many difficult and complicated cases. He never stops studying the ancients to make innovation and he creates the technique of the quick-puncture and slow-twist and DU's heat-reinforce method. He teaches to carry forward acupuncture and moxibustion and his achievements have become an important part of acupuncture and moxibustion science.

  4. Processus mis en jeu dans l'evolution morpho-dynamique de Roberts Bank (Delta du Fraser): Observation et modelisation hydrodynamiques et sedimentaires

    NASA Astrophysics Data System (ADS)

    Meule, Samuel

    Roberts Bank couvre le delta intertidal entre le bras principal du fleuve Fraser et la pointe du Cap Roberts en Colombie Britannique, Canada. Sous la pression du developpement urbain et la modification du regime sedimentaire, cette plage de sable fin est soumise a une erosion significative. L'identification des forces hydrodynamiques, leur importance et leur interaction permettent de determiner les zones de transport, et donc la stabilite de Roberts Bank. Deux periodes de mesures associees a des phases de modelisation de la houle et des courants ont ete effectuees lors de ce travail. La premiere periode de mesure, entre le 29 juin et le 8 juillet 2001, a permis l'identification de processus hydrodynamiques et sedimentaires associes aux forts courants de maree presents le long de Roberts Bank. La seconde phase de mesure, entre le 1er mars et le 26 mars 2002, a permis d'etudier les processus de remise en suspension associes a la houle. Des phases de modelisation ont ete menees a partir des connaissances acquises sur le terrain, afin d'affiner la comprehension des processus sedimentaires et notamment les interactions houle - courant - sediment. Les mecanismes, mis en evidence dans cette etude, participent au faconnage de Roberts Bank, contribuent a son erosion et a la mise en place de nouvelles structures sedimentaires. Les courants de flot de maree vont initier la creation de nuages de resuspension de sediment depuis le fond. En eau peu profonde, la composante " onshore" du courant de maree induit un transport a la cote, tandis qu'en eau plus profonde une faible composante " offshore" du courant peut favoriser un transport au large le long de la pente. Les chenaux, les dunes subaquatiques et les surfaces d'erosion affleurantes fournissent une rugosite de fond suffisante a la generation de turbulence et donc de nuages de sediment en suspension. Lors de la maree de jusant, les sediments resuspendus en eau peu profonde, sont transportes vers le large a partir d

  5. Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocol

    SciTech Connect

    Qin Sujuan; Gao Fei; Wen Qiaoyan; Zhu Fuchen

    2007-12-15

    The participant attack is the most serious threat for quantum secret-sharing protocols. We present a method to analyze the security of quantum secret-sharing protocols against this kind of attack taking the scheme of Hillery, Buzek, and Berthiaume (HBB) [Phys. Rev. A 59, 1829 (1999)] as an example. By distinguishing between two mixed states, we derive the necessary and sufficient conditions under which a dishonest participant can attain all the information without introducing any error, which shows that the HBB protocol is insecure against dishonest participants. It is easy to verify that the attack scheme of Karlsson, Koashi, and Imoto [Phys. Rev. A 59, 162 (1999)] is a special example of our results. To demonstrate our results further, we construct an explicit attack scheme according to the necessary and sufficient conditions. Our work completes the security analysis of the HBB protocol, and the method presented may be useful for the analysis of other similar protocols.

  6. MTP: An atomic multicast transport protocol

    NASA Technical Reports Server (NTRS)

    Freier, Alan O.; Marzullo, Keith

    1990-01-01

    Multicast transport protocol (MTP); a reliable transport protocol that utilizes the multicast strategy of applicable lower layer network architectures is described. In addition to transporting data reliably and efficiently, MTP provides the client synchronization necessary for agreement on the receipt of data and the joining of the group of communicants.

  7. Delay Tolerant Networking - Bundle Protocol Simulation

    NASA Technical Reports Server (NTRS)

    SeGui, John; Jenning, Esther

    2006-01-01

    In this paper, we report on the addition of MACHETE models needed to support DTN, namely: the Bundle Protocol (BP) model. To illustrate the useof MACHETE with the additional DTN model, we provide an example simulation to benchmark its performance. We demonstrate the use of the DTN protocol and discuss statistics gathered concerning the total time needed to simulate numerous bundle transmissions.

  8. STANDARD MEASUREMENT PROTOCOLS - FLORIDA RADON RESEARCH PROGRAM

    EPA Science Inventory

    The manual, in support of the Florida Radon Research Program, contains standard protocols for key measurements where data quality is vital to the program. t contains two sections. he first section, soil measurements, contains field sampling protocols for soil gas permeability and...

  9. Communication protocol standards for space data systems

    NASA Technical Reports Server (NTRS)

    Hooke, Adrian J.; Desjardins, Richard

    1990-01-01

    The main elements and requirements of advanced space data networks are identified. The communication protocol standards for use on space missions during the coming decades are described. In particular, the blending of high-performance space-unique data transmission techniques with off-the-shelf open systems interconnection (OSI) protocols is described.

  10. 16 CFR 1210.4 - Test protocol.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 2 2012-01-01 2012-01-01 false Test protocol. 1210.4 Section 1210.4... STANDARD FOR CIGARETTE LIGHTERS Requirements for Child Resistance § 1210.4 Test protocol. (a) Child test panel. (1) The test to determine if a lighter is resistant to successful operation by children uses...

  11. 16 CFR 1212.4 - Test protocol.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 2 2012-01-01 2012-01-01 false Test protocol. 1212.4 Section 1212.4... STANDARD FOR MULTI-PURPOSE LIGHTERS Requirements for Child-Resistance § 1212.4 Test protocol. (a) Child test panel. (1) The test to determine if a multi-purpose lighter is resistant to successful...

  12. Massive transfusion and massive transfusion protocol

    PubMed Central

    Patil, Vijaya; Shetmahajan, Madhavi

    2014-01-01

    Haemorrhage remains a major cause of potentially preventable deaths. Rapid transfusion of large volumes of blood products is required in patients with haemorrhagic shock which may lead to a unique set of complications. Recently, protocol based management of these patients using massive transfusion protocol have shown improved outcomes. This section discusses in detail both management and complications of massive blood transfusion. PMID:25535421

  13. Baisse du HDL-cholestérol indicateur du stress oxydatif dans le diabète de type 2

    PubMed Central

    Kabamba, Arsène Tshikongo; Bakari, Salvius Amuri; Longanga, Albert Otshudi; Lukumwena, Zet Kalala

    2014-01-01

    L'hypercholestérolémie est étroitement liée au stress oxydatif. Lorsqu'il y a trop de cholestérol qui circule dans le sang, il n'est pas utilisé en totalité par les cellules et il risque de s'accumuler dans les vaisseaux sanguins. Cela peut entrainer la formation des plaques d'athérosclérose qui gênent la circulation sanguine et provoquent des accidents cardiovasculaires. Le stress oxydatif apparait très tôt dans l'histoire des complications du diabète de type 2, et est lié à l'oxydation du glucose mais aussi à la peroxydation lipidique. Le cholestérol-HDL est un marqueur important du stress oxydatif par sa capacité à faciliter la métabolisation du cholestérol, sa baisse est souvent considérée comme la source de beaucoup d'inquiétudes. L'objectif est l’évaluation de la variation du taux de cholestérol-HDL, marqueur du stress oxydatif, chez les patients diabétiques de type 2 dans la population congolaise. Nous avons inclus dans cette étude prospective des cas témoins des patients diabétiques de type 2 reconnus et diagnostiqués, et des témoins non diabétiques appariés selon l’âge et le sexe. Parallèlement au bilan biologique classique, une analyse d'un des facteurs de risque du stress oxydatif a été réalisée: baisse de HDL-Cholestérol. L’âge moyen des 30 patients diabétiques (47,77±10,78 ans) était comparable à celui des 30 témoins (48,83±10,73 ans). Une baisse significative du cholestérol-HDL dans le sang était observée chez 100% des diabétiques et 50% des témoins (p=0,0000). L'augmentation du HDL cholestérol permet d’éliminer le mauvais cholestérol en excès en nettoyant les tissus et en ramenant le cholestérol vers le foie. Lors du diabète de type 2 on constate une baisse sanguine sensible du taux de HDL-cholestérol, qui est signe indicateur du stress oxydatif. PMID:25767660

  14. Facteurs liés au diagnostic tardif du cancer du sein: expérience du CHU Mohammed VI Marrakech

    PubMed Central

    Aloulou, Sofia; El Mahfoudi, Amal; El Omrani, Abdelhamid; Khouchani, Mouna

    2015-01-01

    Le cancer du sein est le premier cancer féminin en termes d'incidence et de mortalité. Au Maroc, il vient au premier rang des cancers de la femme avant celui du col utérin Il constitue un problème de santé publique. Son pronostic est étroitement lié au stade auquel le diagnostic est posé. Il s'agit d'une pathologie dont les moyens diagnostiques sont de nos jours développés, allant de la détection précoce à la mise en évidence de lésions infra-cliniques, ce qui a nettement amélioré le pronostic dans les pays développés. Ce travail que nous présentons a pour objectif d'identifier dans notre pratique quotidienne, les facteurs qui amènent les patientes à consulter à des stades tardifs. Une étude rétrospective a été menée de janvier 2012 à janvier 2013 portant sur 130 patientes porteuses d'un cancer du sein au sein du service d'onco-radiotherapie CHU Mohammed VI Marrakech. Un questionnaire a été élaboré et dument renseigné en ayant recours aux dossiers des malades. Ainsi 63,07% des patientes consultaient au-delà de six mois avec un délai moyen de consultation de 8,47 mois avec comme motif de consultation des lésions classées T4 dans 27,69%, et des tumeurs d'emblée métastatiques dans 13,84%. Les facteurs retrouvés à l'interrogatoire étaient le manque de moyens financiers 40%, l’éloignement des structures sanitaires dans 23%, les habitudes socioculturelles avec les traitements traditionnels en première intention 20%, et l'insuffisance de prise en charge thérapeutique 7%. Cependant, pris individuellement, aucune concordance significative n’était retrouvée entre ces facteurs et le long délai diagnostique. Dans notre pratique, c'est la conjonction de la triade ignorance, indigence et habitudes socioculturelles qui constituent le facteur essentiel du diagnostic tardif des cancers du sein. PMID:26327999

  15. Ocean fertilization, carbon credits and the Kyoto Protocol

    NASA Astrophysics Data System (ADS)

    Westley, M. B.; Gnanadesikan, A.

    2008-12-01

    Commercial interest in ocean fertilization as a carbon sequestration tool was excited by the December 1997 agreement of the Kyoto Protocol to the United Nations Convention on Climate Change. The Protocol commits industrialized countries to caps on net greenhouse gas emissions and allows for various flexible mechanisms to achieve these caps in the most economically efficient manner possible, including trade in carbon credits from projects that reduce emissions or enhance sinks. The carbon market was valued at 64 billion in 2007, with the bulk of the trading (50 billion) taking place in the highly regulated European Union Emission Trading Scheme, which deals primarily in emission allowances in the energy sector. A much smaller amount, worth $265 million, was traded in the largely unregulated "voluntary" market (Capoor and Ambrosi 2008). As the voluntary market grows, so do calls for its regulation, with several efforts underway to set rules and standards for the sale of voluntary carbon credits using the Kyoto Protocol as a starting point. Four US-based companies and an Australian company currently seek to develop ocean fertilization technologies for the generation of carbon credits. We review these plans through the lens of the Kyoto Protocol and its flexible mechanisms, and examine whether and how ocean fertilization could generate tradable carbon credits. We note that at present, ocean sinks are not included in the Kyoto Protocol, and that furthermore, the Kyoto Protocol only addresses sources and sinks of greenhouse gases within national boundaries, making open-ocean fertilization projects a jurisdictional challenge. We discuss the negotiating history behind the limited inclusion of land use, land use change and forestry in the Kyoto Protocol and the controversy and eventual compromise concerning methodologies for terrestrial carbon accounting. We conclude that current technologies for measuring and monitoring carbon sequestration following ocean fertilization

  16. Le traitement conservateur du cancer du sein: expérience d'une équipe tunisienne

    PubMed Central

    Dimassi, Kaouther; Gharsa, Anissa; Chanoufi, Mohammed Badis; Sfar, Ezzeddine; Chelli, Dalenda

    2014-01-01

    En Tunisie, le cancer du sein touche des femmes jeunes avec une taille moyenne au moment du diagnostic à 5 cm. Ces particularités font que la chirurgie radicale reste prédominante. Nous présentons dans ce travail l'expérience de notre équipe en matière de chirurgie conservatrice du cancer du sein. Le but de ce travail est d’évaluer les résultats de ce traitement. Etude rétrospective longitudinale, sur une période de 75 mois. Nous avons inclus toutes les patientes ayant bénéficié d'un traitement conservateur pour une tumeur maligne du sein. Ont été analysés: les caractéristiques épidémiologiques, les aspects radiologiques et histologiques. Le suivi des malades s'est basé sur la détection des récidives. Nous avons évalué le résultat esthétique à la fin de la radiothérapie. Le traitement conservateur a été réalisé dans 23.8% des cas. Le taux de récidives locales était de 6.8% avec une corrélation significative pour une taille tumorale > 30 mm (p= 0.009), l'association d'une composante intracanalaire (p= 0.035), le statut triple négatif (p= 0.003) et des marges d'exérèse < 5mm sans recoupes per-opératoires (p = 0.045). Les facteurs suivants étaient significativement liés au risque de survenue de métastases à distance: le statut triple négatif (p= 0.003), taille tumorale > 30mm (p = 0.006) et l'atteinte ganglionnaire (p = 0.001). Le résultat esthétique était satisfaisant dans 90% des cas. L'augmentation du nombre de patientes pouvant bénéficier d'une chirurgie conservatrice, doit passer impérativement par le développement et la promotion du diagnostic précoce et du dépistage par la mammographie. PMID:25810795

  17. A Simple XML Producer-Consumer Protocol

    NASA Technical Reports Server (NTRS)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of

  18. Protocol for sampling environmental sites for legionellae.

    PubMed Central

    Barbaree, J M; Gorman, G W; Martin, W T; Fields, B S; Morrill, W E

    1987-01-01

    A protocol for sampling environmental sites was developed and used to identify possible sources of Legionella species in support of epidemiologic investigations at two hospitals. In hospital A, legionellae were isolated from 43 of 106 (40%) different sites. Three separate Legionella pneumophila serotypes and a previously unrecognized species were present in different combinations in the positive samples. Two of five cooling towers contained the same L. pneumophila serogroup 1 monoclonal type (1,2,4,5) as was isolated from patients. The same monoclonal type was also isolated from make-up water for the two cooling towers, a hot water tank, water separators in four main air compressor systems for respiratory therapy, and cold and hot water faucets. In hospital B, 13 of 37 (38%) sample sites contained legionellae, all of which were L. pneumophila serogroup 1. The monoclonal type matching isolates from patients (1,2,4,5) was found at the highest concentration in a hot water tank, but it was also present at four other sample sites. Since legionellae not related to disease may be found in many of the sites sampled, an epidemiologic association with the probable source should be established before intervention methods, such as disinfection, are undertaken. PMID:3662501

  19. STANDARD OPERATING PROTOCOLS FOR DECOMMISSIONING

    SciTech Connect

    Foss, D. L.; Stevens, J. L.; Gerdeman, F. W.

    2002-02-25

    Decommissioning projects at Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) sites are conducted under project-specific decision documents, which involve extensive preparation time, public comment periods, and regulatory approvals. Often, the decision documents must be initiated at least one year before commencing the decommissioning project, and they are expensive and time consuming to prepare. The Rocky Flats Environmental Technology Site (RFETS) is a former nuclear weapons production plant at which hazardous substances and wastes were released or disposed during operations. As a result of the releases, RFETS was placed on the National Priorities List in 1989, and is conducting cleanup activities under a federal facilities compliance agreement. Working closely with interested stakeholders and state and federal regulatory agencies, RFETS has developed and implemented an improved process for obtaining the approvals. The key to streamlining the approval process has been the development of sitewide decision documents called Rocky Flats Cleanup Agreement Standard Operating Protocols or ''RSOPs.'' RSOPs have broad applicability, and could be used instead of project-specific documents. Although no two decommissioning projects are exactly the same and they may vary widely in contamination and other hazards, the basic steps taken for cleanup are usually similar. Because of this, using RSOPs is more efficient than preparing a separate project-specific decision documents for each cleanup action. Over the Rocky Flats cleanup life cycle, using RSOPs has the potential to: (1) Save over 5 million dollars and 6 months on the site closure schedule; (2) Eliminate preparing one hundred and twenty project-specific decision documents; and (3) Eliminate writing seventy-five closure description documents for hazardous waste unit closure and corrective actions.

  20. Magnesium Sulphate for Eclampsia and Fetal Neuroprotection: A Comparative Analysis of Protocols Across Canadian Tertiary Perinatal Centres.

    PubMed

    De Silva, Dane A; Sawchuck, Diane; von Dadelszen, Peter; Basso, Melanie; Synnes, Anne R; Liston, Robert M; Magee, Laura A

    2015-11-01

    Contexte : L’utilisation de sulfate de magnésium (MgSO4) a été recommandée à des fins de neuroprotection fœtale dans le but de prévenir l’infirmité motrice cérébrale; des sociétés nationales adoptent d’ailleurs de nouvelles lignes directrices quant à son utilisation. Un projet de transfert des connaissances visant la mise en œuvre des lignes directrices canadiennes est en cours. Le rôle du MgSO4 en ce qui concerne la neuroprotection fœtale ne peut être abordé sans que l’on mentionne son utilisation dans le cadre de la prophylaxie et de la prise en charge de l’éclampsie. Ainsi, pour explorer la standardisation de l’utilisation de MgSO4 au Canada, nous avons cherché à comparer les protocoles locaux qui en régissent l’utilisation en matière d’éclampsie et de neuroprotection fœtale dans les centres périnataux tertiaires. Méthodes : Nous avons demandé à 25 centres périnataux tertiaires canadiens de nous soumettre leurs protocoles quant à l’utilisation du MgSO4 aux fins de la neuroprotection fœtale et de la prophylaxie / prise en charge de l’éclampsie. Les renseignements que nous avons tirés de ces protocoles comprenaient la date du protocole, les définitions des indications de traitement, les détails de l’administration du MgSO4, le monitorage maternel et fœtal, l’antidote pour contrer la toxicité et les symptômes anormaux nécessitant l’offre de soins médicaux. Des analyses descriptives ont été utilisées pour comparer les protocoles de ces centres aux définitions connues de la prééclampsie. Des données issues du Réseau périnatal canadien (RPC) ont été utilisées pour vérifier ce qui se faisait dans le cadre de la pratique clinique. Résultats : Vingt-deux des 25 centres nous ont soumis leurs protocoles de prévention / prise en charge de l’éclampsie. Onze de ces centres nous ont fourni une définition de ce qui était considéré comme une prééclampsie justifiant une prise en

  1. Spectral classification of optical transients with du Pont telescope

    NASA Astrophysics Data System (ADS)

    Morrell, Nidia; Shappee, Ben; Drout, Maria; Dong, Subo

    2017-04-01

    We obtained optical spectroscopy (range 370-920 nm) of 11 transients with the 2.5-m du Pont telescope (+WFCCD) at Las Campanas Observatory between March 26 and 29 UT. The data were cross-correlated with a library of supernova spectra via the Supernova Identification tool (Blondin and Tonry, 2007, ApJ, 666, 1024).

  2. Consonants in Cri du Chat Syndrome: A Case Study

    ERIC Educational Resources Information Center

    Kristoffersen, Kristian Emil

    2008-01-01

    This article reports on a longitudinal case study of consonant productions in one Norwegian girl with Cri du chat syndrome from age 4;6 to age 9;4. It was shown that she had many articulation errors throughout the period of observation. Furthermore, these errors were shown to fall into three main categories: (1) errors of differentiation and…

  3. The larynx in the cri du chat syndrome.

    PubMed

    Manning, K P

    1977-10-01

    The Cri du Chat Syndrome which is caused by a chromosome abnormality is described. A summary of the laryngeal features found by various authors has been made. The characteristic cat-like cry is probably central in origin. The larynx in this condition may be normal or abnormal. If abnormal it is just another clinical manifestation of the syndrome.

  4. The first Pic du Midi photographs of Mars, 1909

    NASA Astrophysics Data System (ADS)

    Dollfus, A.

    2010-08-01

    This short paper comprises an English translation of the article '1909; Premieres photographies de Mars au Pic du Midi', by Audouin Dollfus, published in l'Astronomie, 2009 November, pp. 27-30, and printed here with the assistance of the Director of the BAA Mars Section, Dr Richard McKim.

  5. 76 FR 68124 - Television Broadcasting Services; Fond du Lac, WI

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-03

    ... [Federal Register Volume 76, Number 213 (Thursday, November 3, 2011)] [Proposed Rules] [Pages 68124-68125] [FR Doc No: 2011-28452] FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 09-115, RM-11543; DA 11-1502] Television Broadcasting Services; Fond du Lac, WI AGENCY:...

  6. W. E. B. Du Bois: Reform, Will, and the Veil

    ERIC Educational Resources Information Center

    England, Lynn; Warner, W. Keith

    2013-01-01

    While W. E. B. Du Bois is widely recognized for his contributions to the sociology of race, his contributions to the foundations of sociology are largely ignored. His sociology is based on African American reformism, a version of pragmatism, and a contingent historicism. The basic view of sociology is one that emphasizes the role of chance and…

  7. Évolution nycthémérale des composantes biochimiques du phytoplancton de la retenue du barrage Idriss premier (Fès, Maroc)

    NASA Astrophysics Data System (ADS)

    Bahhou, J.; Alaoui Mhamdi, M.

    1999-03-01

    The diel changes of the biochemical composition of the phytoplankton were studied in the Idriss first reservoir (located on the Inaouen river at thirty Km from the city of Fes, Morrocco) during September 1994. Several biomass and metabolic indicators (proteins, carbohydrates, lipids, chlorophyll a and primary production) were assessed every fourth hour over tow days (7, 8 and 9 September). Since the Protein/Carbohydrates ratio (P/C) is largely recognised as a good integrator of the metabolic functions of the cells, we examined its distribution pattern concomitantly with aforementioned parameters. The results demonstrated enhanced P/C ratios clearly indicating that nutrients were sufficiently available for growth. In addition, this index showed a diel significant variation with levels higher in the night than in the day. Moreover, these results suggest that phytoplankton species during the night used the day-synthesised carbohydrates to insure the cell metabolic functioning. The P/C presents relatively high values in proposition to the ones that have been recorded in temperate regions, and seems to be related to azotic inputs of the Inaouen river. Dans le but de parfaire nos connaissances sur le fonctionnement du sous écosystème phytoplancton, nous nous sommes intéressés à étudier son cycle nycthéméral et son métabolisme cellulaire dans la retenue du barrage Idriss premier. Cette dernière, construite sur l'Oued Inaouène, est située à une trentaine de Km de la ville de Fès. Au cours de ce cycle, les prélèvements ont été effectués selon une séquence temporelle de 4 heures pendant 48 heures, les 7, 8 et 9 septembre 1994. L'étude de l'évolution des composantes biochimiques des cellules phytoplanctoniques à savoir les protéines, les glucides et les lipides a permis de mettre en évidence des variations nycthémérales importantes. Ces variations sont d'autant plus importantes que les variations spatiales observées entre les profondeurs. De plus

  8. Evolution des quasiparticules nodales du cuprate supraconducteur YBa2Cu3Oy en conductivite thermique

    NASA Astrophysics Data System (ADS)

    Rene de Cotret, Samuel

    Ce memoire presente des mesures de conductivite thermique sur les supraconducteurs YBCO et Tl-2201 afin de statuer sur la presence possible d'un point critique quantique (QCP) dans le diagramme de phase de cuprates. Ce point critique quantique serait a l'origine de la reconstruction de la surface de Fermi, d'un large cylindre de trous en de petites poches de trous et d'electrons. La conductivite thermique dans le regime T → 0 permet d'extraire une quantite purement electronique liee aux vitesses de Fermi et du gap, au noeud. Une discontinuite dans cette quantite pourrait signaler la traversee du dopage critique qui reconstruit la surface de Fermi. Plusieurs sondes experimentales distinguent une transition de phase ou un crossover a T* a temperature finie. D'autres sondes mettent en evidence une transition de phase sous l'effet d'un champ magnetique. La presence ou non de cet ordre, a temperature et champ magnetique nul questionne la communaute depuis plusieurs annees. Dans cette etude, nous detectons une variation brusque de kappa0/T a p = 0.18 dans YBCO et a p = 0.20 dans Tl-2201. Ces sauts sont interpretes comme un signe de la transition a temperature nulle et sont en faveur d'un QCP. Le manque de donnees d'un meme materiau a ces dopages ne permet pas de valider hors de tout doute l'existence d'un point critique quantique. Le modele theorique YRZ decrit aussi bien les donnees de conductivite thermique. Des pistes de travaux experimentaux a poursuivre sont proposees pour determiner la presence ou non du QCP de facon franche. Mots-cles : Supraconducteurs, cuprates, conductivite thermique, point critique quantique.

  9. Efficiency of different protocols for enamel clean-up after bracket debonding: an in vitro study

    PubMed Central

    Sigilião, Lara Carvalho Freitas; Marquezan, Mariana; Elias, Carlos Nelson; Ruellas, Antônio Carlos; Sant'Anna, Eduardo Franzotti

    2015-01-01

    Objective: This study aimed to assess the efficiency of six protocols for cleaning-up tooth enamel after bracket debonding. Methods: A total of 60 premolars were divided into six groups, according to the tools used for clean-up: 12-blade bur at low speed (G12L), 12-blade bur at high speed (G12H), 30-blade bur at low speed (G30L), DU10CO ORTHO polisher (GDU), Renew System (GR) and Diagloss polisher (GD). Mean roughness (Ra) and mean roughness depth (Rz) of enamel surface were analyzed with a profilometer. Paired t-test was used to assess Ra and Rz before and after enamel clean-up. ANOVA/Tukey tests were used for intergroup comparison. The duration of removal procedures was recorded. The association between time and variation in enamel roughness (∆Ra, ∆Rz) were evaluated by Pearson's correlation test. Enamel topography was assessed by scanning electron microscopy (SEM). Results: In Groups G12L and G12H, original enamel roughness did not change significantly. In Groups G30L, GDU, GR and GD, a smoother surface (p < 0.05) was found after clean-up. In Groups G30L and GD, the protocols used were more time-consuming than those used in the other groups. Negative and moderate correlation was observed between time and (∆Ra, ∆Rz); Ra and (∆Ra, ∆Rz); Rz (r = - 0.445, r = - 0.475, p < 0.01). Conclusion: All enamel clean-up protocols were efficient because they did not result in increased surface roughness. The longer the time spent performing the protocol, the lower the surface roughness. PMID:26560825

  10. Snakebite management in Iran: Devising a protocol

    PubMed Central

    Monzavi, Seyed Mostafa; Dadpour, Bita; Afshari, Reza

    2014-01-01

    Background: Snakebite in Iran has been a health concern. However, management of snakebite is not standardized and varies from center to center. This study is aimed at devising an evidence-based comprehensive protocol for snakebite management in Iran, to reduce unnecessary variations in practice. Materials and Methods: A narrative search in electronic databases was performed. Fifty peer-reviewed articles, guidelines, and textbooks were reviewed and practical details were extracted. Our currently used protocol in the Mashhad Toxicology Center was supplemented with this information. Consequently an improved wide-range protocol was developed. The protocol was then discussed and amended within a focus group comprised of medical toxicologists and internal medicine specialists. The amended version was finally discussed with expert physicians specialized in different areas of medicine, to be optimized by supplementing other specific considerations. Results: During a one-year process, the protocol was finalized. The final version of the protocol, which was designed in six steps, comprised of three components: A schematic algorithm, a severity grading scale, and instructions for supportive and adjunctive treatments. The algorithm pertains to both Viperidae and Elapidae snakebite envenomations and consists of a planned course of action and dosing of antivenom, based on the severity of the envenomation. Conclusion: Snakebite envenomation is a clinical toxicologic emergency, which needs to be treated in a timely and organized manner. Hence, a multi-aspect protocol was designed to improve the clinical outcomes, reduce unnecessary administration of antivenom, and help physicians make more proper clinical judgments. PMID:24778670

  11. Exploring Shared Memory Protocols in FLASH

    SciTech Connect

    Horowitz, Mark; Kunz, Robert; Hall, Mary; Lucas, Robert; Chame, Jacqueline

    2007-04-01

    ABSTRACT The goal of this project was to improve the performance of large scientific and engineering applications through collaborative hardware and software mechanisms to manage the memory hierarchy of non-uniform memory access time (NUMA) shared-memory machines, as well as their component individual processors. In spite of the programming advantages of shared-memory platforms, obtaining good performance for large scientific and engineering applications on such machines can be challenging. Because communication between processors is managed implicitly by the hardware, rather than expressed by the programmer, application performance may suffer from unintended communication – communication that the programmer did not consider when developing his/her application. In this project, we developed and evaluated a collection of hardware, compiler, languages and performance monitoring tools to obtain high performance on scientific and engineering applications on NUMA platforms by managing communication through alternative coherence mechanisms. Alternative coherence mechanisms have often been discussed as a means for reducing unintended communication, although architecture implementations of such mechanisms are quite rare. This report describes an actual implementation of a set of coherence protocols that support coherent, non-coherent and write-update accesses for a CC-NUMA shared-memory architecture, the Stanford FLASH machine. Such an approach has the advantages of using alternative coherence only where it is beneficial, and also provides an evolutionary migration path for improving application performance. We present data on two computations, RandomAccess from the HPC Challenge benchmarks and a forward solver derived from LS-DYNA, showing the performance advantages of the alternative coherence mechanisms. For RandomAccess, the non-coherent and write-update versions can outperform the coherent version by factors of 5 and 2.5, respectively. In LS-DYNA, we obtain

  12. Stream Assessment and Mitigation Protocols: A Review of Commonalities and Differences

    EPA Pesticide Factsheets

    Various stream assessment and stream mitigation protocols in use by federal and state agencies nationwide were compiled and evaluated to determine the degree to which they presented unique, comprehensive procedures to assess stream and riparian functions.

  13. DuSable High School Internet Project and its influence in connecting Chicago Public Schools to the Internet

    NASA Astrophysics Data System (ADS)

    York, D. G.; Mac Low, M. M.; Brown, B.; Franco, L. M.; Rebull, L. M.; Graziani, C.; Lauroesch, J.

    1998-05-01

    Jean Baptiste Point DuSable High School is a public school in inner city Chicago with a 100% African American student population, over 90% of which live below the poverty limit. In 1995, in partnership with the University of Chicago they applied to NASA's IDEAS program for seed money to bring the Internet to the school via a dedicated T1 connection. We will present the detailed successes and failures of this project. While several aspects did not work out as well as expected, in the long term the project did provide important guidance for a more sucessful involvement in 12 additional public schools in the same social situation. In these more recent involvements we have been able to provide more consistent and continued support than was possible at DuSable High School.

  14. La genèse du concept de champ quantique

    NASA Astrophysics Data System (ADS)

    Darrigol, O.

    This is a historical study of the roots of a concept which has proved to be essential in modern particle physics : the concept of quantum field. The first steps were accomplished by two young theoreticians : Pascual Jordan quantized the free electromagnetic field in 1925 by means of the formal rules of the just discovered matrix mechanics, and Paul Dirac quantized the whole system charges + field in 1927. Using Dirac's equation for electrons (1928) and Jordan's idea of quantized matter waves (second quantization), Werner Heisenberg and Wolfgang Pauli provided in 1929-1930 an extension of Dirac's radiation theory and the proof of its relativistic invariance. Meanwhile Enrico Fermi discovered independently a more elegant and pedagogical formulation. To appreciate the degree of historical necessity of the quantization of fields, and the value of contemporaneous critics to this approach, it was necessary to investigate some of the history of the old radiation theory. We present the various arguments however provisional or naïve or wrong they could be in retrospect. So we hope to contribute to a more vivid picture of notions which, once deprived of their historical setting, might seem abstruse to the modern user. Nous présentons une étude historique des origines d'un concept devenu essentiel dans la physique moderne des particules : le concept de champ quantique. Deux jeunes théoriciens franchirent les premières étapes : Pascual Jordan quantifia le champ électromagnétique en 1925 grâce aux règles formelles de la mécanique des matrices naissante, et Paul Dirac quantifia le système complet charges + champ en 1927. Au moyen de l'équation de l'électron de Dirac (1928) et de l'idée de Jordan d'ondes de matière quantifiées (deuxième quantification), Werner Heisenberg et Wolfgang Pauli donnèrent en 1929-1930 une extension de la théorie du rayonnement de Dirac et la preuve de son invariance relativiste. Pendant ce temps Enrico Fermi découvrit ind

  15. Congenital vertical talus in Cri du Chat Syndrome: a case report

    PubMed Central

    2013-01-01

    Background Congenital vertical talus is a rare deformity of the foot which can cause substantial pain and disability. Its incidence is approximately 1 in 100,000 live births. It has an association with other neuromuscular abnormalities and identified genetic syndromes in 50% of cases [1-5]. This report presents a case of congenital vertical talus in an infant with Cri du Chat Syndrome (CdCS) which - to our knowledge - has not been previously reported. Case presentation A 2 week-old Caucasian, male infant was referred for congenital feet abnormalities and a “clicky” hip at the post-natal baby check. The diagnosis was vertical talus of the right foot and oblique talus of the left foot. Treatment involved serial plaster casts in the “reverse-Ponseti” position until surgery 16 weeks later. The correction was maintained and the feet remain in good position at follow-up. General concern over the infant’s development, failing to reach appropriate milestones, prompted paediatric referral. Genetic analysis was finally carried out, giving a diagnosis of Cri du Chat syndrome at two and a half years of age. Conclusion In light of other reports of chromosomal anomalies causing congenital vertical talus, the learning point from this case is to investigate early for possible aetiologies, not only spinal/neuromuscular, but also those of a genetic basis. PMID:23849392

  16. Overview of the InterGroup protocols

    SciTech Connect

    Berket, Karlo; Agarwal, Deborah A.; Melliar-Smith, P. Michael; Moser, Louise E.

    2001-03-01

    Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces a novel approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable group timestamp ordered.

  17. Mandible condylar hyperplasia: a review of diagnosis and treatment protocol

    PubMed Central

    Olate, Sergio; Netto, Henrique Duque; Rodriguez-Chessa, Jaime; Alister, Juan Pablo; de Albergaria-Barbosa, Jose; de Moraes, Márcio

    2013-01-01

    Condylar hyperplasia (CH) is a bone disease characterized by the increased development of one mandibular condyle. It regularly presents as an active growth with facial asymmetry generally without pain. Statistically it affects more women in adolescence, although it does not discriminate by age or gender. Its best-known consequence is asymmetric facial deformity (AFD), which combined with alteration of the dental occlusion with unilateral crossbite or open bite. It is not known when CH begins and how long it lasts; diagnostic examinations are described and are efficient in some research about diagnosis. Protocol treatment is not well studie and depends on the criteria described in this paper. The aim of this research is to provide up-to-date information about the diagnosis of this disease and to analyze the treatment protocol, visualizing the CH and AFD presented. PMID:24179565

  18. Space Network Time Distribution and Synchronization Protocol Development for Mars Proximity Link

    NASA Technical Reports Server (NTRS)

    Woo, Simon S.; Gao, Jay L.; Mills, David

    2010-01-01

    Time distribution and synchronization in deep space network are challenging due to long propagation delays, spacecraft movements, and relativistic effects. Further, the Network Time Protocol (NTP) designed for terrestrial networks may not work properly in space. In this work, we consider the time distribution protocol based on time message exchanges similar to Network Time Protocol (NTP). We present the Proximity-1 Space Link Interleaved Time Synchronization (PITS) algorithm that can work with the CCSDS Proximity-1 Space Data Link Protocol. The PITS algorithm provides faster time synchronization via two-way time transfer over proximity links, improves scalability as the number of spacecraft increase, lowers storage space requirement for collecting time samples, and is robust against packet loss and duplication which underlying protocol mechanisms provide.

  19. A History of the Improvement of Internet Protocols Over Satellites Using ACTS

    NASA Technical Reports Server (NTRS)

    Allman, Mark; Kruse, Hans; Ostermann, Shawn

    2000-01-01

    This paper outlines the main results of a number of ACTS experiments on the efficacy of using standard Internet protocols over long-delay satellite channels. These experiments have been jointly conducted by NASAs Glenn Research Center and Ohio University over the last six years. The focus of our investigations has been the impact of long-delay networks with non-zero bit-error rates on the performance of the suite of Internet protocols. In particular, we have focused on the most widely used transport protocol, the Transmission Control Protocol (TCP), as well as several application layer protocols. This paper presents our main results, as well as references to more verbose discussions of our experiments.

  20. Making your presentation fun: creative presentation techniques

    SciTech Connect

    KEENEN,MARTHA JANE

    2000-05-18

    What possesses someone to volunteer and go through hoops and red tape to make a presentation at a conference? For that matter, why does anyone ever present anything to anyone? Actually, presentations are a fact of life and there are many reasons for doing a presentation and doing it well. New and existing staff need training and orientation to the way things are done here. Handing all of them a manual and hoping they read it is pretty much a waste of paper. On the other hand, an effective, entertaining and upbeat presentation on the relevant topics is more likely to stick with those people. They will even have a name and face to remember and seek out when they have an issue on or with that topic. This can be a very effective beginning for networking with new peers. The presenter is seen as knowledgeable, as a source of information on company topics and possibly evaluated as a potential mentor or future manager. Project staff and/or peers benefit from clear, concise, presentations of topical knowledge. This is one way that a group working on various aspects of the same project or program can stay in touch and in step with each other. Most importantly, presentations may be the best or only door into the minds (and budgets) of management and customers. These presentations are a wonderful opportunity to address legal and compliance issues, budget, staffing, and services. Here is a chance, maybe the only one, to demonstrate and explain the wonderfulness of a program and the benefit they get by using the services offered most effectively. An interactive presentation on legal and compliance issues can be an effective tool in helping customers and/or management make good risk management decisions.

  1. [MRI of the prostate: optimization of imaging protocols].

    PubMed

    Rouvière, O

    2006-02-01

    This article details the imaging protocols for prostate MRI and the influence on image quality of each particular setting: type of coils to be used (endorectal or external phased-array coils?), patient preparation, type of sequences, spatial resolution parameters. The principle and technical constraints of dynamic contrast-enhanced MRI are also presented, as well as the predictable changes due to the introduction of high-field strength (3T) scanners.

  2. Amygdalin induces apoptosis through regulation of Bax and Bcl-2 expressions in human DU145 and LNCaP prostate cancer cells.

    PubMed

    Chang, Hyun-Kyung; Shin, Mal-Soon; Yang, Hye-Young; Lee, Jin-Woo; Kim, Young-Sick; Lee, Myoung-Hwa; Kim, Jullia; Kim, Khae-Hawn; Kim, Chang-Ju

    2006-08-01

    Prostate cancer is one of the most common non-skin cancers in men. Amygdalin is one of the nitrilosides, natural cyanide-containing substances abundant in the seeds of plants of the prunasin family that have been used to treat cancers and relieve pain. In particular, D-amygdalin (D-mandelonitrile-beta-D-gentiobioside) is known to exhibit selective killing effect on cancer cells. Apoptosis, programmed cell death, is an important mechanism in cancer treatment. In the present study, we prepared the aqueous extract of the amygdalin from Armeniacae semen and investigated whether this extract induces apoptotic cell death in human DU145 and LNCaP prostate cancer cells. In the present results, DU145 and LNCaP cells treated with amygdalin exhibited several morphological characteristics of apoptosis. Treatment with amygdalin increased expression of Bax, a pro-apoptotic protein, decreased expression of Bcl-2, an anti-apoptotic protein, and increased caspase-3 enzyme activity in DU145 and LNCaP prostate cancer cells. Here, we have shown that amygdalin induces apoptotic cell death in human DU145 and LNCaP prostate cancer cells by caspase-3 activation through down-regulation of Bcl-2 and up-regulation of Bax. The present study reveals that amygdalin may offer a valuable option for the treatment of prostate cancers.

  3. Robust Multi-unit Auction Protocol against False-name Bids

    NASA Astrophysics Data System (ADS)

    Yokoo, Makoto; Sakurai, Yuko; Matsubara, Shigeo

    This paper presents a new multi-unit auction protocol (IR protocol) that is robust against false-name bids. Internet auctions have become an integral part of Electronic Commerce and a promising field for applying agent and Artificial Intelligence technologies. Although the Internet provides an excellent infrastructure for executing auctions, the possibility of a new type of cheating called false-name bids has been pointed out. A false-name bid is a bid submitted under a fictitious name. A protocol called LDS has been developed for combinatorial auctions of multiple different items and has proven to be robust against false-name bids. Although we can modify the LDS protocol to handle multi-unit auctions, in which multiple units of an identical item are auctioned, the protocol is complicated and requires the auctioneer to carefully pre-determine the combination of bundles to obtain a high social surplus or revenue. For the auctioneer, our newly developed IR protocol is easier to use than the LDS, since the combination of bundles is automatically determined in a flexible manner according to the declared evaluation values of agents. The evaluation results show that the IR protocol can obtain a better social surplus than that obtained by the LDS protocol.

  4. An efficient three-party password-based key agreement protocol using extended chaotic maps

    NASA Astrophysics Data System (ADS)

    Shu, Jian

    2015-06-01

    Three-party password-based key agreement protocols allow two users to authenticate each other via a public channel and establish a session key with the aid of a trusted server. Recently, Farash et al. [Farash M S, Attari M A 2014 “An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps”, Nonlinear Dynamics 77(7): 399-411] proposed a three-party key agreement protocol by using the extended chaotic maps. They claimed that their protocol could achieve strong security. In the present paper, we analyze Farash et al.’s protocol and point out that this protocol is vulnerable to off-line password guessing attack and suffers communication burden. To handle the issue, we propose an efficient three-party password-based key agreement protocol using extended chaotic maps, which uses neither symmetric cryptosystems nor the server’s public key. Compared with the relevant schemes, our protocol provides better performance in terms of computation and communication. Therefore, it is suitable for practical applications. Project supported by the National Natural Science Foundation of China (Grant No. 61462033).

  5. Verification of a Byzantine-Fault-Tolerant Self-stabilizing Protocol for Clock Synchronization

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.

    2008-01-01

    This paper presents the mechanical verification of a simplified model of a rapid Byzantine-fault-tolerant self-stabilizing protocol for distributed clock synchronization systems. This protocol does not rely on any assumptions about the initial state of the system except for the presence of sufficient good nodes, thus making the weakest possible assumptions and producing the strongest results. This protocol tolerates bursts of transient failures, and deterministically converges within a time bound that is a linear function of the self-stabilization period. A simplified model of the protocol is verified using the Symbolic Model Verifier (SMV). The system under study consists of 4 nodes, where at most one of the nodes is assumed to be Byzantine faulty. The model checking effort is focused on verifying correctness of the simplified model of the protocol in the presence of a permanent Byzantine fault as well as confirmation of claims of determinism and linear convergence with respect to the self-stabilization period. Although model checking results of the simplified model of the protocol confirm the theoretical predictions, these results do not necessarily confirm that the protocol solves the general case of this problem. Modeling challenges of the protocol and the system are addressed. A number of abstractions are utilized in order to reduce the state space.

  6. A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity.

    PubMed

    Amin, Ruhul; Biswas, G P

    2015-08-01

    Telecare medical information system (TMIS) makes an efficient and convenient connection between patient(s)/user(s) and doctor(s) over the insecure internet. Therefore, data security, privacy and user authentication are enormously important for accessing important medical data over insecure communication. Recently, many user authentication protocols for TMIS have been proposed in the literature and it has been observed that most of the protocols cannot achieve complete security requirements. In this paper, we have scrutinized two (Mishra et al., Xu et al.) remote user authentication protocols using smart card and explained that both the protocols are suffering against several security weaknesses. We have then presented three-factor user authentication and key agreement protocol usable for TMIS, which fix the security pitfalls of the above mentioned schemes. The informal cryptanalysis makes certain that the proposed protocol provides well security protection on the relevant security attacks. Furthermore, the simulator AVISPA tool confirms that the protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The security functionalities and performance comparison analysis confirm that our protocol not only provide strong protection on security attacks, but it also achieves better complexities along with efficient login and password change phase as well as session key verification property.

  7. A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

    PubMed Central

    Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen

    2011-01-01

    User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das’ protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs. PMID:22163874

  8. Microplastics in seafood: Benchmark protocol for their extraction and characterization.

    PubMed

    Dehaut, Alexandre; Cassone, Anne-Laure; Frère, Laura; Hermabessiere, Ludovic; Himber, Charlotte; Rinnert, Emmanuel; Rivière, Gilles; Lambert, Christophe; Soudant, Philippe; Huvet, Arnaud; Duflos, Guillaume; Paul-Pont, Ika

    2016-08-01

    Pollution of the oceans by microplastics (<5 mm) represents a major environmental problem. To date, a limited number of studies have investigated the level of contamination of marine organisms collected in situ. For extraction and characterization of microplastics in biological samples, the crucial step is the identification of solvent(s) or chemical(s) that efficiently dissolve organic matter without degrading plastic polymers for their identification in a time and cost effective way. Most published papers, as well as OSPAR recommendations for the development of a common monitoring protocol for plastic particles in fish and shellfish at the European level, use protocols containing nitric acid to digest the biological tissues, despite reports of polyamide degradation with this chemical. In the present study, six existing approaches were tested and their effects were compared on up to 15 different plastic polymers, as well as their efficiency in digesting biological matrices. Plastic integrity was evaluated through microscopic inspection, weighing, pyrolysis coupled with gas chromatography and mass spectrometry, and Raman spectrometry before and after digestion. Tissues from mussels, crabs and fish were digested before being filtered on glass fibre filters. Digestion efficiency was evaluated through microscopical inspection of the filters and determination of the relative removal of organic matter content after digestion. Five out of the six tested protocols led to significant degradation of plastic particles and/or insufficient tissue digestion. The protocol using a KOH 10% solution and incubation at 60 °C during a 24 h period led to an efficient digestion of biological tissues with no significant degradation on all tested polymers, except for cellulose acetate. This protocol appeared to be the best compromise for extraction and later identification of microplastics in biological samples and should be implemented in further monitoring studies to ensure

  9. The role of additional pulses in electropermeabilization protocols.

    PubMed

    Suárez, Cecilia; Soba, Alejandro; Maglietti, Felipe; Olaiz, Nahuel; Marshall, Guillermo

    2014-01-01

    Electropermeabilization (EP) based protocols such as those applied in medicine, food processing or environmental management, are well established and widely used. The applied voltage, as well as tissue electric conductivity, are of utmost importance for assessing final electropermeabilized area and thus EP effectiveness. Experimental results from literature report that, under certain EP protocols, consecutive pulses increase tissue electric conductivity and even the permeabilization amount. Here we introduce a theoretical model that takes into account this effect in the application of an EP-based protocol, and its validation with experimental measurements. The theoretical model describes the electric field distribution by a nonlinear Laplace equation with a variable conductivity coefficient depending on the electric field, the temperature and the quantity of pulses, and the Penne's Bioheat equation for temperature variations. In the experiments, a vegetable tissue model (potato slice) is used for measuring electric currents and tissue electropermeabilized area in different EP protocols. Experimental measurements show that, during sequential pulses and keeping constant the applied voltage, the electric current density and the blackened (electropermeabilized) area increase. This behavior can only be attributed to a rise in the electric conductivity due to a higher number of pulses. Accordingly, we present a theoretical modeling of an EP protocol that predicts correctly the increment in the electric current density observed experimentally during the addition of pulses. The model also demonstrates that the electric current increase is due to a rise in the electric conductivity, in turn induced by temperature and pulse number, with no significant changes in the electric field distribution. The EP model introduced, based on a novel formulation of the electric conductivity, leads to a more realistic description of the EP phenomenon, hopefully providing more accurate

  10. The Role of Additional Pulses in Electropermeabilization Protocols

    PubMed Central

    Suárez, Cecilia; Soba, Alejandro; Maglietti, Felipe; Olaiz, Nahuel; Marshall, Guillermo

    2014-01-01

    Electropermeabilization (EP) based protocols such as those applied in medicine, food processing or environmental management, are well established and widely used. The applied voltage, as well as tissue electric conductivity, are of utmost importance for assessing final electropermeabilized area and thus EP effectiveness. Experimental results from literature report that, under certain EP protocols, consecutive pulses increase tissue electric conductivity and even the permeabilization amount. Here we introduce a theoretical model that takes into account this effect in the application of an EP-based protocol, and its validation with experimental measurements. The theoretical model describes the electric field distribution by a nonlinear Laplace equation with a variable conductivity coefficient depending on the electric field, the temperature and the quantity of pulses, and the Penne's Bioheat equation for temperature variations. In the experiments, a vegetable tissue model (potato slice) is used for measuring electric currents and tissue electropermeabilized area in different EP protocols. Experimental measurements show that, during sequential pulses and keeping constant the applied voltage, the electric current density and the blackened (electropermeabilized) area increase. This behavior can only be attributed to a rise in the electric conductivity due to a higher number of pulses. Accordingly, we present a theoretical modeling of an EP protocol that predicts correctly the increment in the electric current density observed experimentally during the addition of pulses. The model also demonstrates that the electric current increase is due to a rise in the electric conductivity, in turn induced by temperature and pulse number, with no significant changes in the electric field distribution. The EP model introduced, based on a novel formulation of the electric conductivity, leads to a more realistic description of the EP phenomenon, hopefully providing more accurate

  11. Protocol Gas Verification Program Audit Reports

    EPA Pesticide Factsheets

    View the full reports from 2010 and 2013 of the PGVP audits, which tested the EPA Protocol gases that are used to calibrate continuous emission monitoring systems (CEMS), and the instruments used in EPA reference methods.

  12. A practical quantum bit commitment protocol

    NASA Astrophysics Data System (ADS)

    Arash Sheikholeslam, S.; Aaron Gulliver, T.

    2012-01-01

    In this paper, we introduce a new quantum bit commitment protocol which is secure against entanglement attacks. A general cheating strategy is examined and shown to be practically ineffective against the proposed approach.

  13. Entanglement distillation protocols and number theory

    NASA Astrophysics Data System (ADS)

    Bombin, H.; Martin-Delgado, M. A.

    2005-09-01

    We show that the analysis of entanglement distillation protocols for qudits of arbitrary dimension D benefits from applying basic concepts from number theory, since the set ZDn associated with Bell diagonal states is a module rather than a vector space. We find that a partition of ZDn into divisor classes characterizes the invariant properties of mixed Bell diagonal states under local permutations. We construct a very general class of recursion protocols by means of unitary operations implementing these local permutations. We study these distillation protocols depending on whether we use twirling operations in the intermediate steps or not, and we study them both analytically and numerically with Monte Carlo methods. In the absence of twirling operations, we construct extensions of the quantum privacy algorithms valid for secure communications with qudits of any dimension D . When D is a prime number, we show that distillation protocols are optimal both qualitatively and quantitatively.

  14. Authentication Protocol using Quantum Superposition States

    SciTech Connect

    Kanamori, Yoshito; Yoo, Seong-Moo; Gregory, Don A.; Sheldon, Frederick T

    2009-01-01

    When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in a group of many users. An authentication protocol using quantum superposition states instead of quantum entangled particles is proposed. The random number shared between a sender and a receiver can be used for classical encryption after the authentication has succeeded. The proposed protocol can be implemented with the current technologies we introduce in this paper.

  15. Evolution of Natural Attenuation Evaluation Protocols

    EPA Science Inventory

    Traditionally the evaluation of the efficacy of natural attenuation was based on changes in contaminant concentrations and mass reduction. Statistical tools and models such as Bioscreen provided evaluation protocols which now are being approached via other vehicles including m...

  16. Putting the Human Back in the Protocol

    NASA Astrophysics Data System (ADS)

    Christianson, Bruce

    Hello, everyone, and welcome to the 14th International Security Protocols Workshop. I’m going to start with a quotation from someone who, at least in principle, is in charge of a very different security community than ours:

  17. 16 CFR 1210.4 - Test protocol.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... STANDARD FOR CIGARETTE LIGHTERS Requirements for Child Resistance § 1210.4 Test protocol. (a) Child test... operating components that could affect child resistance to verify that they are within reasonable...

  18. 16 CFR 1212.4 - Test protocol.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... STANDARD FOR MULTI-PURPOSE LIGHTERS Requirements for Child-Resistance § 1212.4 Test protocol. (a) Child... could affect child resistance to verify that they are within reasonable operating tolerances for...

  19. 16 CFR 1212.4 - Test protocol.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... STANDARD FOR MULTI-PURPOSE LIGHTERS Requirements for Child-Resistance § 1212.4 Test protocol. (a) Child... could affect child resistance to verify that they are within reasonable operating tolerances for...

  20. 16 CFR 1210.4 - Test protocol.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... STANDARD FOR CIGARETTE LIGHTERS Requirements for Child Resistance § 1210.4 Test protocol. (a) Child test... operating components that could affect child resistance to verify that they are within reasonable...

  1. A Look Back at the Montreal Protocol

    NASA Video Gallery

    The Montreal Protocol is an international treaty designed to protect the ozone layer. This video takes a look back at how scientists, industry leaders, and policy makers came together to regulate C...

  2. A Demand Access Protocol for Space Applications

    NASA Technical Reports Server (NTRS)

    Gao, Jay L.; Leang, Dee

    2007-01-01

    This paper describes a demand access protocol for space communications, which is a messaging procedure that facilitates the exchange of resource requests and grants between users and service providers. A minimal set of operational and environmental needs and constraints are assumed since the intent is to keep the protocol flexible and efficient for a wide-range of envisioned NASA robotic and human exploration missions. The protocol described in this document defines the message format and procedures used to ensure proper and correct functioning of a demand access communications system, which must operate under customized resource management policies applied by the users and service providers. This protocol also assumes a minimal set of capabilities from the underlying communications system so that no unique requirements are imposed on the communications sub-systems.

  3. Design issues for floor control protocols

    NASA Astrophysics Data System (ADS)

    Dommel, Hans-Peter; Garcia-Luna-Aceves, Jose J.

    1995-03-01

    Floor control allows users of networked multimedia applications to remotely share resources like cursors, data views, video and audio channels, or entire applications without access conflicts. Floors are mutually exclusive permissions, granted dynamically to collaborating users, mitigating race conditions and guaranteeing fair and deadlock- free resource access. Although floor control is an early concept within computer-supported cooperative work, no framework exists and current floor control mechanisms are often limited to simple objects. While small-scale collaboration can be facilitated by social conventions, the importance of floors becomes evident for large-scale application sharing and teleconferencing orchestration. In this paper, the concept of a scalable session protocol is enhanced with floor control. Characteristics of collaborative environments are discussed, and session and floor control are discerned. The system's and user's requirements perspectives are discussed, including distributed storage policies, packet structure and user-interface design for floor presentation, manipulation, and triggering conditions for floor migration. Interaction stages between users, and scenarios of participant withdrawal, late joins, and establishment of subgroups are elicited with respect to floor generation, bookkeeping, and passing. An API is proposed to standardize and integrate floor control among shared applications. Finally, a concise classification for existing systems with a notion of floor control is introduced.

  4. Hybrid protocol of remote implementations of quantum operations

    NASA Astrophysics Data System (ADS)

    Zhao, Ning Bo; Wang, An Min

    2007-12-01

    We propose a protocol of remote implementations of quantum operations by hybridizing bidirectional quantum-state teleportation (BQST) [Huelga , Phys. Rev. A 63, 042303 (2001)] and the Wang protocol [Wang, Phys. Rev. A 74, 032317 (2006)]. The protocol is available for remote implementations of quantum operations in the restricted sets specified in the paper. We also give a proof of the protocol and point out its optimization. As an extension, this hybrid protocol can be reduced to the BQST and Wang protocols.

  5. Field Monitoring Protocol. Heat Pump Water Heaters

    SciTech Connect

    Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, C. E.

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  6. Protocol for communications in potentially noisy environments

    DOEpatents

    Boyd, Gerlad M.; Farrow, Jeffrey

    2016-02-09

    A communications protocol that is designed for transmission of data in networks that are subjected to harsh conditions is described herein. A network includes a plurality of devices, where the devices comprise respective nodes. The nodes are in communication with one another by way of a central network hub. The protocol causes the nodes to transmit data over a network bus at different data rates depending upon whether the nodes are operating normally or an arbitration procedure has been invoked.

  7. ABM Clinical Protocol #20: Engorgement, Revised 2016.

    PubMed

    Berens, Pamela; Brodribb, Wendy

    2016-05-01

    A central goal of The Academy of Breastfeeding Medicine is the development of clinical protocols for managing common medical problems that may impact breastfeeding success. These protocols serve only as guidelines for the care of breastfeeding mothers and infants and do not delineate an exclusive course of treatment or serve as standards of medical care. Variations in treatment may be appropriate according to the needs of an individual patient.

  8. ABM clinical protocol #13: contraception during breastfeeding.

    PubMed

    2006-01-01

    A central goal of the Academy of Breastfeeding Medicine is the development of clinical protocols for managing common medical problems that may influence breastfeeding success. These protocols serve only as guidelines for the care of breastfeeding mothers and infants and do not delineate an exclusive course of treatment or serve as standards of medical care. Variations in treatment may be appropriate according to the needs of an individual patient.

  9. Protocol Development | Division of Cancer Prevention

    Cancer.gov

    The chemoprevention Phase I and II consortia must submit Letters of Intent for review and approval prior to the submission and review of the protocol. Letter of Intent (LOI) Process The chemoprevention Phase I and II consortia must submit Letters of Intent for review and approval prior to the submission and review of the protocol. DCP will solicit Letters of Intent from investigators who want to conduct clinical trials with specific agents. |

  10. Field Monitoring Protocol: Heat Pump Water Heaters

    SciTech Connect

    Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, E.

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  11. Reconstruction de la surface de Fermi dans l'etat normal d'un supraconducteur a haute Tc: Une etude du transport electrique en champ magnetique intense

    NASA Astrophysics Data System (ADS)

    Le Boeuf, David

    Des mesures de resistance longitudinale et de resistance de Hall en champ magnetique intense transverse (perpendiculaire aux plans CuO2) ont ete effectuees au sein de monocristaux de YBa2Cu3Oy (YBCO) demacles, ordonnes et de grande purete, afin d'etudier l'etat fondamental des supraconducteurs a haute Tc dans le regime sous-dope. Cette etude a ete realisee en fonction du dopage et de l'orientation du courant d'excitation J par rapport a l'axe orthorhombique b de la structure cristalline. Les mesures en champ magnetique intense revelent par suppression de la supraconductivite des oscillations magnetiques des resistances longitudinale et de Hall dans YBa2Cu 3O6.51 et YBa2Cu4O8. La conformite du comportement de ces oscillations quantiques au formalisme de Lifshitz-Kosevich, apporte la preuve de l'existence d'une surface de Fermi fermee a caractere quasi-2D, abritant des quasiparticules coherentes respectant la statistique de Fermi-Dirac, dans la phase pseudogap d'YBCO. La faible frequence des oscillations quantiques, combinee avec l'etude de la partie monotone de la resistance de Hall en fonction de la temperature indique que la surface de Fermi d'YBCO sous-dope comprend une petite poche de Fermi occupee par des porteurs de charge negative. Cette particularite de la surface de Fermi dans le regime sous-dope incompatible avec les calculs de structure de bande est en fort contraste avec la structure electronique presente dans le regime surdope. Cette observation implique ainsi l'existence d'un point critique quantique dans le diagramme de phase d'YBCO, au voisinage duquel la surface de Fermi doit subir une reconstruction induite par l'etablissement d'une brisure de la symetrie de translation du reseau cristallin sous-jacent. Enfin, l'etude en fonction du dopage de la resistance de Hall et de la resistance longitudinale en champ magnetique intense suggere qu'un ordre du type onde de densite (DW) est responsable de la reconstruction de la surface de Fermi. L'analogie de

  12. Paralysie néonatal unilatérale du nerf radial

    PubMed Central

    Benemmane, Halima; Hali, Fouzia; Marnissi, Farida; Benchikhi, Hakima

    2015-01-01

    La paralysie néonatale unilatérale du nerf radial est rare, son diagnostic est essentiellement clinique, elle peut-être diagnostiquée à tort en tant que paralysie du plexus brachial. Nous rapportons un cas clinique. A l'examen clinique du nouveau-né; l'extension du poignet, du pouce et des articulations métacarpo-phalangiennes était impossible, alors qu'il y avait une conservation de la prono-supination et la flexion du poignet et des mouvements de l’épaule et du coude. Le diagnostic de la paralysie du plexus brachial était écarté cliniquement devant la mobilisation active de l’épaule et la flexion du coude. Notre patient a bénéficié de kinésithérapie pour éviter l'apparition d'attitudes vicieuses et d'amyotrophie. L'extension active du poignet était obtenue après deux mois. PMID:26587133

  13. Les inconvénients de perdre du poids

    PubMed Central

    Bosomworth, N. John

    2012-01-01

    Résumé Objectif Explorer les raisons pour lesquelles la perte de poids à long terme échoue la plupart du temps et évaluer les conséquences de diverses trajectoires pondérales, y compris la stabilité, la perte et le gain. Source des données Les études qui évaluent les paramètres pondéraux dans la population sont en majorité observationnelles. Des données probantes de niveau I ont été publiées pour évaluer l’influence des interventions relatives au poids sur la mortalité et la qualité de vie. Message principal Seulement un petit pourcentage des personnes qui désirent perdre du poids réussissent à le faire de manière durable. La mortalité est la plus faible chez les personnes se situant dans la catégorie de poids élevé-normal et surpoids. La trajectoire pondérale la plus sécuritaire est la stabilité du poids avec une optimisation de la condition physique et métabolique. Il est démontré que la mortalité est plus faible chez les personnes ayant des comorbidités reliées à l’obésité si elles perdent du poids. Il est aussi établi que la qualité de vie sur le plan de la santé est meilleure chez les personnes obèses qui perdent du poids. Par contre, la perte de poids chez une personne obèse autrement en santé est associée à une mortalité accrue. Conclusion La perte de poids est recommandable seulement chez les personnes qui ont des comorbidités reliées à l’obésité. Les personnes obèses en santé qui veulent perdre du poids devraient être informées qu’il peut y avoir des risques à le faire. Une stratégie qui se traduit par un indice de masse corporelle stable avec une condition physique et métabolique optimisée, peu importe le poids, est l’option d’intervention la plus sécuritaire en ce qui concerne le poids.

  14. [A security protocol for the exchange of personal medical data via Internet: monitoring treatment and drug effects].

    PubMed

    Viviani, R; Fischer, J; Spitzer, M; Freudenmann, R W

    2004-04-01

    We present a security protocol for the exchange of medical data via the Internet, based on the type/domain model. We discuss two applications of the protocol: in a system for the exchange of data for quality assurance, and in an on-line database of adverse reactions to drug use. We state that a type/domain security protocol can successfully comply with the complex requirements for data privacy and accessibility typical of such applications.

  15. A neuropsychological-genetic profile of atypical cri du chat syndrome: implications for prognosis.

    PubMed

    Cornish, K M; Cross, G; Green, A; Willatt, L; Bradshaw, J M

    1999-07-01

    Cri du chat syndrome is associated with a deletion on the short arm of chromosome 5. The main diagnostic feature is a high pitched, cat-like cry which has recently been localised to 5p15.3 and is separate from the remaining clinical features of the syndrome, which have been localised to 5p15.2. The present study describes a family of four who have a deletion slightly distal (5p15.3) to the critical region. Detailed neuropsychological evaluations indicated a similar pattern of cognitive performance to that reported for subjects with typical CDCS but with only minimal intellectual impairment. In addition, in this family the 5p deletion is transmitted in an autosomal dominant fashion, contrasting with most cases of CDCS, which are either de novo or occur as an unbalanced product of a balanced translocation in a normal parent. This study confirms the importance of differentiating between 5p deletions that coincide with the typical cri du chat phenotype which includes severe to profound learning disability and deletions that only delete the distal critical region that coincides with a milder degree of cognitive impairment and a much improved prognosis.

  16. [The image of animal magnetism in fictional literature: the cases of Poe, Doyle and Du Maurier].

    PubMed

    Bonet Safont, Juan Marcos

    2014-01-01

    In this article, we focus on the social image of the phenomenon known as mesmerism, or animal magnetism, through analysis of the works: The Facts in the Case of M. Valdemar (1845) by Edgar Allan Poe, The Great Keinplatz Experiment (1885) by Conan Doyle and Trilby (1894) by George Du Maurier. We describe the stereotype of the mesmerist and the uses of mesmerism observed. We pay attention to the spaces and actors of the mesmeric transcript presented in the stories. We consider the reception of these stories by the public and the relationship of the authors with mesmeric and hypnotic knowledge. Nowadays, academic researchers in the discipline of psychology publish articles and books on popular myths about hypnosis in attempts to depict the distorted images related to this phenomenon. This distorted image of the hypnotic process and the hypnotist derives from "circus" hypnotism shows (stage hypnosis), the cinema, television and fictional literature. Works of fiction represent a unique and invaluable source of information, ideas, speculations, concerns and opportunities around animal magnetism and hypnosis, and the exploration and analysis of this literature is an essential chapter in any historical study of this topic. We see how the literary use of mesmerism by Poe, Doyle and Du Maurier is not chance or peripheral, with all three being intellectually interested in and stimulated by these ideas.

  17. Du-zhong (Eucommia ulmoides) prevents disuse-induced osteoporosis in hind limb suspension rats.

    PubMed

    Pan, Yalei; Niu, Yinbo; Li, Chenrui; Zhai, Yuankun; Zhang, Rong; Guo, Xin; Mei, Qibing

    2014-01-01

    Du-Zhong has a long history of being used in traditional Chinese formulas to treat bone related diseases. The objective of the present study is to systematically investigate the effects of Du-Zhong cortex extract (DZCE) on disuse-induced osteoporosis. Rats were randomly divided into four groups, and three groups were treated with hind limb suspension (HLS). Control and HLS group received deionized distilled water, while the other two groups received alendronate (2.0 mg/kg/day) and DZCE (300 mg/kg/day) respectively by intragastric gavage for six weeks (two weeks prior to and during the four weeks of HLS). Dual-energy X-ray absorptiometry, assay of biochemical markers, and three-point bending test were employed to determine the effect of various treatments on bone mass, turnover, and strength. The trabecular bone microarchitecture was assessed by microCT analysis. DZCE could effectively prevent the bone loss induced by HLS, which was indicated by decreased levels of bone turnover markers as well as the changes in urinary calcium and phosphorus. The DZCE treatment also enhanced the biomechanical strength of bone and prevented the deterioration of trabecular bone microarchitecture. DZCE administration was able to prevent disuse-induced osteoporosis by regulating the bone metabolism, suggesting that DZCE could be used as an alternative therapy for the prevention of disuse-induced osteoporosis.

  18. Wetlands of Argonne National Laboratory-East DuPage County, Illinois

    SciTech Connect

    Van Lonkhuyzen, R.A.; LaGory, K.E.

    1994-03-01

    Jurisdictional wetlands of the Argonne National Laboratory-East (ANL-E) site in DuPage County, Illinois, were delineated in the summer and autumn of 1993 in accordance with the 1987 US Army Corps of Engineers methodology. Potential wetland sites with an area greater than 500 m{sup 2} (0.05 ha [0.124 acre]) were identified for delineation on the basis of aerial photographs, the DuPage County soil survey, and reconnaissance-level field studies. To qualify as a jurisdictional wetland, an area had to support a predominance of hydrophytic vegetation as well as have hydric soil and wetland hydrology. Thirty-five individual jurisdictional wetlands were delineated at ANL-E, totaling 180,604 m{sup 2} (18.1 ha [44.6 acres]). These wetlands were digitized onto the ANL-E site map for use in project planning. Characteristics of each wetland are presented -- including size, dominant plant species and their indicator status, hydrologic characteristics (including water source), and soil characteristics.

  19. Conceptual design and first results of a combined electrical resistivity and induced polarization monitoring at the Aiguille du Midi rock permafrost summit (Mont Blanc Massif, French/Italian Alps)

    NASA Astrophysics Data System (ADS)

    Krautblatter, M.; Verleysdonk, S.; Flores-Orozco, A.; Kemna, A.; Deline, P.; Ravanel, L.; Pogliotti, P.; Coviello, V.; Malet, E.

    2009-04-01

    Monitoring of systemic changes in high mountain rock permafrost proves to be of increasing significance. The association with ongoing and future climate change raises the need for monitoring schemes to enable modelling of future scenarios. Due to the high degree of tourist utilisation and the good accessibility via cable car, the Aiguille du Midi represents the ideal premises to establish a long-term monitoring site. At 3842 m a.s.l. the steep granite summit offers access to all aspects in combination with persistent ice in the rock face and different rock mechanical settings. The geophysical monitoring presented here integrates into the framework of the French-Italian PERMAdataROC project and is presently considered for the EU co-funded project PermaNET (Permafrost long-term monitoring network: www.permanet-alpinespace.eu). ERT and IP were conducted along three transects at the Aiguille du Midi in December 2008. Two transects were installed along galleries and in the rock faces that are accessible from the public platform at 3770 m a.s.l.. A further transect was installed by abseiling from the summit to the steep north and south face. The southern limb of the transect goes past the meteorological station installed in a vertical rock section. All transects were measured with a Syscal Pro device with high voltages of 800 V and we applied 48 steel electrodes per transect placed firmly in drilled holes. For optimum coverage we developed a high-resolution ERT protocol with approximately 3000 dipole-dipole measurements per array and 200 cross-borehole type measurements. Time domain IP was measured alongside to check chargeability of clefts with fine-grained fillings. Simultaneously, a survey of all important clefts was made to reference chargeability values. Both ERT and IP measurements were recorded in normal and reciprocal orientation and are used to define the error levels inherent in the measurements. A smoothness-constrained Occam's inversion is then adjusted to

  20. HORACE: Presentation-Level Protocol Standard for Digital Transmission of Monochrome Television Images

    DTIC Science & Technology

    1993-11-01

    3 4.4.6 DS- 1C [Half-DS-2) (3.156 mb/s) ............ 4-3 4.4.7 DS-2 (6.312 mb/s) ........................... 4-3 4.4.8 DS-A (Two DS-2) (12.624 mb/s...skip at 15:1 or 7:1. 4.4.5 DS-1 (1.544 mb/s). Fixed or variable skip modes up to 3:1 can be used at this rate. 4.4.6 DS- 1C (Half-DS-2) (3.156 mb/sL...Rieger and Edward K. Tipler . NWC Technical Publication 5837. China Lake: NWC, October 1976. 25. - - -. - - -. Integrated Range Television System. By

  1. A Standardized Protocol for the Initial Evaluation and Documentation of Mild Brain Injury

    PubMed Central

    Cameron, Kenneth L.; Yunker, Craig A.; Austin, Marchell C.

    1999-01-01

    Objective: To present a protocol for the initial assessment and documentation of mild brain injury, a protocol that is used within the Department of Physical Education at the United States Military Academy. Background: Recently, much attention has been given to the assessment and management of mild brain injury by the sports medicine community. Although the classification of and management strategies for mild brain injury have been well disputed, most experts agree on the essentials of the sideline or initial evaluation. According to leading experts, if an athlete has experienced an episode of mild brain injury, the initial signs and symptoms, as well as the course of those signs and symptoms, should be documented. Description: Although many athletic training texts formerly discussed techniques for evaluating an episode of mild brain injury, few present an objective protocol to follow. Our protocol includes 3 components. The first component is the initial evaluation, which incorporates serial observations during the first 20 minutes after injury, with neurologic checks every 5 minutes. The second component includes a take-home sheet for athletes not referred to a physician for further evaluation. The third part of the protocol is a 24-hour postinjury follow-up examination for any signs or symptoms of postconcussion syndrome. Finally, we present the indications for referral to a physician for further evaluation. Clinical Advantages/Recommendations: Using a standard protocol to guide evaluation and to document the initial course of signs and symptoms after mild brain injury allows the sports medicine staff to make better management decisions. In addition, patient instructions and the course of follow-up evaluations can be improved if a standard protocol is employed. Our protocol has been developed to meet the needs both of athletes who are exposed to mild brain injury on a daily basis and of the certified athletic trainers who initially evaluate them; the protocol

  2. Participation des médecins généralistes de la province de Benimellal (Maroc) dans le dépistage du cancer du col

    PubMed Central

    Nani, Samira; Benallal, Mohamed; Hassoune, Samira; Kissi, Dounia; Maaroufi, Abderrahmane

    2013-01-01

    Introduction Au Maroc, chaque année il y aurait environ 2000 nouveaux cas de cancer du col et les 2/3 des cas sont pris en charge à un stade très avancé. Nous avons mené une étude transversale, exhaustive incluant les 71 médecins généralistes exerçant dans les établissements de soins de santé de base du secteur public et privé de la province de Benimellal. Le but était d’évaluer leurs connaissances et leur participation au dépistage du cancer du col. Méthodes Nous avons mené une étude transversale, exhaustive incluant les 71 médecins généralistes exerçant dans les établissements de soins de santé de base du secteur public et privé de la province de Benimellal. Le but était d’évaluer leurs connaissances et leur participation au dépistage du cancer du col. Résultats Le niveau de connaissance était relativement modeste, 22 médecins généraliste avaient répondu à la question sur l'incidence du cancer du col au Maroc, Parmi eux (81,8%) avaient donné une réponse incorrecte. L'Herpes Papilloma virus comme facteur de risque du cancer du col a été identifié par seulement 21% des médecins généralistes. La participation au dépistage était également défaillante, 92,8% n'avaient jamais pratiqué le FCV chez leurs patientes à cause principalement du manque de formation (95,5%). Conclusion Les résultats montrent la nécessité d'améliorer les connaissances théoriques et pratique des médecins généralistes concernant le dépistage du cancer du col. PMID:23785557

  3. The Use of Efficient Broadcast Protocols in Asynchronous Distributed Systems. Ph.D. Thesis

    NASA Technical Reports Server (NTRS)

    Schmuck, Frank Bernhard

    1988-01-01

    Reliable broadcast protocols are important tools in distributed and fault-tolerant programming. They are useful for sharing information and for maintaining replicated data in a distributed system. However, a wide range of such protocols has been proposed. These protocols differ in their fault tolerance and delivery ordering characteristics. There is a tradeoff between the cost of a broadcast protocol and how much ordering it provides. It is, therefore, desirable to employ protocols that support only a low degree of ordering whenever possible. This dissertation presents techniques for deciding how strongly ordered a protocol is necessary to solve a given application problem. It is shown that there are two distinct classes of application problems: problems that can be solved with efficient, asynchronous protocols, and problems that require global ordering. The concept of a linearization function that maps partially ordered sets of events to totally ordered histories is introduced. How to construct an asynchronous implementation that solves a given problem if a linearization function for it can be found is shown. It is proved that in general the question of whether a problem has an asynchronous solution is undecidable. Hence there exists no general algorithm that would automatically construct a suitable linearization function for a given problem. Therefore, an important subclass of problems that have certain commutativity properties are considered. Techniques for constructing asynchronous implementations for this class are presented. These techniques are useful for constructing efficient asynchronous implementations for a broad range of practical problems.

  4. A New On-Line Diagnosis Protocol for the SPIDER Family of Byzantine Fault Tolerant Architectures

    NASA Technical Reports Server (NTRS)

    Geser, Alfons; Miner, Paul S.

    2004-01-01

    This paper presents the formal verification of a new protocol for online distributed diagnosis for the SPIDER family of architectures. An instance of the Scalable Processor-Independent Design for Electromagnetic Resilience (SPIDER) architecture consists of a collection of processing elements communicating over a Reliable Optical Bus (ROBUS). The ROBUS is a specialized fault-tolerant device that guarantees Interactive Consistency, Distributed Diagnosis (Group Membership), and Synchronization in the presence of a bounded number of physical faults. Formal verification of the original SPIDER diagnosis protocol provided a detailed understanding that led to the discovery of a significantly more efficient protocol. The original protocol was adapted from the formally verified protocol used in the MAFT architecture. It required O(N) message exchanges per defendant to correctly diagnose failures in a system with N nodes. The new protocol achieves the same diagnostic fidelity, but only requires O(1) exchanges per defendant. This paper presents this new diagnosis protocol and a formal proof of its correctness using PVS.

  5. Regulation of DU145 prostate cancer cell growth by Scm-like with four mbt domains 2.

    PubMed

    Lee, Kwanghyun; Na, Wonho; Maeng, Je-Heon; Wu, Hongjin; Ju, Bong-Gun

    2013-03-01

    Mammalian SFMBTs have been considered to be polycomb group repressors. However, molecular mechanisms underlying mammalian SFMBTs-mediated gene regulation and their biological function have not been characterized. In the present study, we identified YY1 and methylated histones as interacting proteins of human SFMBT2. We also found that human SFMBT2 binds preferentially to methylated histone H3 and H4 that are associated with transcriptional repression. Using DU145 prostate cancer cells as a model, we showed that SFMBT2 has a transcriptional repression activity on HOXB13 gene expression. In addition, occupancy of SFMBT2 coincided with enrichment of diand tri-methylated H3K9 and H4K20 as well as tri-methylated H3K27 at the HOXB13 gene promoter. When SFMBT2 was depleted by siRNA in DU145 prostate cancer cells, significant up-regulation of HOXB13 gene expression and decreased cell growth were observed. Collectively, our findings indicate that human SFMBT2 may regulate cell growth via epigenetic regulation of HOXB13 gene expression in DU145 prostate cancer cells.

  6. Rupture simultanée du ligament croisé antérieur et du ligament patellaire: à propos d'un cas

    PubMed Central

    Achkoun, Abdessalam; Houjairi, Khalid; Quahtan, Omar; Hassoun, Jalal; Arssi, Mohamed; Rahmi, Mohamed; Garch, Abdelhak

    2016-01-01

    La rupture simultanée du tendon rotulien et du ligament croisé antérieur est une lésion relativement rare. Son diagnostic peut facilement manquer lors de l'examen initial. Les options de traitement incluent la réparation immédiate du tendon rotulien avec soit la reconstruction simultanée ou différée de ligament croisé antérieur. Nous rapportons le cas d'une rupture combinée du tendon rotulien et du ligament croisé antérieur chez un jeune footballeur de 22 ans. Une approche de traitement en deux temps a été effectuée avec un excellent résultat fonctionnel. PMID:27366288

  7. A Self-Stabilizing Hybrid-Fault Tolerant Synchronization Protocol

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.

    2014-01-01

    In this report we present a strategy for solving the Byzantine general problem for self-stabilizing a fully connected network from an arbitrary state and in the presence of any number of faults with various severities including any number of arbitrary (Byzantine) faulty nodes. Our solution applies to realizable systems, while allowing for differences in the network elements, provided that the number of arbitrary faults is not more than a third of the network size. The only constraint on the behavior of a node is that the interactions with other nodes are restricted to defined links and interfaces. Our solution does not rely on assumptions about the initial state of the system and no central clock nor centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. We also present a mechanical verification of a proposed protocol. A bounded model of the protocol is verified using the Symbolic Model Verifier (SMV). The model checking effort is focused on verifying correctness of the bounded model of the protocol as well as confirming claims of determinism and linear convergence with respect to the self-stabilization period. We believe that our proposed solution solves the general case of the clock synchronization problem.

  8. Laser Capture Microdissection Protocol for Xylem Tissues of Woody Plants

    PubMed Central

    Blokhina, Olga; Valerio, Concetta; Sokołowska, Katarzyna; Zhao, Lei; Kärkönen, Anna; Niittylä, Totte; Fagerstedt, Kurt

    2017-01-01

    Laser capture microdissection (LCM) enables precise dissection and collection of individual cell types from complex tissues. When applied to plant cells, and especially to woody tissues, LCM requires extensive optimization to overcome such factors as rigid cell walls, large central vacuoles, intercellular spaces, and technical issues with thickness and flatness of the sections. Here we present an optimized protocol for the laser-assisted microdissection of developing xylem from mature trees: a gymnosperm (Norway spruce, Picea abies) and an angiosperm (aspen, Populus tremula) tree. Different cell types of spruce and aspen wood (i.e., ray cells, tracheary elements, and fibers) were successfully microdissected from tangential, cross and radial cryosections of the current year’s growth ring. Two approaches were applied to achieve satisfactory flatness and anatomical integrity of the spruce and aspen specimens. The commonly used membrane slides were ineffective as a mounting surface for the wood cryosections. Instead, in the present protocol we use glass slides, and introduce a glass slide sandwich assembly for the preparation of aspen sections. To ascertain that not only the anatomical integrity of the plant tissue, but also the molecular features were not compromised during the whole LCM procedure, good quality total RNA could be extracted from the microdissected cells. This showed the efficiency of the protocol and established that our methodology can be integrated in transcriptome analyses to elucidate cell-specific molecular events regulating wood formation in trees. PMID:28101088

  9. A protocol for management of temporomandibular joint ankylosis in children.

    PubMed

    Kaban, Leonard B; Bouchard, Carl; Troulis, Maria J

    2009-09-01

    Temporomandibular joint (TMJ) ankylosis in children is a challenging problem. Surgical correction is technically difficult and the incidence of recurrence after treatment is high. The purpose of the present report is to describe the protocol currently used at the Massachusetts General Hospital for the management of TMJ ankylosis in children. It has been our observation that the most common cause of treatment failure is inadequate resection of the ankylotic mass and failure to achieve adequate passive maximal opening in the operating room. The 7-step protocol consists of 1) aggressive excision of the fibrous and/or bony ankylotic mass, 2) coronoidectomy on the affected side, 3) coronoidectomy on the contralateral side, if steps 1 and 2 do not result in a maximal incisal opening greater than 35 mm or to the point of dislocation of the unaffected TMJ, 4) lining of the TMJ with a temporalis myofascial flap or the native disc, if it can be salvaged, 5) reconstruction of the ramus condyle unit with either distraction osteogenesis or costochondral graft and rigid fixation, and 6) early mobilization of the jaw. If distraction osteogenesis is used to reconstruct the ramus condyle unit, mobilization begins the day of the operation. In patients who undergo costochondral graft reconstruction, mobilization begins after 10 days of maxillomandibular fixation. Finally (step 7), all patients receive aggressive physiotherapy. A case series of children with ankylosis treated using this protocol is presented.

  10. [Use of standard protocols in the evaluation of voice disorders].

    PubMed

    Arias, C; Bless, D M; Khidr, A

    1992-01-01

    The purpose of this paper is to present a protocol for the use of standard forms in the evaluation of laryngeal structure and function in patients with voice disorders. The forms are designed to cover all the essential parameters needed to reach an accurate descriptive diagnosis which allows us to have an appropriate therapy plan according to the individual's detailed observations. It also gives us a consistent standardized evaluation form to measure changes after therapy whether behavioral, medical or surgical, and to compare different observations across patients. Reporting observations in this consistent manner will make characteristic patterns of different vocal behaviors readily obvious to the researcher or the clinician and reduce the possibility of missing any important details. The protocols are: indirect laryngoscopy, video-stroboscopic-evaluation form, functional voice and auditory perceptual voice evaluation.

  11. An Energy Efficient Protocol For The Internet Of Things

    NASA Astrophysics Data System (ADS)

    Venčkauskas, Algimantas; Jusas, Nerijus; Kazanavičius, Egidijus; Štuikys, Vytautas

    2015-01-01

    The Internet of Things (IoT) is a technological revolution that represents the future of computing and communications. One of the most important challenges of IoT is security: protection of data and privacy. The SSL protocol is the de-facto standard for secure Internet communications. The extra energy cost of encrypting and authenticating of the application data with SSL is around 15%. For IoT devices, where energy resources are limited, the increase in the cost of energy is a very significant factor. In this paper we present the energy efficient SSL protocol which ensures the maximum bandwidth and the required level of security with minimum energy consumption. The proper selection of the security level and CPU multiplier, can save up to 85% of the energy required for data encryption.

  12. Standardized cardiovascular magnetic resonance (CMR) protocols 2013 update

    PubMed Central

    2013-01-01

    This document is an update to the 2008 publication of the Society for Cardiovascular Magnetic Resonance (SCMR) Board of Trustees Task Force on Standardized Protocols. Since the time of the original publication, 3 additional task forces (Reporting, Post-Processing, and Congenital Heart Disease) have published documents that should be referred to in conjunction with the present document. The section on general principles and techniques has been expanded as more of the techniques common to CMR have been standardized. There is still a great deal of development in the area of tissue characterization/mapping, so these protocols have been in general left as optional. The authors hope that this document continues to standardize and simplify the patient-based approach to clinical CMR. It will be updated at regular intervals as the field of CMR advances. PMID:24103764

  13. Standardized cardiovascular magnetic resonance (CMR) protocols 2013 update.

    PubMed

    Kramer, Christopher M; Barkhausen, Jörg; Flamm, Scott D; Kim, Raymond J; Nagel, Eike

    2013-10-08

    This document is an update to the 2008 publication of the Society for Cardiovascular Magnetic Resonance (SCMR) Board of Trustees Task Force on Standardized Protocols. Since the time of the original publication, 3 additional task forces (Reporting, Post-Processing, and Congenital Heart Disease) have published documents that should be referred to in conjunction with the present document. The section on general principles and techniques has been expanded as more of the techniques common to CMR have been standardized. There is still a great deal of development in the area of tissue characterization/mapping, so these protocols have been in general left as optional. The authors hope that this document continues to standardize and simplify the patient-based approach to clinical CMR. It will be updated at regular intervals as the field of CMR advances.

  14. Proposed traceable structural resolution protocols for 3D imaging systems

    NASA Astrophysics Data System (ADS)

    MacKinnon, David; Beraldin, J.-Angelo; Cournoyer, Luc; Carrier, Benjamin; Blais, François

    2009-08-01

    A protocol for determining structural resolution using a potentially-traceable reference material is proposed. Where possible, terminology was selected to conform to those published in ISO JCGM 200:2008 (VIM) and ASTM E 2544-08 documents. The concepts of resolvability and edge width are introduced to more completely describe the ability of an optical non-contact 3D imaging system to resolve small features. A distinction is made between 3D range cameras, that obtain spatial data from the total field of view at once, and 3D range scanners, that accumulate spatial data for the total field of view over time. The protocol is presented through the evaluation of a 3D laser line range scanner.

  15. Direct Cellular Lysis/Protein Extraction Protocol for Soil Metaproteomics

    SciTech Connect

    Chourey, Karuna; Jansson, Janet; Verberkmoes, Nathan C; Shah, Manesh B; Chavarria, Krystle L.; Tom, Lauren M; Brodie, Eoin L.; Hettich, Robert {Bob} L

    2010-01-01

    We present a novel direct protocol for deep proteome characterization of microorganisms in soil. The method employs thermally assisted detergent-based cellular lysis (SDS) of soil samples, followed by TCA precipitation for proteome extraction/cleanup prior to liquid chromatography-mass spectrometric characterization. This approach was developed and optimized using different soils inoculated with genome-sequenced bacteria (Gram-negative Pseudomonas putida or Gram-positive Arthrobacter chlorophenolicus). Direct soil protein extraction was compared to protein extraction from cells isolated from the soil matrix prior to lysis (indirect method). Each approach resulted in identification of greater than 500 unique proteins, with a wide range in molecular mass and functional categories. To our knowledge, this SDS-TCA approach enables the deepest proteome characterizations of microbes in soil to date, without significant biases in protein size, localization, or functional category compared to pure cultures. This protocol should provide a powerful tool for ecological studies of soil microbial communities.

  16. [An update of the obstetrics hemorrhage treatment protocol].

    PubMed

    Morillas-Ramírez, F; Ortiz-Gómez, J R; Palacio-Abizanda, F J; Fornet-Ruiz, I; Pérez-Lucas, R; Bermejo-Albares, L

    2014-04-01

    Obstetric hemorrhage is still a major cause of maternal and fetal morbimortality in developed countries. This is an underestimated problem, which usually appears unpredictably. A high proportion of the morbidity of obstetric hemorrhage is considered to be preventable if adequately managed. The major international clinical guidelines recommend producing consensus management protocols, adapted to local characteristics and keep them updated in the light of experience and new scientific publications. We present a protocol updated, according to the latest recommendations, and our own experience, in order to be used as a basis for those anesthesiologists who wish to use and adapt it locally to their daily work. This last aspect is very important to be effective, and is a task to be performed at each center, according to the availability of resources, personnel and architectural features.

  17. Direct cellular lysis/protein extraction protocol for soil metaproteomics.

    PubMed

    Chourey, Karuna; Jansson, Janet; VerBerkmoes, Nathan; Shah, Manesh; Chavarria, Krystle L; Tom, Lauren M; Brodie, Eoin L; Hettich, Robert L

    2010-12-03

    We present a novel direct protocol for deep proteome characterization of microorganisms in soil. The method employs thermally assisted detergent-based cellular lysis (SDS) of soil samples, followed by TCA precipitation for proteome extraction/cleanup prior to liquid chromatography-mass spectrometric characterization. This approach was developed and optimized using different soils inoculated with genome-sequenced bacteria (Gram-negative Pseudomonas putida or Gram-positive Arthrobacter chlorophenolicus). Direct soil protein extraction was compared to protein extraction from cells isolated from the soil matrix prior to lysis (indirect method). Each approach resulted in identification of greater than 500 unique proteins, with a wide range in molecular mass and functional categories. To our knowledge, this SDS-TCA approach enables the deepest proteome characterizations of microbes in soil to date, without significant biases in protein size, localization, or functional category compared to pure cultures. This protocol should provide a powerful tool for ecological studies of soil microbial communities.

  18. Reliable multicast protocol specifications flow control and NACK policy

    NASA Technical Reports Server (NTRS)

    Callahan, John R.; Montgomery, Todd L.; Whetten, Brian

    1995-01-01

    This appendix presents the flow and congestion control schemes recommended for RMP and a NACK policy based on the whiteboard tool. Because RMP uses a primarily NACK based error detection scheme, there is no direct feedback path through which receivers can signal losses through low buffer space or congestion. Reliable multicast protocols also suffer from the fact that throughput for a multicast group must be divided among the members of the group. This division is usually very dynamic in nature and therefore does not lend itself well to a priori determination. These facts have led the flow and congestion control schemes of RMP to be made completely orthogonal to the protocol specification. This allows several differing schemes to be used in different environments to produce the best results. As a default, a modified sliding window scheme based on previous algorithms are suggested and described below.

  19. Protocol for Communication Networking for Formation Flying

    NASA Technical Reports Server (NTRS)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in

  20. Sender- and Receiver-Initiated Multiple Access Protocols for Ad-Hoc Networks

    DTIC Science & Technology

    2000-12-01

    including MACA [55], MACAW [13], IEEE 802.11 [3], and FAMA [36]. These examples, and most protocols based on collision-avoidance handshakes to date are...used in protocols like MACA [55], MACAW [13] and FAMA [35, 36]. In RIMA with simple polling (RIMA-SP), the receiver sends a Ready-to-Receive (RTR...used the OPNET simulation tool to implement the protocols. Table 2.2 presents the results for RIMA-DP, FAMA-NCS, and MACAW ; the results for MACAW are

  1. The Modeling Library of Eavesdropping Methods in Quantum Cryptography Protocols by Model Checking

    NASA Astrophysics Data System (ADS)

    Yang, Fan; Yang, Guowu; Hao, Yujie

    2016-07-01

    The most crucial issue of quantum cryptography protocols is its security. There exists many ways to attack the quantum communication process. In this paper, we present a model checking method for modeling the eavesdropping in quantum information protocols. So when the security properties of a certain protocol are needed to be verified, we can directly use the models which are already built. Here we adopt the probabilistic model checking tool—PRISM to model these attack methods. The verification results show that the detection rate of eavesdropping is approximately close to 1 when enough photons are transmitted.

  2. Evaluation of the Telecommunications Protocol Processing Subsystem Using Reconfigurable Interoperable Gate Array

    NASA Technical Reports Server (NTRS)

    Pang, Jackson; Liddicoat, Albert; Ralston, Jesse; Pingree, Paula

    2006-01-01

    The current implementation of the Telecommunications Protocol Processing Subsystem Using Reconfigurable Interoperable Gate Arrays (TRIGA) is equipped with CFDP protocol and CCSDS Telemetry and Telecommand framing schemes to replace the CPU intensive software counterpart implementation for reliable deep space communication. We present the hardware/software co-design methodology used to accomplish high data rate throughput. The hardware CFDP protocol stack implementation is then compared against the two recent flight implementations. The results from our experiments show that TRIGA offers more than 3 orders of magnitude throughput improvement with less than one-tenth of the power consumption.

  3. Optimizing local protocols for implementing bipartite nonlocal unitary gates using prior entanglement and classical communication

    SciTech Connect

    Cohen, Scott M.

    2010-06-15

    We present a method of optimizing recently designed protocols for implementing an arbitrary nonlocal unitary gate acting on a bipartite system. These protocols use only local operations and classical communication with the assistance of entanglement, and they are deterministic while also being 'one-shot', in that they use only one copy of an entangled resource state. The optimization minimizes the amount of entanglement needed, and also the amount of classical communication, and it is often the case that less of each of these resources is needed than with an alternative protocol using two-way teleportation.

  4. A Draft Test Protocol for Detecting Possible Biohazards in Martian Samples Returned to Earth

    NASA Technical Reports Server (NTRS)

    Rummel, John D. (Editor); Race, Margaret S.; DeVincenzi, Donald L.; Schad, P. Jackson; Stabekis, Pericles D.; Viso, Michel; Acevedo, Sara E.

    2002-01-01

    This document presents the first complete draft of a protocol for detecting possible biohazards in Mars samples returned to Earth: it is the final product of the Mars Sample Handling Protocol Workshop Series. convened in 2000-2001 by NASA's Planetary Protection Officer. The goal of the five-workshop Series vas to develop a comprehensive protocol by which returned martian sample materials could be assessed k r the presence of any biological hazard(s) while safeguarding the purity of the samples from possible terrestrial contamination.

  5. A Draft Test Protocol for Detecting Possible Biohazards in Martian Samples Returned to Earth

    NASA Technical Reports Server (NTRS)

    Rummel, John D.; Race, Margaret S.; DeVinenzi, Donald L.; Schad, P. Jackson; Stabekis, Pericles D.; Viso, Michel; Acevedo, Sara E.

    2002-01-01

    This document presents the first complete draft of a protocol for detecting possible biohazards in Mars samples returned to Earth; it is the final product of the Mars Sample Handling Protocol Workshop Series, convened in 2000-2001 by NASA's Planetary Protection Officer. The goal of the five-workshop Series vas to develop a comprehensive protocol by which returned martian sample materials could be assessed for the presence of any biological hazard(s) while safeguarding the purity of the samples from possible terrestrial contamination The reference numbers for the proceedings from the five individual Workshops.

  6. A Conversation with Lee Alvin DuBridge - Part I

    NASA Astrophysics Data System (ADS)

    Goodstein, Judith R.

    Physicist Lee A. DuBridge became president of the California Institute of Technology in 1946. In this interview he recalls the immediate problems he faced, including his dealings with Robert A. Millikan, whom he replaced as chief administrator of the institute; institute financing and inadequate salaries. DuBridge also talks about the advent of federal support for peacetime science and Millikan's distaste for it; his close working relationship with Robert F. Bacher, who came to the institute in 1949 as chairman of the Division of Physics, Mathematics, and Astronomy; his recollections of the meteorologist Irving P. Krick, the physicist Alexander Goetz, and the chemist Linus Pauling; and his attempts to build up the Humanities Division.

  7. Katimavik Out-Trip Protocol.

    ERIC Educational Resources Information Center

    OPCAN, Montreal (Quebec).

    A supplement to the active leisure learning student manual for Katimavik (the 9-month volunteer community service and experiential learning program for 17-21 year old Canadians) provides in greater detail the procedure for preparing and implementing the Outdoor Wilderness Trip. Sections presented are definition of terms, national training,…

  8. Teaching Presentation Skills

    ERIC Educational Resources Information Center

    Baker, William H.; Thompson, Michael P.

    2004-01-01

    Effective teaching of presentation skills focuses on the most important element of the presentation--the message itself. Some instructors place the heaviest emphasis on the messenger (the presenter) and focus their presentation feedback on all the presenter is doing wrong--saying "um," gesturing awkwardly, and so forth. When students receive this…

  9. Du Pont Classifications of 2 ASAS-SN Supernovae

    NASA Astrophysics Data System (ADS)

    Shappee, Benjamin J.; Prieto, J. L.; Rich, J.; Madore, B.; Poetrodjojo, Henry; D'Agostino, Joshua

    2016-09-01

    We report optical spectroscopy (range 370-910 nm) of two supernovae discovered by the All-Sky Automated Survey for Supernovae (ASAS-SN; Shappee et al. 2014, ApJ, 788, 48) using the du Pont 2.5-m telescope (+ WFCCD) at Las Campanas Observatory on Aug. 30 and Sep. 1 2016 UT. We performed a cross-correlation with a library of supernova spectra using the "Supernova Identification" code (SNID; Blondin and Tonry 2007, Ap.J.

  10. Du Pont Classifications of 4 ASAS-SN Supernovae

    NASA Astrophysics Data System (ADS)

    Morrell, N.; Shappee, Benjamin J.

    2016-08-01

    We report optical spectroscopy (range 370-910 nm) of four supernovae discovered by the All-Sky Automated Survey for Supernovae (ASAS-SN; Shappee et al. 2014, ApJ, 788, 48) using the du Pont 2.5-m telescope (+ WFCCD) at Las Campanas Observatory on July 31 and Aug. 01 2016 UT. We performed a cross-correlation with a library of supernova spectra using the "Supernova Identification" code (SNID; Blondin and Tonry 2007, Ap.J.

  11. Subpart HH Training Presentations

    EPA Pesticide Factsheets

    EPA has produced the following training presentation(s) for reporters subject to this subpart. Generally, these presentations explain the rule or show how to use the reporting system e-GGRT to submit annual GHG reports to EPA.

  12. Subpart A Training Presentations

    EPA Pesticide Factsheets

    EPA has produced the following training presentation(s) for reporters subject to this subpart. Generally, these presentations explain the rule or show how to use the reporting system e-GGRT to submit annual GHG reports to EPA.

  13. Subpart DD Training Presentations

    EPA Pesticide Factsheets

    EPA has produced the following training presentation(s) for reporters subject to this subpart. Generally, these presentations explain the rule or show how to use the reporting system e-GGRT to submit annual GHG reports to EPA.

  14. Subpart T Training Presentations

    EPA Pesticide Factsheets

    EPA has produced the following training presentation(s) for reporters subject to this subpart. Generally, these presentations explain the rule or show how to use the reporting system e-GGRT to submit annual GHG reports to EPA.

  15. Subpart OO Training Presentations

    EPA Pesticide Factsheets

    EPA has produced the following training presentation(s) for reporters subject to this subpart. Generally, these presentations explain the rule or show how to use the reporting system e-GGRT to submit annual GHG reports to EPA.

  16. Subpart L Training Presentations

    EPA Pesticide Factsheets

    EPA has produced the following training presentation(s) for reporters subject to this subpart. Generally, these presentations explain the rule or show how to use the reporting system e-GGRT to submit annual GHG reports to EPA.

  17. Subpart W Training Presentations

    EPA Pesticide Factsheets

    EPA has produced the following training presentation(s) for reporters subject to this subpart. Generally, these presentations explain the rule or show how to use the reporting system e-GGRT to submit annual GHG reports to EPA.

  18. Subpart RR Training Presentations

    EPA Pesticide Factsheets

    EPA has produced the following training presentation(s) for reporters subject to this subpart. Generally, these presentations explain the rule or show how to use the reporting system e-GGRT to submit annual GHG reports to EPA.

  19. Subpart AA Training Presentations

    EPA Pesticide Factsheets

    EPA has produced the following training presentation(s) for reporters subject to this subpart. Generally, these presentations explain how to use the reporting system e-GGRT to submit annual GHG reports to EPA.

  20. Subpart I Training Presentations

    EPA Pesticide Factsheets

    EPA has produced the following training presentation(s) for reporters subject to this subpart. Generally, these presentations explain the rule or show how to use the reporting system e-GGRT to submit annual GHG reports to EPA.